17831364. ERROR REDUCTION DURING CRYPTOGRAPHIC KEY UPDATES IN SECURE MEMORY DEVICES simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

ERROR REDUCTION DURING CRYPTOGRAPHIC KEY UPDATES IN SECURE MEMORY DEVICES

Organization Name

Micron Technology, Inc.

Inventor(s)

Zhan Liu of Cupertino CA (US)

ERROR REDUCTION DURING CRYPTOGRAPHIC KEY UPDATES IN SECURE MEMORY DEVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17831364 titled 'ERROR REDUCTION DURING CRYPTOGRAPHIC KEY UPDATES IN SECURE MEMORY DEVICES

Simplified Explanation

The patent application describes a system for securely delivering cryptographic keys to memory devices. The system includes a memory device with a key storage area, a key management server (KMS), and a manufacturer computing device.

  • The KMS receives a key request and generates a cryptographic key.
  • The KMS computes a hash of the cryptographic key and returns both the key and the hash in response to the request.
  • The manufacturer computing device receives the key and hash and sends a command to the memory device.
  • The memory device computes a local hash using the key in the command.
  • The memory device compares the local hash to the received hash.
  • If the local hash matches the received hash, the memory device writes the cryptographic key to the key storage area.

Potential applications of this technology:

  • Secure delivery of cryptographic keys to memory devices.
  • Enhancing the security of memory devices by ensuring the integrity of the received keys.

Problems solved by this technology:

  • Ensuring the secure delivery of cryptographic keys to memory devices.
  • Verifying the integrity of the received keys.

Benefits of this technology:

  • Improved security for memory devices.
  • Protection against unauthorized access to cryptographic keys.
  • Simplified and efficient key delivery process.


Original Abstract Submitted

The disclosure relates to improvements in key delivery to secure memory devices. In some implementations, the techniques described herein relate to a system including: a memory device including a key storage area; a key management server (KMS) configured to receive a key request, generate a cryptographic key, compute a hash of the cryptographic key, and return the cryptographic key and the hash in response to the key request; and a manufacturer computing device configured to receive the cryptographic key and the hash as part of the response to the key request and issue a command including the cryptographic key and the hash to the memory device, wherein the memory device is configured to compute a local hash using the cryptographic key in the command, compare the local hash to the hash, and write the cryptographic key to the key storage area when the local hash matches the hash.