DETAILED ACTION
This Office Action, based on application 18/227,256 filed 27 July 2023, is filed in response to applicant’s amendment and remarks filed 5 September 2025. Claims 1, 2, 4-17 and 19-21 are currently pending and have been fully considered below.
A request for continued examination under 37 CFR 1.114, including the fee set forth in 37 CFR 1.17(e), was filed in this application after final rejection. Since this application is eligible for continued examination under 37 CFR 1.114, and the fee set forth in 37 CFR 1.17(e) has been timely paid, the finality of the previous Office action has been withdrawn pursuant to 37 CFR 1.114. Applicant's submission filed on 20 February 2026 has been entered.
Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
Response to Arguments
Applicant’s remarks, submitted 20 February 2026 in response to the Office Action mailed 20 November 2025, have been fully considered below.
Claim Rejections under 35 U.S.C. § 112
The Office withdraws the previously issued new matter rejections to the claims in response to applicant’s amendment and remarks.
Claim Rejections under 35 U.S.C. § 102/103
The applicant traverses the prior art rejection to the claims alleging cited prior art fails to teach at least the following claimed features of Claim 1 (as amended):
the memory zone includes a plurality of memory blocks where the first copy of the user data is stored and an integrity area that is distinct from the plurality of memory blocks;
determining that the plurality of memory blocks of the memory zone are filled, and in response, generating integrity data based on the first copy of the user data stored in the first memory block of the first memory device, independently of the second copy of the user data
Regarding the ¶ spanning Pages 9-10 of applicant’s response, the applicant alleges GOLDING fails to teach the ‘determining’ step above as amended as “Nowhere does GOLDING teach these features”. While the applicant further notes the teachings of Fig 6, Steps 63-66 and ¶[0034-0035], applicant’s remarks merely amount to an allegation that GOLDING fails to teach the ‘determining’ limitation as applicant’s remarks do not further identify how or why the portions of GOLDING allegedly fail to teach the limitation. Notably, the applicant acknowledges “the invention recomputes 66 the parity of G to include object A”. While the applicant notes Step 66 refer to recomputing the parity of G, the Office asserts the ‘determining’ limitation is met as the integrity data is computed based on group G including object A (and not its mirror object A’); thus, GOLDING explicitly discloses “generating integrity data based on a first copy of the user data stored in the memory block of the first memory device, independently of the second copy of the user data” as claimed. In other words, even though the computed integrity data may also be based on other objects of group G, the computed integrity data is at least in part based on object A thus the claim limitation is met.
While the applicant presents further remarks regarding the traversal of the prior art rejection to Claims 1, 2, 4-17 and 19-21, the traversal of each claim relies on the arguments presented in the ¶ spanning Pages 9-10. The Office maintains the prior art rejection to Claims 1, 2, 4-17 and 19-21 for reasons now presented below.
Claim Rejections - 35 USC § 102
The text of those sections of Title 35, U.S. Code not included in this action can be found in a prior Office action.
Claim(s) 1, 2, 7, 12, 17, 20, and 21 is/are rejected under 35 U.S.C. 102(a)(1) as being anticipated by GOLDING (US PGPub 2005/0114596).
