Storage system and method for performing and authenticating write-protection thereof

A technology of write protection and memory, applied in the field of storage system

Active Publication Date: 2015-09-30
SAMSUNG ELECTRONICS CO LTD
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Exposing the bootloader or kernel image to dangers such as rooting without

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Storage system and method for performing and authenticating write-protection thereof
  • Storage system and method for performing and authenticating write-protection thereof
  • Storage system and method for performing and authenticating write-protection thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Embodiments will be described in detail with reference to the accompanying drawings. However, the inventive concept can be embodied in many different forms and should not be construed as limited to the illustrated embodiments. Rather, these embodiments are provided as examples so that this disclosure will be thorough and complete, and will fully convey the inventive concept to those skilled in the art. Accordingly, known processes, elements and techniques are not described with respect to some embodiments of the inventive concept. Unless otherwise indicated, like reference numerals refer to like elements throughout the drawings and written description, and thus description will not be repeated. In the drawings, the size and relative sizes of layers and regions may be exaggerated for clarity.

[0058] It should be understood that although terms such as "first", "second", "third" etc. may be used herein to describe various elements, components, regions, layers and / or se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a storage system and a method for performing and authenticating write-protection thereof. The method includes receiving, at a storage device, a request. The request includes a request message authentication code and write protect information. The write protect information includes at least one of start address information and length information. The start address information indicates a logical block address at which a memory area in a non-volatile memory of the storage device starts, and the length information indicates a length of the memory area. The method also includes generating, at the storage device, a message authentication code based on at least one of the start address information and the length information, and a key stored at the storage device; authenticating, at the storage device, the request based on the generated message authentication code and the request message authentication code; and processing, at the storage device, the request based on a result of the authenticating.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Patent Application No. 61 / 971,673, filed March 28, 2014, and Korean Patent Application No. 10-2014-0117786, filed September 4, 2014 at the Korean Intellectual Property Office, The entire content of said application is incorporated herein by reference. technical field [0003] The inventive concept described herein relates to a storage system, and more specifically, to a storage system and a write protection method thereof. Background technique [0004] A storage system includes a host and storage devices. Hosts and storage devices are connected through various standardized interfaces such as Serial ATA (SATA), Universal Flash Memory (UFS), Small Computer System Interface (SCSI), Serial Attached SCSI (SAS), and Embedded MMC (eMMC). [0005] In conventional storage devices, anyone sets and releases write protection through predetermined commands. The type of write p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/08G06F21/78
Inventor 李在奎金志守朴永真辛宝滥
Owner SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products