Samsung electronics co., ltd. (20240160794). OPERATING METHOD OF STORAGE DEVICE AND OPERATING METHOD OF STORAGE SYSTEM INCLUDING STORAGE DEVICE simplified abstract
Contents
- 1 OPERATING METHOD OF STORAGE DEVICE AND OPERATING METHOD OF STORAGE SYSTEM INCLUDING STORAGE DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 OPERATING METHOD OF STORAGE DEVICE AND OPERATING METHOD OF STORAGE SYSTEM INCLUDING STORAGE DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
OPERATING METHOD OF STORAGE DEVICE AND OPERATING METHOD OF STORAGE SYSTEM INCLUDING STORAGE DEVICE
Organization Name
Inventor(s)
Yonghwan Song of Suwon-si (KR)
OPERATING METHOD OF STORAGE DEVICE AND OPERATING METHOD OF STORAGE SYSTEM INCLUDING STORAGE DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240160794 titled 'OPERATING METHOD OF STORAGE DEVICE AND OPERATING METHOD OF STORAGE SYSTEM INCLUDING STORAGE DEVICE
Simplified Explanation
The abstract describes an operating method of a storage device and system involving storing a public key, transmitting a random number for authentication, receiving a signature for verification, and changing device parameters based on the verified signature.
- Storing a public key received from a first host
- Transmitting a random number to a second host for authentication
- Receiving a signature generated based on the private key and random number from the second host
- Verifying the signature based on the public key
- Changing device parameters according to a request from the second host after verification
Potential Applications
This technology could be applied in secure data storage systems, cloud storage services, and network authentication processes.
Problems Solved
This technology helps in ensuring secure communication and data integrity between hosts and storage devices, preventing unauthorized access and data breaches.
Benefits
The benefits of this technology include enhanced security, reliable authentication processes, and protection of sensitive data stored in the storage device.
Potential Commercial Applications
Potential commercial applications of this technology include data centers, cloud storage providers, cybersecurity companies, and organizations requiring secure data storage solutions.
Possible Prior Art
One possible prior art could be the use of digital signatures and public key cryptography in secure communication protocols and data storage systems.
Unanswered Questions
How does this technology compare to existing authentication methods in terms of security and efficiency?
This article does not provide a direct comparison with existing authentication methods, leaving the reader to wonder about the advantages and disadvantages of this technology in relation to others.
Are there any potential vulnerabilities or limitations in the implementation of this technology?
The article does not address any potential vulnerabilities or limitations that may arise when implementing this technology, leaving room for further exploration and analysis in this area.
Original Abstract Submitted
provided are an operating method of a storage device and an operating method of a storage system including the storage device. an operating method of a storage device including a nonvolatile memory device and a storage controller includes storing, by the storage controller, a public key received from a first host, transmitting, by the storage controller, a random number to a second host in response to a host authentication start request from the second host that has obtained the public key and a private key corresponding to the public key, receiving, by the storage controller, a signature generated based on the private key and the random number from the second host, verifying, by the storage controller, the signature based on the public key, and changing, by the storage controller, a first device parameter according to a request from the second host in response to the signature being verified.