-
公开(公告)号:US20240168895A1
公开(公告)日:2024-05-23
申请号:US18426220
申请日:2024-01-29
IPC分类号: G06F13/16 , G06F11/30 , G06F12/02 , G06F12/0868 , G06F13/24
CPC分类号: G06F13/1668 , G06F11/3037 , G06F11/3058 , G06F12/0238 , G06F12/0868 , G06F13/24
摘要: Various examples are directed to devices and methods involving a host device and a memory system, the memory system comprising a memory controller and a plurality of memory locations. The memory system may send to the host device a first message describing background operations to be performed at the memory system. The memory system may receive from the host device a second message indicating permission to execute the background operations and may begin to execute at least one background operation.
-
公开(公告)号:US11977667B2
公开(公告)日:2024-05-07
申请号:US17524471
申请日:2021-11-11
CPC分类号: G06F21/79 , G06F12/0246 , G06F12/0253 , G06F21/54 , G06F21/602 , G06F21/107
摘要: Methods, systems, and devices for purging data from a memory device are described. A memory system may receive, from a host system, a command to write data to an address storing an encryption key in a first portion of the memory system that is configured to store secure information (e.g., a Replay Protected Memory Block). The encryption key may be configured to encrypt data associated with the host system that is stored in a second portion of the memory system. The memory system may then receive an indication of a purge command from the host system. The memory system may execute the purge command by transferring data from the first portion of the memory system to a third portion of the memory system configured to store secure information and erasing the data from the first portion of the memory system.
-
公开(公告)号:US20240028747A1
公开(公告)日:2024-01-25
申请号:US17869677
申请日:2022-07-20
CPC分类号: G06F21/602 , H04L67/52 , G06F21/62
摘要: Data can be stored in a computing device as encrypted to prevent the data from being read and/or modified without being decrypted using cryptographic information. To prevent the data from being decrypted in locations other than a secure location, the cryptographic information can be removed logically and physically from the computing device when it is determined that the computing device has left the secure location.
-
公开(公告)号:US11837275B2
公开(公告)日:2023-12-05
申请号:US17725110
申请日:2022-04-20
IPC分类号: G11C8/00 , G11C11/4076 , G11C11/4096 , G11C11/4093 , G11C11/406
CPC分类号: G11C11/4076 , G11C11/4093 , G11C11/4096 , G11C11/40603
摘要: Methods, systems, and devices related to techniques for saturating a host interface are described. A set of data stored at a first memory device may be communicated over an interface during a read operation performed in response to receiving a read request associated with the set of data. A control component may determine if the interface entered an idle state during portions of the read operation. Based on detecting an idle state of the interface, the control component may transfer the set of data from the first memory device to a second memory device. After receiving a second read request for the set of data, the memory device may access the set of data from the second memory device and communicate the set of data over the interface, where the interface may remain in a saturated state throughout the second read operation.
-
公开(公告)号:US20230063502A1
公开(公告)日:2023-03-02
申请号:US17488205
申请日:2021-09-28
摘要: Methods, systems, and devices for memory operations are described. A host system may obtain data for writing to a memory system. The host system may send, to the memory system, an indication that the data is to be written to the memory system, and the memory system may remove invalid data at the memory system until the memory system has sufficient resources to store the data. Based on the memory system having sufficient resources, the memory system may delay background operations at the memory system until the data has been written to the memory system. The memory system may also create a restore point based on the memory system having sufficient resources and receiving the data. In other examples, the removal of invalid data at the memory system may be delayed until after the data is written to the memory system.
-
公开(公告)号:US20220327019A1
公开(公告)日:2022-10-13
申请号:US17851782
申请日:2022-06-28
摘要: Apparatus and methods are disclosed, including using a memory controller to monitor at least one parameter related to power level of a host processor of a host device, and dynamically adjusting at least one of a clock frequency and a voltage level of an error-correcting code (ECC) subsystem of the memory controller based on the at least one parameter to control power usage of the host device.
-
公开(公告)号:US20220188246A1
公开(公告)日:2022-06-16
申请号:US17531581
申请日:2021-11-19
IPC分类号: G06F12/1045 , G06F12/02 , G06F13/16
摘要: Methods, systems, and devices for exclusion regions for host-side memory address translation are described. In some examples, a host system may be configured to identify regions of logical addresses to be excluded from operating according to logical-to-physical (L2P) address mapping by the host system (e.g., for access commands), including such techniques that may be associated a host performance boosting (HPB) functionality. The host system may signal an indication for a memory system to inhibit communication of L2P mapping table information to the host system for the identified regions, which may inhibit, suppress, or exclude HPB functionality for those identified regions. In some examples, the memory system may continue to support HPB functionality by communicating L2P mapping table information for other regions, such as regions of logical addresses that may be read relatively frequently or may otherwise benefit from address translation at the host system.
-
公开(公告)号:US20220171572A1
公开(公告)日:2022-06-02
申请号:US17524470
申请日:2021-11-11
IPC分类号: G06F3/06
摘要: Methods, systems, and devices for queue configuration for host interface are described. An apparatus may include a host system including a first circular queue having a first entry that indicates a first command for a memory system and a location of data associated with the first command. The apparatus may include a controller that may access the first entry of the first circular queue and generate a second command for the memory system based on the data associated with the first command and the first entry. The controller may then transmit the second command to the memory system based on generating the command. The controller may also receive a response from the memory system based on transmitting the command. The controller may remove the first entry from the first circular queue based on receiving the response from the memory system.
-
公开(公告)号:US10777297B2
公开(公告)日:2020-09-15
申请号:US16215327
申请日:2018-12-10
摘要: A method to refresh copies of firmware based on ages of those copies of the firmware is described. The method includes determining, by a memory subsystem, an age of a first copy of firmware, which is stored in the memory components of the memory subsystem, is greater than a refresh interval, wherein the age of the copy of firmware is tracked in a firmware age table. In response to determining that the age of the first copy of the firmware is greater than the refresh interval, the memory subsystem refreshes the first copy of the firmware in the memory components. Further, the memory subsystem updates the age of the first copy of the firmware in the firmware age table in response to refreshing the first copy of the firmware.
-
公开(公告)号:US20240330519A1
公开(公告)日:2024-10-03
申请号:US18624775
申请日:2024-04-02
CPC分类号: G06F21/79 , G06F12/0246 , G06F12/0253 , G06F21/54 , G06F21/602 , G06F21/107
摘要: Methods, systems, and devices for purging data from a memory device are described. A memory system may receive, from a host system, a command to write data to an address storing an encryption key in a first portion of the memory system that is configured to store secure information (e.g., a Replay Protected Memory Block). The encryption key may be configured to encrypt data associated with the host system that is stored in a second portion of the memory system. The memory system may then receive an indication of a purge command from the host system. The memory system may execute the purge command by transferring data from the first portion of the memory system to a third portion of the memory system configured to store secure information and erasing the data from the first portion of the memory system.
-
-
-
-
-
-
-
-
-