Method for using time from a trusted host device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/00
G06F-021/10
G11B-020/00
출원번호
US-0811346
(2007-06-08)
등록번호
US-8869288
(2014-10-21)
발명자
/ 주소
Conley, Kevin M.
Holtzman, Michael
Sela, Rotem
Barzilai, Ron
Jogand-Coulomb, Fabrice E.
출원인 / 주소
SanDisk Technologies Inc.
대리인 / 주소
Brinks Gilson & Lione
인용정보
피인용 횟수 :
3인용 특허 :
23
초록▼
A method for using time from a trusted host device is disclosed. In one embodiment, an application on a memory device receives a request to perform a time-based operation from an entity authenticated by the memory device, wherein the entity is running on a host device. The application selects time f
A method for using time from a trusted host device is disclosed. In one embodiment, an application on a memory device receives a request to perform a time-based operation from an entity authenticated by the memory device, wherein the entity is running on a host device. The application selects time from the host device instead of time from a time module on the memory device to perform the time-based operation and uses the time from the host device to perform the time-based operation. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination.
대표청구항▼
1. A method for performing a time-based operation in a memory device, the method comprising: performing the following in a memory device:authenticating an entity running on a host device in communication with the memory device;determining an identification of the host device;receiving a request to p
1. A method for performing a time-based operation in a memory device, the method comprising: performing the following in a memory device:authenticating an entity running on a host device in communication with the memory device;determining an identification of the host device;receiving a request to perform a time-based operation from the entity;determining whether the host device is trustworthy based on the identification of the host device;in response to determining that the host device is trustworthy, performing the following: using a time value from the host device to perform the time-based operation; andin response to determining that the host device is not trustworthy, performing the following: determining accuracy of previously-measured active time by comparing the previously-measured active time with a first time stamp obtained by the memory device from a trusted time server through the host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from the host device;measuring current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the host device;adjusting the measured current active time using the determined accuracy;generating a time estimate by applying the adjusted measured current active time to the second time stamp; andusing the generated time estimate to perform the time-based operation. 2. The method of claim 1, wherein the time value from the host device is used only if the time value from the host device represents a later point in time than the generated time estimate. 3. The method of claim 1, wherein the time value from the host device is more accurate than the generated time estimate, and wherein the generated time estimate is more secure than the time value from the host device. 4. The method of claim 1, wherein the time value from the host device cannot be used to generate the time estimate. 5. The method of claim 1 further comprising using the generated time estimate to authenticate the entity. 6. The method of claim 1 further comprising using the time value from the host device only for a single session. 7. The method of claim 1, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device. 8. A method for performing a time-based operation in a memory device, the method comprising: performing the following in a memory device:receiving a request to authenticate an entity running on a host device;authenticating the entity using an authentication method specified in an access control record (ACR) and time from a time module on a memory device, wherein the ACR associates the entity with an application in the memory device;determining an identification of the host device;receiving a request from the entity for the application to perform a time-based operation;determining whether the host device is trustworthy based on the identification of the host device;in response to determining that the host device is trustworthy, performing the following: using a time value from the host device to perform the time-based operation; andin response to determining that the host device is not trustworthy, performing the following: determining accuracy of previously-measured active time by comparing the previously-measured active time with a first time stamp obtained by the memory device from a trusted time server through the host device which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from the host device;measuring current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the host device;adjusting the measured current active time using the determined accuracy;generating a time estimate by applying the adjusted measured current active time to the second time stamp; andusing the generated time estimate to perform the time-based operation. 9. The method of claim 8, wherein the time value from the host device is used only if the time value from the host device represents a later point in time than the generated time estimate. 10. The method of claim 8, wherein the time value from the host device is more accurate than the generated time estimate, and wherein the generated time estimate is more secure than the time value from the host device. 11. The method of claim 8, wherein the time value from the host device cannot be used to generate the time estimate. 12. The method of claim 8 further comprising using the time value from the host device only for a single session. 13. The method of claim 8, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device. 14. A method for performing a time-based operation on a memory device previously connected to a first host device and having stored a time value previously received from the first host device, the method comprising: performing the following in a processor of the memory device when the memory device is connected with a second host device:retrieving, from a memory array of the memory device, the time value previously received from the first host device;authenticating an entity running on the second host device;determining an identification of the second host device;receiving a time value from the second host device;comparing the second time value received from the second host device with the time value previously received from the first host device;determining whether the second host device is trustworthy based on the identification of the second host device;in response to determining that the second host device is trustworthy, performing the following: using the time value received from the second host device to perform the time-based operation;in response to determining that the second host device is not trustworthy, performing the following: determining accuracy of previously-measured active time by comparing the previously-measured active time with a first time stamp obtained by the memory device from a trusted time server through the second host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from either the first host device or the second host device;measuring current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the second host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the second host device;adjusting the measured current active time using the determined accuracy;generating a time estimate by applying the adjusted measured current active time to the second time stamp; andusing the generated time estimate to perform the time-based operation. 