Structure and method for digital data memory card encryption
20220398202 · 2022-12-15
Inventors
Cpc classification
G06F3/0644
PHYSICS
G06F3/0655
PHYSICS
G06F3/0679
PHYSICS
H04L9/30
ELECTRICITY
H04L9/088
ELECTRICITY
G06F21/6218
PHYSICS
International classification
G06F12/14
PHYSICS
H04L9/08
ELECTRICITY
Abstract
The present invention relates to a structure and a method for digital data memory card encryption. In a main body, a memory is provided in a memory card, and the memory itself is provided with a read controller that cooperates with a reader and a protection area, and is further divided into a hard disk partition table area and a file area. A portable storage identification (PSID) is written into any of the above-mentioned areas by using an application programming interface (API). Moreover, before the writing of the portable storage identification (PSID) by the application programming interface (API), a key instruction produced by means of an encryption and decryption logic is provided to the read controller by the application programming interface (API). The read controller first decrypts the key instruction, and transmits the result to the application programming interface (API) to further improve the security.
Claims
1. A method for digital data memory card encryption, wherein a memory is provided in a memory card. The memory itself is provided with a read controller that cooperates with a reader, and a protection area, and is further divided into a hard disk partition table area and a file area. A portable storage identification (PSID) is written into any of the above-mentioned areas by using an application programming interface (API). When the file area in the memory card has recorded a right object, and other readers want to read the memory card, the portable storage identification (PSID) can be used as an encryption mechanism for identification and reading, so as to increase the security in the digital rights management (DRM) of the digital data on the memory card. Moreover, before the writing of the portable storage identification (PSID) by the application programming interface (API), a key instruction produced by means of an encryption and decryption logic is provided to the read controller by the application programming interface (API). The read controller first decrypts the key instruction, and transmits the result to the application programming interface (API).
2. The method for digital data memory card encryption as described in claim 1, wherein the memory is a kind of flash memory (FLASH), electrically erasable programmable read-only memory (EEPROM).
3. The method for digital data memory card encryption as described in claim 1, wherein the application programming interface (API) uses a read controller to be placed in the protection zone of the memory.
4. The method for digital data memory card encryption as described in claim 1, wherein the application programming interface (API) uses Microsoft Windows operating systems (Windows) to be placed in the hard disk partition table area.
5. The method for digital data memory card encryption as described in claim 1, wherein the application programming interface (API) uses Microsoft Windows operating systems (Windows) to be placed in the file area of the memory.
6. The method for digital data memory card encryption as described in claim 1, wherein the memory card is an integrated personal storage disc (PSD).
7. A structure for digital data memory card encryption, wherein the memory card includes a memory, and the memory is provided with: a read controller, a protection area, a hard disk partition table area, and a file area. A portable storage identification (PSID) is written into any of the above-mentioned areas by using an application programming interface (API). Moreover, before the writing of the portable storage identification (PSID) by the application programming interface (API), a key instruction produced by means of an encryption and decryption logic is provided to the read controller by the application programming interface (API). The read controller first decrypts the key instruction, and transmits the result to the application programming interface (API).
8. The structure for digital data memory card encryption as described in claim 7, wherein the memory is a kind of flash memory (FLASH), electrically erasable programmable read-only memory (EEPROM).
9. The structure for digital data memory card encryption as described in claim 7, wherein the memory card is an integrated personal storage disc (PSD).
10. The structure for digital data memory card encryption as described in claim 7, wherein the encryption/decryption logic between the read controller of the memory card and the application programming interface (API) is that the public key infrastructure (PKI) serving as the encryption/decryption logic between the encryption system server and the decryption program.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0015]
[0016]
[0017]
DETAILED DESCRIPTION
[0018] In order that those skilled in the art can further understand the present invention, a detailed description is provided herewith. However, the description and the appended drawings are not to be used to confine the scope and spirit of the present invention defined in the appended claims.
[0019]
[0020] A memory card 1 and it contains a memory 11 therein. The memory 11 is provided with a read controller 111 that cooperates with a reader, and a protection area 112, and is further divided into a hard disk partition table area 113 and a file area 114. A portable storage identification (PSID) 115 is written into any of the above-mentioned areas by using an application programming interface (API) 118. When the file area 114 in the memory card 1 has recorded a right object 116 (i.e. the digital data that needs to have the right to obtain), and other readers want to read the memory card, the portable storage identification (PSID) 115 can be used as an encryption mechanism for identification and reading, so as to increase the security in the digital rights management (DRM) of the digital data on the memory card.
[0021] Referring to
[0022] In one embodiment, to further ensure the security of the PSID 115 in the memory card 1, the memory card 1 is formed as a personal storage disc. Additionally, a universal serial bus (USB) adaptor may be integrated with the memory card 1 so that the user can transfer data through the USB interface of a computing device. This makes it impossible for an unauthorized party to access or decode the data recorded in the memory 11 by detaching the memory card 1.
