By Using Cryptography (epo) Patents (Class 711/E12.092)
  • Patent number: 11916569
    Abstract: A flash memory storage management method includes: providing a flash memory module including single-level-cell (SLC) blocks and at least one multiple-level-cell block such as MLC block, TLC block, or QLC block; classifying data to be programmed into groups of data; respectively executing SLC programing and RAID-like error code encoding to generate corresponding parity check codes, to program the groups of data and corresponding parity check codes to the SLC blocks; when completing program of the SLC blocks, performing an internal copy to program the at least one multiple-level-cell block by sequentially reading and writing the groups of data and corresponding parity check codes from the SLC blocks to the multiple-level-cell block according to a storage order of the SLC blocks.
    Type: Grant
    Filed: February 22, 2022
    Date of Patent: February 27, 2024
    Assignee: Silicon Motion, Inc.
    Inventors: Tsung-Chieh Yang, Hong-Jung Hsu
  • Patent number: 11900997
    Abstract: Methods, systems, and devices for storing and reading data at a memory device are described. A memory device may utilize one or more storage states to store data within a data word. The memory device may exhibit higher data leakage or more power consumption when storing or reading a first storage state compared to storing or reading one or more other storage states. In some cases, the memory device may generate a second data word corresponding to a first data word by modifying each symbol type of the first data word to generate a different symbol type for the second data word. A memory device may reduce the occurrence of a storage state associated with large data leakage, or high-power consumption, or both. Further, the memory device may generate and store an indicator indicating the transformation of a corresponding data word.
    Type: Grant
    Filed: July 12, 2022
    Date of Patent: February 13, 2024
    Assignee: Micron Technology, Inc.
    Inventors: John F. Schreck, George B. Raad
  • Patent number: 11765181
    Abstract: A notification is received that a first user device and a second user device would like to share a data set. The data set is retrieved from a database. A first security level associated with the first user device and a second security level associated with the second user device is retrieved. The data set is provided to the first user device and the second user device in accordance with the first security level and the second security level.
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: September 19, 2023
    Assignee: United Services Automobile Association (USAA)
    Inventors: Cleburne Robinson Burgess, Richard Paul Proft, Jeffrey Alan Smith, Theron Daniel Smelser, Katherine Virginia Lamb, Shanna Ruth Limas
  • Patent number: 11687469
    Abstract: Devices and techniques are disclosed herein for verifying host generated physical addresses at a memory device during a host-resident FTL mode of operation to ameliorate erroneous or potentially malicious access to the memory device.
    Type: Grant
    Filed: January 14, 2022
    Date of Patent: June 27, 2023
    Assignee: Micron Technology, Inc.
    Inventor: David Aaron Palmer
  • Patent number: 11539509
    Abstract: Disclosed is a method and a system to execute the method to perform a first hashing operation to compute a first hash value, store the first hash value in a plurality of output registers, store a second message in a plurality of input registers, perform a first iteration of a second hashing operation, with an input to the second hashing operation including the second message and the first hash value, determine that a first portion of the second message, stored in a first register of the plurality of input registers, has been processed in course of the second hashing operation, and move a first portion of the first hash value stored in a first register of the plurality of output registers to the first register of the plurality of input registers.
    Type: Grant
    Filed: January 27, 2021
    Date of Patent: December 27, 2022
    Assignee: Cryptography Research, Inc.
