GB2290894A - Memory module security - Google Patents
Memory module security Download PDFInfo
- Publication number
- GB2290894A GB2290894A GB9515879A GB9515879A GB2290894A GB 2290894 A GB2290894 A GB 2290894A GB 9515879 A GB9515879 A GB 9515879A GB 9515879 A GB9515879 A GB 9515879A GB 2290894 A GB2290894 A GB 2290894A
- Authority
- GB
- United Kingdom
- Prior art keywords
- memory
- module
- memory module
- code
- module according
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C11/00—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C11/21—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements
- G11C11/34—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Abstract
A memory module contains a plurality of memory circuits, a non-volatile memory which stores a predetermined code, counting means to count to a predetermined value on power-up of the module, and control means to disable the module if the predetermined code is not received by the module before the predetermined count is reached.
Description
Module Security Device
The present invention relates to the field of memory modules. The invention is particularly relevant to Single In-line Memory Modules (SIMMs) which are used in many common personal computers to extend the memory of the computer.
There has been a remarkable increase in the number of incidents of theft of Single In-line
Memory Modules (SIMMs) from computers. SIMMs are an attractive commodity to steal for several reasons: - they are small and light, which means that there is no difficulty in transporting them: - they are easy to remove from a computer system; - they are interchangeable and largely transparent to the user, so there is no great
compatibility problem; - they are valuable, SIMMs may sell for 50 each; - there is a large demand for SIMMs on a world-wide scale; - they are hidden from view in operation so stolen SIMMs are very difficult to trace; - modern software requires a large amount of memory to run so they are becoming more
desirable; - SIMMs are very difficult to secure (physically) from theft;; - many modern offices have a large number of computers, each containing some SIMMs
which means that there are areas with a large concentration of SIMMs.
Due to the small size and the immediate interchangeability of these devices they are not easy to protect from theft. The SIMMs could be removed from each computer every night and stored in a safe but this is not feasible in a large office because of the trouble involved in removing and reinserting these devices each day.
Conventional SIMMs contain a number of memory circuits, frequently DRAM (Dynamic
Random Access Memory) circuits, on a small printed circuit board (pcb). On power-up of a computer. the processor within that computer tests whether any SIMMs are present in the appropriate connector slot of the computer. SIMMs do not usually contain any memory management logic or controllers as these would be superfluous. Thus apart from putting some physical (visible or invisible) mark or tag on each SIMM there would seem to be no way of identifying it. The use of a mark or a tag for security purposes has a number of disadvantages. It would not stop the use of stolen SIMMs since the mark or tag must be seen to enable identification and detection of the SIMM as stolen. It would not inform the unwary user of the SIMM that the SIMM was in fact stolen.It would be better if there was some method by which any computer could detect that the particular SIMM connected was in fact stolen and then disable operation of the SIMM.
It is an object of the present invention to provide a method of deterring the theft of memory modules.
It is another object of the present invention to provide a theft deterring method which does not substantially increase the cost of a memory module.
It is another object of the present invention to provide a security method for memory modules which does not slow down the operation of the memory module.
It is yet another object of the present invention to provide a memory module with built-in security but which is as fully interchangeable with the same module without the built-in security.
It is a further object of the present invention to provide a method whereby stolen memory modules are rendered unusable if an attempt is made to reuse them.
Thus the present invention provides a memory module containing a plurality of memory circuits, a non-volatile memory which stores a code, control means to intercept access to the module on power-up of the computer, such that the correct code needs to be entered to enable the initialisation of the memory module.
The present invention is most suited to memory modules which utilise partial memory circuits because they already have a controller on the module to redirect accesses to faulty locations. If this controller was by-passed then the module would not work. If the invention was used on a standard memory module then the additional controlling means could be by-passed because the additional controlling means are not needed for normal operation of the module. Thus the security measure could easily be avoided on normal memory modules.
The present invention provides a memory module containing a plurality of memory circuits, a non-volatile memory which stores a predetermined code, counting means to count up (down) to (from) a predetermined value on power-up of the module, and control means to disable the module if the predetermined code is not received by the module before the predetermined count is reached.
For a better understanding of the present invention and to show how it may be carried into effect reference will now be made, by way of example. to the accompanying drawings in which:
Figure 1 shows both sides of a memory module (in this example a SIMM). Figure 1A shows the front side of the module populated with DRAM circuits. Figure 1B shows the rear of the module which contains a control circuit and a non-volatile memory;
It is not necessary to have the control circuit and non-volatile memory on the opposite side of a
SIMM to the memory circuits, the control circuit and non-volatile memory could be on the same side of the module as the memory circuits or the system could be arranged in any other convenient way.
