Read retry to selectively disable on-die ECC

    公开(公告)号:US11314589B2

    公开(公告)日:2022-04-26

    申请号:US16875642

    申请日:2020-05-15

    Abstract: A memory device that performs internal ECC (error checking and correction) can selectively return read data with application of the internal ECC or without application of the internal ECC, in response to different read commands from the memory controller. The memory device can normally apply ECC and return corrected data in response to a normal read command. In response to a retry command, the memory device can return the read data without application of the internal ECC.

    MEMORY SYSTEM, COMPUTING SYSTEM, AND METHODS THEREOF

    公开(公告)号:US20210263855A1

    公开(公告)日:2021-08-26

    申请号:US17223113

    申请日:2021-04-06

    Abstract: According to various aspects, a memory system may include: a memory having a memory address space associated therewith to access the memory; a cache memory assigned to the memory; one or more processors configured to generate a dummy address space in addition to the memory address space, each address of the dummy address space being distinct from any address of the memory address space, and generate one or more invalid cache entries in the cache memory, the one or more invalid cache entries referencing one or more dummy addresses of the dummy address space.

    CRYPTOGRAPHIC SYSTEM MEMORY MANAGEMENT
    46.
    发明申请

    公开(公告)号:US20200177392A1

    公开(公告)日:2020-06-04

    申请号:US16689575

    申请日:2019-11-20

    Abstract: In one example, a system for managing encrypted memory comprises a processor to store a first MAC based on data stored in system memory in response to a write operation to the system memory. The processor can also detect a read operation corresponding to the data stored in the system memory, calculate a second MAC based on the data retrieved from the system memory, determine that the second MAC does not match the first MAC, and recalculate the second MAC with a correction operation, wherein the correction operation comprises an XOR operation based on the data retrieved from the system memory and a replacement value for a device of the system memory. Furthermore, the processor can decrypt the data stored in the system memory in response to detecting the recalculated second MAC matches the first MAC and transmit the decrypted data to cache thereby correcting memory errors.

    REDUCING CONFLICTS IN DIRECT MAPPED CACHES
    48.
    发明申请

    公开(公告)号:US20190266087A1

    公开(公告)日:2019-08-29

    申请号:US16408870

    申请日:2019-05-10

    Abstract: A processor includes a core to execute a transaction with a memory via cache; and cache controller having an index mapper circuit to: identify a physical memory address associated with the transaction and having a plurality of bits; determine, based on the plurality of bits, a first set of bits encoding a tag value, a second set of bits encoding a page index value, and a third set of bits encoding a line index value; determine a mapping function corresponding to the tag value; determine, using the mapping function, a bit-placement order; combine, based on the order, second and third set of bits to form an index; generate, using the index, a mapping from the address to a cache line index value identifying a cache line in the cache; and wherein the cache controller is further to access, using the mapping and in response to the transaction, the cache line.

    KEY ROTATING TREES WITH SPLIT COUNTERS FOR EFFICIENT HARDWARE REPLAY PROTECTION

    公开(公告)号:US20190229924A1

    公开(公告)日:2019-07-25

    申请号:US16368810

    申请日:2019-03-28

    Abstract: In one example a computer implemented method comprises encrypting data to be stored in a protected region of a memory using a message authentication code (MAC) having a first value determined using a first key during a first period of time, generating a replay integrity tree structure comprising security metadata for the data stored in the protected region of the memory using the first value of the MAC, and at the end of the first period of time, re-keying the MAC to have a second value determined using a second key at the end of the first period of time, decrypting the data stored in the protected region using the first value for the MAC, re-encrypting the data stored in the protected region using the second value for the MAC, and updating the replay integrity tree using the second value for the MAC. Other examples may be described.

    REPLAY PROTECTION FOR MEMORY BASED ON KEY REFRESH

    公开(公告)号:US20190044973A1

    公开(公告)日:2019-02-07

    申请号:US16023941

    申请日:2018-06-29

    Abstract: The present disclosure is directed to systems and methods for providing protection against replay attacks on memory, by refreshing or updating encryption keys. The disclosed replay protected computing system may employ encryption refresh of memory so that unauthorized copies of data are usable for a limited amount of time (e.g., 500 milliseconds or less). The replay protected computing system initially encrypts protected data prior to storage in memory. After a predetermined time or after a number of memory accesses have occurred, the replay protected computing system decrypts the data with the existing key and re-encrypts data with a new key. Unauthorized copies of data (such as those made by an adversary system/program) are not refreshed with subsequent new keys. When an adversary program attempts to use the unauthorized copies of data, the unauthorized copies of data are decrypted with the incorrect keys, which renders the decrypted data unintelligible.

Patent Agency Ranking