FLASH RECOVERY MODE
First Claim
1. A device for data security, comprising:
- a memory including a plurality of memory banks including a first memory bank and a second memory bank, wherein at least a portion of data is interleaved amongst at least two of the plurality of memory banks; and
a security complex that is configured to prevent access to at least one of the plurality of memory banks while a debug mode or recovery mode is occurring, and to prevent access to the at least one of the plurality of memory banks starting with initial boot until a verification by the security complex is successful, wherein the verification by the security complex includes the security complex verifying a signature.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosed technology is generally directed to data security. In one example of the technology, data is stored in a memory. The memory includes a plurality of memory banks including a first memory bank and a second memory bank. At least a portion of the data is interleaved amongst at least two of the plurality of memory banks. Access is caused to be prevented to at least one of the plurality of memory banks while a debug mode or recovery mode is occurring. Also, access is caused to be prevented to the at least one of the plurality of memory banks starting with initial boot until a verification by a security complex is successful. The verification by the security complex includes the security complex verifying a signature.
-
Citations
20 Claims
-
1. A device for data security, comprising:
-
a memory including a plurality of memory banks including a first memory bank and a second memory bank, wherein at least a portion of data is interleaved amongst at least two of the plurality of memory banks; and a security complex that is configured to prevent access to at least one of the plurality of memory banks while a debug mode or recovery mode is occurring, and to prevent access to the at least one of the plurality of memory banks starting with initial boot until a verification by the security complex is successful, wherein the verification by the security complex includes the security complex verifying a signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for data security, comprising:
-
storing data in a memory, the memory including a plurality of memory banks including a first memory bank and a second memory bank, wherein at least a portion of the data is interleaved between at least two of the plurality of memory banks; and causing access to be prevented at least one of the plurality of memory banks while operating in a mode that does not include signature validation is occurring, and causing access to be prevented access to the at least one of the plurality of memory banks starting with an initial boot until a verification by a security complex is successful, wherein the verification by the security complex includes the security complex verifying a signature. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for data security, comprising:
a device, including; a flash memory including a plurality of flash memory banks including a first flash memory bank and a second flash memory bank, wherein at least a portion of data is interleaved amongst at least two of the plurality of flash memory banks; and a security complex that is configured to prevent access to at least one of the plurality of flash memory banks while a debug mode or recovery mode is occurring, and to prevent access to the at least one of the plurality of flash memory banks starting with initial boot until a verification by the security complex is successful, wherein the verification by the security complex includes the security complex verifying a signature. - View Dependent Claims (17, 18, 19, 20)
Specification