Systems and methods for preventing data remanence in memory

ABSTRACT

A system for preventing data remanence in memory is provided. The system includes a computing device, a memory chip coupled to the computing device and including memory, and a heater, the heater configured to prevent data remanence in a memory by providing heat to at least a portion of the memory. The memory includes a plurality of bits configured to electronically store data.

BACKGROUND

The present disclosure relates generally to the field of memory for acomputing device. More specifically, the present disclosure relates tothe field of preventing data remanence in memory.

Hackers, corporate spies, and government agents may try to obtainsensitive information (e.g., encryption keys, trade secrets, governmentsecrets, etc.) held by others and stored on computers. Proper softwarecoding and safety precautions may make remote access of this informationprohibitively difficult. However, direct physical access to the memorymay allow an attacker to obtain such information. Thus, sensitiveinformation is often stored in volatile memory so that it can be quicklyerased or lost (i.e., evaporated, decayed, etc.) when power is removedfrom the memory. However, conventional volatile memory tends to retaindata when the memory is cooled. For example, the decay rates in memorycooled to −50° C. may be sufficiently low that data stored in the memorywithout power can be recovered up to one year later. Thus, there is aneed for improved systems and methods for preventing data remanence in amemory.

SUMMARY

One embodiment of the disclosure relates to a system for preventing dataremanence in memory. The system includes a computing device, a memorychip coupled to the computing device and including memory, and a heater,the heater configured to prevent data remanence in a memory by providingheat to at least a portion of the memory. The memory includes aplurality of bits configured to electronically store data.

Another embodiment relates to a method for preventing data remanence ina memory in a computing device, the memory having a plurality of bitsconfigured to electronically store data. The method includes heating atleast some of the bits of the memory and causing accelerated decay ofthe bits of the memory in response to the heating.

Another embodiment relates to a method for use with a memory in acomputing device, the memory having a plurality of bits configured toelectronically store data. The method includes generating electricalenergy based on a temperature difference, providing the electricalenergy to a heater, heating at least some of the bits of the memory, andcausing accelerated decay of the bits of the memory in response to theheating.

Another embodiment relates to a method for use with a memory in acomputing device. The method includes generating a voltage based on atemperature difference, and reducing data remanence in the memory byapplying the voltage to at least a portion of a memory.

Another embodiment relates to a method of protecting sensitive datastored in a memory in a computing device. The method includesdetermining remanence decay values for a plurality of memory siteswithin the memory, and storing data in one or more memory sites based onthe remanence decay values of the memory site.

Another embodiment relates to a system for protecting sensitive data ina memory of a computing device. The system includes a memory chipincluding memory, the memory comprising a plurality of sites configuredto electronically store data, and processing electronics configured todetermine remanence decay values for the plurality of sites and to storedata in one or more memory sites based on the remanence decay values ofthe memory site.

Another embodiment relates to a system for storing sensitive data. Thesystem includes a memory chip coupled to a computing device andincluding memory. The memory includes a plurality of bits configured toelectronically store data, and a portion of the memory is configured tohave minimal increased data remanence upon cooling of the memory. Thesystem further includes processing electronics configured to determinethe sensitivity of a data and to store the data in the memory based onthe sensitivity.

The foregoing is a summary and thus by necessity containssimplifications, generalizations, and omissions of detail. Consequently,those skilled in the art will appreciate that the summary isillustrative only and is not intended to be in any way limiting. Otheraspects, inventive features, and advantages of the devices and/orprocesses described herein, as defined solely by the claims, will becomeapparent in the detailed description set forth herein and taken inconjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a schematic block diagram of a computing device, shownaccording to an exemplary embodiment.

FIG. 2 is a schematic block diagram of a computing device, shownaccording to another embodiment.

FIG. 3 is a schematic block diagram of a computing device, shownaccording to another embodiment.

FIG. 4 is a schematic block diagram of a computing device, shownaccording to another embodiment.

FIG. 5 is a schematic block diagram of a system for controlling heatfrom a heater to a memory, shown according to an exemplary embodiment.

FIG. 6 is a schematic block diagram of a system for controlling heatfrom a heater to a memory, shown according to another embodiment.

FIG. 7 is a schematic block diagram of a system for controlling heatfrom a heater to a memory, shown according to another embodiment.

FIG. 8 is a schematic block diagram of a system for controlling heatfrom a heater to a memory, shown according to another embodiment.

FIG. 9 is a schematic block diagram of a computing device, shownaccording to another embodiment.

FIG. 10 is a detailed block diagram of the processing electronics ofFIGS. 1-4 and 9, shown according to an exemplary embodiment.

FIG. 11 is a flowchart of a process for use with a memory in a computingdevice, shown according to an exemplary embodiment.

FIG. 12 is a flowchart of a process for use with a memory in a computingdevice, shown according to another embodiment.

FIG. 13 is a flowchart of a process for use with a memory in a computingdevice, shown according to another embodiment.

FIG. 14 is a flowchart of a process for use with a memory in a computingdevice, shown according to another embodiment.

FIG. 15 is a flowchart of a process for use with a memory in a computingdevice, shown according to another embodiment.

FIG. 16 is a flowchart of a process for use with a memory in a computingdevice, shown according to another embodiment.

FIG. 17 is a schematic block diagram of a computing device, shownaccording to another embodiment.

FIG. 18 is a schematic block diagram of a computing device, shownaccording to another embodiment.

FIG. 19 is a detailed block diagram of the processing electronics of thecomputing devices of FIGS. 17 and 18, shown according to an exemplaryembodiment.

FIG. 20 is a flowchart of a process for protecting sensitive data storedin a memory of a computing device, shown according to an exemplaryembodiment.

FIG. 21 is a flowchart of a process for protecting sensitive data storedin a memory of a computing device, shown according to anotherembodiment.

FIG. 22 is a flowchart of a process for protecting sensitive data storedin a memory of a computing device, shown according to anotherembodiment.

FIG. 23 is a flowchart of a process for protecting sensitive data storedin a memory of a computing device, shown according to anotherembodiment.

FIG. 24 is a flowchart of a process for protecting sensitive data storedin a memory of a computing device, shown according to anotherembodiment.

DETAILED DESCRIPTION

Referring generally to the Figures, systems and methods for preventing(e.g., reducing, inhibiting, etc.) data remanence in a memory are shownand described. Sensitive information may be stored in a portion of amemory of a computing device (e.g., personal computer, server, portablecommunication devices, personal electronic device, etc.). The sensitiveinformation may be, for example, encryption data, an encryption key,personal information, or any other type of data (e.g., data that mayinclude corporate secrets, government secrets, and other similar typesof sensitive data). Generally, the sensitive information is stored involatile memory so that the information can be quickly erased if athreat is detected. Further, if power is removed from the memory toprevent erasure of the information, the information stored in thevolatile memory is lost (e.g., erased, evaporated, decayed, etc.) due tothe nature of volatile memory. However, for many memory families (e.g.,MOS or CMOS), the colder the memory is, the more time it takes for thememory bits to decay. For example, at an operating temperature ofapproximately 50 degrees Celsius, significant decay occurs in seconds;whereas at −50 degrees Celsius, significant decay may take up to oneyear. Accordingly, in order to capture the information stored in thevolatile memory, an attacker may use a cold boot attack, i.e., chill thememory (e.g., using liquid nitrogen, compressed air, etc.) to retain theinformation in the memory, then reboot the computing device using akernel that can read the information stored in the memory. While eachbit of memory may decay at a different rate after power is removed, oneaspect of the invention ensures that a sufficient number of bits decaysuch that the information as a whole becomes unrecoverable. For example,with a 256-bit encryption key, even if only one-quarter of the bitsdecay, the attacker would still face 64 unknown bits, leaving 18quintillion (18×10^18) possibilities. Thus, while an individual bit mayretain its state, a statistically significant number of bits decay suchthat remanence of the data as a whole is prevented.

