CN107678982A - 安全存储器及在智能存储装置中执行数据清理的方法 - Google Patents
安全存储器及在智能存储装置中执行数据清理的方法 Download PDFInfo
- Publication number
- CN107678982A CN107678982A CN201710532526.8A CN201710532526A CN107678982A CN 107678982 A CN107678982 A CN 107678982A CN 201710532526 A CN201710532526 A CN 201710532526A CN 107678982 A CN107678982 A CN 107678982A
- Authority
- CN
- China
- Prior art keywords
- memory
- password
- data
- stored
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662370230P | 2016-08-02 | 2016-08-02 | |
| US62/370,230 | 2016-08-02 | ||
| US15/275,337 US10824348B2 (en) | 2016-08-02 | 2016-09-23 | Method of executing conditional data scrubbing inside a smart storage device |
| US15/275,337 | 2016-09-23 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107678982A true CN107678982A (zh) | 2018-02-09 |
Family
ID=61069206
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710532526.8A Pending CN107678982A (zh) | 2016-08-02 | 2017-07-03 | 安全存储器及在智能存储装置中执行数据清理的方法 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US10824348B2 (https=) |
| JP (1) | JP6829161B2 (https=) |
| KR (1) | KR102360189B1 (https=) |
| CN (1) | CN107678982A (https=) |
| TW (1) | TWI750184B (https=) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102389431B1 (ko) * | 2017-08-22 | 2022-04-25 | 에스케이하이닉스 주식회사 | 저장 장치 및 그 동작 방법 |
| US11216592B2 (en) * | 2018-08-02 | 2022-01-04 | Qualcomm Incorporated | Dynamic cryptographic key expansion |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050005131A1 (en) * | 2003-06-20 | 2005-01-06 | Renesas Technology Corp. | Memory card |
| US20080195830A1 (en) * | 2007-02-08 | 2008-08-14 | Samsung Electronics Co., Ltd. | Memory cards and systems using host identification information for data security and methods of operating |
| US20100024028A1 (en) * | 2008-07-22 | 2010-01-28 | Ernest Samuel Baugher | Wireless mobile device with user selectable privacy for groups of resident application programs and files |
| US20140289488A1 (en) * | 2013-03-21 | 2014-09-25 | International Business Machines Corporation | System for securing contents of removable memory |
| US20140337592A1 (en) * | 2009-08-06 | 2014-11-13 | Imation Corp. | Peripheral device data integrity |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6760672B2 (en) * | 2002-01-29 | 2004-07-06 | Rockwell Automation Technologies, Inc. | Automatic detection of battery-backed data integrity in volatile memory |
| JP2004326425A (ja) * | 2003-04-24 | 2004-11-18 | Toshiba Corp | 情報処理装置およびメモリカード |
| US8266378B1 (en) * | 2005-12-22 | 2012-09-11 | Imation Corp. | Storage device with accessible partitions |
| US7762553B2 (en) * | 2006-11-25 | 2010-07-27 | Harris Curtis J | Form-fitting electronic game controller cover |
| US8241047B2 (en) * | 2007-10-30 | 2012-08-14 | Super Talent Electronics, Inc. | Flash drive with spring-loaded swivel connector |
| US7886103B2 (en) * | 2008-09-08 | 2011-02-08 | Cisco Technology, Inc. | Input-output module, processing platform and method for extending a memory interface for input-output operations |
| US8516271B2 (en) | 2011-03-11 | 2013-08-20 | Hewlett-Packard Development Company, L. P. | Securing non-volatile memory regions |
| US20140229659A1 (en) * | 2011-12-30 | 2014-08-14 | Marc T. Jones | Thin translation for system access of non volatile semicondcutor storage as random access memory |
| US9471484B2 (en) * | 2012-09-19 | 2016-10-18 | Novachips Canada Inc. | Flash memory controller having dual mode pin-out |
| EP3028277A1 (en) | 2013-07-31 | 2016-06-08 | Hewlett Packard Enterprise Development LP | Hybrid secure non-volatile main memory |
