Tracking the most frequently erased blocks in non-volatile memory systems
    81.
    发明授权
    Tracking the most frequently erased blocks in non-volatile memory systems 有权
    跟踪非易失性存储器系统中最常擦除的块

    公开(公告)号:US06973531B1

    公开(公告)日:2005-12-06

    申请号:US10281670

    申请日:2002-10-28

    IPC分类号: G11C16/34 G06F12/12

    摘要: Methods and apparatus for performing wear leveling in a non-volatile memory system are disclosed. According to one aspect of the present invention, a method for processing elements included in a non-volatile memory of a memory system includes obtaining erase counts associated with a plurality of erased elements. Each element included in the plurality of elements has an associated erase count that indicates a number of times the element has been erased. The method also includes grouping a number of erased elements included in the plurality of elements into a first set, and storing the erase counts associated with the first set in a memory component of the memory system. Grouping the number of elements into the first set typically includes selecting erased elements included in the plurality of elements which have the highest associated erase counts of the erase counts associated with the plurality of elements.

    摘要翻译: 公开了用于在非易失性存储器系统中执行损耗均衡的方法和装置。 根据本发明的一个方面,一种用于处理包括在存储器系统的非易失性存储器中的元件的方法包括获得与多个擦除元件相关联的擦除计数。 包括在多个元件中的每个元素具有相关联的擦除计数,其指示该元件被擦除的次数。 该方法还包括将包括在多个元素中的多个擦除元素分组成第一组,并将与第一组相关联的擦除计数存储在存储器系统的存储器组件中。 将元件的数量分组到第一组中通常包括选择包括在与多个元件相关联的擦除计数中具有最高相关联的擦除计数的多个元件中的擦除元件。

    Accessing memory device content using a network
    82.
    发明申请
    Accessing memory device content using a network 有权
    使用网络访问内存设备内容

    公开(公告)号:US20100050241A1

    公开(公告)日:2010-02-25

    申请号:US12229165

    申请日:2008-08-20

    IPC分类号: H04L9/32

    摘要: A first storage unit is bound to a second storage unit based on a binding type associated with content on the first storage unit, the first storage unit being operated through a first host device, and the second storage unit being operated through a second host device. When content on the first storage unit is requested in the first host device, the first host device will calculate an account identifier based on the binding type associated with the requested content and send the account identifier to a server. The server will send the account identifier to the second host device, and the second storage unit will use the account identifier to calculate a credential. The credential will be sent to the first host device through the server. The credential can be used to access the requested content if the credential is valid.

    摘要翻译: 第一存储单元基于与第一存储单元上的内容相关联的绑定类型绑定到第二存储单元,第一存储单元通过第一主机设备操作,第二存储单元通过第二主机设备操作。 当在第一主机设备中请求第一存储单元上的内容时,第一主机设备将基于与所请求的内容相关联的绑定类型来计算帐户标识符,并将该帐户标识符发送到服务器。 服务器将把帐户标识符发送到第二个主机设备,而第二个存储单元将使用该帐号标识来计算凭证。 证书将通过服务器发送到第一台主机设备。 如果凭证有效,则可以使用凭据来访问所请求的内容。

    Method for versatile content control with partitioning
    83.
    发明授权
    Method for versatile content control with partitioning 有权
    具有分区功能的多功能内容控制方法

    公开(公告)号:US08601283B2

    公开(公告)日:2013-12-03

    申请号:US11314052

    申请日:2005-12-20

    摘要: In some applications, it may be more convenient to the user to be able to log in the memory system using one application, and then be able to use different applications to access protected content without having to log in again. In such event, all of the content that the user wishes to access in this manner may be associated with a first account, so that all such content can be accessed via different applications (e.g. music player, email, cellular communication etc.) without having to log in multiple times. Then a different set of authentication information may then be used for logging in to access protected content that is in an account different from the first account, even where the different accounts are for the same user or entity.

    摘要翻译: 在某些应用中,用户可以使用一个应用程序登录存储系统更方便,然后能够使用不同的应用来访问受保护的内容,而无需再次登录。 在这种情况下,用户希望以这种方式访问​​的所有内容可以与第一帐户相关联,使得可以通过不同的应用(例如,音乐播放器,电子邮件,蜂窝通信等)来访问所有这样的内容,而没有 多次登录。 然后可以使用一组不同的身份验证信息来登录访问与第一帐户不同的帐户的受保护内容,即使不同帐户是针对同一用户或实体的。

    Control structure for versatile content control
    84.
    发明申请
    Control structure for versatile content control 审中-公开
    多功能内容控制的控制结构