Using a code to disable operation of a SIMM is not trivial. This is because there is a problem in interrupting the host computer which stores the SIMM during its initialisation cycle. The host computer must be allowed to perform the initialisation function on power-up. However, once the memory is initialised it would not be easy to disable it. The present invention overcomes this problem by using a counter which increments (or decrements) on power-up of the module. If the module has not received a certain code or sequence of codes before the counter reaches its predetermined value then the control mechanism on the module disables the module, for example by disabling the data buffer, thus causing an error in the computer.
The counter used may count clock cycles, the number of refresh cycles, the number of read or write cycles or some other operation, for example the number of times that the Column
Address Strobe (CAS) goes active (or inactive).
The code or sequence of codes is stored in the non-volatile memory on the module. At the user end of the computer the code or sequence of codes will be entered by the BIOS (Basic
Input/Output System) or from software, for example from the initialisation files of the computer. The code or sequence of codes may even have to be entered manually by the user.
The code or sequence of codes would be entered in a similar way to a password. The code may even be linked to the keystroke speed, e.g. the "time warped" interval between characters of the user's password.
In some embodiments the non-volatile memory and the control mechanism will be in the same device (an Application Specific Integrated Circuit).
The output of the memory circuits could be disabled by disabling the output enable of these memory circuits or of the memory device.
The advantage of the present invention is that the control mechanism waits for the memory module to be initialised before it requires a security code to enable or disable the module.
The code would preferably be entered manually each time the computer was booted-up, although it could be entered using one of the initialisation files (e.g. the autoexec.bat file in a personal computer), but this has the disadvantage that the files can be duplicated and examined to retrieve the code.
An alternative, to avoid this problem is to add the code to a FLASH boot EPROM or encode the file using a password. For example, on installation of the Memory Module a set-up or installation program prompts the user for a password, which the installation software encodes along with the key needed to enable the memory security device. A program is then added to the config.sys, autoexec.bat or other initialising batch program to prompt the user for the password, which is then used to decrypt the key file and write this to the controller on the memory module. Failure to provide the correct password would result in the counter timing out and the memory of the computer becoming inoperable.
It will be appreciated that various modifications may be made to the above described embodiment within the scope of the present invention.
Claims (7)
1. A memory module containing a plurality of memory circuits, a non-volatile memory which
stores a predetermined code, counting means to count to a predetermined value on power
up of the module, and control means to disable the module if the predetermined code is not
received by the module before the predetermined count is reached.
2. A memory module according to claim 1, where the counter means counts the number of
read or write cycles.
3. A memory module according to claim 1, where the counter means counts the number of
clock cycles.
4. A memory module according to any preceding claim, where the predetermined code is a
sequence of codes.
5. A memory module according to any preceding claim, where the predetermined code is
entered manually.
6. A memory module according to any preceding claim, where the control means disable the
module by setting the output disable inactive.
7. A memory module according to any preceding claim, where the memory module is a Single
In-line Memory Module.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9515879A GB2290894A (en) | 1995-08-02 | 1995-08-02 | Memory module security |
TW084114019A TW293106B (en) | 1995-08-02 | 1995-12-28 | Module security device |
JP9507381A JPH11510280A (en) | 1995-08-02 | 1996-07-31 | Module safety protection device |
PCT/GB1996/001874 WO1997005618A1 (en) | 1995-08-02 | 1996-07-31 | Module security device |
EP96925917A EP0842512A1 (en) | 1995-08-02 | 1996-07-31 | Module security device |
KR1019980700730A KR19990036065A (en) | 1995-08-02 | 1996-07-31 | Module security devices |
CN96195969A CN1192286A (en) | 1995-08-02 | 1996-07-31 | Module security device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9515879A GB2290894A (en) | 1995-08-02 | 1995-08-02 | Memory module security |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9515879D0 GB9515879D0 (en) | 1995-10-04 |
GB2290894A true GB2290894A (en) | 1996-01-10 |
Family
ID=10778671
