The disclosed embodiments relate generally to memory systems, and in particular, to power sequencing and data hardening in storage devices.
Semiconductor memory devices, including flash memory, typically utilize memory cells to store data as an electrical value, such as an electrical charge or voltage. A flash memory cell, for example, includes a single transistor with a floating gate that is used to store a charge representative of a data value. Flash memory is a non-volatile data storage device that can be electrically erased and reprogrammed. More generally, non-volatile memory (e.g., flash memory, as well as other types of non-volatile memory implemented using any of a variety of technologies) retains stored information even when not powered, as opposed to volatile memory, which requires power to maintain the stored information. However, it is important to protect data integrity during power disruption events.
Data hardening, the saving of data and mission critical metadata held in volatile storage, is an integral part of the storage devices disclosed in this document. As discussed more fully elsewhere in this document, when there is a power failure, mission critical data may reside in volatile memory in a number of sub-system components. Coordinating and managing multiple sub-system components to ensure that volatile data is saved successfully is important for safeguarding data integrity in a storage device.
Various implementations of systems, methods and devices within the scope of the appended claims each have several aspects, no single one of which is solely responsible for the attributes described herein. Without limiting the scope of the appended claims, after considering this disclosure, and particularly after considering the section entitled “Detailed Description” one will understand how the aspects of various implementations are used to enable power sequencing and data hardening in storage devices. In one aspect, a soft power fail operation is performed in response to a signal received or detected by a storage device.
So that the present disclosure can be understood in greater detail, a more particular description may be had by reference to the features of various implementations, some of which are illustrated in the appended drawings. The appended drawings, however, merely illustrate the more pertinent features of the present disclosure and are therefore not to be considered limiting, for the description may admit to other effective features.
In accordance with common practice the various features illustrated in the drawings may not be drawn to scale. Accordingly, the dimensions of the various features may be arbitrarily expanded or reduced for clarity. In addition, some of the drawings may not depict all of the components of a given system, method or device. Finally, like reference numerals may be used to denote like features throughout the specification and figures.
The various implementations described herein include systems, methods and/or devices used to enable power sequencing and data hardening in storage devices. Some implementations include systems, methods and/or devices to perform a soft power fail operation in response to a soft power fail signal.
More specifically, some implementations include a method of protecting data in a storage device comprising volatile memory and non-volatile memory. In some implementations, the method includes, in response to a first signal received or detected by the storage device, performing a soft power fail operation on a first section of the storage device. The soft power fail operation including: (1) signaling a power fail condition to a first plurality of controllers on the storage device, where the first plurality of controllers correspond to the first section of the storage device, (2) transferring data held in the volatile memory of the storage device to the non-volatile memory of the storage device, and (3) removing power from the first plurality of controllers.
In some embodiments, the first plurality of controllers includes at least one non-volatile storage controller and at least one other storage controller.
In some embodiments, the first plurality of controllers includes a storage controller and one or more non-volatile memory (NVM) controllers, the one or more NVM controllers coupled by the storage controller to a host interface of the storage device.
In some embodiments, transferring data held in the volatile memory of the storage device to the non-volatile memory of the storage device includes: (1) transferring data from the storage controller to the one or more NVM controllers, and (2) transferring data from the one or more NVM controllers to the non-volatile memory.
In some embodiments, removing power from the first plurality of controllers includes: (1) resetting the storage controller subsequent to transferring data from the storage controller to the one or more NVM controllers, and (2) removing power from the storage controller subsequent to resetting the storage controller.
In some embodiments, the one or more NVM controllers include a first NVM controller and a second NVM controller, and removing power from the first plurality of controllers includes: (1) resetting the first NVM controller subsequent to transferring data from the first NVM controller to the non-volatile memory, (2) resetting the second NVM controller subsequent to transferring data from the second NVM controller to the non-volatile memory, and (3) removing power from the first and the second NVM controllers subsequent to resetting the first and second NVM controllers.
In some embodiments, removing power from the first and the second NVM controllers is subsequent to removing power from the storage controller.
In some embodiments, the soft power fail operation further includes, subsequent to removing power from the first plurality of controllers, restoring power to the first plurality of controllers.
In some embodiments, the storage device includes a second section that is not part of the first section, and a second plurality of controllers on the storage device corresponding to the second section continue running independent of the soft power fail operation on the first section of the storage device.
In some embodiments, removing power from the first plurality of controllers includes bringing an energy storage device to a discharged state.
In some embodiments, the energy storage device is tested for quality.
In some embodiments, the soft power fail operation further includes providing power to the first plurality of controllers on the storage device from an energy storage device distinct from a power source used during normal operation of the storage device.
In some embodiments, the soft power fail operation further includes, prior to removing power from the first plurality of controllers, installing firmware on at least a subset of the first plurality of controllers on the storage device.
In some embodiments, the method further includes, in response to a second signal received or detected by the storage device, performing a soft power fail operation on a second section of the storage device, distinct from the first section.
In some embodiments, the soft power fail operation is controlled by a storage level microcontroller and, during the soft power fail operation, the storage level microcontroller receives status information from components in the first section of the storage device.
In some embodiments, the method further includes: (1) in response to a third signal received or detected by the storage device, determining whether a power fail operation is in progress on the storage device, and (2) in accordance with a determination that the power fail operation is in progress, forgoing performance of a soft power fail operation in response to the third signal.
In some embodiments, signaling the power fail condition to the first plurality of controllers on the storage device includes separately signaling the power fail condition to each controller in the first plurality of controllers.
In some embodiments, the method further comprises recording data regarding the soft power fail operation to non-volatile memory.
In another aspect, any of the methods described above are performed by a storage device including a first plurality of controllers, each of the first plurality of controllers configured to transfer data held in volatile memory to non-volatile memory, and a data hardening module configured to: receive or detect a first signal to simulate a power failure, in response to receiving or detecting the first signal, perform a soft power fail operation on a first section of the storage device, the soft power fail operation including: (1) signaling a power fail condition to a second plurality of controllers on the storage device, where the second plurality of controllers correspond to the first section of the storage device and comprise some or all of the first plurality of controllers, (2) transferring data held in volatile memory to non-volatile memory, and (3) removing power from the second plurality of controllers.
In some embodiments, the storage device includes an interface for coupling the storage device to a host system.
In some embodiments, the data hardening module further includes an energy storage device.
In some embodiments, the data hardening module includes one or more processors.
In some embodiments, the second plurality of controllers includes a storage controller and one or more non-volatile memory (NVM) controllers, the one or more NVM controllers coupled by the storage controller to a host interface of the storage device.
In some embodiments, the storage device is configured to operate in accordance with any of the methods described above.
In yet another aspect, any of the methods described above are performed by a storage device including: (1) memory, (2) one or more processors coupled to the memory, and (3) one or more programs, stored in the memory and executed by the one or more processors, the one or more programs including instructions for performing any of the methods described above.
In yet another aspect, any of the methods described above are performed by a storage device operable to protect data. In some embodiments, the device includes (1) means for receiving or detecting a first signal to simulate a power failure, and (2) means, responsive to receiving or detecting the first signal, for performing a soft power fail operation on a first section of the storage device, the means for performing the soft power fail operation including: (a) means for signaling a power fail condition to a first plurality of controllers on the storage device, where the first plurality of controllers correspond to the first section of the storage device, (b) means for transferring data held in volatile memory to non-volatile memory, and (c) means for removing power from the first plurality of controllers. In some embodiments, the storage device includes an interface for coupling the storage device to a host system.
In yet another aspect, a non-transitory computer readable storage medium, storing one or more programs for execution by one or more processors of a storage device having a plurality of controllers and a data hardening module, the one or more programs including instructions for performing any of the methods described above.
