MEMORY PROGRAM SECURIZATION METHOD

    公开(公告)号:US20250028653A1

    公开(公告)日:2025-01-23

    申请号:US18776561

    申请日:2024-07-18

    Inventor: Jawad BENHAMMADI

    Abstract: A method of securization of programs in a memory embedded within a microcontroller includes writing a boot program into a first area of the memory and writing at least one additional program into at least one second area of the memory. One or more values of a first register are modified to provide a write protection of the first and second areas. A prohibition against modification of the one or more values of the first register is then implemented when those values are associated with a write protection state of the first area.

    BOOT PROGRAM SELECTION METHOD
    2.
    发明申请

    公开(公告)号:US20250004785A1

    公开(公告)日:2025-01-02

    申请号:US18742726

    申请日:2024-06-13

    Inventor: Jawad BENHAMMADI

    Abstract: The present description concerns a method of selection of boot programs, each contained in two separate storage memories of a microprocessor wherein an option register read first during a resetting of the microprocessor conditions the selection of one of the boot programs.

    EEPROM EMULATION METHOD
    3.
    发明公开

    公开(公告)号:US20240264905A1

    公开(公告)日:2024-08-08

    申请号:US18430259

    申请日:2024-02-01

    Inventor: Jawad BENHAMMADI

    CPC classification number: G06F11/1068 G06F11/1044

    Abstract: EEPROM emulation is provided in a phase-change memory of a circuit integrating a microprocessor. A granularity for writing into lines of the phase-change memory is defined according to a size of data packets to be written. A first error correction code calculated by a program executed by said microprocessor is associated with each data packet. Several data packets and their associated first error correction codes are then stored in a same line of the phase-change memory data packet.

    CONFIGURATION METHOD OF A MICROCONTROLLER

    公开(公告)号:US20250165336A1

    公开(公告)日:2025-05-22

    申请号:US18939193

    申请日:2024-11-06

    Inventor: Jawad BENHAMMADI

    Abstract: The present description concerns a method of configuration of a microcontroller provided with a non-volatile memory, wherein, during an implementation of an operation of loading of the microcontroller configuration based on data from the non-volatile memory, if a fault is detected, then a new configuration loading operation is implemented at least once without for the microcontroller to be powered off.

    OPERATING METHOD OF A NON-VOLATILE MEMORY

    公开(公告)号:US20250165163A1

    公开(公告)日:2025-05-22

    申请号:US18939210

    申请日:2024-11-06

    Inventor: Jawad BENHAMMADI

    Abstract: The present description concerns an operating method of a non-volatile memory, comprising the validation of a transaction, requesting a modification of a value of configuration of a sector of the memory, after comparison of the attributes of the transaction with access attributes of said sector of said memory.

    CONFIGURATION METHOD FOR A PHASE-CHANGE NON-VOLATILE MEMORY

    公开(公告)号:US20250165158A1

    公开(公告)日:2025-05-22

    申请号:US18940372

    申请日:2024-11-07

    Inventor: Jawad BENHAMMADI

    Abstract: The present description concerns a method of configuration of a phase-change non-volatile memory, comprising the partitioning of said memory into a first set of one or a plurality of regions having a first maximum number of write cycles and a second set of one or a plurality of other regions having a second maximum number of write cycles greater than the first maximum number of write cycles, the first and second maximum number of write cycles being linked to different physical write parameters.

    METHOD FOR STORING A KEY IN A NON-VOLATILE MEMORY

    公开(公告)号:US20240267217A1

    公开(公告)日:2024-08-08

    申请号:US18430894

    申请日:2024-02-02

    Inventor: Jawad BENHAMMADI

    CPC classification number: H04L9/0894

    Abstract: A method is presented for verifying a writing of a key into a non-volatile memory. A first cyclic redundancy code of the key is stored into a register of an interface of the memory. A second cyclic redundancy code is computed on a message formed by the copied key having the first cyclic redundancy code linked thereto. The writing of the key into the non-volatile memory is considered as valid when the second cyclic redundancy code is equivalent to the zero value.

Patent Agency Ranking