18536003. MEMORY SYSTEM AND METHOD simplified abstract (Kioxia Corporation)
Contents
MEMORY SYSTEM AND METHOD
Organization Name
Inventor(s)
Hajime Matsui of Yokohama Kanagawa (JP)
MEMORY SYSTEM AND METHOD - A simplified explanation of the abstract
This abstract first appeared for US patent application 18536003 titled 'MEMORY SYSTEM AND METHOD
Simplified Explanation: The patent application describes a controller that can verify digital signatures of firmware updates using different signature schemes.
- The controller includes a CPU and an accelerator for signature verification.
- It can update firmware from one scheme to another and verify the new signature.
- The controller generates a new signature for the updated firmware and replaces the old signature.
- When booting the updated firmware, the controller verifies it using the new signature.
Key Features and Innovation:
- Ability to switch between different signature schemes for firmware updates.
- Efficient signature verification process using both CPU and accelerator.
- Seamless transition between firmware versions with different signature requirements.
Potential Applications:
- Secure software updates in IoT devices.
- Enhanced security in embedded systems.
- Protection against unauthorized firmware modifications.
Problems Solved:
- Ensures the authenticity and integrity of firmware updates.
- Simplifies the process of updating firmware with different signature schemes.
- Mitigates the risk of malware injection through firmware updates.
Benefits:
- Enhanced security for connected devices.
- Streamlined firmware update process.
- Reduced vulnerability to cyber attacks.
Commercial Applications: The technology can be applied in industries such as IoT, automotive, and industrial automation for secure and efficient firmware updates, enhancing overall system security and reliability.
Questions about the Technology: 1. How does the controller handle firmware updates with multiple signature schemes? 2. What are the potential challenges in implementing this technology in different types of devices?
Frequently Updated Research: Stay updated on advancements in digital signature verification methods and firmware security protocols to ensure the technology remains at the forefront of cybersecurity measures.
Original Abstract Submitted
According to one embodiment, a controller includes a CPU and an accelerator which performs signature verification using a first signature of a first scheme. When updating first firmware to second firmware to which a second signature of a second scheme is assigned, the controller performs the signature verification of the second firmware based on the second signature assigned to the second firmware by the CPU, generates the first signature for the second firmware, and replaces the second signature assigned to the second firmware with the generated first digital signature. When booting the second firmware, the controller performs the signature verification of the second firmware based on the first signature assigned to the second firmware by the accelerator.