18356295. STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Changhwan Kim of Suwon-si (KR)

Mingon Shin of Suwon-si (KR)

Jisoo Kim of Suwon-si (KR)

STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME - A simplified explanation of the abstract

This abstract first appeared for US patent application 18356295 titled 'STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME

Simplified Explanation

The method involves operating a storage device that communicates with a host device, including allocating secure and user regions, storing encrypted data in a secure region, receiving a request for secure deletion, decrypting valid data, encrypting the decrypted data with a different key, and deleting the original encryption key.

  • Securely store data in designated regions of a storage device
  • Decrypt valid data for secure deletion
  • Encrypt decrypted data with a different key
  • Safely delete the original encryption key

Potential Applications

  • Data security and privacy protection
  • Secure data deletion processes

Problems Solved

  • Ensuring data security during deletion processes
  • Protecting sensitive information from unauthorized access

Benefits

  • Enhanced data security measures
  • Secure and reliable data deletion processes
  • Protection of sensitive information from potential breaches


Original Abstract Submitted

Disclosed is a method of operating a storage device which communicates with a host device. The method includes allocating a secure region and a user region, storing first data encrypted by using a first encryption key in a first data block of the secure region, receiving a first request indicating a first secure delete operation of the first data from the host device, decrypting at least one valid data of the first data block by using the first encryption key based on the first request, wherein the at least one valid data do not include the first data, encrypting the decrypted at least one valid data by using a second encryption key different from the first encryption key, storing the encrypted at least one valid data in a second data block of the secure region, and deleting the first encryption key.