Patents by Inventor Michael B. Danielson
Michael B. Danielson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10503934Abstract: An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware defining secure operations, a processor configured to execute the security firmware and perform a set of operations limited to the secure operations, and a plurality of secure hardware registers, accessible by the processor and configured to receive instructions to perform the secure operations, An apparatus for performing secure operations with a plurality of security assist hardware circuits is described in another embodiment. The apparatus comprises one or more secure hardware registers configured to receive a command to perform secure operations and one or more security assist hardware circuits configured to perform discrete secure operations using one or more secret data objects.Type: GrantFiled: August 20, 2018Date of Patent: December 10, 2019Assignee: Micron Technology, Inc.Inventors: Kenny T. Coker, David A. Pohm, Stephen P. Van Aken, Michael B. Danielson
-
Publication number: 20190332290Abstract: A method includes receiving an indication of an operational mode for a memory system including a set of memory devices. A first memory device of the set of memory devices includes a first media having a first media type and a second memory device of the et of memory devices includes a second media having a second media type that is different than the first media type. The method also includes allocating, by a processing device, a first portion and a second portion of the first memory device based on the operational mode for the memory system. The method also includes storing data at the first portion of the first memory device, the second portion of the first memory device, or the second memory device based on the operational mode for the memory system.Type: ApplicationFiled: April 25, 2018Publication date: October 31, 2019Inventors: James H. Meeker, Michael B. Danielson, Paul A. Suhler
-
Publication number: 20190332317Abstract: A first set of characteristics corresponding to a first memory device and a second set of characteristics corresponding to a second memory device are received. A first usage threshold for the first memory device based on the first set of characteristics and a second usage threshold for the second memory device based on the second set of characteristics are determined. Data is stored at the first memory device or the second memory device based on the first usage threshold for the first memory device and the second usage threshold for the second memory device.Type: ApplicationFiled: April 25, 2018Publication date: October 31, 2019Inventors: Michael B. Danielson, Paul A. Suhler
-
Patent number: 10452532Abstract: The present disclosure includes apparatuses and methods for directed sanitization of memory. One example method comprises, responsive to receiving a sanitization command, performing a deterministic garbage collection operation on a memory, wherein performing the deterministic garbage collection operation results in physical erasure of all invalid data stored on the memory without losing valid data stored on the memory.Type: GrantFiled: January 12, 2017Date of Patent: October 22, 2019Assignee: Micron Technology, Inc.Inventors: Jeffrey L. McVay, Daniel J. Hubbard, Robert W. Strong, Michael B. Danielson, Jonathan Tanguy
-
Publication number: 20190258569Abstract: The present disclosure includes apparatuses and methods for directed sanitization of memory. One example method comprises, responsive to receiving a sanitization command, performing a deterministic garbage collection operation on a memory, wherein performing the deterministic garbage collection operation results in physical erasure of all invalid data stored on the memory without losing valid data stored on the memory.Type: ApplicationFiled: May 3, 2019Publication date: August 22, 2019Inventors: Jeffrey L. McVay, Daniel J. Hubbard, Robert W. Strong, Michael B. Danielson, Jonathan Tanguy
-
Publication number: 20190189167Abstract: An example method of determining storage operation parameters based on data stream attributes may include: receiving, by a controller, a write command specifying a data item and an identifier of a data stream comprising the data item, wherein a part of the identifier of the data stream encodes a data attribute shared by data items comprised by the data stream; determining, using the data attribute, a storage operation parameter; and transmitting, to a memory device, an instruction specifying the data item and the storage operation parameter.Type: ApplicationFiled: December 20, 2017Publication date: June 20, 2019Inventors: Paul A. Suhler, Ram Krishan Kaul, Michael B. Danielson
-
Publication number: 20190013949Abstract: A data storage device is provided. The data storage device includes a storage medium having a first subset configured to store user data and a second subset configured to store snapshot data. The data storage device further includes a controller configured to (i) receive, from a host operably coupled to the data storage device, a command to configure the second subset, to (ii) verify an authenticity of the command, and to (iii) execute the command in response to the verification of the authenticity of the command.Type: ApplicationFiled: July 10, 2017Publication date: January 10, 2019Inventors: Robert W. Strong, Michael B. Danielson
-
Publication number: 20180357449Abstract: An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware defining secure operations, a processor configured to execute the security firmware and perform a set of operations limited to the secure operations, and a plurality of secure hardware registers, accessible by the processor and configured to receive instructions to perform the secure operations, An apparatus for performing secure operations with a plurality of security assist hardware circuits is described in another embodiment. The apparatus comprises one or more secure hardware registers configured to receive a command to perform secure operations and one or more security assist hardware circuits configured to perform discrete secure operations using one or more secret data objects.Type: ApplicationFiled: August 20, 2018Publication date: December 13, 2018Applicant: Micron Technology, Inc.Inventors: Kenny T. Coker, David A. Pohm, Stephen P. Van Aken, Michael B. Danielson
