INSTANT HARDWARE ERASE FOR CONTENT RESET AND PSEUDO-RANDOM NUMBER GENERATION
First Claim
1. A system that facilitates securing data associated with a memory component, comprising:
- a secure memory component comprising of a plurality of storage locations in which data is stored, the secure memory component is associated with the memory component;
a security component that transmits a reset signal to facilitate erase or reset of a subset of the plurality of storage locations in response to a detected security-related event based in part on predetermined reset criteria.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.
48 Citations
20 Claims
-
1. A system that facilitates securing data associated with a memory component, comprising:
-
a secure memory component comprising of a plurality of storage locations in which data is stored, the secure memory component is associated with the memory component; a security component that transmits a reset signal to facilitate erase or reset of a subset of the plurality of storage locations in response to a detected security-related event based in part on predetermined reset criteria. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method that facilitates securing data associated with a memory, comprising:
-
detecting a security-related event associated with the memory; and at least one of erasing or resetting a subset of storage locations in a secure memory component in response to the security-related event based in part on predetermined reset criteria. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification