Identity-based flash management
First Claim
1. A system for configuring flash memory access behavior, the system comprising:
- a) an interface for receiving at least one identifier selected from the group consisting of a host-instance identifier and an end-user identifier; and
b) a flash policy enforcer operative to effect, in accordance with at least one said received identifier that is selected from said group, at least one flash configuration operation selected from the group consisting of;
i) a configuration of a flash error-correction policy;
ii) a configuration of a flash-management table storage policy;
iii) a configuration of a wear-leveling policy;
iv) a configuration of a bad-block-management policy; and
v) a configuration of at least one flash-programming voltage parameter.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus, and computer code for effecting flash policy configuration operations in accordance with an end-user identifier and/or a host-instance identifier are disclosed herein. Exemplary flash policy configuration operations include (i) configuring a flash error-correction policy, (ii) configuring a flash-management table storage policy; (iii) configuring a wear-leveling policy; (iv) configuring a bad-block management policy and (v) configuring a flash-programming voltage parameter. Exemplary end-user identifiers include but are not limited to email account identifiers, logon user names, and International Mobile Subscriber Identities (IMSI). Exemplary host-instance identifiers may include but are not limited to International Mobile EQUIPMENT Identifiers (IMEI). Optionally, the flash policy configuration is contingent on authentication context data—for example, strength of the authentication (e.g. login/password vs. smartcard authentication or biometric authentication), date of the authentication, and identity provider information.
94 Citations
36 Claims
-
1. A system for configuring flash memory access behavior, the system comprising:
-
a) an interface for receiving at least one identifier selected from the group consisting of a host-instance identifier and an end-user identifier; and b) a flash policy enforcer operative to effect, in accordance with at least one said received identifier that is selected from said group, at least one flash configuration operation selected from the group consisting of; i) a configuration of a flash error-correction policy; ii) a configuration of a flash-management table storage policy; iii) a configuration of a wear-leveling policy; iv) a configuration of a bad-block-management policy; and v) a configuration of at least one flash-programming voltage parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for configuring flash memory access behavior, the method comprising:
-
a) receiving at least one identifier selected from the group consisting of a host-instance identifier and an end-user identifier; and b) effecting, in accordance with at least one said received identifier of said group, at least one flash configuration operation selected from the group consisting of; i) configuring a flash error-correction policy; ii) configuring a flash-management table storage policy; iii) configuring a wear-leveling policy; iv) configuring a bad-block-management policy; and v) configuring at least one flash-programming parameter. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer readable storage medium comprising program instructions, wherein when executed the program instructions are operable to:
-
a) receive at least one identifier selected from the group consisting of a host-instance identifier and an end-user identifier; and b) effect, in accordance with at least one said received identifier selected from said group, at least one flash configuration operation selected from the group consisting of; i) configuring a flash error-correction policy; ii) configuring a flash-management layer storage policy; iii) configuring a wear-leveling policy; iv) configuring a bad-block-management policy; and v) configuring at least one flash-programming parameter.
-
Specification