Browse Prior Art Database

Data security

IP.com Disclosure Number: IPCOM000239586D
Publication Date: 2014-Nov-17
Document File: 2 page(s) / 43K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is an idea in the area of data security in computer systems. It focuses on the novel aspects of memory module, mainly from electrical, mechanical, and usage perspective to enable data security.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

Data security

Growing memory usage presents numerous data security challenges, and ensuring data security has become a vital importance at all levels and in all market segments. Server systems deployed in cloud environments cater to a broader range of customers, from individual users to big enterprises. All data are stored mix and match in different areas of the memory subsystem, and it paves a way for hackers/intruders to steal the data, if memory modules are removed and data is copied using devices like data copiers.

    Technological advancements demands for very high level of security. Memory security is very important in non-volatile memory as the market is growing, and its non-volatility raise a big security concern. Non-volatile memories present a unique challenge, where data needs to be retained in case of power lost; however, this feature may open doors for hacking, if not secured properly. Need for data security is inevitable, not only for IT related data, but all for other segments like consumer, research, and also for different class of data (personal, confidential).

As shown in the figure below:


Memory module design has two parts:

Base part contains only the memory array portion (can be any type of memories: volatile and/or non-volatile memories)

Extended part contains all the electronics to support read/write and other necessary operations


If authentication is enabled, base part is locked by the connector

Full module removal will be supported, only if right credentials are given


If authentication is enabled, if right credentials were not given, then only the exten...