The memory and sensitive information may be configured to be erased orlost when a trigger condition is met. The condition may be generallybased on a power status change or threat on the memory chip. Examples ofwhen the condition is met include via user or software command, by aplanned or unplanned power-down of the computer processing unit (CPU) ormemory, and by a change in state of the CPU or operating system such asa locked, hibernate, or sleep state. Other examples of when thecondition is met include via a threat detection, by a motion detectionto determine if the CPU or memory is being physically moved, by locationdetection if the CPU or memory is being moved, by a change in stress,temperature, or applied fields associated with the CPU or memory, by themaking or breaking of an electrical contact, etc.

In one embodiment, a heater may be used to prevent data remanence in amemory. The heater may be activated to provide heat when a triggercondition is met. By applying heat to the memory chip, the decay ratesof memory bits are accelerated or decreased at a lesser rate, therebyimproving the loss or evaporation of information stored in the memory. Acold attack typically occurs over a large area, i.e., it is a bruteforce attack chilling large portions of the computing device. However,the heater need only be configured to provide heat to a specific portionof a memory chip with the most sensitive data. Thus, while the computingdevice becomes quite cold, a relatively small heater may strategicallythwart the cold attack by heating the relatively small mass of selectedmemory portions. Further, if the hacker attempts a more pinpoint coldattack on the memory chip of the computing device, the attack willlikely take long enough such that the computing device may detect theimpending attack, begin erasing data stored on the memory, and heat thememory chip to accelerate decay and inhibit cooling.

In another embodiment, the remanence decay rates or times of the memorychip may be characterized, and the remanence decay times or rates may beused to help prevent data remanence in a memory. Remanence decay timesor rates for various memory sites within the memory chip may bedetermined, and sensitive data may be stored in the memory sites inwhich the decay times are the shortest or decay rates are the fastest.Thus, the sensitive data is among the first data to decay from thememory chip when a trigger condition is met.

In another embodiment, when data remains in a portion of the memory fora significant period of time, the memory bits may be “burned in” to thememory chip such that the decay rates of decay rates are reduced even atelevated temperatures. The software of the computing device may beconfigured to change which memory bits of the memory chip are used tostore sensitive data in order to avoid “burning in” the data in thememory chip.

In another embodiment, portions of the memory may be configured to havea minimal increase in data remanence upon cooling compared to when thereis a “normal” temperature. For example, the construction of the bitsthemselves may be impervious or less affected by lower temperatures(e.g., a cold attack). Since cooling of a memory chip may increase theremanence time of the memory chip (i.e., increasing the amount of timethat sensitive data remains on the memory chip after power is removedfrom the chip), part of the memory may be configured to have a minimallifetime increase upon cooling, and that part of the memory may storethe sensitive data.

For purposes of this disclosure, the term “coupled” means the joining oftwo members directly or indirectly to one another. Such joining may bestationary in nature or moveable in nature and such joining may allowfor the flow of fluids, electricity, electrical signals, or other typesof signals or communication between the two members. Such joining may beachieved with the two members or the two members and any additionalintermediate members being integrally formed as a single unitary bodywith one another or with the two members or the two members and anyadditional intermediate members being attached to one another. Suchjoining may be permanent in nature or alternatively may be removable orreleasable in nature.

Referring now to FIG. 1, a block diagram of a computing device 100 foruse with the systems and methods of the present disclosure is shownaccording to an exemplary embodiment. The computing device 100 may be apersonal computer (PC), server, portable communication device, or anyother type of electronic device configured to store data in a memory.The computing device 100 is shown to include a memory chip 102, whichincludes a memory 104 (e.g., a memory circuit) and a heater 106. Thecomputing device 100 further includes a power supply 110 configured toprovide power for the computing device 100. The power supply may be amains power supply (e.g., a utility power supply), an uninterruptiblepower supply, a generator, or any other suitable type of power supply.The computing device further includes processing electronics 112 and auser input device 114 (e.g., a keyboard, keypad, touchscreen, trackball,button, knob, mouse, etc.).

The memory 104 may be configured to electronically store data. Accordingto an exemplary embodiment, the memory 104 includes a plurality of bitsthat may be configured to store data as a plurality of ones and zeroes.According to another embodiment, the memory 104 has a memory state. Thememory state may be selectively changed and configured to store datatherein. At least some of the data may be any type of sensitive data(e.g., encryption data, an encryption key, encrypted data, orunencrypted data). According to the exemplary embodiment shown, thememory 104 is a volatile memory, which may be, for example, staticrandom access memory (SRAM) or dynamic random access memory (DRAM).

The data in memory 104 is configured to be erased or lost duringspecific events (e.g., if the memory chip is being removed or tamperedwith, if the computing device 100 is being powered down, other triggerconditions, etc.). The heater 106 of the memory chip 102 is configuredto prevent remanence of the data in the memory 104 by providing heat tothe memory chip 102. Generally, the warmer the memory 104, the fasterthe bits of memory decay. Similarly, the warmer the memory 104, thefaster the memory state decays. For example, the heater 106 may inhibitcooling of the memory chip 102 in the event of a cold attack. Applyingheat to the memory 104 may accelerate the decay rate, shorten the decaytime, or otherwise speed up the loss of the data stored therein. In thecase of a cold attack, the heat reduces the deceleration of decay causedby the cold. According to various exemplary embodiments, the heater 106may be configured to heat the whole memory chip 102, to heat a portionof the memory chip 102, to heat the whole memory 104, or to heat aportion of the memory 104.

The heater 106 of FIG. 1 is shown as disposed on the memory chip 102.Referring briefly to FIG. 2, the heater 206 may not be a part of thememory chip 202, but instead may be located elsewhere on the computingdevice 200 (e.g., disposed proximate the memory chip 202). The heater106 may be located either on the memory chip 102 or elsewhere on thecomputing device 100, and the heater 106 is configured to heat thememory chip 102 regardless of the actual physical location of the heater106.

According to one exemplary embodiment, the heater 106 may be powered bythe power supply 110. According to other embodiments, the computingdevice 100 may further include a heater power source 108. The heaterpower source 108 is a power source configured to provide power to theheater 106. As shown, the heater 106 is powered by a power sourceindependent from the power supply 110. In various embodiments, theheater power source 108 may be a battery, capacitor, thermoelectricgenerator, photovoltaic cell, or other type of power source. Having anindependent power source 108 prevents an attacker from simply unpluggingthe computing device to circumvent the heating mechanism. Referringbriefly to FIG. 2, the heater power source 208 is shown as a part of thepower supply 210 instead of independent from the power supply 210. Inyet another embodiment, the heater power source 108 may be external fromthe computing device 100. The heater power source 108, 208 may be abattery or capacitor that is recharged by the power supply 110, 210.

The heater 106 may be any type of heater that is capable of heating upall of or a portion of the memory chip 102, or all or a portion ofmemory 104. In one embodiment, the heater 106 is a resistive heater. Inanother embodiment, the heater 106 is an optical heater. In yet anotherembodiment, the heater 106 is an infrared heater. In yet anotherembodiment, the heater 106 is a thermoelectric heater. According toanother embodiment, the heater 106 is an inductive heater.

In yet another embodiment, the heater 106 is a chemical heater. Forexample, the heater 106 includes a reactive multi-layer foil material(e.g., a “nanofoil”), in which layers of reactive materials may besandwiched together to create the multi-layer foil material, andactivation energy is provided to begin the chemical reaction. Theactivation energy may be provided in response to a trigger condition asgenerally described in the present disclosure. Each layer may be verythin (e.g., between 0.01 and 100 microns thick).

The heater 106 is configured to actively heat the memory 104. The heater106 is not an ambient heat in the computing device 100, is not heatgenerated by current through the data storage circuits of the memory104, nor heat generated by current through the processing electronics112.

