Not applicable.
Not applicable.
Not applicable.
1. Technical Field
The present invention relates generally to electrical computers and digital processing systems, and more particularly to selectively restricting access to memory and/or storage areas.
2. Background Art
The variety of consumer electronic devices that is available continues to grow at a very rapid rate. For example, we have many types of personalized general computing devices. One common example here is the personal computer (PC), which includes desktop units (i.e., “traditional” PCs) and portable varieties such as laptops, notebooks, and netbooks. We have recording equipment, including digital still and video cameras as well as audio recording devices. We have personal playback equipment, such as MP3 and other format music players, e-book players, portable digital versatile disc (DVD) players. And we also have general playback equipment, such as digital video recorders (DVRs), multi-player gaming counsels, and digital frames that play images, movies, and audio clips.
The quantity of electronic devices that consumers use also continues to grow, but at a slower rate. Some examples here are personal communications devices, with cellular telephones having subsumed personal digital assistants (PDAs) and now become the ubiquitous example.
The example of the cellular telephone further illustrate how the distinctions between consumer electronic devices are blurring, and perhaps even how the number of such devices that a person uses may stabilize or start to decrease. For instance, many modern cellular telephones run application programs like many PCs; capture images, video, and audio like many digital cameras, camcorders, and recorders; and playback commercial content or what they have been used to capture or record.
While it is probably impossible to exhaustively list modern consumer electronic devices here, and any such list would quickly be obsolete, aspects common to essentially all of these devices are that they have data memory, or data storage, or both (hereinafter simply memory and storage).
The terms “memory” and “storage” are often loosely and interchangeably used and it is hard to define one term without using the other. For example, one definition of memory is “[a] functional unit to which data can be stored and from which data can be retrieved” (United States Patent Classification (USPC) System, class 711 glossary, United States Patent and Trademark Office). Here, however, it is important to draw and maintain a distinction. For the present discussion the term “memory” is used in a dynamic sense and the term “storage” is used in a static sense. This can be seen easily with an example. Apple Corporation of Cupertino, Calif. presently markets the MacBook™ personal computer. Upon purchase the dynamic memory, the random access memory (RAM) in this particular device, is usually one gigabyte (GB) and the static memory, the hard disc drive storage unit in this particular device, is often 320 GBs. However, both of these can be expanded, say to two GB and to 500 GB.
Expanding or “upgrading” the memory and/or storage capacity in consumer electronic devices presents a lot of problems. Historically, there have been two ways to do this: replace one or more existing low capacity units with higher capacity units or install additional units. Both approaches burden the end user and even society as a whole. For example, both are expensive, require some degree of technical skill, and inherently expose the device to a of risk of damage. Replacement of units often results in still usable low capacity units simply being discarded as waste and installing additional units is often not a possible option. For instance, continuing with the MacBook™ example, the MacBook has a finite number of slots for memory units and a finite amount of internal space for storage units. Upon purchase these slots are usually all fully occupied. Thus replacement is the only option left if a user wants to expand or upgrade the dynamic memory or the static storage capacities in this consumer electronic device.
Something not widely known, but becoming increasingly common, is that many consumer electronic devices are now sold with more memory and/or storage capacity than they are represented or advertised as having. Various reasons lead to this. For example, devices and marketing campaigns for them may be designed based on currently available components, only to have the devices actually manufactured using later available components that have greater capacities. Or manufactures may wish to provide different options for a device, say one GB entry level, two GB regular level, and four GB professional level devices but find it inefficient to purchase, stock, and manufacture using different capacity memory and/or storage units.
The manufacturer (or the vendor if the device is a “house branded” one commissioned by a major vendor) then faces the choice of giving end purchasers more than they are paying for. Where, for instance, an entry level device typically is priced essentially at cost, to entice new consumers to a brand or in the hopeful expectation of profiting eventually from tied-in sales. A manufacturer or vendor then clearly does not want consumers to be able to buy the entry level device at the lowest price and still actually get the professional level device. The manufacturer therefore may take the additional step of “under configuring” the device, for example, by setting it to use only one GB of four GB of dynamic memory that is actually present or by setting it to use only 500 GB of static storage when 750 GB is actually present. The vendor then may also have some follow-on issues related to this. For instance, if it becomes widely known by purchasers that devices are under configured, potential purchasers may seek to purchase devices that have under configured capacity, thus skewing the market to such devices. Purchasers attempting to reconfigure device memory and/or storage capacities themselves are also likely create directly related or peripheral technical support issues that the vendor then may have to deal with.