| US9436831B2 (en) * | 2013-10-30 | 2016-09-06 | Sandisk Technologies Llc | Secure erase in a memory device |
| US9449651B2 (en) * | 2014-03-21 | 2016-09-20 | Diablo Technologies Inc. | System and method for offsetting the data buffer latency of a device implementing a JEDEC standard DDR-4 LRDIMM chipset |
| TWI507876B (zh) * | 2014-07-21 | 2015-11-11 | Phison Electronics Corp | 記憶體儲存裝置及控制方法、記憶體控制電路單元及模組 |
| US9489317B2 (en) | 2014-09-26 | 2016-11-08 | Apple Inc. | Method for fast access to a shared memory |
| US9786389B2 (en) * | 2015-10-16 | 2017-10-10 | SK Hynix Inc. | Memory system |
-
2016
- 2016-09-23 US US15/275,337 patent/US10824348B2/en active Active
-
2017
- 2017-04-10 KR KR1020170046231A patent/KR102360189B1/ko active Active
- 2017-06-07 TW TW106118774A patent/TWI750184B/zh active
- 2017-07-03 CN CN201710532526.8A patent/CN107678982A/zh active Pending
- 2017-07-28 JP JP2017146478A patent/JP6829161B2/ja active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050005131A1 (en) * | 2003-06-20 | 2005-01-06 | Renesas Technology Corp. | Memory card |
| US20080195830A1 (en) * | 2007-02-08 | 2008-08-14 | Samsung Electronics Co., Ltd. | Memory cards and systems using host identification information for data security and methods of operating |
| US20100024028A1 (en) * | 2008-07-22 | 2010-01-28 | Ernest Samuel Baugher | Wireless mobile device with user selectable privacy for groups of resident application programs and files |
| US20140337592A1 (en) * | 2009-08-06 | 2014-11-13 | Imation Corp. | Peripheral device data integrity |
| US20140289488A1 (en) * | 2013-03-21 | 2014-09-25 | International Business Machines Corporation | System for securing contents of removable memory |
Also Published As
| Publication number | Publication date |
|---|---|
| KR102360189B1 (ko) | 2022-02-08 |
| TWI750184B (zh) | 2021-12-21 |
| KR20180015065A (ko) | 2018-02-12 |
| JP6829161B2 (ja) | 2021-02-10 |
| US20180039437A1 (en) | 2018-02-08 |
| JP2018022486A (ja) | 2018-02-08 |
| TW201805816A (zh) | 2018-02-16 |
| US10824348B2 (en) | 2020-11-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11233650B2 (en) | Verifying identity of a vehicle entering a trust zone | |
| CN112042151B (zh) | 使用单调计数器的机密密钥的安全分发 | |
| EP3622431B1 (en) | Crypto-ransomware compromise detection | |
| US20200186340A1 (en) | Self-Encryption Drive (SED) | |
| JP4880029B2 (ja) | 暗号化されたストレージデバイスについてのチップセット鍵管理サービスの利用の強制 | |
| US10523444B2 (en) | Solid state storage device with command and control access | |
| TW202038123A (zh) | 使用密鑰之身份驗證 | |
| CN111723383B (zh) | 数据存储、验证方法及装置 | |
| JP2022527757A (ja) | 物理複製困難関数を使用したコンピューティングデバイスのidの生成 | |
| JP2022528070A (ja) | 運転中の緊急車両のidの検証 | |
| CN113260999B (zh) | 减少未经授权的存储器存取 | |
| US11381388B2 (en) | Storage device sharing data encryption key as encrypted and operating method of storage device | |
| JP2007004522A (ja) | 記憶装置 | |
| US11068419B1 (en) | Secure data access between computing devices using host-specific key | |
| JP2007527579A (ja) | セキュリティで保護されたコンパクト・フラッシュ | |
| JP2019507559A (ja) | 共同アカウントのための承認方法及びデバイス並びに共同アカウントのための認証方法及びデバイス | |
| US9076002B2 (en) | Stored authorization status for cryptographic operations | |
| KR102360189B1 (ko) | 보안화된 메모리 및 스마트 저장 장치 내에서 데이터 스크러빙을 실행하는 방법 | |
| KR101156102B1 (ko) | 보안기능이 구비된 메모리 카드 리더기 및 이를 이용한 데이터 암호화 방법 | |
| CN115037492A (zh) | 基于在存储器装置中实施的安全特征的在线安全服务 | |
| JP2018022486A5 (https=) | ||
| CN115037495A (zh) | 身份验证期间跟踪具有安全存储器装置的端点的活动以用于安全操作 | |
| KR101620685B1 (ko) | 타임-아웃 데이터를 관리하는 방법 및 장치 | |
| CN115021949A (zh) | 具有被保护用于可靠身份验证的存储器装置的端点的识别管理方法和系统 | |
| CN115037493A (zh) | 监测具有安全存储器装置的端点的完整性以用于身份认证 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |