U.S. patent application number 11/772213 was filed with the patent office on 2008-12-04 for surge-protected peripheral devices.
This patent application is currently assigned to SanDisk IL LTD.. Invention is credited to Eyal Bychkov, Sharon Kaluski Kimchi, Itzhak Pomerantz.
Application Number | 20080301483 11/772213 |
Document ID | / |
Family ID | 40087326 |
Filed Date | 2008-12-04 |
United States Patent
Application |
20080301483 |
Kind Code |
A1 |
Bychkov; Eyal ; et
al. |
December 4, 2008 |
Surge-Protected Peripheral Devices
Abstract
A computing system including: a host system; at least one
device, mechanically connected to the host system, each device
having an active state and an inactive state, wherein each device
is conductively disconnected from the host system when the inactive
state is enabled; and a mechanism for the host system to switch
each device between the active state and the inactive state
Preferably, at least one device is connected to the host system via
a connector. Preferably, the device is hard-wired to the host
system. Preferably, some wires of at least one device are isolated
from the host system via a mechanical contactor. Preferably, some
wires of at least one device are isolated from the host system via
an optical isolator. Preferably, the system further includes: a
switching battery; and a mechanism for charging the battery when at
least one device is disconnected from the host system.
Inventors: |
Bychkov; Eyal; (Hod
Hasharon, IL) ; Kaluski Kimchi; Sharon; (Shaked,
IL) ; Pomerantz; Itzhak; (Kefar Saba, IL) |
Correspondence
Address: |
MARK M. FRIEDMAN
C/O DISCOVEY DISPATCH , 9003 FLIRIN WAY
UPPER MARLBORO
MD
20772
US
|
Assignee: |
SanDisk IL LTD.
Kfar Saba
IL
|
Family ID: |
40087326 |
Appl. No.: |
11/772213 |
Filed: |
June 30, 2007 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
60940421 |
May 28, 2007 |
|
|
|
Current U.S.
Class: |
713/324 |
Current CPC
Class: |
G06F 13/4072
20130101 |
Class at
Publication: |
713/324 |
International
Class: |
G06F 1/00 20060101
G06F001/00 |
Claims
1. A computing system comprising: (a) a host system; (b) at least
one device, mechanically connected to said host system, each said
device having an active state and an inactive state, wherein said
each device is conductively disconnected from said host system when
said inactive state is enabled; and (c) a mechanism for said host
system to switch said each device between said active state and
said inactive state.
2. The system of claim 1, wherein said at least one device is
connected to said host system via a connector.
3. The system of claim 1, wherein said device is hard-wired to said
host system.
4. The system of claim 1, wherein at least some wires of said at
least one device are isolated from said host system via a
mechanical contactor.
5. The system of claim 1, wherein at least some wires of said at
least one device are isolated from said host system via an optical
isolator.
6. The system of claim 1, the system further comprising: (d) a
switching battery; and (e) a mechanism for charging said battery
when said at least one device is disconnected from said host
system.
7. The system of claim 6, the system further comprising: (f) a
mechanism for powering said at least one device using said battery
when said at least one device is connected to said host system.
8. The system of claim 1, the system further comprising: (d) a
mechanism for reversibly conductively connecting said at least one
device to said host system.
Description
RELATED APPLICATIONS
[0001] This patent application claims priority under 35 U.S.C.
.sctn.119(e) to U.S. Provisional Application No. 60/940,421, filed
May 28, 2007, which is hereby incorporated by reference in its
entirety.
[0002] This patent application is related to U.S. patent
application Ser. No. ______ of the same inventors, which is
entitled "METHODS FOR PROTECTING PERIPHERAL DEVICES FROM SURGES"
and filed on the same day as the present application. That patent
application, also claiming priority to U.S. Provisional Application
No. 60/940,421, is incorporated in its entirety as if fully set
forth herein.