    Inventors: Michael Hutter, Matthew Pond Baker
  • Patent number: 11392699
    Abstract: A device, method, and system for synthesizing variants of semantically equivalent computer source code using computer source code components to protect against cyberattacks. An input constraint, an output constraint, and a schema are received from a user. A component-based synthesizer generates first computer source code including a first computer source code component based on the input constraint, the output constraint, and the schema. The component-based synthesizer generates second computer source code including a second computer source code component based on the input constraint, the output constraint, and the schema. The second computer source code is generated as a semantically equivalent variant of the first computer source code to provide for protection against a cyberattack. The invention may also include a dynamic component library.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: July 19, 2022
    Assignee: United States of America as Represented by Secretary of the Navy
    Inventor: Stuart H. Rubin
  • Patent number: 11177954
    Abstract: An example system includes a secure processing engine. The secure processing engine is to store a host key. The system also includes an integrated circuit in a single package. The integrated circuit includes a firmware engine to execute firmware instructions. The integrated circuit also includes a one-time-programmable (OTP) memory unreadable by the firmware engine. The OTP memory is to store the host key. The integrated circuit also includes a security engine. The security engine is to encrypt and decrypt communications between the firmware engine and the secure processing engine based on the host key.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: November 16, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: John L McWilliams, Jefferson P Ward, Stephen D Panshin, Francisco Alcazar
  • Patent number: 10996969
    Abstract: A server computer toggles between a protected mode and an unprotected mode. In the protected mode, users are unable to access configuration information due to a Base Address Register (BAR) being cleared. However, a service provider can access a Trusted Platform Module (TPM) through an Application Program Interface (API) request. In an unprotected mode, the BAR is programmed so that users can access the configuration information, but the TPM is blocked. Blocking of the TPM is achieved by changing a configuration file, which changes an overall image of the card. With the modified image not matching an original image, the TPM blocks access to data, such as encryption keys. Separate interfaces can be used for user access (PCIe) and service provider access (Ethernet) to the server computer. The server computer can then be toggled back to the protected mode by switching the configuration file to the original configuration file.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: May 4, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Jason Alexander Harland, Matthew Shawn Wilson, Anthony Nicholas Liguori, Erez Tsidon
  • Patent number: 10972439
    Abstract: A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client computing device has a secure and approved version of content player software implemented for consuming downloaded copyright media content. With this technique, copyright media content providers are able to ensure that only secure and approved content players are implemented to access the content.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: April 6, 2021
    Assignee: NETFLIX, INC.
    Inventors: James Mitch Zollinger, Filip Paun
  • Patent number: 10693641
    Abstract: Systems and methods for maintaining encryption keys are disclosed. An encrypted master key is determined by encrypting a master key based on an initial user password and discarding the master key. The encrypted master key is stored. A request for the master key including a present user password is received and verified based on comparison to the initial user password. Based on failure of verifying the present user password, a failed attempt counter that is maintained within a secure container is created. User password based access to the master key is locked out based on the failed attempt counter exceeding a defined value.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: June 23, 2020
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Catalin Visinescu
  • Patent number: 10692335
    Abstract: Methods, systems, and devices are described for displaying information on a visual display of a data storage device. The device may be an internal data storage device and may display information associated with various operation parameters and a security confidence metric or states of the data storage device. The data storage device may display, on the visual display, an indication of a security confidence metric of the data storage device indicative of whether the data storage device has been compromised. The data storage device may be compromised by having one or more sub-components replaced, altered, or misused. The visual display may be electronic paper, mechanical, or chemical such that the information is displayed without power being applied to the data storage device. The visual display may be removable from the data storage medium.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: June 23, 2020
    Assignee: Seagate Technology LLC
    Inventor: Aliasghar Riahi
  • Patent number: 10430314
    Abstract: In one embodiment, a request may be received to load firmware on a microcontroller of a device. A firmware transfer may be initiated to load the firmware on the microcontroller. Data traffic may be monitored at one or more locations on a communication path associated with the firmware transfer. It may be determined whether the data traffic matches a digital fingerprint associated with the firmware.
