Patent application number | Description | Published |
20090164760 | METHOD AND SYSTEM FOR MODULE INITIALIZATION WITH AN ARBITRARY NUMBER OF PHASES - A method for initializing a module that includes identifying a first module for initialization, and performing a plurality of processing phases on the first module and all modules in a dependency graph of the first module. Performing the plurality of processing phases includes, for each module, executing a processing phase of the plurality of processing phases on the module, determining whether the processing phase has been executed on all modules in a dependency graph of the module, and when the processing phase has been executed for all modules in the dependency graph of the module, executing a subsequent processing phase of the plurality of processing phases on the module. | 06-25-2009 |
20090165002 | METHOD AND SYSTEM FOR MODULE INITIALIZATION - A method for initializing a module that includes identifying a module for initialization and performing a plurality of processing phases on the module and all modules in a dependency graph of the module. Performing the processing phases includes, for each module, executing a processing phase of the plurality of processing phases on the module, determining whether the processing phase has been executed on all modules in a dependency graph of the module, and when the processing phase has been executed for all modules in the dependency graph of the module, executing a subsequent processing phase of the plurality of processing phases on the module, wherein at least one processing phase of the plurality of processing phases includes executing custom initialization code. | 06-25-2009 |
Patent application number | Description | Published |
20090259800 | FLASH MANAGEMENT USING SEQUENTIAL TECHNIQUES - Disclosed are techniques for flash memory management, including receiving data from a host, writing the data to a flash memory device in the order it was received from the host, and providing at least one data structure configured to locate the data written to the flash memory device. | 10-15-2009 |
20090259801 | CIRCULAR WEAR LEVELING - A method for flash memory management comprises providing a head pointer configured to define a first location in a flash memory, and a tail pointer configured to define a second location in a flash memory. The head pointer and tail pointer define a payload data area. Payload data is received from a host, and written to the flash memory in the order it was received. The head pointer and tail pointer are updated such that the payload data area moves in a circular manner within the flash memory. | 10-15-2009 |
20090259805 | FLASH MANAGEMENT USING LOGICAL PAGE SIZE - Disclosed are techniques for flash memory management, including tracking payload data via one or more data structures configured to define the size of logical pages in a flash memory. In various embodiments, the logical page size may be larger than, equal to, or smaller than a physical page size of a flash memory chip. | 10-15-2009 |
20090259806 | FLASH MANAGEMENT USING BAD PAGE TRACKING AND HIGH DEFECT FLASH MEMORY - Disclosed are techniques for flash memory management, including utilizing defect information corresponding to a granularity smaller than a physical erase block size of a flash memory chip. | 10-15-2009 |
20090259919 | FLASH MANAGEMENT USING SEPARATE MEDTADATA STORAGE - Disclosed are techniques for flash memory management, including storing metadata and/or error correcting information separately from payload data. In various embodiments, metadata and/or error correcting information are stored in a random access memory within a solid state drive. | 10-15-2009 |
20110296094 | CIRCULAR WEAR LEVELING - A method for flash memory management comprises providing a head pointer configured to define a first location in a flash memory, and a tail pointer configured to define a second location in a flash memory. The head pointer and tail pointer define a payload data area. Payload data is received from a host, and written to the flash memory in the order it was received. The head pointer and tail pointer are updated such that the payload data area moves in a circular manner within the flash memory. | 12-01-2011 |
20150100795 | Secure Storage Devices, Authentication Devices, and Methods Thereof - Various devices may benefit from enhanced security. For example, secure storage devices and authentication devices may benefit from security that permits isolation of the devices from the operating system and data ports of a host computer. An apparatus can include a first interface configured to connect to a non-volatile storage device. The apparatus can also include circuitry configured to supply an encryption key over the first interface to decrypt data on the non-volatile storage device. The first interface is configured to connect directly to the non-volatile storage device. | 04-09-2015 |