Conversely, something that is increasingly appreciated is that manufacturing consumer electronic devices with more memory and/or storage capacity is relatively inexpensive. As implied above, the economies of scale can offset the cost of using greater capacity components. For instance, a 750 GB storage component does not cost 1.5 times as much as a 500 GB component. It is typically only 1.2 times as much (i.e., merely 20% more, rather than 50% more). Furthermore, this cost may effectively be reduced to below 15% if the manufacturer purchases, say, 10,000 units of the 750 GB components rather than 5,000 units each of 750 GB and 500 GB components. Availability issues, stocking, production line change over, end device configuration, after sale technical support complexity, etc. may reduce or even eliminate all of even a 15% differential.
Summarizing, on one hand, manufacturers and vendors already have consumer electronic devices with over represented memory and/or storage capacities, or else it often is a relatively inexpensive matter to provide such devices with such capacities. On the other hand, manufacturers and vendors presently incur actual costs and other disincentives in making these capacities available to the purchasers and end users of these devices. This situation leaves manufacturers, vendors, and consumers all disadvantaged, and solutions are accordingly desirable to address this.
Accordingly, it is an object of the present invention to provide a system for enabling access to additional memory and storage capacity in an electronic device.
Briefly, one preferred embodiment of the present invention is an electronic device including a controller having a processor that works with a memory and a storage. The memory has a primary memory partition that is accessible by the processor and a secondary memory partition that is prevented from being accessed by the processor until enabled when an access logic is run in the electronic device with a key associated with the secondary memory partition. The storage similarly has a primary storage partition that is accessible by the processor and a secondary storage partition that is prevented from being accessed by the processor until enabled when said access logic is run in the electronic device with a key associated with the secondary storage partition.
Briefly, another preferred embodiment of the present invention is an electronic device including a controller having a processor that works with a memory. The memory has a partition that is prevented from being accessed by the processor until enabled when an access logic is run in the electronic device with a key associated with the partition.
Briefly, another preferred embodiment of the present invention is an electronic device including a controller having a processor that works with a storage. The storage has a partition that is prevented from being accessed by the processor until enabled when an access logic is run in the electronic device with a key associated with the partition.
Briefly, another preferred embodiment of the present invention is a method for manufacturing an electronic device having additional memory and storage capacities. The electronic device is built to include a controller having a processor that works with a memory and a storage. The memory is configured to have a primary memory partition that is accessible by the processor and to have at least one secondary memory partition that is prevented from being accessed by the processor until enabled by an access logic running in the electronic device with a key associated with the secondary memory partition. The storage is configured to have a primary storage partition that is accessible by the processor and further to have at least one secondary storage partition that is prevented from being accessed by the processor until enabled by the access logic running in the electronic device with a key associated with the secondary storage partition.
Briefly, another preferred embodiment of the present invention is a method for manufacturing an electronic device having additional memory capacity. The electronic device is built to include a controller having a processor that works with a memory. The memory is configured to have a partition that is prevented from being accessed by the processor until enabled by an access logic running in the electronic device with a key associated with the partition.
Briefly, another preferred embodiment of the present invention is a method for manufacturing an electronic device having additional storage capacity. The electronic device is built to include a controller having a processor that works with a storage. The storage is configured to have a partition that is prevented from being accessed by the processor until enabled by an access logic running in the electronic device with a key associated with the partition.
Briefly, another preferred embodiment of the present invention is a method for a user of an electronic device to upgrade access to an additional memory capacity and to an additional storage capacity when the electronic device includes a processor, a memory, and a storage wherein the memory has a memory partition that is prevented from being accessed by the processor until enabled by an access logic being run in the electronic device with a key associated with the memory partition, and wherein the storage has a storage partition that is prevented from being accessed by the processor until enabled by said access logic being run in the electronic device with a key associated with the storage partition. The access logic is run in the electronic device and the user is informed that an upgrade permitting access to the additional memory capacity and the additional storage capacity is available. It is determined if the user wishes the upgrade. If so, the user is permitted to purchase the upgrade. Then the key associated with the memory partition is transferred to the electronic device from an external source, and the key associated with the storage partition is transferred to the electronic device from the external source. Then the key associated with the memory partition with the access logic is applied to enable the memory partition, and the key associated with the storage partition with the access logic is applied to enable the storage partition.