In some embodiments, the non-transitory computer readable storage medium includes a non-transitory computer readable storage medium associated with each of the plurality of controllers on the storage device and a non-transitory computer readable storage medium associated with the data hardening module.
Numerous details are described herein in order to provide a thorough understanding of the example implementations illustrated in the accompanying drawings. However, some embodiments may be practiced without many of the specific details, and the scope of the claims is only limited by those features and aspects specifically recited in the claims. Furthermore, well-known methods, components, and circuits have not been described in exhaustive detail so as not to unnecessarily obscure more pertinent aspects of the implementations described herein.
Computer system 110 is coupled to storage device 120 through data connections 101. However, in some implementations computer system 110 includes storage device 120 as a component and/or sub-system. In some such embedded implementations, data connections 101 and host interface 122 are not needed. Computer system 110 may be any suitable computer device, such as a personal computer, a workstation, a computer server, or any other computing device. Computer system 110 is sometimes called a host or host system. In some implementations, computer system 110 includes one or more processors, one or more types of memory, optionally includes a display and/or other user interface components such as a keyboard, a touch screen display, a mouse, a track-pad, a digital camera and/or any number of supplemental devices to add functionality. Further, in some implementations, computer system 110 sends one or more host commands (e.g., read commands and/or write commands) on control line 111 to storage device 120. In some implementations, computer system 110 is a server system, such as a server system in a data center, and does not have a display and other user interface components.
In some implementations, storage device 120 includes NVM devices 140, 142 such as flash memory devices (e.g., NVM devices 140-1 through 140-n and NVM devices 142-1 through 142-k) and NVM controllers 130 (e.g., NVM controllers 130-1 through 130-m). In some implementations, each NVM controller of NVM controllers 130 include one or more processing units (also sometimes called CPUs or processors or microprocessors or microcontrollers) configured to execute instructions in one or more programs (e.g., in NVM controllers 130). In some implementations, the one or more processors are shared by one or more components within, and in some cases, beyond the function of NVM controllers 130. In some implementations, NVM controllers 130 are configured to receive (e.g., via reset module 412,
NVM devices 140, 142 are coupled to NVM controllers 130 through connections that typically convey commands in addition to data, and optionally convey metadata, error correction information and/or other information in addition to data values to be stored in NVM devices 140, 142 and data values read from NVM devices 140, 142. For example, NVM devices 140, 142 can be configured for enterprise storage suitable for applications such as cloud computing, or for caching data stored (or to be stored) in secondary storage, such as hard disk drives. Additionally and/or alternatively, flash memory (e.g., NVM devices 140, 142) can also be configured for relatively smaller-scale applications such as personal flash drives or hard-disk replacements for personal, laptop and tablet computers. Although flash memory devices and flash controllers are used as an example here, in some embodiments storage device 120 includes other non-volatile memory device(s) and corresponding non-volatile storage controller(s).
In some implementations, storage device 120 also includes host interface 122, SPD device 124, data hardening module 126, and storage controller 128. Storage device 120 may include various additional features that have not been illustrated for the sake of brevity and so as not to obscure more pertinent features of the example implementations disclosed herein, and a different arrangement of features may be possible. Host interface 122 provides an interface to computer system 110 through data connections 101.
In some implementations, data hardening module 126 includes one or more processing units (also sometimes called CPUs or processors or microprocessors or microcontrollers) configured to execute instructions in one or more programs (e.g., in data hardening module 126). In some implementations, the one or more processors are shared by one or more components (e.g., storage controller 128) within, and in some cases, beyond the function of data hardening module 126. Data hardening module 126 is coupled to host interface 122, SPD device 124, storage controller 128, and NVM controllers 130 in order to coordinate the operation of these components, including supervising and controlling functions such as power up, power down, data hardening, charging energy storage device(s), data logging, and other aspects of managing functions on storage device 120.
Storage controller 128 is coupled to host interface 122, data hardening module 126, and NVM controllers 130. In some implementations, during a write operation, storage controller 128 receives data from computer system 110 through host interface 122 and during a read operation, storage controller 128 sends data to computer system 110 through host interface 122. Further, host interface 122 provides additional data, signals, voltages, and/or other information needed for communication between storage controller 128 and computer system 110. In some embodiments, storage controller 128 and host interface 122 use a defined interface standard for communication, such as double data rate type three synchronous dynamic random access memory (DDR3). In some embodiments, storage controller 128 and NVM controllers 130 use a defined interface standard for communication, such as serial advance technology attachment (SATA). In some other implementations, the device interface used by storage controller 128 to communicate with NVM controllers 130 is SAS (serial attached SCSI), or other storage interface. In some implementations, storage controller 128 is configured to receive (e.g., via reset module 310) reset 144-1 from various components of storage device 120 (e.g., from data hardening module 126 and/or from host interface 122). In some implementations, reset 144-1, reset 144-2, and reset 144-3 are the same signal. In some implementations, reset 144-1, reset 144-2, and reset 144-3 are independent signals. In some implementations, reset 144-1, reset 144-2, and reset 144-3 are controlled separately. In some implementations, storage controller 128 includes one or more processing units (also sometimes called CPUs or processors or microprocessors or microcontrollers) configured to execute instructions in one or more programs (e.g., in storage controller 128). In some implementations, the one or more processors are shared by one or more components within, and in some cases, beyond the function of storage controller 128.
SPD device 124 is coupled to host interface 122 and data hardening module 126. Serial presence detect (SPD) refers to a standardized way to automatically access information about a computer memory module (e.g., storage device 120). For example, information about the type of the device (e.g., where the device type is one of a predefined set of device types), and the storage capacity of the device can be communicated with a host system (e.g., computer system 110) through SPD device 124. In another example, if the memory module has a failure, the failure can be communicated with a host system (e.g., computer system 110) through SPD device 124.
Communication buses 208 optionally include circuitry (sometimes called a chipset) that interconnects and controls communications between system components. Data hardening module 126 is coupled to host interface 122, SPD device 124, storage controller 128, and NVM controllers 130 (e.g., NVM controllers 130-1 through 130-m) by communication buses 208. Memory 206 includes high-speed random access memory, such as DRAM, SRAM, DDR RAM or other random access solid state memory devices, and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid state storage devices. Memory 206 optionally includes one or more storage devices remotely located from processor(s) 202. Memory 206, or alternately the non-volatile memory device(s) within memory 206, comprises a non-transitory computer readable storage medium. In some embodiments, memory 206, or the computer readable storage medium of memory 206 stores the following programs, modules, and data structures, or a subset thereof:
In some embodiments, memory 206, or the computer readable storage medium of memory 206 further stores a configuration module for configuring storage device 120 and data hardening module 126, and/or configuration values (such as one or more under-voltage threshold values) for configuring data hardening module 126, neither of which is explicitly shown in
In some embodiments, the power fail module 218 optionally includes the following modules or sub-modules, or a subset thereof:
Each of the above identified elements may be stored in one or more of the previously mentioned memory devices, and corresponds to a set of instructions for performing a function described above. The above identified modules or programs (i.e., sets of instructions) need not be implemented as separate software programs, procedures or modules, and thus various subsets of these modules may be combined or otherwise re-arranged in various embodiments. In some embodiments, memory 206 may store a subset of the modules and data structures identified above. Furthermore, memory 206 may store additional modules and data structures not described above. In some embodiments, the programs, modules, and data structures stored in memory 206, or the computer readable storage medium of memory 206, provide instructions for implementing any of the methods described below with reference to
Although
In some embodiments, the power fail module 314 optionally includes a transfer module 316 that is used for transferring data held in volatile memory to non-volatile memory.