Referring now to FIG. 3, a computing device 300 is shown according to anexemplary embodiment. The computing device 300 is shown to include athermoelectric generator 320. The thermoelectric generator 320 isconfigured to generate electrical energy based on a temperaturedifference. In the embodiment of FIG. 3, the thermoelectric generator320 includes a plurality of thermoelectric junctions 322 (e.g.,bimetallic junctions, doped semiconductor junctions, etc.), shown as afirst thermoelectric junction 322 a and a second thermoelectric junction322 b located on the memory chip 302. When a temperature difference iscreated between the first and second thermoelectric junctions 322 a, 322b, (e.g., across the memory chip 302 during a cold attack) electricityis generated in the thermoelectric generator 320. Power from thethermoelectric generator 320 is then provided to the heater 306, whichthen provides heat to the memory 304. According to other embodiments,one or more thermoelectric junctions 322 c located elsewhere in thecomputing device 300 may be used instead of or in addition to one orboth of the first and second thermoelectric junctions 322 a, 322 b.According to one embodiment, one junction 322 is located on a differentportion of the computing device 300. According to another embodiment,neither junction 322 is located on the memory chip 302. According to yetanother embodiment, a plurality of junctions 322 are distributed overmemory chip 302. For example, one or more layers of a circuit board ofthe memory chip 302 may be doped so as to cause a Seebeck effectresponse. According to yet another embodiment, a plurality of junctionsare distributed over a region of the computing device 300. Otherembodiments of the thermoelectric generator 320 may use non-metallicmaterials or junctions (e.g., doped semiconductors, etc.). Whilethermoelectric generators tend to be inefficient, the large area andchange in temperature of the cold attack versus the small area and massof the memory to be heated indicates that sufficient power will begenerated to thwart the attack. Further, the thermoelectric generator320 may be configured such that the gradual and even heating that occursduring normal operation of the computing device will not generate enoughelectricity to cause detrimental heating by the heater 306.

Referring now to FIG. 4, the thermoelectric generator 420 iselectronically coupled to the memory 404 and may be configured toprovide a low voltage to at least some of the bits in the memory 404, toprovide a high voltage to at least some of the bits of the memory 404,to zero at least some of the bits of their memory 404, or to set atleast some of the bits of the memory 404 to one. Accordingly, thethermoelectric generator 420 is configured to begin erasing oroverwriting data stored in memory 404 in response to a change intemperature across a portion of the computing device 400 (e.g., a suddenchange in temperature, a cold attack, etc.). According to oneembodiment, the thermoelectric generator 420 may cause at pattern (e.g.,a random, pseudo random, or non-random distribution) of ones and zeroes.According to another embodiment, the thermoelectric generator 420 isconfigured to begin operating on the bits of memory 404 that containsensitive data first. According to yet another embodiment, thethermoelectric generator 420 may be configured to first erase the bitsof memory 404 that contain memory pointers.

According to the embodiment shown, the thermoelectric generator 420 isconfigured to use a temperature difference between two portions (e.g., afirst location 422 a and a second location 422 b) of the computingdevice 400. Whereas the embodiment of FIG. 3 detects a temperaturechange (and possible attack) across the memory chip 302, the embodimentof FIG. 4 detects a temperature change (and possible attack) across theentire computing device 400. However, the thermoelectric generator 420may use a location 422 c located on the memory chip 402 and thereby usea temperature change across the memory chip 402.

Referring generally to FIGS. 5-8, various exemplary embodiments areshown of a system for controlling heat from a heater 506, 606, 706, 806to the memory 504, 604, 704, 804. The system may control the temperatureof a memory 504, 604, 704, 804 or an environment surrounding a computingdevice to maintain a specified temperature value. For example, a desiredtemperature for the memory or the environment around the memory mayexist, and when the temperature decreases beyond a pre-set threshold,the heater is then triggered. In various embodiments, the specifiedmaintained temperature may be 20 degrees Celsius, 40 degrees Celsius, 50degrees Celsius, greater than 20 degrees Celsius, greater than 40degrees Celsius, greater than 50 degrees Celsius, or anothertemperature. The system may be configured to maintain atime-at-temperature value. For example, the system may be configured tomaintain the temperature of the memory 504, 604, 704, 804, at 50 degrees(or greater) Celsius for 10 seconds. This “time at temperature” mayprovide sufficient time and temperature for the memory bits to decay.According to another embodiment, the system may be configured tomaintain a temperature of 40 degrees (or greater) Celsius for at leastone minute. The system may be configured such that the time maintainedmay be a function of the temperature maintained. For example, if thesystem can maintain a temperature of 50 degrees Celsius, it may onlyneed to provide heat for 10 seconds to allow memory decay of asufficient number of bits that the contents of the memory arenonsensical, unrecoverable or irretrievable. If, however, the system canonly maintain a lower temperature (e.g., 45 degrees Celsius, 35 degreesCelsius, etc.), then the system may maintain that temperature for alonger period of time in order to generate sufficient decay to renderthe data unrecoverable. The length of time may be based on statisticalrates of decay for bits at various temperatures.

The system may control the heat provided by a mechanical or electronicthermostat, a temperature controller in conjunction with a temperaturesensor (e.g., thermocouple, thermostat, etc.), or another deviceconfigured to respond to temperature or heat, to measure a temperature,or to receive a temperature reading from a remote source. The system isused to trigger the heater to accelerate data decay in the memory byraising the temperature and/or maintaining a temperature in thecomputing device in order to resist or inhibit cooling.

Referring to FIG. 5, a thermostat 522 is connected to a heater 506. Thethermostat 522 of FIG. 5 is a device configured to regulate thetemperature of the memory 504 such that the temperature of the memory504 is maintained near a desired point (e.g., set point, specifiedtemperature, etc.). When the thermostat 522 measures a currenttemperature that is not within a threshold, the thermostat 522 maypermit heat from the heater 506 to pass to the memory 504. For example,according to one embodiment, the thermostat 522 may include a bimetallicstrip that is coupled at one end to the memory 504 and that isconfigured to conduct heat from the heater 506 to the memory 504. Whenthe temperature of the memory 504 is above a threshold, the bimetallicstrip does not contact the heater 506. However, when the temperature ofthe memory 504 is below the threshold, the bimetallic strip deflectssuch that the strip contacts the heater 506 and creates a conductivepath for heat from the heater 506 to the memory 504.

In the embodiment of FIG. 5, the thermostat 522 is configured to controlthe flow of heat from the heater 506 to the memory 504. Accordingly, theheater 506 may be always on or open-loop controlled. In the embodimentof FIG. 6, the thermostat 622 is configured to control the heater 606 inresponse to the temperature of the memory 604. For example, thethermostat 622 may be configured to close a circuit between a heaterpower source and the heater 606 in response to the temperature of thememory 604 falling below a threshold. Accordingly, the heater 606 may beclosed-loop controlled.

Referring now to FIG. 7, a temperature sensor 722 is connected to acontrol circuit 724. The temperature sensor 722 provides an input to thecontrol circuit 724 indicative of the current temperature of the memory704 or in the environment around the memory 704. The temperature sensor722 may measure the temperature across a memory chip, across the entirecomputing device, or across any part of the computing device. Thecontrol circuit 724 receives the input from the temperature sensor 722and uses the input to determine if a change in temperature has occurred.If there is a change in temperature exceeding a threshold, the controlcircuit 724 may then be configured to activate the heater 706. Thecontrol circuit 724 may receive an input and compare it to a threshold,according to one embodiment. The control circuit 724 may receivemultiple inputs and compare the inputs to each other and to a thresholdto determine whether to activate the heater 706, according to anotherembodiment.

In the embodiment of FIG. 7, the control circuit 724 is coupled to theheater 706 and is configured to provide closed-loop control of theoperation of the heater 706. Referring now to FIG. 8, the controlcircuit 824 is thermally coupled between heater 806 and memory 804 andis configured to control the flow of heat from the heater 806 to thememory 804. For example, according to one embodiment, the controlcircuit 824 opens and closes a switch along a conductive path betweenthe heater 806 and the memory 804. Thus, while the heater 806 may bealways on or open-loop controlled, the amount of heat that istransferred from the heater 806 to the memory 804 may be closed-loopcontrolled.

While the embodiments of FIGS. 5-8 are described as triggering theheating of the memory, these systems may instead or further beconfigured to decouple heat from the memory, for example, to preventoverheating of the memory 504, 604, 704, 804. According to variousembodiments, the thermostat 522, 622 or control circuit 722, 822 may beconfigured to cause heating of the memory 504, 604, 704, 804 when thetemperature of the memory is below a first threshold value, and toinhibit heating of the memory 504, 604, 704, 804 when the temperature ofthe memory is above a second threshold value.

