Security management unit, host controller interface including same, method operating host controller interface

A host controller, security management technology, applied in computer security devices, data processing input/output processes, instruments, etc., can solve problems such as reducing the overall performance of computer systems

Active Publication Date: 2014-05-07
SAMSUNG ELECTRONICS CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, processors that switch between data with different data security policies degrade the overall performance of the computer system constituted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management unit, host controller interface including same, method operating host controller interface
  • Security management unit, host controller interface including same, method operating host controller interface
  • Security management unit, host controller interface including same, method operating host controller interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the inventive concept will now be described in more detail with reference to the accompanying drawings. However, the inventive concept may be embodied in many different forms and should not be construed as limited to the embodiments shown. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the inventive concept to those skilled in the art. Throughout the above description and drawings, the same reference numerals and signs represent the same or similar elements.

[0029] It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present. As used herein, the term "and / or" include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of operating a host controller interface includes receiving a buffer descriptor including sector information from a main memory, fetching data by using a source address included in the buffer descriptor, selecting one of a plurality of entries included in a security policy table by using the sector information, and determining whether to encrypt the fetched data by using a security policy included in the selected entry.

Description

[0001] Cross references to related patent applications [0002] Priority is claimed from Korean Patent Application No. 10-2012-0116890 filed in the Korean Intellectual Property Office on Oct. 19, 2012, the subject matter of which is hereby incorporated by reference in its entirety. technical field [0003] The inventive concept relates to host controller interfaces. More particularly, the inventive concept relates to a security management unit in a host controller interface capable of managing a security policy according to a region of a corresponding storage device. The inventive concept also relates to a method of operating a host controller interface comprising said security management unit, and a device comprising such a host controller interface. Background technique [0004] Data security is an important consideration in the design and operation of storage devices within contemporary computer systems. An effective data security approach must prevent unauthorized acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/79
CPCG06F21/78G06F13/00G06F21/44G06F21/60G06F3/0622G06F3/0637G06F3/0673G06F21/604G06F21/62G06F21/629
Inventor 金宽浩金奭旼李宪洙
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products