Briefly, another preferred embodiment of the present invention is a method for a user of an electronic device to upgrade access to an additional memory capacity when the electronic device includes a processor and a memory having a partition that is prevented from being accessed by the processor until enabled by an access logic being run in the electronic device with a key. The access logic is run in the electronic device and the user is informed that an upgrade permitting access to the additional memory capacity is available. It is determined if the user wishes the upgrade. If so, the user is permitted to purchase the upgrade. Then the key is transferred to the electronic device from an external source, and the key is applied with the access logic to enable the partition.
And briefly, another preferred embodiment of the present invention is a method for a user of an electronic device to upgrade access to an additional storage capacity when the electronic device includes a processor and a storage having a partition that is prevented from being accessed by the processor until enabled by an access logic being run in the electronic device with a key. The access logic is run in the electronic device and the user is informed that an upgrade permitting access to the additional storage capacity is available. It is determined if the user wishes the upgrade. If so, the user is permitted to purchase the upgrade. Then the key is transferred to the electronic device from an external source, and the key is applied with the access logic to enable the partition.
These and other objects and advantages of the present invention will become clear to those skilled in the art in view of the description of the best presently known mode of carrying out the invention and the industrial applicability of the preferred embodiment as described herein and as illustrated in the figures of the drawings.
The purposes and advantages of the present invention will be apparent from the following detailed description in conjunction with the appended figures of drawings in which:
a-d are schematic block diagrams stylistically depicting how some exemplary embodiments of the access logic in
In the various figures of the drawings, like references are used to denote like or similar elements or steps.
The present invention is a system for enabling access to additional memory and storage capacity. As illustrated in the various drawings herein, embodiments of the invention are depicted by the general reference character 10.
The controller 110 includes a central processing unit (CPU 118) and a cache 120. The controller 110 can include more than one CPU and it can also include multiple caches as well (e.g., one per CPU or different level caches for the CPU or CPUs). Alternately, the controller need not include any cache, but most modern microprocessor-based CPUs do and showing a cache in
The memory 112 includes a primary partition 122 and a partition block 124 that includes one or more secondary partitions (secondary partitions 124a-x in this example). In
The storage 114 similarly includes a primary partition 126 and a partition block 128 that here includes secondary partitions 128a-f. For instance, the primary partition 126 here can have a 500 GB capacity and the additional partition block 128 can have a 250 GB capacity wherein each of the secondary partitions 128a-f has a 50 GB capacity.
The communications bus 116 connects the controller 110, the memory 112, and the storage 114, and here in
The electronic device 100 shown in
a-d are schematic block diagrams stylistically depicting how some exemplary embodiments of the access logic 150 can be run in alternate manners and at different times.
In the case in
The case in
In the case in
The case in
Turning first to the media-based mechanism 300a, this may be embodied in a computer readable storage media that the media reader 138 of the electronic device 100 can read. Accordingly, this media can be a floppy disc, tape, CD, DVD, USB flash memory, external hard drive, etc. This list is not exhaustive and it should be appreciated that the nature of the media is not a limitation, as long as the media is computer readable. The media-based mechanism 300a includes one or more keys and it optionally may also include a copy of the access logic 150. If a copy of the access logic 150 is present and the nature of the media permits this, the access logic 150 may further optionally automatically execute when the media-based mechanism 300a is loaded into and read by the electronic device 100.
In
Turning now to the wireless-based mechanism 300b, this is embodied in a server system 320 that includes a controller 322, a memory 324, a wireless transponder 326 and a wireless interface 328, and an optional network interface 330. The memory 324 here further includes a software module 332, an optional copy of the access logic 150, and keys 310aa-ax (respectively associated with the secondary partitions 124a-x in the memory 112 in the electronic device 100), and keys 310ba-bf (respectively associated with the secondary partitions 128a-b in the storage 114 in the electronic device 100). Note, the server system 320 here may have copies of all of the keys 310 for all of the units of memory and storage in all of the electronic devices that the server system 320 may work with.
