WO2007118034A2 - System and method for write failure recovery - Google Patents
System and method for write failure recovery Download PDFInfo
- Publication number
- WO2007118034A2 WO2007118034A2 PCT/US2007/065679 US2007065679W WO2007118034A2 WO 2007118034 A2 WO2007118034 A2 WO 2007118034A2 US 2007065679 W US2007065679 W US 2007065679W WO 2007118034 A2 WO2007118034 A2 WO 2007118034A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- cells
- unit
- cipher block
- block chaining
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/1666—Error detection or correction of the data by redundancy in hardware where the redundant component is memory or memory area
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/16—Protection against loss of memory contents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
Definitions
- This invention relates in general to memory systems involving encryption/decryption of data, and in particular to a memory system or method for writing data with write failure recovery capability.
- Portable storage devices have been in commercial use for many years. They carry data from one computing device to another or to store back-up data.
- the mobile device market is developing in the direction of including content storage so as to increase the average revenue by generating more data exchanges. This means that valuable content has to be protected when stored on a mobile device.
- the data stored is typically encrypted and only authorized users are allowed to decrypt the data. This may be performed by means of an engine called a crypto-engine.
- Cipher block chaining is a method of encryption where the result (in the form of a cipher text block) of the encryption of the previous plain text block is fed back into the encryption of the next plain text block.
- each cipher text block is not only dependent on the plain text block, but also on previous plain text blocks.
- the initiation vector (IV), which is randomized data, is encrypted as the first block in the CBC process in order to provide unique input to the encryption engine, so that for a given plain text key used in the encryption, the cipher text generated would still be unique.
- the CBC process is carried out by the crypto-engine which can perform encryption and/or decryption.
- the context of the engine refers to the current state of the engine at a given time. For a given encryption/decryption cycle, the context generated and used is unique.
- a unit of data is written to the storage device.
- the information that is stored is the unit of data after it has been cipher block chaining processed.
- the information stored comprises security configuration or context information for cipher block chaining processing the unit of data.
- FIG. 1 is a block diagram of a memory system in communication with a host device to illustrate the invention.
- FIG. 2 is a block diagram of a CBC process useful for illustration the invention.
- Fig. 3 is a flow chart illustrating an operation of the system in Fig. 1 in writing data to the storage device where security configuration information is stored to illustrate one embodiment of the invention.
- Fig. 4 is a flow chart illustrating the operation of the system in Fig. 1 where the security configuration information stored is used to reconfigure the crypto-engine in retrying the write operation of the data that failed to be written previously, for illustrating an embodiment of the invention.
- identical components are labeled by the same numbers in this application.
- the memory system 10 includes a central processing unit (CPU) 12, a buffer management unit (BMU) 14, a host interface module (HIM) 16 and a flash interface module (FIM) 18, a flash memory 20 and a peripheral access module (PAM) 22.
- Memory system 10 communicates with a host device 24 through a host interface bus 26 and port 26a.
- the flash memory 20 which may be of the NAND type, provides data storage for the host device 24.
- the software code for CPU 12 may also be stored in flash memory 20.
- FIM 18 connects to the flash memory 20 through a flash interface bus 28 and port 28a.
- HIM 16 is suitable for connection to a host system like a digital camera, personal computer, personal digital assistant (PDA), digital media player, MP-3 player, and cellular telephone or other digital devices.
- the peripheral access module 22 selects the appropriate controller module such as FIM, HIM and BMU for communication with the CPU 12.
- controller module such as FIM, HIM and BMU for communication with the CPU 12.
- all of the components of system 10 within the dotted line box may be enclosed in a single unit such as in memory card or stick 10' and preferably encapsulated in the card or stick.
- the buffer management unit 14 includes a host direct memory access (HDMA) 32, a flash direct memory access (FDMA) controller 34, an arbiter 36, a buffer random access memory (BRAM) 38 and a crypto-engine 40.
- the arbiter 36 is a shared bus arbiter so that only one master or initiator (which can be HDMA 32, FDMA 34 or CPU 12) can be active at any time and the slave or target is BRAM 38.
- the arbiter is responsible for channeling the appropriate initiator request to the BRAM 38.
- the HDMA 32 and FDMA 34 are responsible for data transported between the HIM 16, FIM 18 and BRAM 38 or the CPU random access memory (CPU RAM) 12a.
- the operation of the HDMA 32 and of the FDMA 34 is conventional and need not be described in detail herein.
- the BRAM 38 is used to buffer data passed between the host device 24, flash memory 20 and CPU RAM 12a.
- the HDMA 32 and FDMA 34 are responsible for transferring the data between HIM 16/FIM 18 and BRAM 38 or the CPU RAM 12a and for indicating sector transfer completion. .
- unencrypted data When unencrypted data is sent by host device, through bus 26, HIM 16, HDMA 32 to the crypto-engine 40, such unencrypted data may be stored in BRAM 38. The data is then encrypted before it is sent to FDMA 34 on its way to memory 20. Where the data written undergoes multistage cryptographic processing, preferably engine 40 completes such processing before the processed data is sent to memory 20.
- the data stream is between the host device 24 and memory 20.
- the data source is then host device 24 and the destination is memory 20.
- the data source can also be the CPU 12 and the corresponding destination is the memory 20 in the writing operation. Whether the data source is host device 24 or CPU 12, the data for storage in the flash memory 20 is first cryptographically processed by engine 40 before it is written to memory 20.
- the memory system can in Fig. 1 contains a flash memory
- the system may alternatively contain another type of non-volatile memory instead, such as magnetic disks, optical CDs, as well as all other types of rewritable non-volatile memory systems, and the various advantages described below will equally apply to such alternative embodiments.
- the memory is also preferably encapsulated within the same physical body (such as a memory card or stick) along with the remaining components of the memory system.
