18510881. MEMORY DEVICE, OPERATION METHOD OF MEMORY DEVICE, AND AUTHENTICATION SYSTEM OF MEMORY DEVICE simplified abstract (Samsung Electronics Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

MEMORY DEVICE, OPERATION METHOD OF MEMORY DEVICE, AND AUTHENTICATION SYSTEM OF MEMORY DEVICE

Organization Name

Samsung Electronics Co., Ltd.

Inventor(s)

Younsung Chu of Suwon-si (KR)

Jisoo Kim of Suwon-si (KR)

MEMORY DEVICE, OPERATION METHOD OF MEMORY DEVICE, AND AUTHENTICATION SYSTEM OF MEMORY DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18510881 titled 'MEMORY DEVICE, OPERATION METHOD OF MEMORY DEVICE, AND AUTHENTICATION SYSTEM OF MEMORY DEVICE

Simplified Explanation

The system described in the abstract is a security system that verifies the integrity of firmware components in a computing device.

  • Memory device with interface for receiving measurement value generation request signal and transmitting measurement values to host
  • Attester firmware for receiving measurement values for multiple firmware pieces
  • Bootloader for booting process
  • First register for recording bootloader measurement value
  • Second register for recording attester firmware measurement value
  • Host with processing circuitry for determining falsification based on measurement values and reference values

Potential Applications

The technology can be applied in secure boot processes for computers, servers, and other electronic devices to ensure the integrity of firmware components.

Problems Solved

This technology addresses the issue of unauthorized modifications to firmware components, which can compromise the security and functionality of a computing device.

Benefits

- Enhanced security through firmware integrity verification - Protection against malware and unauthorized access - Reliable boot process for computing devices

Potential Commercial Applications

"Secure Boot Verification System for Electronic Devices" can be used in industries such as cybersecurity, data centers, and IoT devices to ensure the trustworthiness of firmware components.

Possible Prior Art

One possible prior art could be the Trusted Platform Module (TPM) technology, which also focuses on secure boot processes and firmware integrity verification.

What is the impact of this technology on cybersecurity in the IoT industry?

This technology can significantly enhance cybersecurity in the IoT industry by ensuring that only trusted firmware components are loaded during the boot process, reducing the risk of unauthorized access and data breaches.

How does this technology compare to traditional firmware verification methods?

This technology offers a more robust and automated approach to firmware verification compared to traditional methods, providing a higher level of security and reliability in the boot process of electronic devices.


Original Abstract Submitted

Provided is a system including a memory device including an interface configured to receive a measurement value generation request signal from a host and transmit a first measurement value and a second measurement value to the host, attester firmware configured to receive measurement values for a plurality of pieces of firmware, a bootloader configured to perform booting, a first register configured to record a first measurement value of the bootloader, and a second register configured to record a second measurement value for the attester firmware in response to the first measurement value being recorded, and the host including processing circuitry configured to receive the first measurement value and the second measurement value, and determine whether to falsify the bootloader or the attester firmware based on at least one of (1) the first measurement value and first reference values or (2) the second measurement value and second refence values.