FIELD AND BACKGROUND OF THE INVENTION
[0003] The present invention relates to systems for protecting a
peripheral device in a computing system from damage due to surge
currents.
[0004] In addition to other capabilities, personal computers
provide users with storage memory for digital content. The amount
of media created by a user is increasing due to the pervasive use
of portable devices (e.g. digital cameras). Since the media is
typically copied to the computer and then erased from the portable
device, the personal computer becomes a single storage device for
content that has no backup in any other location.
[0005] Backup of stored content on personal computers can be a
critical concern to business and personal users. Stationary backup
devices (e.g. external hard-disk drives and remote backup services)
are not available when the user is traveling or working off-line.
The use of a different location on a hard-disk drive, or a second
hard-disk drive on the same computer for backup is not always
possible. Furthermore, the hard disk itself has some probability of
crashing, either due to extended use or due to extended power
cycling. There is a need for built-in, reliable, automatic backup
systems that provide the user with confidence that important
information on the user's hard disk has a backup.
[0006] Additional peripheral devices, connected to a computer, that
are not frequently used (e.g. a business-card scanner, a desktop
scanner, a photograph printer) are also continuously exposed to the
risk of surge currents, and could benefit from a solution that
protects the devices from surge damage without physically detaching
the devices from the computer.
[0007] It would be desirable to have systems for protecting a
peripheral device in a computing system from damage due to surge
currents.
SUMMARY OF THE INVENTION
[0008] It is the purpose of the present invention to provide
systems for protecting a peripheral device in a computing system
from damage due to surge currents.
[0009] For the purpose of clarity, several terms which follow are
specifically defined for use herein. The term "dormant-peripheral
network protocol" is used herein to refer to a peripheral device in
a computing system that is not conductively connected to a host
system, and can be connected and activated by a remote command. The
term "surge protection" is used herein to refer to protection of an
electronic device from surge currents (e.g. currents caused by
lightning). The term "dormant backup" is used herein to refer to a
built-in backup device that is configured to have high reliability
due to a low usage duty-cycle. The expression "conductively
disconnected" is used herein to mean that none of the conducting
elements of a device are connected to any of the conductive
elements of a host system.
[0010] In a preferred embodiment of the present invention, the use
of a reliable non-volatile storage device (e.g. a hard-disk drive
or a flash-disk drive), which is connected to a host system,
increases the "mean time between failures" (MTBF) of the device by
several orders of magnitude by maintaining the device in a dormant
mode (i.e. powered off and electrically-disconnected state from the
host system for a majority of the time, powering the device on only
when needed by the host system.
[0011] A program running on the host system schedules a backup
operation as new content is created in the main storage device of
the host system. The backup operation includes backup of new media
files, documents updates, and new e-mail. Periodically, the program
instructs a secondary non-volatile storage device (different than
the main storage device) that is operationally connected to the
host system, but electrically disconnected from the host system, to
be powered on. Once powered and connected to the host system, the
program backs up the scheduled files to the secondary device, with
or without compression, using methods known in the art of software
engineering.
[0012] Once the content has been backed up and verified, the
program powers off the secondary storage device, and electrically
disconnects the device from any galvanic contact with the circuitry
of the host system. The result is that the secondary storage device
is powered on much less frequently than the main storage device,
and for much shorter periods of time. These two features of
operation extend the life expectancy and the MTBF of the secondary
device far beyond those of an alternative device that is powered on
each time the host system is powered on, and is operating
throughout the session of the host system.
[0013] An important aspect of the present invention is that by
being electrically disconnected from the host system, the secondary
device is much less susceptible to surge currents caused by
power-line fluctuations and by lightning.
[0014] In another preferred embodiment of the present invention,
the method is applied to peripherals device other than disk drives
(e.g. USB scanners and special printers) that are connected to the
host system, and are powered from the host system. According to the
present invention, such peripheral devices are connected to a USB
socket, which is completely disconnected from any conductive
connection with the host system, and are powered and used only when
needed.
