Patent application number | Description | Published |
20120191005 | Diagnostic and Feedback Control for Efficacy and Safety of Laser Application for Tissue Reshaping and Regeneration - The efficacy and safety of laser medical treatments are ensured by performing a combination of measurement techniques to examine tissue properties in order to control characteristics of the laser treatments of cartilaginous tissues. In some aspects, methods of treatment are provided that are capable of taking and providing feedback relating to multiple measurements, including temperature measurements (in particular, radiometry), light scattering, speckle interferometry, optoacoustic measurements, and monitoring tissue electrical characteristics. According to various aspects, feedback is provided during the course of laser treatment of tissue to increase the safety and efficacy of treatment. | 07-26-2012 |
20120191021 | Diagnostic and Feedback Control System for Efficacy and Safety of Laser Application for Tissue Reshaping and Regeneration - The efficacy and safety of laser medical treatments are ensured by performing a combination of measurement techniques to examine tissue properties in order to control characteristics of the laser treatments of cartilaginous tissues. In some aspects, a treatment tool is provided that is capable of taking and providing feedback relating to multiple measurements, including temperature measurements (in particular, radiometry), mechanical measurements, light scattering, speckle interferometry, optoacoustic measurements, and monitoring tissue electrical characteristics. The device is capable of providing feedback during the course of laser treatment of tissue to increase the safety and efficacy of treatment. | 07-26-2012 |
Patent application number | Description | Published |
20110314295 | Storage Device and Method for Communicating a Password between First and Second Storage Devices Using a Double-Encryption Scheme - A first storage device provides a host device with access to a private memory area by communicating a password between the first storage device and a second storage device via the host device using a double-encryption scheme. In one embodiment, a host device receives a twice-encrypted password from a first storage device, sends the twice-encrypted password to a second storage device, receives a once-encrypted password from the second storage device, decrypts the once-encrypted password to obtain the password, and sends the password to the first storage device. In another embodiment, a first storage device sends a twice-encrypted password to a host device, receives the password from the host device after the twice-encrypted password is decrypted by a second storage device and the host device, and provides the host device with access to the private memory area only if the password matches one that is stored in the first storage device. | 12-22-2011 |
20110314296 | Host Device and Method for Communicating a Password between First and Second Storage Devices Using a Double-Encryption Scheme - A first storage device provides a host device with access to a private memory area by communicating a password between the first storage device and a second storage device via the host device using a double-encryption scheme. In one embodiment, a host device receives a twice-encrypted password from a first storage device, sends the twice-encrypted password to a second storage device, receives a once-encrypted password from the second storage device, decrypts the once-encrypted password to obtain the password, and sends the password to the first storage device. In another embodiment, a first storage device sends a twice-encrypted password to a host device, receives the password from the host device after the twice-encrypted password is decrypted by a second storage device and the host device, and provides the host device with access to the private memory area only if the password matches one that is stored in the first storage device. | 12-22-2011 |
20130074178 | PREVENTING ACCESS OF A HOST DEVICE TO MALICIOUS DATA IN A PORTABLE DEVICE - A storage device comprising a memory, a controller, and a host interface operative to connect with a host. The memory contains data locations that are controllable by a protection application which is executable on a host. When the host interface is operatively coupled to a host, data locations in the memory are accessible to an operating system of the host under permission from the protection application. The controller communicates with the protection application running on the host for allowing the protection application access to data locations in the memory. Upon a host request for access to a data location, the controller determines if permission to access the requested data location is acquired from the protection application. The permission is based on a determination by the protection application that the data location does not contain malicious data. | 03-21-2013 |
20130326096 | Method and Storage Device for Assessing Execution of Trim Commands - A method and storage device for assessing execution of trim commands are provided. In one embodiment, a trace of trim and write commands sent to a storage device are obtained. For each trim command in the trace, a subsequent write command to a same logical block address (LBA) as the trim command is identified, and an elapsed time between the trim and write commands is calculated. This information can be used to display a histogram and/or to optimize when the storage device executes trim commands and/or when the host device issues trim commands. | 12-05-2013 |
20130326161 | Method and Host Device for Assessing Execution of Trim Commands - A method and host device for assessing execution of trim commands are provided. In one embodiment, a trace of trim and write commands sent to a storage device are obtained. For each trim command in the trace, a subsequent write command to a same logical block address (LBA) as the trim command is identified, and an elapsed time between the trim and write commands is calculated. This information can be used to display a histogram and/or to optimize when the storage device executes trim commands and/or when the host device issues trim commands. | 12-05-2013 |
20130326169 | Method and Storage Device for Detection of Streaming Data Based on Logged Read/Write Transactions - A method and storage device for detection of streaming data based on logged read/write transactions are provided. In one embodiment, a storage device classifies data as belonging to one of at least three classes based on a set of characteristics and then applies operational parameters to the data depending on the class of the data. Other embodiments are possible, and each of the embodiments can be used alone or together in combination. | 12-05-2013 |
20140181433 | Storage Device and Method for Enabling Hidden Functionality - A storage device and method for enabling hidden functionality are provided. In one embodiment, a storage device is provided comprising an interface a memory, and a controller. The controller is configured to receive a series of read and/or write commands to the memory from the host device. If the series of read and/or write commands received from the host device matches an expected pattern of read and/or write commands, irrespective what data is being read or written by those commands, the controller enables a special functionality mode of the storage device. Other embodiments are possible, and each of the embodiments can be used alone or together in combination. | 06-26-2014 |