Event lock storage device
A storage device and event technology, applied in the direction of memory system, memory architecture access/allocation, memory address/allocation/relocation, etc., can solve problems such as file corruption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] As noted above, storage devices may attempt to protect files from deletion by designating files as read-only or hidden. However, under this protection scheme, files can still be corrupted. To improve protection of files, a storage device may designate files as part of an event partition in response to determination of an event. As discussed in more detail below, events may be based on data generated externally of the storage device. When the storage device is notified of an event (either by a command received by the host device or by a determination by the storage device), files may be designated as part of the event partition.
[0020] An event partition may include a different set of access rules than other partition(s) in storage. For example, writing to and / or deletion of files designated as part of an event partition may be disabled or may be allowed only in limited circumstances. An example of a limited situation may include analyzing the age of the storage dev...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