- metapages When data stored in BRAM 38 (originating from either host device 24 or CPU 12) is written to flash memory 20, the data is written in programmable units known as metapages, where a metapage is written to flash memory 20 during each programming cycle of the CPU 12.
- One metapage may include a number of sectors, the size of the sector being defined by the host system.
- An example is a sector of 512 bytes of user data, following a standard established with magnetic disk drives, plus some number of bytes of overhead information about the user data and/or the metapage of which it is a part.
- the crypto-engine 40 performs the cryptographic process or processes using cryptographic algorithms and cryptographic keys. Many common cryptographic algorithms process 128 bits of data as a cryptographic processing unit. This is typically smaller than the size of metapages of data that are written during each programming cycle to flash memory 20.
- a crypto-engine 40 When a crypto-engine 40 performs CBC process on the data, crypto-engine 40 performs the CBC process on each plain text block (which in this case consists of a cryptographic processing unit) of the data stream and obtains a corresponding cipher text block.
- each plain text block which in this case consists of a cryptographic processing unit
- the resulting cipher text block of each cryptographic processing unit depends not only on the corresponding cryptographic processing unit, but also on the previous cryptographic processing units.
- Fig. 2 is a block diagram of a CBC process useful for illustrating the invention.
- the CBC process starts out with a random number called the initialization vector (IV).
- This number is encrypted by engine 40 using a key to arrive at a block of cipher text C 1 .
- the value C 1 and the first plain text block pi of the metapage are fed as inputs to an XOR gate, where the output of the gate is then encrypted again using a key to obtain cipher text C 2 .
- This operation is then repeated with C 2 and plain text block p 2 as inputs to a XOR gate where the output of the gate is encrypted by means of a key to obtain cipher text C 3 .
- the cipher text blocks are also referred to as message authentication codes (MAC) of the data stream.
- MAC message authentication codes
- the values c 0 , ..., c r above are the cipher text blocks or message authentication codes (MAC) of the metapage in the data stream, comprising plain text blocks pi, ..., p r . IV is the initiation vector, and k is a key.
- the MAC values e.g. C 0 , ..., c r
- the MAC values are calculated from the blocks of data by the Crypto- engine 40 in system 10 using a function such as the CBC function above, and the MAC values are written to memory 20.
- e* (x) means a process where x is encrypted by means of key k and e* ⁇ ; (x) means x is decrypted using the key k.
- the entire encrypted Ith metapage, or c 0 , ..., c r can be stored somewhere in system 10, such as in a data buffer in memory 20 or RAM 12a, so that when a problem is discovered in the writing process of the encrypted Ith metapage to flash memory 20, the stored encrypted metapage can be fetched again and re-written to flash memory 20. In this manner, the encrypted Ith metapage is not destroyed during the programming sequence so that it may be fetched later on in the event of a write failure.
- the programming code of CPU 12 includes a program command with no data transfer from the BRAM 38. Instead, the program command would use the data buffer in a flash memory 20 or RAM 12a as the data source and data is written again to the flash memory 20. These programming modes can then be used when a write failure is discovered.
- Such information preferably includes the last message authentication code or MAC value c r of the previous metapage, the various values of the registers of engine 40, the cryptographic algorithm that is being used for the processing, and optionally information to identify the metapage (or its location) that needs to be rewritten, for reasons explained below.
- stored information preferably includes the initiation vector IV instead of the last message authentication code or MAC value of the previous metapage.
- the CPU 12 After storing such information, the CPU 12 returns control to the FIM and FDMA which process the current metapage 1? cause it to be encrypted by engine 40, and then write the encrypted current metapage to flash memory 20.
- a buffer (not shown) between the FIM 18 and memory 20 to cache the encrypted metapage before it is written to flash memory 20, such as one or more sectors of the metapage being processed.
- This buffer may also be part of the FIM 18 or memory 20.
- the security configuration or context information stored preferably also includes the starting logical block addresses (LBAs) of the metapages that may be written to memory 20 at the same time, so that when it is discovered that the writing process of one of such metapages has failed, the system can be returned to the beginning address of such one metapage in order to rewrite it in encrypted form to flash memory 20.
- LBAs logical block addresses
- This last cipher block text from the previous metapage or the initiation vector may then be fed as an input along with the first plain text block in the current metapage to a XOR gate, where the output of the gate is input to engine 40 to perform the encryption. In this manner, it is no longer necessary to provide the capacity in either the flash memory or the RAM 12a for storing all of the cipher text blocks of any metapage.
- the two buffers for storing the security configuration information may be labeled 12a(0) and 12a(l) and the bufferindex would toggle between 0 and 1 to point to one of the two buffers for storing security configuration information.
- the process for write fault recovery by means of storing the security configuration information is illustrated in Fig. 3.
- the CPU 12 zeros out the context or security configuration information stored in the two buffers 12a(0) and 12a(l) and set the value of bufferindex to 0. (Block 102.)
- the settings or context are loaded to the buffer management unit 14 and FIM 18 by CPU 12. This sets up the FDMA 34 and causes FIM 18 to be ready to process data.
- the crypto-engine 40 is also configured.
- CPU 12 waits until flash memory 20 is ready to receive data (Block 104). System 10 is then ready for write operation 106.
- CPU 12 causes the FIM write program to start and transfers control of the various buses to FIM 18. (Block 108).
- FIM 18 interrupts the CPU 12 just before transferring data from BRAM 38 to FIM 18 and flash memory 20, that is, before issuing the DMA write operation code (Block 110).
- the back end (BE) Flash Ware and suspend/resume module (SRM) API are software read from a storage such as flash memory 20 to CPU RAM 12a.
- the BE Flash Ware is executed by CPU 12 to invoke SRM API for saving crypto context or security configuration information of the metapage and of the engine 40 into the buffer that is pointed to by the value of the bufferindex.
- this information is then stored in buffer 12a(0). Also stored in buffer 12a(0) is the starting logical block address of the metapage being written in this write operation. (Block 112)
- the BE Flash Ware executed by CPU 12 then returns control of the device 10 back to FIM 18.