Turning next to the physical network-based mechanism 300c, this is also embodied in a server system 340. Potentially the server system 340 can be the same as the server system 320, but this is not a requirement and to emphasize this the server system 340 here is depicted with different components. Continuing, the server system 340 includes a controller 342, a memory 344, and a network interface 346. The memory 344 here further includes a software module 348, an optional copy of the access logic 150, and keys 310aa-ax. The software module 348 may be, but need not necessarily be, the same as the software module 332, and the remarks above about the keys apply as well here for all of the units of memory and storage in all of the electronic devices that the server system 340 may potentially work with.
Before wrapping up discussion of the electronic device 100 and the activation mechanisms 300 here, some additional coverage of general aspects of the secondary blocks 124, 128 is appropriate. Conceptually, when any part of a secondary block 124, 128 is unlocked or enabled it becomes part of the respective primary partition 122, 126. This can be a permanent change or, in sophisticated embodiments of the present invention, this can also be temporary.
Continuing with the ongoing examples in
Temporarily unlocking a secondary partition 124a-x, 128a-f is technically also straightforward, but here many additional sophisticated advantages become possible. In embodiments of the present invention providing this feature, the access logic 150 monitors for and responds to a trigger to re-lock a part of a primary partition 122, 126 (i.e., to make it again be a secondary partition 124a-x, 128a-f, either generally be such or even to be the same specific one that it originally was).
Some examples of triggers for this are the passage of a period of time, an event internal to the electronic device 100, and/or an event external to the electronic device 100. The passage of a period of time can, of course, be regarded as an event internal to the electronic device 100, but it is listed separately and first here to emphasize how it particularly can be used in combination with other triggers. Most electronic devices 100 today have an internal clock (and many also are able to synchronize with an one). Accordingly, the passage of a period of time can easily be used as a Boolean trigger, that is, permitting something to happen or to not happen for a set period of time. For instance, a user of the electronic device 100 may simply purchase the right to enable all of the secondary partitions 124a-x, 128a-f for one year. These partitions are then unlocked, a clock is monitored, and after one-year the access logic 150 re-locks portions of the primary partitions 122, 126 to again create secondary partitions 124a-x, 128a-f. Alternately, a user of the electronic device 100 may subscribe to an online service wherein the secondary partitions 124a-x are unlocked for three months as a sign-up incentive and wherein they will remain unlocked as long as user maintains the subscription. Here the access logic 150 unlocks and sets a three month “do not turn off” trigger. Even if the user cancels their subscription the day after obtaining it and the access logic 150 detects that the subscription is no longer active, the access logic 150 here will with wait until at least the three month period has expired before re-locking the secondary partitions 124a-x. Still alternately, a manufacturer may not want their vendors steering potential purchasers to low-capacity enabled devices over high-capacity enabled ones. Here a six month “do not turn on” trigger can be set (perhaps one that further is initiated by initial user activation of the device), and the access logic 150 here will not enable anything (even with a proper key) until at least six months has passed.
And before wrapping up discussion of the electronic device 100 and the activation mechanisms 300 here, some additional remarks about the keys 310 is also appropriate. A very wide variety of types of keys may be used.
In simple embodiments of the present invention the keys 310 may be simple passwords. For example, although not shown in the figures, and not expected to be used frequently, a simple key, such as password, could be recited to or left as a voice mail message for an end user of an electronic device. The end used could then manually enter the key into the electronic device in response to a dialog provided by the access logic. Note, this or one where a key is e-mailed to a user and then cut and pasted into an access logic dialog may especially be useful in technical support scenarios.
In most embodiments, however, it is expected that the keys 310 will be more sophisticated. For instance they may be complex bit or character strings. They may be values generated with a formula, random values, hash values, symmetric encryption keys, asymmetric encryption keys, etc. They may or may not be unique. What is used as a key and how robust and secure the manner of its generation and use are matters of design choice, and the present invention is accordingly can be embodied to accommodate a very wide range of application scenarios.
The manufacturing process 400 begins in step 410. Initialization and set-up typically occur here. For example, design of the electronic device 100 occurs here and components with specific capacities are chosen (e.g., components for the memory 112 and or the storage 114).
In a step 412 the electronic device 100 is built, generally. The components actually used here for the memory 112 and the storage 114 may be those chosen in design or they may be others with equal or greater capacities).
In an optional step 414 the logic unit 148 is included in the electronic device 100. This is optional because the logic unit 148 is provided and used in some embodiments of the electronic device 100 and not required or used in others.