Each of the above identified elements may be stored in one or more of the previously mentioned memory devices, and corresponds to a set of instructions for performing a function described above. The above identified modules or programs (i.e., sets of instructions) need not be implemented as separate software programs, procedures or modules, and thus various subsets of these modules may be combined or otherwise re-arranged in various embodiments. In some embodiments, memory 306 may store a subset of the modules and data structures identified above. Furthermore, memory 306 may store additional modules and data structures not described above. In some embodiments, the programs, modules, and data structures stored in memory 306, or the computer readable storage medium of memory 306, provide instructions for implementing respective operations in the methods described below with reference to
Although
In some embodiments, the power fail module 414 optionally includes a transfer module 416 that is used for transferring data held in volatile memory to non-volatile memory.
Each of the above identified elements may be stored in one or more of the previously mentioned memory devices, and corresponds to a set of instructions for performing a function described above. The above identified modules or programs (i.e., sets of instructions) need not be implemented as separate software programs, procedures or modules, and thus various subsets of these modules may be combined or otherwise re-arranged in various embodiments. In some embodiments, memory 406 may store a subset of the modules and data structures identified above. Furthermore, memory 406 may store additional modules and data structures not described above. In some embodiments, the programs, modules, and data structures stored in memory 406, or the computer readable storage medium of memory 406, provide instructions for implementing respective operations in the methods described below with reference to
Although
In some implementations, processor 202 monitors and manages the functionality in data hardening module 126. For example, processor 202 monitors voltages Vdd 502 and VSPD 504. If either Vdd 502 or VSPD 504 fall below corresponding under-voltage thresholds, processor 202 signals a power fail condition to a plurality of controllers on storage device 120 (e.g., storage controller 128 and NVM controllers 130,
In some embodiments, during regular operation of storage device 120, Vdd 502 is used to supply power to storage device 120. However, during a power fail operation or a soft power fail operation, an energy storage device 522 is used to provide power to storage device 120. In some implementations, processor 202 controls transistors 511-512 to control Vswitched 508 to be voltage from Vdd 502 (e.g., during regular operation) or voltage from energy storage device 522 (e.g., during a power fail operation or a soft power fail operation). For example, during regular operation of storage device 120, Vdd 502 is used to supply power to storage device 120, so transistor 511 is turned on (e.g., to complete the connection between Vdd 502 and Vswitched 508) and transistor 512 is turned off (e.g., to disable the connection between energy storage device 522 and Vswitched 508). However, during a power fail operation or a soft power fail operation, energy storage device 522 is used to provide power to storage device 120, so transistor 511 is turned off (e.g., to disable the connection between Vdd 502 and Vswitched 508) and transistor 512 is turned on (e.g., to enable the connection between energy storage device 522 and Vswitched 508). In some embodiments, during a power fail operation or a soft power fail operation, Vswitched 508 is provided to power control systems (also sometimes called power regulators), which convert Vswitched 508 to the voltages required by various components of storage device 120 (e.g., 0.9V, 1.35V, 1.5V, 1.8V, and/or 2.5V) and provide those voltages to the appropriate components. Any energy storage device, including one or more capacitors, one or more inductors, or one or more other passive elements that store energy, may be used to store energy to be used during a power fail operation or a soft power fail operation.
In some implementations, energy storage device 522 is charged using Vholdup 506, a voltage higher than Vdd 502. In some implementations, Vdd 502 is boosted up to Vholdup 506 using boost circuitry 520 (e.g., 1.35 volts or 1.5 volts is boosted up to 5.7 volts). In some implementations, boost circuitry 520 is controlled and enabled by processor 202. Further, in some embodiments, Vswitched 508 is used as an input to keeper circuitry 524, which along with VSPD 504 provides power to processor 202. During a power fail operation or a soft power fail operation, Vswitched 508 is provided via keeper circuitry 524 to processor 202 so as to provide power to processor 202. In some implementations, processor 202 has one or more connections 530 used to monitor and control other functions within storage device 120. In some implementations, VSPD 504 provides power to keeper circuitry 524. Furthermore, in some implementations, VSPD 504 is provided to storage device 120 before Vdd 502 is provided to storage device 120, allowing devices in storage device 120 to operate before main power Vdd 502 is provide to storage device 120.
In some embodiments, a storage device comprising volatile memory and non-volatile memory (e.g., storage device 120,
In response to a first signal received or detected by the storage device, the storage device performs (604) a soft power fail operation on a first section of the storage device. In some implementations the first signal is received or detected by a data hardening module (e.g., data hardening module 126,
The soft power fail operation includes signaling (606) a power fail condition to a first plurality of controllers on the storage device, wherein the first plurality of controllers correspond (608) to the first section of the storage device. For example, in accordance with some embodiments, the first plurality of controllers includes storage controller 128 and NVM controller 130-1 on storage device 120 in
In some embodiments, the first plurality of controllers includes (610) at least one non-volatile storage controller and at least one other storage controller. In some implementations, the at least one non-volatile storage controller is a flash controller. In other implementations, the at least one non-volatile storage controller controls one or more other types of non-volatile memory devices.
In some embodiments, the first plurality of controllers includes (612) a storage controller (e.g., storage controller 128,
In some embodiments, signaling the power fail condition to the first plurality of controllers includes separately signaling (614) the power fail condition to each controller in the first plurality of controllers. In some implementations, the separate signaling enables a sequential sequence for the soft power fail operation. In some other implementations, the separate signaling enables a parallel sequence for the soft power fail operation. In some implementations, the separate signaling enables a combination of sequential and parallel sequences for the soft power fail operation.
The soft power fail operation further includes transferring (616) data held in the volatile memory of the storage device to the non-volatile memory (e.g., NVM devices 140, 142,
In some embodiments, transferring data held in volatile memory of the storage device to non-volatile memory of the storage device includes transferring (618) data (e.g., volatile data 318,
In some embodiments, the soft power fail operation further includes, prior to removing power from the first plurality of controllers, installing (622) firmware on at least a subset of the first plurality of controllers (e.g., storage controller 128,
The soft power fail operation further includes removing (624) power from the first plurality of controllers on the storage device (e.g., storage controller 128 and NVM controllers 130,
In some embodiments, removing power from the first plurality of controllers on the storage device includes resetting (626) the storage controller subsequent to transferring data from the storage controller to the one or more NVM controllers. In some implementations, the storage controller (e.g., storage controller 128,
In some embodiments, removing power from the first plurality of controllers on the storage device includes removing (628) power from the storage controller subsequent to resetting the storage controller. In some implementations, the storage controller (e.g., storage controller 128,
In some embodiments, the one or more NVM controllers include (630) a first NVM controller and a second NVM controller and removing power from the first plurality of controllers on the storage device includes resetting (632) the first NVM controller subsequent to transferring data from the first NVM controller to the non-volatile memory. In some implementations, the first NVM controller (e.g., NVM controller 130-1,
In some embodiments, the one or more NVM controllers include (630) a first NVM controller and a second NVM controller and removing power from the plurality of controllers on the storage device further includes resetting (634) the second NVM controller subsequent to transferring data from the second NVM controller to the non-volatile memory. Explanations provided above in connection with resetting the first NVM controller are equally applicable to resetting the second NVM controller. In some implementations, a reset module in the data hardening module (e.g., reset module 222,
In some embodiments, the one or more NVM controllers include (630) a first NVM controller and a second NVM controller (e.g., first and second flash controllers) and removing power from the plurality of controllers on the storage device further includes removing (636) power from the first and the second NVM controllers subsequent to resetting the first and second NVM controllers. In some implementations, the first NVM controller and the second NVM controller share the same power domain, and power is removed from the first and the second NVM controllers after both the first and the second NVM controllers have been reset. In some implementations, the first NVM controller is in a first power domain and the second NVM controller is in a second power domain, and power is removed from the first NVM controller independent of when power is removed from the second NVM controller. In some implementations, a power removal module (e.g., power removal module 224,
In some embodiments, removing (638) power from the first and the second NVM controllers is subsequent to removing power from the storage controller. As discussed above, independent power domains on the storage device allow the data hardening module (e.g., data hardening module 126,
In some embodiments, the soft power fail operation further includes, subsequent to removing power from the first plurality of controllers, restoring (640) power to the first plurality of controllers. In some implementations, the power is restored to the plurality of controllers in parallel. In some implementations, the power is restored in a predefined sequence.
