Autonomous memory checker for runtime security assurance and method therefore
A runtime and memory technology, applied in memory systems, error detection/correction, computer security devices, etc., can solve problems that cannot be verified
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The following detailed description is exemplary only and is not intended to limit the invention, its application and uses. Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding technical field, background, brief summary and the following detailed description.
[0018] figure 1 is a block diagram of an automatic memory detector 10 according to one embodiment of the present invention. A host processor (not shown) first sets programmable parameters such as memory start address, length, direct memory access (DMA) read frequency, maximum burst size, and memory block enable. The host sends a command to the controller 25 of the automatic memory tester 10 via the host bus 50 to initiate the initial memory reference mode. In the initial memory reference mode, the controller 25 requests the DMA controller 15 to fetch memory contents via the DMA master bus 45 . The memory contents are trusted information. Authentication en...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com