GOLDING discloses:
Claim 1: A method for storing data, comprising:
mirroring user data on two distinct memory devices to store a first copy of the user data in a first memory block of a first memory device and a second copy of the user data in a second memory block of a second memory device (Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”), wherein:
the first memory block is included in a memory zone, and the second memory block is external to the memory zone (¶[0033] – “the invention converts C from being individually mirrored to being part of a grouped RAID 5 layout. Object C is grouped {the grouping of C analogous to ‘the first memory block is included in a memory zone’} with other five-block objects A and B, as shown in Fig. 4. Once this occurs, with the values in the parity object P (P1 … P5) being recalculated to include C1 through C5, the mirror object C’ is discarded {thus C’ may be characterized as ‘external to the memory zone’ since C’ is not a part of the group}); and
the memory zone includes a plurality of memory blocks where the first copy of the user data is stored and an integrity area that is distinct from the plurality of memory blocks (Fig 4 depicts five-block objects A, B, and C distinct from parity object P; ¶[0033]);
determining that the plurality of memory blocks of the memory zone are filled (Fig. 6, Step 63 – “Conversion trigger met?”; ¶[0017] – “the data converter is triggered when the storage devices reach a limit on storage space”) and, in response, generating integrity data based on the first copy of the user data stored in the first memory block of the first memory device, independently of the second copy of the user data (Fig. 6, Step 66 – “Recompute parity of G to include A” is performed in response to Step 63 – “Conversion trigger met?” => YES; ¶[0034]; ¶[0040]);
storing the integrity data in the integrity area of the memory zone, wherein the integrity area of the memory zone includes a memory block of an integrity memory device (Fig. 4, Parity Object P1…P5; ¶[0033] – “… with the values in the parity object P (P1…P5) being recalculated to include C1 through C5 …”; ¶[0035] – “specifically, byte i of the parity object in group G is updated {analogous to ‘storing …’} to the value obtained by computing the XOR of the value in that byte before adding object A with the value of byte i in object A”; ¶[0010] – “The parity object is stored on an object storage device separate from the object storage devices used for the other physical objects in the group”);
determining that the integrity data is stored on the integrity area of the memory zone (Fig. 6 – Completion of Step 66 – “Recompute parity of G to include A”; ¶[0035] – “Finally, after the object has been converted {analogous to ‘determining …’}, the mirrored object A’ is discarded”) and, in response, releasing the second copy of the user data in the second memory block (¶[0035] – “Finally, after the object has been converted {analogous to ‘determining …’}, the mirrored object A’ is discarded”).
Claim 12: An electronic device, comprising:
one or more processors (¶[0037] – “The system may incorporate computers, calculators, generators, storage units, converters, controllers, comparators, and other data generation, consolidation, and calculation devices arranged to perform the functions described above”); and
memory storing one or more programs configured for execution the one or more processors (¶[0037] – “The system may incorporate computers, calculators, generators, storage units, converters, controllers, comparators, and other data generation, consolidation, and calculation devices arranged to perform the functions described above”), the one or more programs comprising instructions for:
mirroring user data on two distinct memory devices to store a first copy of the user data in a first memory block of a first memory device and a second copy of the user data in a second memory block of a second memory device (Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”), wherein:
the first memory block is included in a memory zone, and the second memory block is external to the memory zone (¶[0033] – “the invention converts C from being individually mirrored to being part of a grouped RAID 5 layout. Object C is grouped {the grouping of C analogous to ‘the first memory block is included in a memory zone’} with other five-block objects A and B, as shown in Fig. 4. Once this occurs, with the values in the parity object P (P1 … P5) being recalculated to include C1 through C5, the mirror object C’ is discarded {thus C’ may be characterized as ‘external to the memory zone’ since C’ is not a part of the group}); and
the memory zone includes a plurality of memory blocks where the first copy of the user data is stored and an integrity area that is distinct from the plurality of memory blocks (Fig 4 depicts five-block objects A, B, and C distinct from parity object P; ¶[0033]);
determining that the plurality of memory blocks of the memory zone are filled (Fig. 6, Step 63 – “Conversion trigger met?”; ¶[0017] – “the data converter is triggered when the storage devices reach a limit on storage space”) and, in response, generating integrity data based on the first copy of the user data stored in the first memory block of the first memory device, independently of the second copy of the user data (Fig. 6, Step 66 – “Recompute parity of G to include A” is performed in response to Step 63 – “Conversion trigger met?” => YES; ¶[0034]; ¶[0040]);
storing the integrity data in the integrity area of the memory zone, wherein the integrity area of the memory zone includes a memory block of an integrity memory device (Fig. 4, Parity Object P1…P5; ¶[0033] – “… with the values in the parity object P (P1…P5) being recalculated to include C1 through C5 …”; ¶[0035] – “specifically, byte i of the parity object in group G is updated {analogous to ‘storing …’} to the value obtained by computing the XOR of the value in that byte before adding object A with the value of byte i in object A”; ¶[0010] – “The parity object is stored on an object storage device separate from the object storage devices used for the other physical objects in the group”); and
determining that the integrity data is stored on the integrity area of the memory zone (Fig. 6 – Completion of Step 66 – “Recompute parity of G to include A”; ¶[0035] – “Finally, after the object has been converted {analogous to ‘determining …’}, the mirrored object A’ is discarded”); and, in response, releasing the second copy of the user data in the second memory block (¶[0035] – “Finally, after the object has been converted {analogous to ‘determining …’}, the mirrored object A’ is discarded”).
