Data storage device detecting read-before-write conditions and returning configurable return data

Information

  • Patent Grant
  • 9164694
  • Patent Number
    9,164,694
  • Date Filed
    Wednesday, June 19, 2013
    11 years ago
  • Date Issued
    Tuesday, October 20, 2015
    9 years ago
Abstract
Disclosed herein is a data storage device comprising data storage media comprising a plurality of data sectors and control circuitry programmed to: receive a command from a host to cryptographically erase at least a portion of data stored on the data storage media; execute a cryptographic erase; receive a read command from the host to read a data sector in the data storage media; determine if the data sector has been cryptographically erased; and return configurable return data to the host in response to determining that the data sector has been cryptographically erased.
Description
BACKGROUND

Certain data storage devices may support a cryptographic erase feature whereby data is encrypted with a key and rendered inaccessible (effectively erased) by deleting the key used for such encryption.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1A shows a data storage device according to an embodiment.



FIG. 1B is a flow diagram showing a method executed by the control circuitry of the data storage device according to an embodiment.



FIG. 2 illustrates example data path protection information according to an embodiment.



FIGS. 3A-3C illustrate various data processing scenarios including the read-before-write scenario according to an embodiment.



FIG. 4 is a flow chart illustrating a method of reading data from the data storage device and performing various related checks according to an embodiment.



FIG. 5 is a flow chart illustrating a method of writing data to the data storage device and performing various related checks according to an embodiment.





DETAILED DESCRIPTION


FIG. 1A shows a data storage device 8 according to an embodiment. In an embodiment, the data storage device 8 comprises magnetic recording media such as a disk 2 comprising a plurality of servo tracks 22 defined by servo sectors 240-24N, a head 4 actuated over the disk 2, and control circuitry 10 comprising a servo control system operable to servo the head 4 over the disk 2. In the embodiment of FIG. 1A, the control circuitry 24 processes a read signal 26 emanating from the head 4 to demodulate the servo sectors 240-24N and generate a position error signal (PES) representing an error between the actual position of the head and a target position relative to a target track. The control circuitry 10 filters the PES using a suitable compensation filter to generate a control signal 28 applied to a voice coil motor (VCM) 30 which rotates an actuator arm 32 about a pivot in order to actuate the head 4 radially over the disk 2 in a direction that reduces the PES. The servo sectors 240-24N may comprise any suitable head position information, such as a track address for coarse positioning and servo bursts for fine positioning. The servo bursts may comprise any suitable pattern, such as an amplitude based servo pattern or a phase based servo pattern.


In another embodiment, the control circuitry 10 is configured to read data from, and write data to, a solid-state memory media 38, either in addition to, or in place of, magnetic recording media such as disk 2. Thus, the data storage device 8 may comprise one or more of: (1) the disk 2 and the associated servo-mechanical system and (2) the solid-state memory 38 and the associated circuitry.


In an embodiment, the control circuitry 10 is operable to execute the method shown in the flow diagram of FIG. 1B. At block 42, a command is received from a host to cryptographically erase at least a portion of data stored on the data storage media (e.g., disk 2 or solid state memory 38). The cryptographic erase command may result in the cryptographic erasure of all user data in the data storage device. At block 44, in response to the host command, a cryptographic erase is executed in the data storage device. At block 46, a read command from the host to read a data sector is received by the data storage device. At block 48, it is determined if the requested data sector has been cryptographically erased. At block 50, configurable return data is returned to the host in response to determining that the data sector has been cryptographically erased. This situation in which cryptographic erased data is requested in a read command before it is overwritten is referred to as a “read-before-write” condition.


In an embodiment, the control circuitry is further programmed to decrypt data stored in the data sector based on a key and determine that the data sector has been cryptographically erased when the decryption fails. As will be explained further below in conjunction with FIGS. 3A-3C and 4, when the key has been invalidated and no hardware error has been detected, this constitutes a read-before-write condition.


The configurable return data that is returned to the host may take on several forms in various embodiments. In an embodiment, the control circuitry is configured to return scrambled data as the configurable return data. The scrambled data may be generated by decrypting data written to the data sector with a different key than the key used for encryption just prior to writing the data to the data sector. In another embodiment, the configurable return data may include a data path protection tag that identifies the returned data as configurable return data instead of user data read from the data sector. The data path protection tag may be defined according to a standard such as the Small Computer System Interface (SCSI) T10 standard, and the tag may include SCSI T10 protection information.



