G06F2212/171

Key fob with novel electro-mechanical means for key / phone locator applications
09614953 · 2017-04-04 ·

The invention is a novel keychain attachment (or key fob) that will be useful for communicating with a smart phone via Bluetooth. These devices, which are currently available commercially, are used for locating the owner's keys by emitting an audible sound when the owner touches a button on his/her cell phone. Such a device can also be used for locating the owner's phone by conversely sending a signal that will make the phone emit an audible sound. Because those devices are typically small and must include a tactile button, it is not currently possible to manufacture such a device in the form of an ornamental figure, such as an animal, a cartoon character, etc. This invention introduces a novel electromechanical mechanism for activating the required wireless functions in the key fob, while allowing the device to be manufactured in the shape of an attractive ornamental figure.

Data storage device management system

Devices and techniques are disclosed wherein an end user can remotely trigger direct data management activities of a data storage device (DSD), such as creating a data snapshot, resetting a snapshot, and setting permissions at the DSD via a remote mobile device app interface.

Method and apparatus for accessing data stored in a storage system that includes both a final level of cache and a main memory
09594693 · 2017-03-14 · ·

A data access system including a storage drive, processor and cache module. The processor, in response to data required by the processor not being cached within one or more levels of cache of the processor, generates a first physical address (PA). The cache module includes a memory and first and second controllers. The memory is a final level of cache. The first controller converts the first PA into a virtual address. The second controller: converts the virtual address into a second PA; based on the second PA, determines whether the data is cached within the memory; and if the data is cached, accesses and forwards the data to the processor. The first or second controller determines whether a cache miss has occurred and, in response to a cache miss and based on the second PA or a third PA of the storage drive, retrieves the data from the storage drive.

Adaptive application caching for mobile devices

A method for pre-loading contents in a cache of a mobile terminal, and a mobile terminal using the method, are provided. The method includes determining specific contents for pre-loading, determining circumstances for pre-loading the specific contents, and monitoring circumstances of the mobile terminal. If the circumstances for pre-loading are detected, the method determines whether the specific contents are already present in cache, and if the specific contents are not present in cache, loads the specific contents into the cache when the circumstances for pre-loading are detected.

APPARATUS AND METHOD TO SHARE HOST SYSTEM RAM WITH MASS STORAGE MEMORY RAM
20170046067 · 2017-02-16 ·

A method includes, in one non-limiting embodiment, sending a request from a mass memory storage device to a host device, the request being one to allocate memory in the host device; writing data from the mass memory storage device to allocated memory of the host device; and subsequently reading the data from the allocated memory to the mass memory storage device. The memory may be embodied as flash memory, and the data may be related to a file system stored in the flash memory. The method enables the mass memory storage device to extend its internal volatile RAM to include RAM of the host device, enabling the internal RAM to be powered off while preserving data and context stored in the internal RAM.

Secure garbage collection on a mobile device

Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.

Memory system and method of operating thereof, storage medium and memory controller
12282435 · 2025-04-22 · ·

According to one aspect of the present disclosure, a memory system is provided. The memory system may include at least one non-volatile memory device and a memory controller coupled to the at least one non-volatile memory device. A multi-level mapping table may be stored in the memory device. The multi-level mapping table may be configured to implement mapping from a logical address to a physical address. The memory controller may include a buffer. A portion of the multi-level mapping table may be stored in the buffer. The memory controller may be configured to perform a random read operation on the data stored in the memory device. In response to a random read range corresponding to the random read operation meeting a preset condition, the memory controller may be configured to adjust capacity for storing different levels of mapping tables in the buffer.

Storage device predicting access and reproducing data
12367149 · 2025-07-22 · ·

A storage device comprising a nonvolatile memory device, and a storage controller configured to control the nonvolatile memory device wherein the storage controller is configured to, detect a logical address pattern repeatedly requested by a host, divide the logical address pattern into input logical addresses and predictive logical addresses, and generate a reproduction model for generating reproduction data corresponding to the predictive logical addresses in the data pattern when the predictive logical addresses are input using machine learning, and in response to a read request for the input logical addresses from the host, predict the predictive logical addresses using the input logical addresses, generate the reproduction data by inputting the predictive logical addresses into the reproduction model, and prefetch the generated reproduction data to a buffer memory included in the storage controller.

Apparatus and method to share host system RAM with mass storage memory RAM

A method includes, in one non-limiting embodiment, sending a request from a mass memory storage device to a host device, the request being one to allocate memory in the host device; writing data from the mass memory storage device to allocated memory of the host device; and subsequently reading the data from the allocated memory to the mass memory storage device. The memory may be embodied as flash memory, and the data may be related to a file system stored in the flash memory. The method enables the mass memory storage device to extend its internal volatile RAM to include RAM of the host device, enabling the internal RAM to be powered off while preserving data and context stored in the internal RAM.

APPARATUS AND METHOD TO SHARE HOST SYSTEM RAM WITH MASS STORAGE MEMORY RAM

A method includes, in one non-limiting embodiment, sending a request from a mass memory storage device to a host device, the request being one to allocate memory in the host device; writing data from the mass memory storage device to allocated memory of the host device; and subsequently reading the data from the allocated memory to the mass memory storage device. The memory may be embodied as flash memory, and the data may be related to a file system stored in the flash memory. The method enables the mass memory storage device to extend its internal volatile RAM to include RAM of the host device, enabling the internal RAM to be powered off while preserving data and context stored in the internal RAM.