18433095. MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC

Organization Name

Micron Technology, Inc.

Inventor(s)

JEREMY Chritz of SEATTLE WA (US)

DAVID Hulton of SEATTLE WA (US)

MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC - A simplified explanation of the abstract

This abstract first appeared for US patent application 18433095 titled 'MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC

Simplified Explanation

The patent application describes systems and methods for generating access codes for memory regions of a memory device using authentication logic, and for accessing the memory device using these access codes.

  • Memory controller and/or memory device generate access codes for memory regions
  • Host computing device includes access codes in memory access requests
  • Data read or written at the memory device can only be accessed with the correct access codes
  • Access codes are updated periodically or based on a counter value

Potential Applications

This technology could be applied in secure data storage devices, military communication systems, and financial institutions where data security is crucial.

Problems Solved

This technology solves the problem of unauthorized access to specific memory regions of a memory device, providing enhanced security for sensitive data.

Benefits

The benefits of this technology include improved data security, protection of sensitive information, and controlled access to memory regions.

Potential Commercial Applications

The potential commercial applications of this technology include secure storage devices, encrypted communication systems, and secure financial transactions.

Possible Prior Art

One possible prior art could be systems using encryption keys for data security in memory devices.

Unanswered Questions

How does this technology compare to existing memory access control methods?

This article does not provide a direct comparison to existing memory access control methods, leaving the reader to wonder about the specific advantages of this new approach.

What are the specific technical requirements for implementing this system in different memory devices?

The article does not delve into the technical specifications or requirements for implementing this system in various memory devices, leaving a gap in understanding the practical aspects of its deployment.


Original Abstract Submitted

Examples of systems and method described herein or generating, in a memory controller and/or memory device, access codes for memory regions of the memory device using authentication logic, and for accessing the memory device using the access codes. For example, a memory controller and/or a coupled memory device may generate access codes that a host computing device may include in a memory access request to access one or more memory regions of the memory device. Data read or written at the memory device may in some examples only be accessed in accordance with the access codes for memory regions of the memory device. Accordingly, the systems and methods described herein may provide security for specific memory regions of a memory device because the access code are updated periodically (e.g., based on obtained reset indication) or in accordance with an updated count value from a counter.