FIG. 2 illustrates example data path protection information according to an embodiment. As shown in table 52, each field (user data, logical block guard (LBG), application tag, and reference tag) may include several configurable options. For example, in the user data field, configurable return data may be configured such that either scrambled data or a fixed identifier is returned as the “user data” when a cryptographic erase condition is encountered. Similarly, configurable return data may be configured such that scrambled data, a fixed identifier, or CRC information may be returned under the LBG field. The same could be configured for the other fields shown and so on. The various options under each field can be combined, so that the configurable return data can be highly customizable to suit the expectation of the host. In an embodiment, the configurable return data may be configured so that the host can discern, through the configurable return data, that a read-before-write condition has occurred, and take appropriate error handling actions. The individual options may also indicate to the host additional identifying information such as drive identifier, sector identifier, etc. to aid in the error handling actions. In some embodiments, the configurable return data may be configured to meet backward compatibility requirements of the host system.



FIGS. 3A-3C illustrate various data processing scenarios including the read-before-write scenario according to an embodiment. FIG. 3A illustrates a normal read scenario. Under this scenario, first, when the data is read from the media, a check indicates a valid physical block of data has been accessed. Second, another check indicates a valid logical block of data has been accessed. This logical block check is typically performed pre-decryption. Third, another check indicates that no hardware decryption error has been detected during the decryption process. Finally, a post-decryption logical block check also verifies that a valid logical block has been accessed. When these checks indicate that these conditions are verified, the data retrieved from the media (user data) is returned to the host as part of a normal read operation.


In the read-before-write scenario shown in FIG. 3B, the physical block, logical block, and hardware decryption condition check results are identical to the normal read scenario. However, the post-decryption logical block check indicates that an invalid logical block has been accessed. In an embodiment, an error detection code (EDC) is seeded with a logical block address at the time of writing, and that EDC does not verify correctly post-decryption, indicating that an error has occurred. This could occur, if a cryptographic erase has taken place between initial writing and the read, and as a result the key used to encrypt the original data is no longer available for decryption. This read-before-write scenario is contrasted with a normal read error scenario shown in FIG. 3C, where, in addition to the failed logical block check post-decryption, a hardware decryption error has also been detected.



FIG. 4 is a flow chart illustrating a method of reading data from the data storage device and performing various related checks according to an embodiment. In an embodiment, the data path protection and decryptor checking method 62 is performed by the control circuitry 10 of the data storage device 8. The method 62 in an embodiment is performed as part of a read operation in a data storage device that implements encryption. At block 64, the control circuitry checks whether it has accessed a valid physical block of data. In an embodiment, this check includes checking an EDC that was PBA (physical block address) seeded at the time of writing to see if the recovered PBA matches the expected value. If not, the method ends at the failure block 80, where an error handling mechanism may be triggered. Otherwise, an additional check is performed to determine whether the valid logical block of data has been read. This may include checking whether an EDC that was LBA seeded at the time of writing verifies correctly. If the check fails, again the method ends at the failure block 80.


Otherwise, if the check at block 66 verifies correctly, a dual decryptor is used at block 68 in an embodiment, and the results from both decryptors are compared to each other at block 70 to ensure that the decryption executed properly. The use of a dual decryptor in an embodiment enables a high-confidence confirmation of a good decryption without errors. This aids in the detection of a read-before-write condition by distinguishing a scenario that is caused by a hardware decryption error from one caused by a key change. If no decryption error is detected, then at block 72 an additional check is performed. In an embodiment, this check includes checking an EDC that was LBA seeded at the time of writing to see if the recovered LBA post decryption matches the expected value. If the check verifies correctly, this means that a cryptographic erase has not taken place. Finally, the read data is returned to the host at block 76. If an error is found at block 72, a read-before-write condition has been detected and configurable return data is returned to the host as described above.



FIG. 5 is a flow chart illustrating a method of writing data to the data storage device and performing various related checks according to an embodiment. In an embodiment, the data path protection and encryptor checking method 92 is performed by the control circuitry 10 of the data storage device 8. The method 92 in an embodiment is performed as part of a write operation in a data storage device that implements encryption, and may be complementary to the method 62 shown in FIG. 4. At block 94, the control circuitry checks whether a data buffer error has been encountered. The check includes checking error detection code (EDC) data as the data is read from the buffer in anticipation of writing to the media. In one embodiment, the same EDC is carried with the data to be written throughout the remainder of the process. If the check fails, the method ends at the failure block 106, where an error handling mechanism may be triggered. If the check at block 94 verifies correctly, a dual encryptor is used at block 96, and the results from both encryptors are compared to each other at block 98 to ensure that the encryption executed properly. The use of a dual encryptor in an embodiment enables a high-confidence confirmation of a good encryption without errors. If no encryption error is detected, then at block 100 an LBA seeded EDC is generated and appended to the data. Then, at block 102 an PBA seeded EDC is generated and appended to the data. The data, with the appended EDC information, are then written to the media in block 104.


