20240086336.STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME simplified abstract (samsung electronics co., ltd.)

From WikiPatents
Jump to navigation Jump to search

STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME

Organization Name

samsung electronics co., ltd.

Inventor(s)

Changhwan Kim of Suwon-si (KR)

Mingon Shin of Suwon-si (KR)

Jisoo Kim of Suwon-si (KR)

STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240086336 titled 'STORAGE DEVICE DELETING ENCRYPTION KEY, METHOD OF OPERATING THE SAME, AND METHOD OF OPERATING ELECTRONIC DEVICE INCLUDING THE SAME

Simplified Explanation

The abstract describes a method for operating a storage device that communicates with a host device, involving secure data storage and deletion processes.

  • Secure region and user region are allocated within the storage device.
  • First data is encrypted using a first encryption key and stored in a secure region.
  • A request for secure deletion of the first data is received from the host device.
  • Valid data from the first data block is decrypted using the first encryption key.
  • The decrypted valid data is re-encrypted using a second encryption key.
  • The re-encrypted valid data is stored in a different data block within the secure region.
  • The first encryption key is deleted.

Potential Applications

The technology described in the patent application could be applied in various industries and sectors, including:

  • Data security and encryption
  • Cloud storage services
  • Information technology and cybersecurity

Problems Solved

This technology addresses several key issues, such as:

  • Secure deletion of sensitive data
  • Protection against unauthorized access
  • Data integrity and confidentiality

Benefits

The benefits of this technology include:

  • Enhanced data security measures
  • Improved privacy protection
  • Compliance with data protection regulations

Potential Commercial Applications

The technology has potential commercial applications in:

  • Secure data storage solutions
  • Encryption software development
  • Cybersecurity consulting services

Possible Prior Art

One possible prior art related to this technology is the use of secure deletion methods in data storage systems to prevent data breaches and unauthorized access.

Unanswered Questions

How does this technology compare to existing secure deletion methods in terms of efficiency and effectiveness?

The article does not provide a direct comparison with existing secure deletion methods, leaving room for further analysis and evaluation.

What are the potential limitations or drawbacks of implementing this technology in real-world storage devices?

The article does not address potential challenges or limitations that may arise when implementing this technology in practical storage systems, which could impact its feasibility and adoption.


Original Abstract Submitted

disclosed is a method of operating a storage device which communicates with a host device. the method includes allocating a secure region and a user region, storing first data encrypted by using a first encryption key in a first data block of the secure region, receiving a first request indicating a first secure delete operation of the first data from the host device, decrypting at least one valid data of the first data block by using the first encryption key based on the first request, wherein the at least one valid data do not include the first data, encrypting the decrypted at least one valid data by using a second encryption key different from the first encryption key, storing the encrypted at least one valid data in a second data block of the secure region, and deleting the first encryption key.