17895260. METHOD OF ALLOCATING AND PROTECTING MEMORY IN COMPUTATIONAL STORAGE DEVICE, COMPUTATIONAL STORAGE DEVICE PERFORMING THE SAME AND METHOD OF OPERATING STORAGE SYSTEM USING THE SAME simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

METHOD OF ALLOCATING AND PROTECTING MEMORY IN COMPUTATIONAL STORAGE DEVICE, COMPUTATIONAL STORAGE DEVICE PERFORMING THE SAME AND METHOD OF OPERATING STORAGE SYSTEM USING THE SAME

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

JAEHO Shin of Gwangmyeong-si (KR)

JEONGHO Lee of Gwacheon-si (KR)

YOUNGGEON Yoo of Seoul (KR)

HYEOKJUN Choe of Hwaseong-si (KR)

METHOD OF ALLOCATING AND PROTECTING MEMORY IN COMPUTATIONAL STORAGE DEVICE, COMPUTATIONAL STORAGE DEVICE PERFORMING THE SAME AND METHOD OF OPERATING STORAGE SYSTEM USING THE SAME - A simplified explanation of the abstract

This abstract first appeared for US patent application 17895260 titled 'METHOD OF ALLOCATING AND PROTECTING MEMORY IN COMPUTATIONAL STORAGE DEVICE, COMPUTATIONAL STORAGE DEVICE PERFORMING THE SAME AND METHOD OF OPERATING STORAGE SYSTEM USING THE SAME

Simplified Explanation

The abstract describes a method for allocating and protecting memory in a computational storage device. Here are the key points:

  • Memory allocation request is received from a host device outside the computational storage device.
  • A memory allocation operation is performed, creating a first memory region in the buffer memory and generating a first key associated with it.
  • Program execution request is received from the host device.
  • A program execution operation is performed, where the first computing engine executes a first program by accessing the first memory region using encryption or decryption with the first key.

Potential Applications

This technology has potential applications in various fields, including:

  • Cloud computing: It can be used to enhance memory allocation and protection in computational storage devices used in cloud computing environments.
  • Data centers: The method can improve memory management and security in data centers, leading to more efficient and secure data processing.
  • Edge computing: By optimizing memory allocation and protection, this technology can enhance the performance and security of edge computing devices.

Problems Solved

The method addresses several problems related to memory allocation and protection in computational storage devices, such as:

  • Efficient memory allocation: It provides a mechanism for allocating memory regions in the buffer memory of a computational storage device based on requests from external host devices.
  • Secure memory access: By generating unique keys for each memory region, the method ensures that only authorized programs can access the allocated memory, enhancing data security.
  • Program execution optimization: The method allows the execution of programs directly on the computational storage device, reducing data transfer overhead and improving overall performance.

Benefits

The use of this method offers several benefits, including:

  • Improved memory management: The method optimizes memory allocation, ensuring efficient utilization of the buffer memory in computational storage devices.
  • Enhanced data security: By generating unique keys for each memory region, unauthorized access to sensitive data is prevented, enhancing overall system security.
  • Reduced data transfer overhead: The ability to execute programs directly on the computational storage device reduces the need for data transfer between the host device and the storage device, leading to improved performance.


Original Abstract Submitted

In a method of allocating and protecting a memory in a computational storage device including a first computing engine and a buffer memory, a memory allocation request is received from a host device that is disposed outside the computational storage device. Based on the memory allocation request, a memory allocation operation in which a first memory region is generated in the buffer memory and a first key associated with the first memory region is generated is performed. A program execution request is received from the host device. Based on the program execution request, a program execution operation is performed in which a first program is executed by the first computing engine by accessing the first memory region based on an encryption or a decryption using the first key.