×

Storage device tampering detection

  • US 9,984,256 B2
  • Filed: 05/15/2014
  • Issued: 05/29/2018
  • Est. Priority Date: 05/15/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method of detecting a counterfeit storage device, the method comprising:

  • printing a first identifier value associated with a first characteristic of the storage device on an external surface of a housing of the storage device;

    electronically storing a second identifier value associated with a second characteristic of the storage device in a memory of the storage device supported by the housing;

    storing one or more dummy identifier values on one or more of the external surface of the housing or the memory, each of the dummy identifier values associated with an additional characteristic of the storage device;

    combining the first and second identifier values in a predetermined order to form a combined identifier value;

    generating a digital signature of the combined identifier value using a private key of a public/private key pair;

    storing the digital signature on the storage device by performing at least a selected one of printing the digital signature to the external surface of the housing or electronically storing the digital signature in the memory;

    subsequently retrieving from the storage device and storing, in a verification device memory, the first identifier value, the second identifier value, the digital signature and each of the one or more dummy identifier values;

    using a verification device processor circuit to combine the first and second identifier values from the verification device memory in the predetermined order to form a retrieved combined identifier value; and

    authenticating the storage device using the retrieved combined identifier value, the retrieved digital signature and a public key of the public/private key pair.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×