Referring now to FIG. 9, a computing device 900 is shown according toanother exemplary embodiment. The computing device 900 includes anactivation circuit 926. According to one embodiment, the activationcircuit 926 is configured to cause the heater 906 to provide heat inresponse to a trigger condition by providing an activation signal to theheater 906 or the heater power source 908. The heat from the heater 906is then used to prevent data remanence on the memory 904. That is, theheat may be used to accelerate decay of the data stored in the memory904. According to other embodiments, the activation circuit 926 may beconfigured to cause at least some of the bits in the memory 904 to havea zero value or a one value. The changing of the values of bits mayoccur by applying a high or low voltage to the bits. The activationcircuit 926 may be connected to any number of other computing device 900components, including processing electronics 912, the user input device914, and the power supply 910, and may provide instructions to anycomputing device 900 component to affect the operation of the heater 906or computing device 900 in reaction to the trigger condition. Accordingto one embodiment, the activation circuit 926 may cause the processingelectronics 912 to command or otherwise cause the erasure of the datestored in the memory 904. The activation circuit 926 may be mechanical(e.g., a thermostat as described in FIGS. 5-6), may be processingelectronics, may be solid-state electronics, may be a switch or othermechanical or electrical components.

The activation signal may be sent based on any number of events ortrigger conditions. In one embodiment, the trigger condition may be auser command to erase the data in the memory 904. In another embodiment,the trigger condition may be a software command to erase the memorybased on software configuration. In another embodiment, the triggercondition may be a planned power-down of the memory 904 or computingdevice 900. In another embodiment, the trigger condition may be anunplanned power-down of the memory 904 or computing device 900. Inanother embodiment, the trigger condition may be a change in state ofthe computing device. The change in state may be when the computingdevice enters a locked state, a sleep state, or a hibernation state,etc.

In one embodiment, the trigger condition is a threat detection. Thethreat detection may occur in response to a power signal. For example,the power signal may indicate when a power supply to the computingdevice is cut off or otherwise changed.

The threat detection may occur in response to an accelerometer signal.The accelerometer signal may be a signal representing physical movementof the memory chip 902 or computing device 900, or may be a signalrepresenting relative motion of the memory chip 902 and computing device900 (e.g., if the memory chip 902 and computing device 900 are moving inopposing directions). For example, if an attacker is manually trying tomove the computing device 900 or remove the memory chip 902 from thecomputing device 900, the accelerometer signal may indicate suchactivity. The accelerometer may further detect motion of a portion ofthe computing device 900. For example, if movement of a lid, cover, ormemory enclosure is detected, the accelerometer signal indicates athreat exists.

The threat detection may occur in response to a location signal. Thelocation signal may be provided by a global positioning system (GPS),cellular network signal, or other signal or system. For example, if thecomputing device 900 is a portable device, a GPS may be used todetermine the location of the computing device 900 at all times. Whenthe computing device 900 is located outside of a pre-determined boundfor the location of the computing device 900, it may be determined thatthe computing device 900 was stolen or otherwise moved, and a threat istherefore detected. As another example, the computing device 900 may bea cell phone and the cellular network signal may be used to determine ifthe computing device 900 is located outside of a pre-determined bound.The pre-determined bound may simply be an area or location in which thecomputing device 900 should always be located within.

The threat detection may occur in response to a stress signal or strainsignal. For example, a physical attack on a memory chip 902 or computingdevice 900 may be detected via a stress or strain gauge. If pressure orforce is exerted on the memory chip 902 or computing device 900 beyond anormal or expected level, a stress signal or strain signal may be usedto indicate a current threat.

The threat detection may occur in response to a temperature signal(e.g., if the temperature of a portion of the computing device 900 orthe environment surrounding the computing device 900 changes). Thetemperature signal may be caused by a thermostat, thermistor,thermocouple, thermometer, temperature sensor, or other device formeasuring, detecting, or responding to a temperature.

The threat detection may occur in response to an applied field signal.If a magnetic, inductive, or capacitive field is generated, disruptionof the field may cause an applied field signal that indicates a currentthreat. According to one embodiment, a field may be established betweena lid or cover of the computing device 900 or a memory enclosure andanother portion of the computing device 900. Subsequent removal ortampering with the lid or cover may disrupt the field, thereby causingan applied field signal. According to another embodiment, the appliedfield may be established between the memory chip 902 and another portionof the computing device 900.

The threat detection may occur in response to the making or breaking ofan electrical contact. For example, the activation circuit 926 may be aswitch that is closed when a cover is opened or removed from thecomputing device 900. According to another embodiment, the activationcircuit 926 may include an electrical contact that is broken when a lid,cover, or memory enclosure is removed from the computing device 900.

Referring now to FIG. 10, a block diagram of processing electronics 1000configured to execute the systems and methods of the present disclosureis shown, according to an exemplary embodiment. The processingelectronics 1000 may be similar to the processing electronics of FIGS.1-4 and 9 (e.g., processing electronics 112, 212, 312, 412 or 912). Theprocessing electronics 1000 as shown may be part of a computing deviceas described in the present disclosure.

The processing electronics 1000 includes a processor 1002 and memory1004. The processor 1002 may be implemented as a general purposeprocessor, an application specific integrated circuit (ASIC), one ormore field programmable gate arrays (FPGAs), a group of processingcomponents, or other suitable electronic processing components. Thememory 1004 is one or more devices (e.g., RAM, ROM, Flash memory, harddisk storage, etc.) for storing data and/or computer code for completingand/or facilitating the various processes described herein. The memory1004 may be or include non-transient volatile memory or non-volatilememory. According to various embodiments, the memory 1004 may be orinclude the memory 104, 204, 304, 404, 504, 604, 704, 804, or 904 of thecomputing device 100, 200, 300, 400, 500, 600, 700, 800 or 900. Thememory 1004 may include data base components, object code components,script components, or any other type of information structure forsupporting the various activities and information structures describedherein. The memory 1004 may be communicably connected to the processor1002 and includes computer code or instructions for executing one ormore processes described herein.

The memory 1004 includes a memory buffer 1006. The memory buffer 1006 isconfigured to receive data via an input 1030. The data may include datafrom a temperature sensor or temperature controller, data from anactivation circuit relating to a trigger condition, or other data thatmay be used to determine whether a heater should or should not beactivated.

The memory 1004 further includes configuration data 1008. Theconfiguration data 1008 includes data relating to the processingelectronics 1000 or to various controllers or temperature sensors. Forexample, the configuration data 1008 may include information relating toa retrieval process of data from a temperature sensor or controller,from an activation circuit or control circuit, or otherwise. Theconfiguration data may include transfer functions for thermocouples,strain gauges, etc.

The memory 1004 further includes a communication module 1010. Thecommunication module 1010 is configured to provide communicationcapability with other components of the computing device via the output1020. For example, the communication module 1010 may be configured toprovide a command to a heater to begin heating a memory chip in responseto a determination by a module 1014, 1016.

The memory 1004 further includes a user interface module 1012. The userinterface module 1012 is configured to receive a user input from theinput 1030 and to interpret the input for the other modules of theprocessing electronics 1000. For example, the user interface module 1012may receive a user request to erase sensitive data on a memory chip andmay be configured to provide a command to a heater or heater powersource via the output 1020 to begin heating the memory chip.

The memory 1004 is shown to include modules 1014-1016 for executing thesystems and methods described herein. The temperature control module1014 may receive a temperature input via the input 1030 and use thetemperature input to determine whether a heater should activate to erasedata on a memory chip. Such a determination may be made by thetemperature control module 1014 by comparing the temperature input to adesired temperature and to other temperature data. For example, if thetemperature is below a given threshold, the temperature control module1014 may send a command to a heater or heater power source via theoutput 1020 to begin heating. As another example, if a sudden change intemperature is detected based on the temperature input and previoustemperature data, the temperature control module 1014 may send a commandto a heater via the output 1020 to begin heating. It should beunderstood that the temperature control module 1014 may be remotelylocated from the processing electronics 1000 in various embodiments andmay still perform the functionality described herein. The temperaturecontrol module 1014 may also be configured to control the temperature ofthe computing device. For example, the temperature control module 1014may receive signals from or provide commands to the control circuits724, 824 or the embodiments of FIGS. 7 and 8.

