Secure data access between computing devices using host-specific key

Techniques are disclosed concerning secure access to data in a computing device. In one embodiment, a computing device includes a communication interface, a memory, a memory controller, and a security processor. The communication interface may communicate with a different computing device. The secur...

Full description

Saved in:
Bibliographic Details
Main Authors Kaahaaina, Kaiehu, de Cesare, Josh P, Benson, Wade, Gautier, Fabrice L
Format Patent
LanguageEnglish
Published 11.02.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques are disclosed concerning secure access to data in a computing device. In one embodiment, a computing device includes a communication interface, a memory, a memory controller, and a security processor. The communication interface may communicate with a different computing device. The security processor may generate a host key in response to a successful authentication of the different computing device, and then encrypt a memory key using the host key. The security processor may also send the encrypted memory key to the memory controller, and send the host key to the different computing device. The host key may be included by the different computing device in a subsequent memory request to access data in the memory. The memory controller may, in response to the subsequent memory request, use the included host key to decrypt the encrypted memory key and use the decrypted memory key to access the data.
Bibliography:Application Number: US201715721636