Storage provisioning in a data storage device

ABSTRACT

Systems and methods for modifying a usage limit of a data storage device include a host interface; integrated circuit memory cells; and a processing device coupled to the host interface to provide commands with addresses to access the integrated circuit memory cells according to the address, and configured to execute firmware to perform: operations requested by commands received via the host interface; and updates to a usage limit of the data storage device.

FIELD OF THE TECHNOLOGY

At least some embodiments disclosed herein relate generally to datastorage devices, and, more particularly, to storage provisioning fordata storage devices.

BACKGROUND

Data storage devices include a storage capacity. Typically, differentdata storage devices can be manufactured with different storagecapacities to meet the storage needs of a particular application.Similarly, data storage devices have an endurance limit (i.e., maximumnumber of writes or erases per day). Different data storage devices canbe manufactured with different endurance limits to meet the dataprocessing needs of a particular application.

BRIEF DESCRIPTION OF THE DRAWINGS

References are made to the accompanying drawings that form a part ofthis disclosure and illustrate embodiments in which systems and methodsdescribed in this Specification can be practiced.

FIG. 1 is a schematic block diagram of a system having computing devicesconnected via a communications bus, according to an embodiment.

FIG. 2 is a block diagram of the data storage device of FIG. 1,according to an embodiment.

FIG. 3 is a schematic block diagram of a system including a data storagedevice, according to an embodiment.

FIG. 4 is a flowchart of a method for provisioning a data storagedevice, according to an embodiment.

DETAILED DESCRIPTION

Generally, a data storage device is manufactured with set usage limits(e.g., a set storage capacity, a set endurance limit, or the like). Theentire usage limit is generally available to the user. For example, astorage capacity may be 64 gigabytes (GB) and the user may be able tostore up to 64 GB of data on the data storage device. Similarly, a datastorage device can be manufactured with a set endurance limit. A numberof writes or erases per day can be performed up to the selectedendurance limit. For example, the selected endurance limit may be 1drive-write-per-day (DWPD) and, again assuming a storage capacity of 64GB, the user may write up to the endurance limit of 64 GB of data perday.

Embodiments described herein relate to data storage devices havingmodifiable usage limits (e.g., a modifiable storage capacity, modifiableendurance limit, combinations thereof, or the like). The data storagedevices may be selectively modifiable to increase or decrease a usagelimit of the data storage device. As a result, the user may have accessto less than the usage limit (e.g., less than the entire storagecapacity of the data storage device or less than the endurance limit).For example, a data storage device can be manufactured with a 10terabyte (TB) physical memory space. However, the data storage devicecan be configured to function as if only 1 TB of physical memory spacewas available. The user may be able to later purchase additionalphysical memory space (e.g., another 1 TB for 2 TB total) and pay a feevia a server. The server can then send a command to the data storagedevice to reconfigure the data storage device so that the data storagedevice now appears to have 2 TB physical memory space available to theuser. The data storage device can verify that the command originatedfrom the appropriate server via, for example, a digital signature of theserver, before accepting and executing the modification command from theserver. For example, the command can include one or more bits thatindicate a digital signature of the server. Similarly, the user may beable to cancel the purchase of additional physical memory space via theserver. The server can then send a command to the data storage device toreconfigure the data storage device so that the data storage device nowappears to have 1 TB physical memory space available to the user. Theuser may be able to modify the usage limit via the server as the user'sneeds for the data storage device change. As used herein, modifying theusage limit includes modifying an accessible usage limit. That is, theactual usage limit (e.g., storage capacity or endurance limit) of thedata storage device is not changing, but the apparent usage limitavailable for the data storage device to use is modified.

Data storage devices can be used in a variety of applications such as,but not limited to, on board vehicles (e.g., automobiles). The datastorage devices can be used for various vehicle systems including, butnot limited to, the engine, the infotainment system, as a data recorder,combinations thereof, or the like.

Systems and methods for controlling a usage limit (e.g., a storagecapacity, an endurance limit, combinations thereof, or the like) aredescribed.

In an embodiment, a system includes a data storage device having a usagelimit, configured to receive a modified usage limit and update the usagelimit to be the modified usage limit. The data storage device includes ahost interface; integrated circuit memory cells; and a processing devicecoupled to the host interface to provide commands with addresses toaccess the integrated circuit memory cells according to the address. Theprocessing device is configured to execute firmware to performoperations requested by commands received via the host interface; andupdates to the usage limit of the data storage device. The systemincludes a server communicable with the data storage device over anetwork, wherein the server is configured to send a command to the datastorage device to update the usage limit of the data storage device.

In an embodiment, a data storage device includes a host interface;integrated circuit memory cells; and a processing device coupled to thehost interface to provide commands with addresses to access theintegrated circuit memory cells according to the address. The processingdevice is configured to execute firmware to perform operations requestedby commands received via the host interface; and updates to a usagelimit of the data storage device.