The memory 1004 is shown to include an activation module 1016. Theactivation module 1016 may receive an input relating to a possibletrigger condition or threat to the computing device or memory chip, andmay determine if a heater of the computing device should be activated toaccelerate decay of memory bits on the memory chip. The input may beprovided by, for example, an activation circuit of the computing device(e.g., activation circuit 926 of FIG. 9). The input may relate to apotential trigger condition or threat to the computing device.

In one embodiment, the activation module 1016 receives a user commandfrom the input 1030 or a software command from another component of theprocessing electronics 1000, and provides a signal to activate a heaterto an activation circuit remotely located from the processingelectronics 1000. In another embodiment, the activation module 1016 mayreceive an indication that the computing device or memory chip ispowering down and provides a signal to activate a heater in response tothe power status change. In another embodiment, the activation modulemay receive an indication that a state of the computing device (e.g.,sleep state, hibernation state, locked state, etc.) is beginning orending and, in response, provides a signal to activate or deactivate aheater. In another embodiment, a threat detection may be provided to theactivation module 1016 (e.g., via the activation circuit 926 of FIG. 9)and the activation module 1016 may determine whether or not the threatis legitimate, for example, by comparing the detected threat to otherdata, signals, inputs or thresholds.

The processing electronics 1000 further includes an output 1020 andinput 1030. The output 1020 is configured to provide an output to anycomponent of the computing device as described above. Outputs mayinclude, for example, a command to initiate heating of a memory chip anda command to erase the data stored in a memory. The input 1030 isconfigured to data from the various components of the computing deviceas described above.

Referring generally to FIGS. 11-16, various processes for preventing orreducing data remanence in a memory of a computing device are shown. Theprocesses of FIGS. 11-16 may be implemented by the various systemsdescribed in FIGS. 1-10. The data in the memory may be encryption data,an encryption key, or other encrypted or unencrypted data. The memorymay be volatile memory and may include SRAM or DRAM. The computingdevice may be a personal computer, server, portable communicationdevice, personal electronic device, or another electronic device.

The heater as described in FIGS. 11-14 is configured to provide activeheating instead of providing heating via residual heat from currentthrough the data storage circuits of the memory, processing electronicsof the computing device, or ambient heat in the computing device. Theheater may be a resistive heater, optical heater, infrared heater,thermoelectric heater, or chemical heater.

Referring to FIG. 11, a flow diagram of a process 1100 for use with amemory in a computing device is shown, according to an exemplaryembodiment. The process 1100 includes accelerating decay of a memory ofa computing device by heating at least a portion of the memory (step1102). The heating of the memory may include activating a heater, andallowing the heat to accelerate the decay of memory bits on the memorychip of the computing device. According to one embodiment, the memoryincludes a plurality of bits configured to electronically store data,and the process includes the steps of heating at least some of the bitsof the memory and causing accelerated decay of the bits of the memory inresponse to the heating.

Referring to FIG. 12, a flow diagram of a process 1200 for use with amemory in a computing device is shown, according to another exemplaryembodiment. The process 1200 includes detecting a threat (step 1202).The threat may detected by an activation module or activation circuit,according to an exemplary embodiment. The activation module may receivean input from an activation circuit relating to a trigger condition asdescribed in FIGS. 9-10.

The process 1200 further includes determining whether to provide anactivation signal (step 1204) that would, for example, activate a heaterof the computing device. The threat detection of step 1202 may be usedto determine if activation of the heater is needed. For example, alocation signal may be received and used in step 1204 to determine ifthe current location of the computing device represents a threat. Asanother example, a sudden change in temperature may be used in step 1204to determine if a hacker is attempting a cooling attack on the memorychip of the computing device. Various other types of threats may bedetected and used in step 1204 as described in FIGS. 9-10.

The process 1200 further includes providing an activation signal tocause the heating (step 1206). The activation signal may be provideddirectly to the heater, to a heater power source, to a control circuitcoupled to the heater, or otherwise. The process 1200 further includesreceiving energy from a power source (step 1208). The power source maybe a power supply of the computing device, a heater power sourceconfigured specifically to provide a power source to the heater, a powersource external to the computing device, or otherwise. The power sourcemay be a battery, capacitor, thermoelectric generator, photovoltaiccell, etc.

The process 1200 further includes accelerating decay of the memory byheating at least a portion of the memory (step 1210). The heating caninhibit cooling of the memory (in the case where the memory chip isbeing cooled) or raise the temperature of the memory chip. The heatingmay be provided by a resistive heater, optical heater, infrared heater,thermoelectric heater, chemical heater, or any other type of heater. Theheater may be coupled to the memory chip including the memory or bespaced apart from the memory chip including the memory. The heater mayheat a portion or the entire memory chip.

The process 1200 may further include controlling the temperature of thememory (step 1212). For example, if the memory is currently under acooling attack, the temperature of the memory may be controlled suchthat a cooling of the memory is prevented or delayed. Step 1212 mayinclude receiving at a temperature control circuit a temperature signalindicative of the current temperature and providing enough heat toincrease the current temperature to a desired temperature (e.g., 20degrees Celsius, 40 degrees Celsius, between 40 and 50 degrees Celsius,etc.).

The process 1200 may further include controlling the time-at-temperatureof the memory (step 1214). For example, a desired temperature of thememory or the environment around the memory may be maintained for aprescribed time. In various embodiments, the temperature to maintain maybe 20 degrees Celsius, greater than 20 degrees Celsius, 40 degreesCelsius, greater than 40 degrees Celsius, 50 degrees Celsius, greaterthan 50 degrees Celsius, or another temperature.

The process 1200 further includes applying a voltage to at least some ofthe bits in the memory (step 1216). The process 1200 may further includecausing at least some of the bits to have a zero value (step 1218) or aone value (step 1220) in response to applying the voltage to the bits inthe memory. Steps 1218, 1220 may be implemented as a way to erase thedata in the memory by changing all or a significant number of bits to azero or one, thereby rendering the data useless, unrecoverable, orcorrupted.

Referring now to FIG. 13, a flow diagram of a process 1300 for use witha memory in a computing device is shown, according to another exemplaryembodiment. The process 1300 uses a temperature difference to provideenergy to a heater to erase the data in a memory chip. The process 1300may be implemented using a thermoelectric generator as described inFIGS. 3-4. The process 1300 includes generating electrical energy basedon a temperature difference (step 1302). For example, the temperaturedifference may be a temperature difference across the memory. The energymay be generated by a thermoelectric generator. The process 1300 furtherincludes providing the electrical energy to a heater (step 1304) andpreventing data remanence in the memory by heating at least a portion ofthe memory (step 1306). The heater provides heat to the memory whichprevents or reduces data remanence by accelerating (e.g., inhibitingdeceleration) of decay of memory bits. According to one embodiment, thememory includes a plurality of bits configured to electronically storedata, and the process includes the steps of heating at least some of thebits of the memory and causing accelerated decay of the bits of thememory in response to the heating.

Referring now to FIG. 14, a flow diagram of a process 1400 for use witha memory in a computing device is shown, according to another exemplaryembodiment. The process 1400 uses a temperature difference across thecomputing device to provide energy to a heater to erase the data in amemory chip. The process 1400 includes generating electrical energy at athermoelectric generator (e.g., the thermoelectric generator of FIGS.3-4) based on a temperature difference between a first portion of thecomputing device and second portion of the computing device (step 1402).In one embodiment, the first portion may be disposed on the memory ofthe memory chip. In another embodiment, neither portion may be disposedon the memory of the memory chip. The process 1400 further includesproviding the electrical energy to a heater (step 1404) and preventingdata remanence in a volatile memory by heating at least a portion of thememory (step 1406). The heater provides heat to the memory whichprevents or reduces data remanence by accelerating (e.g., inhibitingdeceleration) of decay of memory bits.