    Type: Grant
    Filed: December 23, 2016
    Date of Patent: October 1, 2019
    Assignee: Intel Corporation
    Inventors: Lakshminarayana Pappu, Hem Vasant Doshi, Baruch Schnarch
  • Patent number: 10223290
    Abstract: The present invention concerns a method of protecting sensitive data, and a corresponding computing system processing device, comprising: entering, by a processing device, a sensitive date access mode in-which sensitive data is accessible; restricting, by a program running in the sensitive data access mode, one or more accessible address ranges for a non-secure function, and calling, from the sensitive data access mode, the non-secure function; and entering, by the processing device, a further operating mode to execute the non-secure function during which the processing device has access to only the one or more accessible address ranges.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: March 5, 2019
    Assignee: Dolphin Integration
    Inventors: Gilles Depeyrot, Olivier Monfort
  • Patent number: 10223317
    Abstract: The following description is directed to a configurable logic platform. In one example, a configurable logic platform includes host logic and a reconfigurable logic region. The reconfigurable logic region can include logic blocks that are configurable to implement application logic. The host logic can be used for encapsulating the reconfigurable logic region. The host logic can include a host interface for communicating with a processor. The host logic can include a management function accessible via the host interface. The management function can be adapted to cause the reconfigurable logic region to be configured with the application logic in response to an authorized request from the host interface. The host logic can include a data path function accessible via the host interface. The data path function can include a layer for formatting data transfers between the host interface and the application logic.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: March 5, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Islam Atta, Christopher Joseph Pettey, Asif Khan, Robert Michael Johnson, Mark Bradley Davis, Erez Izenberg, Nafea Bshara, Kypros Constantinides
  • Patent number: 9916477
    Abstract: A relatively small amount of programmable logic may be included in a mostly ASIC device such that the programmable logic can be used as a substitute for a fault-infected ASIC block. This substitution may occur permanently or temporarily. When an ASIC block is temporarily substituted, faulty outputs of the ASIC block are disabled just at the time they would otherwise propagate an error. The operations of the temporarily deactivated ASIC block(s) may be substituted for by appropriately programmed programmable logic. Thus, a fault-infected ASIC block that operates improperly 1% of the time can continue to be gainfully used for the 99% of the time when its operations are fault free. This substitution can be activated in various stages of the ASIC block's life including after: initial design; pilot production; and mass production. This provides for cost saving and faster time-to-market, repair, and maintenance even years after installation and use.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: March 13, 2018
    Assignee: Sheyu Group, LLC
    Inventor: James T. Koo
  • Patent number: 9886264
    Abstract: A method for upgrading firmware in a device, includes: when firmware of a first chip in the device needs to be upgraded, identifying a first partition of a flash memory in a second chip in the device, the first partition being a backup partition for downloading firmware of the second chip; downloading new firmware of the first chip to the first partition of the flash memory in the second chip; and copying the new firmware of the first chip from the first partition of the flash memory in the second chip to an effective region in the first chip.
    Type: Grant
    Filed: September 1, 2015
    Date of Patent: February 6, 2018
    Assignee: Xiaomi Inc.
    Inventors: Deguo Meng, Xin Liu, Enxing Hou
  • Patent number: 9866553
    Abstract: The invention relates to a method for securing access to a computer device, that includes the step of establishing a secured connection and authentication of said computer device and the user of the computer device with a remote server, wherein the steps of establishing the secured connection and authentication are carried out upon the execution of commands included in a data set adapted for implementing the pre-start of the computer device before triggering the execution of the boot loader of the computer device operating system.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: January 9, 2018
    Assignee: TOUCAN SYSTEM
    Inventors: Jonathan Brossard, Nicolas Massaviol
  • Patent number: 9846789
    Abstract: An apparatus includes a memory to store a secure object comprising at least one of code and data that is encrypted when stored in the memory and a central processing unit (CPU) that is capable of executing an EnterSecureMode (esm) instruction that enables the decryption of the secure object's information when the secure object information is retrieved from the memory into the CPU. The CPU further comprises a feature to protect the secure object from code received from other software.
    Type: Grant
    Filed: September 6, 2011
    Date of Patent: December 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard H. Boivie, Dimitrios Pendarakis
  • Patent number: 9686248
    Abstract: Systems and methods used to securely communicate a shared key to devices.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: June 20, 2017
    Assignee: Micron Technology, Inc.
    Inventor: Lance Walker Dover
  • Patent number: 9594699
    Abstract: Various systems and methods for implementing additional security in a flashless modem are described herein. A modem system for implementing additional security in a flashless modem, the modem system comprising: local storage; non-volatile random access memory (NVRAM); and an access control module to: read non-volatile memory data (NVM data) from the local storage; calculate a hash of the NVM data; access a previously-stored hash; compare the hash of the NVM data with the previously-stored hash to produce a comparison; and control access to the NVM data based on the comparison.