Those skilled in the art will appreciate that in some embodiments, other types of data storage devices can be implemented. In addition, the actual steps taken in the processes shown in FIGS. 1B, 4, and 5 may differ from those shown in the figures. Depending on the embodiment, certain of the steps described above may be removed, others may be added. While certain embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of protection. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms. Furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made.


The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the protection. For example, the various components illustrated in the figures may be implemented as software and/or firmware executed by a processor, ASIC/FPGA, or dedicated hardware. For example, the actions described as performed by the control circuitry could be implemented as being performed by software and/or firmware executed by a processor, ASIC/FPGA, or dedicated hardware. Also, the features and attributes of the specific embodiments disclosed above may be combined in different ways to form additional embodiments, all of which fall within the scope of the present disclosure. Although the present disclosure provides certain preferred embodiments and applications, other embodiments that are apparent to those of ordinary skill in the art, including embodiments which do not provide all of the features and advantages set forth herein, are also within the scope of this disclosure. Accordingly, the scope of the present disclosure is intended to be defined only by reference to the appended claims.

Claims
  • 1. A data storage device comprising: data storage media comprising a plurality of data sectors; andcontrol circuitry programmed to: receive a command from a host to cryptographically erase at least a portion of data stored on the data storage media;execute a cryptographic erase;receive a read command from the host to read a data sector in the data storage media, wherein the read command comprises a logical block address (LBA);map the LBA to a physical block address (PBA) representing the data sector;use the PBA to read the data sector from the storage media to generate read data;decrypt the read data to generate decrypted read data;execute a data path protection check on the decrypted read data using at least one of the LBA and the PBA;when the data path protection check fails, determine that the data sector has been cryptographically erased; andreturn configurable return data to the host in response to determining that the data sector has been cryptographically erased.
  • 2. The data storage device as recited in claim 1, wherein the control circuitry is further programmed to: decrypt data stored in the data sector based on a key; anddetermine that the data sector has been cryptographically erased when a read-before-write condition is detected.
  • 3. The data storage device as recited in claim 2, wherein the read-before-write condition is detected when the key has been invalidated and no hardware error has been detected.
  • 4. The data storage device as recited in claim 1, wherein the configurable return data comprises scrambled data.
  • 5. The data storage device as recited in claim 4, wherein the control circuitry is further configured to generated the scrambled data by decrypting data written to the data sector with a different key than the one used for encryption prior to writing the data to the data sector.
