会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Storage system and method for opportunistic write-verify
    • 用于机会性写入验证的存储系统和方法
    • US07774540B2
    • 2010-08-10
    • US12005448
    • 2007-12-26
    • Chunqi HanAnand Krishnamurthi KulkarniRichard M. H. NewMarco Sanvido
    • Chunqi HanAnand Krishnamurthi KulkarniRichard M. H. NewMarco Sanvido
    • G06F13/10
    • G11B20/1879G11B20/1816G11B2020/1823G11B2020/1843
    • A storage system that stores verify commands for all the write commands requiring verification in a verify-list that will be processed as a background task is described. The verify-list can include coded data fields that flexibly designate selected alternative states or possibilities for how and where the user data is actually stored. Alternatives for the verify-list include storing the actual raw data, no data, the data in compressed form, a CRC type signature of the data and/or a pointer to a backup copy of the data that is stored either in non-volatile memory such as flash memory or on the disk media in a temporary area. In case of a verification error in various alternative embodiments the user data can be recovered using the backup copy in the verify-list in the write cache, the backup copy in flash memory or on the disk, or from the host.
    • 描述存储系统,其存储将要被处理为后台任务的验证列表中需要验证的所有写入命令的验证命令。 验证列表可以包括灵活地指定所选择的备选状态的编码数据字段或用于实际存储用户数据的方式和位置的可能性。 验证列表的替代方案包括存储实际原始数据,无数据,压缩形式的数据,数据的CRC类型签名和/或指向存储在非易失性存储器中的数据的备份副本的指针 例如闪存或临时区域中的磁盘介质上。 在各种替代实施例中的验证错误的情况下,可以使用写入高速缓存中的验证列表中的备份副本,闪存中的备份副本,或者从主机恢复用户数据。
    • 5. 发明申请
    • Storage system and method for opportunistic write-verify
    • 用于机会性写入验证的存储系统和方法
    • US20090172324A1
    • 2009-07-02
    • US12005448
    • 2007-12-26
    • Chunqi HanAnand Krishnamurthi KulkarniRichard M.H. NewMarco Sanvido
    • Chunqi HanAnand Krishnamurthi KulkarniRichard M.H. NewMarco Sanvido
    • G06F12/00
    • G11B20/1879G11B20/1816G11B2020/1823G11B2020/1843
    • A storage system that stores verify commands for all the write commands requiring verification in a verify-list that will be processed as a background task is described. The verify-list can include coded data fields that flexibly designate selected alternative states or possibilities for how and where the user data is actually stored. Alternatives for the verify-list include storing the actual raw data, no data, the data in compressed form, a CRC type signature of the data and/or a pointer to a backup copy of the data that is stored either in non-volatile memory such as flash memory or on the disk media in a temporary area. In case of a verification error in various alternative embodiments the user data can be recovered using the backup copy in the verify-list in the write cache, the backup copy in flash memory or on the disk, or from the host.
    • 描述存储系统,其存储将要被处理为后台任务的验证列表中需要验证的所有写入命令的验证命令。 验证列表可以包括灵活地指定所选择的备选状态的编码数据字段或用于实际存储用户数据的方式和位置的可能性。 验证列表的替代方案包括存储实际原始数据,无数据,压缩形式的数据,数据的CRC类型签名和/或指向存储在非易失性存储器中的数据的备份副本的指针 例如闪存或临时区域中的磁盘介质上。 在各种替代实施例中的验证错误的情况下,可以使用写入高速缓存中的验证列表中的备份副本,闪存中的备份副本,或者从主机恢复用户数据。
    • 6. 发明申请
    • Techniques For Data Storage Device Virtualization
    • 数据存储设备虚拟化技术
    • US20090157942A1
    • 2009-06-18
    • US11959293
    • 2007-12-18
    • Anand Krishnamurthi Kulkarni
    • Anand Krishnamurthi Kulkarni
    • G06F12/00
    • G06F3/0664G06F3/0604G06F3/0629G06F3/0673
    • A data storage device comprises virtual storage devices that are each assigned to a subset of data sectors in a non-volatile memory of the data storage device. The data storage device receives configuration metadata for configuring each of the virtual storage devices from a host operating system. The configuration metadata is received in a standard format that is file system independent. The configuration metadata comprises a range of logical block addresses and a virtual storage device number assigned to each of the virtual storage devices. Each of the virtual storage device numbers is a unique identifier used by the data storage device to differentiate between the virtual storage devices. The data storage device uses the virtual storage device numbers and logical block addresses to identify data sectors in the virtual storage devices that are accessible by virtual machine operating systems.