In some embodiments, removing power from the first plurality of controllers includes (642) bringing an energy storage device (e.g., energy storage device 204,
In some embodiments, the energy storage device is tested (644) for quality. In some implementations, a data hardening module (e.g., data hardening module 126,
In some embodiments, testing the energy storage device for quality includes charging the energy storage device to a higher voltage than the power supply voltage provided to the storage device and determining whether the energy storage device (e.g., energy storage device 204,
In some embodiments, the storage device includes (646) a second section that is not part of the first section of the storage device; and a second plurality of controllers on the storage device corresponding to the second section continue running (648) independent of the soft power fail operation on the first section of the storage device (see 604). For example, in accordance with some implementations, the first section of a storage device corresponds to a first NVM controller (e.g., NVM controller 130-1,
In some embodiments, the soft power fail operation is controlled (650) by a storage level microcontroller; and, during the soft power fail operation, the storage level microcontroller receives (652) status information from components in the first section of the storage device. In some implementations, the storage level microcontroller is a storage controller (e.g., storage controller 128,
In some embodiments, the soft power fail operation further includes providing (653) power to the first plurality of controllers on the storage device from an energy storage device (e.g., energy storage device 204,
In some embodiments, the storage device receives or detects (654) a second signal to perform a soft power fail operation. In some implementations the second signal is received by the aforementioned data hardening module (e.g., data hardening module 126,
In some embodiments, in response to a second signal received or detected by the storage device, the storage device performs (656) a soft power fail operation on a second section of the storage device, distinct from the first section of the storage device. For example, in accordance with some implementations, the first section of the storage device corresponds to a first NVM controller (e.g., NVM controller 130-1,
In some embodiments, the storage device receives or detects (658) a third signal to perform a soft power fail operation. In some implementations the third signal is received by the data hardening module (e.g., data hardening module 126,
In some embodiments, in response to a third signal received by the storage device, the storage device determines (660) whether a power fail operation is in progress on the storage device; and, in accordance with a determination that the power fail operation is in progress, the storage device forgoes (662) performance of a soft power fail operation in response to the third signal. In some implementations, a storage level microcontroller determines whether a power fail operation is in progress on the storage device. In some implementations, a data hardening module determines (e.g., with power fail module 218) whether a power fail operation is in progress on the storage device. In some implementations, a storage controller determines (e.g., with power fail module 314) whether a power fail operation is in progress on the storage device.
In some embodiments, the storage device records (664) data regarding the soft power fail operation to non-volatile memory. In some implementations, recording data regarding the soft power fail operation includes: (1) recording power supply voltages (e.g., Vdd or VSPD), (2) recording which signal triggered the soft power fail operation, (3) recording the real time when the soft power fail event happened (e.g., Monday, Oct. 15, 2013, at 12:03:17 AM), (4) recording the length of time the soft power fail operation took to complete, (5) recording whether the soft power fail operation was successful, (6) recording information regarding the quality of an energy storage device (e.g., energy storage device 204,
In some implementations, with respect to any of the methods described above, the non-volatile memory is a single NVM device (e.g., flash memory device), while in other implementations, the non-volatile memory includes a plurality of NVM devices (e.g., flash memory devices).
In some implementations, with respect to any of the methods described above, a storage device includes (1) a plurality of controllers, where each of the plurality of controllers is configured to transfer data held in volatile memory to non-volatile memory and where the first plurality of controllers comprise some or all of said plurality of controllers, and (2) a data hardening module including one or more processors and an energy storage device, the storage device configured to perform or control performance of any of the methods described above.
In some implementations, with respect to any of the methods described above, a storage device includes an interface for coupling the storage device to a host system.
It will be understood that, although the terms “first,” “second,” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first contact could be termed a second contact, and, similarly, a second contact could be termed a first contact, which changing the meaning of the description, so long as all occurrences of the “first contact” are renamed consistently and all occurrences of the second contact are renamed consistently. The first contact and the second contact are both contacts, but they are not the same contact.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the claims. As used in the description of the embodiments and the appended claims, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, the term “if” may be construed to mean “when” or “upon” or “in response to determining” or “in accordance with a determination” or “in response to detecting,” that a stated condition precedent is true, depending on the context. Similarly, the phrase “if it is determined [that a stated condition precedent is true]” or “if [a stated condition precedent is true]” or “when [a stated condition precedent is true]” may be construed to mean “upon determining” or “in response to determining” or “in accordance with a determination” or “upon detecting” or “in response to detecting” that the stated condition precedent is true, depending on the context.
