This invention relates in general to memory systems, and in particular to a memory system with in stream data encryption/decryption and error correction.
The mobile device market is developing in the direction of including content storage so as to increase the average revenue by generating more data exchanges. This means that the content has to be protected when stored on a mobile device.
Portable storage devices are in commercial use for many years. They carry data from one computing device to another or to store back-up data. More sophisticated portable storage devices, such as portable hard disc drives, portable flash memory disks and flash memory cards, include a microprocessor for controlling the storage management.
In order to protect the contents stored in the portable storage devices, the data stored is typically encrypted and only authorized users are allowed to decrypt the data.
Since there may be bit errors in the data stored in portable storage devices, it is desirable to employ error correction. Current schemes for error correction may not be compatible with portable storage devices with cryptographic capabilities. It is therefore desirable to provide an improved local storage device where such difficulties are alleviated.
The data stored in the memory cells may contain errors for a number of reasons. It is therefore common to perform error correction when data from the memory cells are read. Error correction may also detect the positions of the errors in the data stream. The cryptographic processes performed by a circuit may shift the positions of the bits in the data stream so that if the bit errors in the data stream have not been corrected when such processes are performed, information on the positions of the bit errors will no longer be accurate after the processes so that error correction may no longer be possible after the cryptographic processes have been performed. Thus one aspect of the invention is based on the recognition that the bit errors in the data in the data stream passing between the cells and the cryptographic circuit are preferably corrected prior to any cryptographic process performed by the circuit. Preferably, at least one buffer is used to store data in the data stream passing between the cells and the circuit and any error or errors in the data stored in the buffer and originating from the cells are corrected prior to cryptographic processing of the data by the circuit.
For convenience in description, identical components are labeled by the same numbers in this application.
An example memory system in which the various aspects of the present invention may be implemented is illustrated by the block diagram of
The buffer management unit 14 includes a host direct memory access (HDMA) 32, a flash direct memory access (FDMA) controller 34, an arbiter 36, a buffer random access memory (BRAM) 38 and a crypto-engine 40. The arbiter 36 is a shared bus arbiter so that only one master or initiator (which can be HDMA 32, FDMA 34 or CPU 12) can be active at any time and the slave or target is BRAM 38. The arbiter is responsible for channeling the appropriate initiator request to the BRAM 38. The HDMA 32 and FDMA 34 are responsible for data transported between the HIM 16, FIM 18 and BRAM 38 or the CPU random access memory (CPU RAM) 12a. The operation of the HDMA 32 and of the FDMA 34 is conventional and need not be described in detail herein. The BRAM 38 is used to buffer data passed between the host device 24, flash memory 20 and the CPU RAM 12a. The HDMA 32 and FDMA 34 are responsible for transferring the data between HIM 16/FIM 18 and BRAM 38 or the CPU RAM 12a and for indicating sector transfer completion. As will be described below, the FIM 18 also has the capability of detecting errors in the data read from the flash memory 20 and notifying the CPU 12 when errors are discovered.
First when data from flash memory 20 is read by the host device 24, encrypted data in memory 20 is fetched through bus 28, FIM 18, FDMA 34, crypto engine 40 where the encrypted data is decrypted and stored in BRAM 38. The decrypted data is then sent from BRAM 38, through HDMA 32, HIM 16, bus 26 to the host device 24. The data fetched from BRAM 38 may again be encrypted by means of crypto engine 40 before it is passed to HDMA 32 so that the data sent to the host device 24 is again encrypted but by means of a different key and/or algorithm compared to those whereby the data stored in memory 20 is decrypted. Preferably, and in an alternative embodiment, rather than storing decrypted data in BRAM 38 in the above-described process, which data may become vulnerable to unauthorized access, the data from memory 20 may be decrypted and encrypted again by crypto engine 40 before it is sent to BRAM 38. The encrypted data in BRAM 38 is then sent to host device 24 as before. This illustrates the data stream during a reading process.
