17879363. ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Alexander Bunin of Ganei Tikva (IL)

Evgeny Blaichman of Tel-Aviv (IL)

Amit Berman of Binyamina (IL)

ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17879363 titled 'ANTI-MALWARE ALGORITHM AND HW/FW FOR INTERNAL SSD HEALTH AND STORAGE SPACE PROTECTION AGAINST CYBER-ATTACKS

Simplified Explanation

The abstract describes a storage system that includes a host device and a storage device with a nonvolatile memory and a processor. The storage device has a storage internal protection (SIP) module that performs the following functions:

  • Obtains a plurality of storage commands from the host device that correspond to the nonvolatile memory.
  • Filters the plurality of storage commands to obtain a filtered plurality of storage commands.
  • Applies information about the filtered plurality of storage commands to a machine-learning cryptocurrency mining (CM) detection algorithm.
  • Provides a notification to the host device if the machine-learning CM detection algorithm indicates the detection of a CM operation.

Bullet points explaining the patent/innovation:

  • The storage system includes a module that filters storage commands and uses a machine-learning algorithm to detect cryptocurrency mining operations.
  • The module receives storage commands from the host device and filters them to identify potentially malicious operations.
  • It then applies the filtered commands to a machine-learning algorithm specifically designed to detect cryptocurrency mining activities.
  • If the algorithm detects a cryptocurrency mining operation, a notification is sent to the host device.

Potential applications of this technology:

  • This technology can be used in storage systems to detect and prevent unauthorized cryptocurrency mining activities.
  • It can be applied in data centers or cloud storage environments to protect resources and prevent the misuse of computing power for cryptocurrency mining.
  • The technology can also be used in personal devices such as smartphones or laptops to detect and block cryptocurrency mining malware.

Problems solved by this technology:

  • Cryptocurrency mining operations can consume significant computing resources and energy, leading to increased costs and reduced performance in storage systems.
  • Unauthorized cryptocurrency mining activities can exploit storage devices and compromise the security and privacy of data.
  • This technology helps to identify and prevent such activities, ensuring the efficient and secure operation of storage systems.

Benefits of this technology:

  • Improved security: The technology helps to detect and prevent unauthorized cryptocurrency mining activities, enhancing the security of storage systems.
  • Resource optimization: By identifying and blocking cryptocurrency mining operations, the technology ensures that computing resources are used efficiently for their intended purposes.
  • Cost savings: Preventing unauthorized cryptocurrency mining can reduce energy consumption and associated costs in storage systems.
  • Enhanced performance: By eliminating the impact of cryptocurrency mining activities, the technology improves the overall performance of storage devices.


Original Abstract Submitted

A storage system, including a host device; and a storage device including a nonvolatile memory and at least one processor configured to implement a storage internal protection (SIP) module, wherein the SIP module is configured to: obtain, from the host device, a plurality of storage commands corresponding to the nonvolatile memory, filter the plurality of storage commands to obtain a filtered plurality of storage commands, apply information about the filtered plurality of storage commands to a machine-learning cryptocurrency mining (CM) detection algorithm, and based on the machine-learning CM detection algorithm indicating that a CM operation is detected, provide a notification to the host device.