The foregoing description, for purpose of explanation, has been described with reference to specific implementations. However, the illustrative discussions above are not intended to be exhaustive or to limit the claims to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The implementations were chosen and described in order to best explain principles of operation and practical applications, to thereby enable others skilled in the art.
This application claims priority to U.S. Provisional Patent Application No. 61/903,895, filed Nov. 13, 2013, which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4173737 | Skerlos et al. | Nov 1979 | A |
4888750 | Kryder et al. | Dec 1989 | A |
4916652 | Schwarz et al. | Apr 1990 | A |
5129089 | Nielsen | Jul 1992 | A |
5270979 | Harari et al. | Dec 1993 | A |
5329491 | Brown et al. | Jul 1994 | A |
5381528 | Brunelle | Jan 1995 | A |
5519847 | Fandrich et al. | May 1996 | A |
5530705 | Malone, Sr. | Jun 1996 | A |
5537555 | Landry et al. | Jul 1996 | A |
5551003 | Mattson et al. | Aug 1996 | A |
5636342 | Jeffries | Jun 1997 | A |
5657332 | Auclair et al. | Aug 1997 | A |
5666114 | Brodie et al. | Sep 1997 | A |
5708849 | Coke et al. | Jan 1998 | A |
5765185 | Lambrache et al. | Jun 1998 | A |
5890193 | Chevallier | Mar 1999 | A |
5936884 | Hasbun et al. | Aug 1999 | A |
5943692 | Marberg et al. | Aug 1999 | A |
5982664 | Watanabe | Nov 1999 | A |
6000006 | Bruce et al. | Dec 1999 | A |
6006345 | Berry, Jr. | Dec 1999 | A |
6016560 | Wada et al. | Jan 2000 | A |
6018304 | Bessios | Jan 2000 | A |
6044472 | Crohas | Mar 2000 | A |
6070074 | Perahia et al. | May 2000 | A |
6119250 | Nishimura et al. | Sep 2000 | A |
6138261 | Wilcoxson et al. | Oct 2000 | A |
6182264 | Ott | Jan 2001 | B1 |
6192092 | Dizon et al. | Feb 2001 | B1 |
6295592 | Jeddeloh | Sep 2001 | B1 |
6311263 | Barlow et al. | Oct 2001 | B1 |
6408394 | Vander Kamp et al. | Jun 2002 | B1 |
6412042 | Paterson et al. | Jun 2002 | B1 |
6442076 | Roohparvar | Aug 2002 | B1 |
6449625 | Wang | Sep 2002 | B1 |
6484224 | Robins et al. | Nov 2002 | B1 |
6516437 | Van Stralen et al. | Feb 2003 | B1 |
6564285 | Mills et al. | May 2003 | B1 |
6678788 | O'Connell | Jan 2004 | B1 |
6757768 | Potter et al. | Jun 2004 | B1 |
6775792 | Ulrich et al. | Aug 2004 | B2 |
6810440 | Micalizzi, Jr. et al. | Oct 2004 | B2 |
6836808 | Bunce et al. | Dec 2004 | B2 |
6836815 | Purcell et al. | Dec 2004 | B1 |
6842436 | Moeller | Jan 2005 | B2 |
6865650 | Morley et al. | Mar 2005 | B1 |
6871257 | Conley et al. | Mar 2005 | B2 |
6895464 | Chow et al. | May 2005 | B2 |
6966006 | Pacheco et al. | Nov 2005 | B2 |
6978343 | Ichiriu | Dec 2005 | B1 |
6980985 | Amer-Yahia et al. | Dec 2005 | B1 |
6981205 | Fukushima et al. | Dec 2005 | B2 |
6988171 | Beardsley et al. | Jan 2006 | B2 |
7020017 | Chen et al. | Mar 2006 | B2 |
7028165 | Roth et al. | Apr 2006 | B2 |
7032123 | Kane et al. | Apr 2006 | B2 |
7043505 | Teague et al. | May 2006 | B1 |
7076598 | Wang | Jul 2006 | B2 |
7100002 | Shrader | Aug 2006 | B2 |
7102860 | Wenzel | Sep 2006 | B2 |
7111293 | Hersh et al. | Sep 2006 | B1 |
7126873 | See et al. | Oct 2006 | B2 |
7133282 | Sone | Nov 2006 | B2 |
7162678 | Saliba | Jan 2007 | B2 |
7173852 | Gorobets et al. | Feb 2007 | B2 |
7184446 | Rashid et al. | Feb 2007 | B2 |
7275170 | Suzuki | Sep 2007 | B2 |
7328377 | Lewis et al. | Feb 2008 | B1 |
7516292 | Kimura et al. | Apr 2009 | B2 |
7523157 | Aguilar, Jr. et al. | Apr 2009 | B2 |
7527466 | Simmons | May 2009 | B2 |
7529466 | Takahashi | May 2009 | B2 |
7533214 | Aasheim et al. | May 2009 | B2 |
7546478 | Kubo et al. | Jun 2009 | B2 |
7566987 | Black et al. | Jul 2009 | B2 |
7571277 | Mizushima | Aug 2009 | B2 |
7574554 | Tanaka et al. | Aug 2009 | B2 |
7596643 | Merry, Jr. et al. | Sep 2009 | B2 |
7681106 | Jarrar et al. | Mar 2010 | B2 |
7685494 | Varnica et al. | Mar 2010 | B1 |
7707481 | Kirschner et al. | Apr 2010 | B2 |
7761655 | Mizushima et al. | Jul 2010 | B2 |
7765454 | Passint | Jul 2010 | B2 |
7774390 | Shin | Aug 2010 | B2 |
7840762 | Oh et al. | Nov 2010 | B2 |
7870326 | Shin et al. | Jan 2011 | B2 |
7890818 | Kong et al. | Feb 2011 | B2 |
7913022 | Baxter | Mar 2011 | B1 |
7925960 | Ho et al. | Apr 2011 | B2 |
7934052 | Prins et al. | Apr 2011 | B2 |
7945825 | Cohen et al. | May 2011 | B2 |
7954041 | Hong et al. | May 2011 | B2 |
7971112 | Murata | Jun 2011 | B2 |
7974368 | Shieh et al. | Jul 2011 | B2 |
7978516 | Olbrich et al. | Jul 2011 | B2 |
7996642 | Smith | Aug 2011 | B1 |
8006161 | Lestable et al. | Aug 2011 | B2 |
8032724 | Smith | Oct 2011 | B1 |
8041884 | Chang | Oct 2011 | B2 |
8042011 | Nicolaidis et al. | Oct 2011 | B2 |
8069390 | Lin | Nov 2011 | B2 |
8190967 | Hong et al. | May 2012 | B2 |
8250380 | Guyot | Aug 2012 | B2 |
8254181 | Hwang et al. | Aug 2012 | B2 |
8259506 | Sommer et al. | Sep 2012 | B1 |
8312349 | Reche et al. | Nov 2012 | B2 |
8412985 | Bowers et al. | Apr 2013 | B1 |
8429436 | Fillingim et al. | Apr 2013 | B2 |
8438459 | Cho et al. | May 2013 | B2 |
8453022 | Katz | May 2013 | B2 |
8627117 | Johnston | Jan 2014 | B2 |
8634248 | Sprouse et al. | Jan 2014 | B1 |
8694854 | Dar et al. | Apr 2014 | B1 |
8724789 | Altberg et al. | May 2014 | B2 |
8885434 | Kumar | Nov 2014 | B2 |
8898373 | Kang et al. | Nov 2014 | B1 |
8910030 | Goel | Dec 2014 | B2 |
8923066 | Subramanian et al. | Dec 2014 | B1 |
9128690 | Lotzenburger et al. | Sep 2015 | B2 |
20010050824 | Buch | Dec 2001 | A1 |
20020024846 | Kawahara et al. | Feb 2002 | A1 |
20020036515 | Eldridge et al. | Mar 2002 | A1 |
20020083299 | Van Huben et al. | Jun 2002 | A1 |
20020122334 | Lee et al. | Sep 2002 | A1 |
20020152305 | Jackson et al. | Oct 2002 | A1 |
20020162075 | Talagala et al. | Oct 2002 | A1 |
20020165896 | Kim | Nov 2002 | A1 |
20030041299 | Kanazawa et al. | Feb 2003 | A1 |
20030043829 | Rashid et al. | Mar 2003 | A1 |
20030079172 | Yamagishi et al. | Apr 2003 | A1 |
20030088805 | Majni et al. | May 2003 | A1 |
20030093628 | Matter et al. | May 2003 | A1 |
20030163594 | Aasheim et al. | Aug 2003 | A1 |
20030163629 | Conley et al. | Aug 2003 | A1 |
20030188045 | Jacobson | Oct 2003 | A1 |
20030189856 | Cho et al. | Oct 2003 | A1 |
20030198100 | Matsushita et al. | Oct 2003 | A1 |
20030204341 | Guliani et al. | Oct 2003 | A1 |
