Supercharge Your Innovation With Domain-Expert AI Agents!

Methods of operating memory system

一种存储器系统、存储器控制器的技术,应用在存储器系统、仪器、响应错误的产生等方向,能够解决不能保护存储器设备黑客攻击等问题

Active Publication Date: 2018-06-29
SAMSUNG ELECTRONICS CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when a user directly installs a program including malicious code or unknown malicious code is installed by a method such as a spoofed text message, it may not be possible to protect the memory device from hacking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods of operating memory system
  • Methods of operating memory system
  • Methods of operating memory system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Various exemplary embodiments will be described more fully with reference to the accompanying drawings, in which embodiments are shown. However, this disclosure may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Like reference numerals refer to like elements throughout the application.

[0023] It will be understood that, although the terms first, second, third etc. may be used herein to describe various elements, these elements should not be limited by these terms. Unless stated otherwise, these terms are generally used to distinguish one element from another. Thus, a first element discussed below in one part of the specification could be termed a second element in a different part of the specification without departing from the teachings of the present invention. Furthermore, terms such as "first" and "second" may be used in the claims to name elements of the claims even if the specific designation is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of operating a memory system includes setting a secured area in a volatile memory device of the memory system during a secure mode, writing secure data in the secured area during the secure mode, and when a write command for the secured area is inputted in a normal operation mode, preventing a write operation from occurring and generating an error signal. Accordingly, the secured area isset in the volatile memory device so that the hacking and the data forgery may be prevented.

Description

technical field [0001] Exemplary embodiments relate to methods of operating a memory system, and more particularly, to methods of operating a memory system including setting a secure area in a memory device. Background technique [0002] To prevent hackers from attacking memory devices, in conventional methods, firewalls can block malicious codes from external devices using authentication keys, or vaccine programs can prevent malicious codes from being installed. [0003] However, when a user directly installs a program including malicious code or unknown malicious code is installed by a method such as a spoofing text message, the memory device may not be protected from hacker attacks. Therefore, it is desirable for a memory system or memory device to be protected against user-initiated hacking. Contents of the invention [0004] Exemplary embodiments provide a method of operating a memory system including setting a secure area in a volatile memory device to prevent hacki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
CPCG06F12/1441G06F21/79G06F21/575G06F12/14G06F12/0638G06F12/0238G06F11/073G06F11/0751G06F11/0772G06F2212/1052G06F2212/202G06F2212/205
Inventor 李奎东崔伯圭金志元
Owner SAMSUNG ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More