Abstract:
The present invention presents techniques for transmitting application specific instruction between a host and a memory card. The commands for the application specific protocol are embedded along with a signature in the data portion of a transmission protocol that is used to communicate between the host the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the transmission protocol to still be transmitted in that protocol. The method can be implemented on the host side either at the device driver level or the file level. In order to implement a read command in the application specific protocol, a write command in the first protocol with an embedded read command is first sent to a logical address, followed by a second read command to the same logical address.
Abstract:
The present invention presents techniques for transmitting application specific instruction between a host and a memory card. The commands for the application specific protocol are embedded along with a signature in the data portion of a transmission protocol that is used to communicate between the host the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the transmission protocol to still be transmitted in that protocol. The method can be implemented on the host side either at the device driver level or the file level. In order to implement a read command in the application specific protocol, a write command in the first protocol with an embedded read command is first sent to a logical address, followed by a second read command to the same logical address.
Abstract:
A dry tissue sealant composition is provided, wherein composition includes a matrix scaffold coated with an adhesive layer, which is adherent to a tissue only upon contact with an aqueous solution such as blood or tissue fluid. Also provided are methods of making and using such a dry tissue sealant.
Abstract:
The invention relates to recombinant gelatins, and to recombinant gelatins useful in gelatin capsule manufacture, and to compositions, gelatin capsules, and gelatin films comprising these, as well as methods of production.
Abstract:
Method and apparatus for performing wear leveling in a non-volatile memory system are disclosed. According to one aspect of the present invention, one method for processing elements included in a non-volatile memory of a memory system includes obtaining erase counts associated with elements and grouping a number of the elements into a first set. Each element has an associated erase count that substantially indicates a number of times the element has been erased. Grouping the number of elements into the first set includes selecting elements included in the plurality of elements which have the lowest associated erase counts of the erase counts associated with the plurality of elements. The method also includes storing the erase counts associated with the first set in a memory component substantially within a table.
Abstract:
Methods and apparatus for managing erase counts in a non-volatile memory system. According to one aspect of the present invention, a method for initializing an erase count block in a system memory of a non-volatile memory system, the non-volatile memory system which includes a non-volatile memory involves allocating a plurality of pages within the system memory that are divided into a plurality of entries. Each entry of the plurality of entries has an associated block in the non-volatile memory. The method also includes identifying usable blocks which are suitable for use in accepting user data, and storing values in each entry which is associated with a usable block. Storing the values in each entry which is associated with a usable block substantially identifies the usable block as being usable.
Abstract:
Methods and apparatus for enabling protected contents such as device keys to be stored on a reader are disclosed. According to one aspect of the present invention, a method for accessing a memory storage device that includes a memory and is coupled to a host system through an adapter, the memory storage device including a memory includes obtaining a key from the adapter. The key is suitable for encrypting information that is arranged to be stored in the memory, and is also suitable for decrypting the encrypted information. The method also includes processing the information using the key. In one embodiment, the information is stored in the memory, and the obtaining the information that is stored in the memory by processing the information such that the information may be decrypted using the key.
Abstract:
Methods of storing and accessing data using a header portion of a file are disclosed. In an embodiment, a method of storing content in a non-volatile memory is disclosed. The method includes reading a content file including media content and including a trailer, storing information related to the trailer together with secure data in a header portion of a file, and storing the file to a storage element of the non-volatile memory or a memory area of a host device coupled to the non-volatile memory device.
Abstract:
Methods, systems, and computing devices for interfacing with the memory card are provided. In one method, a selection of a program instruction is provided, and the program instruction associated with the selection is read from the memory card. The program instruction thereafter is executed. In one system, a memory, a memory card, a processor, and a power supply are provided. The memory is configured to store a program instruction driver and the memory card is configured to store a program instruction. The power supply is configured to generate a voltage and is connected to the processor. The processor, which is in communication with the memory and the memory card, is configured to execute the program instruction driver stored in the memory. The program instruction driver comprises program instructions for providing a selection of the program instruction, reading the program instruction associated with the selection, and executing the program instruction.