    公开(公告)号:US20060242151A1

    公开(公告)日:2006-10-26

    申请号:US11313536

    申请日:2005-12-20

    IPC分类号: G06F17/30

    CPC分类号: G06F21/10 G06F2221/2145

    摘要: A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissions at a node of the tree has a predetermined relationship to permission or permissions at another node at a higher or lower or the same level in the same tree. By requiring entities to comply with the permissions so specified at each of the nodes, the tree feature of this application allows a content owner to control which entities can take action, and which actions each of the entities can take, irrespective of whether the tree has different levels. To enhance the commercial value that can be provided by the mobile storage medium, it is desirable for mobile storage devices to be capable of supporting more than one application simultaneously. When two or more applications are accessing the mobile storage device at the same time, it can be important to be able to separate the operations of the two or more applications so that they do not interfere with one another in a phenomena referred to herein as crosstalk. Two or more preferably hierarchical trees control access to the memory. Each tree comprises nodes at different levels for controlling access to data by a corresponding set of entities where a node of each tree specifies permission or permissions of the corresponding entity or entities for accessing memory data. The permission or permissions at a node of each of the trees has a predetermined relationship to permission or permissions at another node at a higher or lower level in the same tree. Preferably, there is no crosstalk between at least two of the trees.

    摘要翻译: 存储在存储介质中的树结构提供对实体甚至在获得访问之后可以执行什么的控制。 树中的每个节点都指定通过树的这种节点获取入口的实体的权限。 一些树具有不同的级别,其中树的节点上的许可或许可与在同一树中较高或较低或相同级别的另一节点处的权限或权限具有预定关系。 通过要求实体遵守在每个节点上如此指定的权限,该应用的树特征允许内容所有者控制哪些实体可以采取行动,以及每个实体可以采取哪些动作,而不管树是否具有 不同层次。 为了增强可由移动存储介质提供的商业价值,期望移动存储设备能够同时支持多个应用。 当两个或多个应用程序同时访问移动存储设备时,能够分离两个或更多应用程序的操作是非常重要的,使得它们在这里被称为串扰的现象中不会彼此干扰 。 两个或更多个优选的分级树控制对存储器的访问。 每个树包括不同级别的节点,用于控制对应的实体集合的访问,其中每个树的节点指定用于访问存储器数据的对应实体或实体的许可或许可。 每个树的节点上的权限或权限与同一棵树中较高或较低级别的另一个节点的权限或权限具有预定关系。 优选地,在至少两棵树之间不存在串扰。

    Method using control structure for versatile content control
    85.
    发明申请
    Method using control structure for versatile content control 审中-公开
    使用控制结构进行多功能内容控制的方法

    公开(公告)号:US20060242150A1

    公开(公告)日:2006-10-26

    申请号:US11313870

    申请日:2005-12-20

    IPC分类号: G06F17/30

    摘要: A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissions at a node of the tree has a predetermined relationship to permission or permissions at another node at a higher or lower or the same level in the same tree. By requiring entities to comply with the permissions so specified at each of the nodes, the tree feature of this application allows a content owner to control which entities can take action, and which actions each of the entities can take, irrespective of whether the tree has different levels. To enhance the commercial value that can be provided by the mobile storage medium, it is desirable for mobile storage devices to be capable of supporting more than one application simultaneously. When two or more applications are accessing the mobile storage device at the same time, it can be important to be able to separate the operations of the two or more applications so that they do not interfere with one another in a phenomena referred to herein as crosstalk. Two or more preferably hierarchical trees control access to the memory. Each tree comprises nodes at different levels for controlling access to data by a corresponding set of entities where a node of each tree specifies permission or permissions of the corresponding entity or entities for accessing memory data. The permission or permissions at a node of each of the trees has a predetermined relationship to permission or permissions at another node at a higher or lower level in the same tree. Preferably, there is no crosstalk between at least two of the trees.

    摘要翻译: 存储在存储介质中的树结构提供对实体甚至在获得访问之后可以执行什么的控制。 树中的每个节点都指定通过树的这种节点获取入口的实体的权限。 一些树具有不同的级别,其中树的节点上的许可或许可与在同一树中较高或较低或相同级别的另一节点处的权限或权限具有预定关系。 通过要求实体遵守在每个节点上如此指定的权限,该应用的树特征允许内容所有者控制哪些实体可以采取行动,以及每个实体可以采取哪些动作,而不管树是否具有 不同层次。 为了增强可由移动存储介质提供的商业价值,期望移动存储设备能够同时支持多个应用。 当两个或多个应用程序同时访问移动存储设备时,能够分离两个或更多应用程序的操作是非常重要的,使得它们在这里被称为串扰的现象中不会彼此干扰 。 两个或更多个优选的分级树控制对存储器的访问。 每个树包括不同级别的节点,用于控制对应的实体集合的访问,其中每个树的节点指定用于访问存储器数据的相应实体或实体的许可或许可。 每个树的节点上的权限或权限与同一棵树中较高或较低级别的另一个节点的权限或权限具有预定关系。 优选地,在至少两棵树之间不存在串扰。

    Method forversatile content control
    86.
    发明申请
    Method forversatile content control 有权
    方法无效内容控制

    公开(公告)号:US20060242068A1

    公开(公告)日:2006-10-26

    申请号:US11314411

    申请日:2005-12-20

    IPC分类号: G06Q99/00

    CPC分类号: G06F21/6218 G06F21/78

    摘要: The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium. When implemented in a flash memory, the above features result in a particularly useful medium for content protection. Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle through which the memory retains complete and exclusive control over the generation and use of the key value for cryptographic processes, while the host retains control of files.

    摘要翻译: 如果加密解密密钥存储在介质本身并且对外部设备基本不可访问,则所有者利益的所有者处于更好的位置以控制对介质中的加密内容的访问。 只有那些具有正确凭据的主机才能访问密钥。 可以存储访问策略,其授予不同的权限(例如,到不同的授权实体)以访问存储在介质中的数据。 结合上述两个特征的组合的系统是特别有利的。 一方面,内容所有者或所有者具有通过使用外部设备基本上不可访问的密钥来控制对内容的访问的能力,并且同时具有授予访问媒体中的内容的不同权限的能力。 因此,即使在外部设备获得访问的情况下,他们的访问仍然可能受到记录在存储介质中的内容所有者或所有者设置的不同权限。 当在闪存中实现时,上述特征导致用于内容保护的特别有用的介质。 许多存储设备不知道文件系统,而许多计算机主机设备以文件的形式读取和写入数据。 主机设备提供密钥引用或ID,而存储器系统生成响应中的密钥值,该密钥值与密钥ID相关联,该密钥ID用作存储器保持完整的句柄,并且专用于控制生成和使用 密码过程的关键值,而主机保留对文件的控制。

    Versatile content control with partitioning
    87.
    发明申请
    Versatile content control with partitioning 审中-公开
    多功能内容控制与分区

    公开(公告)号:US20060242066A1

    公开(公告)日:2006-10-26

    申请号:US11314053

    申请日:2005-12-20

    IPC分类号: G06Q99/00

    摘要: In some mobile storage devices, content protection is afforded by dividing the memory into separate areas where access to protected areas requires prior authentication. While such feature does provide some protection, it does not protect against a user who obtained a password by illicit means. Thus, another aspect of the invention is based on the recognition that a mechanism or structure may be provided to divide a memory into partitions and so that at least some data in the partitions can be encrypted with a key, so that in addition to authentication that is required for accessing some of the partitions, access to one or more keys may be required to decrypt the encrypted data in such partitions. In some applications, it may be more convenient to the user to be able to log in the memory system using one application, and then be able to use different applications to access protected content without having to log in again. In such event, all of the content that the user wishes to access in this manner may be associated with a first account, so that all such content can be accessed via different applications (e.g. music player, email, cellular communication etc.) without having to log in multiple times. Then a different set of authentication information may then be used for logging in to access protected content that is in an account different from the first account, even where the different accounts are for the same user or entity.

    摘要翻译: 在一些移动存储设备中,通过将存储器划分成对保护区的访问需要事先认证的单独区域来提供内容保护。 虽然这样的功能确实提供了一些保护,但是它不能防止以非法手段获得密码的用户。 因此,本发明的另一方面基于这样的认识:可以提供机制或结构来将存储器划分成分区,并且使得可以用密钥对分区中的至少一些数据进行加密,使得除了认证 是访问某些分区所必需的,可能需要访问一个或多个密钥来对这些分区中的加密数据进行解密。 在某些应用中,用户可以使用一个应用程序登录存储系统更方便,然后能够使用不同的应用来访问受保护的内容,而无需再次登录。 在这种情况下,用户希望以这种方式访问​​的所有内容可以与第一帐户相关联,使得可以通过不同的应用(例如,音乐播放器,电子邮件,蜂窝通信等)来访问所有这样的内容,而没有 多次登录。 然后可以使用一组不同的身份验证信息来登录访问与第一帐户不同的帐户的受保护内容,即使不同帐户是针对同一用户或实体的。

    Host Device and Method for Protecting Data Stored in a Storage Device
    88.
    发明申请
    Host Device and Method for Protecting Data Stored in a Storage Device 审中-公开
    用于保护存储在存储设备中的数据的主机设备和方法

    公开(公告)号:US20100077214A1

    公开(公告)日:2010-03-25

    申请号:US12624036

    申请日:2009-11-23

    IPC分类号: H04L9/32 G06F12/14 H04L9/06

    摘要: The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium. When implemented in a flash memory, the above features result in a particularly useful medium for content protection. Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the storage device generates a key value in response which is associated with the key ID, which is used as the handle through which the memory retains complete and exclusive control over the generation and use of the key value for cryptographic processes, while the host retains control of files.

