System for forensic tracing of memory device content erasure and tampering

    公开(公告)号:US12229327B2

    公开(公告)日:2025-02-18

    申请号:US17939640

    申请日:2022-09-07

    Inventor: Sourin Sarkar

    Abstract: A system for providing forensic tracing of memory device content erasure and tampering is disclosed. The system uses a special command that enables forensic tracing in a secure memory device. Once the forensic tracing is enabled, firmware of the memory device tracks the data stored on the memory device. The command specifies whether the tracking and tracing is for the entire memory device or for a region of the memory device. The firmware confirms that the forensic tracing is enabled, and a target protection region is defined. Once an authenticated command for an operation to access, modify, or erase data of the memory device is received from a host, the system enables the operation to proceed. The system creates a trace of the operation and the metadata of the target region that is modified within a secure memory region of the memory device that is not addressable by the host device.

    SYSTEM FOR FORENSIC TRACING OF MEMORY DEVICE CONTENT ERASURE AND TAMPERING

    公开(公告)号:US20240078348A1

    公开(公告)日:2024-03-07

    申请号:US17939640

    申请日:2022-09-07

    Inventor: Sourin Sarkar

    CPC classification number: G06F21/79 G06F2221/2101

    Abstract: A system for providing forensic tracing of memory device content erasure and tampering is disclosed. The system uses a special command that enables forensic tracing in a secure memory device. Once the forensic tracing is enabled, firmware of the memory device tracks the data stored on the memory device. The command specifies whether the tracking and tracing is for the entire memory device or for a region of the memory device. The firmware confirms that the forensic tracing is enabled, and a target protection region is defined. Once an authenticated command for an operation to access, modify, or erase data of the memory device is received from a host, the system enables the operation to proceed. The system creates a trace of the operation and the metadata of the target region that is modified within a secure memory region of the memory device that is not addressable by the host device.

    Establishing a chain of ownership of a device

    公开(公告)号:US12141286B2

    公开(公告)日:2024-11-12

    申请号:US17858560

    申请日:2022-07-06

    Inventor: Sourin Sarkar

    Abstract: Implementations described herein relate to establishing a chain of ownership of a device. In some implementations, the device may determine first ownership metadata based on first ownership data associated with the device. The device may split the first ownership metadata into a first portion of first ownership metadata and a second portion of first ownership metadata. The device may store, in the memory of the device, the first portion of first ownership metadata. The device may transmit, to a server, the second portion of first ownership metadata for storage in a blockchain ledger of a blockchain node. A chain of ownership associated with the device may be established based on a combination of the first portion of first ownership metadata stored in the memory of the device and the second portion of first ownership metadata stored in the blockchain ledger.

    USAGE MODEL CONTEXT AWARE POWER MANAGEMENT IN SECURE SYSTEMS WITH EMBEDDED HARDWARE SECURITY MODULES

    公开(公告)号:US20240078314A1

    公开(公告)日:2024-03-07

    申请号:US17939551

    申请日:2022-09-07

    CPC classification number: G06F21/572 G06F21/73 G06F2221/034

    Abstract: A system for providing usage model context aware power management in secure systems with embedded hardware security modules is disclosed. The system determines a context associated with a transaction with a memory device that is initiated by a host device. Based on the context, the system sets conditions within its internal data structures and state machines. The context may indicate that the transaction is a secure transaction requiring cryptographic services of the memory device. Flags are set in firmware of the memory device indicating a need for context aware power management and for cryptographic services. If a power management function to reduce power to the memory device is to be executed, the firmware rejects the transaction until the memory device reenters a functional mode. If the function is not to be executed, the firmware provides the host with a notification of an impending power state change for the memory device.

    Physical unclonable function failure protection and prediction

    公开(公告)号:US12166870B2

    公开(公告)日:2024-12-10

    申请号:US17725178

    申请日:2022-04-20

    Abstract: In some implementations, a memory device may generate a physical unclonable function (PUF) value. The memory device may access a PUF protection key stored in a non-host-addressable memory region. The memory device may encrypt the PUF value, using the PUF protection key, to generate an encrypted PUF value. The memory device may store the encrypted PUF value in scattered memory locations in the non-host-addressable memory region.

    Boot processes for storage systems

    公开(公告)号:US12014187B2

    公开(公告)日:2024-06-18

    申请号:US17661983

    申请日:2022-05-04

    CPC classification number: G06F9/4411 G06F9/4418

    Abstract: Implementations described herein relate to boot processes for memory devices. In some implementations, a controller of a storage system receives a command for enabling a fast bootup process for the storage system. The fast bootup process may exclude a measurement of information retrieved from a memory device of the storage system during the fast bootup process. The controller may enable the fast bootup process based on the command. The controller may disable a normal bootup process for the storage system based on the fast bootup process being enabled. The normal bootup process may include a measurement of information retrieved from the memory device during the normal bootup process.

Patent Agency Ranking