17898375. PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT

Organization Name

Micron Technology, Inc.

Inventor(s)

Zhan Liu of Cupertino CA (US)

PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17898375 titled 'PREVENTING REPLACEMENT AND CLONE ATTACKS USING A SECURE PROCESSING ENVIRONMENT

Simplified Explanation

The patent application describes a device with a storage device that generates a public key and private key, and a secure environment with a controller that communicates with the storage device to validate its identity before issuing commands.

  • The device includes a storage device with a physically unclonable function (PUF) that generates a public key and private key.
  • The secure environment includes a controller that sends a nonce value to the storage device.
  • The storage device responds with a unique identifier (UID) and a digital signature generated using the UID and nonce value.
  • The controller validates the digital signature using the storage device's public key before issuing commands to the storage device.

Potential applications of this technology:

  • Secure data storage
  • Authentication and access control systems
  • Secure communication protocols

Problems solved by this technology:

  • Unauthorized access to sensitive data
  • Data tampering and manipulation
  • Identity theft and impersonation

Benefits of this technology:

  • Enhanced security and protection of data
  • Secure communication and transactions
  • Prevention of unauthorized access and tampering


Original Abstract Submitted

In some aspects, the techniques described herein relate to a device including: a storage device, the storage device including a first physically unclonable function (PUF) and configured to generate a storage device public key and a storage device private key; and a secure environment, the secure environment including a controller configured for: transmitting a nonce value to the storage device; receiving a response from the storage device, the response including a unique identifier (UID) and a digital signature, the digital signature generated using the UID and the nonce value; validating the digital signature using a public key of the storage device; and issuing a command to the storage device after validating the digital signature.