TWI750184B - 安全記憶體與智慧儲存裝置內執行資料擦除之方法 - Google Patents
安全記憶體與智慧儲存裝置內執行資料擦除之方法 Download PDFInfo
- Publication number
- TWI750184B TWI750184B TW106118774A TW106118774A TWI750184B TW I750184 B TWI750184 B TW I750184B TW 106118774 A TW106118774 A TW 106118774A TW 106118774 A TW106118774 A TW 106118774A TW I750184 B TWI750184 B TW I750184B
- Authority
- TW
- Taiwan
- Prior art keywords
- memory
- password
- data
- stored
- logic
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662370230P | 2016-08-02 | 2016-08-02 | |
| US62/370,230 | 2016-08-02 | ||
| US15/275,337 US10824348B2 (en) | 2016-08-02 | 2016-09-23 | Method of executing conditional data scrubbing inside a smart storage device |
| US15/275,337 | 2016-09-23 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201805816A TW201805816A (zh) | 2018-02-16 |
| TWI750184B true TWI750184B (zh) | 2021-12-21 |
Family
ID=61069206
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW106118774A TWI750184B (zh) | 2016-08-02 | 2017-06-07 | 安全記憶體與智慧儲存裝置內執行資料擦除之方法 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US10824348B2 (https=) |
| JP (1) | JP6829161B2 (https=) |
| KR (1) | KR102360189B1 (https=) |
| CN (1) | CN107678982A (https=) |
| TW (1) | TWI750184B (https=) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI797353B (zh) * | 2018-08-02 | 2023-04-01 | 美商高通公司 | 動態密碼密鑰擴展之電路、方法及系統 |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102389431B1 (ko) * | 2017-08-22 | 2022-04-25 | 에스케이하이닉스 주식회사 | 저장 장치 및 그 동작 방법 |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080195830A1 (en) * | 2007-02-08 | 2008-08-14 | Samsung Electronics Co., Ltd. | Memory cards and systems using host identification information for data security and methods of operating |
| US20100024028A1 (en) * | 2008-07-22 | 2010-01-28 | Ernest Samuel Baugher | Wireless mobile device with user selectable privacy for groups of resident application programs and files |
| TW201346545A (zh) * | 2011-12-30 | 2013-11-16 | Intel Corp | 用於系統存取非依電性半導體儲存體作為隨機存取記憶體之薄轉譯技術 |
| US20140289488A1 (en) * | 2013-03-21 | 2014-09-25 | International Business Machines Corporation | System for securing contents of removable memory |
| US20150121537A1 (en) * | 2013-10-30 | 2015-04-30 | Sandisk Enterprise Ip Llc | Secure Erase in a Memory Device |
| US20150294698A1 (en) * | 2014-03-21 | 2015-10-15 | Diablo Technologies Inc. | System and Method for Offsetting The Data Buffer Latency of a Device Implementing a JEDEC Standard DDR-4 LRDIMM Chipset |
| TWI507876B (zh) * | 2014-07-21 | 2015-11-11 | Phison Electronics Corp | 記憶體儲存裝置及控制方法、記憶體控制電路單元及模組 |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6760672B2 (en) * | 2002-01-29 | 2004-07-06 | Rockwell Automation Technologies, Inc. | Automatic detection of battery-backed data integrity in volatile memory |
| JP2004326425A (ja) * | 2003-04-24 | 2004-11-18 | Toshiba Corp | 情報処理装置およびメモリカード |
| JP2005011151A (ja) * | 2003-06-20 | 2005-01-13 | Renesas Technology Corp | メモリカード |
| US8266378B1 (en) * | 2005-12-22 | 2012-09-11 | Imation Corp. | Storage device with accessible partitions |
| US7762553B2 (en) * | 2006-11-25 | 2010-07-27 | Harris Curtis J | Form-fitting electronic game controller cover |
| US8241047B2 (en) * | 2007-10-30 | 2012-08-14 | Super Talent Electronics, Inc. | Flash drive with spring-loaded swivel connector |
| US7886103B2 (en) * | 2008-09-08 | 2011-02-08 | Cisco Technology, Inc. | Input-output module, processing platform and method for extending a memory interface for input-output operations |
| US8683088B2 (en) * | 2009-08-06 | 2014-03-25 | Imation Corp. | Peripheral device data integrity |
| US8516271B2 (en) | 2011-03-11 | 2013-08-20 | Hewlett-Packard Development Company, L. P. | Securing non-volatile memory regions |
| US9471484B2 (en) * | 2012-09-19 | 2016-10-18 | Novachips Canada Inc. | Flash memory controller having dual mode pin-out |
