G06F3/0652

Self-learning file transmitting, data reading and writing, app communication reading and writing methods of game handle
11704045 · 2023-07-18 · ·

The present application discloses self-learning file transmitting, data reading and writing, and APP communication reading and writing methods of a game handle. The self-learning file transmitting method includes the following steps: S1: initializing a chip and scanning a key value; S2: erasing a FLASH chip and forming a reminder of usage; S3: scanning the key value and starting timing; and S4: timing and scanning the key value, and forming a reminder showing the end of learning. The present application provides a learning AI key with a special function on the game handle, and the AI key function can record operations of all users and save them as data for internal storage.

Processing out of order writes in a log structured file system for improved garbage collection

Improving performance of garbage collection (GC) processes in a deduplicated file system having a layered processing architecture that maintains a log structured file system storing data and metadata in an append-only log arranged as a monotonically increasing log data structure of a plurality of data blocks wherein a head of the log increases in chronological order and no allocated data block is overwritten. The storage layer reserves a set of data block IDs within the log specifically for the garbage collection process, and assigns data blocks from the reserved set to GC I/O processes requiring acknowledgment in a possible out-of-order manner relative to an order of data blocks in the log. It strictly imposes using in-order I/O acknowledgement for other non-GC processes using the storage layer, where these processes may be deduplication backup processes using a segment store layer at the same protocol level as the GC layer.

METHOD FOR DISCARDING PERSONAL INFORMATION IN NAND FLASH MEMORY

A method for discarding personal information comprises at least one among partial overwriting, SLC programming, and applying an erase pulse. The method for discarding personal information comprises a step for acquiring the program status of personal information-containing data of a memory block to be erased, generating data having a status that is equal to or higher than the program status corresponding to the personal information, and carrying out a partial overwriting operation on the personal information by using the generated data.

Request routing management for a distributed storage system

Systems and methods are provided for managing data partitions in a distributed storage system and, in particular, the routing data used by the distributed storage system to route requests to the proper caching layers, persistent storage nodes, etc. Data items may be managed in a multi-tier configuration in which they are grouped into different partitions based on their key prefixes, and partitions are grouped into different cells based on key ranges. When partitions are moved from cell-to-cell, or when cells are split, the routing data is changed accordingly. In order to ensure that the correct routing data is used throughout the distributed storage system, a change to routing data may be accompanied by a special barrier record being written to the transaction log of affected partitions.

Efficient filename storage and retrieval
11704336 · 2023-07-18 · ·

The disclosed technology relates to a system configured to detect a modification to a node in a tree data structure. The node is associated with a content item managed by a content management service as well as a filename. The system may append the filename and a separator to a filename array, determine a location of the filename in the filename array, and store the location of the filename in the node.

Data Storage Arrangement and Method for Anonymization Aware Deduplication
20230222037 · 2023-07-13 ·

A data storage arrangement includes a memory and a controller, where the controller receives an indication of data to be anonymized. The controller further parses a data element to be stored and generates a copy of one or more data portions to be anonymized. The controller further deletes one or more data portions to be anonymized to generate a modified data element to be stored. The controller further generates a copy of the modified data element to be stored utilizing deduplication. The data storage arrangement thus takes in account data anonymization during deduplication (i.e. an anonymization aware deduplication).

UECC failure handling method

A data storage device includes a memory device having a plurality of blocks and a controller coupled to the memory device. The controller is configured to determine that an uncorrectable error correction code (UECC) failure has occurred to a block of the plurality of blocks, enable a UECC anti-strike mechanism, and erase the block. The UECC anti-strike mechanism comprises converting a read failure associated with the block to an erase failure. The controller is further configured to retire the block upon determining that the erase is unsuccessful.

MEMORY SYSTEM AND METHOD OF CONTROLLING NONVOLATILE MEMORY
20230014508 · 2023-01-19 · ·

According to one embodiment, a controller manages a first set of blocks and a second set of blocks. The controller allocates a second block included in the second set of blocks to a first block included in the first set of blocks. In response to receiving one or more write command specifying the first block, the controller writes data associated with the one or more received write commands to the second block in units of a second minimum write size. When the first block is filled with data that has been written to the first block and unwritten region remains in the second block, the controller deallocates the second block from the first block, and allocates the deallocated second block to a write destination block other than the first block.

MEMORY SUB-SYSTEM FOR MONITORING MIXED MODE BLOCKS

An apparatus can include a block program erase count (PEC) component. The block PEC component can monitor a quantity of program erase counts (PECs) for each particular type of block of a non-volatile memory array. The block PEC component can further determine which block of the superblock to write host data to next based on the quantity of PECs. The block PEC component can further write host data to the determined block.

METHOD FOR INHERITING DEFECT BLOCK TABLE AND STORAGE DEVICE THEREOF
20230221868 · 2023-07-13 ·

Disclosed are a method for inheriting a defect block table and a storage device thereof. The method applied to a controller of a storage device includes the steps of: storing an original defect block table in a first storage location of a storage module of the storage device, wherein the original defect block table records defect block information of each plane of the storage module; and in response to a low-level format operation being performed on the storage device, reading the original defect block table, and executing a adaptive inheritance procedure based on a multi-plane mode in which the storage device operates, to generate and store a system defect block table in a second storage location of the storage module, wherein the system defect block table records defect block information corresponding to the multi-plane mode.