Patents by Inventor Charles McJilton

Charles McJilton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11923026
    Abstract: A data storage system may connect a non-volatile memory to a quarantine module that generates a quarantine strategy in response to a pending data access request to the non-volatile memory. The quarantine strategy can proactively prescribing a plurality of status levels for physical data addresses of the non-volatile memory. A comparison of a volume of errors for the non-volatile memory to a first threshold of the quarantine strategy with the quarantine module may prompt the alteration of a first status level of the plurality of status levels for a first physical data address of the non-volatile memory, as directed by the quarantine strategy.
    Type: Grant
    Filed: August 5, 2021
    Date of Patent: March 5, 2024
    Assignee: Seagate Technology LLC
    Inventors: Jeremy B. Goolsby, Ryan J. Goss, Indrajit Prakash Zagade, Thomas V. Spencer, Jeffrey J. Pream, Christopher A. Smith, Charles McJilton
  • Patent number: 11698754
    Abstract: Method and apparatus for managing data in a storage device, such as a solid-state drive (SSD). A non-volatile memory (NVM) is arranged into multiple garbage collection units (GCUs) each separately erasable and allocatable as a unit. Read circuitry applies read voltages to memory cells in the GCUs to sense a programmed state of the memory cells. Calibration circuitry groups different memory cells from different GCUs into calibration groups that share a selected set of read voltages. A read command queue accumulates pending read commands to transfer data from the NVM to a local read buffer. Read command coalescing circuitry coalesces selected read commands from the queue into a combined command for execution as a single batch command. The combined batch command may include read voltages for use in retrieval of the requested data.
    Type: Grant
    Filed: October 4, 2021
    Date of Patent: July 11, 2023
    Assignee: Seagate Technology LLC
    Inventors: Charles McJilton, Jeffrey Pream, Jonathan Henze, Indrajit Zagade
  • Publication number: 20230032639
    Abstract: A data storage system may store a first data block having a first data configuration generated by a host in a non-volatile memory that is connected to a data module. A data strategy may be generated with the data module in response to the storage of data with the data strategy consisting of at least one trigger associated with identifying the first data block as hot. The first data block can be replicated to a different memory location with a second data configuration as directed by the data strategy with the first data configuration being different than the second data configuration.
    Type: Application
    Filed: July 30, 2021
    Publication date: February 2, 2023
    Inventors: Jack Vincent Anderson, Jonathan Henze, Ryan James Goss, Charles McJilton, Jeremy Blair Goolsby
  • Publication number: 20220129378
    Abstract: Method and apparatus for managing data in a storage device, such as a solid-state drive (SSD). A non-volatile memory (NVM) is arranged into multiple garbage collection units (GCUs) each separately erasable and allocatable as a unit. Read circuitry applies read voltages to memory cells in the GCUs to sense a programmed state of the memory cells. Calibration circuitry groups different memory cells from different GCUs into calibration groups that share a selected set of read voltages. A read command queue accumulates pending read commands to transfer data from the NVM to a local read buffer. Read command coalescing circuitry coalesces selected read commands from the queue into a combined command for execution as a single batch command. The combined batch command may include read voltages for use in retrieval of the requested data.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 28, 2022
    Inventors: Charles McJilton, Jeffrey Pream, Jonathan Henze, Indrajit Zagade
  • Publication number: 20220044754
    Abstract: A data storage system may connect a non-volatile memory to a quarantine module that generates a quarantine strategy in response to a pending data access request to the non-volatile memory. The quarantine strategy can proactively prescribing a plurality of status levels for physical data addresses of the non-volatile memory. A comparison of a volume of errors for the non-volatile memory to a first threshold of the quarantine strategy with the quarantine module may prompt the alteration of a first status level of the plurality of status levels for a first physical data address of the non-volatile memory, as directed by the quarantine strategy.
    Type: Application
    Filed: August 5, 2021
    Publication date: February 10, 2022
    Inventors: Jeremy B. Goolsby, Ryan J. Goss, Indrajit Prakash Zagade, Thomas V. Spencer, Jeffrey J. Pream, Christopher A. Smith, Charles McJilton
  • Publication number: 20080222416
    Abstract: Implementations described and claimed herein provide a secure network connection for remote access, e.g., to building automation systems. A secure network connection may be established according to one implementation between a remote client and a system host for the building automation system. The system host provides its network address to a security host. When the remote client desires access to the system host, the remote client requests the network address from the security host. The security host authenticates the remote client as an authorized user. If the remote client is an authorized user, the security host provides the network address and a security key to the remote client. The remote client then uses the network address to request access to the system host. The system host authenticates the remote client by requesting the security host to verify the security key before granting the remote client access to the system host.
    Type: Application
    Filed: February 26, 2008
    Publication date: September 11, 2008
    Inventors: Gary Kiwimagi, Luke M. Norris, Charles McJilton
  • Publication number: 20050120240
    Abstract: Implementations described and claimed herein provide access, e.g., to building automation systems, via a secure authenticated network connection. A secure authenticated network connection may be established in a network environment according to one implementation between a client and a system node (e.g., a server controlling the building automation system). The system node provides its network address to a control node. When the client desires access to the system node, the client requests the network address from the control node. The control node authenticates the client as an authorized user. If the client is an authorized user, the control node provides session information to the system node, the client, and a data node. The client and the system node then use the session information to request access to each other via the data node.
    Type: Application
    Filed: February 17, 2004
    Publication date: June 2, 2005
    Inventors: Gary Kiwimagi, Charles McJilton
  • Publication number: 20050120223
    Abstract: Implementations described and claimed herein provide access, e.g., to building automation systems, via a secure authenticated network: connection. A secure authenticated network connection may be established in a network environment according to one implementation between a client and a system node (e.g., a server controlling the building automation system). The system node registers with a data node and the control node maintains a listing of clients authorized to access the system node. When a client desires access to the system node, the client requests access via the control node. The control node authenticates the client as an authorized user and establishes a secure authenticated connection between the client and the system node via the data node.
    Type: Application
    Filed: July 14, 2004
    Publication date: June 2, 2005
    Inventors: Gary Kiwimagi, Charles McJilton, Craig Files
  • Publication number: 20050119767
    Abstract: Implementations described and claimed herein provide systems (e.g., a computer program product) and methods of configuring automation devices in a building automation system. An exemplary method includes acquiring an electronic layout for the building automation system. The electronic layout may be populated with a plurality of automation devices. Relationships may be established among the automation devices in the electronic layout. In other exemplary implementations, operation of the automation devices may be simulated in software, and documentation may be generated for the building automation system.
    Type: Application
    Filed: November 30, 2004
    Publication date: June 2, 2005
    Inventors: Gary Kiwimagi, Charles McJilton, Mark Gookin
  • Publication number: 20050120204
    Abstract: Implementations described and claimed herein provide a secure network connection for remote access, e.g., to building automation systems. A secure network connection may be established according to one implementation between a remote client and a system host for the building automation system. The system host provides its network address to a security host. When the remote client desires access to the system host, the remote client requests the network address from the security host. The security host authenticates the remote client as an authorized user. If the remote client is an authorized user, the security host provides the network address and a security key to the remote client. The remote client then uses the network address to request access to the system host. The system host authenticates the remote client by requesting the security host to verify the security key before granting the remote client access to the system host.
    Type: Application
    Filed: December 1, 2003
    Publication date: June 2, 2005
    Inventors: Gary Kiwimagi, Luke Norris, Charles McJilton