Systems and methods for securing data
A technology for protecting data and data, applied in memory systems, digital data protection, electronic digital data processing, etc., can solve problems such as software is vulnerable to attack or damage, complex interaction is unrealistic, and data cannot be accessed without restriction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] figure 1 A method 100 for securing data according to one embodiment is shown. As shown, a request to read data from memory is received. See operation 102. Also, it is determined whether data is stored in a predetermined portion of the memory. See operation 104 . If it is determined that the data is stored in the predetermined portion of the memory, the data and the protection signal are returned for use in protecting the data. See operation 106.
[0012] Memory may include any type of memory. For example, in various embodiments, the memory may include, but not limited to, one or more of the following: flash memory (such as NOR flash memory, NAND flash memory, etc.), random access memory (such as RAM, SRAM, DRAM, SDRAM, eDRAM , Embedded DRAM, MRAM, ST-MRAM, STT-MRAM, PRAM, PCRAM, etc.), Phase Change Memory, FeRAM, FRAM, PRAM, MRAM, Solid State Disk (SSD) and / or any other type of memory.
[0013] Additionally, in one embodiment, the memory may include dynamic rando...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


