17829920. POWER EFFICIENT CODEWORD SCRAMBLING IN A NON-VOLATILE MEMORY DEVICE simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

POWER EFFICIENT CODEWORD SCRAMBLING IN A NON-VOLATILE MEMORY DEVICE

Organization Name

Micron Technology, Inc.

Inventor(s)

Eyal En Gad of Santa Clara CA (US)

Zhengang Chen of San Jose CA (US)

Yoav Weinberg of Toronto (CA)

POWER EFFICIENT CODEWORD SCRAMBLING IN A NON-VOLATILE MEMORY DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17829920 titled 'POWER EFFICIENT CODEWORD SCRAMBLING IN A NON-VOLATILE MEMORY DEVICE

Simplified Explanation

The abstract describes a patent application for a processing device in a memory sub-system that performs memory access operations using a randomized string generated from a hashed seed.

  • The processing device receives a request to perform a memory access operation on a memory device.
  • It determines a memory segment identifier associated with the memory access operation.
  • A hash function is applied to the memory segment identifier to generate a hashed seed.
  • The hashed seed is provided to a pseudo-random number generator.
  • The pseudo-random number generator generates a randomized string.
  • The memory access operation is performed on the memory device using the randomized string.

Potential Applications

  • This technology can be applied in various memory sub-systems, such as computer systems, servers, and data centers.
  • It can be used in any application that requires memory access operations, including data storage, retrieval, and processing.

Problems Solved

  • This technology solves the problem of predictable memory access patterns, which can be exploited by malicious actors.
  • By generating a randomized string, it adds an additional layer of security to memory access operations, making it harder for attackers to predict and exploit.

Benefits

  • Improved security: The use of randomized strings makes it more difficult for attackers to predict and exploit memory access operations.
  • Enhanced privacy: The randomized strings add an extra level of privacy by making it harder for unauthorized users to access and manipulate memory data.
  • Increased performance: By randomizing memory access operations, this technology can potentially improve overall system performance by distributing memory requests more evenly.


Original Abstract Submitted

A processing device in a memory sub-system receives a request to perform a memory access operation on a memory device, determines a memory segment identifier associated with the memory access operation, and applies a hash function to the memory segment identifier to generate a hashed seed. The processing device further provides the hashed seed to a pseudo-random number generator to generate a randomized string, and performs the memory access operation on the memory device using the randomized string.