throbber
HAVA
`oy
`5,237,609
`[45]
`Aug. 17, 1993
`
`Patent Number:
`
`Date of Patent:
`
`US005237609A
`
`.
`.
`.
`
`United States Patent 115;
`Kimura
`
`[54] PORTABLE SECURE SEMICONDUCTOR
`MEMORYDEVICE
`
`Inventor:
`[75]
`[73] Assignee:
`
`[56]
`
`FOREIGN PATENT DOCUMENTS
`0114522
`8/1984
`European Pat. Off.
`Masatoshi Kimura, Itami, Japan
`0216298
`4/1987
`European Pat. Off.
`0286094 10/1988
`European Pat. Off.
`Mitsubishi Denki Kabushiki Kaisha,
`2503423 10/1982 France .
`53-6491
`3/1978 Japan .
`Tokyo; Japan
`2154344 9/1985 United Kingdom .
`[21] Appl. No.: 498,848
`Primary Examiner—David Cain
`[22] Filed:
`Mar, 26, 1990
`Attorney, Agent, or Firm—Leydig, Voit & Mayer
`[30]
`Foreign Application Priority Data
`57)
`ABSTRACT
`Mar. 31,1989 [JP]
`Japan cece. 77979
`A portable semiconductor memory device for interfac-
`Mar. 31, 1989 [JP]
`Japan 2... .csescsessesscccsessereeseeere 177980
`«in With and exchanging information with an external
`FSi) Wet WSccc G11B 23/28
`terminal, said portable device havinga security function
`[52] WS. CMe cecesssssecessesssssssssnsesnsensein 380/3; 380/23,
`for controlling access to a main memory. The main
`380/25; 380/19; 235/380
`[58] Field of Search .......cscsssssseseee 380/3, 23, 25, 49;|memory is adapted to exchange data with the external
`235/380, 441, 382, 379, 492, 487
`terminal by means of an interface bus which includes
`?
`data lines, address lines and control lines. Access con-
`References Cited
`trols means in the portable unit is utilized to control
`U.S. PATENT DOCUMENTS
`access to the main memory. The unit also has a security
`memory comprising two sections. One section stores
`peley eee Moree .
`eet enciphered data whichis read out to the externa! termi-
`
`4,102,493
`6/1978 MOrEnO cecescecssecevseveesererrereve 235/419
`nal, deciphered and returned to the unit as the first
`4,697,072 9/1987 Kawana......
`we 235/380
`element used in a comparison. The second sectionof the
`
`3/1988 Kawana et al.
`seve 235/487
`4,734,569
`security memory stores internal identification informa-
`4,746,788
`5/1988 Kawana ons seciccscniccnieen 235/380
`tion. The two elements ofidentification information are
`
`Kawanaetal. ....
`it
`we 235/380
`4,780,602 10/1988
`
`provided to a comparator means which enables access
`Kawana et al.
`....
`«» 235/441
`4,794,236 12/1988
`
`to the main memory via the interface bus after a match
`1/1989 Hara wee
`vue 235/380
`4,797,542
`csccscsssesecesssersere 235/492
`~_—«s detected.
`4,845,351
`7/1989 Hara et ale
`5,010,237
`4/1991 Kawana.....
`seuee 235/379
`5,120,939
`
`33 Claims, 6 Drawing Sheets
`
`TERMINAL
`STORAGE
`SECTION
`
`6/1992 Claus et al. vsecssscrssssesneee 235/382 MAIN
`
`Ee. aeoea
`
`
`KEYBOARD
`
`SECURITY
`
`Y
`
`Te el
`
`1
`
`KINGSTON 1005
`
`KINGSTON 1005
`
`

`

`U.S. Patent Tie
`
`Aug. 17, 1993
`
`Sheet 1 of 6
`
`5,237,609
`
`!
`
`2
`
`Old
`
`002
`
`ogE-
`
`
`
`LINATWNINYSLTIWNYSLX3
`
`

