Claims
- 1. An apparatus, comprising:
a connector operable to communicate with a rewritable storage medium, the rewritable storage medium including digital content and a flag indicative of whether the digital content is encrypted; a processing core operable to execute at least some of the digital content of the rewritable storage medium; a storage device operable to contain a substantially unique identification (ID) number; and an encryption unit operable to (i) determine whether the digital content of the rewritable storage medium is encrypted based on the flag, and (ii) encrypt and overwrite the digital content of the rewritable storage medium using the ID number as an encryption key when the flag indicates that the digital content is not encrypted.
- 2. The apparatus of claim 1, wherein the encryption unit is further operable to set the flag of the rewritable storage medium to indicate that the digital content is encrypted.
- 3. The apparatus of claim 1, wherein the processing core comprises the encryption unit by executing encryption program instructions obtained from an internal read only memory of the apparatus or from the rewritable storage medium.
- 4. The apparatus of claim 1, wherein the encryption unit is operable to encrypt the digital content of the rewritable storage medium using at least one of an exclusive OR of the digital content and the ID number, transposition, substitution, polyalphabetic substitution, conventional key encryption, public key encryption, cipher system encryption, and code encryption.
- 5. The apparatus of claim 1, further comprising a decryption unit operable to decrypt the digital content of the rewritable storage medium using the ID number as a decryption key.
- 6. The apparatus of claim 5, wherein the processing core comprises the decryption unit by executing decryption program instructions obtained from an internal read only memory of the apparatus or from the rewritable storage medium.
- 7. The apparatus of claim 5, further comprising a random access memory operable to receive the decrypted digital content of the rewritable storage medium.
- 8. The apparatus of claim 1, wherein the storage device is at least one of a register, a read only memory (ROM), a programmable read only memory (PROM) and a discrete circuit.
- 9. The apparatus of claim 1, wherein the ID number is not readable externally from the apparatus.
- 10. The apparatus of claim 1, wherein the digital content of the rewritable medium is not encrypted when initially stored thereon.
- 11. The apparatus of claim 1, wherein the digital content of the rewritable medium includes data and instructions for a computer program.
- 12. The apparatus of claim 11, wherein the computer program is a video game.
- 13. The apparatus of claim 1, wherein the digital content of the rewritable medium includes data and instructions for a boot code read only memory (ROM) for the processing core.
- 14. The apparatus of claim 1, wherein the rewritable medium is at least one of an electronic erasable programmable read only memory (EEPROM), a flash memory, and a disk medium.
- 15. The apparatus of claim 1, wherein the rewritable medium is removably connectable to the apparatus.
- 16. A rewritable storage medium, comprising:
digital content; a flag indicative of whether the digital content is encrypted; and a connector operable to communicate with a processing apparatus, the processing apparatus including a processing core operable to execute at least some of the digital content of the rewritable storage medium, a storage device operable to contain a substantially unique identification (ID) number, and an encryption unit operable to (i) determine whether the digital content of the rewritable storage medium is encrypted based on the flag, and (ii) encrypt and overwrite the digital content of the rewritable storage medium using the ID number as an encryption key when the flag indicates that the digital content is not encrypted.
- 17. The rewritable storage medium of claim 16, wherein the encryption unit is further operable to set the flag to indicate that the digital content is encrypted.
- 18. The rewritable storage medium of claim 16, wherein the digital content is not encrypted when initially stored thereon.
- 19. The rewritable storage medium of claim 16, wherein the digital content includes data and instructions for a video game.
- 20. The rewitable storage medium of claim 19, wherein the computer program is a video game.
- 21. The rewritable storage medium of claim 16, wherein the digital content includes data and instructions for a boot code read only memory (ROM) for the processing apparatus.
- 22. The rewritable storage medium of claim 16, wherein the rewritable medium is at least one of an electronic erasable programmable read only memory (EEPROM), a flash memory, and a disk medium.
- 23. The rewritable storage medium of claim 16, wherein the connector is removably connectable to the processing apparatus.
- 24. A method, comprising:
reading a rewritable storage medium, the rewritable storage medium including digital content and a flag indicative of whether the digital content is encrypted; determining whether the digital content of the rewritable storage medium is encrypted based on the flag; encrypting the digital content of the rewritable storage medium using an identification (ID) number as an encryption key when the flag indicates that the digital content is not encrypted, the ID number being unique to a processing apparatus operable to execute the digital content; and overwriting the digital content of the rewritable storage medium with the encrypted digital content.
- 25. The method of claim 24, further comprising: setting the flag of the rewritable storage medium to indicate that the digital content is encrypted.
- 26. The method of claim 24, wherein the step of encrypting the digital content of the rewritable storage medium includes using at least one of an exclusive OR of the digital content and the ID number, transposition, substitution, polyalphabetic substitution, conventional key encryption, public key encryption, cipher system encryption, and code encryption.
- 27. The method of claim 24, further comprising: decrypting the digital content of the rewritable storage medium using the ID number as a decryption key.
- 28. The method of claim 24, wherein the ID number is not readable externally from the processing apparatus.
- 29. The method of claim 24, wherein the digital content of the rewritable medium is not encrypted when initially stored thereon.
- 30. The method of claim 24, wherein the digital content of the rewritable medium includes data and instructions for a computer program.
- 31. The method of claim 30, wherein the computer program is a video game.
- 32. The method of claim 24, wherein the digital content of the rewritable medium includes data and instructions for a boot code read only memory (ROM) for the processing apparatus.
- 33. The method of claim 24, wherein the rewritable medium is at least one of an electronic erasable programmable read only memory (EEPROM), a flash memory, and a disk medium.
- 34. The method of claim 24, wherein the rewritable medium is removably connectable to the processing apparatus.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefits of U.S. Provisional Patent Application No. 60/385,212, filed Jun. 3, 2002, entitled METHODS AND APPARATUS FOR CUSTOMIZING ELECTRONIC ERASABLE PROGRAMMABLE READ ONLY MEMORY, the entire disclosure of which is hereby incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60385212 |
Jun 2002 |
US |