18174864. STORAGE DEVICE simplified abstract (Kioxia Corporation)
Contents
- 1 STORAGE DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 STORAGE DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
STORAGE DEVICE
Organization Name
Inventor(s)
Hirotomo Kobayashi of Yokosuka (JP)
STORAGE DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18174864 titled 'STORAGE DEVICE
Simplified Explanation
The patent application describes a storage device that manages user identification and authentication information to control access to nonvolatile memory. The controller verifies the user's identity and authentication information before granting access to the memory.
- The storage device includes a nonvolatile memory and a controller.
- The controller manages user identification and authentication information, including a hash value calculated from the user identification information and device identification information.
- Access requests to the nonvolatile memory are received from an external device, and the controller verifies the user identification and authentication information before granting access.
Potential Applications
This technology could be applied in secure data storage systems, access control systems, and authentication mechanisms for electronic devices.
Problems Solved
This technology solves the problem of unauthorized access to sensitive data stored in nonvolatile memory by implementing a secure user identification and authentication process.
Benefits
The benefits of this technology include enhanced data security, protection against unauthorized access, and improved user authentication processes for electronic devices.
Potential Commercial Applications
Potential commercial applications of this technology include secure storage devices for sensitive data, access control systems for electronic devices, and authentication solutions for data protection.
Possible Prior Art
One possible prior art for this technology could be existing secure storage devices with user authentication features, access control systems for electronic devices, and encryption methods for data protection.
Unanswered Questions
How does this technology compare to existing authentication methods for data storage devices?
This article does not provide a direct comparison to existing authentication methods for data storage devices. It would be helpful to understand the specific advantages and disadvantages of this technology compared to other authentication methods.
What are the potential vulnerabilities of this technology in terms of data security?
The article does not address potential vulnerabilities of this technology in terms of data security. It would be important to know the potential weaknesses or risks associated with this authentication process to assess its overall effectiveness.
Original Abstract Submitted
According to one embodiment, a storage device includes a nonvolatile memory and a controller. The controller manages first user identification information and first authentication information including a hash value calculated from the first user identification information and a first device identification information of a first client device. The controller receives an access request to the nonvolatile memory, user identification information, and authentication information transmitted from an external device, and accepts the access request in a case where the user identification information received matches the first user identification information, and the authentication information received matches the first authentication information.