`

`5,237,609
`
`Sheet 2 of 6
`
`U.S. Patent
`
`Aug, 17, 1993
`
`3
`
`

`

`U.S. Patent
`
`Aug. 17, 1993
`
`Sheet 3 of 6
`
`5,237,609
`
` aLINDYID
`SRESSaEE
`
`HOLV1
`
`StEE
`
`Z|
`
`4
`
`
`

`

`U.S. Patent
`
`Aug. 17, 1993
`
`Sheet 4 of 6
`
`5,237,609
`
`FIG. 4
`
`lbtt
`
`10000
`
`00000
`
`
`
`
`EXTERNAL
`IDENTIFICATION
`INFORMATION
`
`
`
`
`INTERNAL
`IDENTIFICATION
`
`INFORMATION
`

`
`50b
`
`[-~004
`
`I
`
`—_
`
`1 oe6 yj 52 9 ES
`
`
`
`» SUPPLY
`8—~A
`
`
`
`Pasi
`CHANGE-
`
`OVER
`
`CIRCUIT
`
`5
`
`

`

`U.S. Patent
`
`Aug. 17, 1993
`
`Sheet 5 of 6
`
`5,237,609
`
`40S
`
`||
`
`WOU
`
`vl
`
`60
`
`ONIMOLS|ZG||
`
`“EESVNUALXS
`
`yOLY“NIULNGGI
`oaA"7
`
`
`
`eeail
`
`WOU
`
`i)|
`
`6
`
`
`
`

`

`U.S. Patent
`
`Aug. 17, 1993
`
`Sheet 6 of 6
`
`5,237,609
`
`FIG. 6
`
`INSERT CARD
`
`TERMINAL
`POWER “ON“
`
`300
`
`301
`
`302
`
`304
`
`READ ENCIPHERED EXTERNAL
`INFORMATION FROM
`NONVOLATILE MEMORY
`303-—OETERMINE WHETHER THIS SECURITY CHECK
`YES| OPERATION 1S PERSONAL IDENTIFICATION
`NUMBER (PIN) KEYIN METHOD OR NOT FROM
`
`DECIPHERED TEXT
`
`
`ADD PIN INPUT BY USER TO DECIPHERED
`TEXT AND DECIPHER STORAGE ADDRESSES
`ORDREacesane
`
`AND READOUT SEQUENCE OF CODE ARRAY
`READOUT SEQUENCE
`
`OF CODE ARRAY
`(N= 8BITS x4)
`
`
`|NO
`
`
`3040
`
`
`
`
`WRITE CODE_ARRAY FROM INTERNAL AREA
`
`
`OF NONVOLATILE MEMORY
`(OR CODE ARRAY STORING ROM)
`
`
`INTO COMPARATOR SUCCESSIVELY
`DECIPHER CONTENTS OF CODE ARRAY
`(N84) FROM DECIPHER TEXT
`ADDED PIN
`
`305
`
`306
`
`WRITE DECIPHERED CODE IN COMPARATOR
`
`307
`
`
`EFFECT COMPARISON BETWEEN CODE ARRAY
`READ OUT FROM NONVOLATILE MEMORY
`
`{OR CODE ARRAY STORING ROM)
`
`AND DECIPHERED CODE ARRAY
`
`
`
`
`
`308
`
`30!
`
`YES
`
`ACCESS
`ALLOWED
`
`
`
`31
`
`ACCESS
`REFUSED
`
`7
`
`