- the CPU 12 also causes the FDMA 34 to be started, so that data from BRAM 38 from the metapage is starting to be encrypted by crypto-engine 40 and written to memory 20.
- the FIM 18 then checks to see whether the programming of the entire metapage to flash memory 20 is completed indicating that the programming of such metapage passes. (Diamond 116). If the metapage is successfully written to flash memory 20 without incident, the bufferindex is incremented by one and then divided by two (or modulo 2) to obtain the remainder.
- Block 122 In this instance where the bufferindex has been set to 0, such operation causes bufferindex to be 1 in block 122 and FIM 18 returns control to the CPU 12 in Block 104 to repeat the process for the next metapage. In the next cycle for writing the next metapage, the context or security configuration information will be written to buffer 12a(l) instead, since the bufferindex has been set to 1.
- the FIM 18 then interrupts the processor 12 (Block 118) and the write operation is re-tried using a retry mechanism 120.
- the retry mechanism is illustrated in Fig. 4.
- the FIM 18 when FIM 18 discovers a failure of the write operation, the FIM 18 is aware of the location of the write failure and in which metapage the write failure occurred. FIM 18 is therefore aware of the beginning logical block address (LBA) of the metapage in which the write failure occurred. This address is then matched with or compared to the starting LBA address in the two buffers 12a(0) and 12a(l) and identifies the buffer that contains the LBA address that matches that of the metapage at which the write failure occurred.
- LBA logical block address
- Block 152 The context or security configuration information stored in such buffer that has been identified is then used to restore the state of the crypto- engine 40.
- Block 154 The CPU 12 then activates FIM 18, FDMA 34, and engine 40 to again encrypt the metapage from BRAM 38 starting at the beginning logical block address of the metapage at which the write failure occurred and write the encrypted metapage to flash memory 20 as before.
- Blocks 156, 158 The FIM 18 also deletes or marks for deletion whatever incomplete encrypted metapage(s) that may have been written to memory 20. After this operation has been completed, CPU 12 returns the operation to Block 104 of Fig. 3.
- the preceding metapage(s) are also rewritten or reprogrammed if they have not been completely written to memory 20 even though no write failure occurred during their programming.
- the status of the programming of a particular metapage is known only after the next cached metapage finishes programming. In such event, CPU 12 will always go back two metapages (i.e. the metapage in which the write error occurred and the preceding one) for reprogramming, except that for the last metapage, it will only reprogram the last metapage.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
When cipher block chaining encryption/decryption is employed, write fault recovery is accomplished by storing information useful for the writing of cipher block chaining processed data before it is written to storage cells. Hence when write failure is discovered, this information stored can be retrieved for rewriting the data to the cells. Preferably, the information stored includes security configuration information for cipher block chaining processing a unit of data.
Description
SYSTEM AND METHOD FOR WRITE FAILURE RECOVERY
BACKGROUND OF THE INVENTION
[0001] This invention relates in general to memory systems involving encryption/decryption of data, and in particular to a memory system or method for writing data with write failure recovery capability.
[0002] Portable storage devices have been in commercial use for many years. They carry data from one computing device to another or to store back-up data. The mobile device market is developing in the direction of including content storage so as to increase the average revenue by generating more data exchanges. This means that valuable content has to be protected when stored on a mobile device. In order to protect the content stored in the portable storage devices, the data stored is typically encrypted and only authorized users are allowed to decrypt the data. This may be performed by means of an engine called a crypto-engine.
[0003] Cipher block chaining (CBC) is a method of encryption where the result (in the form of a cipher text block) of the encryption of the previous plain text block is fed back into the encryption of the next plain text block. Thus, each cipher text block is not only dependent on the plain text block, but also on previous plain text blocks. The initiation vector (IV), which is randomized data, is encrypted as the first block in the CBC process in order to provide unique input to the encryption engine, so that for a given plain text key used in the encryption, the cipher text generated would still be unique.
[0004] The CBC process is carried out by the crypto-engine which can perform encryption and/or decryption. The context of the engine refers to the current state of the engine at a given time. For a given encryption/decryption cycle, the context generated and used is unique.
[0005] When CBC is used for data encryption during a write operation, programming of the storage device may fail. In such event, the data would need to be
reprogrammed to the storage device. This would require that the data that has failed to be written during the write operation be transferred again to the storage device. But once the data has already been transferred through the crypto- or encryption/decryption engine using a given context, the same data cannot pass through the engine again without re-configuring the engine with the proper context. It is therefore desirable to provide a solution for the above problem.
SUMMARY OF THE INVENTION
[0006] The above described problem can be solved by storing information useful for the writing of cipher block chaining processed data during one or more of programming cycles prior to the writing of such data to the storage device in such cycle(s), so that such data can again be written to the storage device in the event of a write failure.
[0007] During at least one of the programming cycles, a unit of data is written to the storage device. In one embodiment, the information that is stored is the unit of data after it has been cipher block chaining processed. In another embodiment, the information stored comprises security configuration or context information for cipher block chaining processing the unit of data.
BRIEF DESCRIPTION OF THE DRAWINGS
[0008] Fig. 1 is a block diagram of a memory system in communication with a host device to illustrate the invention.
[0009] Fig. 2 is a block diagram of a CBC process useful for illustration the invention.
[0010] Fig. 3 is a flow chart illustrating an operation of the system in Fig. 1 in writing data to the storage device where security configuration information is stored to illustrate one embodiment of the invention.
[0011] Fig. 4 is a flow chart illustrating the operation of the system in Fig. 1 where the security configuration information stored is used to reconfigure the crypto-engine in retrying the write operation of the data that failed to be written previously, for illustrating an embodiment of the invention.
