Patents by Inventor James Ruane
James Ruane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240129114Abstract: A processing device is configured to process an initial set of command types. A command extension module and a digital signature are received. The digital signature is generated based on the command extension module using a private key of a key pair. The command extension module, once installed by the processing device, enables the processing device to process a new command type that is not included in the initial set of command types. The digital signature is verified using a public key of the key pair. Based on a successful verification of the digital signature, the command extension module is temporarily installed by loading the command extension module in a volatile memory device.Type: ApplicationFiled: December 14, 2023Publication date: April 18, 2024Inventors: James Ruane, Robert W. Strong
-
Patent number: 11895226Abstract: A processing device is configured to process an initial set of command types. A command extension module and a digital signature are received. The digital signature is generated based on the command extension module using a private key of a key pair. The command extension module, once installed by the processing device, enables the processing device to process a new command type that is not included in the initial set of command types. The digital signature is verified using a public key of the key pair. Based on a successful verification of the digital signature, the command extension module is temporarily installed by loading the command extension module in a volatile memory device.Type: GrantFiled: October 6, 2022Date of Patent: February 6, 2024Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Publication number: 20230418954Abstract: Methods, systems, and devices for detecting information modification in a memory system are described. A system may generate a first value, such as a first hash value, from information stored in storage component. The system may then generate a second value, such as a second hash value, from content stored in the storage component. After generating the second value, the system may compare the second value to the first value. The system may then determine the modification status of the information based on the comparison, and implement one or more operations based on the modification status.Type: ApplicationFiled: June 27, 2022Publication date: December 28, 2023Inventors: James Ruane, Jeffrey Lee Munsil
-
Publication number: 20230336337Abstract: A request for password generation is received from a host system. In response to receiving the request, a password derivation key is generated based on a key derivation seed. A password is derived from the password derivation key, and a wrapping key is derived from the password. The wrapping key is used to wrap an authorization state indication, which is stored in local memory. Encrypted data is generated based on an encryption of the key derivation seed using an asymmetric encryption key. The encrypted data is provided in response to the request.Type: ApplicationFiled: June 20, 2023Publication date: October 19, 2023Inventors: James Ruane, Robert W. Strong
-
Patent number: 11736276Abstract: A key delegation request is received from a host system. The key delegation request includes a new public key. A challenge is generated based on the new public key and a root public key, and the challenge is provided to the host system responsive to the request. A first and second digital signature are received from the host system. The first digital signature is generated by cryptographically signing the challenge using a new private key corresponding to the new public key and the second digital signature is generated by cryptographically signing the challenge using a root private key corresponding to the root public key. The first digital signature is validated using the new public key and the second digital signature is validated using the root public key. Based on successful validation of both signatures, the new public key is utilized in one or more cryptographic operations.Type: GrantFiled: March 9, 2022Date of Patent: August 22, 2023Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Patent number: 11728982Abstract: A request for password generation is received from a host system. In response to receiving the request, a password derivation key is generated based on a key derivation seed. A password is derived from the password derivation key, and a wrapping key is derived from the password. The wrapping key is used to wrap an authorization state indication, which is stored in local memory. Encrypted data is generated based on an encryption of the key derivation seed using an asymmetric encryption key. The encrypted data is provided in response to the request.Type: GrantFiled: March 2, 2022Date of Patent: August 15, 2023Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Patent number: 11698970Abstract: Methods, systems, and devices for double wrapping for verification are described. In some cases, a memory subsystem can receive a firmware image for the memory subsystem where the firmware image is signed with a first signature according to a first signing procedure. The memory subsystem can then verify an integrity of the firmware image based on the first signing procedure. After verifying the integrity of the firmware image, the memory subsystem can then generate a second signature for the firmware image based on a second signing procedure different from the first signing procedure. The memory subsystem can then write the second signature to the firmware image. The memory subsystem can then perform a verification process to verify the integrity of the firmware image based on one or both of the first signing procedure or the second signing procedure.Type: GrantFiled: December 28, 2021Date of Patent: July 11, 2023Assignee: Micron Technology, Inc.Inventors: Tim Markey, James Ruane, Robert W. Strong