[0023] The memory 11 may be a flash memory in one embodiment, or an electrically-erasable programmable read-only memory (EEPROM) in an alternative embodiment.
[0024] The portable storage identification (PSID) 115 may be recorded in one of the four areas of the memory card 1, as described below.
[0025] 1. In one embodiment, if the portable storage identification (PSID) 115 is to be recorded into the read controller 111 in the memory 11 of the memory card 1, a general memory card reader such as a SD Card Reader, with an application programming interface (API) developed for the read controller in the memory of the memory card may be used for reading and writing data. This is a safer way. Referring to
[0026] 2. In another embodiment, if the portable storage identification (PSID) 115 is to be recorded into the protection area 112 in the memory 11 of the memory card 1, a special tool may be used for partitioning the protection area 112 in the memory 11 of the memory card 1. A general SD Card Reader with an application programming interface (API) developed for the protection area in the memory of the memory card may be used for reading and writing data.
[0027] 3. In still another embodiment, if the portable storage identification (PSID) 115 is to be recorded into the hard disk partition table area 113, the user may use the Windows™ operating system of Microsoft Corporation or other OS operating system to format the partition table area 113.
[0028] 4. In yet another embodiment, if the portable storage identification (PSID) 115 is to be recorded into the file area 114, the user may use the Windows™ operating system of Microsoft Corporation or other OS operating system to format the file area 114.
[0029] In one embodiment, regardless of which area the portable storage identification (PSID) 115 is recorded into, the rights object 116 needs to obtain rights to access the digital data. When various devices such as personal computers (PCs), mobile phones or various playback devices (collectively referred to as readers) want to read the files of the corresponding rights object 116, the read controller 111 decrypts the files of the rights object 116 by using controller logic in the read controller 111 or a program in the protection area 112, and obtains the corresponding portable storage identification (PSID) 115 from the decrypted file of the rights object 116 to compare with the portable storage identification (PSID) 115 recorded in the protection area 112. If the portable storage identification (PSID) recorded in the rights object 116 and the portable storage identification (PSID) 115 recorded in the memory 11 are matched, the file of the rights object 116 is provided to the playback device. If they are not matched, the playback device is informed that the reading operation is not permissible.
[0030] In one embodiment, only one portable storage identification (PSID) 115 is recorded in the read controller 111 or the protection area 112, no matter what technique (such as a read-only unique device ID or a random number generator with a one-time programming) is used to generate the portable storage identification (PSID) 115, the portable storage identification (PSID) 115 cannot be duplicated. The read controller 111 or the decrypting application programming interface (API) 118 of a playback device will compare the ID recorded in the rights object 116 with the portable storage identification (PSID) 115. When the portable storage identification (PSID) 115 recorded in the rights object 116 is matched to the portable storage identification (PSID) 115 recorded in the memory card, the decryption and playing operations can be performed.
[0031] Before the writing of the portable storage identification (PSID) 115 by the application programming interface (API) 118, a key instruction produced by means of an encryption and decryption logic is provided to the read controller 111 by the application programming interface (API) 118. The read controller 111 first decrypts the key instruction, and transmits the result to the application programming interface (API) 118. The data between the read controller 111 in the memory card 1 and the decryption application programming interface (API) 118 of the playback device is encrypted data (that is, the application programming interface (API) 118 wants to read or write to the protection area 112), the application programming interface (API) 118 needs to encrypt the command with the key obtained by agreement between the application programming interface (API) 118 and the read controller 111, and then send it to the read controller 111, and the read controller 111 first decrypts the command, decipher the command, execute the command, and then encrypts the command with the key obtained by agreement between the application programming interface (API) 118 and the read controller 111, and then send the result (command response or data) to the application programming interface (API) 118, and the application programming interface (API) 118 uses the key decryption result (command response or data) obtained by agreement between the application programming interface (API) and the read controller 111. In this way, the difficulty of interception and cracking by hackers and the crypto agility increase, there is no need to be afraid of interception and cracking by hackers.
[0032] Only the corresponding read controller 111 in the memory card and the decryption application programming interface (API) 118 of the playback device (as shown in the third figure) can perform the decryption, so as to prevent others from using the memory card reader (SD Card Reader) interface to intercept data.
[0033]
[0034] The present invention provides a digital data protection mechanism. Other than music and image, even video and other digital data, can be protected effectively to assure only the authorized digital data can be used. An illegal invader cannot access the data.
[0035] The present invention is thus described. Many variations thereof are not to be regarded as a departure from the spirit and scope of the present disclosure, and all such modifications as would be obvious to one skilled in the art are intended to be included within the scope of the following claims.