15. The method of claim 14 further comprising deciding to use the stored time value previously received from the first host device to perform the time-based operation. 16. The method of claim 14, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device. 17. A method for performing a time-based operation on a memory device, the method comprising: performing the following in a memory device:authenticating a host device using a non-time-based authentication system;determining an identification of the host device;receiving a time value from the host device; anddetermining whether the host device is trustworthy based on the identification of the host device;in response to determining that the host device is trustworthy, performing the following: using the time value received from the host device to perform a time-based operation;in response to determining that the host device is not trustworthy, performing the following:determining accuracy of previously-measured active time by comparing the previously-measured active time with a first time stamp obtained by the memory device from a trusted time server through the host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from the host device;measuring current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the host device;adjusting the measured current active time using the determined accuracy;generating a time estimate by applying the adjusted measured current active time to the second time stamp; andusing the generated time estimate to perform the time-based operation. 18. The method of claim 17 further comprising: validating the time value received from the host device. 19. The method of claim 18, wherein the time value received from the host device is validated by comparing the time value with at least one of: a stored time value from a different host device; andthe generated time estimate. 20. The method of claim 17, wherein the non-time-based authentication system comprises symmetric authentication. 21. The method of claim 17, wherein the host device is connected to a network. 22. The method of claim 17, wherein the host device is not connected to a network. 23. The method of claim 17, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device. 24. A memory device comprising: a memory array; anda processor in communication with the memory array and operative to provide:a security system operative to authenticate an entity running on a host device and determine an identification of the host device;a time module that keeps track of time; andan application operative to perform a time-based operation, wherein the application is further operative to:determine whether the host device is trustworthy based on the identification of the host device;in response to determining that the host device is trustworthy, performing the following: use a time value from the host device instead of a time value from the time module to perform the time-based operation;in response to determining that the host device is not trustworthy, performing the following: determine accuracy of previously-measured active time by comparing the previously-measured active time with an actual time from a first time stamp obtained by the memory device from a trusted time server through the host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from the host device;measure current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the host device;adjust the measured current active time based on the determined accuracy;generate a time estimate by applying the adjusted measured current active time to the second time stamp; anduse the generated time estimate to perform the time-based operation. 25. The memory device of claim 24, wherein the application is operative to use the time value from the host device only if the time value from the host device represents a later point in time than the generated time estimate. 26. The memory device of claim 24, wherein the time value from the host device is more accurate than the generated time estimate, and wherein the generated time estimate is more secure than the time value from the host device. 27. The memory device of claim 24, wherein the time value from the host device cannot be used to generate the time estimate. 28. The memory device of claim 24, wherein the security system is operative to use the generated time estimate to authenticate the entity. 29. The memory device of claim 24, wherein the application is operative to use the time value from the host device only for a single session. 30. The memory device of claim 24, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, mad wherein the time-based operation comprises validating a DRM license stored in the memory device. 31. A memory device comprising: a memory array; anda processor in communication with the memory array and operative to:receive a request to authenticate an entity running on a host device;authenticate the entity using an authentication method specified in an access control record (ACR), wherein the ACR associates the entity with an application in the memory device;determine an identification of the host device;receive a request from the entity for the application to perform a time-based operation;determine whether the host device is trustworthy based on the identification of the host device;in response to determining that the host device is trustworthy, performing the following: use a time value from the host device to perform the time-based operation;in response to determining that the host device is not trustworthy, performing the following: determine accuracy of previously-measured active time by comparing the previously-measured active time with a first time stamp obtained by the memory device from a trusted time server through the host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from the host device;measure current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the host device;adjust the measured current active time using the determined accuracy;generate a time estimate by applying the adjusted measured current active time to the second time stamp; anduse the generated time estimate to perform the time-based operation. 