US 12,089,049 B2
Virtual subscriber identification module and virtual smart card
Jeffrey Charles Shiner, Richardson, TX (US); Lance W. Dover, Fair Oaks, CA (US); and Olivier Duval, Pacifica, CA (US)
Assigned to Micron Technology, Inc., Boise, ID (US)
Filed by Micron Technology, Inc., Boise, ID (US)
Filed on Sep. 24, 2021, as Appl. No. 17/485,139.
Claims priority of provisional application 63/156,224, filed on Mar. 3, 2021.
Claims priority of provisional application 63/105,820, filed on Oct. 26, 2020.
Prior Publication US 2022/0131700 A1, Apr. 28, 2022
Int. Cl. H04W 12/42 (2021.01); H04L 9/32 (2006.01); H04W 12/069 (2021.01); H04W 8/18 (2009.01)
CPC H04W 12/42 (2021.01) [H04L 9/3234 (2013.01); H04L 9/3236 (2013.01); H04L 9/3247 (2013.01); H04L 9/3278 (2013.01); H04W 12/069 (2021.01); H04L 2209/80 (2013.01); H04W 8/183 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A memory device, comprising:
integrated circuit memory cells formed on one or more integrated circuit dies, including a first memory region of memory cells configured to store device identity data;
a controller configured to generate device identity data representative of the memory device based at least in part on a root secret of the memory device and control access to the first memory region based on an access control key, wherein a command to access the first memory region from an entity without privileges associated with the access control key is rejected, ignored, or discarded; and
a physical unclonable function (PUF) to generate the root secret;
wherein the integrated circuit memory cells are configured to store boot instructions executable by an endpoint having the memory device as one of a plurality of components of the endpoint; and
wherein the controller is further configured to store a card profile in the integrated circuit memory cells to emulate a function of a smart card based on the card profile;
wherein the controller is configured to generate the device identity data representative of the memory device further based on a hash value of applying a cryptographic hash function to the boot instructions stored in a second memory region in the memory device.