Within the NVMe protocol, it is narrowed down to 2 commands, Read/Write.
During the direct access to the SSD from the host, we build a virtual table to list all logical block addresses, and each LBA has a sub-table to see how many are written and overwritten during a period of time. This information will help to create attributes. We then apply the fast fourier transformation (FFT) to convert it from time domain to frequency domain. After so, we generate power spectrum estimation which is unique for different applications. Based on this spectrum we create a unique pattern for AI training for any similarity’s patterns during the real time protection.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article