20240086336.STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME simplified abstract (samsung electronics co., ltd.)
Contents
- 1 STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME
Organization Name
Inventor(s)
Changhwan Kim of Suwon-si (KR)
STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240086336 titled 'STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME
Simplified Explanation
The abstract describes a method for operating a storage device that communicates with a host device, involving secure data storage and deletion processes.
- Secure region and user region are allocated within the storage device.
- First data is encrypted using a first encryption key and stored in a secure region.
- A request for secure deletion of the first data is received from the host device.
- Valid data from the first data block is decrypted using the first encryption key.
- The decrypted valid data is re-encrypted using a second encryption key.
- The re-encrypted valid data is stored in a different data block within the secure region.
- The first encryption key is deleted.
Potential Applications
The technology described in the patent application could be applied in various industries and sectors, including:
- Data security and encryption
- Cloud storage services
- Information technology and cybersecurity
Problems Solved
This technology addresses several key issues, such as:
- Secure deletion of sensitive data
- Protection against unauthorized access
- Data integrity and confidentiality
Benefits
The benefits of this technology include:
- Enhanced data security measures
- Improved privacy protection
- Compliance with data protection regulations
Potential Commercial Applications
The technology has potential commercial applications in:
- Secure data storage solutions
- Encryption software development
- Cybersecurity consulting services
Possible Prior Art
One possible prior art related to this technology is the use of secure deletion methods in data storage systems to prevent data breaches and unauthorized access.
Unanswered Questions
How does this technology compare to existing secure deletion methods in terms of efficiency and effectiveness?
The article does not provide a direct comparison with existing secure deletion methods, leaving room for further analysis and evaluation.
What are the potential limitations or drawbacks of implementing this technology in real-world storage devices?
The article does not address potential challenges or limitations that may arise when implementing this technology in practical storage systems, which could impact its feasibility and adoption.
Original Abstract Submitted
disclosed is a method of operating a storage device which communicates with a host device. the method includes allocating a secure region and a user region, storing first data encrypted by using a first encryption key in a first data block of the secure region, receiving a first request indicating a first secure delete operation of the first data from the host device, decrypting at least one valid data of the first data block by using the first encryption key based on the first request, wherein the at least one valid data do not include the first data, encrypting the decrypted at least one valid data by using a second encryption key different from the first encryption key, storing the encrypted at least one valid data in a second data block of the secure region, and deleting the first encryption key.