Abstract:
An operating method of a host includes receiving a request for secure deletion of a first file stored in a storage system, providing an invalidation command to the storage system for invalidating data of the first file, providing an erase command to the storage system for erasing invalidated data included in the storage system, and performing a deletion operation, which is executable on an operating system of the host, on the first file which is deleted by the erase command.
Abstract:
An operating method of a memory controller may include: enabling a security mode in response to a first command received from a host; generating a security key based on a host key received from the host; storing the security key in a security key storing unit; and/or performing a first data processing operation of encrypting data received from the host and decrypting data stored in a non-volatile memory device, based on the security key, when the security mode is enabled. The security key storing unit may be a volatile memory.
Abstract:
A method of operating an electronic device includes: determining whether an external electronic device is connected to an access point to which the electronic device is connected; transmitting state information of the electronic device to the external electronic device connected to the access point; receiving an input corresponding to the transmitted state information of the electronic device, from the external electronic device; displaying a result corresponding to the received input on a display; and transmitting the result displayed on the display to the external electronic device.
Abstract:
An operating method of a memory controller may include: enabling a security mode in response to a first command received from a host; generating a security key based on a host key received from the host; storing the security key in a security key storing unit; and/or performing a first data processing operation of encrypting data received from the host and decrypting data stored in a non-volatile memory device, based on the security key, when the security mode is enabled. The security key storing unit may be a volatile memory.
Abstract:
An operating method of a host includes receiving a request for secure deletion of a first file stored in a storage system, providing an invalidation command to the storage system for invalidating data of the first file, providing an erase command to the storage system for erasing invalidated data included in the storage system, and performing a deletion operation, which is executable on an operating system of the host, on the first file which is deleted by the erase command.
Abstract:
An operating method of a host includes receiving a request for secure deletion of a first file stored in a storage system, providing an invalidation command to the storage system for invalidating data of the first file, providing an erase command to the storage system for erasing invalidated data included in the storage system, and performing a deletion operation, which is executable on an operating system of the host, on the first file which is deleted by the erase command.
Abstract:
An operating method of a host includes receiving a request for secure deletion of a first file stored in a storage system, providing an invalidation command to the storage system for invalidating data of the first file, providing an erase command to the storage system for erasing invalidated data included in the storage system, and performing a deletion operation, which is executable on an operating system of the host, on the first file which is deleted by the erase command.