Data Sheet
16
through the host. The encryption key is also stored on the device (commonly AES is utilized).
(1) Features boot authentication:
When the user starts the device, the shadow MBR will conduct a pre-boot identification; where the user is
cleared, the normal boot process will begin and connections to the devices are to be made.
(2) Sector specific permissions:
The device manager may create a logical block address (LBA) range and assign different permissions for
each LBA range. Only users with the correct key for a particular LBA range may perform permitted actions.
Where drive locations are password-protected, only users with the correct key will be authorized entry.
5.2.9 RAID engine
RAID engine technology stores data parity information in a specific area. The parity information can restore
damaged data back which can enhance data reliability.
5.2.10 Dynamic Thermal Throttling(Optional)
For 3D TLC SSD applications, when operation temperature increases, system CLK will decrease to protect
the SSD and controller with dynamic thermal throttling algorithm. The read/write speeds of the SSD will
change at different temperature levels in order to extend its lifespan.
5.2.11 Transcend SSD Scope Pro
Transcend’s SSD Scope Pro is a convenient software package that helps users monitor and manage SSD
status via an intuitive interface. It offers various useful features, including drive information and S.M.A.R.T.
status monitoring, diagnostic scan, secure erase, health indication, system clone, and monitoring. For more
information, please refer the website link. https://us.transcend-info.com/Embedded/Essay-20
5.2.12 Other Functions
Transcend SSD embedded a lot of cutting-edge technology. Should you have any technical request, please
contact the local support team or send us an e-mail.