[0015] Therefore, according to the present invention, there is
provided for the first time a computing system including: (a) a
host system; (b) at least one device, mechanically connected to the
host system, each device having an active state and an inactive
state, wherein each device is conductively disconnected from the
host system when the inactive state is enabled; and (c) a mechanism
for the host system to switch each device between the active state
and the inactive state.
[0016] Preferably, at least one device is connected to the host
system via a connector.
[0017] Preferably, the device is hard-wired to the host system.
[0018] Preferably, at least some wires of at least one device are
isolated from the host system via a mechanical contactor.
[0019] Preferably, at least some wires of at least one device are
isolated from the host system via an optical isolator.
[0020] Preferably, the system further includes: (d) a switching
battery; and (e) a mechanism for charging the battery when at least
one device is disconnected from the host system.
[0021] Most preferably, the system further includes: (f) a
mechanism for powering at least one device using the battery when
at least one device is connected to the host system.
[0022] Preferably, the system further includes: (d) a mechanism for
reversibly conductively connecting at least one device to the host
system.
[0023] These and further embodiments will be apparent from the
detailed description and examples that follow.
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] The present invention is herein described, by way of example
only, with reference to the accompanying drawings, wherein:
[0025] FIG. 1 is a simplified schematic block diagram of a system
for connecting to a protected device using an electromechanical
contactor, according to preferred embodiments of the present
invention;
[0026] FIG. 2 is a simplified schematic block diagram of a system
for connecting to a protected device using an electronic isolated
contactor, according to preferred embodiments of the present
invention;
[0027] FIG. 3 is a simplified schematic block diagram of a
commercial optical switch/isolator, according to the prior art;
[0028] FIG. 4 is a simplified flowchart of the operation of a
system for connecting to a protected device using an electronic
isolated contactor, according to preferred embodiments of the
present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0029] The present invention relates to systems for protecting a
peripheral device in a computing system from damage due to surge
currents. The principles and operation for protecting a peripheral
device in a computing system from damage due to surge currents,
according to the present invention, may be better understood with
reference to the accompanying description and the drawings.
[0030] Referring now to the drawings, FIG. 1 is a simplified
schematic block diagram of a system for connecting to a protected
device using an electromechanical contactor, according to preferred
embodiments of the present invention. A computing system 20
includes a host system 22 (e.g. a personal computer) that has,
among other components, a storage memory 24 (e.g. a built-in
hard-disk drive) and a host processor 26.
[0031] A peripheral protected device 42 (e.g. a backup disk drive)
is connected to computing system 20 via a multi-pin socket 38 (e.g.
a standard USB socket) and a multi-pin connector 40 (e.g. a
standard USB plug). Connections A of socket 38 are not electrically
connected to host system 22. Connections A are connected to
isolated ports of a switching unit 32 via an electromechanical
contactor 34. Electromechanical contactor 34 is connected to a
controller 36 which is controlled by host processor 26 via
connections B. The other side of contactor 34 is connected to host
system 22 using a standard bus connection C.
[0032] Host system 22 controls controller 36, via host processor
26, for switching contactor 34 on and off. In the steady-state
situation, controller 36 keeps contactor 34 disconnected. The data
lines, VCC line, and ground line (not explicitly shown) are
disconnected from protected device 42. Any surge current that may
hit host system 22, via a power line, network cables, or other
means connected to host system 22, will not affect protected device
42.
[0033] When there is a need to use protected device 42 (e.g. to
perform a backup operation), host processor 26 temporarily
instructs controller 36 to connect protected device 42 to host
system 22. Protected device 42 is powered, and when ready, host
system 22 uses protected device 42 for backup or for any other
function. When the operation is over, host processor 26 instructs
controller 36 to disconnect protected device 42 and computing
system 20 returns to a steady state. Protected device 42 can be,
for example, a hard-disk drive, or a solid-state drive, or any
other peripheral.
