High security flash memory and method

Image analysis – Applications – Personnel identification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S186000

Reexamination Certificate

active

06707935

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates in general to flash memories and in particular to flash memories used for secured data applications.
2. Description of the Related Art
A number of new applications for electronic devices have emerged during the last several decades. Many of these include need for security of information stored in the electronic devices.
Some, such as automated bank teller machines, employ encryption engines, which may be compatible with the Data Encryption Standard (“DES”) published by the U.S. Government. Others, such as secure telephone units, use a public key algorithm to exchange cipher keys that are then employed together with encryption techniques providing high enough data throughput to allow real-time voice or data communication. These technologies do not lend themselves to pocket-, purse- or wallet-portable consumer applications and may be of limited geographic use due to export restrictions.
“Smart cards” containing electronic circuitry are becoming increasingly popular as a way of transferring funds in exchange for goods or services. In some instances, a memory integrated circuit within the smart card is credited with a balance when funds are deposited, and the balance is decremented as the card is used while a credit is given in a separate account. In other instances, the card operates more as a debit or credit card, providing information that is then used to alter balances in two or more accounts external to the card. In either case, the owners of the card or the accounts or both have vested interests in the integrity of whatever system is used to safeguard the financial interests of the rightful owner of the affected funds, balances or accounts.
Different kinds of systems can be employed for verification of a user's identity for authentication of a transaction. In those systems where the user supplies some form of data (e.g., PIN), and the data is sufficient to provide access to something in which the user has a property interest, it is important to safeguard the data itself.
Numerous examples of electronic theft based on unauthorized use of identification codes exist. In many cases, people have had their telephone cards numbers and PINs observed while using a public telephone. The observer then places calls using the stolen data. Sophisticated thieves have picked cellular telephone identification codes from cellular telephone transmissions and then encoded semiconductor memory integrated circuits with the stolen codes, put the memory integrated circuits into cellular telephones and sold the telephones.
Requiring the user to enter a PIN via some publicly-accessible medium thus can present substantial security risks. Additionally, requiring the user to memorize and repeatedly provide a PIN presents noticeable nuisance value to the user. One approach to ensuring that the user of a given financial instrument is authorized to do so is to unobtrusively read an immutable or nearly-immutable physical characteristic of the user that also provides unique identification of that user contemporaneously with use of the instrument. However, data corresponding to the identifying characteristic then must be stored in some portion of the system that the instrument interacts with. When these data are read out from either the instrument or the system and then used to falsely authenticate a transaction, system security is compromised. Systems in which this can occur are likely to meet substantial marketplace challenges and are unlikely to win consumer confidence and market acceptance.
Enablement of a high degree of user autonomy is a highly desirable characteristic in many consumer instruments. As a result, portability coupled with widespread acceptance of the consumer instrument are strongly preferred. At the same time, both real-time operation and a high degree of data security are important characteristics.
BRIEF SUMMARY OF THE INVENTION
In one aspect, the present invention is capable of providing the security of fingerprint recognition together with the convenience of smart cards as a way of enabling transactions across a variety of consumer markets, together with permitting high geographic diversity. The manner in which the fingerprint recognition is carried out does not permit probing of a memory storing reference fingerprint data, and the binary nature of the output data does not permit information regarding the stored reference fingerprint data to be determined from a “trial and error” approach. In one aspect, the fingerprint recognition hardware disables or destroys access to the smart card portion of the invention when a predetermined number of unsuccessful attempts to enable the card for use have been attempted. Access to the stored fingerprint data may be disabled or destroyed in addition to or as an alternative to disabling or destroying access to the smart card portion of the invention.


REFERENCES:
patent: 4993068 (1991-02-01), Piosenka et al.
patent: 5144680 (1992-09-01), Kobayashi et al.
patent: 5544111 (1996-08-01), Berthozat et al.
patent: 5815252 (1998-09-01), Price-Francis
patent: 6028773 (2000-02-01), Hundt
patent: 6144757 (2000-11-01), Fukuzumi
patent: 6266647 (2001-07-01), Fernandez
patent: 6320394 (2001-11-01), Tartagni
Kramer, A. et al., FP 12.6: “1.5TXPS Convolver Using 5b Analog Flash for Real-Time Large-Kernel Image Filtering,” TD: Low-Voltage and Multi-Level Techniques/Paper FP 12.6, SGS-Thomson Microectronics, Berkeley, CA, pp. 196-197,1998 IEEE Int'l Solid-State Circuits Conference.
P.L. Rolandi et al., SA 21.2: 1M Cell 5b/Cell Analog Flash Memory for Digital Storage, Memory: NV and Embedded/Paper SA 21.2, SGS-Thomson Microlectronics, Agrate Brianza, Italy, pp. 334-335,1998 IEEE Int'l Solid-State Circuits Conference.
Kramer, A. et al., “Flash Based Programmable Nonlinear Capacitor for Switched Capacitor Implementations of Neural Networks,” SGS-Thomson Microlectronics, Agrate Brianza, Italy, pp. 17.6.1-17.6.4,1994 IEEE.
Fabrizio, V. et al., “Low-Power, Low Voltage Conductance-Mode CMOS Analog Neuron,” SGS-Thomson Microlectronics, Agrate Brianza, Italy, pp. 111-115,1996 IEEE Proceedings of Micro Neuro '96.
Alan H. Kramer, “Array-Based Analog Computation: Principles, Advantages and Limitations,” SGS-Thomson Microlectronics, Agrate Brianza, Italy, pp. 68-79,1996 IEEE Proceedings of Micro Neuro '96.
Kramer, A. et al., “384 GCPS Convolver Using 5-bit Analog Flash for Real-Time Large Kernel Image Filtering,” SGS-Thomson Microlectronics, Agrate Brianza, Italy.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

High security flash memory and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with High security flash memory and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and High security flash memory and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3292565

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.