摘要:
When a storage device initiates a change in its file system, it locally stores it for future update of the file system. When the host device sends a command to the storage device, the storage device responds to it by commencing a synchronization process during which the two parties coordinate the update of the file system with the stored change. If there are no file system changes pending in the host device, the storage device gets permission from the host device to update the file system with the change and, then, the host device reads the updated file system from the storage device. If there are file system changes pending in the host device, the host device updates a representation of the file system residing in the host device, causes the storage device to make the same changes, and then the storage device initiated change, in the file system. Lastly, the host device receives information from the storage device regarding the changes initiated by the storage device.
摘要:
When a storage device initiates a change in its file system, it locally stores it for future update of the file system. When the host device sends a command to the storage device, the storage device responds to it by commencing a synchronization process during which the two parties coordinate the update of the file system with the stored change. If there are no file system changes pending in the host device, the storage device gets permission from the host device to update the file system with the change and, then, the host device reads the updated file system from the storage device. If there are file system changes pending in the host device, the host device updates a representation of the file system residing in the host device, causes the storage device to make the same changes, and then the storage device initiated change, in the file system. Lastly, the host device receives information from the storage device regarding the changes initiated by the storage device.
摘要:
When a storage device initiates a change in its file system, it locally stores it for future update of the file system. When the host device sends a command to the storage device, the storage device responds to it by commencing a synchronization process during which the two parties coordinate the update of the file system with the stored change. If there are no file system changes pending in the host device, the storage device gets permission from the host device to update the file system with the change and, then, the host device reads the updated file system from the storage device. If there are file system changes pending in the host device, the host device updates a representation of the file system residing in the host device, causes the storage device to make the same changes, and then the storage device initiated change, in the file system. Lastly, the host device receives information from the storage device regarding the changes initiated by the storage device.
摘要:
Displaying storage device-generated menus for playback includes connecting a storage device to a host capable of playing back video content, and presenting to the host a root directory through which a content selection file allows selecting video files for playback through user-storage device interaction, and, optionally, one or more service files that provide various useful information that are also playable back through user-storage device interaction. This typically further includes displaying a Main Menu that represents these files and playing Main Menu items as regular video files/contents. While the content selection file is played back, a content selection menu is generated by the storage device and displayed by the host, and each content selection menu item is playable by transmitting a playback command to the storage device rather than to the host. A storage device is also provided, which uses such method.
摘要:
A system and method for protecting cached streamed data is disclosed. The method may include the steps of generating an encryption key from the streamed data itself, encrypting the streamed data stored in the storage device and requesting the portion of the streamed data from the content server again when later playback is desired so as to allow the content server to enforce access limitations or takedown policies relating to the streamed data. The method may also include procedures for handling key generation over reliable or unreliable protocols.
摘要:
A host device is provided comprising an interface configured to communicate with a storage device having a public memory area and a private memory area, wherein the public memory area stores a virtual file that is associated with content stored in the private memory area. The host device also comprises a cache, a host application, and a server. The server is configured to receive a request for the virtual file from the host application, send a request to the storage device for the virtual file, receive the content associated with the virtual file from the private memory area of the storage device, wherein the content is received by bypassing the cache, generate a response to the request from the host application, the response including the content, and send the response to the host application.
摘要:
Systems and methods for managing a storage device are disclosed. Generally, in a host to which a storage device is operatively coupled, wherein the storage device includes a cache for storing one or more discardable files, a file is identified to be uploaded to an external location. A determination is made whether sufficient free space exists in the cache to pre-stage the file for upload to the external location and the file is stored in the cache upon determining that sufficient free space exists in the cache to pre-stage the file for upload to the external location, wherein pre-stating prepares a file for opportunistically uploading such file in accordance with an uploading policy.
摘要:
A storage device is protected, when interfaced with a host device, by operating a security processor of the storage device in a “security” mode in which the security processor filters commands that are received from the host device and are targeted to the storage controller, and upon determining by the security processor that the “security” mode is no longer required, by operating the security processor in a “safe” mode in which the security processor (i) does not filter commands it receives from the host device and (ii) forwards to a storage controller of the storage device such unfiltered commands.
摘要:
A method and storage device are disclosed for card-based management of discardable files, where discardable files are tracked in a discardable file system on a storage device and are invisible to a host file system, which only tracks user files and free space. The method includes the storage device detecting currently free logical clusters corresponding to at least a portion of free space in the storage area and determining whether addresses associated with a subsequent user file write request are in a range of free clusters managed in the discardable file system by the storage device. When addresses in a host write request overlap the addresses of space managed by the discardable file system, the storage device discards discardable files as necessary and removes the newly freed clusters from the discardable file system, such that the discardable file system data structure is resized when room for user files is needed.
摘要:
A method and system of managing data in a storage device is provided. The method includes receiving a request to store content in a storage device. If the content is discardable content, the content is divided into a plurality of discardable data objects, each associated with at least one type of discarding priority data. The discardable data objects in the storage device are managed based on the discarding priority data associated with each discardable data object. Management of discardable objects may include selection and deletion of discardable objects based on discarding priority data, as well as further subdivision of existing discardable objects, to maintain a desired amount of free space on the storage device. The system may include a host having a processor and a storage device interface configured to execute the method, or a storage device having a processor configured to execute the disclosed methods.