Joe Y. Tom - Foster City CA, US Venkat Natarajan - Cupertino CA, US
Assignee:
Spansion LLC - Sunnyvale CA
International Classification:
G06F 12/00
US Classification:
711146, 711147, 711158, 711163
Abstract:
The claimed subject matter provides systems and/or methods that facilitate sharing of a memory, having a single channel of access, between two or more processors. A host processor can be operatively connected to a co-processor and the memory in series. The host processor can execute in place to enable it to execute code directly from the memory, and can arbitrate access to the memory bus and thus the memory, so that the host processor can perform all memory fetches to the memory without interruption by the co-processor. The co-processor can be implemented as a finite state machine, and only accesses the memory during read or write cycles issued by the host processor. Various types of co-processors can be employed to perform various functions, such as cryptography and digital signal processing, for example. The memory can be volatile or non-volatile memory.
A portable data storage device is provided having a non-volatile memory and a wireless data interface. The wireless data interface is coupled to the non-volatile memory to read data from the non-volatile memory for transmission through the wireless data interface and/or write data received from the wireless data interface to the non-volatile memory. The wireless data interface is a high data rate interface and/or a broadband interface. Data rates may be above 100 Mbps, and bandwidths may be 100 MHz or above. There is further provided a corresponding data storage method.
Systems And Methods For Access Violation Management Of Secured Memory
Willy Obereiner - San Jose CA, US Venkat Natarajan - Cupertino CA, US Jeremy Isaac Nathaniel Werner - San Jose CA, US Joe Yuen Tom - Foster City CA, US Hyun Soo Lee - Ithaca NY, US
Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.
Multiple Stakeholder Secure Memory Partitioning And Access Control
Venkat Natarajan - Cupertino CA, US Jeremy Isaac Nathaniel Werner - San Jose CA, US Willy Obereiner - San Jose CA, US Joe Yuen Tom - Foster City CA, US Russell Barck - San Jose CA, US
Assignee:
Spansion LLC - Sunnyvale CA
International Classification:
G06F 21/00
US Classification:
713193
Abstract:
A machine implemented system and method that effectuates secure access to a flash memory associated with a mobile device. The system includes a security component that intercepts transactions between an external processor and the flash memory and implements authentication and access control to the flash memory. The system further includes components that can partition the flash memory and can associate authentication and access control information with the partitioned flash memory.
Electronic Devices Using Removable And Programmable Active Processing Modules
System and methods for assembling electronic devices () using removable programmable active processing modules () are provided. An active processing module includes a first input/output (I/O) interface () and a second I/O interface (). The active processing module also includes a controller () communicatively coupled to the first and the second I/O interfaces, where the controller is configured for selectively operating the active processing module in a programming mode or at least one component mode. In the programming mode, the active processing module is enabled to receive a plurality of operating parameters from a first electronic device via the first I/O interface to configure the active processing module to provide a functionality of a component for a second electronic device via at least one of the first and the second I/O interfaces. In the component mode, the active processing module is configured to operate according to the plurality of operating parameters.
Secure Co-Processing Memory Controller Integrated Into An Embedded Memory Subsystem
Jeremy Isaac Nathaniel Werner - San Jose CA, US Venkat Natarajan - Cupertino CA, US Willy Obereiner - San Jose CA, US Joe Yuen Tom - Foster City CA, US George Minassian - Cupertino CA, US Russell Barck - San Jose CA, US
An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
An architecture is presented that facilitates the transfer of content and rights from a network device to a non-network device. The system comprises a trusted digital rights management (DRM) agent/server that is associated with a network device. The trusted DRM agent/server communicates with a non-network device to transfer content and rights. Specifically, the trusted DRM agent/server of the network device communicates with a second trusted DRM agent/server associated with the non-network device. The trusted DRM agent/server mutually authenticates the second trusted DRM agent/server in order to extend the DRM content and rights provided by the content providers. After mutual authentication, the trusted DRM agent/server transfers rights and contents to the second trusted DRM agent/server. Once the rights and content are transferred, the original copy of the content is guaranteed to be deleted from the trusted DRAM agent/server to preserve the current license rights of the content.
Joe Yuen Tom - Foster City CA, US Jeremy Isaac Nathaniel Werner - San Jose CA, US Russell Barck - San Jose CA, US
Assignee:
SPANSION LLC - Sunnyvale CA
International Classification:
H04L 9/00
US Classification:
705 51
Abstract:
Systems and methods that facilitate the management of digital content in a local environment between a limited number of parties. A digital rights management (DRM) agent-server can be created in hardware in which both the agent-server and agent are trusted. A content owner can send digital content along with a rights attachment indicating a scope of the use rights associated with the content. The content can be accessed by the agent and perceived in a presentation component that will only permit the agent to use the content in accordance with the rights granted as to the content. The DRM agent-server can be implemented by an application-specific integrated circuit (ASIC). Further, the DRM agent-server can be implemented on a portable electronic device such as a cellular phone, a personal digital assistant (PDA), or a laptop computer, for example.