Abstract:
In one embodiment, a device containing sensitive information may be placed in a data security mode. In such a data security mode, certain activities may trigger the partial or full erasure of the sensitive date before the data can be retrieved by an unauthorized user. In one embodiment, the data security mode may be a park mode in which unauthorized physical movement of the device triggers the partial or full erasure of the sensitive data stored in a nonvolatile memory before the data can be retrieved by an unauthorized user. In another aspect of the present description, the earths magnetic field may be used to detect movement of a device in the park mode, and may be used to power the erasure of sensitive data as the device is moved relative to the earths magnetic field. Other aspects are described herein.
Abstract:
An integrated-circuit device (1) comprises a processor (7), memory (13) for storing executable code, and memory protection logic (9). The memory protection logic (9) is configured to: determine the state of a read protection flag for a protected region of the memory (13);detect a memory read request by the processor (7); determine whether the read request is for an address in the protected region of the memory (13); determine whether the processor (7) issued the read request while executing code stored in the protected region of the memory (13); and deny read requests for addresses in the protected region if the read protection flag for the protected region is set, unless at least one of one or more access conditions is met, wherein one of the access conditions is that the processor (7) issued the read requests while executing code stored in the protected region.
Abstract:
In one embodiment, the present invention includes a method for determining whether an address map of a system includes support for a read only region of system memory, and if so configuring the region and storing protected data in the region. This data, at least some of which can be readable in both trusted and untrusted modes, can be accessed from the read only region during execution of untrusted code. Other embodiments are described and claimed.
Abstract:
A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor device, a finite state machine, a random number generator communicatively and a memory. The memory stores values generated by the random number generator. The restrictor device and the finite state machine include hardware logic that restricts access or changes to the contents of the memory.
Abstract:
A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and comparing the boot source to an expected source. If the boot source is not the expected source, access to the network authentication information is inhibited, such as by disabling access to the portion of memory that stores the authentication information. Further, if the boot source is the expected source, boot code authentication information is retrieved from memory and verified during the boot sequence. If the device authentication information is not authenticated, access to the network authentication information is inhibited. Accordingly, access to the network authentication information is allowed only if the data processing device is booted from an expected source, and only if the boot code is authenticated, thereby reducing the likelihood of unauthorized access to the network authentication information.
Abstract:
An architecture is presented that facilitates integrated security capabilities. A memory module (100, 200, 400) is provided that comprises non-volatile memory (102, 202, 402) that stores security software and a security processor (104, 204, 300, 404) that accesses the security software from the nonvolatile memory (102, 202, 402) and performs security functions based on the security software stored. Further, a host processor (206, 406) located outside of the memory module (100, 200, 400) arbitrates with the security processor (104, 204, 300, 404) for access to the non-volatile memory (102, 202, 402). The memory module (100, 200, 400) in communication with the host processor (206, 406) establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
Abstract:
An architecture is presented that facilitates integrated security capabilities. A memory module (100, 200, 400) is provided that comprises non-volatile memory (102, 202, 402) that stores security software and a security processor (104, 204, 300, 404) that accesses the security software from the nonvolatile memory (102, 202, 402) and performs security functions based on the security software stored. Further, a host processor (206, 406) located outside of the memory module (100, 200, 400) arbitrates with the security processor (104, 204, 300, 404) for access to the non-volatile memory (102, 202, 402). The memory module (100, 200, 400) in communication with the host processor (206, 406) establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
Abstract:
One embodiment of the present application includes a microcontroller (30) that has an embedded memory (46), a programmable processor (32), and a test interface (34). The memory (46) is accessible through the test interface (34). In response to resetting this microcontroller (30), a counter is started and the test interface (34) is initially set to a disabled state while an initiation program is executed. The test interface (34) is changed to an enabled state - such that access to the embedded memory (46) is permitted through it - when the counter reaches a predefined value unless the microcontroller (30) executes programming code before the predefined value is reached to provide the disabled state during subsequent microcontroller (30) operation.