Patent application number | Description | Published |
20090172286 | Method And System For Balancing Host Write Operations And Cache Flushing - A method and system for balancing host write operations and cache flushing is disclosed. The method may include steps of determining an available capacity in a cache storage portion of a self-caching storage device, determining a ratio of cache flushing steps to host write commands if the available capacity is below a desired threshold and interleaving cache flushing steps with host write commands to achieve the ratio. The cache flushing steps may be executed by maintaining a storage device busy status after executing a host write command and utilizing this additional time to copy a portion of the data from the cache storage into the main storage. The system may include a cache storage, a main storage and a controller configured to determine and execute a ratio of cache flushing steps to host write commands by executing cache flushing steps while maintaining a busy status after a host write command. | 07-02-2009 |
20090276562 | Flash cache flushing method and system - A flash memory system that uses repeated writing of the data to achieve stable storage, is adapted for efficient cache flushing operations by utilizing a part of the non-volatile flash memory array as a designated buffer for the data, in which data integrity is retained until all repeat writing thereof is complete. Repeated writing is carried out from the designated buffer directly to the final storage locations in the flash memory array, for example using simple internal copy back operations. | 11-05-2009 |
20100088575 | LOW DENSITY PARITY CODE (LDPC) DECODING FOR MEMORY WITH MULTIPLE LOG LIKELIHOOD RATIO (LLR) DECODERS - Data stored in memory is decoded using iterative probabilistic decoding and multiple decoders. A first decoder attempts to decode a representation of a codeword. If the attempt is unsuccessful, a second decoder attempts to decode the representation of a codeword. The second decoder may have a lower resolution than the first decoder. Probability values such as logarithmic likelihood ratio (LLR) values may be clipped in the second decoder. This approach can overcome trapping sets while exhibiting low complexity and high performance. Further, it can be implemented on existing decoders such as those used in current memory devices. | 04-08-2010 |
20100106890 | METHOD AND APPARATUS FOR ENFORCING A FLASH MEMORY CACHING POLICY - Methods, apparatus and computer medium for enforcing one or more cache management policies are disclosed herein. In some embodiments, a flash memory of a storage device includes a plurality of flash memory dies each flash memory die including a respective cache storage area and a respective main storage area. A determination is made, for data that is received from an external host device to which main storage area the received data is addressed thereby specifying one of the plurality of flash memory dies as a target die for the received data. Whenever the received data is written into a cache storage area before being written into a main storage area, the received data is written into the cache storage area of the specified target die. | 04-29-2010 |
20110283051 | MOVING EXECUTABLE CODE FROM A FIRST REGION OF A NON-VOLATILE MEMORY TO A SECOND REGION OF THE NON-VOLATILE MEMORY - A data storage device includes a controller and a non-volatile memory coupled to the controller. The non-volatile memory includes executable boot code that is executable by a processor associated with the data storage device. The controller is configured to read a first portion of the executable boot code from a first region of the non-volatile memory, and in response to detecting a condition, move a second portion of the executable boot code in a second region of the non-volatile memory to a third region of the non-volatile memory. | 11-17-2011 |
20140281122 | MULTI-LEVEL TABLE DELTAS - A memory system or flash card may include an algorithm or process for managing the handling of large tables in memory. A delta may be used for each table to accumulate updates. There may be a plurality of deltas for a multi-level delta structure. In one example, the first level delta is stored in random access memory (RAM), while the other level deltas are stored in the flash memory. Multiple-level deltas may improve the number of flash writes and reduce the number and amount of each flush to the actual table in flash. The use of multi-level deltas may improve performance by more efficiently writing to the table in flash. | 09-18-2014 |
Patent application number | Description | Published |
20080250248 | Identity Management System with an Untrusted Identity Provider - This invention describes an Identity Management system, in which the User uses the same set of credentials to log into multiple Web Service Providers (WSPs). However, unlike in traditional systems, none of the WSPs have to rely on assertions issued by the Identity Provider (IdP). The Identity Provider itself remains agnostic of User's credentials and User's personal information (the Identity). A 3-way cryptographic protocol is employed between the User, the WSP and the IdP that allows credentials re-use without exposing the IdP to any sensitive information. | 10-09-2008 |
20120163581 | ELLIPTIC CURVE CRYPTOGRAHY WITH FRAGMENTED KEY PROCESSING AND METHODS FOR USE THEREWITH - A cryptography module includes a key store having a plurality of storage locations for storing a private key as k key fragments. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process a message in accordance with elliptic curve digital signature algorithm (ECDSA) to produce a signed message. | 06-28-2012 |
20120163590 | CRYPTOGRAPHY MODULE FOR USE WITH FRAGMENTED KEY AND METHODS FOR USE THEREWITH - A cryptography module includes a key store having a plurality of storage locations for storing a key as k key fragments including a plurality of random key fragments and a remainder key fragment. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process an input signal to produce an output signal. | 06-28-2012 |
20120210124 | CLIENT DEVICE AND LOCAL STATION WITH DIGITAL RIGHTS MANAGEMENT AND METHODS FOR USE THEREWITH - A current version certificate is stored that includes a corresponding current version identifier. A current instance certificate is received from the certificate authority, wherein the current instance certificate includes the current version identifier of the current version certificate and a current instance public key corresponding to the current instance private key. The current instance certificate is sent to a local station, during a registration with the local station. A request for video content is generated and sent to the local station. First encrypted data is received from the local station, wherein the first encrypted data includes a content key that is encrypted via the current instance public key. Second encrypted data is received from the local station, wherein the second encrypted data includes the video content that is encrypted via the content key. | 08-16-2012 |
20130246786 | CLIENT DEVICE AND LOCAL STATION WITH DIGITAL RIGHTS MANAGEMENT AND METHODS FOR USE THEREWITH - A current version certificate is stored that includes a corresponding current version identifier. A current instance certificate is received from the certificate authority, wherein the current instance certificate includes the current version identifier of the current version certificate and a current instance public key corresponding to the current instance private key. The current instance certificate is sent to a local station, during a registration with the local station. A request is generated and sent to the local station. First encrypted data is received from the local station, wherein the first encrypted data includes a content key that is encrypted via the current instance public key. | 09-19-2013 |
20140173288 | ELLIPTIC CURVE CRYPTOGRAPHY WITH FRAGMENTED KEY PROCESSING AND METHODS FOR USE THEREWITH - A cryptography module includes a key store having a plurality of storage locations for storing a private key as k key fragments. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process a message in accordance with elliptic curve digital signature algorithm (ECDSA) to produce a signed message. | 06-19-2014 |