Claim 17: A non-transitory computer-readable storage medium storing one or more programs configured for execution one or more processors (¶[0037] – “The system may incorporate computers, calculators, generators, storage units, converters, controllers, comparators, and other data generation, consolidation, and calculation devices arranged to perform the functions described above”), the one or more programs comprising instructions for:
mirroring user data on two distinct memory devices to store a first copy of the user data in a first memory block of a first memory device and a second copy of the user data in a second memory block of a second memory device (Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”), wherein:
the first memory block is included in a memory zone, and the second memory block is external to the memory zone (¶[0033] – “the invention converts C from being individually mirrored to being part of a grouped RAID 5 layout. Object C is grouped {the grouping of C analogous to ‘the first memory block is included in a memory zone’} with other five-block objects A and B, as shown in Fig. 4. Once this occurs, with the values in the parity object P (P1 … P5) being recalculated to include C1 through C5, the mirror object C’ is discarded {thus C’ may be characterized as ‘external to the memory zone’ since C’ is not a part of the group}); and
the memory zone includes a plurality of memory blocks where the first copy of the user data is stored and an integrity area that is distinct from the plurality of memory blocks (Fig 4 depicts five-block {‘a predefined size’} objects A, B, and C distinct from parity object P; ¶[0033]);
determining that the plurality of memory blocks of the memory zone are filled (Fig. 6, Step 63 – “Conversion trigger met?”; ¶[0017] – “the data converter is triggered when the storage devices reach a limit on storage space”) and, in response, generating integrity data based on the first copy of the user data stored in the first memory block of the first memory device, independently of the second copy of the user data (Fig. 6, Step 66 – “Recompute parity of G to include A” is performed in response to Step 63 – “Conversion trigger met?” => YES; ¶[0034]; ¶[0040]);
storing the integrity data in the integrity area of the memory zone, wherein the integrity area of the memory zone includes a memory block of an integrity memory device (Fig. 4, Parity Object P1…P5; ¶[0033] – “… with the values in the parity object P (P1…P5) being recalculated to include C1 through C5 …”; ¶[0035] – “specifically, byte i of the parity object in group G is updated {analogous to ‘storing …’} to the value obtained by computing the XOR of the value in that byte before adding object A with the value of byte i in object A”; ¶[0010] – “The parity object is stored on an object storage device separate from the object storage devices used for the other physical objects in the group”); and
determining that the integrity data is stored on the integrity area of the memory zone (Fig. 6 – Completion of Step 66 – “Recompute parity of G to include A”; ¶[0035] – “Finally, after the object has been converted {analogous to ‘determining …’}, the mirrored object A’ is discarded”); and, in response, releasing the second copy of the user data in the second memory block (¶[0035] – “Finally, after the object has been converted {analogous to ‘determining …’}, the mirrored object A’ is discarded”).
Claim 2: The method of claim 1, wherein the plurality of memory blocks are of a plurality of data memory devices, the plurality of memory blocks including the first memory block and the plurality of data memory devices including the first memory device, and wherein the integrity data is generated based on respective user data stored in each of the plurality of memory blocks (Figure 4 illustrates objects A, B, and C separate from parity object P; ¶[0032]; ¶[0033]).