  • 6. The data storage device as recited in claim 1, wherein the control circuitry is further configured to return a data path protection tag that identifies the returned data as configurable return data instead of data read from the data sector.
  • 7. The data storage device as recited in claim 6, wherein the data storage device supports a Small Computer System Interface (SCSI) and the data path protection tag comprises SCSI T10 protection information.
  • 8. The data storage device as recited in claim 1, wherein the data storage media comprises at least one of: magnetic recording media; andsolid-state non-volatile memory media.
  • 9. The data storage device as recited in claim 1, wherein the data path protection check comprises generating an error detection code (EDC) over at least part of the decrypted read data based on the LBA received in the read command.
  • 10. A method for managing data in a data storage device that comprises data storage media comprising a plurality of data sectors, the method comprising: receiving a command from a host to cryptographically erase at least a portion of data stored on the data storage media;executing a cryptographic erase;receiving a read command from the host to read a data sector in the data storage media, wherein the read command comprises a logical block address (LBA);mapping the LBA to a physical block address (PBA) representing the data sector;using the PBA to read the data sector from the storage media to generate read data;decrypting the read data to generate decrypted read data;executing a data path protection check on the decrypted read data using at least one of the LBA and the PBA;when the data path protection check fails, determining that the data sector has been cryptographically erased; andreturning configurable return data to the host in response to determining that the data sector has been cryptographically erased.
  • 11. The method as recited in claim 10, further comprising: decrypting data stored in the data sector based on a key; anddetermining that the data sector has been cryptographically erased when a read-before-write condition is detected.
  • 12. The method as recited in claim 11, wherein the read-before-write condition is detected when the key has been invalidated and no hardware error has been detected.
  • 13. The method as recited in claim 10, wherein the configurable return data comprises scrambled data.
  • 14. The method as recited in claim 13, further comprising generating the scrambled data by decrypting data written to the data sector with a different key than the one used for encryption prior to writing the data to the data sector.
  • 15. The method as recited in claim 10, wherein returning the configurable return data comprises returning a data path protection tag that identifies the returned data as configurable return data instead of data read from the data sector.
  • 16. The method as recited in claim 15, wherein the data storage device supports a Small Computer System Interface (SCSI) and the data path protection tag comprises SCSI T10 protection information.
  • 17. The method as recited in claim 10, wherein the data storage media comprises at least one of: magnetic recording media; andsolid-state non-volatile memory media.