    Type: Grant
    Filed: March 20, 2015
    Date of Patent: March 14, 2017
    Assignee: Intel Corporation
    Inventors: Carsten Pedersen, Rasmus Jensen
  • Patent number: 9331989
    Abstract: Systems and methods used to securely communicate a shared key to devices.
    Type: Grant
    Filed: October 6, 2014
    Date of Patent: May 3, 2016
    Assignee: Micron Technology, Inc.
    Inventor: Lance Walker Dover
  • Patent number: 8918610
    Abstract: A chip including a processor for performing a predetermined operation, a provider for providing a clock signal, with which the processor is clocked, a counter for decrementing or incrementing a count based on the clock signal, a monitor for signaling the predetermined operation to be prevented, depending on the count, and a non-volatile storage for non-volatily storing the count.
    Type: Grant
    Filed: December 8, 2004
    Date of Patent: December 23, 2014
    Assignee: Infineon Technologies AG
    Inventor: Peter Laackmann
  • Patent number: 8909942
    Abstract: A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be prevented without having to erase or modify such data. An encryption key, or data used to generate the encryption key, is stored in an MRAM module integrated within the data storage system. The data storage system uses the encryption key to encrypt data received from a host system, and to decrypt the encrypted data when it is subsequently read by a host system. To render the stored data inaccessible, an operator (or an automated process) can expose the MRAM module to a magnetic field of sufficient strength to erase key data therefrom.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: December 9, 2014
    Assignee: Western Digital Technologies, Inc.
    Inventors: Dmitry S. Obukhov, Afshin Latifi, Justin Jones
  • Patent number: 8856552
    Abstract: A method begins by a processing module dispersed storage error encoding data to produce a set of encoded data slices and generating a transaction identifier regarding storage of the set of encoded data slices. The method continues with the processing module outputting a plurality of write request messages to a plurality of dispersed storage (DS) units, wherein each of the plurality of write request messages includes the transaction identifier and a corresponding one of the set of encoded data slices. The method continues with the processing module receiving write response messages from at least some of the DS units, wherein each of the write response messages includes a reference to the transaction identifier. The method continues with the processing module updating directory information regarding storage of the data to produce updated directory information when at least a write threshold number of the write response messages have been received.
    Type: Grant
    Filed: October 13, 2010
    Date of Patent: October 7, 2014
    Assignee: Cleversafe, Inc.
    Inventors: Greg Dhuse, Andrew Baptist, Wesley Leggette, Ilya Volvovski, Jason K. Resch, Bart Cilfone
  • Publication number: 20140136807
    Abstract: A method and system for secure access to data files copied onto a second storage device from a first storage device. A computer receives data from a first storage device that is in communication with the computer. A data file is stored to a second storage device. A passkey is generated and associated with the data file. A passkey image file corresponding to the passkey is generated. The passkey image file is transmitted to the first storage device for storage. Subsequent access to the data file on the second storage device requires entry of the passkey. The passkey is only accessible to a user that has access to read the passkey image file on the first storage device.
    Type: Application
    Filed: November 15, 2012
    Publication date: May 15, 2014
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: William J. Brown, James M. Hunter
  • Patent number: 8719528
    Abstract: A storage device in which file data is divided into multiple blocks for storage on a recording medium is provided. The storage device includes an additional data storing section for storing additional data to be recorded on the recording medium in association with the data to be written, a position determining section for determining recording positions on the recording medium where the blocks should be respectively written, based on the additional data, and a block writing section for writing the respective blocks on the recording positions on the recording medium determined by the recording position determining section. The additional data this defines a gap length between blocks of recorded data. During a read operation, if the gap length does not comport with the additional data, then an error is assumed.