Claim 7: The method of claim 1, further comprising receiving a host write request, wherein the user data is mirrored on the two distinct memory devices and the first copy of the user data is stored on the first data memory device in response to the host write request (¶[0034] – “reads and writes to the virtual object are processed by writing to both physical objects A and A’ …”; Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”).
Claim 20: The non-transitory computer-readable storage medium of claim 17, wherein the plurality of memory blocks are of a plurality of data memory devices (Fig. 4, Objects A, B, and C), the plurality of memory blocks including the first memory block and the plurality of data memory devices including the first memory device, and wherein the integrity data is generated based on a respective user data stored in each of the plurality of memory blocks (Fig. 6 – Completion of Step 66 – “Recompute parity of G to include A”).
Claim 21: The non-transitory computer-readable storage medium of claim 17, wherein the user data includes first user data, the one or more programs further comprising instructions for: mirroring second user data on the two distinct memory devices (Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”), before generating the integrity data based on the first user data and storing the integrity data of the first user data on the integrity memory device (¶[0032] – “if it is {the size of the C above a predetermined threshold value or ‘is filled’}, the invention converts C from being individually mirrored to an individual parity RAID 5 layout of a stripe width s by creating s+1 physical objects on separate object storage devices and copying data into the striped layout”; “Once the new physical objects have been created, the data copied, and parity calculated {analogous to ‘integrity data’}”).
Claim Rejections - 35 USC § 103
The text of those sections of Title 35, U.S. Code not included in this action can be found in a prior Office action.
Claim(s) 4-6 is/are rejected under 35 U.S.C. 103 as being unpatentable over GOLDING in further view of KATO (US PGPub 2017/0300383).
With respect to Claim 4, GOLDING discloses the method of claim 1.
GOLDING may not explicitly disclose further comprising erasing the first copy of the user data from the first memory device by: updating the integrity data to exclude the first copy of the user data stored on the first memory device; and modifying a logical-to-physical (L2P) table to disassociate a physical address of the first memory device where the first copy of the user data is stored with a corresponding logical address associated with the user data.
However, KATO discloses erasing the first copy of the user data from the first memory device (¶[0078] – after erasure coding is performed, replication of the data A’ becomes unnecessary and the SSD 423-2 deletes the data A’; Fig 9, Transition from STATE 2 to STATE 3) by: updating the integrity data to exclude the first copy of the user data stored on the first memory device (¶[0076] – “The state 3 is a state in which erasure coding has been performed from the state 2. Here, in order to generate new parity data, the CM 411 reads present parity data, the data before the update, and the data after the update,. In the example, of Figs 8 and 9, the CM 411 reads A and A’ from the SSD 423-1, and reads AxorBxorC from the SSD 423-4. Then, the CM 411 generates A’xorBxorC as parity data by performing Axor(AxorBxorC)xorA’.”); and modifying a logical-to-physical (L2P) table to disassociate a physical address of the first memory device where the first copy of the user data is stored with a corresponding logical address associated with the user data (Fig 8, 802-3 of STATE 2 is deleted from the FTL address conversion table when transitioning to STATE 3; ¶[0075]).
GOLDING and KATO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and KATO before him or her, to modify the conversion from RAID-1 to RAID-5 of GOLDING to include erasure of the disk drives once the blocks assume a FREE state as taught by KATO. A motivation for doing so would have been to prepare the blocks for new data in the case that the disk drives assume a different storage type such as solid-state. Therefore, it would have been obvious to combine GOLDING and KATO to obtain the invention as specified in the instant claims.
With respect to Claim 5, the combination of GOLDING and KATO disclose the method of claim 4.
KATO further discloses writing next data in the first memory device in place of the user data; modifying the L2P table to associate the physical address of the first memory device with a next logical address associated with the next data; and updating the integrity data based on the next data (Fig 8 and 9 – transitioning from STATE 2 to STATE 3 regarding Data A to A’).
With respect to Claim 6, the combination of GOLDING and KATO disclose the method of claim 4.
KATO further discloses wherein erasing the first copy of the user data from the first memory device by: purging the first copy of the user data from the first memory device (¶[0078] – after erasure coding is performed, replication of the data A’ becomes unnecessary and the SSD 423-2 deletes the data A’; Fig 9, Transition from STATE 2 to STATE 3).
Claim(s) 8-11, 13-16, and 19 is/are rejected under 35 U.S.C. 103 as being unpatentable over GOLDING in further view of GAO et al (US PGPub 2022/0206696).
With respect to Claim 8, GOLDING discloses the method of claim 1.
GOLDING may not explicitly disclose wherein each of the two distinct memory devices includes a quad-level-cell (QLC) solid-sate drive (SSD) die and has a plurality of memory blocks, and each memory block includes a plurality of memory pages each of which includes a plurality of quad-level memory cells.
However, GAO discloses wherein each of the two distinct memory devices includes a quad-level-cell (QLC) solid-sate drive (SSD) die and has a plurality of memory blocks, and each memory block includes a plurality of memory pages each of which includes a plurality of quad-level memory cells (¶[0136]).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the disk drives of GOLDING to include memory devices comprising dies as taught by GAO. A motivation for doing so would have been to select different types of storage memory having known property tradeoffs that may benefit a particular application (e.g. trading better performance for increased area or cost). Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
With respect to Claim 9, GOLDING discloses the method of claim 1.
GOLDING further discloses storing a plurality of data blocks of a data object on a plurality of data memory devices including a first data memory device further including the first memory device, wherein the plurality of data blocks includes a first data block further including the user data, and the user data is mirrored on the two distinct memory devices while the first data block is stored on the first data memory device of the plurality of data memory devices (Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”).
GOLDING may not explicitly disclose wherein the data object is a data file.
However, GAO discloses wherein the data object is a data file (¶[0096-0097] – “authorities operate to determine how operations will proceed against particular logical elements. Each of the logical elements may be operated on through a particular authority across a plurality of storage controllers of a storage system”; “logical elements could be, for example, files, … individual objects …”; ¶[0099] – “The object could be a file or a directory”).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the objects of GOLDING to include files as taught by GAO. A motivation for doing so would have been to enable storing of data in a manner that is more intuitive for human access. Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
With respect to Claim 10, the combination of GOLDING and GAO disclose the method of claim 9.
GOLDING further discloses the plurality of data blocks of the data file is stored in accordance with a predefined redundant array of inexpensive disks (RAID) level, wherein the predefined RAID level is selected from RAID 4 and RAID 5; and the user data is mirrored on the two distinct memory devices in accordance with RAID 1 (¶[0031] – “The solution provided by the invention is to store newly created objects using a mirrored (RAID 1) layout, and … converted to use an individual RAID 5 (or similar layout)”).
With respect to Claim 11, the combination of GOLDING and GAO disclose the method of claim 9.
GOLDING further discloses wherein the user data includes first user data, and the data file further includes second user data, the method further comprising: while the second user data is stored on a second data memory device, mirroring the second user data on two corresponding memory devices distinct from the plurality of data memory devices in accordance with RAID 1 (Figures 2 and 3; ¶[0031] – “a newly created one-block object is stored as two one-block physical objects C and C’ that are mirrors of each other”; “The two physical objects are stored on separate object storage devices”; ¶[0032] – “Physical object C has grown to five blocks (C1 … C5). Correspondingly, physical object C’ grows as well, and continues to store a copy of the data in physical object C”).
With respect to Claim 13, GOLDING discloses the electronic device of claim 12.
GOLDING may not explicitly disclose wherein each of the two distinct memory devices and the integrity memory device includes one or more memory dies.
