Patents by Inventor Dattatreya Nayak
Dattatreya Nayak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12229008Abstract: A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to operate under at least a first device protocol and a second device protocol, where the first and second device protocols have different endurance and protection requirements. When data is programmed to the memory device using the first device protocol, but is read from the memory device using the second device protocol, the differing endurance and protection requirements may cause issues in reading the data. In order to alleviate the issues, during idle time of the second device protocol, the controller may program the data using the endurance and protection requirements of the second device protocol to a different portion of the memory device so that the data may be read using either or both device protocols with the appropriate recovery information.Type: GrantFiled: July 6, 2023Date of Patent: February 18, 2025Assignee: Sandisk Technologies, Inc.Inventors: Ganesh Kumar Pathirakani, Dattatreya Nayak, Venkatesh Ramadoss, Tarun Nimmagadda
-
Patent number: 12197287Abstract: A data storage device includes a host interface for coupling the data storage device to a host system. The data storage device also includes a device memory for storing or providing data in response to commands receive from the host system. The data storage device also includes a controller comprising a storage subsystem and a security subsystem. The storage subsystem is configured to receive a host command from the host interface, and process the host command for the device memory. The security subsystem includes a device recovery circuit configured to monitor the storage subsystem for an exception state, and reinitialize pending operations for the storage subsystem after the exception state. Methods and systems are also disclosed.Type: GrantFiled: September 16, 2022Date of Patent: January 14, 2025Assignee: Sandisk Technologies, Inc.Inventors: Dattatreya Nayak, Rohit Prasad, Vinod Sasidharan
-
Publication number: 20240256383Abstract: A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to operate under at least a first device protocol and a second device protocol, where the first and second device protocols have different endurance and protection requirements. When data is programmed to the memory device using the first device protocol, but is read from the memory device using the second device protocol, the differing endurance and protection requirements may cause issues in reading the data. In order to alleviate the issues, during idle time of the second device protocol, the controller may program the data using the endurance and protection requirements of the second device protocol to a different portion of the memory device so that the data may be read using either or both device protocols with the appropriate recovery information.Type: ApplicationFiled: July 6, 2023Publication date: August 1, 2024Applicant: Western Digital Technologies, Inc.Inventors: Ganesh Kumar PATHIRAKANI, Dattatreya NAYAK, Venkatesh RAMADOSS, Tarun NIMMAGADDA
-
Publication number: 20240195608Abstract: This disclosure relates to systems, methods, and data storage devices, such as a data storage device comprising a data path and a controller. The data path comprises a data port to transmit data between a host computer system and the data storage device. The data storage device registers with the host computer system as a block data storage device. A non-volatile storage medium stores encrypted user content data. A cryptography engine is connected between the data port and the storage medium and uses cryptographic key data to encrypt and decrypt user content data. The controller is configured to send the encrypted user content data for back-up storage external to the data storage device as encrypted by the cryptographic key data, and communicate with a user device over a communication channel that is different from the data path, to send the cryptographic key data for decryption of the encrypted user content external to the data storage device.Type: ApplicationFiled: August 3, 2023Publication date: June 13, 2024Inventors: Dattatreya NAYAK, Arun SHUKLA
-
Publication number: 20240094920Abstract: A data storage device includes a host interface for coupling the data storage device to a host system. The data storage device also includes a device memory for storing or providing data in response to commands receive from the host system. The data storage device also includes a controller comprising a storage subsystem and a security subsystem. The storage subsystem is configured to receive a host command from the host interface, and process the host command for the device memory. The security subsystem includes a device recovery circuit configured to monitor the storage subsystem for an exception state, and reinitialize pending operations for the storage subsystem after the exception state. Methods and systems are also disclosed.Type: ApplicationFiled: September 16, 2022Publication date: March 21, 2024Applicant: Western Digital Technologies, Inc.Inventors: Dattatreya NAYAK, Rohit PRASAD, Vinod SASIDHARAN
-
Publication number: 20240095125Abstract: A data storage device includes interfaces for coupling the data storage device to a host system and a server system. The data storage device also includes a device memory for storing or providing data. The data storage device also includes a controller comprising a storage subsystem and a security subsystem. The storage subsystem is configured to receive a host command, receive a probe request for an exception state, generate and transmit, to the security subsystem, a report for the exception state. In response to receiving an update from the security subsystem, the storage subsystem restarts at least a portion of the controller. The security subsystem is configured to monitor and transmit a probe request to the storage subsystem, transmit the report to the server system, receive the update from the server system, and transmit the update to the storage subsystem. Methods and systems are also disclosed.Type: ApplicationFiled: July 12, 2023Publication date: March 21, 2024Applicant: Western Digital Technologies, Inc.Inventors: Dattatreya NAYAK, Rohit PRASAD, Vinod SASIDHARAN
-
Publication number: 20240037240Abstract: Storage devices may be utilized in external devices that communicate with host computing devices over various communication ports and protocols. Traditionally, storage devices utilize boot loading data, such as boot ROMS, to start normal operations of the device. However, many storage devices are unable to change or update boot loading data once the device has been manufactured or deployed. Thus, methods, systems, and devices described herein decouple the boot loading process from the storage device and load boot loading data from an external device. The boot loading data can be loaded via a wireless communication connection from an external device, where it can be updated as needed. Once loaded, the bootloader can begin the process of loading firmware and starting the normal operation of the drive over regular wired communication ports. When the boot loading data or firmware cannot be loaded externally, traditional booting methods can be used utilizing previously stored copies of the required data.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Inventors: Vinod Sasidharan, Dattatreya Nayak
-
Patent number: 11650758Abstract: A data storage device and method for host-initiated cached read to recover corrupted data within timeout constraints are provided. In one embodiment, a data storage device is provided comprising a volatile memory, a non-volatile memory, and a controller. The controller is configured to receive a read look-ahead command from a host to perform a read look-ahead of a first logical address; receive a read command from the host to read a second logical address; and execute the read look-ahead command by performing the following as background operations while executing the read command: read data for a location in the non-volatile memory that corresponds to the first logical address; correct an error in the data; and cache the corrected data in the volatile memory. The cached corrected data can be sent back to the host in response to the host requesting a read of the same logical address. Other embodiments are provided.Type: GrantFiled: May 6, 2021Date of Patent: May 16, 2023Assignee: Western Digital Technologies, Inc.Inventors: Dattatreya Nayak, Arun Kumar Shukla, Akash Dungrani
-
Publication number: 20220357878Abstract: A data storage device and method for host-initiated cached read to recover corrupted data within timeout constraints are provided. In one embodiment, a data storage device is provided comprising a volatile memory, a non-volatile memory, and a controller. The controller is configured to receive a read look-ahead command from a host to perform a read look-ahead of a first logical address; receive a read command from the host to read a second logical address; and execute the read look-ahead command by performing the following as background operations while executing the read command: read data for a location in the non-volatile memory that corresponds to the first logical address; correct an error in the data; and cache the corrected data in the volatile memory. The cached corrected data can be sent back to the host in response to the host requesting a read of the same logical address. Other embodiments are provided.Type: ApplicationFiled: May 6, 2021Publication date: November 10, 2022Applicant: Western Digital Technologies, Inc.Inventors: Dattatreya Nayak, Arun Kumar Shukla, Akash Dungrani