Accelerating integrity checks of code and data stored in non-volatile memory
First Claim
Patent Images
1. A method comprising:
- receiving in a host a list of protected and unprotected ranges of non-volatile memory; and
reducing the processing to determine authenticity when accessing a protected memory range of the non-volatile memory compared to when accessing an unprotected range of said memory.
2 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, a command may be used by a host processor to access certain information from a non-volatile memory, together with a message authentication code. That information may be utilized to generate a message authentication code on the processor. Then, in any future accesses, the message authentication code generated by the host processor may be compared to the message authentication code from the non-volatile memory to determine the integrity of data or code that is received from the non-volatile memory.
331 Citations
26 Claims
-
1. A method comprising:
-
receiving in a host a list of protected and unprotected ranges of non-volatile memory; and reducing the processing to determine authenticity when accessing a protected memory range of the non-volatile memory compared to when accessing an unprotected range of said memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable medium storing instructions that, when executed, enable a host processor-based system to:
-
receive a list of protected and unprotected ranges of non-volatile memory; and reduce the processing to determine authenticity when accessing a protected memory range of the non-volatile memory compared to when accessing an unprotected range of said memory. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a host processor; a non-volatile memory; a memory bus coupled between the host processor and the non-volatile memory; and the non-volatile memory to store a list of protected and unprotected ranges within said memory, said protected ranges being protected against writes and said unprotected ranges being unprotected against writes. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A non-volatile memory comprising:
-
a plurality of memory ranges, some of said ranges being write protected and others of said ranges not being write protected; and access control information stored in said memory to indicate which ranges are protected and which ranges are not protected. - View Dependent Claims (24, 25, 26)
-
Specification