-
Publication number: 20230030065Abstract: A processing device is configured to process an initial set of command types. A command extension module and a digital signature are received. The digital signature is generated based on the command extension module using a private key of a key pair. The command extension module, once installed by the processing device, enables the processing device to process a new command type that is not included in the initial set of command types. The digital signature is verified using a public key of the key pair. Based on a successful verification of the digital signature, the command extension module is temporarily installed by loading the command extension module in a volatile memory device.Type: ApplicationFiled: October 6, 2022Publication date: February 2, 2023Inventors: James Ruane, Robert W. Strong
-
Publication number: 20220407718Abstract: A processing device receives, from a host system, a key manifest and a digital signature generated based on the key manifest using a private key corresponding to a public/private key pair. The key manifest comprises one or more verification keys. The digital signature is verified using the public key and the processing device stores the key manifest in a persistent storage component in response to successful verification of the digital signature. The one or more verification keys are utilized in one or more verification operations based on the key manifest being stored in the persistent memory component.Type: ApplicationFiled: August 18, 2022Publication date: December 22, 2022Inventors: Robert W. Strong, James Ruane
-
Patent number: 11483137Abstract: A processing device is configured to process an initial set of command types. A command extension module and a digital signature are received. The digital signature is generated based on the command extension module using a private key of a key pair. The command extension module, once installed by the processing device, enables the processing device to process a new command type that is not included in the initial set of command types. The digital signature is verified using a public key of the key pair. Based on a successful verification of the digital signature, the command extension module is temporarily installed by loading the command extension module in a volatile memory device.Type: GrantFiled: January 22, 2020Date of Patent: October 25, 2022Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Patent number: 11444780Abstract: A processing device receives, from a host system, a key manifest and a digital signature generated based on the key manifest using a private key corresponding to a public/private key pair. The key manifest comprises one or more verification keys. The digital signature is verified using the public key and the processing device stores the key manifest in a persistent storage component in response to successful verification of the digital signature. The one or more verification keys are utilized in one or more verification operations based on the key manifest being stored in the persistent memory component.Type: GrantFiled: November 25, 2019Date of Patent: September 13, 2022Assignee: Micron Technology, Inc.Inventors: Robert W. Strong, James Ruane
-
Publication number: 20220198019Abstract: Methods, systems, and devices for double wrapping for verification are described. In some cases, a memory subsystem can receive a firmware image for the memory subsystem where the firmware image is signed with a first signature according to a first signing procedure. The memory subsystem can then verify an integrity of the firmware image based on the first signing procedure. After verifying the integrity of the firmware image, the memory subsystem can then generate a second signature for the firmware image based on a second signing procedure different from the first signing procedure. The memory subsystem can then write the second signature to the firmware image. The memory subsystem can then perform a verification process to verify the integrity of the firmware image based on one or both of the first signing procedure or the second signing procedure.Type: ApplicationFiled: December 28, 2021Publication date: June 23, 2022Inventors: Tim Markey, James Ruane, Robert W. Strong
-
Publication number: 20220200793Abstract: A key delegation request is received from a host system. The key delegation request includes a new public key. A challenge is generated based on the new public key and a root public key, and the challenge is provided to the host system responsive to the request. A first and second digital signature are received from the host system. The first digital signature is generated by cryptographically signing the challenge using a new private key corresponding to the new public key and the second digital signature is generated by cryptographically signing the challenge using a root private key corresponding to the root public key. The first digital signature is validated using the new public key and the second digital signature is validated using the root public key. Based on successful validation of both signatures, the new public key is utilized in one or more cryptographic operations.Type: ApplicationFiled: March 9, 2022Publication date: June 23, 2022Inventors: James Ruane, Robert W. Strong
-
Publication number: 20220191015Abstract: A request for password generation is received from a host system. In response to receiving the request, a password derivation key is generated based on a key derivation seed. A password is derived from the password derivation key, and a wrapping key is derived from the password. The wrapping key is used to wrap an authorization state indication, which is stored in local memory. Encrypted data is generated based on an encryption of the key derivation seed using an asymmetric encryption key. The encrypted data is provided in response to the request.Type: ApplicationFiled: March 2, 2022Publication date: June 16, 2022Inventors: James Ruane, Robert W. Strong
