Check patentability & draft patents in minutes with Patsnap Eureka AI!

Encryption key management

A technology for encrypting keys and keys, which is applied in the field of memory and can solve problems such as loss of content in volatile memory

Pending Publication Date: 2022-07-19
MICRON TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Volatile memory will generally lose its contents when power is removed from the device permanently or in some cases temporarily

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption key management
  • Encryption key management
  • Encryption key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Encryption methods may use block ciphers to provide data security, for example, using keys to authenticate data. For example, a key can convert data from plaintext to ciphertext when encrypting; and convert data from ciphertext to plaintext when decrypting. Block ciphers provide block transformation of information bits to encrypt (or conversely, decrypt) data. For example, Advanced Encryption Standard (AES) is a type of block cipher. Additionally, block ciphers may operate in different modes within the encryption device / method, eg, as a "stream cipher" using a counter. For example, a counter can be used as a basis for changing the underlying key used by the block cipher so that the key changes over time; in turn, changing the data in the encrypted data stream. For example, Galois / Counter Mode (GCM) is a type of stream cipher.

[0011] It can be complex and cumbersome to secure NVDIMM devices.

[0012] Examples of systems and methods described herein provide for eras...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to encryption key management. Examples of systems and methods described herein provide for erasing an encryption key for data access to a non-volatile memory device. The memory controller may generate an encryption key for data access to the non-volatile memory device; and, to provide security for data stored on the non-volatile memory device, the memory controller may store the encryption key in a local cache of the memory controller. The encryption key may be erased in response to losing power or powering down the memory controller. Advantageously, when the memory controller (or a computing device implementing the memory controller) loses power, the data stored at the non-volatile memory device may not be accessed. Thus, if a malicious actor physically removes (or steals) a computing device implementing the memory controller (e.g., a laptop) to retrieve the data, the data stored on the non-volatile memory device may not be accessed.

Description

technical field [0001] Embodiments of the present disclosure relate generally to a memory, and more particularly, in one or more of the illustrated embodiments, to erasing an encryption key used for data access to a non-volatile memory device key. Background technique [0002] Emerging memory architectures are designed to handle a range of memory access requests and may include memories with different characteristics. For example, memory may include dynamic random access memory (DRAM) and phase change memory (PCM). Non-volatile memory can be extremely non-uniform. For example, some NAND flash memories (eg, based on page type) can be read or written faster than others, the latency varies as they wear out, or different NAND flash memories have different levels of cells (eg Multi-Level Cell (MLC)). Emerging memory architectures can also utilize non-volatile dual in-line memory modules (NVDIMMs) such as NVDIMM-P or NVDIMM-F. NVDIMMs typically include both non-volatile and v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/79G06F21/62G06F21/60G11C14/00G11C7/20
CPCG06F21/79G06F21/6218G06F21/602G11C14/0018G11C14/0063G11C7/20G06F13/1668G06F13/4068G06F13/4221G06F2212/1052G06F2212/7203G06F2212/214G06F2212/466G06F12/1408G06F2212/402G06F2212/312G06F12/0238G06F12/0246G06F21/107
Inventor D·赫尔顿J·赫里茨
Owner MICRON TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More