20030212719 | Yasuda et al. | Nov 2003 | A1 |
20040024957 | Lin et al. | Feb 2004 | A1 |
20040024963 | Talagala et al. | Feb 2004 | A1 |
20040057575 | Zhang et al. | Mar 2004 | A1 |
20040062157 | Kawabe | Apr 2004 | A1 |
20040073829 | Olarig | Apr 2004 | A1 |
20040114265 | Talbert | Jun 2004 | A1 |
20040143710 | Walmsley | Jul 2004 | A1 |
20040148561 | Shen et al. | Jul 2004 | A1 |
20040153902 | Machado et al. | Aug 2004 | A1 |
20040167898 | Margolus et al. | Aug 2004 | A1 |
20040181734 | Saliba | Sep 2004 | A1 |
20040199714 | Estakhri et al. | Oct 2004 | A1 |
20040237018 | Riley | Nov 2004 | A1 |
20050060456 | Shrader et al. | Mar 2005 | A1 |
20050060501 | Shrader | Mar 2005 | A1 |
20050073884 | Gonzalez et al. | Apr 2005 | A1 |
20050108588 | Yuan | May 2005 | A1 |
20050114587 | Chou et al. | May 2005 | A1 |
20050172065 | Keays | Aug 2005 | A1 |
20050172207 | Radke et al. | Aug 2005 | A1 |
20050193161 | Lee et al. | Sep 2005 | A1 |
20050201148 | Chen et al. | Sep 2005 | A1 |
20050231765 | So et al. | Oct 2005 | A1 |
20050249013 | Janzen et al. | Nov 2005 | A1 |
20050251617 | Sinclair et al. | Nov 2005 | A1 |
20050257120 | Gorobets et al. | Nov 2005 | A1 |
20050273560 | Hulbert et al. | Dec 2005 | A1 |
20050289314 | Adusumilli et al. | Dec 2005 | A1 |
20060010174 | Nguyen et al. | Jan 2006 | A1 |
20060039196 | Gorobets et al. | Feb 2006 | A1 |
20060039227 | Lai et al. | Feb 2006 | A1 |
20060053246 | Lee | Mar 2006 | A1 |
20060085671 | Majni et al. | Apr 2006 | A1 |
20060087893 | Nishihara et al. | Apr 2006 | A1 |
20060107181 | Dave et al. | May 2006 | A1 |
20060136570 | Pandya | Jun 2006 | A1 |
20060136681 | Jain et al. | Jun 2006 | A1 |
20060156177 | Kottapalli et al. | Jul 2006 | A1 |
20060195650 | Su et al. | Aug 2006 | A1 |
20060244049 | Yaoi et al. | Nov 2006 | A1 |
20060259528 | Dussud et al. | Nov 2006 | A1 |
20060291301 | Ziegelmayer | Dec 2006 | A1 |
20070011413 | Nonaka et al. | Jan 2007 | A1 |
20070058446 | Hwang et al. | Mar 2007 | A1 |
20070061597 | Holtzman et al. | Mar 2007 | A1 |
20070076479 | Kim et al. | Apr 2007 | A1 |
20070081408 | Kwon et al. | Apr 2007 | A1 |
20070083697 | Birrell et al. | Apr 2007 | A1 |
20070088716 | Brumme et al. | Apr 2007 | A1 |
20070091677 | Lasser et al. | Apr 2007 | A1 |
20070113019 | Beukema et al. | May 2007 | A1 |
20070133312 | Roohparvar | Jun 2007 | A1 |
20070147113 | Mokhlesi et al. | Jun 2007 | A1 |
20070150790 | Gross et al. | Jun 2007 | A1 |
20070156842 | Vermeulen et al. | Jul 2007 | A1 |
20070157064 | Falik et al. | Jul 2007 | A1 |
20070174579 | Shin | Jul 2007 | A1 |
20070180188 | Fujibayashi et al. | Aug 2007 | A1 |
20070180346 | Murin | Aug 2007 | A1 |
20070201274 | Yu et al. | Aug 2007 | A1 |
20070208901 | Purcell et al. | Sep 2007 | A1 |
20070234143 | Kim | Oct 2007 | A1 |
20070245061 | Harriman | Oct 2007 | A1 |
20070245099 | Gray et al. | Oct 2007 | A1 |
20070263442 | Cornwell et al. | Nov 2007 | A1 |
20070277036 | Chamberlain et al. | Nov 2007 | A1 |
20070279988 | Nguyen | Dec 2007 | A1 |
20070291556 | Kamei | Dec 2007 | A1 |
20070294496 | Goss et al. | Dec 2007 | A1 |
20070300130 | Gorobets | Dec 2007 | A1 |
20080013390 | Zipprich-Rasch | Jan 2008 | A1 |
20080019182 | Yanagidaira et al. | Jan 2008 | A1 |
20080022163 | Tanaka et al. | Jan 2008 | A1 |
20080028275 | Chen et al. | Jan 2008 | A1 |
20080043871 | Latouche et al. | Feb 2008 | A1 |
20080052446 | Lasser et al. | Feb 2008 | A1 |
20080056005 | Aritome | Mar 2008 | A1 |
20080071971 | Kim et al. | Mar 2008 | A1 |
20080077841 | Gonzalez et al. | Mar 2008 | A1 |
20080077937 | Shin et al. | Mar 2008 | A1 |
20080086677 | Yang et al. | Apr 2008 | A1 |
20080112226 | Mokhlesi | May 2008 | A1 |
20080141043 | Flynn et al. | Jun 2008 | A1 |
20080144371 | Yeh et al. | Jun 2008 | A1 |
20080147714 | Breternitz et al. | Jun 2008 | A1 |
20080147964 | Chow et al. | Jun 2008 | A1 |
20080147998 | Jeong | Jun 2008 | A1 |
20080148124 | Zhang et al. | Jun 2008 | A1 |
20080163030 | Lee | Jul 2008 | A1 |
20080168191 | Biran et al. | Jul 2008 | A1 |
20080168319 | Lee et al. | Jul 2008 | A1 |
20080170460 | Oh et al. | Jul 2008 | A1 |
20080229000 | Kim | Sep 2008 | A1 |
20080229003 | Mizushima et al. | Sep 2008 | A1 |
20080229176 | Arnez et al. | Sep 2008 | A1 |
20080270680 | Chang | Oct 2008 | A1 |
20080282128 | Lee et al. | Nov 2008 | A1 |
20080285351 | Shlick et al. | Nov 2008 | A1 |
20080313132 | Hao et al. | Dec 2008 | A1 |
20090003058 | Kang | Jan 2009 | A1 |
20090019216 | Yamada et al. | Jan 2009 | A1 |
20090031083 | Willis et al. | Jan 2009 | A1 |
20090037652 | Yu et al. | Feb 2009 | A1 |
20090070608 | Kobayashi | Mar 2009 | A1 |
20090116283 | Ha et al. | May 2009 | A1 |
20090125671 | Flynn et al. | May 2009 | A1 |
20090144598 | Yoon et al. | Jun 2009 | A1 |
20090168525 | Olbrich et al. | Jul 2009 | A1 |
20090172258 | Olbrich et al. | Jul 2009 | A1 |
20090172259 | Prins et al. | Jul 2009 | A1 |
20090172260 | Olbrich et al. | Jul 2009 | A1 |
20090172261 | Prins et al. | Jul 2009 | A1 |
20090172262 | Olbrich et al. | Jul 2009 | A1 |
20090172308 | Prins et al. | Jul 2009 | A1 |
20090172335 | Kulkarni et al. | Jul 2009 | A1 |
20090172499 | Olbrich et al. | Jul 2009 | A1 |
20090193058 | Reid | Jul 2009 | A1 |
20090207660 | Hwang et al. | Aug 2009 | A1 |
20090213649 | Takahashi et al. | Aug 2009 | A1 |
20090222708 | Yamaga | Sep 2009 | A1 |
20090228761 | Perlmutter et al. | Sep 2009 | A1 |
20090249160 | Gao et al. | Oct 2009 | A1 |
20090268521 | Ueno et al. | Oct 2009 | A1 |
20090292972 | Seol et al. | Nov 2009 | A1 |
20090296466 | Kim et al. | Dec 2009 | A1 |
20090296486 | Kim et al. | Dec 2009 | A1 |
20090310422 | Edahiro et al. | Dec 2009 | A1 |
20090319864 | Shrader | Dec 2009 | A1 |
20100002506 | Cho et al. | Jan 2010 | A1 |
20100008175 | Sweere et al. | Jan 2010 | A1 |
20100011261 | Cagno et al. | Jan 2010 | A1 |
20100020620 | Kim et al. | Jan 2010 | A1 |
20100037012 | Yano et al. | Feb 2010 | A1 |
20100061151 | Miwa et al. | Mar 2010 | A1 |
20100091535 | Sommer et al. | Apr 2010 | A1 |
20100103737 | Park | Apr 2010 | A1 |
20100110798 | Hoei et al. | May 2010 | A1 |
20100118608 | Song et al. | May 2010 | A1 |
20100138592 | Cheon | Jun 2010 | A1 |
20100153616 | Garratt | Jun 2010 | A1 |
20100161936 | Royer et al. | Jun 2010 | A1 |
20100174959 | No et al. | Jul 2010 | A1 |
20100199125 | Reche | Aug 2010 | A1 |
20100199138 | Rho | Aug 2010 | A1 |
