Patents by Inventor Richard Mangold

Richard Mangold has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11573735
    Abstract: Technologies for media management for column-based memory systems include a memory controller including an indirection table. The memory controller receives a memory access to a column-addressable memory indicative of a memory row address. The memory controller determines a logical sub-block identifier based on the memory row address and looks up a physical sub-block identifier in the indirection table. The memory controller issues a redirected memory access indicative of the physical sub-block identifier to the column-addressable memory. The memory access may include a column read. The memory controller may perform a media management operation by copying or moving data from a source physical sub-block to a destination physical sub-block. The memory controller updates the indirection table with the destination physical sub-block for the associated logical sub-block identifier. Other embodiments are described and claimed.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: February 7, 2023
    Assignee: Intel Corporation
    Inventors: Rowel Garcia, Jawad Khan, Richard Mangold
  • Publication number: 20200257472
    Abstract: Technologies for media management for column-based memory systems include a memory controller including an indirection table. The memory controller receives a memory access to a column-addressable memory indicative of a memory row address. The memory controller determines a logical sub-block identifier based on the memory row address and looks up a physical sub-block identifier in the indirection table. The memory controller issues a redirected memory access indicative of the physical sub-block identifier to the column-addressable memory. The memory access may include a column read. The memory controller may perform a media management operation by copying or moving data from a source physical sub-block to a destination physical sub-block. The memory controller updates the indirection table with the destination physical sub-block for the associated logical sub-block identifier. Other embodiments are described and claimed.
    Type: Application
    Filed: April 21, 2020
    Publication date: August 13, 2020
    Inventors: Rowel Garcia, Jawad Khan, Richard Mangold
  • Publication number: 20170024275
    Abstract: Apparatus, systems, and methods to manage high capacity memory devices are described. In one example, a controller comprises logic to receive a write operation comprising payload data, a namespace identifier (ID) and a first extended logical block address (LBA), compute a first system cyclic redundancy check (CRC) using a payload CRC, the namespace ID and the first extended LBA, store the first system CRC in association with the first extended LBA in a local memory, and write the payload data, the first system CRC, and a truncated LBA derived from the first extended LBA to a memory. Other examples are also disclosed and claimed.
    Type: Application
    Filed: March 21, 2016
    Publication date: January 26, 2017
    Applicant: Intel Corporation
    Inventors: Knut Grimsrud, Jawad Khan, Richard Mangold
  • Patent number: 9292379
    Abstract: Apparatus, systems, and methods to manage high capacity memory devices are described. In one example, a controller comprises logic to receive a write operation comprising payload data, a namespace identifier (ID) and a first extended logical block address (LBA), compute a first system cyclic redundancy check (CRC) using a payload CRC, the namespace ID and the first extended LBA, store the first system CRC in association with the first extended LBA in a local memory, and write the payload data, the first system CRC, and a truncated LBA derived from the first extended LBA to a memory. Other examples are also disclosed and claimed.
    Type: Grant
    Filed: September 28, 2013
    Date of Patent: March 22, 2016
    Assignee: Intel Corporation
    Inventors: Knut Grimsrud, Jawad Khan, Richard Mangold
  • Publication number: 20150095737
    Abstract: Apparatus, systems, and methods to manage high capacity memory devices are described. In one example, a controller comprises logic to receive a write operation comprising payload data, a namespace identifier (ID) and a first extended logical block address (LBA), compute a first system cyclic redundancy check (CRC) using a payload CRC, the namespace ID and the first extended LBA, store the first system CRC in association with the first extended LBA in a local memory, and write the payload data, the first system CRC, and a truncated LBA derived from the first extended LBA to a memory. Other examples are also disclosed and claimed.
    Type: Application
    Filed: September 28, 2013
    Publication date: April 2, 2015
    Inventors: Knut Grimsrud, Jawad Khan, Richard Mangold
  • Patent number: 8769228
    Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: July 1, 2014
    Assignee: Intel Corporation
    Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
  • Patent number: 8312326
    Abstract: According to some embodiments, delta checkpoints are provided for a non-volatile memory indirection table to facilitate a recovery process after a power loss event.
