Manufacturers around the world must protect their intellectual property (IP) in everything from consumer electronics to wired and wireless communications equipment. Protecting systems from unintentional overwrites, malicious attacks and cloning is essential, so Micron delivers innovative flash memory security solutions to meet this growing challenge. Our expansive portfolio of security solutions for our Flash products like NAND Flash and NOR Flash, e.MMC, and SSDs enable system manufacturers to protect data from accidental or intentional corruption, as well as unauthorized IP copying or cloning. Hardware, software and combination solutions deliver the flexibility designers need to protect data or IP stored in flash, software and firmware. Learn about some of the specific features offered in Micron’s Flash memory products below:
|Security Features||NOR Flash||NAND Flash||e.MMC||SSD|
|Hardware Write Protect|
|Volatile Block Locking|
|Non-Volatile Block Locking|
|Password Protect Block Locking|
|ATA Security Feature Command Set|
|ATA Standard Password Login|
|Advanced Encryption Standard (AES256)|
|Sanitize and Secure Removal|
|Advanced Security Features|
|Replay Protected Memory Block (RPMB)|
|Replay Protected Monotonic Counter (RPMC)|
Protects the device from probing because balls are on the bottom of the device and soldered to a PCB board.
Protects against accidental or malicious programming or erasing through the hardware pins by enabling:
Protects the entire device or certain ranges of blocks from being programmed and erased; LOCK pin can be enabled/disabled at power-on.
Prevents unexpected program or erase of the flash array from poorly written software or during device power-up — without wearing out arrays — by treating areas with temporary write protection as read-only.
Protects against accidental or malicious programming or erasing, with functionality dependent on the memory family; the PROTECT command can be used to permanently protect blocks from programming and erasing.
Provides a fixed value stored in the memory device, enabling component authentication techniques to reduce component swapping and creating a relationship between the processor and memory to prevent cloning.
Protects blocks from being modified — even when power is removed or the device is reset — by requiring a 64- or 128-bit password.
Prevents access to an SSD during power-up by requiring a password; the ATA password is hidden in an area of the drive (not software) that is inaccessible to users.
Encrypts data in flight and data at rest using a symmetrical encryption algorithm that is a standard in the U.S. and Canada; if correctly implemented, AES256 is impossible to break within a lifetime without extraordinary (and highly unlikely) processing power.
Protects deleted data and previous versions of data by physically erasing the data and reprograming “dummy” data on top of it to ensure that the data is not recoverable.
Trusted mechanism made by device and service
Permanently locks flash blocks so they can no longer be erased or written to; OTP is commonly used to protect initialization or boot code in a system, helping to prevent corruption.
Enables a small amount of information or code to be embedded in an additional space in the memory that cannot be erased or written to.
Enables a secure memory block for storing small amounts of sensitive information, preserving uniqueness and helping to make systems more resistant to rollback and replay attacks; RPMB enables a secure relationship between the host controller and the memory device.
Adds secure incremental monotonic counting to code and data storage in boot memory, preserving uniqueness and helping to make systems more resistant to rollback and replay attacks.
*No hardware, software or system can provide absolute security under all conditions. Micron assumes no liability for lost, stolen or corrupted data arising from the use of any Micron products, including those products that incorporate any of the above security features.