17898375. PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT simplified abstract (Micron Technology, Inc.)
PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT
Organization Name
Inventor(s)
PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT - A simplified explanation of the abstract
This abstract first appeared for US patent application 17898375 titled 'PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT
Simplified Explanation
The patent application describes a device with a storage device that generates a public key and private key, and a secure environment with a controller that communicates with the storage device to validate its identity before issuing commands.
- The device includes a storage device with a physically unclonable function (PUF) that generates a public key and private key.
- The secure environment includes a controller that sends a nonce value to the storage device.
- The storage device responds with a unique identifier (UID) and a digital signature generated using the UID and nonce value.
- The controller validates the digital signature using the storage device's public key before issuing commands to the storage device.
Potential applications of this technology:
- Secure data storage
- Authentication and access control systems
- Secure communication protocols
Problems solved by this technology:
- Unauthorized access to sensitive data
- Data tampering and manipulation
- Identity theft and impersonation
Benefits of this technology:
- Enhanced security and protection of data
- Secure communication and transactions
- Prevention of unauthorized access and tampering
Original Abstract Submitted
In some aspects, the techniques described herein relate to a device including: a storage device, the storage device including a first physically unclonable function (PUF) and configured to generate a storage device public key and a storage device private key; and a secure environment, the secure environment including a controller configured for: transmitting a nonce value to the storage device; receiving a response from the storage device, the response including a unique identifier (UID) and a digital signature, the digital signature generated using the UID and the nonce value; validating the digital signature using a public key of the storage device; and issuing a command to the storage device after validating the digital signature.