Jump to content

17823450. Dynamic Address Scramble simplified abstract (Micron Technology, Inc.)

From WikiPatents

Dynamic Address Scramble

Organization Name

Micron Technology, Inc.

Inventor(s)

Erik T. Barmon of Boise ID (US)

Yang Lu of Boise ID (US)

Nathaniel J. Meier of Boise ID (US)

Kang-Yong Kim of Boise ID (US)

Dynamic Address Scramble - A simplified explanation of the abstract

This abstract first appeared for US patent application 17823450 titled 'Dynamic Address Scramble

Simplified Explanation

The patent application describes apparatuses and methods for loading different address scramble patterns on memory devices, which can help prevent malicious actors from discovering the layout of a particular memory device.

  • Memory devices can load different address scramble patterns on memory dies to prevent usage-based disturb attacks.
  • Address scramble patterns may include logical-to-physical conversion of rows in the memory device or memory dies.
  • The address scrambles can be changed at different intervals, such as after a power reset or when the data stored on the memory device is invalid, not current, flushable, or erasable.
    • Potential Applications:**
  • Memory devices in computer systems
  • Data storage devices
  • Security systems
    • Problems Solved:**
  • Preventing malicious actors from discovering the layout of memory devices
  • Enhancing security of memory devices
  • Protecting data stored on memory devices
    • Benefits:**
  • Increased security against usage-based disturb attacks
  • Enhanced protection for sensitive data
  • Improved reliability of memory devices


Original Abstract Submitted

Described apparatuses and methods enable a system including at least one memory device to load different address scramble patterns on dies of the memory device. The address scramble patterns may include the logical-to-physical conversion of rows in the memory device or the memory dies. In aspects, the apparatuses and methods can change the address scrambles at different intervals, such as after a power reset or when the data stored on the memory device is invalid, not current, flushable, or erasable. The described aspects may reduce effectiveness of usage-based disturb attacks used by malicious actors to discover a layout of a type of particular memory device or memory die.

(Ad) Transform your business with AI in minutes, not months

Custom AI strategy tailored to your specific industry needs
Step-by-step implementation with measurable ROI
5-minute setup that requires zero technical skills
Get your AI playbook

Trusted by 1,000+ companies worldwide

Cookies help us deliver our services. By using our services, you agree to our use of cookies.