SPARE MEMORY MANAGEMENT IN DATA STORAGE DEVICE

    公开(公告)号:US20240402923A1

    公开(公告)日:2024-12-05

    申请号:US18327691

    申请日:2023-06-01

    Abstract: Aspects of the present disclosure are directed to techniques and procedures for storing data in a data storage device that uses nonvolatile memory (NVM) to store data. The NVM can be organized into logical units that are assigned respective logical unit numbers. The data storage device can report to a host the amount of spare blocks needed for one or more logical units (LUs), and then the host can relinquish some memory blocks to be reallocated as spare blocks. The data storage device can implement a spare block resource management policy per LU and allocate a predetermined amount of spare blocks per LU. The data storage device can implement a spare block resource management policy per memory type and allocate a predetermined amount of spare blocks for LUs with the same memory type.

    MALICIOUS CALL ATTACK DETECTION AND MITIGATION

    公开(公告)号:US20250097341A1

    公开(公告)日:2025-03-20

    申请号:US18469370

    申请日:2023-09-18

    Abstract: Systems and techniques are provided for wireless communications. A process can include determining that a quantity of a plurality of Mobile Terminated (MT) calls received within a first time period is greater than a first configured threshold. A process can include determining a subset of non-verified MT calls from the plurality of MT calls based on a call verification score for each respective MT call of the plurality of MT calls received within the first time period. A process can include determining that a quantity of non-verified MT calls included in the subset is greater than a second configured threshold. A process can include performing modem-level blocking based on determining a corresponding calling party identity associated with a non-verified MT call included in the subset.

    Novel Approach To Protect Hardware Managed Integrated Cryptographic Engine Keys Efficiently While Preventing Data At Rest Attacks

    公开(公告)号:US20240348437A1

    公开(公告)日:2024-10-17

    申请号:US18301305

    申请日:2023-04-17

    CPC classification number: H04L9/088 H04L9/0819

    Abstract: Various embodiments include methods implemented in a processor for management of cryptographic keys of an integrated cryptographic engine. Embodiments may include detecting a cryptographic key access control event, determining whether the cryptographic key access control event is for disabling cryptographic key access at a cryptographic key memory of the integrated cryptographic engine, disabling cryptographic key access at the cryptographic key memory in response to determining that the cryptographic key access control event is for disabling cryptographic key access at the cryptographic key memory, and maintaining one or more cryptographic keys at the cryptographic key memory for which cryptographic key access is disabled. Embodiments may further include enabling cryptographic key access at the cryptographic key memory in response to determining that the cryptographic key access control event is not for disabling cryptographic key access at the cryptographic key memory.

    INTERRUPTING MEMORY ACCESS DURING BACKGROUND OPERATIONS ON A MEMORY DEVICE

    公开(公告)号:US20250013572A1

    公开(公告)日:2025-01-09

    申请号:US18347359

    申请日:2023-07-05

    Abstract: Aspects relate to interrupting memory access during background operations of a memory device. In one example, a host for a memory device includes background operation circuitry configured to permit a background operation by a memory device. The host is coupled to the memory device through a bus. The host receives an operation completed notification from the memory device to indicate that the memory device has completed performing the background operation. Memory access command circuitry is configured to receive a memory access command. The memory access command concerns reading or writing data to the memory device coupled to the host. The memory access command circuitry initiates a wait at the host for the memory access command, and sends the memory access command to the memory device in response to receiving the operation completed notification.

Patent Agency Ranking