`

`1
`
`5,237,609
`
`PORTABLE SECURE SEMICONDUCTOR
`MEMORY DEVICE
`
`FIELD OF THE INVENTION
`
`This invention relates to portable semiconductor
`memory devices, and moreparticularly to such devices
`which include a security function intended to protect
`the information stored in the portable memory.
`BACKGROUND OF THE INVENTION
`
`2
`select signal line 16, a write enablesignalline 17 and an
`output enable signal line 18. The address, data, and
`control lines provide access to the semiconductor mem-
`ories 4a<4n in conventional fashion. The card select
`signal on line 16is utilized to enable the semiconductor
`memory elements in a manner which will be described
`below.
`One further connection is provided from the terminal
`into which the memory card is inserted, and that is a
`supply of power which is coupled to power supply line
`11. A power supply sensing and changeover circuit
`generally indicated at 2 senses the application of power
`Memory devices such as memory cards can be
`thought of as divided into two classes—“smart cards”
`to the line 11, and couples that applied power to the
`which have a microprocessor in addition to a main
`remaining circuitry for operation. It is noted that to
`storage unit, and “memory cards” which have only
`maintain the information in the semiconductor memory
`memory but no programmable (or programmed) micro-
`4 during the substantial intervals when the card is not
`processor.
`inserted in the terminal, a stand-by battery 6 is used to
`Because of the processing capability available in
`supply power to internal power bus 9 via current limit-
`smart cars as a result of the on-board microprocessor,
`ing resistor 7 and a reverse poled charge prevention
`there are numerous security techniques useful with such
`diode 8. However, whenever the card 1 is plugged into
`cards for protecting the integrity of the data stored on
`a terminal and a source of poweris connected to exter-
`the card. Thus the on-board microprocessor can per-
`nal powerbus 11, a sensing module 3 within the power
`form various functions in checking PIN numbers, hand
`supply changeover circuit 2 senses the voltage level on
`shaking with a processor in an external terminal, per-
`the bus 11 and in response thereto switches on a pass
`forming, enciphering and deciphering operations on-
`transistor 12 and thereby couples the external power
`board the smart card, and other techniques all prior to
`source to the internal power bus 9. In addition, the
`allowing access to the main memory on the card. Thus,
`sensing module 3 within the power supply changeover
`significant capacity is available for insuring the integrity
`circuit 2 applies a high logic signal on output line 13
`of the data in a smart card.
`which in turn is coupled to a G input ofa memoryselect
`However, in memory cards which do not have the
`circuit 5, providing a preliminary enabling signal to the
`power of an on-board microprocessor, the capacity for
`circuit 5. Thus, whenever the power applied to the
`performing security checks before allowing access to
`external bus 11 is higher than that supplied by the bat-
`the main memory is substantially more limited. In a
`tery 6, that condition is sensed by the power supply
`memory card typically the data, address and control
`changeover circuit 2 and the sensing module 3 thereof
`lines of the main memory modules are coupled directly
`performs two functions, namely (a) switches on the pass