[0012] For convenience in description, identical components are labeled by the same numbers in this application.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
[0013] An example memory system in which the various aspects of the present invention may be implemented is illustrated by the block diagram of Fig. 1. As shown in Fig. 1, the memory system 10 includes a central processing unit (CPU) 12, a buffer management unit (BMU) 14, a host interface module (HIM) 16 and a flash interface module (FIM) 18, a flash memory 20 and a peripheral access module (PAM) 22. Memory system 10 communicates with a host device 24 through a host interface bus 26 and port 26a. The flash memory 20 which may be of the NAND type, provides data storage for the host device 24. The software code for CPU 12 may also be stored in flash memory 20. FIM 18 connects to the flash memory 20 through a flash interface bus 28 and port 28a. HIM 16 is suitable for connection to a host system like a digital camera, personal computer, personal digital assistant (PDA), digital media player, MP-3 player, and cellular telephone or other digital devices. The peripheral access module 22 selects the appropriate controller module such as FIM, HIM and BMU for communication with the CPU 12. In one embodiment, all of the components of system 10 within the dotted line box may be enclosed in a single unit such as in memory card or stick 10' and preferably encapsulated in the card or stick.
[0014] The buffer management unit 14 includes a host direct memory access (HDMA) 32, a flash direct memory access (FDMA) controller 34, an arbiter 36, a buffer random access memory (BRAM) 38 and a crypto-engine 40. The arbiter 36 is a shared bus arbiter so that only one master or initiator (which can be HDMA 32, FDMA 34 or CPU 12) can be active at any time and the slave or target is BRAM 38. The arbiter is responsible for channeling the appropriate initiator request to the BRAM 38. The HDMA 32 and FDMA 34 are responsible for data transported between the HIM 16, FIM 18 and BRAM 38 or the CPU random access memory (CPU RAM) 12a. The operation of the HDMA 32 and of the FDMA 34 is conventional and need not be described in detail herein. The BRAM 38 is used to buffer data passed between the host device 24, flash memory 20 and CPU RAM 12a. The HDMA 32 and FDMA 34 are responsible for transferring the data between HIM
16/FIM 18 and BRAM 38 or the CPU RAM 12a and for indicating sector transfer completion. .
[0015] When originally encrypted data is written to flash memory 20 by the host device 24, encrypted data from the host is sent through bus 26, HIM 16, HDMA 32, crypto-engine 40 where the encrypted data is decrypted and stored in BRAM 38. The decrypted data is then sent from BRAM 38, through FDMA 34, FIM 18, bus 28 to flash memory 20. The data fetched from BRAM 38 may again be encrypted by means of crypto-engine 40 before it is passed to FDMA 34 so that the data sent to the flash memory 20 is again encrypted but by means of a different key and/or algorithm compared to the those whereby the data from the host device 24 is decrypted. This illustrates the data stream during a writing process.
[0016] When unencrypted data is sent by host device, through bus 26, HIM 16, HDMA 32 to the crypto-engine 40, such unencrypted data may be stored in BRAM 38. The data is then encrypted before it is sent to FDMA 34 on its way to memory 20. Where the data written undergoes multistage cryptographic processing, preferably engine 40 completes such processing before the processed data is sent to memory 20.
[0017] In many applications, it may be desirable to perform data encryption in real time when data is written to storage devices such as memory 20, known as on the fly data encryption. This is more efficient, since the data does not need to be stored for the purpose of encryption as an intermediate step before the data is written to the storage device. Thus when unencrypted or encrypted data is sent from the host 24 to the memory 20, preferably the encryption is done on the fly.
[0018] In the process described above, the data stream is between the host device 24 and memory 20. Thus, the data source is then host device 24 and the destination is memory 20. In addition, the data source can also be the CPU 12 and the corresponding destination is the memory 20 in the writing operation. Whether the data source is host device 24 or CPU 12, the data for storage in the flash memory 20 is first cryptographically processed by engine 40 before it is written to memory 20.
[0019] While the memory system can in Fig. 1 contains a flash memory, the system may alternatively contain another type of non-volatile memory instead, such as magnetic disks, optical CDs, as well as all other types of rewritable non-volatile
memory systems, and the various advantages described below will equally apply to such alternative embodiments. In the alternative embodiments, the memory is also preferably encapsulated within the same physical body (such as a memory card or stick) along with the remaining components of the memory system.
[0020] When data stored in BRAM 38 (originating from either host device 24 or CPU 12) is written to flash memory 20, the data is written in programmable units known as metapages, where a metapage is written to flash memory 20 during each programming cycle of the CPU 12. One metapage may include a number of sectors, the size of the sector being defined by the host system. An example is a sector of 512 bytes of user data, following a standard established with magnetic disk drives, plus some number of bytes of overhead information about the user data and/or the metapage of which it is a part.
[0021] The crypto-engine 40 performs the cryptographic process or processes using cryptographic algorithms and cryptographic keys. Many common cryptographic algorithms process 128 bits of data as a cryptographic processing unit. This is typically smaller than the size of metapages of data that are written during each programming cycle to flash memory 20.
[0022] When a crypto-engine 40 performs CBC process on the data, crypto-engine 40 performs the CBC process on each plain text block (which in this case consists of a cryptographic processing unit) of the data stream and obtains a corresponding cipher text block. Thus the resulting cipher text block of each cryptographic processing unit depends not only on the corresponding cryptographic processing unit, but also on the previous cryptographic processing units.
[0023] Fig. 2 is a block diagram of a CBC process useful for illustrating the invention. As shown in Fig. 2, when processing the first metapage, the CBC process starts out with a random number called the initialization vector (IV). This number is encrypted by engine 40 using a key to arrive at a block of cipher text C1. The value C1 and the first plain text block pi of the metapage are fed as inputs to an XOR gate, where the output of the gate is then encrypted again using a key to obtain cipher text C2. This operation is then repeated with C2 and plain text block p2 as inputs to a XOR gate where the output of the gate is encrypted by means of a key to obtain cipher text
C3. This process continues in the same manner until all of the plain text blocks in the metapage have been encrypted. Then the same process will begin for the second metapage and all of the metapages that follow, using the last cipher text block from the previous metapage instead of the initialization vector (IV).