  • 18. The method as recited in claim 10, wherein the data path protection check comprises generating an error detection code (EDC) over at least part of the decrypted read data based on the LBA received in the read command.
US Referenced Citations (427)
Number Name Date Kind
6018789 Sokolov et al. Jan 2000 A
6065095 Sokolov et al. May 2000 A
6078452 Kittilson et al. Jun 2000 A
6081447 Lofgren et al. Jun 2000 A
6092149 Hicken et al. Jul 2000 A
6092150 Sokolov et al. Jul 2000 A
6094707 Sokolov et al. Jul 2000 A
6105104 Guttmann et al. Aug 2000 A
6111717 Cloke et al. Aug 2000 A
6145052 Howe et al. Nov 2000 A
6175893 D'Souza et al. Jan 2001 B1
6178056 Cloke et al. Jan 2001 B1
6191909 Cloke et al. Feb 2001 B1
6195218 Guttmann et al. Feb 2001 B1
6205494 Williams Mar 2001 B1
6208477 Cloke et al. Mar 2001 B1
6223303 Billings et al. Apr 2001 B1
6230233 Lofgren et al. May 2001 B1
6246346 Cloke et al. Jun 2001 B1
6249393 Billings et al. Jun 2001 B1
6256695 Williams Jul 2001 B1
6262857 Hull et al. Jul 2001 B1
6263459 Schibilla Jul 2001 B1
6272694 Weaver et al. Aug 2001 B1
6278568 Cloke et al. Aug 2001 B1
6279089 Schibilla et al. Aug 2001 B1
6289484 Rothberg et al. Sep 2001 B1
6292912 Cloke et al. Sep 2001 B1
6310740 Dunbar et al. Oct 2001 B1
6317850 Rothberg Nov 2001 B1
6327106 Rothberg Dec 2001 B1
6337778 Gagne Jan 2002 B1
6369969 Christiansen et al. Apr 2002 B1
6384999 Schibilla May 2002 B1
6388833 Golowka et al. May 2002 B1
6405342 Lee Jun 2002 B1
6408357 Hanmann et al. Jun 2002 B1
6408406 Parris Jun 2002 B1
6411452 Cloke Jun 2002 B1
6411458 Billings et al. Jun 2002 B1
6412083 Rothberg et al. Jun 2002 B1
6415349 Hull et al. Jul 2002 B1
6425128 Krapf et al. Jul 2002 B1
6441981 Cloke et al. Aug 2002 B1
6442328 Elliott et al. Aug 2002 B1
6445524 Nazarian et al. Sep 2002 B1
6449767 Krapf et al. Sep 2002 B1
6453115 Boyle Sep 2002 B1
6470420 Hospodor Oct 2002 B1
6480020 Jung et al. Nov 2002 B1
6480349 Kim et al. Nov 2002 B1
6480932 Vallis et al. Nov 2002 B1
6483986 Krapf Nov 2002 B1
6487032 Cloke et al. Nov 2002 B1
6490635 Holmes Dec 2002 B1
6493173 Kim et al. Dec 2002 B1
6499083 Hamlin Dec 2002 B1
6519104 Cloke et al. Feb 2003 B1
6525892 Dunbar et al. Feb 2003 B1
6545830 Briggs et al. Apr 2003 B1
6546489 Frank, Jr. et al. Apr 2003 B1
6550021 Dalphy et al. Apr 2003 B1
6552880 Dunbar et al. Apr 2003 B1
6553457 Wilkins et al. Apr 2003 B1
6578106 Price Jun 2003 B1
6580573 Hull et al. Jun 2003 B1
6594183 Lofgren et al. Jul 2003 B1
6600620 Krounbi et al. Jul 2003 B1
6601137 Castro et al. Jul 2003 B1
6603622 Christiansen et al. Aug 2003 B1
6603625 Hospodor et al. Aug 2003 B1
6604220 Lee Aug 2003 B1
6606682 Dang et al. Aug 2003 B1
6606714 Thelin Aug 2003 B1
6606717 Yu et al. Aug 2003 B1
6611393 Nguyen et al. Aug 2003 B1
6615312 Hamlin et al. Sep 2003 B1
6639748 Christiansen et al. Oct 2003 B1
6647481 Luu et al. Nov 2003 B1
6654193 Thelin Nov 2003 B1
6657810 Kupferman Dec 2003 B1
6661591 Rothberg Dec 2003 B1
6665772 Hamlin Dec 2003 B1
6687073 Kupferman Feb 2004 B1
6687078 Kim Feb 2004 B1
6687850 Rothberg Feb 2004 B1
6690523 Nguyen et al. Feb 2004 B1
6690882 Hanmann et al. Feb 2004 B1
6691198 Hamlin Feb 2004 B1
6691213 Luu et al. Feb 2004 B1
6691255 Rothberg et al. Feb 2004 B1
6693760 Krounbi et al. Feb 2004 B1
6694477 Lee Feb 2004 B1
6697914 Hospodor et al. Feb 2004 B1
6704153 Rothberg et al. Mar 2004 B1
6708251 Boyle et al. Mar 2004 B1
6710951 Cloke Mar 2004 B1
6711628 Thelin Mar 2004 B1
6711635 Wang Mar 2004 B1
6711660 Milne et al. Mar 2004 B1
6715044 Lofgren et al. Mar 2004 B2