    Type: Grant
    Filed: April 12, 2011
    Date of Patent: November 13, 2012
    Assignee: Intel Corporation
    Inventors: Robert J. Royer, Jr., Richard Mangold
  • Publication number: 20120159041
    Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
  • Publication number: 20110276827
    Abstract: According to some embodiments, delta checkpoints are provided for a non-volatile memory indirection table to facilitate a recovery process after a power loss event.
    Type: Application
    Filed: April 12, 2011
    Publication date: November 10, 2011
    Inventors: Robert J. Royer, JR., Richard Mangold
  • Patent number: 7925925
    Abstract: According to some embodiments, delta checkpoints are provided for a non-volatile memory indirection table to facilitate a recovery process after a power loss event.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: April 12, 2011
    Assignee: Intel Corporation
    Inventors: Robert J. Royer, Jr., Richard Mangold
  • Publication number: 20100169710
    Abstract: According to some embodiments, delta checkpoints are provided for a non-volatile memory indirection table to facilitate a recovery process after a power loss event.
    Type: Application
    Filed: December 30, 2008
    Publication date: July 1, 2010
    Inventors: Robert J. Royer, JR., Richard Mangold
  • Patent number: 7269744
    Abstract: A data safeguarding system, method, and article for safeguarding an encrypted data-stream transmitting on a first channel from a first system to a second system. The data-stream can be intertwined with other data-streams. The data-stream is arranged in fixed length sequential blocks, each block including a header portion and a payload portion. The first system places a flag marking in the header portion indicating that the payload includes a tag having at least one identifier for selecting the decryption keys from the first system. The second system reads the flag, and if the flag indicates a tag portion, reads the tag portion. The second system transmits the identifier to the first system on a second channel. The first system reads the identifier, retrieves the keys, and transmits the decryption keys to the second system on the second channel. The second system receives the decryption keys and decrypts the data block using the decryption keys.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: September 11, 2007
    Assignee: Intel Corporation
    Inventors: Keith Shippy, Jody Pfotenhauer, Richard Mangold
  • Publication number: 20060294339
    Abstract: Embodiments of abstracted dynamic addressing are generally described herein. Other embodiments may be described and claimed.
    Type: Application
    Filed: June 27, 2005
    Publication date: December 28, 2006
    Inventors: Sanjeev Trika, Robert Royer, John Garney, Richard Mangold
  • Publication number: 20060184938
    Abstract: A method, apparatus and system enable a virtual machine manager (“VMM”) to dynamically reassign memory from one virtual machine (“VM”) to another. The VMM may generate a message to the VM to which the memory is currently assigned and inform the device that the memory is shutting down. The current VM may thereafter copy the contents of the memory to the host hard disk and eject the memory. The VMM may then inform another VM that the memory is available, and the second VM may then add the memory to its available memory resources.
    Type: Application
    Filed: February 17, 2005
    Publication date: August 17, 2006
    Inventor: Richard Mangold
  • Publication number: 20050254645
    Abstract: A data safeguarding system, method, and article for safeguarding an encrypted data-stream transmitting on a first channel from a first system to a second system. The data-stream can be intertwined with other data-streams. The data-stream is arranged in fixed length sequential blocks, each block including a header portion and a payload portion. The first system places a flag marking in the header portion indicating that the payload includes a tag having at least one identifier for selecting the decryption keys from the first system. The second system reads the flag, and if the flag indicates a tag portion, reads the tag portion. The second system transmits the identifier to the first system on a second channel. The first system reads the identifier, retrieves the keys, and transmits the decryption keys to the second system on the second channel. The second system receives the decryption keys and decrypts the data block using the decryption keys.
    Type: Application
    Filed: June 21, 2005
    Publication date: November 17, 2005
    Inventors: Keith Shippy, Jody Pfotenhauer, Richard Mangold