`to the card outputs and are thus available for read out
`transistor 12 in order to supply external power to the
`either in a terminal for which the card is intended or
`internal bus 9 and (b) couples a high logic enabling
`otherwise. Thus, the opportunity is available for some-
`signal to the control line 13 providing the preliminary
`one intending to breach the security of the internal
`enabling signal to the memoryselection circuit 5.
`memory to directly access the memory deviceif reason-
`It is seen that the memory selection signal 5 has a
`able care is taken in interfacing the data, address and
`series of outputs S;-S, which are coupled respectively
`contro! lines of the memory elements which are all
`as enabling inputs 192-19n to associated semiconductor
`readily available at the card connection points. Even
`when the card is used in a terminal for which it is in-
`memory devices 4a-4n. A selected one of those output
`lines is individually driven low depending upon the
`tended, security functions are usually desirable, such as
`address signal coupled to the address inputs A, of the
`insertion of a PIN number by a user, or some means of
`selector module 5. Thus, the higher order address bits
`insuring, based on a check of card stored information
`from the address bus 15, which are coupled to the indi-
`and terminal supplied processing powerthat the two are
`vidual lines of address input A, are used to select which
`of intended compatability before memory access is al-
`lowed.
`of the semiconductor memory devices 4a «4n will be
`active at any given time. It is noted that the address
`With only hard wired logic elements at most avail-
`inputs and G input of selector 5 are provided with
`able on a memory card for performing the security
`pullup resistors 10 to assure that all memory devices
`function, insofar as applicant is aware, the techniques
`4a <4n are disabled except when the inputs are inten-
`which have been made available for securing the stored
`information are not as reliable as could be desired.
`tionally driven low.
`A final input to the memory select circuit 5 is the G
`The security issue will be further developed with
`which is coupled to the card select signal line 16 which
`reference to FIG. 7 which showsa configuration of a
`is an elementof the control lines of the interface bus 40.
`conventional memory card having on-board semicon-
`Thus, whenever the particular memory card1is se-
`ductor memory which is substantially non-secure. The
`lected, the external terminal couples a low logic signal
`portable semiconductor memory card 1 of FIG. 7
`to the line 16, and thus provides an enabling signal to
`carries an on-board semiconductor memory 4, usually
`the G inputofselector 5.
`comprised of an array of semiconductor memory de-
`vices 4a-4n, The address lines of the semiconductor
`In summary, when poweris applied to the external
`memory devices 4a<4n are coupled together to form
`bus 11, the G input ofselect circuit 5 is driven high.
`an address bus 14, and the data lines coupled together to
`Subsequently, when the card select input 16 is driven
`form a data bus 15. The address bus 14 and data bus 15
`low, the G input ofselect circuit 5 is driven low, thus
`enabling the outputsofselect circuit 5 to respond to the
`are elements of an interface bus 40 comprising address
`lines 14, data lines 15, and control lines including a card
`logic levels on the address inputs. Thus, the external
`
`10
`
`40
`
`45
`
`50
`
`35
`
`65
`
`8
`
`

