1. Field of the Invention
The invention relates to a storage medium having an encrypting device according to the preamble of claim 1.
2. Related Art
An example of a known storage medium in the sense of the invention is a flash memory card having an encryption option, having a cryptoprocessor used as an encrypting and a decrypting device, and a symmetrical encryption and decryption key stored in the card for encrypting data. In such a flash memory card a user at a card terminal, e.g. a PC with a flash card reader connected to it or a mobile card terminal such as a mobile telephone with a flash card reader, can optionally select via a menu of the card terminal whether data to be stored in the flash memory card are to be stored in the flash memory card in encrypted form. Unencrypted stored data can be read out of the flash memory card. Encrypted stored data can only be read out of the flash memory card after successful authentication of the user with respect to the flash memory card. If an attempt is made to read out encrypted stored data without authentication, the read-out process is terminated without output of data and possibly with an error message or authentication request being output.
In some applications a holder of a storage medium, who has been requested by an owner of the storage medium to store data on the storage medium, is regarded as potentially untrustworthy by the owner. For example, a monitoring service which stores captured photo or video recordings in a storage medium for monitoring purposes, should have no possibility for reading out the stored photo or video recordings again and misusing them, e.g. to publish them among their associates or on the internet for private purposes. Even if the storage medium has an encryption option, it is possible that the untrustworthy holder simply does not use the same and can therefore read out the stored data arbitrarily after they are stored.
DE 198 03 218 A1 describes a memory card with the features of the preamble of claim 1. Data are either encrypted when being read into the card and decrypted when read out, or read in and out in unencrypted form. US 2008/0071977 A1 shows a card having a fingerprint sensor, which is used to allow access to stored data only to authenticated users.
The object of the invention is to create a storage medium with an encryption option which enables secure storage of data even in an untrustworthy environment.
The storage medium is equipped with an electronic memory area, an interface for reading in data into the storage medium and for reading out data from the storage medium, a read-in device coupled between the interface and the memory area for storing data from the interface into the memory area, a read-out device coupled between the interface and the memory area for outputting data from the memory area to the interface, a key memory in which a secret key is or can be stored, an encrypting device coupled to the read-in device for encrypting data input into the storage medium at the interface with the key, and a decrypting device coupled to the read-out device for decrypting data output from the memory area with the key.
The storage medium is characterized in that the read-in device is designed to encrypt any data that are input at the interface for storage in the memory area with the key stored in the key memory and to store them in encrypted form in the memory area, and that the read-out device has two different read-out channels. More precisely there is a first, direct read-out channel, which is designed to allow, when data are output via the direct read-out channel, stored encrypted data in the memory area to be output to the interface in encrypted form by circumventing the decrypting device. There is additionally a second, decrypting read-out channel, which is designed to allow, when data are read out via the decrypting read-out channel, stored encrypted data in the memory area to be decrypted by means of the decrypting device using the key stored in the key memory or a decryption key stored in the key memory and corresponding to the key, and to be output to the interface in decrypted form.
In the storage medium therefore, any data input at the interface are encrypted without the possibility of interference by a user of the storage medium. This enables untrustworthy persons to be entrusted with the recording and storage of data.
In addition, encrypted stored data can be output optionally in encrypted or decrypted form. For example, an employee of a monitoring service who has recorded data with the storage medium, can read out the encrypted data from the storage medium in encrypted form and transmit them in encrypted form to a trustworthy control centre. This procedure can be used e.g. in cases when the employee of the monitoring service retains the storage medium and only transmits the data to the control centre. In cases when the control centre does not only receive the data but the whole storage medium itself, a trustworthy employee of the control centre can decrypt the data during the read-out process and thereby output them from the storage medium in decrypted form.
Optionally the storage medium further has an authentication device being coupled to the read-out device and being designed such that the data can be output to the interface via the decrypting read-out channel in decrypted form only upon successful authentication. This ensures that only trustworthy users—characterized by their ability to successfully authenticate themselves with respect to the storage medium—can obtain the stored data in plain text, i.e. in either decrypted form or non-encrypted form.
Optionally, the authentication device is further designed such that in the event of unsuccessful authentication the data are output via the direct read-out channel in the encrypted form, i.e. as stored in the memory, i.e. as they are read out without authentication.
Optionally, the memory area is additionally configured at least partially as a flash memory. The storage medium is optionally a flash memory card which is intelligently designed, i.e. it has a Smart Card microprocessor and/or cryptoprocessor or the like.
Optionally, a symmetric key of a symmetric encryption system is provided as a key. In this case, the same key is used for encryption and decryption. It is also possible in principle that two different matching keys are used for encryption and decryption, which are optionally both stored in the storage medium, e.g. in the key memory.
The encryption device and the decrypting device can optionally be configured as two separate devices or as one single combined encrypting and decrypting device, and can be optionally in the form of one or two cryptoprocessor(s) or Smart Card microprocessor(s) respectively.
In the following the invention is explained in further detail based on exemplary embodiments and by reference to the drawing, wherein shown are in:
A read/write device (not shown) for storage media 10 can be coupled to the interface 30 of the storage medium 10, so that data can be transferred from the read /write device to the storage medium 10 and from the storage medium 10 to the read/write device.
In the embodiment of the data read-out of
In the event of an unsuccessful authentication, optionally either encrypted data are output, essentially as in the case of a read-out without authentication, or alternatively no data are output at all.
Number | Date | Country | Kind |
---|---|---|---|
10 2009 019 051 | Apr 2009 | DE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2010/055518 | 4/26/2010 | WO | 00 | 12/30/2011 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2010/125021 | 11/4/2010 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6079019 | Fukuzumi | Jun 2000 | A |
6158004 | Mason et al. | Dec 2000 | A |
6513719 | Imura | Feb 2003 | B1 |
7069447 | Corder | Jun 2006 | B1 |
7397919 | Anzai | Jul 2008 | B2 |
20030085289 | Kaneko | May 2003 | A1 |
20050018472 | Lim | Jan 2005 | A1 |
20070113097 | Wang | May 2007 | A1 |
20070168292 | Jogand-Coulomb et al. | Jul 2007 | A1 |
20080071977 | Chow et al. | Mar 2008 | A1 |
20100004813 | Lindinger et al. | Jan 2010 | A1 |
20100208042 | Ikeda et al. | Aug 2010 | A1 |
Number | Date | Country |
---|---|---|
19803218 | Dec 1998 | DE |
102006048029 | Apr 2008 | DE |
1074906 | Feb 2001 | EP |
2405007 | Oct 2004 | GB |
03012657 | Feb 2003 | WO |
Entry |
---|
International Search Report in PCT/EP2010/055518, Jul. 8, 2010. |
Search Report of German PTO regarding DE 10200901905A1, Nov. 11, 2010. |
Written Opinion of ISR in PCT/EP2010/055518, Jul. 8, 2010 (English Translation). |
IPRP in PCT/EP2010/055518, Nov. 15, 2011. |
Number | Date | Country | |
---|---|---|---|
20120102337 A1 | Apr 2012 | US |