In an embodiment, a method includes receiving a command to modify ausage limit of a data storage device from a server connected incommunication with the data storage device via a network, the commandincluding a modified usage limit. The method includes identifying one ormore bits of the command that indicate a digital signature of theserver. The usage limit of the data storage device is updated accordingto the modified usage limit based at least in part on identifying theone or more bits that indicate the digital signature.

It is to be appreciated that the systems and methods described areapplicable in systems other than a vehicle in accordance with theprinciples described herein.

FIG. 1 is a schematic block diagram of a vehicle 100 having computingdevices connected via a communications bus 105, according to anembodiment. The computing devices include at least a host computingdevice 110 and a data storage device 115, according to an embodiment. Inan embodiment the vehicle 100 is an automobile and can, for example, bean autonomous vehicle, a semiautonomous vehicle, or the like.

The host computing device 110 may be representative of, for example,various computing devices in the vehicle 100. For example, the hostcomputing device 110 can be an infotainment system; a black box datarecorder; an advanced driver assistance system (ADAS); an enginecontroller; a camera system; a storage service; suitable combinationsthereof, or the like.

The host computing device 110 is communicatively coupled to the datastorage device 115 via the communications bus 105. The communicationsbus 105 can utilize a selected communication protocol such as, but notlimited to, peripheral component interconnect (PCI); peripheralcomponent interconnect express (PCIe); or the like.

In the illustrated embodiment, the vehicle 100 further includes sensors120. The host computing device 110 is communicatively coupled to thesensors 120. The sensors 120 are illustrated as being communicativelycoupled to the host computing device 110 via the communications bus 105.In an embodiment, one or more of the sensors 120 can be communicativelycoupled to the host computing device 110 via a wireless connection, orvia a combination of a wireless connection and the wired connection ofthe communications bus 105.

The sensors 120 may be configured to collect information related to theoperation of the vehicle 100. For example, the sensors 120 may beconfigured to collect information related to the speed, acceleration,deceleration, etc., of the vehicle 100. In an embodiment, the vehicle100 may additionally include one or more actuators to, for example,exert control on at least a portion of the vehicle 100 in response toone or more values received from the sensors 120. In an embodiment, thesensors 120 may be configured to stream sensed values to the datastorage device 115 for storage.

The vehicle 100 can include additional features such as, a power source.In an embodiment, the power source can be a battery that is electricallyconnected to the host computing device 110 and to the data storagedevice 115. It is to be appreciated that the vehicle 100 can include avariety of additional features.

The vehicle 100 can electronically communicate with a server 125. In anembodiment, the vehicle 100 can electronically communicate with theserver 125 via a network such as the Internet, a cellular network, orthe like. The vehicle 100 can communicate with the server 125 on aperiodic basis. In an embodiment, when in communication with the server125, a usage limit of the data storage device 115 can be modified basedon a command from the server 125. In an embodiment, a user may log in tothe server 125 to select a modification to usage limit. In anembodiment, the user may log in to the server 125 and purchase anincreased usage limit. In an embodiment, the server 125 can beconfigured to auto-generate a command to return a modified usage limitto an original usage limit in response to determining that, for example,a payment has not been made (e.g., if the payment is asubscription-based payment).

The data storage device 115 receives a command from the server 125 tomodify the usage limit of the data storage device 115. The command fromthe server 125 can include one or more bits that indicate a digitalsignature of the server. In an embodiment, the data storage device 115can verify the digital signature of the server 125 prior to executingthe modification to the usage limit.

The server 125 provides the command for modifying the usage limit,according to an embodiment. In an embodiment, the command from theserver 125 can include one or more bits that indicate a digitalsignature of the server 125. In an embodiment, the host computing device110 can pass the command from the server 125 to the data storage device115. The host computing device 110 does not have the capability tochange the usage limit of the data storage device 115 without thecommand from the server 125.

FIG. 2 is a block diagram of the data storage device 115 of FIG. 1,according to an embodiment. In an embodiment, the data storage device115 is a solid-state drive (SSD). In another embodiment, the datastorage device 115 can be a hard disk drive (HDDs); flash memory;dynamic random-access memory (DRAM); magnetic tape; network attachedstorage device; or the like.

The data storage device 115 includes a host interface 130, a processingdevice 135, firmware 140, and storage media 145.

The host interface 130 is communicatively coupled to the communicationsbus 105 (FIG. 1). The host interface 130 can be, for example, in a formof a standardized interface such as, but not limited to, a serialadvanced technology attachment (SATA); a universal serial bus (USB); aperipheral component interconnect express (PCIe); or the like. The hostinterface 130 communicates information between the host computing device110 and the storage media 145.

The host interface 130 is responsible for passing control, access, data,and other signals between the data storage device 115 and the hostcomputing device 110 (FIG. 1).

The processing device 135 runs firmware 140 to perform operationsresponsive to the communications from the host computing device 110.Firmware 140 includes, for example, a type of computer program thatprovides control, monitoring, and data manipulation of data storagedevices. The firmware 140 controls operations of the processing device135 in operating the data storage device 115, such as storing andaccessing data in the storage media 145.