[0024] The cipher text blocks are also referred to as message authentication codes (MAC) of the data stream. Thus, the encryption and decryption CBC functions for the first metapage of the type in Fig. 2 may be represented as follows:
Encryption.
Input: m -bit key k ; / -bit IV; / -bit plain text blocks p\, pr.
Output: Co, , cr such that Co <— IV and C1 <— ^Ci-1 ® Pi) for 1 ≤ i < r.
Decryption.
Input: m -bit key k ; /-bit IV; / -bit cipher text blocks c\, — cr.
[0025] The values c0, ..., cr above are the cipher text blocks or message authentication codes (MAC) of the metapage in the data stream, comprising plain text blocks pi, ..., pr. IV is the initiation vector, and k is a key. Thus, when it is desirable to encrypt and write a metapage containing blocks of data pi, ..., pr to memory 20, the MAC values (e.g. C0, ..., cr) are calculated from the blocks of data by the Crypto- engine 40 in system 10 using a function such as the CBC function above, and the MAC values are written to memory 20. In the above formulas, e* (x) means a process where x is encrypted by means of key k and e* ~;(x) means x is decrypted using the key k.
[0026] In the above encryption process, it will be observed that in order to encrypt each metapage (except for the first metapage), engine 40 will need to employ the last message authentication code or cipher text cr from the previous metapage instead of IV. To encrypt the first metapage, engine 40 will need to employ the initiation vector IV.
Write Fault Recovery:
[0027] From the above, it will be observed that after encryption using CBC, the encrypted cipher text blocks or MAC values of each metapage in the data stream are as follows: C0, ... , cr. These cipher text blocks are then written to flash memory 20.
[0028] If there is a problem in writing the Ith metapage, this sequence of MAC values of encrypted metapage will need to be once again written to flash memory 20. Since the crypto-engine 40 normally does not store encrypted data, such encrypted data no longer exists.
[0029] In order to be able to retry the writing process of the Ith metapage, the entire encrypted Ith metapage, or c0, ..., cr, can be stored somewhere in system 10, such as in a data buffer in memory 20 or RAM 12a, so that when a problem is discovered in the writing process of the encrypted Ith metapage to flash memory 20, the stored encrypted metapage can be fetched again and re-written to flash memory 20. In this manner, the encrypted Ith metapage is not destroyed during the programming sequence so that it may be fetched later on in the event of a write failure. In addition, the programming code of CPU 12 includes a program command with no data transfer from the BRAM 38. Instead, the program command would use the data buffer in a flash memory 20 or RAM 12a as the data source and data is written again to the flash memory 20. These programming modes can then be used when a write failure is discovered.
[0030] Storing the encrypted metapage in a flash memory 20 or RAM 12a would require the flash memory 20 or RAM 12a to include a large size buffer adequate for storing the entire encrypted metapage. Thus, preferably and as an alternative, one stores only the necessary information to restore engine 40 to the proper state so that it can continue to process again the plain text blocks in the metapage that failed to be written after the discovery that the process of writing such encrypted metapage has failed. The unencrypted metapage may again be fetched from BRAM 38 and processed by engine 40, and the processed metapage rewritten to memory 20. Thus, before the current metapage is being processed by engine 40, context information or security configuration information of engine 40 is first stored in a buffer, such as in RAM 12a of Fig. 1. Such information preferably includes the last message authentication code or MAC value cr of the previous metapage, the various values of
the registers of engine 40, the cryptographic algorithm that is being used for the processing, and optionally information to identify the metapage (or its location) that needs to be rewritten, for reasons explained below. In the case where the first metapage is to be written, such stored information preferably includes the initiation vector IV instead of the last message authentication code or MAC value of the previous metapage. After storing such information, the CPU 12 returns control to the FIM and FDMA which process the current metapage1? cause it to be encrypted by engine 40, and then write the encrypted current metapage to flash memory 20.
[0031] In some embodiments, it may be desirable to employ a buffer (not shown) between the FIM 18 and memory 20 to cache the encrypted metapage before it is written to flash memory 20, such as one or more sectors of the metapage being processed. This buffer may also be part of the FIM 18 or memory 20.
[0032] Although only portions of one metapage are cached, it is possible for data of both the currently processed metapage and the cached metapage to be written to the flash memory 20 at the same time. In such event, one will need to be able to determine how far the system should go back in the data stream (i.e. whether the currently processed metapage or the following metapage that is cached) to perform data encryption and rewriting to memory 20 when a write failure is discovered. For this purpose, the security configuration or context information stored preferably also includes the starting logical block addresses (LBAs) of the metapages that may be written to memory 20 at the same time, so that when it is discovered that the writing process of one of such metapages has failed, the system can be returned to the beginning address of such one metapage in order to rewrite it in encrypted form to flash memory 20.
[0033] As noted above, in a first technique for solving the problem of write failure, all of the large number of cipher text blocks are stored, either in the flash memory 20, or in RAM 12a; this means that significant storage space in either the flash memory or the RAM 12a is required. This is the case since it is not known ahead of time precisely in what portion of the metapage that the write failure occurred. For this reason, all of the cipher text blocks are stored so that they can be rewritten to the flash memory.
[0034] In contrast, in the second technique where only the security configuration information or context information of the metapage is stored, it is not necessary to store all of the cipher text blocks of the metapage. Instead, only the last cipher text block of the previous metapage or the initiation vector will need to be stored, in addition to information for restoring engine 40 to the proper state. This last cipher block text from the previous metapage or the initiation vector may then be fed as an input along with the first plain text block in the current metapage to a XOR gate, where the output of the gate is input to engine 40 to perform the encryption. In this manner, it is no longer necessary to provide the capacity in either the flash memory or the RAM 12a for storing all of the cipher text blocks of any metapage.