In a step 416 the memory 112 in the electronic device 100 is configured with the capacity of the memory 112 that the electronic device 100 will initially be able to employ. A key point here, however, is that the memory 112 is configured to have a capacity less than what is actually installed in the electronic device 100.
In a step 418 the storage 114 in the electronic device 100 is configured with the capacity of the storage 114 that the electronic device 100 will initially be able to employ. A key point here (in this example where the memory 112 and storage 114 are both upgradable) is that the storage 114 is also configured to have a capacity less than what is actually installed in the electronic device 100.
In an optional step 420 a copy of the access logic 150 may be provided in the electronic device 100. This copy may be placed in the controller 110 or the logic unit 148, say, in read only memory (ROM) in one of these, or this copy may be stored in the storage 114. This step is optional because having a copy of the access logic 150 “built in” in this manner during manufacturing is not a requirement. A copy of the access logic 150 can alternately be obtained later, say, by an end user of the electronic device 100, for instance, via the media-based mechanism 300a, the wireless-based mechanism 300b, or the network-based mechanism 300c.
Finally, in a step 422 the manufacturing process 400 ends. The electronic device 100 is now complete and ready to be provided to a vendor or directly to an end user.
The upgrade process 500 begins in step 510. Initialization and set-up typically occur here. For instance, the electronic device 100 reaches an end user by some means, e.g., by their purchasing it themselves, receiving it as a gift, or being given it by their employer. Typically, the electronic device 100 is also activated here in some manner by or for the end user. This is optional, however, and can vary and be very device specific based on the nature of the electronic device 100. For example, activation of a MP3 player is typically not needed. In contrast, activation of a personal computer (PC) is typically performed by a new user upon first powering up the device. And in further contrast, activation of a cellular telephone for a new user is typically performed by a service provider.
In a step 512, at some later time (emphasized with a dashed line in
In a step 514 the access logic 150 determines whether the user of the electronic device 100 has elected to upgrade the memory 112 and/or the storage 114. Typically this is done by a running instance of the access logic 150 monitoring the input interface 132 and the input device 130 for a user reply. Alternately, if the electronic device 100 detects that an instance of the media-based mechanism 300a has been loaded into the media reader 138, an instance of the access logic 150 present there may be run, e.g., with an autorun dialog as common in PCs.
If the user does not want to upgrade, in straightforward manner a step 516 follows where the upgrade process 500 ends. An optional part of step 516, however, can be a dialog informing the user that they can configure future occurrences of step 512. For instance, the user can be informed that they can set or change triggers for step 512, or even to turn off all triggers so that it will not automatically occur again.
Alternately, if the user does want to upgrade, a step 518 follows wherein the right to an upgrade is purchased. The term “purchase” apples very broadly here to mean that something of value is given in exchange for the right to an upgrade. For example, in many embodiments it is expected that the user or their employer can simply pay money for an upgrade, say, with a credit card. But users of some embodiments might instead “purchase” the right to an upgrade by registering for a service that provides a utility (e.g., telephone or Internet access), or a user may take an online survey or provide information about themselves such as an e-mail address.
After successful completion of step 518, a step 520 follows wherein one or more of the keys 310 are transferred to the electronic device 100. Optionally, a copy of the access logic 150 can also be transferred here. If the electronic device 100 does already not have a copy, one will be need before the keys 310 can be used and this is a good time to procure it. Alternately, if the electronic device 100 has an older version of the access logic 150, this may be a suitable time to provide a newer version.
In a step 522, at some later time (emphasized with a dashed line in
In a step 524 a decision is made whether to stop the upgrade process 500. This decision can be made by the access logic 150 or by the user. If all of the available capacities have now been enabled, the access logic can detect this and have step 516 automatically follow so the upgrade process 500 ends. Alternately, the user can be asked here if they want to stop (proceed to step 516) or return to step 512. For instance, the user may feel that this upgrade was so inexpensive and went so smoothly that they want to go ahead and upgrade further. Or the user may have procured more keys 310 than were applied in step 522, and here they can continue to apply some or all of those as well.
With reference again briefly to
This is a continuation-in-part of application Ser. No. 11/879,213, filed Jul. 16, 2007, hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 11879213 | Jul 2007 | US |
Child | 12505704 | US |