Interface for block addressable mass storage system
    1.
    发明专利
    Interface for block addressable mass storage system 有权
    可接地大容量存储系统接口

    公开(公告)号:JP2010049701A

    公开(公告)日:2010-03-04

    申请号:JP2009242886

    申请日:2009-10-21

    Abstract: PROBLEM TO BE SOLVED: To provide a system and method for issuing a refresh cycle which prevents memory cells of a storage device (polymer ferroelectric memory device) from becoming imprinted or stuck in a current state. SOLUTION: A host control interface (HCI) 18 provides a periodic memory refresh cycle to a mass storage to prevent cells from being fixed in a state. A time-based refresh prevents polymer memory devices in cache storage devices 20, 22, ..., 24 and 26 from becoming "imprinted" or stuck in a current state. The HCI 18 provides an initial loop through all addresses at power up, followed by normal access time reads at regular time intervals to ensure that cells do not become imprinted during power on time. COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于发出刷新周期的系统和方法,该刷新周期防止存储装置(聚合物强电介质存储装置)的存储单元在当前状态下被印记或卡住。 解决方案:主机控制接口(HCI)18向大容量存储器提供周期性的存储器刷新周期,以防止在一种状态下固定电池。 基于时间的刷新防止高速缓存存储设备20,22,...,24和26中的聚合物存储器设备变得“印记”或卡在当前状态。 HCI 18在上电时提供所有地址的初始循环,随后以规则的时间间隔读取正常访问时间,以确保单元在上电时不会被压印。 版权所有(C)2010,JPO&INPIT

    METHOD AND APPARATUS TO STORE INITIALIZATION AND CONFIGURATION INFORMATION
    2.
    发明申请
    METHOD AND APPARATUS TO STORE INITIALIZATION AND CONFIGURATION INFORMATION 审中-公开
    存储初始化和配置信息的方法和装置

    公开(公告)号:WO2005066772A3

    公开(公告)日:2006-04-27

    申请号:PCT/US2004039481

    申请日:2004-11-24

    CPC classification number: G06F9/4403 G06F8/60

    Abstract: Briefly, in accordance with an embodiment of the invention, an apparatus and method to store initialization and configuration information is provided. The method may include storing basic input/output system (BIOS) software in a polymer memory. The method may further include copying a first portion of the BIOS software from the polymer memory to a random access memory (RAM) buffer of a memory controller, wherein the RAM buffer has a storage capacity of at least about two kilobytes (KB).

    Abstract translation: 简而言之,根据本发明的实施例,提供了一种用于存储初始化和配置信息的装置和方法。 该方法可以包括将基本输入/输出系统(BIOS)软件存储在聚合物存储器中。 该方法还可以包括将BIOS软件的第一部分从聚合物存储器复制到存储器控制器的随机存取存储器(RAM)缓冲器,其中RAM缓冲器具有至少约两千字节(KB)的存储容量。

    USING DATA STORED IN A DESTRUCTIVE-READ MEMORY
    3.
    发明申请
    USING DATA STORED IN A DESTRUCTIVE-READ MEMORY 审中-公开
    使用存储在破坏性读取存储器中的数据

    公开(公告)号:WO03023578A2

    公开(公告)日:2003-03-20

    申请号:PCT/US0225307

    申请日:2002-08-08

    Applicant: INTEL CORP

    Inventor: GARNEY JOHN

    Abstract: A destructive-read memory is one that the process of reading the memory causes the contents of the memory to be destroyed. Such a memory may be used in devices that are intended to acquire data that may have associated usage restrictions, such as an expiration data, usage count limit, or data access fee for the acquired data. Typically, to enforce usage restrictions, and protect against theft, complex and often costly security techniques are applied to acquired data. With destructive-read memory, complex and constly security is not required for stored data. In one embodiment, a write-back mechanism, which may employ security, is responsible for enforcing usage restrictions. If the write-back mechanism determines continued access to acquired data is allowed, then it writes back the data as it is destructively read from memory.

    Abstract translation: 破坏性读取存储器是读取存储器的过程导致存储器的内容被破坏的存储器。 这样的存储器可以用于旨在获取可能具有相关联的使用限制的数据的设备,例如所获取的数据的到期数据,使用次数限制或数据访问费用。 通常,为了实施使用限制,并防止盗用,复杂且经常昂贵的安全技术应用于所获取的数据。 使用破坏性内存,存储数据不需要复杂且常规的安全性。 在一个实施例中,可采用安全性的回写机制负责执行使用限制。 如果回写机制确定对获取的数据的持续访问是允许的,则它将从内存中破坏性地读取数据。

    4.
    发明专利
    未知

    公开(公告)号:DE60224060D1

    公开(公告)日:2008-01-24

    申请号:DE60224060

    申请日:2002-08-08

    Applicant: INTEL CORP

    Inventor: GARNEY JOHN

    Abstract: A destructive-read memory is one that the process of reading the memory causes the contents of the memory to be destroyed. Such a memory may be used in devices that are intended to acquire data that may have associated usage restrictions, such as an expiration date, usage count limit, or data access fee for the acquired data. Typically, to enforce usage restrictions, and protect against theft, complex and often costly security techniques are applied to acquired data. With destructive-read memory, complex and costly security is not required for stored data. In one embodiment, a write-back mechanism, which may employ security, is responsible for enforcing usage restrictions. If the write-back mechanism determines continued access to acquired data is allowed, then it writes back the data as it is destructively read from the memory.

    6.
    发明专利
    未知

    公开(公告)号:AT381065T

    公开(公告)日:2007-12-15

    申请号:AT02753442

    申请日:2002-08-08

    Applicant: INTEL CORP

    Inventor: GARNEY JOHN

    Abstract: A destructive-read memory is one that the process of reading the memory causes the contents of the memory to be destroyed. Such a memory may be used in devices that are intended to acquire data that may have associated usage restrictions, such as an expiration date, usage count limit, or data access fee for the acquired data. Typically, to enforce usage restrictions, and protect against theft, complex and often costly security techniques are applied to acquired data. With destructive-read memory, complex and costly security is not required for stored data. In one embodiment, a write-back mechanism, which may employ security, is responsible for enforcing usage restrictions. If the write-back mechanism determines continued access to acquired data is allowed, then it writes back the data as it is destructively read from the memory.

    10.
    发明专利
    未知

    公开(公告)号:DE60224060T2

    公开(公告)日:2008-11-20

    申请号:DE60224060

    申请日:2002-08-08

    Applicant: INTEL CORP

    Inventor: GARNEY JOHN

    Abstract: A destructive-read memory is one that the process of reading the memory causes the contents of the memory to be destroyed. Such a memory may be used in devices that are intended to acquire data that may have associated usage restrictions, such as an expiration date, usage count limit, or data access fee for the acquired data. Typically, to enforce usage restrictions, and protect against theft, complex and often costly security techniques are applied to acquired data. With destructive-read memory, complex and costly security is not required for stored data. In one embodiment, a write-back mechanism, which may employ security, is responsible for enforcing usage restrictions. If the write-back mechanism determines continued access to acquired data is allowed, then it writes back the data as it is destructively read from the memory.

Patent Agency Ranking