Patent application number | Description | Published |
20080282088 | AUTHENTICATED NONVOLATILE MEMORY SIGNING OPERATIONS - A wireless device includes a nonvolatile memory that handles the task of securely performing integrity checks that do not expose the authentication private key externally. The system security architecture installs and associates private keys with the nonvolatile memory to create a secure execution environment resistant to virus attack. The nonvolatile memory provides integrity checks of nonvolatile memory data and generates signatures for data provided by the memory. | 11-13-2008 |
20100162038 | Nonvolatile/Volatile Memory Write System and Method - Methods and systems provide memory handling for memory systems with mixed volatile and nonvolatile memory types. In various embodiments, the method or system maintains a page table that marks memory pages in nonvolatile memory as write-protected. When a write is attempted to a write-protected page in nonvolatile memory, a fault is generated. In response to the fault, memory contents of the write-protected nonvolatile page are moved to a page location in a volatile memory. | 06-24-2010 |
20100169602 | Method and Apparatus for Efficient Memory Placement - A memory profiling system profiles memory objects in various memory devices and identifies memory objects as candidates to be moved to a more efficient memory device. Memory object profiles include historical read frequency, write frequency, and execution frequency. The memory object profile is compared to parameters describing read and write performance of memory types to determine candidate memory types for relocating memory objects. Memory objects with high execution frequency may be given preference when relocating to higher performance memory devices. | 07-01-2010 |
20110145476 | Persistent Content in Nonvolatile Memory - Applications may request persistent storage in nonvolatile memory. The persistent storage is maintained across power events and application instantiations. Persistent storage may be maintained by systems with or without memory management units. | 06-16-2011 |
20110145477 | FLASH TRANSLATION LAYER USING PHASE CHANGE MEMORY - A FLASH translation layer (FTL) includes a translation table that is maintained in non-FLASH memory. The translation table maps logical addresses to physical addresses and may be maintained in phase change memory (PCM). A bad block table (BBT) may also be maintained in non-FLASH memory. | 06-16-2011 |
20110145600 | NONVOLATILE MEMORY INTERNAL SIGNATURE GENERATION - A nonvolatile memory device generates a signature using a private key and contents within the memory device. The signature is stored in a secure area within the nonvolatile memory device. A processor having the same private key also generates a signature that is stored in the clear. The processor validates the contents of the nonvolatile memory by comparing the signatures. | 06-16-2011 |
20110161572 | Executing Applications From a Semiconductor Nonvolatile Memory - A processor-based device (e.g., a wireless device) may include a processor and a semiconductor nonvolatile memory to directly execute an application (e.g., an execute-in-place application) using an associated database. Within a flash memory, in one embodiment, an executable program may be separately stored in a non-fragmented manner from a resident database that includes program management information for use in an execution that does not involve a random access memory, saving time and resources. | 06-30-2011 |
20120260021 | DATA DEDUPLICATION - The present disclosure includes devices and methods for data deduplication. One such method includes receiving a write command, transforming data associated with the write command, determining if a transformation value of the data exists in a transformation table, and responsive to a determination that the transformation value does not exist in the transformation table, writing the data associated with the write command to a memory device. | 10-11-2012 |
20130024696 | METHOD AND APPARATUS FOR FLASH UPDATES WITH SECURE FLASH - Firmware updates are performed in a digital device that includes a secure flash that secures each block of stored data with a digital signature. In at least one embodiment, the update package that is received by the digital device for use in performing the update includes the digital signatures of blocks to be updated in the flash. In other embodiments, the digital signatures are generated within the digital device after an update package has been received. | 01-24-2013 |