Patent classifications
G06F3/0637
Transactional lock elision with delayed lock checking
A computer-implemented method includes the following operations. A transactional lock elision transaction including a critical section is executed. The critical section is processed. After the processing of the critical section and prior to a commit point in the transactional lock elision transaction, a status of a lock is checked. Responsive to a determination that a status of the lock is free, a result of the transactional lock elision transaction is committed.
Expandable memory for use with solid state systems and devices
The present disclosure describes technologies and techniques for use by a data storage controller—such as a controller for use with a NAND or other non-volatile memory (NVM)—to provide a user-expandable memory space. In examples described herein, a customer may choose to purchase access to only a portion of the total available memory space of a consumer device, such as a smartphone. Later, the customer may expand the user-accessible memory space. In one example, the customer submits suitable payment via a communication network to a centralized authorization server, which returns an unlock key. Components within the data storage controller of the consumer device then use the key to unlock additional memory space within the device. In this manner, if the initial amount of memory the consumer paid for becomes full, the consumer may conveniently expand the amount of user-accessible memory.
Memory system
A memory system includes a nonvolatile memory including user areas, a volatile memory, a battery, and a controller configured to, when the volatile memory maintains first information indicating an access to a user area is permitted and a verification value upon startup of the system, determine whether the information is validated by the value, and upon determining that the information is validated, permit an access to the user area and prohibit the access to any other area, and when the volatile memory does not maintain the information and value, or the information is not validated, prohibit an access to any user area, and thereafter, upon receipt of a command and authentication information from the host, permit an access to the user area requested by the command, and generate and store in the volatile memory the information and the value for validating the generated information.
ENCRYPTED USB FLASH DISK SYSTEM AND IMPLEMENTATION METHOD THEREFOR
An implementation method for an encrypted USB flash disk system. A virtual drive letter is bound to an device object and then mapped; driver software wafts for an operation of an operating system on the device object; the driver software determines, according to the operation of the operating system on different device objects, the type of a received instruction; if the received instruction is a reading instruction, the driver software maps a read address in a storage chip according to a first address in the reading instruction, reads data, and calls an encryption lock chip to decrypt the read data to obtain decrypted read data; and if the received instruction is a writing instruction, the driver software calls the encryption lock chip to encrypt data to be written to obtain encrypted write data, maps a write address in the storage chip according to a second address in the writing instruction, and writes the encrypted write data or refuses the operation. The present invention can encrypt and store data and decrypt and read data, thereby ensuring the safety of data reading and writing, and can also use the encrypted USB flash disk as an optical disk for data reading and writing.
METHOD AND SYSTEM FOR MAPPING DATA PROTECTION POLICIES TO DATA CLUSTERS
Techniques described herein relate to a method for managing data protection services for data clusters. The method includes identifying, by a mapping module of a data protection manager, a first discovery event associated with a first data cluster; in response to identifying the first discovery event: obtaining first data cluster topology information associated with the first data cluster from the first data cluster; obtaining data cluster data protection information from a data cluster data protection information repository; mapping first protection policies to the first data cluster using the first data cluster topology information and the data cluster data protection information; updating data cluster topology information protection policy mappings using the using the first data cluster topology information and the data cluster data protection information; and initiating performance of first data protection services for the first data cluster based on the first mapped protection policies.
STORAGE DEVICE FOR AUTONOMOUS DRIVING AND OPERATING METHOD THEREOF
A storage device includes a nonvolatile memory including a memory cell array and a storage controller configured to receive event data and sensing data from an external device, and store the sensing data in different areas of the memory cell array based on the event data. The memory cell array includes a first memory area configured to store first sensing data from among the sensing data, the first sensing data being associated with a preset event and a second memory area configured to store second sensing data from among the sensing data, the second sensing data being associated with a current event not corresponding to the preset event. A first number of bits stored in each of first memory cells included in the first memory area may be less than a second number of bits stored in each of second memory cells included in the second memory area.
AUTOMATIC DERIVATION OF REPOSITORY ACCESS DATA BASED ON SYMBOLIC CONFIGURATION
A method comprises storing an electronic configuration document that identifies configurations of users, groups, and/or permissions relating to access to computer program artifacts in a first repository of an artifact repository system that is geographically distributed. The users and groups include external user groups who do not have explicit user-based permissions to view contents of a repository of the artifact repository system. The artifact repository system comprise second repositories that respectively replicate third repositories and have associated sets of properties, the third repositories including a repository external to the artifact repository system and associated with an external user group. The configurations comprise at least one configuration for configuring external visibility of computer program artifacts for one or more external user groups. The method further comprises deriving from the electronic configuration document, a plurality of regional repository settings values for each second repository based on the associated set of properties.
Logical storage device access in an encrypted storage environment
A method comprises associating a first logical storage device with a first host device, wherein data encrypted using a private key of the first host device is written to the first logical storage device, generating a copy of the first logical storage device, associating the copy of the first logical storage device with a second logical storage device, wherein data encrypted using a private key of a second host device is written to the second logical storage device, and providing the second host device with access to an encrypted version of a public key of the first host device, encrypted using a public key of the second host device, to allow the second host device to obtain the public key of the first host device. The second host device can thereby access particular data of the second logical storage device written using the private key of the first host device.
Storage device including memory controller, and non-volatile memory system including the same and operating method thereof
A storage device is configured to be connected to a host device via a physical cable which includes a power line and a data line. The storage device includes a non-volatile memory, a data path controller configured to temporarily deactivate the data line while power is supplied from the host device via the power line, and a memory controller. The memory controller includes a biometric module configured to receive biometric data and perform user authentication based on the biometric data; a biometric processing circuit configured to change a state of the memory controller, based on a result of the user authentication; and a data processing circuit configured to encrypt and decrypt data. The data path controller is configured to temporarily deactivate the data line in response to the changed state of the memory controller.
STORAGE DEVICE AND HOST FOR THE SAME
A storage device includes a storage device communicably connected to a host; a nonvolatile memory configured to store calibration data of the host; and a calibration circuit configured to receive a descriptor from the host including the setting information and update the calibration data with the received setting information.