Memory card hidden command protocol
First Claim
Patent Images
1. A method comprising:
- receiving a memory access command, the memory access command including an address field and a data field;
comparing at least a portion of the data field to a predetermined data value to determine if there is a match;
if there is not a match, performing a memory access according to the memory access command; and
if there is a match, diverting the memory access command for further interpretation.
1 Assignment
0 Petitions
Accused Products
Abstract
A memory card compatible token includes non-memory components accessed using commands hidden in the data stream of a memory card access command. A mobile computing device such as a mobile phone accesses the non-memory components by writing to a specific address, including a known data value in the data stream, or both. The token may be activated using an activation code, and a subsequently chosen password may be used to authenticate the mobile computing device to the token each time a hidden command is issued.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a memory access command, the memory access command including an address field and a data field; comparing at least a portion of the data field to a predetermined data value to determine if there is a match; if there is not a match, performing a memory access according to the memory access command; and if there is a match, diverting the memory access command for further interpretation. - View Dependent Claims (2, 3, 4)
-
-
5. An article having a machine readable medium with instructions stored thereon that when accessed result in a machine:
comparing data received with a memory write command to a predetermined data value to determine whether the memory write command should be interpreted as a memory write command or whether the memory write command should be interpreted as a command other than a memory write command. - View Dependent Claims (6, 7)
- 8. A method comprising populating fields in a memory write command to be sent to a memory card interface by populating at least a first portion of a data field with a data pattern to identify the memory write command as a command to be diverted for purposes other than a memory write.
-
14. An article having a machine readable medium with instructions stored thereon that when accessed result in a mobile computing device:
accessing a non-memory control function in a device coupled to a memory card interface of the mobile computing device by populating a data field of a memory card write command with a data pattern to identify the memory card write command as a command to be diverted for a purpose other than a memory write. - View Dependent Claims (15, 16, 17)
-
18. A method comprising:
-
receiving, at a non-memory control component in a memory card compatible device, an activation code in a data field of a memory write command; comparing the activation code to a known value to detect a match; and if there is a match, requesting a password to be used in subsequent authentications to the non-memory control component in a memory card compatible device. - View Dependent Claims (19, 20)
-
Specification