[0035] As noted above, it is possible for data from two metapages to be processed and written to flash memory 20 at the same time. For this reason, two buffers in RAM 12a are used to store the security configuration information of the two metapages being processed. Obviously, where it is possible for three or more metapages to be written to memory 20, then three or more buffers are used instead; such and other variations are within the scope of the invention. Assuming that two metapages may be written to flash memory 20 at the same time, a parameter called bufferindex is used to keep track of the two sets of security configuration information stored in the two buffers so that the correct security configuration information is restored for reprocessing the corresponding metapage when write failure occurs. Thus the two buffers for storing the security configuration information may be labeled 12a(0) and 12a(l) and the bufferindex would toggle between 0 and 1 to point to one of the two buffers for storing security configuration information. The process for write fault recovery by means of storing the security configuration information is illustrated in Fig. 3.
[0036] First the CPU 12 zeros out the context or security configuration information stored in the two buffers 12a(0) and 12a(l) and set the value of bufferindex to 0. (Block 102.) The settings or context are loaded to the buffer management unit 14 and FIM 18 by CPU 12. This sets up the FDMA 34 and causes FIM 18 to be ready to process data. The crypto-engine 40 is also configured. After such loading, CPU 12 waits until flash memory 20 is ready to receive data (Block 104). System 10 is then ready for write operation 106.
[0037] CPU 12 causes the FIM write program to start and transfers control of the various buses to FIM 18. (Block 108). FIM 18 interrupts the CPU 12 just before transferring data from BRAM 38 to FIM 18 and flash memory 20, that is, before issuing the DMA write operation code (Block 110). The back end (BE) Flash Ware and suspend/resume module (SRM) API are software read from a storage such as flash memory 20 to CPU RAM 12a. The BE Flash Ware is executed by CPU 12 to invoke SRM API for saving crypto context or security configuration information of the metapage and of the engine 40 into the buffer that is pointed to by the value of the bufferindex. Thus, upon initiation, since the bufferindex has been set to 0, this information is then stored in buffer 12a(0). Also stored in buffer 12a(0) is the starting logical block address of the metapage being written in this write operation. (Block 112)
[0038] The BE Flash Ware executed by CPU 12 then returns control of the device 10 back to FIM 18. The CPU 12 also causes the FDMA 34 to be started, so that data from BRAM 38 from the metapage is starting to be encrypted by crypto-engine 40 and written to memory 20. (Block 114). The FIM 18 then checks to see whether the programming of the entire metapage to flash memory 20 is completed indicating that the programming of such metapage passes. (Diamond 116). If the metapage is successfully written to flash memory 20 without incident, the bufferindex is incremented by one and then divided by two (or modulo 2) to obtain the remainder. (Block 122) In this instance where the bufferindex has been set to 0, such operation causes bufferindex to be 1 in block 122 and FIM 18 returns control to the CPU 12 in Block 104 to repeat the process for the next metapage. In the next cycle for writing the next metapage, the context or security configuration information will be written to buffer 12a(l) instead, since the bufferindex has been set to 1.
[0039] If the programming did not pass, however, the FIM 18 then interrupts the processor 12 (Block 118) and the write operation is re-tried using a retry mechanism 120. The retry mechanism is illustrated in Fig. 4. In reference to Fig. 4, when FIM 18 discovers a failure of the write operation, the FIM 18 is aware of the location of the write failure and in which metapage the write failure occurred. FIM 18 is therefore aware of the beginning logical block address (LBA) of the metapage in which the write failure occurred. This address is then matched with or compared to the starting
LBA address in the two buffers 12a(0) and 12a(l) and identifies the buffer that contains the LBA address that matches that of the metapage at which the write failure occurred. (Block 152) The context or security configuration information stored in such buffer that has been identified is then used to restore the state of the crypto- engine 40. (Block 154). The CPU 12 then activates FIM 18, FDMA 34, and engine 40 to again encrypt the metapage from BRAM 38 starting at the beginning logical block address of the metapage at which the write failure occurred and write the encrypted metapage to flash memory 20 as before. (Blocks 156, 158). The FIM 18 also deletes or marks for deletion whatever incomplete encrypted metapage(s) that may have been written to memory 20. After this operation has been completed, CPU 12 returns the operation to Block 104 of Fig. 3.
[0040] As noted above, it is possible for data from more than one metapage to be written or programmed to memory 20 during the same cycle. Thus, if the write error occurs when data from one metapage is being written to memory 20, it may be necessary or desirable to rewrite or reprogram not only such metapage, but also the metapage(s) preceding it when data from the preceding metapage(s) is also being written to memory 20. Thus, when write failure occurs, the CPU 12 will determine how far back the rewriting or reprogramming of data should go. In other words, the CPU 12 will determine whether to rewrite or reprogram just the metapage at which the write failure occurred, or whether to rewrite or reprogram also the metapage(s) preceding it as well. Preferably, the preceding metapage(s) are also rewritten or reprogrammed if they have not been completely written to memory 20 even though no write failure occurred during their programming. In one implementation where it is possible for two metapages to be written during the same cycle, the status of the programming of a particular metapage is known only after the next cached metapage finishes programming. In such event, CPU 12 will always go back two metapages (i.e. the metapage in which the write error occurred and the preceding one) for reprogramming, except that for the last metapage, it will only reprogram the last metapage.
