TWI750184B - 安全記憶體與智慧儲存裝置內執行資料擦除之方法 - Google Patents

安全記憶體與智慧儲存裝置內執行資料擦除之方法 Download PDF

Info

Publication number
TWI750184B
TWI750184B TW106118774A TW106118774A TWI750184B TW I750184 B TWI750184 B TW I750184B TW 106118774 A TW106118774 A TW 106118774A TW 106118774 A TW106118774 A TW 106118774A TW I750184 B TWI750184 B TW I750184B
Authority
TW
Taiwan
Prior art keywords
memory
password
data
stored
logic
Prior art date
Application number
TW106118774A
Other languages
English (en)
Chinese (zh)
Other versions
TW201805816A (zh
Inventor
桑龐 保羅 歐拉利格
張牧天
Original Assignee
南韓商三星電子股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南韓商三星電子股份有限公司 filed Critical 南韓商三星電子股份有限公司
Publication of TW201805816A publication Critical patent/TW201805816A/zh
Application granted granted Critical
Publication of TWI750184B publication Critical patent/TWI750184B/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
TW106118774A 2016-08-02 2017-06-07 安全記憶體與智慧儲存裝置內執行資料擦除之方法 TWI750184B (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201662370230P 2016-08-02 2016-08-02
US62/370,230 2016-08-02
US15/275,337 US10824348B2 (en) 2016-08-02 2016-09-23 Method of executing conditional data scrubbing inside a smart storage device
US15/275,337 2016-09-23

Publications (2)

Publication Number Publication Date
TW201805816A TW201805816A (zh) 2018-02-16
TWI750184B true TWI750184B (zh) 2021-12-21

Family

ID=61069206

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106118774A TWI750184B (zh) 2016-08-02 2017-06-07 安全記憶體與智慧儲存裝置內執行資料擦除之方法

Country Status (5)

Country Link
US (1) US10824348B2 (https=)
JP (1) JP6829161B2 (https=)
KR (1) KR102360189B1 (https=)
CN (1) CN107678982A (https=)
TW (1) TWI750184B (https=)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI797353B (zh) * 2018-08-02 2023-04-01 美商高通公司 動態密碼密鑰擴展之電路、方法及系統

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102389431B1 (ko) * 2017-08-22 2022-04-25 에스케이하이닉스 주식회사 저장 장치 및 그 동작 방법

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080195830A1 (en) * 2007-02-08 2008-08-14 Samsung Electronics Co., Ltd. Memory cards and systems using host identification information for data security and methods of operating
US20100024028A1 (en) * 2008-07-22 2010-01-28 Ernest Samuel Baugher Wireless mobile device with user selectable privacy for groups of resident application programs and files
TW201346545A (zh) * 2011-12-30 2013-11-16 Intel Corp 用於系統存取非依電性半導體儲存體作為隨機存取記憶體之薄轉譯技術
US20140289488A1 (en) * 2013-03-21 2014-09-25 International Business Machines Corporation System for securing contents of removable memory
US20150121537A1 (en) * 2013-10-30 2015-04-30 Sandisk Enterprise Ip Llc Secure Erase in a Memory Device
US20150294698A1 (en) * 2014-03-21 2015-10-15 Diablo Technologies Inc. System and Method for Offsetting The Data Buffer Latency of a Device Implementing a JEDEC Standard DDR-4 LRDIMM Chipset
TWI507876B (zh) * 2014-07-21 2015-11-11 Phison Electronics Corp 記憶體儲存裝置及控制方法、記憶體控制電路單元及模組

