Abstract:
A storage device includes at least one nonvolatile memory device, and a controller controlling the at least one nonvolatile memory device. The controller includes a parameter storage storing a power parameter indicating a clock value of each of internal configurations for each power state. The power parameter is a value derived by performing machine learning considering performance, peak power, and average power.
Abstract:
Provided is an electronic apparatus comprising a microphone, a communication interface, a memory, and at least one processor to control the electronic apparatus. The processor may execute at least one instruction stored in the memory to: based on a preset user voice of a user being received through the microphone, control the communication interface to request at least one first sound information from at least one home appliance, each of the at least one first sound information corresponding to the preset user voice received at each of the at least one home appliance, receive, through the communication interface, the at least one first sound information from the at least one home appliance, and identify a position of the user based on the preset user voice and the at least one first sound information.
Abstract:
Disclosed is a storage device which includes a nonvolatile memory device that stores booting data and user data, and a memory controller that includes a first core, a second core, and third cores. In an initialization operation, the first core performs first authentication on at least a first part of the booting data. In response to that the first authentication succeeds, the first core generates a device identifier, and the second core loads the first part of the booting data and performs first booting. The first core performs second authentication on at least a second part of the booting data. In response to that the second authentication succeeds, the first core generates a first certificate and a second certificate, and the second core loads the second part of the booting data and performs second booting.
Abstract:
In one embodiment, the method includes receiving, at a storage device, a request. The request includes a request message authentication code and write protect information. The write protect information includes at least one of start address information and length information. The start address information indicates a logical block address at which a memory area in a non-volatile memory of the storage device starts, and the length information indicates a length of the memory area. The method also includes generating, at the storage device, a message authentication code based on (1) at least one of the start address information and the length information, and (2) a key stored at the storage device; authenticating, at the storage device, the request based on the generated message authentication code and the request message authentication code; and processing, at the storage device, the request based on a result of the authenticating.
Abstract:
A storage device configured to communicate with a host, the storage device including: a memory including a protected region; and a controller configured to provide the host with a first response including a first device message authentication code and a first device message, receive a first write request from the host, the first write request including a first host message authentication code and a first host message, generate a first message verification code based on the first device message authentication code and the first host message, verify the first write request based on the first host message authentication code and the first message verification code, and write data included in the first write request to the protected region when the verification of the first write request succeeds.
Abstract:
A memory controller for controlling a non-volatile memory device includes a key management unit configured to control an access right to a secure key based on a biometric authentication message and a unique value, which are received from an external device; and a data processing unit configured to encrypt data received from a host and decrypt data stored in the non-volatile memory device based on the secure key.
Abstract:
Disclosed is an operating method of a storage device, which includes detecting virus/malware, performing an authentication operation with a host device when the virus/malware is detected, and entering a recovery mode when the authentication operation indicates that authentication is successful.
Abstract:
A method of operating a host controlling a storage medium includes receiving initial authentication information; setting a portion of a storage space of the storage medium as a protection area; transmitting the received initial authentication information and protection area information with respect to the protection area to the storage medium; and discarding the initial authentication information in the host.
Abstract:
An writing and reading method of a nonvolatile Storage, that includes a first partition and a second partition, and is configured to allow a read operation and a write operation with respect to the second partition only when an authentication is successful in a normal mode, may comprise: assigning a part of a storage space of the second partition to a temporary area by the nonvolatile storage according to a request of changing the normal mode to a secure temporary mode; and/or writing data to the temporary area by the nonvolatile storage. The nonvolatile storage may allow the read operation and with respect to the temporary area without the authentication.
Abstract:
Disclosed is a memory system which includes a non-volatile memory device, and a memory controller configured to control the non-volatile memory device. The memory controller includes a key index table including an extended key index associated with a logical address from a host device and an encryption/decryption key table including a replicated key index associated with the extended key index, and an encryption/decryption key associated with encryption or decryption of target data associated with the logical address. The memory controller is configured to change the replicated key index based on a key change request for the encryption/decryption key. Based on the encryption or the decryption being performed with respect to the target data, the memory controller is configured to compare the extended key index and the replicated key index to detect whether the encryption/decryption key associated with the encryption or the decryption is changed.