6724982 Hamlin Apr 2004 B1
6725329 Ng et al. Apr 2004 B1
6735650 Rothberg May 2004 B1
6735693 Hamlin May 2004 B1
6744772 Eneboe et al. Jun 2004 B1
6745283 Dang Jun 2004 B1
6751402 Elliott et al. Jun 2004 B1
6757481 Nazarian et al. Jun 2004 B1
6772281 Hamlin Aug 2004 B2
6781826 Goldstone et al. Aug 2004 B1
6782449 Codilian et al. Aug 2004 B1
6791779 Singh et al. Sep 2004 B1
6792486 Hanan et al. Sep 2004 B1
6799274 Hamlin Sep 2004 B1
6811427 Garrett et al. Nov 2004 B2
6826003 Subrahmanyam Nov 2004 B1
6826614 Hanmann et al. Nov 2004 B1
6832041 Boyle Dec 2004 B1
6832929 Garrett et al. Dec 2004 B2
6845405 Thelin Jan 2005 B1
6845427 Atai-Azimi Jan 2005 B1
6850443 Lofgren et al. Feb 2005 B2
6851055 Boyle et al. Feb 2005 B1
6851063 Boyle et al. Feb 2005 B1
6853731 Boyle et al. Feb 2005 B1
6854022 Thelin Feb 2005 B1
6862660 Wilkins et al. Mar 2005 B1
6880043 Castro et al. Apr 2005 B1
6882486 Kupferman Apr 2005 B1
6884085 Goldstone Apr 2005 B1
6888831 Hospodor et al. May 2005 B1
6892217 Hanmann et al. May 2005 B1
6892249 Codilian et al. May 2005 B1
6892313 Codilian et al. May 2005 B1
6895455 Rothberg May 2005 B1
6895500 Rothberg May 2005 B1
6898730 Hanan May 2005 B1
6910099 Wang et al. Jun 2005 B1
6928470 Hamlin Aug 2005 B1
6931439 Hanmann et al. Aug 2005 B1
6934104 Kupferman Aug 2005 B1
6934713 Schwartz et al. Aug 2005 B2
6940873 Boyle et al. Sep 2005 B2
6943978 Lee Sep 2005 B1
6948165 Luu et al. Sep 2005 B1
6950267 Liu et al. Sep 2005 B1
6954733 Ellis et al. Oct 2005 B1
6961814 Thelin et al. Nov 2005 B1
6965489 Lee et al. Nov 2005 B1
6965563 Hospodor et al. Nov 2005 B1
6965966 Rothberg et al. Nov 2005 B1
6967799 Lee Nov 2005 B1
6968422 Codilian et al. Nov 2005 B1
6968450 Rothberg et al. Nov 2005 B1
6973495 Milne et al. Dec 2005 B1
6973570 Hamlin Dec 2005 B1
6976190 Goldstone Dec 2005 B1
6983316 Milne et al. Jan 2006 B1
6986007 Procyk et al. Jan 2006 B1
6986154 Price et al. Jan 2006 B1
6995933 Codilian et al. Feb 2006 B1
6996501 Rothberg Feb 2006 B1
6996669 Dang et al. Feb 2006 B1
7002926 Eneboe et al. Feb 2006 B1
7003674 Hamlin Feb 2006 B1
7006316 Sargenti, Jr. et al. Feb 2006 B1
7009820 Hogg Mar 2006 B1
7023639 Kupferman Apr 2006 B1
7024491 Hanmann et al. Apr 2006 B1
7024549 Luu et al. Apr 2006 B1
7024614 Thelin et al. Apr 2006 B1
7027716 Boyle et al. Apr 2006 B1
7028174 Atai-Azimi et al. Apr 2006 B1
7031902 Catiller Apr 2006 B1
7046465 Kupferman May 2006 B1
7046488 Hogg May 2006 B1
7050252 Vallis May 2006 B1
7054937 Milne et al. May 2006 B1
7055000 Severtson May 2006 B1
7055167 Masters May 2006 B1
7057836 Kupferman Jun 2006 B1
7062398 Rothberg Jun 2006 B1
7075746 Kupferman Jul 2006 B1
7076604 Thelin Jul 2006 B1
7082494 Thelin et al. Jul 2006 B1
7088538 Codilian et al. Aug 2006 B1
7088545 Singh et al. Aug 2006 B1
7092186 Hogg Aug 2006 B1
7095577 Codilian et al. Aug 2006 B1
7099095 Subrahmanyam et al. Aug 2006 B1
7106537 Bennett Sep 2006 B1
7106947 Boyle et al. Sep 2006 B2
7110202 Vasquez Sep 2006 B1
7111116 Boyle et al. Sep 2006 B1
7114029 Thelin Sep 2006 B1
7120737 Thelin Oct 2006 B1
7120806 Codilian et al. Oct 2006 B1
7126776 Warren, Jr. et al. Oct 2006 B1
7129763 Bennett et al. Oct 2006 B1
7133600 Boyle Nov 2006 B1
7136244 Rothberg Nov 2006 B1
7146094 Boyle Dec 2006 B1
7149046 Coker et al. Dec 2006 B1
7150036 Milne et al. Dec 2006 B1
7155616 Hamlin Dec 2006 B1
7171108 Masters et al. Jan 2007 B1
7171110 Wilshire Jan 2007 B1
7194576 Boyle Mar 2007 B1
7200698 Rothberg Apr 2007 B1
