Micron technology, inc. (20240176916). MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC simplified abstract

From WikiPatents
Jump to navigation Jump to search

MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC

Organization Name

micron technology, inc.

Inventor(s)

JEREMY Chritz of SEATTLE WA (US)

DAVID Hulton of SEATTLE WA (US)

MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240176916 titled 'MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF GENERATING ACCESS CODES FOR MEMORY REGIONS USING AUTHENTICATION LOGIC

Simplified Explanation

The patent application describes systems and methods for generating access codes for memory regions of a memory device using authentication logic, and for accessing the memory device using these access codes.

  • Memory controller and/or memory device generate access codes for memory regions
  • Host computing device includes access codes in memory access requests
  • Data read or written at the memory device can only be accessed with the correct access codes
  • Access codes are updated periodically or based on a counter value

Potential Applications

This technology could be applied in secure data storage systems, access control systems, and secure communication protocols.

Problems Solved

This technology addresses the issue of unauthorized access to specific memory regions of a memory device, providing enhanced security for sensitive data.

Benefits

The use of access codes for memory regions improves data security and confidentiality, ensuring that only authorized users can access specific memory areas.

Potential Commercial Applications

This technology could be valuable in industries such as cybersecurity, data storage, cloud computing, and IoT devices.

Possible Prior Art

One possible prior art could be the use of encryption keys to secure data in memory devices. Another could be the use of access control lists to restrict access to specific memory regions.

=== What are the specific authentication logic methods used in generating access codes? The specific authentication logic methods used in generating access codes are not detailed in the abstract.

=== How frequently are the access codes updated in the described systems and methods? The abstract mentions that access codes are updated periodically, but it does not specify the exact frequency of these updates.


Original Abstract Submitted

examples of systems and method described herein or generating, in a memory controller and/or memory device, access codes for memory regions of the memory device using authentication logic, and for accessing the memory device using the access codes. for example, a memory controller and/or a coupled memory device may generate access codes that a host computing device may include in a memory access request to access one or more memory regions of the memory device. data read or written at the memory device may in some examples only be accessed in accordance with the access codes for memory regions of the memory device. accordingly, the systems and methods described herein may provide security for specific memory regions of a memory device because the access code are updated periodically (e.g., based on obtained reset indication) or in accordance with an updated count value from a counter.