`

`5,237,609
`
`3
`terminal couples address signals to the high orderbits
`on the address bus 15 which serve to individually select
`the outputs S)-S, of the selector 5 and in turn individu-
`ally enable the semiconductor memory devices 4a—4n.
`When enabled, a semiconductor memory device re-
`sponds to address signals on the address bus 15, to write
`or read signals and enable signals on the controllines 17,
`18 to either write information into the addressed semi-
`conductor memory location from the data bus 15 or
`read the information stored in the addressed location
`out onto the data bus 15, both for interfacing with the
`external terminal.
`With that understanding of a conventional memory
`card 1, it will be appreciated that the semiconductor
`memory 4 is in a relatively non-secure state. The data
`lines of the semiconductor memory,the addresslines of
`the semiconductor memory and the control
`lines
`(read/write and enable) of the semiconductor memory
`are all available at
`the card output. Typically, such
`control signals will be directly available at the card
`contacts which are intended to interface with an exter-
`nal terminal. Even in the case where the card receives a
`seria] message whichis stored in a register orthelike for
`coupling to a semiconductor memory,
`there is little
`security associated with the serial receiver or serial to
`parallel converter, and thus the terminals of the mem-
`ory devices themselves can be considered as being
`available to the outside world. While smart cards hav-
`ing on-board microprocessors can provide the desired
`security,
`it has been found impractical to provide an
`effective amount of security for the on-board memory
`using only hard wired logic elements.
`It will also be apparent that one can utilize such a
`semiconductor memory device in a terminal designed to
`accept it whether or not the individual possessing the
`card is indeed authorized to use it. There is no security
`check provided, it is simply necessary to couple the
`appropriate voltage levels or signals to the card, and the
`individual memory devices are directly addressed for
`writing or reading as desired.
`Even without a compatible terminal, it is relatively
`easy to access the contents of the memory 4.It is simply
`necessary to couple powerto the external powerbus 11,
`appropriate control signals, address signals and data
`signals to the interface bus 40, and the internal memory
`is directly accessible. Thus, an unauthorized individual,
`even without access to a compatible terminal, can ac-
`cess the memory and read out information which had
`been intended to be secure. As a further example, an
`unauthorized individual can write information into the
`semiconductor memory, and a subsequent user will be
`unawarethat the security of the stored information has
`been breached. If security is at all a factor in using a
`portable memory device, the limitations of the device
`illustrated in FIG. 7 will now be apparent.
`SUMMARY OF THE INVENTION
`
`In view of the foregoing, it is a general aim of the
`present invention to provide a portable memory device
`of inexpensive construction, and requiring no on-board
`microprocessor unit, but exhibiting a comparatively
`high degree of security provided in large measure by
`logic elements resident on board the card.
`In that regard, it is an object of the present invention
`to provide a portable memory device in which the on-
`board memory is accessible to the outside only after
`completion of a security check which matches informa-
`tion stored in a separate section of memory on the card,
`
`4
`in which the security information available to the out-
`side is in enciphered form.
`Stated differently, an object of the present invention
`is to provide a portable memory device in which exter-
`nal access is allowed to the on-board semiconductor
`memory only after a security check, which includes
`matching an identification code maintained internal to
`the card with a code deciphered by an external terminal
`from enciphered information received from the card.
`According to a more detailed aspect of the invention,
`it is an object to provide a security memory on a porta-
`ble memory card in which the security memory is parti-
`tioned in such a way that only enciphered security in-
`formation is available to an interface bus while addi-
`tional security information which need not be enci-
`phered is maintained in a partition of memory whichis
`accessible only within the card.
`According to one aspect of the invention, an object is
`to provide a secure portable semiconductor memory
`device in which security is provided by utilization of
`security codes stored in a partitioned on-board security
`memory, one partition of the memory containing enci-
`phered security information which is accessible to an
`interface bus, and the other partition containing security
`information which need not be enciphered but is avail-
`able only within the card andis isolated from theinter-
`face bus.
`In accordance with the invention there is provided a
`portable semiconductor memory unit for interfacing
`with and exchanging information with an external ter-
`minal. The unit includes a main memory and an inter-
`face bus for coupling the main memory to the external
`terminal. Enabling means selectively allows access to
`the main memory via the interface bus. The enabling
`means includes a security memory having a first section
`for storing enciphered external data and a second sec-
`tion for storing internal data whichis isolated from the
`interface bus. The enabling means further includes a
`comparator having a first input for receiving deci-
`phered external data from the external terminal which
`results from deciphering of the enciphered external data
`received from the card via the interface bus. The com-
`parator has a second input for receiving internal data
`from the second section of the security memory. Fi-
`nally, the comparator has an output which causes the
`enabling means to allow access between the external
`terminal and the main memory upon detection of a
`match between the internal and externaldata.
`It is a feature of the invention that any security infor-
`mation which is not in enciphered form is isolated from
`the interface bus so that the only security information
`available outside the card is enciphered. A further fea-
`ture of the invention is partitioning of the security mem-
`ory in such a way as to prevent read out of the section
`containing the non-enciphered information to the inter-
`face bus.
`A furtherfeature of the inventionis the storage on the
`card of two independent identification codes, an inter-
`nal identification code which need not be enciphered
`but whichis isolated from the interface bus so thatit is
`not ascertainable from outside, and an external identifi-
`cation code which is intended to be accessed by an
`external terminal, but which is enciphered and thus
`cannot readily reveal the internal identification code. In
`a preferred embodimentofthe invention,it is a further
`feature that
`the enciphered external
`information in-
`cludes address identification information used to ad-
`dress locations in the security memory at which the
`
`— 0
`
`15
`
`20
`
`25
`
`35
`
`45
`
`50
`
`35
`
`60
`
`65
`
`9
`
`