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: May 6, 2014
    Assignee: International Business Machines Corporation
    Inventors: Tomoaki Kimura, Satoshi Tohji
  • Publication number: 20140101455
    Abstract: A method and controller for implementing dynamic banding of a storage device, such as a Self Encrypting Device (SED) in a data storage array, and a design structure on which the subject controller circuit resides are provided. The controller dynamically identifies band boundaries for the storage device at the time a data storage array is created, when one or more devices are added into an existing data storage array, and when a replacement device is rebuilt into an exposed array, or an array with a failed device. A storage device band definition is provided based upon the dynamically identified band boundaries for the storage device.
    Type: Application
    Filed: October 8, 2012
    Publication date: April 10, 2014
    Applicant: International Business Machines Corporation
    Inventors: Scott A. Bauman, Joseph R. Edwards, Michael S. Faunce, Robert E. Galbraith, David R. Kahler, Karl A. Nielsen, Michael T. Roble, Mark Yadlosky, Michael J. Anderson
  • Publication number: 20140082372
    Abstract: A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the magnetic memory device has parameter memory that maintains a protected zone used to store protected zone parameters, and an authentication zone used to store authentication parameters, the protection zone parameters and the authentication parameters being associated with the data that requires authentication. Upon modification of any of the parameters stored in the parameter memory by a user, a corresponding location of the parameter area of the main memory is also modified.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 20, 2014
    Applicant: AVALANCHE TECHNOLOGY, INC.
    Inventors: Siamack Nemazie, Ngon Van Le
  • Publication number: 20140082374
    Abstract: A mobile device includes an application processor, an RF modem for connection to cellular networks, wireless device for connection to wireless networks, a display coupled to the application processor, audio devices coupled to the application processor, power management for providing power through a main battery; and charging the battery, a hybrid memory including a magnetic memory, the magnetic memory further including a parameter area configured to store parameters used to authenticate access to certain areas of the main memory, and a parameter memory that maintains a first area, used to store protected zone parameters, and a second area used to store authentication parameters, the protection zone parameters and the authentication parameters being associated with access to the certain areas in the main memory that requires authentication. Upon modification of any of the parameters stored in the parameter memory by a user, a corresponding location of the parameter area of the main memory is also modified.
    Type: Application
    Filed: September 28, 2012
    Publication date: March 20, 2014
    Applicant: AVALANCHE TECHNOLOGY, INC.
    Inventors: Siamack Nemazie, NGON VAN LE
  • Publication number: 20130305060
    Abstract: Multiple revisions of an encoded data slice are generated, with each revision having the same slice name. Each of the data slices represents the same original data portion, but each is encoded so that no single data slice can be used to reconstruct the original data portion. Appropriate revision numbers are associated with each encoded data slice, and the encoded data slices and associated revision numbers are transmitted for storage in selected storage units of a distributed storage network. If write confirmations are received from at least a write threshold number of storage units, a commit command is transmitted so that the most recently written data slices will be available for access. After a commit command is issued, a current directory used to access the encoded data slices can be sliced, encoded, and stored in the same way as the data slices.
    Type: Application
    Filed: July 16, 2010
    Publication date: November 14, 2013
    Applicant: CLEVERSAFE, INC.
    Inventors: Jason K. Resch, Greg Dhuse, Ilya Volvovski, Andrew Baptist
  • Patent number: 8583880
    Abstract: A method for secure data reading and a data handling system is provided. The method protects the data reading from fault attacks by repeating read request in an interleaved manner, in particular the method comprises the steps of (M200) dispatching a first read request; (M400) dispatching a second read request; (M600) dispatching a further first read request; and (M1000-a) producing an anomaly signal if a first result produced by the memory in response to the first read request does not agree with a further first result produced by the memory in response to the further first read request.
    Type: Grant
    Filed: April 29, 2009
    Date of Patent: November 12, 2013
    Assignee: NXP B.V.
    Inventors: Mathias Wagner, Ralf Malzahn
  • Publication number: 20130297857
    Abstract: A method and system are disclosed for allowing access to processing resources of one or more idle memory devices to an active memory device is disclosed, where the idle and active memory devices are associated with a common host. The resources shared may be processing power, for example in the form of using a processor of an idle memory to handle some of the logical-to-physical mapping associated with a host command, or may be other resources such as RAM sharing so that a first memory has expanded RAM capacity. The method may include exchanging tokens with resource sharing abilities, operation codes and associated data relevant to the requested resources.