[0041] By indexing three or more buffers in RAM 12a instead of two, the above described process can be readily extended to applications where three or more buffers are used to store the context or security configuration information and the beginning
logical block addresses of three or more corresponding metapages. The above operation pertains to write failure recovery when metapages are encrypted. Essentially the same process would apply where encrypted data in BRAM 38 is to be decrypted before it is written to memory 20. While embodiments of this invention have been illustrated by reference to on the fly data cryptographic processing, it will be understood that it may apply as well to systems that do not perform on the fly data cryptographic processing during the data writing process. While the embodiments above refer to various examples of specific sizes of data blocks being processed by engine and various sizes of the metapages, it will be understood that the same advantages will apply for different sizes of data blocks processed by engine 40 and of metapages. For some applications, when write failure is detected, it may be desirable for the system to go back, not to the beginning of the metapage in which the write failure occurred, but to the sector within such metapage, for encrypting and re -writing to memory 20 such sector and all sectors in such metapage that follow such sector in the data stream. In this manner, the system can avoid having to encrypt the sectors in such metapage that precede the sector where the write failure occurred. This may improve efficiency. All such and other variations are within the scope of the invention.
[0042] While the invention has been described above by reference to various embodiments, it will be understood that changes and modifications may be made without departing from the scope of the invention, which is to be defined only by the appended claims and their equivalent. All references referred to herein are incorporated by reference in their entireties.
Claims
1. A method for processing data in a memory system for storing encrypted data comprising non-volatile memory cells and a cryptographic circuit, said method comprising: causing the circuit to perform cipher block chaining processes on data in a data stream to be written to the cells; writing data in the data stream to the cells in sequential programming cycles, so that data in the data stream is processed by a cipher block chaining process by the circuit before it is written to the cells; and during at least one of the programming cycles, storing information useful for the writing of cipher block chaining processed data for such cycle prior to the writing of such data to the cells, so that such data can again be written to the cells after discovery of a write failure.
2. The method of claim 1, further comprising: detecting a failure in the writing of cipher block chaining processed data in such cycle to the cells; and writing to the cells the cipher block chaining processed data using the stored information.
3. The method of claim 2, further comprising causing the circuit to perform a cipher block chaining process on data that failed to be written to the cells, using the stored information to obtain in such process the cipher block chaining processed data that is again written to the cells.
4. The method of claim 3, wherein the writing of data in said at least one programming cycle writes a unit of data to the cells, and wherein said storing stores said unit of data after it has been cipher block chaining processed.
5. The method of claim 3, wherein the writing of data in said at least one programming cycle writes a unit of data to the cells, wherein said storing stores security configuration information for cipher block chaining processing said unit of data.
6. The method of claim 5, wherein the security configuration information includes cryptographic key, cryptographic algorithm, and/or one of the following: message authentication codes and an initiation vector.
7. The method of claim 6, further comprising retrieving the security configuration information stored, said information including message authentication codes and/or an initiation vector, and deriving updated message authentication codes from the message authentication codes and/or an initiation vector retrieved.
8. The method of claim 5, wherein during each of at least two consecutive programming cycles, said storing stores security configuration information for the cipher block chaining processing of the unit of data for such cycle prior to the writing of such data to the cells.
9. The method of claim 8, wherein the security configuration information that is stored includes location information for locating the unit of data.
10. The method of claim 9, said method further comprising: caching one or more portions of at least one cipher block chaining processed unit of data before it is written to the cells, wherein said writing writes data from said least one cipher block chaining processed unit and another unit to the cells during said least one cycle, and wherein said detecting detects, among the cached unit(s) of data and the another unit, which unit of data has failed to be written to the cells; and locating said unit of data that has failed to be written in a form prior to cipher block chaining processing using the location information, wherein said circuit is caused to perform cipher block chaining processes on such unit of data.
11. The method of claim 10, wherein said detected unit of data is one whose one or more portions has been cached, said method further comprising causing and said circuit to perform cipher block chaining processes on such unit of data as well as on all unit(s) of data that precede such unit in the data stream and that have not been completely written to the cells.
12. The method of claim 11, further comprising deleting, or marking as unit(s) to be deleted, from the cells any unit that has not been completely written to the cells.
13. A method for processing data in a memory system for storing encrypted data comprising non-volatile memory cells and a cryptographic circuit, said method comprising: causing the circuit to perform cipher block chaining processes on data in a data stream to the cells; writing data in the data stream to the cells in sequential programming cycles, so that data in the data stream is processed by the circuit before it is written to the cells; and during at least one of the programming cycles, causing information useful for the cipher block chaining processing of data for at least a part of such cycle to be stored prior to the writing of such data to the cells, so that such data can again be written to the cells after being cipher block chaining processed and after discovery of a write failure.
14. A memory system for storing encrypted data, comprising: non-volatile memory cells; a circuit performing cipher block chaining processes on data in a data stream to the cells; and a controller writing cipher block chaining processed data from the data stream to the cells in sequential programming cycles, wherein during at least one of the programming cycles, the controller stores information useful for the writing of cipher block chaining processed data for such cycle prior to writing such data to the cells, so that such data can again be written to the cells after discovery of a write failure.
15. The system of claim 14, wherein said controller detects a failure in the writing of cipher block chaining processed data in such cycle to the cells, and writes again to the cells the cipher block chaining processed data using the stored information.
16. The system of claim 15, said controller causing the circuit to perform cipher block chaining processes on data that failed to be written to the cells after such data has been cipher block chaining processed, using the stored information to obtain the cipher block chaining processed data that is again written to the cells.
17. The system of claim 16, wherein the writing of data in said at least one programming cycle writes a unit of data to the cells, wherein said controller stores said unit of data after it has been cipher block chaining processed.
18. The system of claim 16, wherein the writing of data in said at least one programming cycle writes a unit of data to the cells, wherein said controller stores security configuration information for cipher block chaining processing said unit of data.
19. The system of claim 18, wherein the security configuration information includes cryptographic key, cryptographic algorithm, and/or one of the following: message authentication codes and an initiation vector.
20. The system of claim 19, wherein said controller retrieves the security configuration information stored, said information including message authentication codes and/or an initiation vector, and derives updated message authentication codes from the message authentication codes retrieved.