Referring now to FIG. 15, a flow diagram of a process 1500 for use witha memory in a computing device is shown, according to another exemplaryembodiment. The process 1500 uses voltage to change bits stored in thememory. The process 1500 includes generating a voltage based on atemperature difference (step 1502). The temperature difference may beacross a memory chip or across any portion of the computing device. Theprocess 1500 further includes preventing or reducing data remanence inthe memory by applying the voltage to at least a portion of the memory(step 1504). For example, the voltage may change some or all of the bitsto zeroes or change some or all of the bits to ones.

Referring now to FIG. 16, a flow diagram of a process 1600 for use witha memory in a computing device is shown, according to another exemplaryembodiment. The process 1600 uses voltage to change bits stored in thememory. The process 1600 includes generating a voltage at athermoelectric generator based on a temperature difference between afirst portion of the computing device and a second portion of thecomputing device (step 1602). The process 1602 further includespreventing or reducing data remanence in a volatile memory by applyingthe voltage to at least a portion of a memory (step 1604). The voltagemay cause the bits in the memory to change value. For example, at leastsome of the bits in the memory are caused to have a zero value (step1606) or cause at least some of the bits in the memory to have a onevalue (step 1608) in response to the voltage.

Referring generally to FIGS. 17-24, systems and methods for protectingsensitive data in a memory of a computing device are shown. In theembodiments of FIGS. 17-24, remanence decay values may be determined(e.g., calculated, characterized, etc.) for volatile memory or portionsof volatile memory (e.g., one or more memory sites, bits of memory,bytes of memory, sectors of memory, etc.). Remanence decay valuesrepresent the amount of time it takes to erase data for a given memorysite. A remanence decay value may be a time, a rate, a time constant, acoefficient or exponent of a decay function, etc. A remanence decayvalue may be temperature dependent, i.e., a remanence decay value may bea function of temperature. Using the remanence decay times, the mostsensitive data (e.g., the data to be erased first in response to atrigger event) is placed in the memory sites with the fastest remanencedecay values (e.g., shortest decay times, fastest decay rates, fastestdecay values as a function of temperature, fastest decay values as afunction of cooling, values leading to the fastest data decay, etc.).The volatile memory may be SRAM, DRAM, or any other type of volatilememory.

Referring now to FIG. 17, a block diagram of a computing device 1700 isshown, according to an exemplary embodiment. The computing device 1700may be a personal computer, server, portable communication device,personal electronic device, or other device. The computing device 1700includes a memory chip 1702 including a volatile memory 1704 and anon-volatile memory 1706. The computing device 1700 further includesprocessing electronics 1712 and a user input device 1714.

Referring now to FIG. 18, the computing device 1800 is shown accordingto another exemplary embodiment. The memory chip 1802 is shown toinclude a memory 1804. Compared to FIG. 17, the computing device 1700 isshown to include another memory 1832 that may include a volatile memory1034 and/or a non-volatile memory 1836. For example, memory 1832 may beanother RAM chip (e.g., a second bank of RAM), cache memory, ROM, a harddrive, etc.

The memory 1704, 1706, 1804 and 1832 of FIGS. 17-18 includes multiplememory sites that are configured to electronically store data. Remanencedecay values may be calculated for each volatile memory site (asdescribed in FIG. 19) and data may be stored in the memory based on theremanence decay values. According to one embodiment, the remanence decayvalues may be determined before the memory chip 1702, 1806 is installedinto the computing device 1700, 1800. For example, the remanence decayvalues may be determined at the memory factory or at the computingdevice factory. The remanence decay values may then be stored innon-volatile memory 1706 on the memory chip 1702 (see e.g., FIG. 17) orstored in a separate non-volatile memory 1836 that is off-board thememory chip 1802 (see e.g., FIG. 18). According to one embodiment, thememory manufacturer may provide the decay values as a file to thecomputing device manufacturer, and the file is stored or installed intothe computing device after the memory has been assembled into thecomputing device.

According to another embodiment, the remanence decay values may bedetermined after the memory chip 1702, 1802 is installed into thecomputing device 1700, 1800. The decay values may be determined by, forexample, a program or application on the computing device 1700, 1800 andmay be stored in volatile memory 1704, 1804, 1834 or non-volatile memory1706, 1836. The decay values may be stored on the same memory chip(e.g., memory chip 1702, 1802) or in another memory. For example, thecharacterization of the decay values of a first memory 1804 may bestored in a second memory 1834, and vice versa. Accordingly, a computingdevice may operate off of the second memory 1834 while removing powerfrom the first memory 1804 to determine remanence decay values, and viceversa. Remanence decay values may be determined once, or may bere-determined on a regular or irregular time or event (e.g., startup,shutdown, etc.) basis. According to one embodiment, decay values aredetermined at startup of the computing device and stored in volatilememory. According to another embodiment, decay values are determined atshutdown and stored in non-volatile memory.

Referring now to FIG. 19, a more detailed block diagram of theprocessing electronics 1900 is shown, according to an exemplaryembodiment. The processing electronics 1900 may be the processingelectronics 1712, 1812 of the embodiments of FIGS. 17 and 18. Theprocessing electronics 1900 may be configured to determine remanencedecay values for the memory chip and memory of FIGS. 17-18 and determinewhere to store data in the memory 1702, 1802 or 1832 of FIGS. 17-18. Forexample, the processing electronics 1712 may determine that a particularportion of the volatile memory 1704 has the fastest remanence decayvalue and may store the most sensitive data in that particular portionof the volatile memory 1704.

The processing electronics 1900 is shown to include a processor 1902 andmemory 1904, which may be similar to the processor 1002 and memory 1004as described in FIG. 10. The memory 1904 includes a memory buffer 1906,configuration data 1908, communication module 1910, and user interfacemodule 1912 which may have similar functionality of the memory buffer1006, configuration data 1008, communication module 1010, and userinterface module 1012 of the processing electronics of FIG. 10. Thememory buffer 1906 may store signals, representations of signals, ordata until accessed by another module 1910-1920. Configuration data 1908may include information about the memory (e.g., speeds, single or doubledata rate, error checking, etc.).

The memory 1904 includes a remanence decay value module 1914. Theremanence decay value module 1914 is configured to determine remanencedecay values for one or more memory sites of a memory. For each memorysite, the remanence decay value module 1914 determines a valuerepresentative of a rate or time it takes for the memory site to loseits data (i.e., for a memory bit to decay or become unrecoverable uponremoval of power from the volatile memory). In one embodiment, the valueis represented as a period of time the memory site takes to decay. Inanother embodiment, the value is represented as a decay raterepresenting the rate at which bits in the memory site are erased. Inother embodiments, the remanence decay values are temperature dependent.

The remanence decay value for each memory site may be stored in, forexample, remanence decay value data 1922. The remanence decay value data1922 stores the remanence decay value for each memory site and providesthe values to a data storage module 1920 or decay sensitivitycorrelation module 1918 for determining which data is stored in whichmemory site. The remanence decay value data 1922 may be stored in anytype of data structure. For example, the remanence decay values andcorresponding memory site may be stored in a table, array, database,etc.

The table or other data structure may be updated with new remanencedecay values when provided by the remanence decay value module 1914.According to an exemplary embodiment, the remanence decay value module1914 may periodically recalculate remanence decay values based on apre-set schedule or other non-scheduled event. For example, theremanence decay value data 1922 is updated after regular time intervalsor irregular time intervals. As another example, the remanence decayvalue data 1922 is updated each time the computing device is powered onor off. As yet another example, the remanence decay value data 1922 isupdated in response to a user command or software command.

Updating the remanence decay value data 1922 may include overwriting aninitial set of remanence decay values already stored. The initial set ofremanence decay values may have been determined before the memory wasinstalled in the computing device. As one example, the decay value datamay be determined via a factory test and the data is provided to theuser of the computing device. As another example, a hardware test of theactual computing device may be performed to determine the remanencedecay value data 1922 initially. According to another embodiment, theremanence decay values may initially be determined after installation ofthe memory on the computing device, either via a hardware test or viasoftware (e.g., computer code instructions executable by the processor902) in the remanence decay value module 1914.