20100202196 | Lee et al. | Aug 2010 | A1 |
20100208521 | Kim et al. | Aug 2010 | A1 |
20100262889 | Bains | Oct 2010 | A1 |
20100281207 | Miller et al. | Nov 2010 | A1 |
20100281342 | Chang et al. | Nov 2010 | A1 |
20100332858 | Trantham et al. | Dec 2010 | A1 |
20110010514 | Benhase et al. | Jan 2011 | A1 |
20110051513 | Shen et al. | Mar 2011 | A1 |
20110066597 | Mashtizadeh et al. | Mar 2011 | A1 |
20110072302 | Sartore | Mar 2011 | A1 |
20110078407 | Lewis | Mar 2011 | A1 |
20110083060 | Sakurada et al. | Apr 2011 | A1 |
20110099460 | Dusija et al. | Apr 2011 | A1 |
20110113281 | Zhang et al. | May 2011 | A1 |
20110122691 | Sprouse | May 2011 | A1 |
20110131444 | Buch et al. | Jun 2011 | A1 |
20110138260 | Savin | Jun 2011 | A1 |
20110173378 | Filor et al. | Jul 2011 | A1 |
20110179249 | Hsiao | Jul 2011 | A1 |
20110199825 | Han et al. | Aug 2011 | A1 |
20110205823 | Hemink et al. | Aug 2011 | A1 |
20110213920 | Frost et al. | Sep 2011 | A1 |
20110222342 | Yoon et al. | Sep 2011 | A1 |
20110225346 | Goss et al. | Sep 2011 | A1 |
20110228601 | Olbrich et al. | Sep 2011 | A1 |
20110231600 | Tanaka et al. | Sep 2011 | A1 |
20110239077 | Bai et al. | Sep 2011 | A1 |
20110264843 | Haines et al. | Oct 2011 | A1 |
20110271040 | Kamizono | Nov 2011 | A1 |
20110283119 | Szu et al. | Nov 2011 | A1 |
20120023144 | Rub | Jan 2012 | A1 |
20120054414 | Tsai et al. | Mar 2012 | A1 |
20120063234 | Shiga et al. | Mar 2012 | A1 |
20120072639 | Goss et al. | Mar 2012 | A1 |
20120096217 | Son et al. | Apr 2012 | A1 |
20120110250 | Sabbag et al. | May 2012 | A1 |
20120117317 | Sheffler et al. | May 2012 | A1 |
20120151124 | Baek et al. | Jun 2012 | A1 |
20120151253 | Horn | Jun 2012 | A1 |
20120151294 | Yoo et al. | Jun 2012 | A1 |
20120173797 | Shen | Jul 2012 | A1 |
20120185750 | Hayami | Jul 2012 | A1 |
20120195126 | Roohparvar | Aug 2012 | A1 |
20120203951 | Wood et al. | Aug 2012 | A1 |
20120216079 | Fai et al. | Aug 2012 | A1 |
20120233391 | Frost et al. | Sep 2012 | A1 |
20120236658 | Byom et al. | Sep 2012 | A1 |
20120239858 | Melik-Martirosian | Sep 2012 | A1 |
20120239976 | Cometti et al. | Sep 2012 | A1 |
20120259863 | Bodwin et al. | Oct 2012 | A1 |
20120275466 | Bhadra et al. | Nov 2012 | A1 |
20120278564 | Goss et al. | Nov 2012 | A1 |
20120284574 | Avila et al. | Nov 2012 | A1 |
20120284587 | Yu et al. | Nov 2012 | A1 |
20130007073 | Varma | Jan 2013 | A1 |
20130007343 | Rub et al. | Jan 2013 | A1 |
20130007543 | Goss et al. | Jan 2013 | A1 |
20130024735 | Chung et al. | Jan 2013 | A1 |
20130031438 | Hu et al. | Jan 2013 | A1 |
20130036418 | Yadappanavar et al. | Feb 2013 | A1 |
20130047045 | Hu et al. | Feb 2013 | A1 |
20130073924 | D'Abreu et al. | Mar 2013 | A1 |
20130079942 | Smola et al. | Mar 2013 | A1 |
20130086131 | Hunt et al. | Apr 2013 | A1 |
20130086132 | Hunt et al. | Apr 2013 | A1 |
20130094288 | Patapoutian et al. | Apr 2013 | A1 |
20130111279 | Jeon et al. | May 2013 | A1 |
20130111298 | Seroff et al. | May 2013 | A1 |
20130121084 | Jeon et al. | May 2013 | A1 |
20130124888 | Tanaka et al. | May 2013 | A1 |
20130128666 | Avila et al. | May 2013 | A1 |
20130132652 | Wood et al. | May 2013 | A1 |
20130176784 | Cometti et al. | Jul 2013 | A1 |
20130179646 | Okubo et al. | Jul 2013 | A1 |
20130191601 | Peterson et al. | Jul 2013 | A1 |
20130194874 | Mu et al. | Aug 2013 | A1 |
20130232289 | Zhong et al. | Sep 2013 | A1 |
20130254507 | Islam et al. | Sep 2013 | A1 |
20130258738 | Barkon et al. | Oct 2013 | A1 |
20130265838 | Li | Oct 2013 | A1 |
20130282955 | Parker et al. | Oct 2013 | A1 |
20130290611 | Biederman et al. | Oct 2013 | A1 |
20130301373 | Tam | Nov 2013 | A1 |
20130304980 | Nachimuthu et al. | Nov 2013 | A1 |
20130343131 | Wu et al. | Dec 2013 | A1 |
20140013188 | Wu et al. | Jan 2014 | A1 |
20140063905 | Ahn et al. | Mar 2014 | A1 |
20140075133 | Li et al. | Mar 2014 | A1 |
20140082261 | Cohen et al. | Mar 2014 | A1 |
20140082456 | Liu | Mar 2014 | A1 |
20140082459 | Li et al. | Mar 2014 | A1 |
20140095775 | Talagala et al. | Apr 2014 | A1 |
20140122818 | Hayasaka et al. | May 2014 | A1 |
20140136883 | Cohen | May 2014 | A1 |
20140136927 | Li et al. | May 2014 | A1 |
20140143505 | Sim et al. | May 2014 | A1 |
20140201596 | Baum et al. | Jul 2014 | A1 |
20140258755 | Stenfort | Sep 2014 | A1 |
20140269090 | Flynn et al. | Sep 2014 | A1 |
20140359381 | Takeuchi et al. | Dec 2014 | A1 |
20150153799 | Lucas et al. | Jun 2015 | A1 |
Number | Date | Country |
---|---|---|
1 299 800 | Apr 2003 | EP |
1465203 | Oct 2004 | EP |
1 990 921 | Nov 2008 | EP |
2 386 958 | Nov 2011 | EP |
2 620 946 | Jul 2013 | EP |
2002-532806 | Oct 2002 | JP |
WO 2007036834 | Apr 2007 | WO |
WO 2007080586 | Jul 2007 | WO |
WO 2008075202 | Jun 2008 | WO |
WO 2008121553 | Oct 2008 | WO |
WO 2008121577 | Oct 2008 | WO |
WO 2009028281 | Mar 2009 | WO |
WO 2009032945 | Mar 2009 | WO |
WO 2009058140 | May 2009 | WO |
WO 2009084724 | Jul 2009 | WO |
WO 2009134576 | Nov 2009 | WO |
WO 2011024015 | Mar 2011 | WO |
Entry |
---|
Invitation to Pay Additional Fees dated Feb. 13, 2015, received in International Patent Apptication No. PCT/US2014/063949, which corresponds to U.S. Appl. No. 14/135,433, 6 pages (Delpapa). |
International Search Report and Written Opinion dated Jan. 21, 2015, received in triternational Application No. PCT/US2014/059748, which corresponds to U.S. Appl. No. 14/137,511, 13 pages (Dancho). |
International Search Report and Written Opinion dated Feb. 18, 2015, received in International Application No. PST/US2014/066921, which corresponds to U.S Appl. No. 14/135,260, 13 pages (Fitzpatrick). |
International Search Report and Written Opinion dated Jul. 25, 2014, received in International Patent Application No. PCT/US2014/029453, which corresponds to U.S. Appl. No. 13/963,444, 9 pages (Frayer). |
International Search Report and Written Opinion dated Mar. 7, 2014, received in International Patent Application No. PCT/US2013/074772, which corresponds to U.S. Appl. No. 13/831,218, 10 pages (Geroge). |
International Search Report and Written Opinion dated Mar. 24, 2014, received in International Patent Application No. PCT/US2013/074777, which corresponds to U.S. Appl. No. 13/831,308, 10 pages (George). |
Internationial Search Report and Written Opinion dated Mar. 7, 2014, received in International Patent Application No. PCT/US2013/074779, which corresponds to U.S. Appl. No. 13/831,374, 8 pages (George). |