21. The system of claim 18, wherein during each of at least two consecutive programming cycles, said controller stores security configuration information for the cipher block chaining processing of the unit of data for such cycle prior to the writing of such data to the cells.
22. The system of claim 21 , wherein the security configuration information that is stored includes location information for locating the unit of data.
23. The system of claim 22, said system further comprising a storage caching one or more portions of at least one cipher block chaining processed unit of data before said portion(s) are written to the cells, wherein said controller writes data from said least one cipher block chaining processed unit and another unit to the cells during said least one cycle, and wherein said controller detects, among the cached unit(s) of data and the another unit, which unit of data has failed to be written to the cells, and locates said detected unit of data in a form prior to cipher block chaining processing using the location information, wherein said controller causes said circuit to perform cipher block chaining processes on such unit of data.
24. The system of claim 23, wherein said detected unit of data is one whose one or more portions has been cached, and said controller causes said circuit to perform cipher block chaining processes on such unit of data as well as on all unit(s) of data that precede such unit in the data stream and that have not been completely written to the cells.
25. The system of claim 24, wherein said controller deletes, or marks as unit(s) to be deleted, from the cells any unit that has not been completely written to the cells.
26. A memory system for storing encrypted data, comprising: non-volatile memory cells; a circuit performing cipher block chaining processes on data in a data stream to the cells; and a controller writing cipher block chaining processes data from the data stream to the cells in sequential programming cycles, wherein during at least one of the programming cycles, the controller stores information useful for the cipher block chaining processing of data for at least a part of such cycle prior to writing such data to the cells, so that such data can again be written to the cells after being cipher block chaining processed and after discovery of a write failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009504395A JP2009537026A (en) | 2006-04-03 | 2007-03-30 | System and method for write failure recovery |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/397,416 US7835518B2 (en) | 2006-04-03 | 2006-04-03 | System and method for write failure recovery |
US11/397,101 | 2006-04-03 | ||
US11/397,416 | 2006-04-03 | ||
US11/397,101 US20070230690A1 (en) | 2006-04-03 | 2006-04-03 | System for write failure recovery |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007118034A2 true WO2007118034A2 (en) | 2007-10-18 |
WO2007118034A3 WO2007118034A3 (en) | 2009-08-13 |
Family
ID=38581765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/065679 WO2007118034A2 (en) | 2006-04-03 | 2007-03-30 | System and method for write failure recovery |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP2009537026A (en) |
KR (1) | KR20080108119A (en) |
TW (1) | TW200817993A (en) |
WO (1) | WO2007118034A2 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071553A1 (en) * | 2000-10-20 | 2002-06-13 | Taizo Shirai | Data storage device, data recording method, data playback method, and program providing medium |
WO2002101976A1 (en) * | 2001-06-13 | 2002-12-19 | Corrent Corporation | Security association data cache |
US20060015754A1 (en) * | 2004-07-15 | 2006-01-19 | International Business Machines Corporation | E-fuses for storing security version data |
US20060050564A1 (en) * | 2004-09-08 | 2006-03-09 | Kabushiki Kaisha Toshiba | Non-volatile semiconductor memory device |
-
2007
- 2007-03-30 JP JP2009504395A patent/JP2009537026A/en active Pending
- 2007-03-30 KR KR1020087024279A patent/KR20080108119A/en not_active Application Discontinuation
- 2007-03-30 WO PCT/US2007/065679 patent/WO2007118034A2/en active Application Filing
- 2007-04-03 TW TW096111847A patent/TW200817993A/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071553A1 (en) * | 2000-10-20 | 2002-06-13 | Taizo Shirai | Data storage device, data recording method, data playback method, and program providing medium |
WO2002101976A1 (en) * | 2001-06-13 | 2002-12-19 | Corrent Corporation | Security association data cache |
US20060015754A1 (en) * | 2004-07-15 | 2006-01-19 | International Business Machines Corporation | E-fuses for storing security version data |
US20060050564A1 (en) * | 2004-09-08 | 2006-03-09 | Kabushiki Kaisha Toshiba | Non-volatile semiconductor memory device |
Also Published As
Publication number | Publication date |
---|---|
WO2007118034A3 (en) | 2009-08-13 |
TW200817993A (en) | 2008-04-16 |
JP2009537026A (en) | 2009-10-22 |
KR20080108119A (en) | 2008-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7835518B2 (en) | System and method for write failure recovery | |
US11368313B2 (en) | Data storage devices and methods for encrypting a firmware file thereof | |
KR101323746B1 (en) | Memory System with In-Stream Data Encryption/Decryption | |
US20070061897A1 (en) | Hardware driver integrity check of memory card controller firmware | |
US20090172393A1 (en) | Method And System For Transferring Data And Instructions Through A Host File System | |
JP2010509690A (en) | Method and system for ensuring security of storage device | |
US8983072B2 (en) | Portable data carrier featuring secure data processing | |
US8898807B2 (en) | Data protecting method, mobile communication device, and memory storage device | |
US20060239450A1 (en) | In stream data encryption / decryption and error correction method | |
US8364955B1 (en) | Systems and methods for effectively removing access to individual files on magnetic tape media | |
JP5118494B2 (en) | Memory system having in-stream data encryption / decryption function | |
US8396208B2 (en) | Memory system with in stream data encryption/decryption and error correction | |
US20070230690A1 (en) | System for write failure recovery | |
JP2008524969A5 (en) | ||
JP2008524754A (en) | Memory system having in-stream data encryption / decryption and error correction functions | |
CN107861892B (en) | Method and terminal for realizing data processing | |
JP7355876B2 (en) | Program startup method, equipment, and storage medium | |
WO2007118034A2 (en) | System and method for write failure recovery | |
CN114064525A (en) | Memory system, control method of memory system, and information processing system | |
CN116382562A (en) | Electronic device and method for simulating nonvolatile memory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087024279 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009504395 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07781076 Country of ref document: EP Kind code of ref document: A2 |