US 12,086,242 B2
Storage device and method for protecting against virus/malware thereof and computing system having the same
Seongnam Kwon, Bucheon-si (KR); Jisoo Kim, Seongnam-si (KR); Taeseok Hwang, Seongnam-si (KR); and Chanik Park, Suwon-si (KR)
Assigned to Samsung Electronics Co., Ltd., Gyeonggi-do (KR)
Filed by Samsung Electronics Co., Ltd., Suwon-si (KR)
Filed on Dec. 23, 2020, as Appl. No. 17/132,766.
Application 17/132,766 is a division of application No. 15/609,164, filed on May 31, 2017, granted, now 10,909,238.
Claims priority of application No. 10-2016-0117913 (KR), filed on Sep. 13, 2016.
Prior Publication US 2021/0117540 A1, Apr. 22, 2021
Int. Cl. G06F 21/00 (2013.01); G06F 3/06 (2006.01); G06F 21/33 (2013.01); G06F 21/44 (2013.01); G06F 21/55 (2013.01); G06F 21/56 (2013.01)
CPC G06F 21/554 (2013.01) [G06F 3/0622 (2013.01); G06F 3/0634 (2013.01); G06F 3/0673 (2013.01); G06F 21/33 (2013.01); G06F 21/44 (2013.01); G06F 21/567 (2013.01); G06F 21/568 (2013.01); G06F 3/0659 (2013.01); G06F 2221/031 (2013.01)] 7 Claims
OG exemplary drawing
 
1. A storage device comprising:
a memory area including an area recognizable without authentication of a host device and a protected area that stores a trap file, the protected area configured to be inaccessible to the host device before an authentication operation and to be accessible when the authentication operation with the host device is successful; and
controller configured to control a read/write operation of the memory area in response to receiving an input/output request, to detect malware by analyzing a pattern of data corresponding to the input/output request received from the host device or determining whether the input/output request attempts to access or modulate the trap file, and to initiate a recovery mode when the authentication operation is successful,
wherein the recovery mode includes reading recovery data stored in the protected area and transmitting the recovery data to the host,
wherein the authentication operation is performed when the input/output request attempts to access or modulate the trap file, and
wherein the controller is configured to
detect the malware,
perform the authentication operation when the malware is detected, and
enter a protection mode to protect the memory area or the protected area when the authentication operation is not successful.