According to various exemplary embodiments, the remanence decay valuedata 1922 may be stored outside of the memory 1904. For example, theremanence decay value data 1922 may be stored in a volatile ornon-volatile memory of the computing device as shown in FIG. 18 (awayfrom the memory chip), in a volatile or non-volatile memory of a memoryon a memory chip as shown in FIG. 17, or in a database that may beaccessed over a network (e.g., the internet, local area network, etc.).

The memory 1904 includes a data sensitivity module 1916. The datasensitivity module 1916 is configured to determine sensitivity of datato be stored in a memory of the computing device. For example,encryption keys, encryption program parameters, and other encrypted datamay be determined to be sensitive data by the data sensitivity module1916, while other unencrypted data or operating system files may bedetermined to be less sensitive. The data sensitivity module 1916classifies all the data to be stored in a memory of the computing devicesuch that the other modules of the processing electronics 1900 place thedata in the appropriate memory site.

The memory 1904 includes a decay sensitivity correlation module 1918.The decay sensitivity correlation module 1918 is configured to correlatethe sensitivity of the data (determined by module 1916) with theremanence decay values (determined by module 1914). For example, themost sensitive data is correlated with the fastest remanence decayvalues, i.e., those leading to the fastest data decay. The correlationmay be based on the type of data. For example, if the data is anencryption program parameter or encryption key, the data may becorrelated with the fastest remanence decay values. The correlation maybe based on comparing the remanence decay values to a threshold value.For example, the most sensitive data may be stored in memory sites wherethe remanence decay values are faster than the threshold value. Thedecay sensitivity correlation module 1918 may be configured toprioritize data based on the level of sensitivity, or may be configuredto simply bifurcate the data into sensitive versus non-sensitive groups.The threshold value may be set by a user or automatically determined bythe processing electronics 1900.

The memory 1904 includes a data storage module 1920. The data storagemodule 1920 is configured to receive correlation information from module1918 and use the correlation information to assign the data to itsrespective memory site.

In order to prevent burn-in of the data in a given memory site over along period of time, the data storage module 1920 may be configured tochange the memory site of a portion of the data on a given schedule orbased on trigger condition events. In one embodiment, the data storagemodule 1920 is configured to move data between memory sites with similarremanence decay values. The process of moving the data from one memorysite to another includes comparing remanence decay values of memorysites to a threshold value and moving the data to a memory site having aremanence decay value faster than the threshold value. For example, thedata storage module 1920 may only store encryption keys in memory siteshaving at least a first decay rate, whereas generally encrypted data maybe stored in memory sites having at least a second decay rate, thesecond decay rate slower than the first decay rate.

The processing electronics 1900 further includes an output 1950 andinput 1955. The output 1950 is configured to provide an output to anycomponent of the computing device as described above. Outputs mayinclude, for example, a command to specific data in specific memorysites. The input 1955 is configured to receive data from the variouscomponents of the computing device as described above.

Referring now to FIG. 20, a flow diagram of a process 2000 of protectingsensitive data stored in a memory of a computing device is shown,according to an exemplary embodiment. The process 2000 includesdetermining remanence decay values for a plurality of memory siteswithin a memory (step 2002). The remanence decay values may bedetermined by, for example, the remanence decay value module 1914 ofFIG. 19. The remanence decay values may be periods of time or decayrates, according to an exemplary embodiment. The process 2000 furtherincludes storing data in one or more memory sites based on the remanencedecay values of the memory sites (step 2004). The data is stored in amemory site by, for example, the data storage module 1920 of FIG. 19.The memory site includes at least one bit configured to electronicallystore data.

Referring now to FIG. 21, a flow diagram of a process 2100 of protectingsensitive data stored in a memory of a computing device is shown,according to another exemplary embodiment. The process 2100 includesdetermining remanence decay values for a plurality of memory siteswithin a memory (step 2102). The process 2100 further includes storingthe remanence decay values and the corresponding memory sites in a datastructure (step 2104). The data structure may be a table, according toone embodiment. The process 2100 further includes storing data in one ormore memory sites based on the remanence decay values of the memory site(step 2106). The process 2100 further includes determining new remanencedecay values for a plurality of memory sites within the memory (step2108). The new remanence decay values may be determined on a regular orirregular time interval, may be determined in response to a user commandor software command, or otherwise. The process 2100 further includesupdating the data structure based on new remanence decay values (step2110).

Referring now to FIG. 22, a flow diagram of a process 2200 of protectingsensitive data stored in a memory of a computing device is shown,according to another exemplary embodiment. The process 2200 includesdetermining remanence decay values for a plurality of memory siteswithin a memory before the memory is installed into a computing device(step 2202). The process 2200 further includes providing the remanencedecay values to the computing device (step 2204) and storing the data inone or more memory sites based on the remanence decay values of thememory site (step 2206). While step 2202 is executed before the memoryis installed within a computing device, other processes (e.g., process2100) may then be executed later (e.g., after the memory is installedinto the computing device) that overwrites the remanence decay valuesdetermined in step 2204.

Referring now to FIG. 23, a flow diagram of a process 2300 of protectingsensitive data stored in a memory of a computing device is shown,according to another exemplary embodiment. The process 2300 includesdetermining remanence decay values for a plurality of memory siteswithin the memory (step 2302). The process 2300 further includescorrelating the sensitivity of the data with the remanence decay values(step 2304). Step 2304 may be executed by, for example, a decaysensitivity correlation module 1918 shown in FIG. 19. The correlationmay be based on the type of data. For example, encryption keys orprogram parameters may be classified as sensitive data. The correlationmay also be based on a comparison of the remanence decay values to athreshold value. For example, the memory sites with remanence decayvalues faster than the threshold value may be used to store the mostsensitive data.

The process 2300 further includes storing data in one or more memorysites based on the remanence decay values of the memory site (step2306). Step 2306 may include storing the most sensitive data in memorysites with the fastest remanence decay values. The process 2300 furtherincludes preventing burn-in of the data by moving the data betweenmemory sites with similar remanence decay values (step 2308). Step 2308may be executed by, for example, the data storage module 1920 of FIG.19. Step 2308 may include comparing the remanence decay values to athreshold value and moving the data to the memory sites having remanencedecay values faster than the threshold value.

Referring now to FIG. 24, a flow diagram of a process 2400 of protectingsensitive data stored in a memory of a computing device is shown,according to another exemplary embodiment. The process 2400 includesdetermining remanence decay values for a plurality of memory siteswithin the memory (step 2402). The process 2400 further includescorrelating the sensitivity of the data with the remanence decay values(step 2404). The process 2400 further includes storing data in one ormore memory sites based on the remanence decay values of the memory site(step 2406). The process 2400 further includes comparing the remanencedecay values to a threshold value (step 2408). The comparison may bemade by, for example, a decay sensitivity correlation module 1918 ordata storage module 1920 of FIG. 19. The process 2400 further includespreventing burn-in of the data by moving the data to memory sites havingremanence decay values faster than the threshold value (step 2410).

Volatile memory is generally susceptible to cold attacks because thedata remanence of the memory increases (i.e., the decay rates decrease)as temperature decreases. According to another aspect of the disclosure,the memory itself may be configured to have a minimal increase in dataremanence upon cooling of the memory. For example, the construction ofthe bits themselves may be impervious or less affected by lowertemperatures (e.g., a cold attack). In one embodiment, the memory mayinclude bi-polar junction transistors. The bi-polar junction transistorsare configured to have a minimal increase data remanence upon cooling.Therefore, the systems and methods of the present disclosure may includestoring the most sensitive data (e.g., encryption program parameters,encryption keys, other encrypted data, etc.) in the portion of thememory including the bi-polar junction transistors, allowing such datato decay earlier than other data in the memory in the event of a coolingattack. The bi-polar junction transistors may be part of a BiCMOS line(an integration of bi-polar junction transistors and complementarymetal-oxide semiconductor (CMOS) technology), according to an exemplaryembodiment.