    Type: Application
    Filed: October 23, 2012
    Publication date: November 7, 2013
    Inventor: Rotem Sela
  • Publication number: 20130290602
    Abstract: A data storage device includes a memory, a controller, a first module, a first interface, and a second interface. The first interface and the second interface are coupled to the controller. The controller is used to access data in the memory, the first module is used to perform a first predetermined function. The second interface is inaccessible to the first module. The first interface may gain access to at least one additional module in the data storage device to perform at least one additional predetermined function which the second interface may not gain access to and may not perform.
    Type: Application
    Filed: April 27, 2012
    Publication date: October 31, 2013
    Inventor: Ming-Ju Chu
  • Publication number: 20130282951
    Abstract: Disclosed are systems, methods and computer program products for secure rebooting and debugging a peripheral subsystem of a system on a chip (SoC) device. According to one aspect of the method, when an application processor of the SoC device detects crash of the peripheral subsystem, the application processor loads a secure boot agent into SoC memory. The secure boot agent is configured to access a secure memory region of the peripheral subsystem containing memory dump data associated with the peripheral subsystem. The secure memory region is inaccessible to the application processor. The Secure boot agent encrypts the memory dump data in the secure memory region and opens the secure memory region for access to the application processor. The application processor accesses the secure memory region and collects the encrypted memory dump data. The application processor then forwards the encrypted memory dump data to a third party for debugging purposes.
    Type: Application
    Filed: June 27, 2012
    Publication date: October 24, 2013
    Applicant: QUALCOMM Incorporated
    Inventors: Tom TsoWei Kuo, Azzedine Touzni
  • Patent number: 8560765
    Abstract: Various embodiments of the present invention provide systems, methods and circuits for use of a memory system. As one example, an electronics system is disclosed that includes a memory bank, a memory access controller circuit, and an encoding circuit. The memory bank includes a plurality of multi-bit memory cells that each is operable to hold at least two bits. The memory access controller circuit is operable to determine a use frequency of a data set maintained in the memory bank. The encoding circuit is operable to encode the data set to yield an encoded output for writing to the memory bank. The encoding level for the data set is selected based at least in part on the use frequency of the data set.
    Type: Grant
    Filed: March 2, 2010
    Date of Patent: October 15, 2013
    Assignee: LSI Corporation
    Inventor: Robert W. Warren
  • Publication number: 20130268740
    Abstract: An object storage system providing a secure object destruction and deletion service is provided. The destruction and deletion of files can be handled through secure overwriting of files on a storage medium or through cryptographic scrambling of file contents followed by subsequent deletion from a file table. The triggering of secure deletion can be periodically scheduled or dependent upon some particular event, making files self-destructing. Methods and systems for periodic re-authorization of files are also provided, allowing self-destructing files to be persisted in an available state.
    Type: Application
    Filed: April 4, 2012
    Publication date: October 10, 2013
    Applicant: Rackspace US, Inc.
    Inventor: Gregory Holt
  • Publication number: 20130246732
    Abstract: A method of programming memory cells for a rewritable non-volatile memory module is provided. The method includes: receiving a command which indicates performing an update operation to a logical page; and identifying valid logical access addresses and invalid logical access addresses in the logical page according to the command. The method also includes: selecting a physical page; setting flags corresponding to the valid logical access addresses in a valid state, setting flags corresponding to the invalid logical access in an invalid state; programming the flags and data belonging to the valid logical access addresses to the selected physical page based on the update operation; and mapping the selected physical page to the logical page. Accordingly, the method can effectively increase the speed of programming the memory cells.
    Type: Application
    Filed: June 21, 2012
    Publication date: September 19, 2013
    Applicant: PHISON ELECTRONICS CORP.
