Non-volatile memory to store resettable data
First Claim
Patent Images
1. An apparatus comprising:
- a non-volatile memory (NVM) to store data and a first password, wherein the first password is to protect the data;
a controller to selectively enable interaction with the data based on authenticating the first password against a second password; and
a region of the non-volatile memory having an address range allocated as non-persistent and behaving as a temporary region that is cleared responsive to any of a reset, power loss, or power cycle occurring, by zeroing out of the region, the temporary region to store the second password;
wherein the data, the first password, and the second password are resettable by the controller in response to a reset request to bypass the first password, such that the apparatus is restorable to an unused state without authenticating the first password.
2 Assignments
0 Petitions
Accused Products
Abstract
A non-volatile memory (NVM) is to store data and a first password. The first password is to protect the data. A controller is to selectively enable interaction with the data based on authenticating the first password against a second password. A temporary region is to store the second password. The second password is discarded in response to a status change of the apparatus. The data, the first password, and the second password are resettable by the controller in response to a reset request to bypass the first password, such that the apparatus is restorable to an unused state without authenticating the first password.
-
Citations
14 Claims
-
1. An apparatus comprising:
-
a non-volatile memory (NVM) to store data and a first password, wherein the first password is to protect the data; a controller to selectively enable interaction with the data based on authenticating the first password against a second password; and a region of the non-volatile memory having an address range allocated as non-persistent and behaving as a temporary region that is cleared responsive to any of a reset, power loss, or power cycle occurring, by zeroing out of the region, the temporary region to store the second password; wherein the data, the first password, and the second password are resettable by the controller in response to a reset request to bypass the first password, such that the apparatus is restorable to an unused state without authenticating the first password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a non-volatile memory (NVM) to store data and a first password; a controller to selectively enable interaction with the data based on authenticating the first password against a second password; and a region of the non-volatile memory having an address range allocated as non-persistent and behaving as a temporary region that is cleared responsive to any of a reset, power loss, or power cycle occurring, by zeroing out of the region, the temporary region store the second password wherein the data and the first password of the non-volatile memory are resettable by the controller in response to a reset request to bypass the first password, such that the memory module is restorable to an unused state without authenticating the first password.
-
-
13. A method, comprising:
-
storing data in a non-volatile memory; storing a first password in the non-volatile memory; selectively enabling interaction with the data based on authenticating the first password against a second password; storing the second password in a region of the non-volatile memory having an address range allocated as non-persistent and behaving as a temporary region that is cleared responsive to any of a reset, power loss, or power cycle occurring, by zeroing out of the region; responsive to the reset, power loss, or power cycle occurring, discarding the second password from the temporary region by zeroing out the region; and resetting the data, the first password, and the second password in response to a reset request to bypass the first password, such that the memory module is restorable to an unused state without authenticating the first password. - View Dependent Claims (14)
-
Specification