`

`5,237,609
`
`6
`board input/output 205. The main terminal storage
`section 203 includes a main semiconductor memory
`which is used for storing a program of instructions for
`operating the processing unit 201, for storing informa-
`tion whichis to be coupled to the portable memory unit
`100 and for storing information received from the porta-
`ble memory unit 100. The storage section 203in effect
`serves as the main memory for the external terminal
`200. It can be configured as a single unit or in individual
`blocks, as desired. The main terminal 200 also includes
`a clock generating circuit 202 which provides clock
`signals for the CPU 201 and additionally controls the
`timing of signals which are coupled to the portable
`memory unit 100 when such unit is connected.
`The input/output interface 204 is coupled to and
`therefore drives a CRT display unit 206 for displaying
`information to a user of the external terminal. Similarly,
`the input/output interface 205 is coupled to a keyboard
`207 to receive information keyed into the keyboard by
`such a user. Thus, the terminal unit 200 can be consid-
`ered relatively conventional as including the major
`elements familiar to those working in this art. However,
`the main terminal storage section 203, as will be de-
`scribed below,also includes a program module capable
`of receiving enciphered external information from the
`security memory of the portable semiconductor device
`100, deciphering such information and causing the CPU
`201 to drive its address, data and controllines in such a
`way as to cause a security check to be completed in the
`portable semiconductor unit 100. Such program module
`principally deciphers the enciphered external informa-
`tion, writes the deciphered identification information
`into a comparator in the portable semiconductor mem-
`ory, and uses address identification information derived
`from the deciphered information to address a security
`memory in the portable semiconductor memoryunit for
`reading out into the comparatorthe internal identifica-
`tion code for comparison with the deciphered external
`identification code.
`Directing attention then to the structure of the porta-
`ble semiconductor device 100, it is seen, like the prior
`art semiconductor device, to include a main memory 4
`having an internal power bus 9 supplied with stand-by
`power from a battery 6 via current limiting resistor 7
`and charge protection diode 8. The internal power bus
`9 is connected via power supply changeover circuit 2 to
`an external power bus 111. As with the prior portable
`memory device, when the power bus 111 is supplied
`with powerat a voltage higher than that of the internal
`battery 6, the changeover circuit 2 senses that condi-
`tion, couples the external power source to the internal
`bus 9 and couples a high enabling signal to enabling line
`13 which is coupled in turn to input Gl of the memory
`selection circuit 5a. -
`The main memory 4 is shown to have an interface bus
`140, which is illustrated as a single bus in FIG. 1, but
`which includes data lines, address lines and control lines
`as will be described in greater detail below. Those lines
`are coupled directly to the main memory4, but in prac-
`ticing the invention are not allowed to directly access
`the main memory until after successful completion of a
`security check routine which is controlled by informa-
`tion in the portable device 100,at least some of whichis
`inaccessible to the interface bus and therefore practi-
`cally inaccessible outside the card.
`In practicing the security aspects of the invention, a
`security memory 50, preferably a non-volatile memory,
`is provided for storing security related information. A
`
`10
`
`20
`
`30
`
`45
`
`50
`
`55
`
`65
`
`5
`internal identification code is stored, so that the value
`and sequenceofthe identification codes provide a fur-
`ther measure ofsecurity for the portable semiconductor
`memory,
`As a further feature of the invention, a PIN identifica-
`tion number input by a user into an external terminal
`can be combined with the external security information
`in order to provide further security and further limit
`access to only those whoare in possession of the PIN
`number.
`Other objects and advantages will become apparent
`upon references to the following detailed description
`when taken in conjunction with the drawings in which:
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG.1 is a block diagram showing a secure memory
`system including an external terminal unit coupled via
`an interface bus to a portable memory device;
`FIG. 2 is a block diagram illustrating additional de-
`tails of the security aspects of the portable memory
`device of FIG. 1;
`FIG. 3 is a block diagram illustrating additional de-
`tails of a comparator circuit useful in connection with
`the embodiments of the present invention;
`FIG. 4 is a diagram illustrating memory partitioning
`for the security memory of the system of FIG. 1;
`FIG. 5 is a block diagram illustrating a second exem-
`plary portable memory device exemplifying the present
`invention;
`FIG. 6 is a flowchart illustrating the operation of the
`secure memory system according to the present inven-
`tion; and
`FIG. 7 is a block diagram illustrating a memory card
`exemplifying the prior art.
`While the invention will be described in connection
`with certain preferred embodiments, there is no intent
`to limit it to those embodiments. On the contrary, the
`intent
`is to cover all alternatives, modifications and
`equivalents included within the spirit and scope of the
`invention as defined by the appended claims.
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`Turning now to the drawings, FIG. 1 showsa porta-
`ble memory card 100 exemplifying the present inven-
`tion and interfaced to an external terminal 200. The
`electrical connection between the devices is schemati-
`cally illustrated by connector 150. In practice, the exter-
`nal terminal will preferably include a slot or other close
`fitting receptacle into which the memory device 100 is
`inserted and which will cause mating of electrical
`contacts between the portable card 100 and the external
`terminal 200, such mating beingillustrated by the afore-
`mentioned connector 150. As illustrated in FIG. 1, the
`connections include those madeto an interface bus 140
`as well as a power bus 111. It is seen that the external
`terminal includes a similar power bus 211 and interface
`bus 240 coupled to the connector 150, such that the
`terminal unit 200 supplies DC power to the portable
`card 100. In addition, the coupling of busses 140, 240
`causes the connection of data lines, address lines and
`control lines between the portable memory card 100
`and the external terminal 200.
`The external terminal will be not described in great
`detail as its structure can be relatively conventional. It is
`shownto include a central processing unit 201 coupled
`by meansofan internal bus 210 to a main terminal stor-
`age section 203, a display input/output 204 and a key-
`
`10
`10
`
`

