主权项 |
1. A method for securing data on at least one memory chip of a memory module, the method comprising:
receiving, by the memory module, a request for the data from a computer system; receiving, by the memory module, a verification key from the computer system; retrieving, by the memory module, a reference key, the reference key stored on the memory module; generating, by the memory module, a first set of one or more voltages, each voltage capable of being at one of three or more voltage levels, based on the verification key; generating, by the memory module, a second set of one or more voltages, each voltage capable of being at one of three or more voltage levels, based on the reference key; comparing, by the memory module, the first set of voltages to the second set of voltages; determining, by the memory module and based on the comparison of the first set of voltages and the second set of voltages, the verification key does not match the reference key; sending, by the memory module and based on the determined non-match between the verification key and the reference key, a response to the request, wherein the response contains random characters; receiving, by the memory module, a second request for the data from the computer system; receiving, by the memory module, a second verification key from the computer system; retrieving, a second time and by the memory module, the reference key; generating, by the memory module, a third set of one or more voltages, each voltage capable of being at one of three or more voltage levels, based on the second verification key; generating, a second time and by the memory module, the second set of one or more voltages, each voltage capable of being at one of three or more voltage levels, based on the reference key; comparing, by the memory module, the third set of voltages to the second set of voltages; determining, by the memory module and based on the second comparison of the third set of voltages and the second set of voltages, the second verification key does not match the reference key; sending, by the memory module and based on the determined non-match between the second verification key and the reference key, a second response to the computer system, wherein the second response contains a message indicating access is denied to the memory module. |