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9515879A Withdrawn GB2290894A (en) | 1995-08-02 | 1995-08-02 | Memory module security |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP0842512A1 (en) |
JP (1) | JPH11510280A (en) |
KR (1) | KR19990036065A (en) |
CN (1) | CN1192286A (en) |
GB (1) | GB2290894A (en) |
TW (1) | TW293106B (en) |
WO (1) | WO1997005618A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5996096A (en) * | 1996-11-15 | 1999-11-30 | International Business Machines Corporation | Dynamic redundancy for random access memory assemblies |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6321335B1 (en) | 1998-10-30 | 2001-11-20 | Acqis Technology, Inc. | Password protected modular computer method and device |
US6643777B1 (en) | 1999-05-14 | 2003-11-04 | Acquis Technology, Inc. | Data security method and device for computer modules |
US6718415B1 (en) | 1999-05-14 | 2004-04-06 | Acqis Technology, Inc. | Computer system and method including console housing multiple computer modules having independent processing units, mass storage devices, and graphics controllers |
US7990724B2 (en) | 2006-12-19 | 2011-08-02 | Juhasz Paul R | Mobile motherboard |
TWI440424B (en) | 2008-10-17 | 2014-06-01 | Sunonwealth Electr Mach Ind Co | Thin dissipating fan |
EP2295815A1 (en) | 2009-08-13 | 2011-03-16 | Sunonwealth Electric Machine Industry Co., Ltd. | Miniature fan |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5056140A (en) * | 1990-02-22 | 1991-10-08 | Blanton Kimbell | Communication security accessing system and process |
JPH04173444A (en) * | 1990-11-06 | 1992-06-22 | Fujitsu Ten Ltd | Security device for on-vehicle tuner |
JPH05204766A (en) * | 1992-01-24 | 1993-08-13 | Fujitsu Ltd | Identity verification device |
-
1995
- 1995-08-02 GB GB9515879A patent/GB2290894A/en not_active Withdrawn
- 1995-12-28 TW TW084114019A patent/TW293106B/en active
-
1996
- 1996-07-31 CN CN96195969A patent/CN1192286A/en active Pending
- 1996-07-31 EP EP96925917A patent/EP0842512A1/en not_active Withdrawn
- 1996-07-31 WO PCT/GB1996/001874 patent/WO1997005618A1/en not_active Application Discontinuation
- 1996-07-31 JP JP9507381A patent/JPH11510280A/en active Pending
- 1996-07-31 KR KR1019980700730A patent/KR19990036065A/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5996096A (en) * | 1996-11-15 | 1999-11-30 | International Business Machines Corporation | Dynamic redundancy for random access memory assemblies |
Also Published As
Publication number | Publication date |
---|---|
EP0842512A1 (en) | 1998-05-20 |
JPH11510280A (en) | 1999-09-07 |
CN1192286A (en) | 1998-09-02 |
TW293106B (en) | 1996-12-11 |
KR19990036065A (en) | 1999-05-25 |
WO1997005618A1 (en) | 1997-02-13 |
GB9515879D0 (en) | 1995-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6453417B1 (en) | Microcontroller with secure signature extraction | |
US5396609A (en) | Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regions | |
US7028215B2 (en) | Hot mirroring in a computer system with redundant memory subsystems | |
JP3529800B2 (en) | Data protection microprocessor circuit for portable data carrier | |
US5305460A (en) | Data processor | |
US5121345A (en) | System and method for protecting integrity of computer data and software | |
US5809555A (en) | Method of determining sizes of 1:1 and 2:1 memory interleaving in a computer system, configuring to the maximum size, and informing the user if memory is incorrectly installed | |
EP3037975B1 (en) | Mechanism for detecting a no-processor swap condition and modification of high speed bus calibration during boot | |
GB9012948D0 (en) | An apparatus and method for preventing unauthorized access to bios in a personal computer system | |
JP3634393B2 (en) | Apparatus for determining the configuration of a computer memory | |
US6775734B2 (en) | Memory access using system management interrupt and associated computer system | |
US5764996A (en) | Method and apparatus for optimizing PCI interrupt binding and associated latency in extended/bridged PCI busses | |
GB2290894A (en) | Memory module security | |
JPS6237419B2 (en) | ||
US6526464B1 (en) | Mechanism to expand address space of a serial bus | |
KR960011717A (en) | A data processing apparatus having a write protection function of a specific storage area and a method thereof | |
KR102646630B1 (en) | Method to issue write protect commands on dynamic random-access memory(dram) cells in a system run-time environment | |
US20030142557A1 (en) | Apparatus and method for encoding auto-precharge | |
US5057999A (en) | Microprocessor having a protection circuit to insure proper instruction fetching | |
KR950005214B1 (en) | Personal computer systems | |
JPS5715298A (en) | Storage protection system for common memory | |
JPH04336347A (en) | Memory device | |
GB2308475A (en) | Delaying reading of memory comprising chips having dissimilar access times to ensure validity of data read | |
JPH0348954A (en) | Key memory control method | |
KR900010178Y1 (en) | RAM output protection circuit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |