18513197. DATA INTEGRITY PROTECTION FOR RELOCATING DATA IN A MEMORY SYSTEM simplified abstract (Micron Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

DATA INTEGRITY PROTECTION FOR RELOCATING DATA IN A MEMORY SYSTEM

Organization Name

Micron Technology, Inc.

Inventor(s)

Lucien J. Bissey of Boise ID (US)

DATA INTEGRITY PROTECTION FOR RELOCATING DATA IN A MEMORY SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18513197 titled 'DATA INTEGRITY PROTECTION FOR RELOCATING DATA IN A MEMORY SYSTEM

Simplified Explanation

The abstract describes methods, apparatuses, and systems related to data management and security in a memory device. Data is stored in a memory system, and during data movement operations, validation is done using hash functions. This involves computing hash values of stored data and using them to validate other versions of the data before writing them to the memory system. Transactions are recorded and identifiable through generated hashes, allowing for traceability within the memory system.

  • Data management and security in memory devices
  • Validation of data using hash functions during data movement
  • Recording and identification of transactions within the memory system

Potential Applications

This technology could be applied in:

  • Secure data storage systems
  • Blockchain technology
  • Data centers

Problems Solved

This technology helps in:

  • Ensuring data integrity during storage and transfer
  • Providing traceability of transactions within the memory system

Benefits

The benefits of this technology include:

  • Enhanced data security
  • Improved data management efficiency
  • Increased trust in the integrity of stored data

Potential Commercial Applications

  • "Enhancing Data Security in Memory Devices: Commercial Applications"

Unanswered Questions

How does this technology impact data transfer speeds?

This article does not address the potential impact of using hash functions on data transfer speeds within memory devices.

What are the potential limitations of this technology in large-scale memory systems?

The article does not discuss any limitations that may arise when implementing this technology in large-scale memory systems.


Original Abstract Submitted

Methods, apparatuses, and systems related to data management and security in a memory device are described. Data may be stored in a memory system, and as part of an operation to move data from one region to another in the memory system, the data may be validated using one or more hash functions. For example, a memory device may compute a hash value of some stored data, and use the hash value to validate another version of that stored data in the process of writing the other version stored data to a region of the memory system. The memory device may store another hash that is generated from the hash of the stored data and a record of transactions such that transactions are identifiable; the sequence of transactions within the memory system may also be identifiable. Hashes of transactions may be stored throughout the memory system or among memory systems.