When data is written by host device 24 to memory 20, the direction of the data stream is reversed. For example if unencrypted data is sent by host device, through bus 26, HIM 16, HDMA 32 to the crypto engine 40, such data may be encrypted by engine 40 before it is stored in BRAM 38. Alternatively, unencrypted data may be stored in BRAM 38. The data is then encrypted before it is sent to FDMA 34 on its way to memory 20. Where the data written undergoes multistage cryptographic processing, preferably engine 40 completes such processing before the processed data is stored in BRAM 38.
While the memory system 10 in
Error Correction
Data stored in a non-volatile (e.g. flash) memory may become corrupted and contain errors. For this reason, FIM 18 may contain an error correction (ECC) circuit 102 that detects which bit or bits of the data stream from memory 20 contain errors, including the locations of the errors in the bit stream. This is illustrated in
An error buffer unit (EBU) 104 is used to store data from the data stream passing between the BMU 14 and FIM 18, so that when the CPU 12 receives an interrupt from FIM 18 indicating the presence of error(s) in the data stream, the CPU corrects the error(s) in EBU 104, instead of at the BRAM 38. To correct digital data, the bits in error are simply “flipped” (i.e. turning “1” to “0” and “0” to “1”) at the locations of error(s) detected by circuit 102.
In order to reduce the amount of interruption in the data stream when errors are detected, two or more buffers may be employed in the EBU 104, such as shown in
If correcting the data takes longer then filling a buffer, the data stream will be interrupted only when errors are detected and the data stream will flow without interruption when no errors are detected. A buffer-empty signal (not shown) connecting between the EBU 104 and the FDMA 34 signals the latter that the data stream is interrupted and no more data is available. The FDMA 34 as well as the crypto engine 40 will then pause and wait for the data stream to resume.
When data is written by the host device 24 to memory 20, there may be no need for error correction, so that it would be desirable to bypass the EBU. This may be accomplished by switch 108. When switch 108 is closed, the data from HIM 16 (not completely shown in
The error correction process is illustrated by the flow chart of
While the invention has been described above by reference to various embodiments, it will be understood that changes and modifications may be made without departing from the scope of the invention, which is to be defined only by the appended claims and their equivalent. All references referred to herein are incorporated by reference.
This application claims the benefit of U.S. Provisional Application No. 60/638,485, filed Dec. 21, 2004, entitled, “Memory System with In Stream Data Encryption/Decryption and Error Correction.” This application is further related to U.S. patent application Ser. No. 11/313,447, entitled, “In Stream Data Encryption/Decryption and Error Correction Method,” filed on the same day as the present application. These applications are incorporated in their entirety by reference as if fully set forth herein.
Number | Name | Date | Kind |
---|---|---|---|
4375664 | Kim | Mar 1983 | A |
4506362 | Morley | Mar 1985 | A |
4506365 | Collins | Mar 1985 | A |
5438575 | Bertrand | Aug 1995 | A |
6158004 | Mason et al. | Dec 2000 | A |
6513719 | Imura | Feb 2003 | B1 |
6754765 | Chang et al. | Jun 2004 | B1 |
6829676 | Maeda et al. | Dec 2004 | B2 |
6832731 | Kaneko | Dec 2004 | B2 |
6928599 | Edlis et al. | Aug 2005 | B2 |
7036020 | Thibadeau | Apr 2006 | B2 |
7062616 | Sadhasivan et al. | Jun 2006 | B2 |
