Accelerating integrity checks of code and data stored in non-volatile memory
First Claim
Patent Images
1. A method comprising:
- receiving in a host a list of protected and unprotected ranges of non-volatile memory; and
reducing the processing to determine authenticity when accessing a protected memory range of the non-volatile memory compared to when accessing an unprotected range of said memory by using a measurement done for data in the past to authenticate different data thereafter.
2 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, a command may be used by a host processor to access certain information from a non-volatile memory, together with a message authentication code. That information may be utilized to generate a message authentication code on the processor. Then, in any future accesses, the message authentication code generated by the host processor may be compared to the message authentication code from the non-volatile memory to determine the integrity of data or code that is received from the non-volatile memory.
6 Citations
19 Claims
-
1. A method comprising:
-
receiving in a host a list of protected and unprotected ranges of non-volatile memory; and reducing the processing to determine authenticity when accessing a protected memory range of the non-volatile memory compared to when accessing an unprotected range of said memory by using a measurement done for data in the past to authenticate different data thereafter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable medium storing instructions that, when executed, enable a host processor-based system to:
-
receive a list of protected and unprotected ranges of non-volatile memory; and reduce the processing to determine authenticity when accessing a protected memory range of the non-volatile memory compared to when accessing an unprotected range of said memory by using a previous measurement done for data in the past to authenticate different data thereafter. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a host processor; a non-volatile memory; a memory bus coupled between the host processor and the non-volatile memory; and the non-volatile memory to store a list of protected and unprotected ranges within said memory, said protected ranges being protected against writes and said unprotected ranges being unprotected against writes, wherein said non-volatile memory to store access control information including information about whether a particular range of memory is write protected. - View Dependent Claims (17, 18, 19)
-
Specification