    Inventors: Kian-Fui Seng, Ming-Hui Tseng, Ching-Hsien Wang
  • Patent number: 8539181
    Abstract: A storage device in which file data is divided into multiple blocks for storage on a recording medium. The storage device includes an additional data storing section for storing additional data to be recorded on the recording medium in association with the data to be written, a position determining section for determining recording positions on the recording medium where the blocks should be respectively written, based on the additional data, and a block writing section for writing the respective blocks on the recording positions on the recording medium determined by the recording position determining section. The additional data thus defines a gap length between blocks of recorded data. During a read operation, if the gap length does not comport with the additional data, then an error is assumed.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: September 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Tomoaki Kimura, Satoshi Tohji
  • Patent number: 8510505
    Abstract: A method and apparatus for a virtual storage device is provided. In one example, data to be stored at a removable storage device is received. A virtual storage agent is executed on the removable storage device. An interlace is established with at least one remote storage location. The data is stored at the at least one remote storage location. In another example, a request to access data associated with a removable storage device is received. A virtual storage agent on the removable storage device is executed. An interface is established with at least one remote storage location. The data is fetched from the at least one remote storage location.
    Type: Grant
    Filed: March 2, 2007
    Date of Patent: August 13, 2013
    Assignee: Symantec Corporation
    Inventors: Hans van Reitschote, Tommi Salli, C W Hobbs
  • Patent number: 8478933
    Abstract: A method, computer management apparatus, and computer program product are provided for processing data stored on a sequential storage media within a computational computing environment. A block reference table and most often read blocks are loaded from a modified tape format of a sequential storage media into an internal memory of a sequential storage media device. During write command processing, a data deduplication procedure is performed using a modified block reference table. It is determined if entries from the block reference table must be deleted and responsive to this identifying and deleting host block and device block entries from the block reference table.
    Type: Grant
    Filed: October 11, 2010
    Date of Patent: July 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Nils Haustein, Stefan Neff, Ulf Troppens
  • Publication number: 20130166922
    Abstract: When content, such as premium video or audio, is decoded, the content is stored in protected memory segments. Read access to the protected memory segments from a component not in a frame buffer protected (FBP) mode is blocked by a memory controller. The memory controller also blocks components in the FBP mode from writing to unprotected memory segments. The content may be processed by a processing engine operating in the FBP mode and may only be written back to protected memory segments. The memory segment may later be marked as unprotected if the memory segment is no longer needed. If the content is encrypted in protected memory, the encrypting key associated with the memory segment may be removed. If the content is stored in the clear, the protected memory segments are scrubbed before releasing the segments for use as unprotected memory segments.
    Type: Application
    Filed: August 30, 2012
    Publication date: June 27, 2013
    Applicants: ATI TECHNOLOGIES ULC, ADVANCED MICRO DEVICES, INC.
    Inventors: Daniel W. Wong, Warren Fritz Kruger, David I.J. Glen, Gongxian J. Cheng
  • Publication number: 20130166833
    Abstract: An electronic apparatus is provided, which includes a central processing unit (CPU), a first memory unit which performs communication with the CPU, and a second memory unit which stores therein conditional access system (CAS) software and platform software. According to the method of controlling the apparatus, upon booting, the CPU copies the CAS software to an internal memory area which may be within the CPU, copies the platform software to the first memory unit and executes the CAS and platform software, and executes CAS operations through communication between the CAS software and the platform software.
    Type: Application
    Filed: September 14, 2012
    Publication date: June 27, 2013
    Applicant: SAMSUNG ELECTRONICS CO., LTD.
    Inventor: Myung-sik CHOI
  • Patent number: 8468368
    Abstract: A method begins with a processing module obtaining encoded key slices from a plurality of user devices and decoding a threshold number of the encoded key slices utilizing a first error coding dispersal storage function to produce a key when the threshold number of the encoded key slices has been obtained. The method continues with the processing module receiving encoded data slices and decoding a threshold number of encoded data slices utilizing a second error coding dispersal storage function to produce encrypted data when the threshold number of the encoded data slices has been received. The method continues with the processing module decrypting the encrypted data utilizing the key and an encryption function to produce data.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: June 18, 2013
    Assignee: Cleversafe, Inc.