    摘要翻译: 如果加密解密密钥存储在介质本身并且对外部设备基本不可访问,则所有者利益的所有者处于更好的位置以控制对介质中的加密内容的访问。 只有那些具有正确凭据的主机才能访问密钥。 可以存储访问策略,其授予不同的权限(例如,到不同的授权实体)以访问存储在介质中的数据。 结合上述两个特征的组合的系统是特别有利的。 一方面,内容所有者或所有者具有通过使用外部设备基本上不可访问的密钥来控制对内容的访问的能力,并且同时具有授予访问媒体中的内容的不同权限的能力。 因此,即使在外部设备获得访问的情况下,他们的访问仍然可能受到记录在存储介质中的内容所有者或所有者设置的不同权限。 当在闪存中实现时,上述特征导致用于内容保护的特别有用的介质。 许多存储设备不知道文件系统,而许多计算机主机设备以文件的形式读取和写入数据。 主机设备提供密钥参考或ID,而存储设备生成响应中的密钥值,该密钥值与密钥ID相关联,该密钥ID用作存储器保留完整的句柄,并且专用于控制生成和使用 密码过程的关键值,而主机保留对文件的控制。

    System for creating control structure for versatile content control
    89.
    发明申请
    System for creating control structure for versatile content control 审中-公开
    用于创建多功能内容控制的控制结构的系统

    公开(公告)号:US20060242067A1

    公开(公告)日:2006-10-26

    申请号:US11314055

    申请日:2005-12-20

    IPC分类号: G06Q99/00

    摘要: The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corresponding entity or entities for accessing memory data. The permission or permissions at the node of each of the trees has, a predetermined relationship to permission or permissions at nodes at a higher or lower or the same level in the same tree. Thus, the mobile storage devices may be issued without any trees already created so that the purchaser of the devices has a free hand in creating hierarchical trees adapted to the applications the purchaser has in mind. Alternatively, the mobile storage devices may also be issued with the trees already created so that a purchaser does not have to go through the trouble of creating the trees. In both situations, preferably certain functionalities of the trees can become fixed after the devices are made so that they cannot be further changed or altered. This provides greater control over access to the content in the device by the content owner. Thus, in one embodiment, the system agent can preferably be disabled so that no additional trees can be created.

    摘要翻译: 移动存储设备可以被提供有能够创建包括不同级别的节点的至少一个分层树的系统代理,用于控制对相应实体存储在存储器中的数据的访问。 树的每个节点指定用于访问存储器数据的相应实体或实体的许可或许可。 每个树的节点上的权限或权限具有与同一树中较高或较低或相同级别的节点处的许可或许可的预定关系。 因此,移动存储设备可以在没有任何已经创建的树的情况下被发布,使得设备的购买者可以自由地创建适应购买者所考虑的应用的分层树。 或者,移动存储设备也可以被发布已经创建的树,使得购买者不必经历创建树的麻烦。 在这两种情况下,优选地,在制造装置之后,树的某些功能可以变得固定,使得它们不能被进一步改变或改变。 这可以更好地控制内容所有者对设备内容的访问。 因此,在一个实施例中,系统代理可以优选地被禁用,使得不能创建额外的树。

    Method for versatile content control
    90.
    发明授权
    Method for versatile content control 有权
    多用途内容控制方法

    公开(公告)号:US08504849B2

    公开(公告)日:2013-08-06

    申请号:US11314411

    申请日:2005-12-20

    IPC分类号: G06Q99/00 G06F11/30 G06F12/14

    CPC分类号: G06F21/6218 G06F21/78

    摘要: Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle through which the memory retains complete and exclusive control over the generation and use of the key value for cryptographic processes, while the host retains control of files.

    摘要翻译: 许多存储设备不知道文件系统,而许多计算机主机设备以文件的形式读取和写入数据。 主机设备提供密钥引用或ID,而存储器系统生成响应中的密钥值,该密钥值与密钥ID相关联,该密钥ID用作存储器保持完整的句柄,并且专用于控制生成和使用 密码过程的关键值,而主机保留对文件的控制。