[go: up one dir, main page]

GB2290894A - Memory module security - Google Patents

Memory module security Download PDF

Info

Publication number
GB2290894A
GB2290894A GB9515879A GB9515879A GB2290894A GB 2290894 A GB2290894 A GB 2290894A GB 9515879 A GB9515879 A GB 9515879A GB 9515879 A GB9515879 A GB 9515879A GB 2290894 A GB2290894 A GB 2290894A
Authority
GB
United Kingdom
Prior art keywords
memory
module
memory module
code
module according
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9515879A
Other versions
GB9515879D0 (en
Inventor
Cameron Mccoll
Alexander Roger Deas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Memory Corp PLC
Original Assignee
Memory Corp PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Memory Corp PLC filed Critical Memory Corp PLC
Priority to GB9515879A priority Critical patent/GB2290894A/en
Publication of GB9515879D0 publication Critical patent/GB9515879D0/en
Priority to TW084114019A priority patent/TW293106B/en
Publication of GB2290894A publication Critical patent/GB2290894A/en
Priority to JP9507381A priority patent/JPH11510280A/en
Priority to PCT/GB1996/001874 priority patent/WO1997005618A1/en
Priority to EP96925917A priority patent/EP0842512A1/en
Priority to KR1019980700730A priority patent/KR19990036065A/en
Priority to CN96195969A priority patent/CN1192286A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C11/00Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
    • G11C11/21Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements
    • G11C11/34Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using electric elements using semiconductor devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)

Abstract

A memory module contains a plurality of memory circuits, a non-volatile memory which stores a predetermined code, counting means to count to a predetermined value on power-up of the module, and control means to disable the module if the predetermined code is not received by the module before the predetermined count is reached.

