Free
Message: Internet of Things used to attack internet service...

Some techniques offer data access security through the use of data related to physical characteristics of the storage media. These systems rely on precise measurement of solid state media process characteristics. Examples of these include variations in the remnant charge of EEPROM's, or variations in row/column addressing circuits. These and other characteristics have been used for authentication when the memory is presented, and the authenticating characteristics are measured. Such techniques are described in detail in Fernandez (U.S. Pat. No. 5,644,636).

The critical issue which cannot be addressed by the prior art are applications where data security is not simply shifted to attacks on the reader mechanisms and where data must not be duplicated or separated even by trusted and/or authorized users.


In accordance with the present disclosure, an aspect of the invention discloses a method for securely storing and using information whereby a semiconductor is tested for inconsistencies and detected functional imperfections are stored in a functional defect map and used in part to secure, unsecure or govern use of data.

According to an aspect of the invention, the processor determines that the another memory is not a counterfeit having counterfeit data and allows a data exchange between the information handling system and the another memory where the identity of the another memory is confirmed, and determines that the another memory is a counterfeit having counterfeit data and prevents the data exchange between the information handling system and the another memory where the identity of the another memory is denied.

According to an aspect of the invention, the processor, after the information handling system reconnects to the another memory, confirms an identity of the another memory by again detecting defects in regions of the another memory, comparing the again detected defects with the stored defect map, confirming the identify of the another memory where a result of the comparison indicates the again detected defects match defects contained in the stored defect map, and denying the identity of the another memory where the result of the comparison indicates the again detected defects do not match the defects contained in the stored defect map.
Share
New Message
Please login to post a reply