×

Read and write optimization for protected area of memory

  • US 8,775,827 B2
  • Filed: 03/28/2011
  • Issued: 07/08/2014
  • Est. Priority Date: 03/28/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method in an authorized computer application program for optimizing access of content stored in a secure area of a secure digital (SD) memory, without performing a separate authenticated key exchange for each access to the secure area, the method comprising:

  • performing a first authenticated key exchange to access the secure area of the secure digital memory;

    in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of secure content from the secure area of the secure digital memory into a main memory of a computer system for access by the authorized computer application program, without performing additional authenticated key exchange operations for each of the performed plurality of read operations;

    also in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of user content from a user area of the secure digital memory;

    modifying, while the secure content is in the main memory, the secure content previously read into the main memory of the computer system from the secure area of the secure digital memory;

    performing a second authenticated key exchange to access the secure area of the secure digital card in preparation to write to the secure area of the secure digital memory;

    in response to successful performance of the second authenticated key exchange, performing a plurality of write operations to write the modified secure content back to the secure area of the secure digital memory without performing additional authenticated key exchange operations for each of the performed plurality of write operations; and

    also in response to successful performance of the second authenticated key exchange, performing a plurality of write operations of user content to the user area of the secure digital memory.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×