`

`+
`security control circuit 51 is coupled to the interface bus
`140 and performs the function of controlling access to
`the security memory 50, receiving security related in-
`formation which originated from the security memory
`50, and performing a security comparison of internal
`and external security information before allowing ac-
`cess between the interface bus 140 and the main mem-
`ory 4. In FIG. 1, the interface bus 140 is shown inter-
`connecting the security control circuit 51 and security
`memory 50, illustrating that the external terminal has
`the ability for limited access to the security memory in
`performance of the security check. Also shown con-
`necting those modules is an internal bus 152 which is
`provided only between the security memory 50 and
`security contro] circuit 51. Such bus, as will be de-
`scribed in greater detail below, provides a means for
`readoutof security information whichis not necessarily
`enciphered for coupling to the security control circuit
`in performanceof the security check. The fact that the
`bus 152 is internal only and not coupled to the main
`interface bus 140 provides a significant degree of secu-
`rity when it is appreciated that the only information
`which is available to the interface bus is in enciphered
`format, and only external terminals of approved form
`have the ability to utilize the encipher key to decipher
`the enciphered security information.
`The memoryselection circuit 5a is provided,in addi-
`tion to enabling inputs G1 and G, with a second en-
`abling input, labeled G2, and that inputis driven by the
`security controlcircuit 51. A pulldownresistor 52 main-
`tains the input G2 in the low condition at all times ex-
`ceptafter the card is inserted into the compatible exter-
`nal terminal and a security check procedure success-
`fully performed. After successful performance of such
`procedure, the security control circuit 51 provides a
`high logic signal on output line 31, such logic signal
`being coupled to enabling input G2 of the main memory
`of the memory selector circuit. Thus, with a high logic
`level signal applied to terminal G1 of the circuit (as a
`result of the card having positive voltage applied to the
`internal bus 9 as sensed by power supply changeover
`circuit 2), as a result of a low G signal applied by the
`card select input 16, and as a result of the high logic
`signal being applied to input G2 in response to success-
`ful performance of a security check, the memoryselec-
`tor circuit 5a is enabled to respond to address signals on
`address bus14 to individually enable the semiconductor
`memory devices which make up the main memory4. In
`FIG. 1, the main memory 4 is illustrated as a single
`block, but it is pointed out that such block is typically
`made up of individual memory chips 4a <4 as illus-
`trated in connection with FIG. 7, and that such chips
`are individually enabled by individual enablement sig-
`nals 19a-19n, such enabling signals being illustrated in
`FIG. 1 by the multi-conductor bus 19.
`Turning then to FIG. 2, there are illustrated further
`details of the security control circuit 51 of the system of
`FIG.1. The main memory4, associated power compo-
`nents, and memoryselection circuit 5a are enclosed in
`FIG. 1 in a box iabeled 1a, and that box is illustrated in
`FIG. 2 with the internal detail omitted. The only ele-
`ment shown within the block 1a in FIG. 2 is the G2
`input of memoryselectorcircuit 5a,i.¢., the input which
`is driven by the security control circuit in order to
`enable access between the interface bus and the main
`memory after successful performance of a security
`check.
`
`8
`The information which is primarily involved in the
`security check is stored in the security memory 50,
`illustrated at the right of FIG. 2. As noted above, the
`security memory 50 is a non-volatile memory which
`contains two forms of security information, namely,
