Read and write optimization for protected area of memory
First Claim
1. A method in an authorized computer application program for optimizing access of content stored in a secure area of a secure digital (SD) memory, without performing a separate authenticated key exchange for each access to the secure area, the method comprising:
- performing a first authenticated key exchange to access the secure area of the secure digital memory;
in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of secure content from the secure area of the secure digital memory into a main memory of a computer system for access by the authorized computer application program, without performing additional authenticated key exchange operations for each of the performed plurality of read operations;
also in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of user content from a user area of the secure digital memory;
modifying, while the secure content is in the main memory, the secure content previously read into the main memory of the computer system from the secure area of the secure digital memory;
performing a second authenticated key exchange to access the secure area of the secure digital card in preparation to write to the secure area of the secure digital memory;
in response to successful performance of the second authenticated key exchange, performing a plurality of write operations to write the modified secure content back to the secure area of the secure digital memory without performing additional authenticated key exchange operations for each of the performed plurality of write operations; and
also in response to successful performance of the second authenticated key exchange, performing a plurality of write operations of user content to the user area of the secure digital memory.
3 Assignments
0 Petitions
Accused Products
Abstract
A system (and method) to update content of a secure area of a secure digital (SD) card is disclosed. The system performs a first authenticated key exchange to access the secure area of the secure digital memory. The system reads content from the secure area in response to successful performance of the first authenticated key exchange. The system modifies the content in a memory of a computer system. The system performs a second authenticated key exchange to access the secure area of the secure digital card in preparation to write to the secure area of the secure digital memory. The system then writes modified content to the secure area of the secure digital memory in response to successful performance of the second authenticated key exchange.
-
Citations
9 Claims
-
1. A method in an authorized computer application program for optimizing access of content stored in a secure area of a secure digital (SD) memory, without performing a separate authenticated key exchange for each access to the secure area, the method comprising:
-
performing a first authenticated key exchange to access the secure area of the secure digital memory; in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of secure content from the secure area of the secure digital memory into a main memory of a computer system for access by the authorized computer application program, without performing additional authenticated key exchange operations for each of the performed plurality of read operations; also in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of user content from a user area of the secure digital memory; modifying, while the secure content is in the main memory, the secure content previously read into the main memory of the computer system from the secure area of the secure digital memory; performing a second authenticated key exchange to access the secure area of the secure digital card in preparation to write to the secure area of the secure digital memory; in response to successful performance of the second authenticated key exchange, performing a plurality of write operations to write the modified secure content back to the secure area of the secure digital memory without performing additional authenticated key exchange operations for each of the performed plurality of write operations; and also in response to successful performance of the second authenticated key exchange, performing a plurality of write operations of user content to the user area of the secure digital memory. - View Dependent Claims (2, 3)
-
-
4. A non-transitory computer readable storage medium comprising instructions that, when executed, cause at least one processor to:
-
perform a first authenticated key exchange to access a secure area of a secure digital memory; in response to successful performance of the first authenticated key exchange, perform a plurality of read operations to read secure content from the secure area of the secure digital memory into a main memory of a computer system, without performing additional authenticated key exchange operations for each of the performed plurality of read operations; also in response to successful performance of the first authenticated key exchange, performing a plurality of write operations of user content from a user area of the secure digital memory; modify, while the secure content is in the main memory, the secure content previously read into the main memory of the computer system from the secure area of the secure digital memory; perform a second authenticated key exchange to access the secure area of the secure digital card in preparation to write to the secure area of the secure digital memory; in response to successful performance of the second authenticated key exchange, perform a plurality of write operations write the modified secure content back to the secure area of the secure digital memory, without performing additional authenticated key exchange operations for each of the performed plurality of write operations; and also in response to successful performance of the second authenticated key exchange, performing a plurality of write operations of user content from a user area of the secure digital memory; - View Dependent Claims (5, 6)
-
-
7. A computing system configured to optimize access of content stored in a secure area of a secure digital (SD) memory, without performing a separate authenticated key exchange for each access to the secure area, the system comprising:
-
a memory; and a processor, the processor configured to; perform a first authenticated key exchange to access the secure area of the secure digital memory; in response to successful performance of the first authenticated key exchange, perform a plurality of read operations to read secure content from the secure area of the secure digital memory into the memory of a computer system, without performing additional authenticated key exchange operations for each of the performed plurality of read operations; also in response to successful performance of the first authenticated key exchange, performing a plurality of read operations of user content from a user area of the secure digital memory; modify, while the secure content is in the memory, the secure content previously read into the memory; perform a second authenticated key exchange to access the secure area of the secure digital card in preparation to write to the secure area of the secure digital memory; in response to successful performance of the second authenticated key exchange, perform a plurality of write operations to write the modified secure content from the memory back to the secure area of the secure digital memory without performing additional authenticated key exchange operations for each of the performed plurality of write operations; and also in response to successful performance of the second authenticated key exchange, perform a plurality of write operations of user content to the user area of the secure digital memory. - View Dependent Claims (8, 9)
-
Specification