Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique
Reexamination Certificate
2000-06-30
2004-01-20
Thai, Tuan V. (Department: 2186)
Electrical computers and digital processing systems: memory
Storage accessing and control
Control technique
C711S100000, C711S103000, C711S163000
Reexamination Certificate
active
06681304
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to digital computer memory devices and, more specifically, to a method and device for providing hidden storage in non-volatile memory.
BACKGROUND OF THE INVENTION
The world is increasingly becoming connected via wired and wireless networks. This connectivity means that an increased level of information and service is being delivered over networks. As the amount of information increases, so does the value of this information. As this value increases, the threat of others gaining illicit access to this information also increases. To protect against these mounting threats, security measures are required. And as security measures are put into place and trust is gained, further valuable information is sent which leads to a cyclical evolution of increased value, increased threat, and increased security.
Adding security to complex, open, and rapidly evolving networks is not simple. There are many exploitable elements in most network architectures. Untrusted platforms, unprotected communication links, communication protocols that do not address security and poor implementation of standards (where they exist) are all exploitable by sophisticated adversaries. These security holes must be fixed for the full business and commerce potential of networks to be realized. The result is opportunity for companies that can provide solutions.
Today, most security is performed in software. Software is known for its inability to keep secrets and perform security functions privately and reliably. To provide stronger security, hardware needs to be added to perform some of the security functions. A trusted operating system is not required if the encryption is performed in hardware. This reflects a basic security truth axiom—hardware is much better than software in providing high-grade security solutions. Given the escalating need for security in connected devices, an opportunity now exists to add value to systems which contain flash memory by embedding security primitives in the flash memory that can easily be applied to standards based security solutions.
REFERENCES:
patent: 5093787 (1992-03-01), Simmons
patent: 5144659 (1992-09-01), Jones
patent: 5293424 (1994-03-01), Holtey et al.
patent: 5469564 (1995-11-01), Junya
patent: 5491827 (1996-02-01), Holtey
patent: 5673222 (1997-09-01), Fukumoto et al.
patent: 5742935 (1998-04-01), Hazen et al.
patent: 5949882 (1999-09-01), Angelo
patent: 6157953 (2000-12-01), Chang et al.
patent: 6199167 (2001-03-01), Heinrich et al.
patent: 6240519 (2001-05-01), James, Jr. et al.
patent: 6298421 (2001-10-01), Minamizawa et al.
Brizek John P.
Hasbun Robert N.
Vogt James R.
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Thai Tuan V.
LandOfFree
Method and device for providing hidden storage in... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and device for providing hidden storage in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and device for providing hidden storage in... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3190063