Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for securing content with different domain-specific keys

A specific, secret key technique used in key distribution

Active Publication Date: 2019-03-29
QUALCOMM INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such reset attacks compromise system security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securing content with different domain-specific keys
  • Method for securing content with different domain-specific keys
  • Method for securing content with different domain-specific keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In the following description, specific details are given to provide a thorough understanding of various aspects of the invention. However, one of ordinary skill in the art would understand that the described aspects may be practiced without these specific details. For example, circuits may be shown in block diagrams in order to avoid obscuring aspects in unnecessary detail. In other instances, well-known circuits, structures and techniques may not have been shown in detail in order not to obscure aspects of the invention.

[0028] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation or aspect described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other aspects of the invention. Likewise, the term "aspects" does not require that all aspects of the invention include the discussed feature, advantage or mode of operation.

[0029] overview

[0030] To secure acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method operational within a memory controller is provided for securing content stored in memory. The memory controller may allocate logical memory regions within a memory device to different domains. A different domain-specific key is obtained for each of the different domains, where each domain-specific key is a function of at least a master key and domain-specific information. During write operations, content / data is encrypted, at the memory controller, as it is written into each logical memory region using a domain-specific key corresponding to a domain providing the content and to which the logical memory region is allocated. Similarly, during read operations, content / data is decrypted, at the memory controller, as it is read from each memory region using a domain-specific key corresponding to a domain requesting the content and to which the logical memory region, where the content is stored, is allocated.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to and benefit of U.S. Nonprovisional Patent Application No. 14 / 042,675 filed September 30, 2013 in the United States Patent and Trademark Office, which is hereby incorporated by reference in its entirety. technical field [0003] Various features relate to methods for securing (scrambling / encrypting) content in memory by using different domain-specific keys for different memory regions. Background technique [0004] Memory space in a device or system is typically shared among different applications, functions and / or devices, which are collectively referred to herein as "domains." A domain includes one or more masters (eg, hardware and / or software blocks, modules, or subsystems with a particular identity) that generate memory requests. For the allocated memory space, access control mechanisms are typically implemented that control read / write operations by different masters in the syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/78
CPCG06F21/78G06F12/14H04L9/08
Inventor 拉温德拉·R·耶朱里卡尔伊万·麦克莱恩
Owner QUALCOMM INC