    • 数据存储设备包括虚拟存储设备,每个虚拟存储设备分配给数据存储设备的非易失性存储器中的数据扇区的子集。 数据存储设备从主机操作系统接收用于配置每个虚拟存储设备的配置元数据。 以与文件系统无关的标准格式接收配置元数据。 配置元数据包括分配给每个虚拟存储设备的逻辑块地址范围和虚拟存储设备号。 每个虚拟存储设备号是由数据存储设备用于区分虚拟存储设备的唯一标识符。 数据存储设备使用虚拟存储设备号和逻辑块地址来识别虚拟机操作系统可访问的虚拟存储设备中的数据扇区。
    • 8. 发明申请
    • DISK DRIVE WITH CACHE HAVING VOLATILE AND NONVOLATILE MEMORY
    • 磁带驱动器具有易失性和非易失性存储器的缓存
    • US20080114930A1
    • 2008-05-15
    • US11559346
    • 2006-11-13
    • Marco SanvidoAnand Krishnamurthi Kulkarni
    • Marco SanvidoAnand Krishnamurthi Kulkarni
    • G06F12/00
    • G06F12/0866G06F2212/225G06F2212/286Y02D10/13
    • A disk drive that includes nonvolatile memory for use when the disk drive is in standby mode also uses the nonvolatile memory, together with a volatile memory, as a cache when the disk drive is in both standby and non-standby mode. Each of the data blocks stored on the disks is also stored in a cache line of either the volatile memory or the nonvolatile memory. Each cache line in both the volatile and nonvolatile memory stores one or more data blocks and an associated tag. The tag contains at least a portion of the logical block address that corresponds to the data block that is stored in the cache line. The volatile memory also has locations allocated to store tags that “shadow” the tags in the nonvolatile memory. By searching the shadow tags in the faster volatile memory, it can be determined if a data block is in the nonvolatile memory without searching the slower nonvolatile memory.
    • 当磁盘驱动器处于待机模式时,包含非易失性存储器的磁盘驱动器在磁盘驱动器处于待机模式时也将非易失性存储器与易失性存储器一起用作高速缓存。 存储在磁盘上的每个数据块也存储在易失性存储器或非易失性存储器的高速缓存行中。 易失性和非易失性存储器中的每个高速缓存线存储一个或多个数据块和相关联的标签。 标签包含对应于存储在高速缓存行中的数据块的逻辑块地址的至少一部分。 易失性存储器还具有分配用于存储“阴影”非易失性存储器中的标签的标签的位置。 通过在快速易失性存储器中搜索阴影标签,可以确定数据块是否在非易失性存储器中,而不需要搜索较慢的非易失性存储器。
    • 10. 发明授权
    • Techniques for encrypting data on storage devices using an intermediate key
    • 使用中间密钥加密存储设备上的数据的技术
    • US08315394B2
    • 2012-11-20
    • US11923123
    • 2007-10-24
    • Marco SanvidoAnand Krishnamurthi KulkarniCyril GuyotRichard M. H. NewJorge Campello de Souza
    • Marco SanvidoAnand Krishnamurthi KulkarniCyril GuyotRichard M. H. NewJorge Campello de Souza
    • G06F21/00
    • H04L9/0822H04L9/0863
    • A data storage device encrypts data stored in non-volatile memory using a bulk encryption key. The data storage device uses a key derivation function to generate an initial encryption key. The data storage device then wraps an intermediate encryption key with the initial encryption key and stores the wrapped intermediate key in the non-volatile memory. The data storage device wraps the bulk encryption key with the intermediate encryption key and stores the wrapped bulk encryption key in the non-volatile memory. The data storage device can unwrap the wrapped intermediate key to generate the intermediate encryption key using the initial encryption key. The data storage device can unwrap the wrapped bulk encryption key to generate the bulk encryption key using the intermediate encryption key. The data storage device decrypts data stored in the non-volatile memory using the bulk encryption key.
    • 数据存储设备使用批量加密密钥对存储在非易失性存储器中的数据进行加密。 数据存储装置使用密钥导出函数来生成初始加密密钥。 然后,数据存储设备将具有初始加密密钥的中间加密密钥包裹起来,并将包裹的中间密钥存储在非易失性存储器中。 数据存储设备将批量加密密钥与中间加密密钥打包,并将包装的批量加密密钥存储在非易失性存储器中。 数据存储设备可以使用初始加密密钥解包包裹的中间密钥以产生中间加密密钥。 数据存储设备可以使用中间加密密钥解开包装的批量加密密钥以生成批量加密密钥。 数据存储装置使用批量加密密钥对存储在非易失性存储器中的数据进行解密。