7205805 Bennett Apr 2007 B1
7206497 Boyle et al. Apr 2007 B1
7215496 Kupferman et al. May 2007 B1
7215771 Hamlin May 2007 B1
7237054 Cain et al. Jun 2007 B1
7240161 Boyle Jul 2007 B1
7249365 Price et al. Jul 2007 B1
7263709 Krapf Aug 2007 B1
7274639 Codilian et al. Sep 2007 B1
7274659 Hospodor Sep 2007 B2
7275116 Hanmann et al. Sep 2007 B1
7280302 Masiewicz Oct 2007 B1
7292774 Masters et al. Nov 2007 B1
7292775 Boyle et al. Nov 2007 B1
7296284 Price et al. Nov 2007 B1
7302501 Cain et al. Nov 2007 B1
7302579 Cain et al. Nov 2007 B1
7318088 Mann Jan 2008 B1
7319806 Willner et al. Jan 2008 B1
7325244 Boyle et al. Jan 2008 B2
7330323 Singh et al. Feb 2008 B1
7346790 Klein Mar 2008 B1
7366641 Masiewicz et al. Apr 2008 B1
7369340 Dang et al. May 2008 B1
7369343 Yeo et al. May 2008 B1
7372650 Kupferman May 2008 B1
7380147 Sun May 2008 B1
7392340 Dang et al. Jun 2008 B1
7404013 Masiewicz Jul 2008 B1
7406545 Rothberg et al. Jul 2008 B1
7415571 Hanan Aug 2008 B1
7436610 Thelin Oct 2008 B1
7437502 Coker Oct 2008 B1
7440214 Ell et al. Oct 2008 B1
7451344 Rothberg Nov 2008 B1
7471483 Ferris et al. Dec 2008 B1
7471486 Coker et al. Dec 2008 B1
7486060 Bennett Feb 2009 B1
7496493 Stevens Feb 2009 B1
7512812 Sohn Mar 2009 B2
7518819 Yu et al. Apr 2009 B1
7526184 Parkinen et al. Apr 2009 B1
7539924 Vasquez et al. May 2009 B1
7543117 Hanan Jun 2009 B1
7551383 Kupferman Jun 2009 B1
7562282 Rothberg Jul 2009 B1
7577973 Kapner, III et al. Aug 2009 B1
7596797 Kapner, III et al. Sep 2009 B1
7599139 Bombet et al. Oct 2009 B1
7619841 Kupferman Nov 2009 B1
7647544 Masiewicz Jan 2010 B1
7649704 Bombet et al. Jan 2010 B1
7653927 Kapner, III et al. Jan 2010 B1
7656603 Xing Feb 2010 B1
7656763 Jin et al. Feb 2010 B1
7657149 Boyle Feb 2010 B2
7672072 Boyle et al. Mar 2010 B1
7673075 Masiewicz Mar 2010 B1
7688540 Mei et al. Mar 2010 B1
7724461 McFadyen et al. May 2010 B1
7725584 Hanmann et al. May 2010 B1
7730295 Lee Jun 2010 B1
7760458 Trinh Jul 2010 B1
7768776 Szeremeta et al. Aug 2010 B1
7804657 Hogg et al. Sep 2010 B1
7813954 Price et al. Oct 2010 B1
7827320 Stevens Nov 2010 B1
7839588 Dang et al. Nov 2010 B1
7843660 Yeo Nov 2010 B1
7852596 Boyle et al. Dec 2010 B2
7859782 Lee Dec 2010 B1
7872822 Rothberg Jan 2011 B1
7898756 Wang Mar 2011 B1
7898762 Guo et al. Mar 2011 B1
7900037 Fallone et al. Mar 2011 B1
7907364 Boyle et al. Mar 2011 B2
7929234 Boyle et al. Apr 2011 B1
7933087 Tsai et al. Apr 2011 B1
7933090 Jung et al. Apr 2011 B1
7934030 Sargenti, Jr. et al. Apr 2011 B1
7940491 Szeremeta et al. May 2011 B2
7944639 Wang May 2011 B1
7945727 Rothberg et al. May 2011 B2
7949564 Hughes et al. May 2011 B1
7974029 Tsai et al. Jul 2011 B2
7974039 Xu et al. Jul 2011 B1
7982993 Tsai et al. Jul 2011 B1
7984200 Bombet et al. Jul 2011 B1
7990648 Wang Aug 2011 B1
7992179 Kapner, III et al. Aug 2011 B1
8004785 Tsai et al. Aug 2011 B1
8006027 Stevens et al. Aug 2011 B1
8014094 Jin Sep 2011 B1
8014977 Masiewicz et al. Sep 2011 B1
8019914 Vasquez et al. Sep 2011 B1
8040625 Boyle et al. Oct 2011 B1
8078943 Lee Dec 2011 B1
8079045 Krapf et al. Dec 2011 B2
8082433 Fallone et al. Dec 2011 B1
8085487 Jung et al. Dec 2011 B1
8089719 Dakroub Jan 2012 B1
8090902 Bennett et al. Jan 2012 B1
8090906 Blaha et al. Jan 2012 B1
8091112 Elliott et al. Jan 2012 B1
8094396 Zhang et al. Jan 2012 B1
8094401 Peng et al. Jan 2012 B1
8116020 Lee Feb 2012 B1
8116025 Chan et al. Feb 2012 B1
8134793 Vasquez et al. Mar 2012 B1