Description

Module Security Device The present invention relates to the field of memory modules. The invention is particularly relevant to Single In-line Memory Modules (SIMMs) which are used in many common personal computers to extend the memory of the computer.
There has been a remarkable increase in the number of incidents of theft of Single In-line Memory Modules (SIMMs) from computers. SIMMs are an attractive commodity to steal for several reasons: - they are small and light, which means that there is no difficulty in transporting them: - they are easy to remove from a computer system; - they are interchangeable and largely transparent to the user, so there is no great compatibility problem; - they are valuable, SIMMs may sell for 50 each; - there is a large demand for SIMMs on a world-wide scale; - they are hidden from view in operation so stolen SIMMs are very difficult to trace; - modern software requires a large amount of memory to run so they are becoming more desirable; - SIMMs are very difficult to secure (physically) from theft;; - many modern offices have a large number of computers, each containing some SIMMs which means that there are areas with a large concentration of SIMMs.
Due to the small size and the immediate interchangeability of these devices they are not easy to protect from theft. The SIMMs could be removed from each computer every night and stored in a safe but this is not feasible in a large office because of the trouble involved in removing and reinserting these devices each day.
Conventional SIMMs contain a number of memory circuits, frequently DRAM (Dynamic Random Access Memory) circuits, on a small printed circuit board (pcb). On power-up of a computer. the processor within that computer tests whether any SIMMs are present in the appropriate connector slot of the computer. SIMMs do not usually contain any memory management logic or controllers as these would be superfluous. Thus apart from putting some physical (visible or invisible) mark or tag on each SIMM there would seem to be no way of identifying it. The use of a mark or a tag for security purposes has a number of disadvantages. It would not stop the use of stolen SIMMs since the mark or tag must be seen to enable identification and detection of the SIMM as stolen. It would not inform the unwary user of the SIMM that the SIMM was in fact stolen.It would be better if there was some method by which any computer could detect that the particular SIMM connected was in fact stolen and then disable operation of the SIMM.
It is an object of the present invention to provide a method of deterring the theft of memory modules.
It is another object of the present invention to provide a theft deterring method which does not substantially increase the cost of a memory module.
It is another object of the present invention to provide a security method for memory modules which does not slow down the operation of the memory module.
It is yet another object of the present invention to provide a memory module with built-in security but which is as fully interchangeable with the same module without the built-in security.
It is a further object of the present invention to provide a method whereby stolen memory modules are rendered unusable if an attempt is made to reuse them.
Thus the present invention provides a memory module containing a plurality of memory circuits, a non-volatile memory which stores a code, control means to intercept access to the module on power-up of the computer, such that the correct code needs to be entered to enable the initialisation of the memory module.
The present invention is most suited to memory modules which utilise partial memory circuits because they already have a controller on the module to redirect accesses to faulty locations. If this controller was by-passed then the module would not work. If the invention was used on a standard memory module then the additional controlling means could be by-passed because the additional controlling means are not needed for normal operation of the module. Thus the security measure could easily be avoided on normal memory modules.
The present invention provides a memory module containing a plurality of memory circuits, a non-volatile memory which stores a predetermined code, counting means to count up (down) to (from) a predetermined value on power-up of the module, and control means to disable the module if the predetermined code is not received by the module before the predetermined count is reached.
For a better understanding of the present invention and to show how it may be carried into effect reference will now be made, by way of example. to the accompanying drawings in which: Figure 1 shows both sides of a memory module (in this example a SIMM). Figure 1A shows the front side of the module populated with DRAM circuits. Figure 1B shows the rear of the module which contains a control circuit and a non-volatile memory; It is not necessary to have the control circuit and non-volatile memory on the opposite side of a SIMM to the memory circuits, the control circuit and non-volatile memory could be on the same side of the module as the memory circuits or the system could be arranged in any other convenient way.
Using a code to disable operation of a SIMM is not trivial. This is because there is a problem in interrupting the host computer which stores the SIMM during its initialisation cycle. The host computer must be allowed to perform the initialisation function on power-up. However, once the memory is initialised it would not be easy to disable it. The present invention overcomes this problem by using a counter which increments (or decrements) on power-up of the module. If the module has not received a certain code or sequence of codes before the counter reaches its predetermined value then the control mechanism on the module disables the module, for example by disabling the data buffer, thus causing an error in the computer.
The counter used may count clock cycles, the number of refresh cycles, the number of read or write cycles or some other operation, for example the number of times that the Column Address Strobe (CAS) goes active (or inactive).
The code or sequence of codes is stored in the non-volatile memory on the module. At the user end of the computer the code or sequence of codes will be entered by the BIOS (Basic Input/Output System) or from software, for example from the initialisation files of the computer. The code or sequence of codes may even have to be entered manually by the user.
The code or sequence of codes would be entered in a similar way to a password. The code may even be linked to the keystroke speed, e.g. the "time warped" interval between characters of the user's password.
In some embodiments the non-volatile memory and the control mechanism will be in the same device (an Application Specific Integrated Circuit).
The output of the memory circuits could be disabled by disabling the output enable of these memory circuits or of the memory device.
The advantage of the present invention is that the control mechanism waits for the memory module to be initialised before it requires a security code to enable or disable the module.
The code would preferably be entered manually each time the computer was booted-up, although it could be entered using one of the initialisation files (e.g. the autoexec.bat file in a personal computer), but this has the disadvantage that the files can be duplicated and examined to retrieve the code.
An alternative, to avoid this problem is to add the code to a FLASH boot EPROM or encode the file using a password. For example, on installation of the Memory Module a set-up or installation program prompts the user for a password, which the installation software encodes along with the key needed to enable the memory security device. A program is then added to the config.sys, autoexec.bat or other initialising batch program to prompt the user for the password, which is then used to decrypt the key file and write this to the controller on the memory module. Failure to provide the correct password would result in the counter timing out and the memory of the computer becoming inoperable.
It will be appreciated that various modifications may be made to the above described embodiment within the scope of the present invention.

Claims (7)

Claims
1. A memory module containing a plurality of memory circuits, a non-volatile memory which stores a predetermined code, counting means to count to a predetermined value on power up of the module, and control means to disable the module if the predetermined code is not received by the module before the predetermined count is reached.
2. A memory module according to claim 1, where the counter means counts the number of read or write cycles.
3. A memory module according to claim 1, where the counter means counts the number of clock cycles.
4. A memory module according to any preceding claim, where the predetermined code is a sequence of codes.
5. A memory module according to any preceding claim, where the predetermined code is entered manually.
6. A memory module according to any preceding claim, where the control means disable the module by setting the output disable inactive.
7. A memory module according to any preceding claim, where the memory module is a Single In-line Memory Module.
GB9515879A 1995-08-02 1995-08-02 Memory module security Withdrawn GB2290894A (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
GB9515879A GB2290894A (en) 1995-08-02 1995-08-02 Memory module security
TW084114019A TW293106B (en) 1995-08-02 1995-12-28 Module security device
JP9507381A JPH11510280A (en) 1995-08-02 1996-07-31 Module safety protection device
PCT/GB1996/001874 WO1997005618A1 (en) 1995-08-02 1996-07-31 Module security device
EP96925917A EP0842512A1 (en) 1995-08-02 1996-07-31 Module security device
KR1019980700730A KR19990036065A (en) 1995-08-02 1996-07-31 Module security devices
CN96195969A CN1192286A (en) 1995-08-02 1996-07-31 Module security device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9515879A GB2290894A (en) 1995-08-02 1995-08-02 Memory module security