However, GAO discloses wherein each of the two distinct memory devices and the integrity memory device includes one or more memory dies (¶[0110] – “flash dies”).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the disk drives of GOLDING to include memory devices comprising dies or different types of memory as taught by GAO. A motivation for doing so would have been to select different types of storage memory having known property tradeoffs that may benefit a particular application (e.g. trading better performance for increased area or cost). Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
With respect to Claim 14, GOLDING discloses the electronic device of claim 12.
GOLDING may not explicitly disclose wherein each of the two distinct memory devices includes one of: a single-level-cell (SLC) memory die, and a multiple-level-cell (MLC) memory die.
However, GAO discloses wherein each of the two distinct memory devices includes one of: a single-level-cell (SLC) memory die, and a multiple-level-cell (MLC) memory die (¶[0244]).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the disk drives of GOLDING to include memory devices comprising dies or different types of memory as taught by GAO. A motivation for doing so would have been to select different types of storage memory having known property tradeoffs that may benefit a particular application (e.g. trading better performance for increased area or cost). Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
With respect to Claim 15, GOLDING discloses the electronic device of claim 12.
GOLDING may not explicitly disclose wherein the integrity memory device includes one of an MLC memory die and an SLC memory die and has a plurality of memory blocks, and each memory block includes a plurality of memory pages each of which includes a plurality of MLCs, or SLCs.
However, GAO discloses wherein the integrity memory device includes one of an MLC memory die and an SLC memory die and has a plurality of memory blocks, and each memory block includes a plurality of memory pages each of which includes a plurality of MLCs, or SLCs (¶[0244]).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the disk drives of GOLDING to include memory devices comprising dies or different types of memory as taught by GAO. A motivation for doing so would have been to select different types of storage memory having known property tradeoffs that may benefit a particular application (e.g. trading better performance for increased area or cost). Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
With respect to Claim 16, GOLDING discloses the electronic device of claim 12.
GOLDING may not explicitly disclose wherein at least one of the two distinct memory devices and the integrity memory device includes a storage class memory (SCM) selected from a group consisting of: phase-change memory (PCM), resistive random-access memory (ReRAM), magnetoresistive random-access memory (MRAM), and 3D XPoint memory.
However, GAO discloses wherein at least one of the two distinct memory devices and the integrity memory device includes a storage class memory (SCM) selected from a group consisting of: phase-change memory (PCM), resistive random-access memory (ReRAM), magnetoresistive random-access memory (MRAM), and 3D XPoint memory (¶[0136]).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the disk drives of GOLDING to include memory devices comprising dies or different types of memory as taught by GAO. A motivation for doing so would have been to select different types of storage memory having known property tradeoffs that may benefit a particular application (e.g. trading better performance for increased area or cost). Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
With respect to Claim 19, GOLDING discloses the non-transitory computer-readable storage medium of claim 17.
GOLDING may not explicitly disclose wherein each of the two distinct memory devices and the integrity memory device includes a distinct memory die of a memory system.
However, GAO discloses wherein each of the two distinct memory devices and the integrity memory device includes a distinct memory die of a memory system (¶[0110] – “flash dies”).
GOLDING and GAO are analogous art because they are from the same field of endeavor of RAID storage system management. Before the effective filing date of the claimed invention, it would have been obvious to one of ordinary skill in the art, having the teachings of GOLDING and GAO before him or her, to modify the disk drives of GOLDING to include memory devices comprising dies as taught by GAO. A motivation for doing so would have been to select different types of storage memory having known property tradeoffs that may benefit a particular application (e.g. trading better performance for increased area or cost). Therefore, it would have been obvious to combine GOLDING and GAO to obtain the invention as specified in the instant claims.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to ERIC T LOONAN whose telephone number is (571)272-6994. The examiner can normally be reached M-F 8am-5pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Arpan Savla can be reached at 571-272-1077. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/ERIC T LOONAN/Examiner, Art Unit 2137