`external identification information intended to be read
`out to the external terminal and which is maintained in
`enciphered form, and internal identification information
`which need not be enciphered and is available only
`within the portable unit 100. For purposes of economy,
`the non-volatile security memory 50 is preferably a read
`only memory, such as an EPROM or EEPROM. In the
`FIG. 2 embodiment,the security memory 50 is a single
`memory device which is memory mapped into upper
`and lower addressable sections for storing the respec-
`tive internal and external security information.
`FIG. 2 shows the security control circuit 51 as in-
`cluding a comparator element 60 which serves to com-
`pare internal and external security information, and a
`selection circuit 61 which is operable to allow an exter-
`nal terminal to control the security memory 50 and
`comparator 60 in performing a security check proce-
`dure. A numberofgates and the like, to be described in
`greater detail below, interconnect such elements, and it
`will now be appreciated that this security control cir-
`cuit is comprised of hard wired logic elements and does
`not require the power or programming of a micro-
`processor in order to provide a substantial degree of
`security protection to the main memory 50.
`The comparator 60 can be considered as divided into
`two sections, an internal
`information section 605 for
`receiving and holding internal identification informa-
`tion directly from the seeurity memory 50, and an exter-
`nal information section 606 for receiving and holding
`information which had originated from the security
`memory 50 but which had been transferred to the exter-
`nal terminal, deciphered then returned to the portable
`unit 100. When the information stored in the two halves
`of the comparator circuit matches, an intermediate
`comparator section 60c produces a high logic signal on
`the Q output and, as discussed in reasonable detail
`above, such logic signal] is coupled by means of line 31
`to the G2 enabling input of the security control circuit
`51 in order to allow access by way of the interface bus
`140 between the external terminal and the main memory
`4 of the portable unit 100.
`The manner in which those functions are performed
`will now be described in greater detail. First ofall, it is
`seen that the security memory, as is conventional, has
`address
`inputs
`for addressing individual
`locations
`within the memory, and data lines which will carry
`logic levels corresponding to the information stored in
`the addressed location in memory, The security mem-
`ory 50 also has a chip enable input CE driven low by a
`line 26 whenever information is to be read out of the
`security memory, and also an output enable input OE
`which also must be driven low in order to address and
`read out information from the security memory.
`The addresslines of the security memory 50 are con-
`nected to the address lines 14 of the interface bus 140 so
`that the external terminal has the capability of address-
`ing individual locations within the security memory 50.
`The data lines 62 of the security memory are not di-
`rectly coupled to the interface bus in order to maintain
`security of the internal
`identification information. In-
`stead, the data lines 62 of the security memory are cou-
`pled via a pair of tri-state buffers 63, 64 to two separate
`bus structures. The tri-state buffers are enabled alter-
`
`5,237,609
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`11
`11
`
`

`

`9
`nately, such that when anysetis active, the other set is
`maintained inactive. Thefirst set of tri-state buffers 63
`couples the data lines 62 of the security memory 50 to
`the internal data bus 152 such that data words addressed
`in the security memory can be read into the internal
`latch 60 of the comparatorcircuit 60 at an input data
`terminal DT.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket