Check patentability & draft patents in minutes with Patsnap Eureka AI!

Systems and methods of command authorization

A command, unauthorized technology applied in the direction of memory systems, input/output processes for data processing, instruments, etc.

Active Publication Date: 2018-03-09
SANDISK TECH LLC
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to be able to run unauthorized commands, the data storage device may have to exit the current mode of operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods of command authorization
  • Systems and methods of command authorization
  • Systems and methods of command authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] Certain aspects of the present disclosure are described below with reference to the accompanying drawings. In the description, common features are designated by common reference numbers. Although certain examples are described herein with reference to data storage devices, it should be understood that the techniques described herein may be applied to other implementations. Additionally, it should be understood that certain ordinal terms (eg, "first" or "second") may be provided for ease of reference and do not necessarily imply a physical characteristic or order. Accordingly, as used herein, ordinal number terms (e.g., "first," "second," "third," etc.) used to modify an element, such as structure, assembly, operation, etc., do not necessarily denote that the element is relative to another element. Priority or order of an element, but to distinguish that element from another element with the same name (but different use of ordinal terminology). Also, as used herein, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A device includes a non-volatile memory and a controller coupled to the non-volatile memory. The device may be configured according to a mode in which execution of a particular command is unauthorizedwhile the device is configured in the mode. While in the mode, the device may authorize execution of the command to occur during the mod.

Description

technical field [0001] The present disclosure generally relates to command authorization. Background technique [0002] Non-volatile data storage devices such as embedded memory devices and removable memory devices (for example, removable universal serial bus (universal serial bus, USB) flash memory devices and other removable memory cards), it has been considered Increased data and software application portability. Users of non-volatile data storage devices increasingly rely on non-volatile storage devices to store and provide fast access to large amounts of data. [0003] Many data storage devices are capable of operating in a number of different modes. For example, some data storage devices may be operable in command queue mode when the command queue is enabled and not empty. Each mode of operation may be associated with a set of operations that are authorized (eg, allowed) to be executed by the data storage device. The set of authorized commands may not include all c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F13/42
CPCG06F13/4243G06F3/0622G06F3/0659G06F3/0661G06F3/0679G06F21/6218G06F3/0688G06F12/00
Inventor R.哈恩S.科恩A.马尔库
Owner SANDISK TECH LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More