Browse Prior Art Database

Data security Disclosure Number: IPCOM000239586D
Publication Date: 2014-Nov-17
Document File: 2 page(s) / 43K

Publishing Venue

The Prior Art Database


Disclosed is an idea in the area of data security in computer systems. It focuses on the novel aspects of memory module, mainly from electrical, mechanical, and usage perspective to enable data security.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 2

Data security

Growing memory usage presents numerous data security challenges, and ensuring data security has become a vital importance at all levels and in all market segments. Server systems deployed in cloud environments cater to a broader range of customers, from individual users to big enterprises. All data are stored mix and match in different areas of the memory subsystem, and it paves a way for hackers/intruders to steal the data, if memory modules are removed and data is copied using devices like data copiers.

    Technological advancements demands for very high level of security. Memory security is very important in non-volatile memory as the market is growing, and its non-volatility raise a big security concern. Non-volatile memories present a unique challenge, where data needs to be retained in case of power lost; however, this feature may open doors for hacking, if not secured properly. Need for data security is inevitable, not only for IT related data, but all for other segments like consumer, research, and also for different class of data (personal, confidential).

As shown in the figure below:

Memory module design has two parts:

Base part contains only the memory array portion (can be any type of memories: volatile and/or non-volatile memories)

Extended part contains all the electronics to support read/write and other necessary operations

If authentication is enabled, base part is locked by the connector

Full module removal will be supported, only if right credentials are given

If authentication is enabled, if right credentials were not given, then only the exten...