[0034] FIG. 2 is a simplified schematic block diagram of a system
for connecting to a protected device using an electronic isolated
contactor, according to preferred embodiments of the present
invention. FIG. 2 shows an electronic embodiment of the present
invention that is suitable for fast digital traffic and for a
standard USB connector. A host system 50 is connected via a USB
link to a controller 52 of a sub-system 54 (e.g. a protected USB
port). The USB link includes four wires: a VCC line D, a ground
line E, and D+/D- data lines F and G, as described in the USB
Specification, rev. 2.0, Chapter 4.2.1--Electrical.
[0035] Controller 52 routes VCC line D and ground line E to two
ports H and I of a contactor 56, and routes data lines F and G, via
lines J and K, to optical switches 58 and 60, such as described in
the Chapter 2 of The digital I/O Handbook (available from SeaLevel
Systems, Liberty, S.C.). FIG. 3 is a simplified schematic block
diagram of a commercial optical switch/isolator taken from The
Digital I/O Handbook.
[0036] It should be noted that since the D+ and D- signals in the
USB protocol are alternately flowing in both directions, each of
lines J and K requires two optical switches for the two opposite
directions, but for the simplicity of the drawing only one is shown
for each in FIG. 2 (i.e. switches 58 and 60, respectively).
Light-emitting diodes 62 and 64 are in the direction of current
flowing towards ground points 66. M isolated VCC line L is
connected to the emitters of optical switches 58 and 60 in the
reverse directions (via lines P and Q), and data lines N and O are
connected to the collectors of optical switches 58 and 60.
[0037] Four additional optical switches, driven by data lines N and
O for outputting signal to data lines J and K, are not shown in
FIG. 2. Thus, in FIG. 2, optical switches 58 and 60 represent 8
optical switches (i.e. 4 switches for input, two for D+ and two for
D- signals, and 4 switches for output, two for D+ and two for D-
signals). For each D+ and D- signal, there are two switches: one
switch for the positive current and one switch for the negative
current.
[0038] A battery 68 is connected between central leads 70 and 72 of
contactor 56. In the steady-state situation, contactor 56 is
controlled, via a control line R, by controller 52 to connect lead
70 to a lead 74 and lead 72 to a lead 76. This keeps battery 68
continuously charged.
[0039] Sub-system 54 is connected to a peripheral protected device
78 that is does not make contact with any conductive contacts of
the chassis or the circuitry of sub-system 54. When lead 80 of
contactor 56 is not connected, isolated VCC line L of sub-system 54
is electrically isolated, and the collectors of optical switches 58
and 60 (as well as the switches not shown) are not electrically
connected to the circuitry of host system 50. When lead 82 of
contactor 56 is not connected, ground line M of sub-system 54 is
electrically isolated. Data lines N and O of sub-system 54 are
always electrically isolated because data lines N and O are
hard-wired to the emitters of optical switches 58 and 60, and the
emitters are not connected to the circuitry of host system 50, and
receive VCC and ground connections through contactor 56.
[0040] FIG. 4 is a simplified flowchart of the operation of a
system for connecting to a protected device using an electronic
isolated contactor, according to preferred embodiments of the
present invention. The reference numerals of FIG. 2 are used to
provide better clarity. When host system 50 needs to use protected
device 78 that is plugged in sub-system 54 (Step 84), host system
50 instructs controller 52 to activate contactor 56, via control
line R, in order to switch contactor 56 to the active position
(Step 86). Positive lead 70 of battery 68 is then connected to
isolated VCC lead 80, and negative lead 72 of battery 68 is
connected to isolated ground lead 82 (Step 88). Optical switches 58
and 60 (as well as the switches not shown) are powered and start
operating (Step 90), delivering data signals between host system 50
and protected device 78 (Step 92).
[0041] While the invention has been described with respect to a
limited number of embodiments, it will be appreciated that many
variations, modifications, and other applications of the invention
may be made.
* * * * *