17850606. DETECTING INFORMATION MODIFICATION IN A MEMORY SYSTEM simplified abstract (MICRON TECHNOLOGY, INC.)

From WikiPatents
Jump to navigation Jump to search

DETECTING INFORMATION MODIFICATION IN A MEMORY SYSTEM

Organization Name

MICRON TECHNOLOGY, INC.

Inventor(s)

James Ruane of San Jose CA (US)

Jeffrey Lee Munsil of Fort Collins CO (US)

DETECTING INFORMATION MODIFICATION IN A MEMORY SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 17850606 titled 'DETECTING INFORMATION MODIFICATION IN A MEMORY SYSTEM

Simplified Explanation

The patent application describes methods, systems, and devices for detecting information modification in a memory system. Here is a simplified explanation of the abstract:

  • The system generates a first value (e.g., a hash value) from information stored in a storage component.
  • It then generates a second value (e.g., another hash value) from the content stored in the same storage component.
  • The system compares the second value to the first value.
  • Based on this comparison, the system determines whether the information has been modified.
  • It then performs one or more operations based on the modification status.

Potential Applications:

  • Data integrity verification in computer systems and networks.
  • Detection of unauthorized modifications in databases or file systems.
  • Protection against tampering or data corruption in cloud storage or distributed systems.

Problems Solved:

  • Ensures the integrity and authenticity of stored information.
  • Detects any unauthorized modifications or tampering attempts.
  • Provides a mechanism to verify the integrity of data in a memory system.

Benefits:

  • Enhances data security by detecting and preventing unauthorized modifications.
  • Provides a reliable method for verifying the integrity of stored information.
  • Can be applied to various memory systems and storage components.


Original Abstract Submitted

Methods, systems, and devices for detecting information modification in a memory system are described. A system may generate a first value, such as a first hash value, from information stored in storage component. The system may then generate a second value, such as a second hash value, from content stored in the storage component. After generating the second value, the system may compare the second value to the first value. The system may then determine the modification status of the information based on the comparison, and implement one or more operations based on the modification status.