17938291. STORAGE DEVICE AND OPERATION METHOD THEREOF simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

STORAGE DEVICE AND OPERATION METHOD THEREOF

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

IN-SU Kim of Yongin-si (KR)

STORAGE DEVICE AND OPERATION METHOD THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 17938291 titled 'STORAGE DEVICE AND OPERATION METHOD THEREOF

Simplified Explanation

The abstract of the patent application describes an operation method for a storage device that has a nonvolatile memory device and communicates with a host using a cryptographic key. The method involves setting up a first key identifier and a first lifetime for a first cryptographic key based on a command from the host. After the first lifetime expires, if a second command with the first key identifier is received from the host, a data protect operation is performed on the first cryptographic key.

  • The method involves setting up a first key identifier and a first lifetime for a cryptographic key.
  • The first key identifier and lifetime are determined based on a command received from the host.
  • After the first lifetime expires, a data protect operation is performed on the first cryptographic key if a second command with the first key identifier is received.

Potential Applications

  • This technology can be applied in various storage devices that require secure communication with a host.
  • It can be used in data storage systems, such as solid-state drives (SSDs) or encrypted USB drives.
  • The method can also be implemented in cloud storage systems to enhance data security.

Problems Solved

  • The method addresses the issue of secure communication between a storage device and a host by using cryptographic keys.
  • It ensures that the cryptographic keys have a limited lifetime, enhancing security by regularly updating the keys.
  • The data protect operation performed on the expired cryptographic key adds an extra layer of security to prevent unauthorized access.

Benefits

  • The method provides enhanced security for storage devices by using cryptographic keys and regularly updating them.
  • By performing a data protect operation on expired keys, the risk of unauthorized access is minimized.
  • The use of key identifiers allows for efficient management and identification of cryptographic keys.


Original Abstract Submitted

An operation method of a storage device which includes a nonvolatile memory device and communicates with a host based on a cryptographic key includes setting up a first key identifier and a first lifetime of a first cryptographic key based on a first command received from the host. The method further includes, after the first lifetime is expired, when a second command including the first key identifier is received from the host, performing a data protect operation on the first cryptographic key.