Method for protecting on-chip memory (flash and RAM) against...

Static information storage and retrieval – Floating gate – Data security

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C365S185030

Reexamination Certificate

active

06331946

ABSTRACT:

CROSS REFERENCES TO RELATED APPLICATIONS
The following co-pending U.S. patent applications, identified by their U.S. patent application serial numbers (USSN), were filed simultaneously to the present application on Jul. 10, 1998, and are hereby incorporated by cross-reference.
DOCKET NO.
DOCKET NO.
DOCKET NO.
DOCKET NO.
09/113,060
(ART01)
09/113,070
(ART02)
09/113,073
(ART03)
09/112,748
(ART04)
09/112,747
(ART06)
09/112,776
(ART07)
09/112,750
(ART08)
09/112,746
(ART09)
now U.S. Pat.
No. 6,227,648
09/112,743
(ART10)
09/112,742
(ART11)
09/112,741
(ART12)
09/112,740
(ART13)
now U.S. Pat.
No. 6,196,541
09/112,739
(ART15)
09/113,053
(ART16)
09/112,738
(ART17)
09/113,067
(ART18)
now U.S. Pat.
No. 6,195,150
09/113,063
(ART19)
09/113,069
(ART20)
09/112,744
(ART21)
09/113,058
(ART22)
09/112,777
(ART24)
09/113,224
(ART25)
09/112,804
(ART26)
09/112,805
(ART27)
09/113,072
(ART28)
09/112,785
(ART29)
09/112,797
(ART30)
09/112,796
(ART31)
now U.S. Pat.
No. 6,137,500
09/113,071
(ART32)
09/112,824
(ART33)
09/113,090
(ART34)
09/112,823
(ART38)
09/113,222
(ART39)
09/112,786
(ART42)
09/113,051
(ART43)
09/112,782
(ART44)
09/113,056
(ART45)
09/113,059
(ART46)
09/113,091
(ART47)
09/112,753
(ART48)
09/113,055
(ART50)
09/113,057
(ART51)
09/113,054
(ART52)
09/112,752
(ART53)
09/112,759
(ART54)
09/112,757
(ART56)
09/112,758
(ART57)
09/113,107
(ART58)
09/112,829
(ART59)
09/112,792
(ART60)
09/112,791
(ART61)
09/112,790
(ART62)
now U.S. Pat.
No. 6,106,147
09/112,789
(ART63)
09/112,788
(ART64)
09/112,795
(ART65)
09/112,749
(ART66)
09/112,784
(ART68)
09/112,783
(ART69)
09/112,781
(DOT01)
09/113,052
(DOT02)
now U.S. Pat.
No. 6,217,165
09/112,834
(Fluid01)
09/113,103
(Fluid02)
09/113,101
(Fluid03)
09/112,751
(IJ01)
now U.S. Pat.
No. 6,227,652
09/112,787
(IJ02)
09/112,802
(IJ03)
09/112,803
(IJ04)
09/113,097
(IJ05)
now U.S. Pat.
now U.S. Pat.
No. 6,213,589
No. 6,231,136
09/113,099
(IJ06)
09/113,084
(IJ07)
09/113,066
(IJ08)
09/112,778
(IJ09)
09/112,779
(IJ10)
09/113,077
(IJ11)
09/113,061
(IJ12)
09/112,818
(IJ13)
now U.S. Pat.
No. 6,220,694
09/112,816
(IJ14)
09/112,772
(IJ15)
09/112,819
(IJ16)
09/112,815
(IJ17)
now U.S. Pat.
No. 6,264,306
09/113,096
(IJ18)
09/113,068
(IJ19)
09/113,095
(IJ20)
09/112,808
(IJ21)
09/112,809
(IJ22)
09/112,780
(IJ23)
09/113,083
(IJ24)
09/113,121
(IJ25)
now U.S. Pat.
No. 6,239,821
09/113,122
(IJ26)
09/112,793
(IJ27)
09/112,794
(IJ28)
09/113,128
(IJ29)
09/113,127
(IJ30)
09/112,756
(IJ31)
09/112,755
(IJ32)
09/112,754
(IJ33)
now U.S. Pat.
now U.S. Pat.
now U.S. Pat.
No. 6,227,653
No. 6,234,609
No. 6,238,040
09/112,811
(IJ34)
09/112,812
(IJ35)
09/112,813
(IJ36)
09/112,814
(IJ37)
now U.S. Pat.
now U.S. Pat.
No. 6,188,415
No. 6,227,654
09/112,764
(IJ38)
09/112,765
(IJ39)
09/112,767
(IJ40)
09/112,768
(IJ41)
now U.S. Pat.
now U.S. Pat.
No. 6,217,153
No. 6,243,113
09/112,807
(IJ42)
09/112,806
(IJ43)
09/112,820
(IJ44)
09/112,821
(IJ45)
now U.S. Pat.
No. 6,247,790
09/112,822
(IJM01)
09/112,825
(IJM02)
09/112,826
(IJM03)
09/112,827
(IJM04)
09/112,828
(IJM05)
09/113,111
(IJM06)
09/113,108
(IJM07)
09/113,109
(IJM08)
09/113,123
(IJM09)
09/113,114
(IJM10)
09/113,115
(IJM11)
09/113,129
(IJM12)
09/113,124
(IJM13)
09/113,125
(IJM14)
09/113,126
(IJM15)
09/113,119
(IJM16)
09/113,120
(IJM17)
09/113,221
(IJM18)
09/113,116
(IJM19)
09/113,118
(IJM20)
09/113,117
(IJM21)
09/113,113
(IJM22)
09/113,130
(IJM23)
09/113,110
(IJM24)
09/113,112
(IJM25)
09/113,087
(IJM26)
09/113,074
(IJM27)
09/113,089
(IJM28)
09/113,088
(IJM29)
09/112,771
(IJM30)
09/112,769
(IJM31)
09/112,770
(IJM32)
now U.S. Pat.
now U.S. Pat.
No. 6,264,849
No. 6,254,793
09/112,817
(IJM33)
09/113,076
(IJM34)
09/112,798
(IJM35)
09/112,801
(IJM36)
now U.S. Pat.
No. 6,235,211
09/112,800
(IJM37)
09/112,799
(IJM38)
09/113,098
(IJM39)
09/112,833
(IJM40)
now U.S. Pat.
now U.S. Pat.
No. 6,264,850
No. 6,258,284
09/112,832
(IJM41)
09/112,831
