Memory card with embedded identifier
First Claim
Patent Images
1. A flash memory card, comprising:
- a unique identifier for the flash memory card that is persisted within hardware of the flash memory card, the unique identifier is utilized by an analysis component to generate a corresponding identifier for data to be transferred to the flash memory card; and
a flash memory cell that receives and stores the data and the corresponding identifier from the analysis component, the flash memory cell transfers the data and the corresponding identifier to a requesting entity if authentication is successful,wherein the authentication includes a first comparison, that employs the corresponding identifier, to allow the data to be at least one of copied, distributed or installed onto the requesting entity,the requesting entity performs a second comparison between the corresponding identifier and a disparate unique identifier associated with the requesting entity to prohibit the data to be at least one of transferred, viewed or installed from the requesting entity to a disparate entity, without employing the flash memory card,and the corresponding identifier is at least one of identical to, a hash of, or an encrypted version of the unique identifier persisted within the hardware of the flash memory card.
3 Assignments
0 Petitions
Accused Products
Abstract
A software installation system comprises an interface component that receives a request to access data resident upon a flash memory card. An installation component compares a unique identifier associated with the data with a unique identifier embedded within the flash memory card, and the installation component determines whether to allow access to the data based at least in part upon the comparison. The installation component prohibits access to the data if the unique identifier associated with the data does not match the unique identifier embedded within the flash memory card.
-
Citations
30 Claims
-
1. A flash memory card, comprising:
-
a unique identifier for the flash memory card that is persisted within hardware of the flash memory card, the unique identifier is utilized by an analysis component to generate a corresponding identifier for data to be transferred to the flash memory card; and a flash memory cell that receives and stores the data and the corresponding identifier from the analysis component, the flash memory cell transfers the data and the corresponding identifier to a requesting entity if authentication is successful, wherein the authentication includes a first comparison, that employs the corresponding identifier, to allow the data to be at least one of copied, distributed or installed onto the requesting entity, the requesting entity performs a second comparison between the corresponding identifier and a disparate unique identifier associated with the requesting entity to prohibit the data to be at least one of transferred, viewed or installed from the requesting entity to a disparate entity, without employing the flash memory card, and the corresponding identifier is at least one of identical to, a hash of, or an encrypted version of the unique identifier persisted within the hardware of the flash memory card. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system that facilitates reduction of piracy of data, comprising following components stored in a memory:
-
a receiver component that receives a request to transfer data to a flash memory card; and an analysis component that determines a unique identifier that is permanently embedded within hardware of the flash memory card, associates the data to be transferred to the flash memory card with a corresponding identifier that is at least one of identical to, a hash of, or an encrypted version of the unique identifier and transitions the corresponding identifier attached with the data to the flash memory card, wherein the unique identifier and the corresponding identifier are compared to facilitate authentication when the data is at least one of copied to, transferred to or installed on a first device from the flash memory card, and, after the data is at least one of copied to, transferred to or installed on the first device, the corresponding identifier is compared with a disparate identifier, embedded within hardware of the first device, to prohibit at least one of transfer, viewing or installation of the data on a second device from the first device, without utilizing the flash memory drive. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A software installation system, comprising following components stored in a memory:
-
an interface component that receives a request from a first computing device to access data resident upon a flash memory card; and an installation component that, in response to the request, determines an identifier associated with the data and a unique identifier associated with the flash memory card, the unique identifier is permanently embedded within hardware of the flash memory card and cannot be programmatically altered, the installation component compares the identifier with the unique identifier and at least one of transfers, copies or installs the data and the identifier associated with the data onto the first computing device if the comparison indicates that a predetermined relationship is satisfied, the predetermined relationship includes the identifier being at least one identical to, a hash of, or an encrypted version of the unique identifier, wherein the installation component denies distribution of the data from the first computing device to at least one second computing device, without utilizing the flash memory card, based in part on a disparate comparison between the identifier and a first identifier associated with the first computing device, the disparate comparison indicates that the data resides outside the flash memory card. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A method for tying data to a flash memory card, comprising:
-
permanently embedding a unique identifier into hardware; associating the hardware with flash memory; encapsulating the flash memory and the hardware into a common housing to form the flash memory card, the unique identifier identifies the flash memory card; storing data in the flash memory along with a corresponding identifier associated with the data, the corresponding identifier bears a predetermined relationship with the unique identifier, wherein the predetermined relationship includes the corresponding identifier being at least one of an identical copy of, a hash of, or an encrypted version of the unique identifier embedded into hardware of the flash memory card; at least one of copying or moving the data from the flash memory, to a first device, in response to a comparison between the unique identifier and the corresponding identifier indicating that the predetermined relationship is satisfied; determining that the data resides within the first device based in part on an analysis of the corresponding identifier and a disparate unique identifier associated with the first device; and prohibiting transfer of the data from the first device to a second device without employing the flash memory card, in response to determining that the data resides within the first device. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A method for determining whether to allow access to data on a flash memory card, comprising:
-
receiving a first request from a first device to access data that is resident upon the flash memory card; determining a unique identifier that is permanently embedded within hardware of the flash memory card; determining a unique identifier, associated with the data, that is generated by employing the unique identifier that is permanently embedded within hardware of the flash memory card; identifying that the data resides within the flash memory card by comparing the unique identifier that is permanently embedded within hardware of the flash memory card with the unique identifier that is associated with the data resident upon the flash memory card; at least one of transferring or installing the data on the first device, in response to the comparison indicating that the unique identifier permanently embedded within hardware of the flash memory card bears a predetermined relationship with the unique identifier associated with the data resident upon the flash memory card; receiving, at the first device, a second request from a second device to access the data that is at least one of transferred or installed on the first device; identifying that the data resides outside the flash memory card by comparing a first unique identifier that is permanently embedded within hardware of the first device with the unique identifier that is associated with the data; and prohibiting at least one of a transfer or installation of the data from the first device to the second device, without utilizing the flash memory card for the at least one of the transfer or installation, if the data resides outside the flash memory card, wherein the predetermined relationship includes the compared identifiers being at least one of an identical copy of, a hash of, or an encrypted version of each other. - View Dependent Claims (28, 29)
-
-
30. A computer readable storage medium comprising computer-executable instructions that, in response to execution by a system, cause the system to perform operations, comprising:
-
receiving a request to install a software on a first device, the software resides within a flash memory card; installing the software on the first device based on a comparison of a unique identifier permanently embedded within hardware of the flash memory card with a unique identifier that is associated with the software resident upon the flash memory card, wherein the unique identifier permanently embedded within hardware is at least one of an identical copy of, a hash of, or an encrypted version of the unique identifier that is associated with the software; in response to a request from a second device to the first device, comparing the unique identifier that is associated with the software with a disparate unique identifier permanently embedded within hardware of the first device; and denying installation of the software from the first device onto a second device based on the comparing, if the flash memory card is not utilized for at least one of the installation or a transfer of the software from the first device to the second device.
-
Specification