Various systems and methods described above may be used separately or inconjunction with one another. For example, the heater of FIGS. 1-3 maybe used in conjunction with memory overwriting of FIG. 4 and the decaysensitivity correlations of FIGS. 17-23. These systems and methods mayfurther be used with the temperature dependent data remanence resistantmemory described above. It should be understood that any combination ofmethods as described above may be used in the prevention of dataremanence.

The construction and arrangement of the elements of the systems andmethods as shown in the exemplary embodiments are illustrative only.Although only a few embodiments of the present disclosure have beendescribed in detail, those skilled in the art who review this disclosurewill readily appreciate that many modifications are possible (e.g.,variations in sizes, dimensions, structures, shapes and proportions ofthe various elements, values of parameters, mounting arrangements, useof materials, colors, orientations, etc.) without materially departingfrom the novel teachings and advantages of the subject matter recited.For example, elements shown as integrally formed may be constructed ofmultiple parts or elements. It should be noted that the elements andassemblies described herein may be constructed from any of a widevariety of materials that provide sufficient strength or durability, inany of a wide variety of colors, textures, and combinations.Additionally, in the subject description, the word “exemplary” is usedto mean serving as an example, instance, or illustration. Any embodimentor design described herein as “exemplary” is not necessarily to beconstrued as preferred or advantageous over other embodiments ordesigns. Rather, use of the word exemplary is intended to presentconcepts in a concrete manner. Accordingly, all such modifications areintended to be included within the scope of the present inventions. Theorder or sequence of any process or method steps may be varied orre-sequenced according to alternative embodiments. Other substitutions,modifications, changes, and omissions may be made in the design,operating conditions, and arrangement of the preferred and otherexemplary embodiments without departing from scope of the presentdisclosure or from the scope of the appended claims.

The present disclosure contemplates methods, systems and programproducts on any machine-readable media for accomplishing variousoperations. The embodiments of the present disclosure may be implementedusing existing computer processors, or by a special purpose computerprocessor for an appropriate system, incorporated for this or anotherpurpose, or by a hardwired system. Embodiments within the scope of thepresent disclosure include program products comprising machine-readablemedia for carrying or having machine-executable instructions or datastructures stored thereon. Such machine-readable media can be anyavailable media that can be accessed by a general purpose or specialpurpose computer or other machine with a processor. By way of example,such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROMor other optical disk storage, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to carry or storedesired program code in the form of machine-executable instructions ordata structures and which can be accessed by a general purpose orspecial purpose computer or other machine with a processor. Wheninformation is transferred or provided over a network or anothercommunications connection (either hardwired, wireless, or a combinationof hardwired or wireless) to a machine, the machine properly views theconnection as a machine-readable medium. Thus, any such connection isproperly termed a machine-readable medium. Combinations of the above arealso included within the scope of machine-readable media.Machine-executable instructions include, for example, instructions anddata which cause a general purpose computer, special purpose computer,or special purpose processing machines to perform a certain function orgroup of functions.

Although the figures may show a specific order of method steps, theorder of the steps may differ from what is depicted. Also two or moresteps may be performed concurrently or with partial concurrence. Suchvariation will depend on the software and hardware systems chosen and ondesigner choice. All such variations are within the scope of thedisclosure. Likewise, software implementations could be accomplishedwith standard programming techniques with rule based logic and otherlogic to accomplish the various connection steps, processing steps,comparison steps and decision steps.

What is claimed is:
 1. A system for preventing data remanence in memory,comprising: a computing device; a memory chip coupled to the computingdevice and including memory, the memory comprising a plurality of bitsconfigured to electronically store data; and a heater, the heaterconfigured to prevent data remanence in a memory by providing heat to atleast a portion of the memory, wherein the heat provided by the heateris insufficient to physically damage the memory chip.
 2. The system ofclaim 1, wherein the heater is disposed on the memory chip.
 3. Thesystem of claim 1 further comprising a power source coupled to theheater.
 4. The system of claim 3, wherein the power source is rechargedfrom a power supply configured to provide power to the computing device.5. The system of claim 3, wherein the power source is a thermoelectricgenerator.
 6. The system of claim 1, wherein the heater inhibits coolingof the memory.
 7. The system of claim 1, wherein the heater raises thetemperature of the memory.
 8. The system of claim 1, wherein the systemmaintains a specified temperature of the memory.
 9. The system of claim1, wherein the system is configured to maintain a time-at-temperaturevalue.
 10. The system of claim 1 further comprising an activationcircuit.
 11. The system of claim 10, wherein the activation circuit isconfigured to cause the heater to provide heat in response to detectinga threat.
 12. The system of claim 11, wherein the threat detection isbased on a power signal.
 13. The system of claim 11, wherein the threatdetection is based on an accelerometer signal.
 14. The system of claim11, wherein the threat detection is based on a temperature signal. 15.The system of claim 11, wherein the activation circuit is configured tocause at least some of the bits to have a zero value.
 16. The system ofclaim 1, wherein the heater actively heats the memory.
 17. The system ofclaim 1, wherein the heater accelerates decay of the bits of memoryafter power is removed from the memory.
 18. A method for preventing dataremanence in a memory in a computing device, the memory having aplurality of bits configured to electronically store data, the methodcomprising: heating at least some of the bits of the memory; and causingaccelerated decay of the bits of the memory in response to the heating,wherein the heating is insufficient to physically damage the memory. 19.The method of claim 18, wherein the memory is in a memory chip, andwherein the heat is provided by a heater spaced apart from the memorychip.
 20. The method of claim 18 further comprising receiving energyfrom a power source.
 21. The method of claim 20, wherein the powersource is a battery.
 22. The method of claim 20, wherein the powersource is a thermoelectric generator.
 23. The method of claim 18,wherein the heating inhibits cooling of the memory.
 24. The method ofclaim 18, wherein the heating raises the temperature of the memory. 25.The method of claim 18 further comprising controlling the temperature ofthe memory.
 26. The method of claim 18 further comprising controllingthe time-at-temperature of the memory.
 27. The method of claim 18further comprising providing an activation signal to cause the heating.28. The method of claim 27 further comprising determining whether toprovide the activation signal.
 29. The method of claim 28, wherein thedetermining is based on detecting a threat.
 30. The method of claim 29,wherein the detecting is based on a temperature signal.
 31. The methodof claim 28 further comprising causing at least some of the bits to havea one value.
 32. The method of claim 18, wherein the heating acceleratesdecay of the bits after power has been removed from the memory.
 33. Amethod for use with a memory in a computing device, the memory having aplurality of bits configured to electronically store data, the methodcomprising: generating electrical energy based on a temperaturedifference; providing the electrical energy to a heater; heating atleast some of the bits of the memory; and causing accelerated decay ofthe bits of the memory in response to the heating, wherein the heatingis insufficient to physically damage the memory.
 34. The method of claim33, wherein the generating is based on a temperature difference acrossthe memory.
 35. The method of claim 33, wherein the generating is basedon a temperature difference between a first portion of the computingdevice and a second portion of the computing device.
 36. The method ofclaim 35, wherein the first portion is disposed on the memory chip. 37.The method of claim 33, wherein the heater is a thermoelectric heater.38. The method of claim 33, wherein the heater is a chemical heater. 39.The method of claim 38, wherein the heater comprises a reactivemulti-layer foil material.
 40. The method of claim 33, wherein thememory is in a memory chip, and wherein the heater is coupled to thememory chip.
 41. The method of claim 33, wherein the memory is in amemory chip, and wherein the heater is spaced apart from the memorychip.
 42. The method of claim 33, wherein the generating step isperformed by a thermoelectric generator.
 43. The method of claim 33,wherein the heating accelerates decay of the bits after power has beenremoved from the memory.
 44. The method of claim 33, further comprisingapplying a voltage to the memory to cause at least some of the bits tochange value.
 45. The method of claim 44, wherein the voltage is createdby the generating step.