17858568. PERFORMING SECURITY FUNCTIONS USING DEVICES HAVING EMBEDDED HARDWARE SECURITY MODULES simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

PERFORMING SECURITY FUNCTIONS USING DEVICES HAVING EMBEDDED HARDWARE SECURITY MODULES

Organization Name

Micron Technology, Inc.

Inventor(s)

Sourin Sarkar of Bangalore (IN)

PERFORMING SECURITY FUNCTIONS USING DEVICES HAVING EMBEDDED HARDWARE SECURITY MODULES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17858568 titled 'PERFORMING SECURITY FUNCTIONS USING DEVICES HAVING EMBEDDED HARDWARE SECURITY MODULES

Simplified Explanation

The patent application describes a system for enhancing the security of a vehicle by selecting primary and secondary devices to perform security functions.

  • The system includes a host processor that selects a first device with embedded hardware security module (HSM) as the primary device and a second device with embedded HSM as the secondary device.
  • The first device is associated with a first set of nodes in the vehicle, while the second device is associated with a second set of nodes.
  • The host processor monitors the devices and detects any failures based on signals received.
  • If a failure is detected in either the first or second device, the host processor initiates a remediation process to address the failure.
  • The patent application mentions that there are numerous other implementations of this system.

Potential applications of this technology include:

  • Automotive industry: This system can be used in vehicles to enhance their security by selecting and monitoring devices with embedded HSMs for performing security functions.
  • Transportation systems: The system can be applied to various transportation systems, such as trains or airplanes, to ensure the security of critical functions and nodes.
  • Internet of Things (IoT): The technology can be extended to IoT devices and networks to improve their security and protect against potential threats.


Original Abstract Submitted

In some implementations, a host processor associated with a vehicle may select, from a plurality of devices that are configured to communicate with the host processor for performing security functions, a first device to serve as a primary device and a second device to serve as a secondary device. The first device may include a first memory with an embedded hardware security module and may be associated with a first set of nodes of the vehicle. The second device may include a second memory with an embedded hardware security module and may be associated with a second set of nodes of the vehicle. The host processor may determine, based on a signal, a failure associated with the first device or the second device. The host processor may initiate a remediation process based on the failure associated with the first device or the second device. Numerous other implementations are described.