-
Patent number: 10068109Abstract: An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware defining secure operations, a processor configured to execute the security firmware and perform a set of operations limited to the secure operations, and a plurality of secure hardware registers, accessible by the processor and configured to receive instructions to perform the secure operations. An apparatus for performing secure operations with a plurality of security assist hardware circuits is described in another embodiment. The apparatus comprises one or more secure hardware registers configured to receive a command to perform secure operations and one or more security assist hardware circuits configured to perform discrete secure operations using one or more secret data objects.Type: GrantFiled: December 1, 2017Date of Patent: September 4, 2018Assignee: Micron Technology, Inc.Inventors: Kenny T. Coker, David A. Pohm, Stephen P. Van Aken, Michael B. Danielson
-
Publication number: 20180196743Abstract: The present disclosure includes apparatuses and methods for directed sanitization of memory. One example method comprises, responsive to receiving a sanitization command, performing a deterministic garbage collection operation on a memory, wherein performing the deterministic garbage collection operation results in physical erasure of all invalid data stored on the memory without losing valid data stored on the memory.Type: ApplicationFiled: January 12, 2017Publication date: July 12, 2018Inventors: Jeffrey L. McVay, Daniel J. Hubbard, Robert W. Strong, Michael B. Danielson, Jonathan Tanguy
-
Publication number: 20180089469Abstract: An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware defining secure operations, a processor configured to execute the security firmware and perform a set of operations limited to the secure operations, and a plurality of secure hardware registers, accessible by the processor and configured to receive instructions to perform the secure operations. An apparatus for performing secure operations with a plurality of security assist hardware circuits is described in another embodiment. The apparatus comprises one or more secure hardware registers configured to receive a command to perform secure operations and one or more security assist hardware circuits configured to perform discrete secure operations using one or more secret data objects.Type: ApplicationFiled: December 1, 2017Publication date: March 29, 2018Applicant: Micron Technology, Inc.Inventors: Kenny T. Coker, David A. Pohm, Stephen P. Van Aken, Michael B. Danielson
-
Patent number: 9864879Abstract: An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware defining secure operations, a processor configured to execute the security firmware and perform a set of operations limited to the secure operations, and a plurality of secure hardware registers, accessible by the processor and configured to receive instructions to perform the secure operations. An apparatus for performing secure operations with a plurality of security assist hardware circuits is described in another embodiment. The apparatus comprises one or more secure hardware registers configured to receive a command to perform secure operations and one or more security assist hardware circuits configured to perform discrete secure operations using one or more secret data objects.Type: GrantFiled: October 6, 2015Date of Patent: January 9, 2018Assignee: Micron Technology, Inc.Inventors: Kenny T. Coker, David A. Pohm, Stephen P. Van Aken, Michael B. Danielson
-
Publication number: 20170098102Abstract: An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware defining secure operations, a processor configured to execute the security firmware and perform a set of operations limited to the secure operations, and a plurality of secure hardware registers, accessible by the processor and configured to receive instructions to perform the secure operations. An apparatus for performing secure operations with a plurality of security assist hardware circuits is described in another embodiment. The apparatus comprises one or more secure hardware registers configured to receive a command to perform secure operations and one or more security assist hardware circuits configured to perform discrete secure operations using one or more secret data objects.Type: ApplicationFiled: October 6, 2015Publication date: April 6, 2017Inventors: KENNY T. COKER, DAVID A. POHM, STEPHEN P. VAN AKEN, MICHAEL B. DANIELSON
-
Patent number: 8566603Abstract: A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by the BIOS. In one implementation, a BIOS that does not support TCG security but does support ATA security can use ATA drive unlock to invoke TCG drive unlock on the storage device. Further, the storage device can be transitioned among multiple security operating modes (e.g., Undeclared, ATA security or TCG security).Type: GrantFiled: June 14, 2010Date of Patent: October 22, 2013Assignee: Seagate Technology LLCInventors: Jason R. Cox, Christopher J. Demattio, Monty A. Forehand, Michael B. Danielson, James C. Hatfield, Manuel A. Offenberg
-
Publication number: 20110307709Abstract: A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by the BIOS. In one implementation, a BIOS that does not support TCG security but does support ATA security can use ATA drive unlock to invoke TCG drive unlock on the storage device. Further, the storage device can be transitioned among multiple security operating modes (e.g., Undeclared, ATA security or TCG security).Type: ApplicationFiled: June 14, 2010Publication date: December 15, 2011Applicant: SEAGATE TECHNOLOGY LLCInventors: Jason R. Cox, Christopher J. Demattio, Monty A. Forehand, Michael B. Danielson, James C. Hatfield, Manuel A. Offenberg