7180843 | Furuta et al. | Feb 2007 | B2 |
7215771 | Hamlin | May 2007 | B1 |
7426747 | Thibadeau | Sep 2008 | B2 |
7493656 | Goodwill et al. | Feb 2009 | B2 |
20010016875 | Schwartz et al. | Aug 2001 | A1 |
20010018741 | Hogan | Aug 2001 | A1 |
20020169960 | Iguchi et al. | Nov 2002 | A1 |
20020174337 | Aihara | Nov 2002 | A1 |
20020188812 | Sadhasivan et al. | Dec 2002 | A1 |
20030016875 | Kobayashi et al. | Jan 2003 | A1 |
20030018664 | Wee et al. | Jan 2003 | A1 |
20030085289 | Kaneko | May 2003 | A1 |
20030097344 | Chaum et al. | May 2003 | A1 |
20030097655 | Novak | May 2003 | A1 |
20030196028 | Maeda et al. | Oct 2003 | A1 |
20030233545 | Eldar et al. | Dec 2003 | A1 |
20040105549 | Suzuki et al. | Jun 2004 | A1 |
20040139380 | Sako | Jul 2004 | A1 |
20040153918 | Tanaka et al. | Aug 2004 | A1 |
20040172538 | Satoh et al. | Sep 2004 | A1 |
20040223618 | Dellow | Nov 2004 | A1 |
20040250092 | Hori et al. | Dec 2004 | A1 |
20050060602 | Battaia | Mar 2005 | A1 |
20050063265 | Akiyama | Mar 2005 | A1 |
20050273618 | Takemura et al. | Dec 2005 | A1 |
20060031722 | Kolvick et al. | Feb 2006 | A1 |
20060036897 | Lin et al. | Feb 2006 | A1 |
20060107047 | Bar-El | May 2006 | A1 |
20060232826 | Bar-El | Oct 2006 | A1 |
20060262928 | Bar-El et al. | Nov 2006 | A1 |
20060294236 | Bar-El | Dec 2006 | A1 |
20060294513 | Bar-El et al. | Dec 2006 | A1 |
Number | Date | Country |
---|---|---|
1074906 | Feb 2001 | EP |
1989-002136 | Jan 1989 | JP |
1999-003284 | Jan 1999 | JP |
2001-051903 | Feb 2001 | JP |
2001-508893 | Jul 2001 | JP |
2002-229861 | Aug 2002 | JP |
2002-329180 | Nov 2002 | JP |
2004-110253 | Apr 2004 | JP |
WO 9826535 | Jun 1998 | WO |
Entry |
---|
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration, in corresponding PCT/US2005/046688, dated Sep. 19, 2006, 14 pages. |
Office Action for U.S. Appl. No. 11/313,447, 13 pages, Apr. 14, 2009. |
Invitation to Pay Additional Fees and a Partial International Search Report for PCT/US2005/046586, dated Jul. 11, 2006, 8 pages. |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for PCT/US2005/046586, dated Oct. 12, 2006, 5 pages. |
Office Action for U.S. Appl. No. 11/314,030, dated Mar. 30, 2010, 14 pages. |
Office Action for U.S. Appl. No. 11/314,032, dated Mar. 30, 2010, 15 pages. |
Office Action for U.S. Appl. No. 11/314,030, dated Dec. 9, 2010, 20 pages. |
Search Report for European Patent Application Serial No. 10177325.7, dated Dec. 27, 2010, 4 pages. |
Office Action for Japanese Patent Application Serial No. JP 2007-548469, dated Mar. 21, 2012, 9 pages. |
Office Action for Korean Patent Application Serial No. KR 10-2007-7016699, dated Jun. 20, 2012, 6 pages. |
Office Action for Korean Patent Application Serial No. KR 10-2007-7016700, dated Jun. 19, 2010, 5 pages. |
Office Action for Taiwanese Patent Application Serial No. 094145713, dated Mar. 26, 2012, 20 pages. |
Search Report for European Patent Application Serial No. EP10182649, dated Apr. 1, 2011, 5 pages. |
Office Action for Japanese Patent Application Serial No. 2007-548469, dated May 17, 2011, 22 pages. |
Office Action for Japanese Patent Application Serial No. 2007-548490, dated Jun. 14, 2011, 7 pages. |
Office Action for Japanese Patent Application Serial No. 2007-548490, dated Feb. 7, 2012, 5 pages. |
Office Action for Chinese Patent Application Serial No. 200580048239.5, dated Sep. 27, 2012, 5 pages. |
Office Action for Japanese Patent Application Serial No. 2007-548490, dated Sep. 4, 2012, 2 pages. |
Office Action for Taiwanese Patent Application Serial No. 094145661, dated Sep. 12, 2012, 15 pages. |
Number | Date | Country | |
---|---|---|---|
20060239449 A1 | Oct 2006 | US |
Number | Date | Country | |
---|---|---|---|
60638485 | Dec 2004 | US |