18174864. STORAGE DEVICE simplified abstract (Kioxia Corporation)

From WikiPatents
Jump to navigation Jump to search

STORAGE DEVICE

Organization Name

Kioxia Corporation

Inventor(s)

Hirotomo Kobayashi of Yokosuka (JP)

STORAGE DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18174864 titled 'STORAGE DEVICE

Simplified Explanation

The patent application describes a storage device that manages user identification and authentication information to control access to nonvolatile memory. The controller verifies the user's identity and authentication information before granting access to the memory.

  • The storage device includes a nonvolatile memory and a controller.
  • The controller manages user identification and authentication information, including a hash value calculated from the user identification information and device identification information.
  • Access requests to the nonvolatile memory are received from an external device, and the controller verifies the user identification and authentication information before granting access.

Potential Applications

This technology could be applied in secure data storage systems, access control systems, and authentication mechanisms for electronic devices.

Problems Solved

This technology solves the problem of unauthorized access to sensitive data stored in nonvolatile memory by implementing a secure user identification and authentication process.

Benefits

The benefits of this technology include enhanced data security, protection against unauthorized access, and improved user authentication processes for electronic devices.

Potential Commercial Applications

Potential commercial applications of this technology include secure storage devices for sensitive data, access control systems for electronic devices, and authentication solutions for data protection.

Possible Prior Art

One possible prior art for this technology could be existing secure storage devices with user authentication features, access control systems for electronic devices, and encryption methods for data protection.

Unanswered Questions

How does this technology compare to existing authentication methods for data storage devices?

This article does not provide a direct comparison to existing authentication methods for data storage devices. It would be helpful to understand the specific advantages and disadvantages of this technology compared to other authentication methods.

What are the potential vulnerabilities of this technology in terms of data security?

The article does not address potential vulnerabilities of this technology in terms of data security. It would be important to know the potential weaknesses or risks associated with this authentication process to assess its overall effectiveness.


Original Abstract Submitted

According to one embodiment, a storage device includes a nonvolatile memory and a controller. The controller manages first user identification information and first authentication information including a hash value calculated from the first user identification information and a first device identification information of a first client device. The controller receives an access request to the nonvolatile memory, user identification information, and authentication information transmitted from an external device, and accepts the access request in a case where the user identification information received matches the first user identification information, and the authentication information received matches the first authentication information.