32. The memory device of claim 31, wherein the time value from the host device is used only if the time value from the host device represents a later point in time than the generated time estimate. 33. The memory device of claim 31, wherein the time value from the host device is more accurate than the generated time estimate, and wherein the generated time estimate is more secure than the time value from the host device. 34. The memory device of claim 31, wherein the time value from the host device cannot be used to generate the time estimate. 35. The memory device of claim 31, wherein the processor is further operative to use the time value from the host device only for a single session. 36. The memory device of claim 31, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device. 37. A memory device comprising: a connector operative to removably connect the memory device with a first host device and a second host device;a memory array operative to store a time value previously received from the first host device; anda processor in communication with the memory array and the connector and operative to perform the following when the memory device is connected with the second host device:retrieve, from the memory array, the time value previously received from the first host device;authenticate an entity running on the second host device;determine an identification of the second host device;receive a time value from the second host device;compare the time value from the second host device with the stored time previously received from the first host device;determine whether the second host device is trustworthy based on the identification of the second host device;in response to determining that the second host device is trustworthy, performing the following: use the time value received from the second host device to perform the time-based operation;in response to determining that the second host device is not trustworthy, performing the following: determine accuracy of previously-measured active time by comparing the previously-measured active time with a first time stamp obtained by the memory device from a trusted time server through the second host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from either the first host device or the second host device;measure current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the second host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory device being active when it is connected to and receives power from the second host device;adjust the measured current active time using the determined accuracy;generate a time estimate by applying the adjusted measured current active time to the second time stamp; anduse the generated time estimate to perform the time-based operation. 38. The memory device of claim 37, wherein the processor is further operative to decide to use the stored time value previously received from the first host device to perform the time-based operation. 39. The memory device of claim 37, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device. 40. A memory device comprising: a memory array; anda processor in communication with the memory array and operative to:authenticate a host device using a non-time-based authentication system;determine an identification of the host device;receive a time value from the host device;determining whether the host device is trustworthy based on the identification of the host device;in response to determining that the host device is trustworthy, performing the following: use the time value received from the host device to perform a time-based operationin response to determining that the host device is not trustworthy, performing the following:determine accuracy of previously-measured active time by comparing the previously-measured active time with an a first time stamp obtained by the memory device from a trusted time server through the host device, which has been determined to be not trustworthy, wherein the previously-measured active time indicates time elapsed when the memory device was previously active, the memory device being previously active when it was connected to and received power from the host device;measure current active time of the memory device relative to a second time stamp obtained by the memory device from the trusted time server through the host device, wherein the measuring is performed internally in the memory device when the memory device is active, the memory_device being active when it is connected to and receives power from the host device;adjust the measured current active time using the determined accuracy;generate a time estimate by applying the adjusted measured current active time to the second time stamp; anduse the generated time estimate to perform the time-based operation. 41. The memory device of claim 40, wherein the processor is further operative to validate the time value received from the host device. 42. The memory device of claim 41, wherein the processor is operative to validate the time value received from the host device by comparing the time value with at least one of: a stored time value from a different host device;and the generated time estimate. 43. The memory device of claim 40, wherein the non-time-based authentication system comprises symmetric authentication. 44. The memory device of claim 40, wherein the host device is connected to a network. 45. The memory device of claim 40, wherein the host device is not connected to a network. 46. The memory device of claim 40, wherein the memory device stores protected content and digital rights management (DRM) keys and licenses to unlock the protected content, and wherein the time-based operation comprises validating a DRM license stored in the memory device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (23)
Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
Timothy E. Moses CA; Glenn C. Langford CA, Method and apparatus for facilitating information security policy control on a per security engine user basis.
Spagna,Richard L.; Zhao,Ting; Geisler,Douglas R.; Mahlbacher,James C., Method and system for securing local database file of local content stored on end-user system.
Stephen F. Bisbee ; Jack J. Moskowitz ; Michael W. White, System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
Prahlad, Anand; Schwartz, Jeremy A.; Ngo, David; Brockway, Brian; Muller, Marcus S., Systems and methods for classifying and transferring information in a storage network.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Jennings, Gerard David; Delfs, Eckhard; Ranjan, Uma; Siggelkow, Andreas, Time data checking unit, electronic device and method for checking a time indication.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.