    Inventors: S. Christopher Gladwin, Kumar Abhijeet, Greg Dhuse, Jason K. Resch
  • Patent number: 8458416
    Abstract: Various embodiments of the present invention provide systems and methods for selecting data encoding. As an example, some embodiments of the present invention provide methods that include receiving a data set to be written to a plurality of multi-bit memory cells that are each operable to hold at least two bits. In addition, the methods include determining a characteristic of the data set, and encoding the data set. The level of encoding is selected based at least in part on the characteristic of the data set. In some instances of the aforementioned embodiments, the characteristic of the data set indicates an expected frequency of access of the data set from the plurality of multi-bit memory cells.
    Type: Grant
    Filed: January 22, 2010
    Date of Patent: June 4, 2013
    Assignee: LSI Corporation
    Inventors: Robert W. Warren, Robb Mankin
  • Publication number: 20130124877
    Abstract: A communication equipment, method and storage device cooperate to assist in connecting a storage device between different devices. The equipment includes an interface configured to be electrically connected to information terminal equipment. It also includes a communication mechanism that performs communication with storage equipment that has a region assigned to the communication equipment. It further includes a controller that transmits device class information indicating that the communication equipment is of a mass storage class to information terminal equipment in response to the communication equipment being connected to the information terminal equipment via the interface.
    Type: Application
    Filed: November 13, 2012
    Publication date: May 16, 2013
    Applicant: Buffalo Inc.
    Inventor: Buffalo Inc.
  • Publication number: 20130086394
    Abstract: A storage system in which a storage control apparatus writes data in each of divided areas defined by division of one or more storage areas in one or more storage devices, after encryption of the data with an encryption key unique to each divided area. When the storage control apparatus receives, from a management apparatus, designation of one or more of the divided areas allocated as one or more physical storage areas for a virtual storage area to be invalidated and an instruction to invalidate data stored in the one or more of the divided areas, the storage control apparatus invalidates one or more encryption keys associated with the designated one or more of the divided areas. In addition, the storage control apparatus may further overwrite at least part of the designated one or more of the divided areas with initialization data for data erasion.
    Type: Application
    Filed: September 5, 2012
    Publication date: April 4, 2013
    Applicant: FUJITSU LIMITED
    Inventor: Masaru SHIMMITSU
  • Publication number: 20130054979
    Abstract: To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned.
    Type: Application
    Filed: August 30, 2011
    Publication date: February 28, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Innokentiy Basmov, Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. MacIver, Donghui Li
  • Publication number: 20130007365
    Abstract: The approach is for protecting a solid state memory including a microprocessor. The microprocessor controls the requests for access to the physical blocks of the memory and transfers one or more requested files from a requesting device only subsequently to a comparison of a predetermined sequence of requests for access to the physical blocks. The predetermined sequence of requests for access to physical blocks corresponds to a predetermined sequence of requests for access to file(s) of the memory that can be selected by the device. If the sequence of requests for access does not occur, the microprocessor does not transfer the data requested or transfers them in a non readable format, for example in cryptographic form.
    Type: Application
    Filed: June 25, 2012
    Publication date: January 3, 2013
    Applicant: STMicroelectronics S.r.l.
    Inventor: Francesco VARONE
  • Publication number: 20130007393
    Abstract: According to one embodiment, a memory device includes a semiconductor memory, a memory controller which controls the semiconductor memory according to a request from outside the device, a radio section for wireless communication, and a controller. The controller manages storing data in the device according to a procedure for protecting copyright, obtains the latest version of a parameter for protecting copyright which can be updated from outside the device via the radio section, includes a comparator which compares the parameter stored in the device with the latest version of the parameter, and includes an update manager which updates the stored parameter to the latest version of the parameter when they are different.
    Type: Application
    Filed: March 20, 2012
    Publication date: January 3, 2013
    Inventor: Daisuke Taki
  • Patent number: 8332604
    Abstract: Embodiments of methods to securely bind a disk cache encryption key to a cache device are generally described herein. Other embodiments may be described and claimed.
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: December 11, 2012
    Assignee: Intel Corporation
    Inventors: Richard P. Mangold, Debra Hensgen, Sanjeev N. Trika