(IJM42)
09/112,830
(IJM43)
09/112,836
(IJM44)
09/112,835
(JM45)
09/113,102
(IR01)
09/113,106
(IR02)
09/113,105
(IR04)
09/113,104
(IR05)
09/112,810
(IR06)
09/112,766
(IR10)
09/113,085
(IR12)
09/113,086
(IR13)
09/113,094
(IR14)
09/112,760
(IR16)
09/112,773
(IR17)
now U.S. Pat.
No. 6,196,739
09/112,774
(IR18)
09/112,775
(IR19)
09/112,745
(IR20)
09/113,092
(R21)
now U.S. Pat.
No. 6,152,619
09/113,100
(MEMS02)
09/113,093
(MEMS03)
09/113,062
(MEMS04)
09/113,064
(MEMS05)
09/113,082
(MEMS06)
09/113,081
(MEMS07)
09/113,080
(MEMS09)
09/113,079
(MEMS10)
09/113,065
(MEMS11)
09/113,078
(MEMS12)
09/113,075
(MEMS13).
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
Not applicable.
FIELD OF THE INVENTION
The present invention relates to tamper proof integrated circuit devices.
BACKGROUND OF THE INVENTION
Secure chips such as Smart Cards often contain program codes as well as secret key information. Unfortunately, such systems are open to attack by means of reverse engineering or the like.
In secure chip applications, there are problems associated with storing program code and keys in internal ROM or Flash memory. For example, single bits in a ROM can be overwritten using a laser cutter microscope, to either 1 or 0 depending on the sense of the logic. With a given opcode/operand set, it may be a simple matter for an attacker to change program code from a conditional jump to a non-conditional jump, or perhaps change the destination of a register transfer. If the target instruction is chosen carefully, it may result in the key being revealed.
EEPROM/Flash attacks are similar to ROM attacks except that the laser cutter microscope technique can be used to both set and reset individual bits. This gives much greater scope in terms of modification of algorithms.
Alternatively, instead of trying to read the Flash memory, an attacker may simply set a single bit by use of a laser cutter microscope. Although the attacker doesn't know the previous value, they know the new value. If the chip still works, the bit's original state must be the same as the new state. If the chip doesn't work any longer, the bit's original state must be the logical NOT of the current state. An attacker can perform this attack on each bit of the key and obtain the n-bit key using at most n chips (if the new bit matched the old bit, a new chip is not required for determining the next bit).
It is not enough to simply store secret information or program code in Flash memory. The Flash memory and RAM must be protected from an attacker who would attempt to modify (or set) a particular bit of program code or key information.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide a novel way of using multi-level Flash memory and parity to make internal chip data storage more secure against a number of physical attacks.
In accordance with a first aspect of the present invention, there is provided a method of providing for resistance to monitoring of an memory circuit having multiple level states corresponding to different output states, said method comprising utilizing the intermediate states only for valid output state. The memory can comprise flash memory and can further include one or more parity bits.


REFERENCES:
patent: 4023149 (1977-05-01), Bormann et al.
patent: 4139910 (1979-02-01), Anantha et al.
patent: 4300210 (1981-11-01), Chakravarti et al.
patent: 5054001 (1991-10-01), Guillot
patent: 5184324 (1993-02-01), Ohta
patent: 5218569 (1993-06-01), Banks
patent: 5351210 (1994-09-01), Saito
patent: 5539690 (1996-07-01), Talreja et al.
patent: 5844841 (1998-12-01), Takeuchi et al.
patent: 5963076 (1999-10-01), Shor et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for protecting on-chip memory (flash and RAM) against... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for protecting on-chip memory (flash and RAM) against..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for protecting on-chip memory (flash and RAM) against... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2601333

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.