Memory authentication for intrinsically safe field maintenance tools
First Claim
Patent Images
1. A method for authenticating electronic removable non-volatile memory in a handheld field maintenance tool, the method comprising:
- applying a non-reversible algorithm to a unique software identifier on the memory to obtain a result;
encrypting the result;
comparing the encrypted result with a stored encrypted result stored on the memory; and
selectively enabling the tool based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A memory authentication technique for field maintenance tools is provided. A non-volatile electronic memory includes a unique software identifier. A non-reversible algorithm is applied to the unique software identifier to obtain a result. The result is then encrypted and compared with a stored encrypted result previously stored on the electronic memory. Based upon this comparison, the tool can be fully enabled, fully disabled, or selectively enabled.
101 Citations
11 Claims
-
1. A method for authenticating electronic removable non-volatile memory in a handheld field maintenance tool, the method comprising:
-
applying a non-reversible algorithm to a unique software identifier on the memory to obtain a result;
encrypting the result;
comparing the encrypted result with a stored encrypted result stored on the memory; and
selectively enabling the tool based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of adding functionality to a handheld field maintenance tool, the method comprising:
-
accessing a software identifier on a non-volatile electronic memory in the tool;
receiving a user selection relative to the added functionality;
executing a non-reversible algorithm on the software identifier based on the user selection to obtain a result;
encrypting the result; and
storing the encrypted result on the non-volatile electronic memory.
-
-
9. A non-volatile electronic memory article comprising:
-
an unchangeable unique software identifier associated with the article;
a Identification Code file stored thereon, the file containing an encrypted result of executing a non-reversible algorithm on the software identifier. - View Dependent Claims (10, 11)
-
Specification