Non-volatile memory with precise write-once protection

    公开(公告)号:US11455402B2

    公开(公告)日:2022-09-27

    申请号:US16261960

    申请日:2019-01-30

    Inventor: Jon D. Trantham

    Abstract: Apparatus and method for selective overwrite protection of data stored in a non-volatile memory (NVM) with fine precision. In some embodiments, a write command is received from a host device to write one or more blocks of data having associated logical addresses to the NVM. A read operation is performed in response to the write command to read a tag value associated with each block. The write command is disallowed in response to the tag value indicating a protected version of the block having the associated logical address is already stored at the selected location. The tag value may be a key version value indicative of a version of an encryption key used to encrypt user data in the data block and whether the block is write-protected.

    Coupling multiple controller chips to a host via a single host interface

    公开(公告)号:US10664172B1

    公开(公告)日:2020-05-26

    申请号:US15844774

    申请日:2017-12-18

    Abstract: A data storage device includes a first system-on-a-chip (SOC) associated with a first read transducer that accesses one or more magnetic disks of the data storage drive. The first SOC has a first read channel operable to receive data from the first read transducer. A second SOC is associated with a second read transducer that accesses the one or more magnetic disks of the data storage drive independently of the first read transducer. The second SOC has a second read channel operable to receive second data from the second read transducer. The first and second SOCs are coupled via a data bus that facilitates communicating the first and second data to a host via a first host interface.

    Tracking of data erasures
    50.
    发明授权

    公开(公告)号:US10587590B2

    公开(公告)日:2020-03-10

    申请号:US15620270

    申请日:2017-06-12

    Abstract: A method includes adding a key version tag to an encryption key store that stores encryption keys. The key version tag is inserted into a data stream. The data stream including the key version tag is written to media. The data in the data stream is erased by scrambling the encryption keys and incrementing the key version tag in the encryption store by a digit. The data stream is replaced with a replacement data pattern when the key version tag stored in the encryption store and the key version tag located in the data stream mismatch.

Patent Agency Ranking