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6760672B2 (en) * 2002-01-29 2004-07-06 Rockwell Automation Technologies, Inc. Automatic detection of battery-backed data integrity in volatile memory
JP2004326425A (ja) * 2003-04-24 2004-11-18 Toshiba Corp 情報処理装置およびメモリカード
JP2005011151A (ja) * 2003-06-20 2005-01-13 Renesas Technology Corp メモリカード
US8266378B1 (en) * 2005-12-22 2012-09-11 Imation Corp. Storage device with accessible partitions
US7762553B2 (en) * 2006-11-25 2010-07-27 Harris Curtis J Form-fitting electronic game controller cover
US8241047B2 (en) * 2007-10-30 2012-08-14 Super Talent Electronics, Inc. Flash drive with spring-loaded swivel connector
US7886103B2 (en) * 2008-09-08 2011-02-08 Cisco Technology, Inc. Input-output module, processing platform and method for extending a memory interface for input-output operations
US8683088B2 (en) * 2009-08-06 2014-03-25 Imation Corp. Peripheral device data integrity
US8516271B2 (en) 2011-03-11 2013-08-20 Hewlett-Packard Development Company, L. P. Securing non-volatile memory regions
US9471484B2 (en) * 2012-09-19 2016-10-18 Novachips Canada Inc. Flash memory controller having dual mode pin-out
EP3028277A1 (en) 2013-07-31 2016-06-08 Hewlett Packard Enterprise Development LP Hybrid secure non-volatile main memory
US9489317B2 (en) 2014-09-26 2016-11-08 Apple Inc. Method for fast access to a shared memory
US9786389B2 (en) * 2015-10-16 2017-10-10 SK Hynix Inc. Memory system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080195830A1 (en) * 2007-02-08 2008-08-14 Samsung Electronics Co., Ltd. Memory cards and systems using host identification information for data security and methods of operating
US20100024028A1 (en) * 2008-07-22 2010-01-28 Ernest Samuel Baugher Wireless mobile device with user selectable privacy for groups of resident application programs and files
TW201346545A (zh) * 2011-12-30 2013-11-16 Intel Corp 用於系統存取非依電性半導體儲存體作為隨機存取記憶體之薄轉譯技術
US20140289488A1 (en) * 2013-03-21 2014-09-25 International Business Machines Corporation System for securing contents of removable memory
US20150121537A1 (en) * 2013-10-30 2015-04-30 Sandisk Enterprise Ip Llc Secure Erase in a Memory Device
US20150294698A1 (en) * 2014-03-21 2015-10-15 Diablo Technologies Inc. System and Method for Offsetting The Data Buffer Latency of a Device Implementing a JEDEC Standard DDR-4 LRDIMM Chipset
TWI507876B (zh) * 2014-07-21 2015-11-11 Phison Electronics Corp 記憶體儲存裝置及控制方法、記憶體控制電路單元及模組

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI797353B (zh) * 2018-08-02 2023-04-01 美商高通公司 動態密碼密鑰擴展之電路、方法及系統

Also Published As

Publication number Publication date
KR102360189B1 (ko) 2022-02-08
KR20180015065A (ko) 2018-02-12
CN107678982A (zh) 2018-02-09
JP6829161B2 (ja) 2021-02-10
US20180039437A1 (en) 2018-02-08
JP2018022486A (ja) 2018-02-08
TW201805816A (zh) 2018-02-16
US10824348B2 (en) 2020-11-03

Similar Documents

Publication Publication Date Title
US11368299B2 (en) Self-encryption drive (SED)
KR101608110B1 (ko) 저장 장치의 어드레스 범위에 대한 액세스 관리 방법
US10523444B2 (en) Solid state storage device with command and control access
US7469837B2 (en) Storage device
KR102453780B1 (ko) 액세스 보호 기법을 안전화하기 위한 장치 및 방법
JP2022527757A (ja) 物理複製困難関数を使用したコンピューティングデバイスのidの生成
CN113260999B (zh) 减少未经授权的存储器存取
CN113615125A (zh) 使用密钥的身份验证
JP2022528070A (ja) 運転中の緊急車両のidの検証
US9378157B2 (en) Security memory access method and apparatus
US20100217977A1 (en) Systems and methods of security for an object based storage device
US20180324214A1 (en) Crypto-Ransomware Compromise Detection
TWI824378B (zh) 支援將檔案寫入安裝於安全記憶裝置中之檔案系統的機制
US11068419B1 (en) Secure data access between computing devices using host-specific key
US10768831B2 (en) Non-persistent unlock for secure memory
TWI541825B (zh) 非依電性記憶體儲存可重置資料之技術
US20240037643A1 (en) Method and system for digital contents by use of rental nft
CN115017556A (zh) 具有加密功能的存储设备
CN112491800B (zh) 一种加密u盘的实时认证方法
US12120100B2 (en) Secure communication between an intermediary device and a network
TWI750184B (zh) 安全記憶體與智慧儲存裝置內執行資料擦除之方法
CN113287097A (zh) 用于存储器的未授权访问命令记录
US9076002B2 (en) Stored authorization status for cryptographic operations
US20200310776A1 (en) Over-the-air update validation
JP2018022486A5 (https=)