Publications (2)

Publication Number Publication Date
GB9515879D0 GB9515879D0 (en) 1995-10-04
GB2290894A true GB2290894A (en) 1996-01-10

Family

ID=10778671

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9515879A Withdrawn GB2290894A (en) 1995-08-02 1995-08-02 Memory module security

Country Status (7)

Country Link
EP (1) EP0842512A1 (en)
JP (1) JPH11510280A (en)
KR (1) KR19990036065A (en)
CN (1) CN1192286A (en)
GB (1) GB2290894A (en)
TW (1) TW293106B (en)
WO (1) WO1997005618A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5996096A (en) * 1996-11-15 1999-11-30 International Business Machines Corporation Dynamic redundancy for random access memory assemblies

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321335B1 (en) 1998-10-30 2001-11-20 Acqis Technology, Inc. Password protected modular computer method and device
US6643777B1 (en) 1999-05-14 2003-11-04 Acquis Technology, Inc. Data security method and device for computer modules
US6718415B1 (en) 1999-05-14 2004-04-06 Acqis Technology, Inc. Computer system and method including console housing multiple computer modules having independent processing units, mass storage devices, and graphics controllers
US7990724B2 (en) 2006-12-19 2011-08-02 Juhasz Paul R Mobile motherboard
TWI440424B (en) 2008-10-17 2014-06-01 Sunonwealth Electr Mach Ind Co Thin dissipating fan
EP2295815A1 (en) 2009-08-13 2011-03-16 Sunonwealth Electric Machine Industry Co., Ltd. Miniature fan

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5056140A (en) * 1990-02-22 1991-10-08 Blanton Kimbell Communication security accessing system and process
JPH04173444A (en) * 1990-11-06 1992-06-22 Fujitsu Ten Ltd Security device for on-vehicle tuner
JPH05204766A (en) * 1992-01-24 1993-08-13 Fujitsu Ltd Identity verification device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5996096A (en) * 1996-11-15 1999-11-30 International Business Machines Corporation Dynamic redundancy for random access memory assemblies

Also Published As

Publication number Publication date
EP0842512A1 (en) 1998-05-20
JPH11510280A (en) 1999-09-07
CN1192286A (en) 1998-09-02
TW293106B (en) 1996-12-11
KR19990036065A (en) 1999-05-25
WO1997005618A1 (en) 1997-02-13
GB9515879D0 (en) 1995-10-04

Similar Documents

Publication Publication Date Title
US6453417B1 (en) Microcontroller with secure signature extraction
US5396609A (en) Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regions
US7028215B2 (en) Hot mirroring in a computer system with redundant memory subsystems
JP3529800B2 (en) Data protection microprocessor circuit for portable data carrier
US5305460A (en) Data processor
US5121345A (en) System and method for protecting integrity of computer data and software
US5809555A (en) Method of determining sizes of 1:1 and 2:1 memory interleaving in a computer system, configuring to the maximum size, and informing the user if memory is incorrectly installed
EP3037975B1 (en) Mechanism for detecting a no-processor swap condition and modification of high speed bus calibration during boot
GB9012948D0 (en) An apparatus and method for preventing unauthorized access to bios in a personal computer system
JP3634393B2 (en) Apparatus for determining the configuration of a computer memory
US6775734B2 (en) Memory access using system management interrupt and associated computer system
US5764996A (en) Method and apparatus for optimizing PCI interrupt binding and associated latency in extended/bridged PCI busses
GB2290894A (en) Memory module security
JPS6237419B2 (en)
US6526464B1 (en) Mechanism to expand address space of a serial bus
KR960011717A (en) A data processing apparatus having a write protection function of a specific storage area and a method thereof
KR102646630B1 (en) Method to issue write protect commands on dynamic random-access memory(dram) cells in a system run-time environment
US20030142557A1 (en) Apparatus and method for encoding auto-precharge
US5057999A (en) Microprocessor having a protection circuit to insure proper instruction fetching
KR950005214B1 (en) Personal computer systems
JPS5715298A (en) Storage protection system for common memory
JPH04336347A (en) Memory device
GB2308475A (en) Delaying reading of memory comprising chips having dissimilar access times to ensure validity of data read
JPH0348954A (en) Key memory control method
KR900010178Y1 (en) RAM output protection circuit

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)