Method and apparatus for multi-key total memory encryption based on dynamic key derivation
A key and cryptographic key technology, applied in secure communication devices, computer security devices, key distribution, and can solve problems such as a large amount of memory
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In the following description, numerous specific details are set forth. However, it is understood that some embodiments may be practiced without these specific details. In other instances, well-known circuits, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.
[0037] References in the specification to "one embodiment," "an embodiment," "example embodiment," etc. indicate that the described embodiment may include a feature, structure, or characteristic, but that each embodiment may not necessarily include the feature, structure, or characteristic. characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. In addition, when a feature, structure or characteristic is described with respect to an embodiment, it is considered to be within the knowledge of those skilled in the art to affect such feature, structure or characteristic with respect to other embodiments, if expl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


