Supercharge Your Innovation With Domain-Expert AI Agents!

Autonomous memory checker for runtime security assurance and method therefore

A runtime and memory technology, applied in memory systems, error detection/correction, computer security devices, etc., can solve problems that cannot be verified

Inactive Publication Date: 2009-05-20
NXP USA INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The fact that the software is stored in different areas, and the software may also be received from many sources, some of which actually exist, and others which cannot be verified, can cause long-term tracking and security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Autonomous memory checker for runtime security assurance and method therefore
  • Autonomous memory checker for runtime security assurance and method therefore
  • Autonomous memory checker for runtime security assurance and method therefore

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following detailed description is exemplary only and is not intended to limit the invention, its application and uses. Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding technical field, background, brief summary and the following detailed description.

[0018] figure 1 is a block diagram of an automatic memory detector 10 according to one embodiment of the present invention. A host processor (not shown) first sets programmable parameters such as memory start address, length, direct memory access (DMA) read frequency, maximum burst size, and memory block enable. The host sends a command to the controller 25 of the automatic memory tester 10 via the host bus 50 to initiate the initial memory reference mode. In the initial memory reference mode, the controller 25 requests the DMA controller 15 to fetch memory contents via the DMA master bus 45 . The memory contents are trusted information. Authentication en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and apparatus for providing an automatic memory checker for runtime security assurance of electronic devices. An automatic memory detector includes a controller, a memory reference file coupled to the controller, and an authentication engine coupled to the controller. Detection is performed during runtime operation of the electronic device. The automatic memory detector generates run-time reference values ​​corresponding to trusted information stored in memory. The runtime reference value is compared to the memory reference value stored in the memory reference file. The memory reference value is generated from trusted information stored in the memory. An error signal is generated when the runtime reference value is different from the memory reference value, thereby indicating that the trusted information has been modified.

Description

technical field [0001] The present invention relates generally to security assurance for software, and more particularly, the present invention relates to hardware methods for adding security assurance to run-time software. Background technique [0002] Ensuring software code integrity of embedded systems is becoming an increasingly important security issue for embedded electronic devices. Numerous examples where it is advantageous to ensure the integrity of software stored in memory are Personal Digital Assistants (PDAs) and cell phones. Primarily, these devices utilize an internal microprocessor to execute instructions in two phases: boot time and run time. Trusted computer systems utilize encrypted software to authenticate each stage before executing the software. [0003] During boot time, the embedded processor executes basic hardware and software initialization instructions (boot code) stored in nonvolatile memory, such as electrically erasable read-only memory (such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/30G06F11/00H04L9/32
CPCG06F21/57Y10S707/99939G06F12/14G06F12/00H04L9/32G06F21/00
Inventor 劳伦斯·L·卡塞马克·D·雷德曼托马斯·E·特卡奇克乔尔·D·费尔德曼
Owner NXP USA INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More