Barr, Introduction to Watchdog Timers, Oct. 2001, 3 pgs. |
Canim, Buffered Bloom ilters on Solid State Storage, ADMS*10, Singapore, 13-17SEP2010, 8 pgs. |
Kang, A Multi-Channel Architecture for High-Performance NAND Flash-Based Storage System, J. Syst. Archit., 53, 9, Sep. 2007, 15 pgs. |
Kim, A Space-Efficient Flash Translation Layer for CompactFlash Systems, May 2002, 10 pgs. |
Lu, A Forest-structured Bloom Filter with Flash Memory, MSST 2011, Denver, CO, May 23-27, 2011, article, 6 pgs. |
Lu, A Forest-structured Bloom Filter with Flash Memory, MSST 2011, Denver, CO, May 23-27, 2011, presentation slides, 25 pgs. |
McLean, Information Technology-AT Attachment with Packet Interface Extension, Aug. 19, 1998, 339 pgs. |
Park, A High Performance Controller for NAND Flash-Based Solid State Disk (NSSD), Feb. 12-16, 2006, 4 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88133, Mar. 19, 2009, 7 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88136, Mar. 19, 2009, 7 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88146, Feb. 26, 2009, 10 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88154, Feb. 27, 2009, 8 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88164, Feb. 13, 2009, 6 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88206, Feb. 18, 2009, 8 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88217, Feb. 19, 2009, 7 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88229, Feb. 13, 2009, 7 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88232, Feb. 19, 2009, 8 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US08/88236, Feb. 19, 2009, 7 pgs. |
Pliant Technology, International Search Report / Written Opinion, PCT/US2011/028637, Oct. 27, 2011, 11 pgs. |
Pliant Technology, Supplementary ESR, 08866997.3, Feb. 23, 2012, 6 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/042764, Aug. 31, 2012, 12 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/042771, Mar. 4, 2013, 14 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/042775, Sep. 26, 2012, 8 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/059447, Jun. 6, 2013, 12 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/059453, Jun. 6, 2013, 12 pgs. |
Sandisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/059459, Feb. 14, 2013, 9 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/065914, May 23, 2013, 7 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/065916, Apr. 5, 2013, 7 pgs. |
SanDisk Enterprise IP LLC, International Search Report / Written Opinion, PCT/US2012/065919, Jun. 17, 2013, 8 pgs. |
SanDisk Enterprise IP LLC, Notification of the Decision to Grant a Patent Right for Patent for Invention, CN 200880127623.8, Jul. 4, 2013, 1 pg. |
SanDisk Enterprise IP LLC, Office Action, CN 200880127623.8, Apr. 18, 2012, 12 pgs. |
SanDisk Enterprise IP LLC, Office Action, CN 200880127623.8, Dec. 31, 2012, 9 pgs. |
SanDisk Enterprise IP LLC, Office Action, JP 2010-540863, Jul. 24, 2012, 3 pgs. |
Watchdog Timer and Power Savin Modes, Microchip Technology Inc., 2005, 14 pgs. |
Zeidman, 1999 Verilog Designer's Library, 9 pgs. |
Ashkenazi et al., “Platform independent overall security architecture in mutli-processor system-on-chip integrated circuits for use in mobile phones and handheld devices.” ScienceDirect, Computers and Electrical Engineering 33 (2007), 18 pages. |
Lee et al., “A Semi-Preemptive Garbage Collector for Solid State Drives,” Apr. 2011, IEEE, pp. 12-21. |
Office Action dated Feb. 17, 2015, received in Chinese Patent Application No. 201210334987.1, which corresponds to U.S. Appl. No. 12/082,207, 9 pages (Prins). |
International Search Report and Written Opinion dated May 4, 2015, received in International Patent Application No. PCT/US2014/065987, which corresponds to U.S. Appl. No. 14/135,400, 12 pages (George). |
International Search Report and Writtne Opinion dated Mar. 17, 2015, received in International Patent Application No. PCT/US2014/067467, which corresponds to U.S. Appl. No. 14/135,420, 13 pages (Lucas). |
International Search Report and Written Opinion dated Apr. 20, 2015, received in International Patent Application No. PCT/US2014/063949, which corresponds to U.S. Appl. No. 14/135,433, 21 pages (Delpapa). |
International Search Report and Written Opinion dated Mar. 9, 2015, received in International Patent Application No. PCT/US2014/059747, which corresponds to U.S. Appl. No. 14/137,440, 9 pages (Fitzpatrick). |
Bayer, “Prefix B-Trees”, IP.COM Journal, IP.COM Inc., West Henrietta, NY, Mar. 30, 2007, 29 pages. |
Bhattacharjee et al., “Efficient Index Compression in DB2 LUW”, IBM Research Report, Jun. 23, 2009, http://domino.research.ibm.com/library/cyberdig.nsf/papers/40B2C45876D0D747852575E100620CE7/$File/rc24815.pdf, 13 pages. |
Oracle, “Oracle9i: Database Concepts”, Jul. 2001, http://docs.oracle.com/cd/A91202—01/901—doc/server.901/a88856.pdf, 49 pages. |
International Search Report and Written Opinion dated Jun. 8, 2015, received in International Patent Application No. PCT/US2015/018252, which corresponds to U.S. Appl. No. 14/339,072, 9 pages (Busch). |
International Search Report and Written Opinion dated Jun. 2, 2015, received in International Patent Application No. PCT/US2015/018255, which corresponds to U.S. Appl. No. 14/336,967, 14 pages (Chander). |
International Search Report and Written Opinion dated Jun. 30, 2015, received in International Patent Application No. PCT/US2015/023927, which corresponds to U.S. Appl. No. 14/454,687, 11 pages (Kadayam). |
International Search Report and Written Opinion dated Jul. 23, 2015, received in International Patent Application No. PCT/US2015/030850, which corresponds to U.S. Appl. No. 14/298,843, 12 pages (Ellis). |
Office Action dated Dec. 8, 2014, received in Chinese Patent Application No. 201180021660.2, which corresponds to U.S. Appl. No. 12/726,200, 7 pages (Olbrich). |
Office Action dated Jul. 31, 2015, received in Chinese Patent Application No. 201180021660.2, which corresponds to U.S. Appl. No. 12/726,200, 9 pages (Olbrich). |
International Search Report and Written Opinion dated Sep. 14, 2015, received in International Patent Application No. PCT/US2015/036807, which corresponds to U.S. Appl. No. 14/311,152, 9 pages (Higgins). |
Number | Date | Country | |
---|---|---|---|
20150135008 A1 | May 2015 | US |
Number | Date | Country | |
---|---|---|---|
61903895 | Nov 2013 | US |