| EP3028277A1 (en) | 2013-07-31 | 2016-06-08 | Hewlett Packard Enterprise Development LP | Hybrid secure non-volatile main memory |
| US9489317B2 (en) | 2014-09-26 | 2016-11-08 | Apple Inc. | Method for fast access to a shared memory |
| US9786389B2 (en) * | 2015-10-16 | 2017-10-10 | SK Hynix Inc. | Memory system |
-
2016
- 2016-09-23 US US15/275,337 patent/US10824348B2/en active Active
-
2017
- 2017-04-10 KR KR1020170046231A patent/KR102360189B1/ko active Active
- 2017-06-07 TW TW106118774A patent/TWI750184B/zh active
- 2017-07-03 CN CN201710532526.8A patent/CN107678982A/zh active Pending
- 2017-07-28 JP JP2017146478A patent/JP6829161B2/ja active Active
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080195830A1 (en) * | 2007-02-08 | 2008-08-14 | Samsung Electronics Co., Ltd. | Memory cards and systems using host identification information for data security and methods of operating |
| US20100024028A1 (en) * | 2008-07-22 | 2010-01-28 | Ernest Samuel Baugher | Wireless mobile device with user selectable privacy for groups of resident application programs and files |
| TW201346545A (zh) * | 2011-12-30 | 2013-11-16 | Intel Corp | 用於系統存取非依電性半導體儲存體作為隨機存取記憶體之薄轉譯技術 |
| US20140289488A1 (en) * | 2013-03-21 | 2014-09-25 | International Business Machines Corporation | System for securing contents of removable memory |
| US20150121537A1 (en) * | 2013-10-30 | 2015-04-30 | Sandisk Enterprise Ip Llc | Secure Erase in a Memory Device |
| US20150294698A1 (en) * | 2014-03-21 | 2015-10-15 | Diablo Technologies Inc. | System and Method for Offsetting The Data Buffer Latency of a Device Implementing a JEDEC Standard DDR-4 LRDIMM Chipset |
| TWI507876B (zh) * | 2014-07-21 | 2015-11-11 | Phison Electronics Corp | 記憶體儲存裝置及控制方法、記憶體控制電路單元及模組 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI797353B (zh) * | 2018-08-02 | 2023-04-01 | 美商高通公司 | 動態密碼密鑰擴展之電路、方法及系統 |
Also Published As
| Publication number | Publication date |
|---|---|
| KR102360189B1 (ko) | 2022-02-08 |
| KR20180015065A (ko) | 2018-02-12 |
| CN107678982A (zh) | 2018-02-09 |
| JP6829161B2 (ja) | 2021-02-10 |
| US20180039437A1 (en) | 2018-02-08 |
| JP2018022486A (ja) | 2018-02-08 |
| TW201805816A (zh) | 2018-02-16 |
| US10824348B2 (en) | 2020-11-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11368299B2 (en) | Self-encryption drive (SED) | |
| KR101608110B1 (ko) | 저장 장치의 어드레스 범위에 대한 액세스 관리 방법 | |
| US10523444B2 (en) | Solid state storage device with command and control access | |
| US7469837B2 (en) | Storage device | |
| KR102453780B1 (ko) | 액세스 보호 기법을 안전화하기 위한 장치 및 방법 | |
| JP2022527757A (ja) | 物理複製困難関数を使用したコンピューティングデバイスのidの生成 | |
| CN113260999B (zh) | 减少未经授权的存储器存取 | |
| CN113615125A (zh) | 使用密钥的身份验证 | |
| JP2022528070A (ja) | 運転中の緊急車両のidの検証 | |
| US9378157B2 (en) | Security memory access method and apparatus | |
| US20100217977A1 (en) | Systems and methods of security for an object based storage device | |
| US20180324214A1 (en) | Crypto-Ransomware Compromise Detection | |
| TWI824378B (zh) | 支援將檔案寫入安裝於安全記憶裝置中之檔案系統的機制 | |
| US11068419B1 (en) | Secure data access between computing devices using host-specific key | |
| US10768831B2 (en) | Non-persistent unlock for secure memory | |
| TWI541825B (zh) | 非依電性記憶體儲存可重置資料之技術 | |
| US20240037643A1 (en) | Method and system for digital contents by use of rental nft | |
| CN115017556A (zh) | 具有加密功能的存储设备 | |
| CN112491800B (zh) | 一种加密u盘的实时认证方法 | |
| US12120100B2 (en) | Secure communication between an intermediary device and a network | |
| TWI750184B (zh) | 安全記憶體與智慧儲存裝置內執行資料擦除之方法 | |
| CN113287097A (zh) | 用于存储器的未授权访问命令记录 | |
| US9076002B2 (en) | Stored authorization status for cryptographic operations | |
| US20200310776A1 (en) | Over-the-air update validation | |
| JP2018022486A5 (https=) |