-
Patent number: 11296872Abstract: A key delegation request is received from a host system. The key delegation request includes a new public key. A challenge is generated based on the new public key and a root public key, and the challenge is provided to the host system responsive to the request. A first and second digital signature are received from the host system. The first digital signature is generated by cryptographically signing the challenge using a new private key corresponding to the new public key and the second digital signature is generated by cryptographically signing the challenge using a root private key corresponding to the root public key. The first digital signature is validated using the new public key and the second digital signature is validated using the root public key. Based on successful validation of both signatures, the new public key is utilized in one or more cryptographic operations.Type: GrantFiled: November 7, 2019Date of Patent: April 5, 2022Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Patent number: 11271731Abstract: A request for password generation is received from a host system. In response to receiving the request, a password derivation key is generated based on a key derivation seed. A password is derived from the password derivation key, and a wrapping key is derived from the password. The wrapping key is used to wrap an authorization state indication, which is stored in local memory. Encrypted data is generated based on an encryption of the key derivation seed using an asymmetric encryption key. The encrypted data is provided in response to the request.Type: GrantFiled: November 7, 2019Date of Patent: March 8, 2022Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Patent number: 11216562Abstract: Methods, systems, and devices for double wrapping for verification are described. In some cases, a memory subsystem can receive a firmware image for the memory subsystem where the firmware image is signed with a first signature according to a first signing procedure. The memory subsystem can then verify an integrity of the firmware image based on the first signing procedure. After verifying the integrity of the firmware image, the memory subsystem can then generate a second signature for the firmware image based on a second signing procedure different from the first signing procedure. The memory subsystem can then write the second signature to the firmware image. The memory subsystem can then perform a verification process to verify the integrity of the firmware image based on one or both of the first signing procedure or the second signing procedure.Type: GrantFiled: December 31, 2019Date of Patent: January 4, 2022Assignee: Micron Technology, Inc.Inventors: Tim Markey, James Ruane, Robert W. Strong
-
Publication number: 20210243035Abstract: A request is received from a host system to initiate an authentication session. Challenge data is generated based on the request and provided to the host system in response to the request. Authentication data is received from the host system. The authentication data comprises a digital signature and enablement data. The digital signature is generated by cryptographically signing the enablement data using a private key, and the enablement data comprises at least the challenge data. The digital signature is validated based on the challenge data and using a public key corresponding to the private key. Access to at least a portion of the data stored in a memory component is provided based at least in part on validating the digital signature.Type: ApplicationFiled: February 3, 2020Publication date: August 5, 2021Inventors: James Ruane, Robert W. Strong
-
Publication number: 20210226779Abstract: A processing device is configured to process an initial set of command types. A command extension module and a digital signature are received. The digital signature is generated based on the command extension module using a private key of a key pair. The command extension module, once installed by the processing device, enables the processing device to process a new command type that is not included in the initial set of command types. The digital signature is verified using a public key of the key pair. Based on a successful verification of the digital signature, the command extension module is temporarily installed by loading the command extension module in a volatile memory device.Type: ApplicationFiled: January 22, 2020Publication date: July 22, 2021Inventors: James Ruane, Robert W. Strong
-
Publication number: 20210200874Abstract: Methods, systems, and devices for double wrapping for verification are described. In some cases, a memory subsystem can receive a firmware image for the memory subsystem where the firmware image is signed with a first signature according to a first signing procedure. The memory subsystem can then verify an integrity of the firmware image based on the first signing procedure. After verifying the integrity of the firmware image, the memory subsystem can then generate a second signature for the firmware image based on a second signing procedure different from the first signing procedure. The memory subsystem can then write the second signature to the firmware image. The memory subsystem can then perform a verification process to verify the integrity of the firmware image based on one or both of the first signing procedure or the second signing procedure.Type: ApplicationFiled: December 31, 2019Publication date: July 1, 2021Inventors: Tim Markey, James Ruane, Robert W. Strong