17831370. VERIFIED KEY REPLACEMENT IN SECURE MEMORY DEVICES simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

VERIFIED KEY REPLACEMENT IN SECURE MEMORY DEVICES

Organization Name

Micron Technology, Inc.

Inventor(s)

Zhan Liu of Cupertino CA (US)

VERIFIED KEY REPLACEMENT IN SECURE MEMORY DEVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17831370 titled 'VERIFIED KEY REPLACEMENT IN SECURE MEMORY DEVICES

Simplified Explanation

The patent application describes a method for delivering cryptographic data to secure memory devices.

  • The method involves receiving a command by a memory device, which includes a public key and a hash of a unique device secret (UDS).
  • The memory device generates a local UDS using the public key and a locally stored private key.
  • It then generates a local UDS hash by inputting the local UDS into a hashing algorithm.
  • The memory device determines whether the local UDS hash matches the hash included in the command.
  • If there is a match, the memory device writes the public key to a key storage area.
  • If there is no match, the memory device returns a failure response.

Potential Applications:

  • This technology can be applied in various secure memory devices, such as smart cards, secure USB drives, or secure embedded systems.
  • It can be used in systems that require secure storage and retrieval of cryptographic data, such as authentication systems, secure communication systems, or secure payment systems.

Problems Solved:

  • The method ensures the secure delivery of cryptographic data to memory devices by verifying the integrity of the received data.
  • It prevents unauthorized access to the memory device by ensuring that only valid commands with matching hashes are processed.

Benefits:

  • The method provides a secure and efficient way to deliver cryptographic data to memory devices.
  • It enhances the security of memory devices by verifying the integrity of the received data.
  • It simplifies the process of storing and retrieving cryptographic keys in memory devices.


Original Abstract Submitted

The disclosure relates to improvements in the delivery of cryptographic data to secure memory devices. In some aspects, the techniques described herein relate to a method including: receiving, by a memory device, a command, the command including a public key and a hash of a unique device secret (UDS); generating, by the memory device, a local UDS using the public key and a locally stored private key; generating, by the memory device, a local UDS hash by inputting the local UDS into a hashing algorithm; determining, by the memory device, whether the local UDS hash matches the hash included in the command; writing, by the memory device, the public key to a key storage area if the local UDS hash matches the hash included in the command; and returning, by the memory device, a failure response if the local UDS hash does not match the hash included in the command.