In some embodiments, a command may be used by a host processor to access certain information from a non-volatile memory, together with a message authentication code. That information may be utilized to generate a message authentication code on the processor. Then, in any future accesses, the message authentication code generated by the host processor may be compared to the message authentication code from the non-volatile memory to determine the integrity of data or code that is received from the non-volatile memory.

 
Web www.patentalert.com

< Memory array programming circuit and a method for using the circuit

< Register file bit and method for fast context switch

> Method and system for analyzing memory leaks occurring in java virtual machine data storage heaps

> Method and system for wire-speed parity generation and data rebuild in RAID systems

~ 00617