8134798 Thelin et al. Mar 2012 B1
8139301 Li et al. Mar 2012 B1
8139310 Hogg Mar 2012 B1
8144419 Liu Mar 2012 B1
8145452 Masiewicz et al. Mar 2012 B1
8149528 Suratman et al. Apr 2012 B1
8154812 Boyle et al. Apr 2012 B1
8159768 Miyamura Apr 2012 B1
8161328 Wilshire Apr 2012 B1
8164849 Szeremeta et al. Apr 2012 B1
8171282 Amann et al. May 2012 B2
8174780 Tsai et al. May 2012 B1
8190575 Ong et al. May 2012 B1
8194338 Zhang Jun 2012 B1
8194340 Boyle et al. Jun 2012 B1
8194341 Boyle Jun 2012 B1
8201066 Wang Jun 2012 B1
8271692 Dinh et al. Sep 2012 B1
8279550 Hogg Oct 2012 B1
8281218 Ybarra et al. Oct 2012 B1
8285923 Stevens Oct 2012 B2
8289656 Huber Oct 2012 B1
8305705 Roohr Nov 2012 B1
8307156 Codilian et al. Nov 2012 B1
8310775 Boguslawski et al. Nov 2012 B1
8315006 Chahwan et al. Nov 2012 B1
8316263 Gough et al. Nov 2012 B1
8320067 Tsai et al. Nov 2012 B1
8324974 Bennett Dec 2012 B1
8332695 Dalphy et al. Dec 2012 B2
8341337 Ong et al. Dec 2012 B1
8347110 Pelletier et al. Jan 2013 B2
8350628 Bennett Jan 2013 B1
8356184 Meyer et al. Jan 2013 B1
8370683 Ryan et al. Feb 2013 B1
8375225 Ybarra Feb 2013 B1
8375274 Bonke Feb 2013 B1
8380922 DeForest et al. Feb 2013 B1
8390948 Hogg Mar 2013 B2
8390952 Szeremeta Mar 2013 B1
8392689 Lott Mar 2013 B1
8407393 Yolar et al. Mar 2013 B1
8413010 Vasquez et al. Apr 2013 B1
8417566 Price et al. Apr 2013 B2
8421663 Bennett Apr 2013 B1
8422172 Dakroub et al. Apr 2013 B1
8427771 Tsai Apr 2013 B1
8429343 Tsai Apr 2013 B1
8433937 Wheelock et al. Apr 2013 B1
8433977 Vasquez et al. Apr 2013 B1
8458526 Dalphy et al. Jun 2013 B2
8462466 Huber Jun 2013 B2
8467151 Huber Jun 2013 B1
8489841 Strecke et al. Jul 2013 B1
8493679 Boguslawski et al. Jul 2013 B1
8498074 Mobley et al. Jul 2013 B1
8499198 Messenger et al. Jul 2013 B1
8512049 Huber et al. Aug 2013 B1
8514506 Li et al. Aug 2013 B1
8531791 Reid et al. Sep 2013 B1
8554741 Malina Oct 2013 B1
8560759 Boyle et al. Oct 2013 B1
8565053 Chung Oct 2013 B1
8576511 Coker et al. Nov 2013 B1
8578100 Huynh et al. Nov 2013 B1
8578242 Burton et al. Nov 2013 B1
8589773 Wang et al. Nov 2013 B1
8593753 Anderson Nov 2013 B1
8595432 Vinson et al. Nov 2013 B1
8599510 Fallone Dec 2013 B1
8601248 Thorsted Dec 2013 B2
8611032 Champion et al. Dec 2013 B2
8612650 Carrie et al. Dec 2013 B1
8612706 Madril et al. Dec 2013 B1
8612798 Tsai Dec 2013 B1
8619383 Jung et al. Dec 2013 B1
8621115 Bombet et al. Dec 2013 B1
8621133 Boyle Dec 2013 B1
8626463 Stevens et al. Jan 2014 B2
8630052 Jung et al. Jan 2014 B1
8630056 Ong Jan 2014 B1
8631188 Heath et al. Jan 2014 B1
8634158 Chahwan et al. Jan 2014 B1
8635412 Wilshire Jan 2014 B1
8640007 Schulze Jan 2014 B1
8654619 Cheng Feb 2014 B1
8661193 Cobos et al. Feb 2014 B1
8667248 Neppalli Mar 2014 B1
8670205 Malina et al. Mar 2014 B1
8683295 Syu et al. Mar 2014 B1
8683457 Hughes et al. Mar 2014 B1
8687306 Coker et al. Apr 2014 B1
8693133 Lee et al. Apr 2014 B1
8694841 Chung et al. Apr 2014 B1
8838950 Craft et al. Sep 2014 B2
8909942 Obukhov et al. Dec 2014 B1
20060053288 Stern et al. Mar 2006 A1
20080155275 Natarajan et al. Jun 2008 A1
20090113702 Hogg May 2009 A1
20090327818 Kogelnik Dec 2009 A1
20100131773 Cherian et al. May 2010 A1
20100306551 Meyer et al. Dec 2010 A1
20110226729 Hogg Sep 2011 A1
20120093318 Obukhov et al. Apr 2012 A1
20120159042 Lott et al. Jun 2012 A1
20120275050 Wilson et al. Nov 2012 A1
20120281963 Krapf et al. Nov 2012 A1
20120324980 Nguyen et al. Dec 2012 A1