Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for securing data

A technology for protecting data and data, applied in memory systems, digital data protection, electronic digital data processing, etc., can solve problems such as software is vulnerable to attack or damage, complex interaction is unrealistic, and data cannot be accessed without restriction

Active Publication Date: 2017-08-15
NVIDIA CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is not practical to use security software to implement the various algorithms and complex interactions that might be expected with operating system software
Because the content provider has no control over what the software does, and such software is vulnerable to attack or corruption, unrestricted access to protected data cannot be made against it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for securing data
  • Systems and methods for securing data
  • Systems and methods for securing data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] figure 1 A method 100 for securing data according to one embodiment is shown. As shown, a request to read data from memory is received. See operation 102. Also, it is determined whether data is stored in a predetermined portion of the memory. See operation 104 . If it is determined that the data is stored in the predetermined portion of the memory, the data and the protection signal are returned for use in protecting the data. See operation 106.

[0012] Memory may include any type of memory. For example, in various embodiments, the memory may include, but not limited to, one or more of the following: flash memory (such as NOR flash memory, NAND flash memory, etc.), random access memory (such as RAM, SRAM, DRAM, SDRAM, eDRAM , Embedded DRAM, MRAM, ST-MRAM, STT-MRAM, PRAM, PCRAM, etc.), Phase Change Memory, FeRAM, FRAM, PRAM, MRAM, Solid State Disk (SSD) and / or any other type of memory.

[0013] Additionally, in one embodiment, the memory may include dynamic rando...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods for securing data are provided. In operation, a request to read data from memory is received. Also, it is determined whether data is stored in a predetermined portion of the memory. If it is determined that the data is stored in a predetermined portion of the memory, the data and the protection signal are returned for use in protecting the data. In some embodiments of the invention, the data stored in the predetermined portion of memory may be further processed and written back to the predetermined portion of memory. In other embodiments of the invention, such processing may involve unprotected data stored outside a predetermined portion of memory.

Description

technical field [0001] The present invention relates to data protection, and more particularly, to protected memory regions. Background technique [0002] Computer systems are frequently used to view or display media and other data that must be protected from copying and other unauthorized access. Traditionally, computer systems have kept protected data secure through encryption. However, in order to view or display the data, it must be decrypted and may require additional processing. Decrypted data is vulnerable to copying and other unauthorized access of system equipment or software. Certain prior art systems restrict access to designated portions of memory to keep clients (eg, displays) secure. However, advanced algorithms for decoding, synthesis or other processing of protected data require access to multiple devices, some of which may be programmable or capable of copying data. It is expected that user applications, operating system vendors, and third-party software...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/78
CPCG06F21/6218G06F21/78G06F21/85G06F12/1458G06F12/1441G06F21/60
Inventor 杰伊·基肖尔·古普塔杰·S·黄史蒂文·E·莫尔纳帕塔萨拉蒂·西拉姆詹姆士·勒罗伊·德明
Owner NVIDIA CORP