In an embodiment, the firmware 140 can be configured to includeinstructions for controlling a usage limit of the data storage device115. For example, the firmware 140 can include a percentage amount ofthe storage capacity of the storage media 145. In an embodiment, thefirmware 140 can include a specific storage capacity which is equal toor less than the storage capacity of the storage media 145 which isavailable to the user. The firmware 140 can include a percentage amountof the endurance limit or can include a specific endurance limit that isless than or equal to the endurance capabilities of the storage media145.

In an embodiment, the data storage device 115 can be connected to aserver 125 via a network. In response to a modification instruction fromthe server 125, the firmware 140 can be updated to include a modifiedusage limit. In an embodiment, the firmware 140 may not be updated tocontrol the usage limit of the data storage device 115. For example, inan embodiment, the processing device 135 can impose the usage limit onthe data storage device 115. In such an embodiment, the processingdevice 135 can also be configured to recognize one or more bits incommands from the server 125 that indicate a digital signature of theserver 125 and verify the digital signature of the server 125, thenimpose the usage limit during the operation of the data storage device115.

At least a portion of the storage media 145 is non-volatile. That is,the storage media 145 does not require power to maintain the data orinformation stored in the storage media 145 and the data or informationis retrievable after the storage media 145 is powered off and thenpowered on again. Memory cells 150 of the storage media 145 can beimplemented using, for example, NAND gate-based flash memory;phase-change memory (PCM); magnetic memory (MRAM); resistiverandom-access memory; 3D XPoint; or the like. As a result, the storagemedia 145 is non-volatile and can retain data stored therein withoutpower for days, months, or years. In an embodiment, the memory cells 150can be single-layer cells (SLCs); multi-layer cells (MLCs); triple-layercells (TLCs); quad-layer cells (QLCs); or the like.

The data storage device 115 may utilize volatile memory for the storageof run-time data and instructions used by the processing device 135. Forexample, volatile dynamic random-access memory (DRAM); volatile staticrandom-access memory (SRAM); or the like can be used. The volatilememory requires power to maintain the data or information storedtherein, and the data or information is rapidly or immediately lost whenthe power is interrupted. In an embodiment, the processing device 135can alternatively or additionally include in-process cache memory.

In an embodiment, the data storage device 115 can periodically connectto the server 125 to verify whether there are any changes to the usagelimit. In an embodiment, commands from the server 125 can be pushed tothe data storage device 115 when the data storage device 115 isconnected to a network. That is, the data storage device 115 may notpoll for updates to the usage limit.

A non-transitory computer storage medium can be used to storeinstructions of the firmware 140. When the instructions are executed bythe processing device, the instructions cause the processing device toperform a method discussed in further detail below.

FIG. 3 is a schematic block diagram of a computing device 200 havingcomponents connected via a communications bus 205, according to anembodiment. The components include at least a processing device 210 anda data storage device 215, according to an embodiment. In an embodimentthe computing device 200 is a mobile device such as a smartphone, atablet device, a wearable device (e.g., a smartwatch or other wearabledevice), or the like.

The processing device 210 is communicatively coupled to the data storagedevice 215 via the communications bus 205. The communications bus 205can utilize a selected communication protocol such as, but not limitedto, peripheral component interconnect (PCI); peripheral componentinterconnect express (PCIe); or the like.

The computing device 200 can include additional features such as, apower source. In an embodiment, the power source can be a battery thatis electrically connected to the processing device 210 and to the datastorage device 215. It is to be appreciated that the computing device200 can include a variety of additional features.

The computing device 200 can electronically communicate with a server225. In an embodiment, the vehicle 100 can electronically communicatewith the server 225 via a network such as the Internet, a cellularnetwork, or the like. The computing device 200 can communicate with theserver 225 on a periodic basis. In an embodiment, when in communicationwith the server 225, a usage limit can be modified based on a commandfrom the server 225. In an embodiment, a user may log in to the server225 to select a modification to the usage limit. In an embodiment, theuser may log in to the server 225 and purchase an increased usage limit.In an embodiment, the server 225 can be configured to auto-generate acommand to return a modified usage limit to an original usage limit inresponse to determining that, for example, a payment has not been made(e.g., if the payment is a subscription-based payment).

The data storage device 215 receives a command from the server 225 tomodify the usage limit of the data storage device 215. In an embodiment,the command can include one or more bits that indicate a digitalsignature of the server 225 and the data storage device 215 can verify adigital signature of the server 225 prior to executing the modificationto the usage limit.

The server 225 provides the command for modifying the usage limit,according to an embodiment. In an embodiment, the processing device 210can pass the command from the server 125 to the data storage device 215.The processing device 210 does not have the capability to change theusage limit of the data storage device 215 without the command from theserver 225.

In an embodiment, the data storage device 215 is a solid-state drive(SSD). In another embodiment, the data storage device 215 can be a harddisk drive (HDDs); flash memory; dynamic random-access memory (DRAM);magnetic tape; network attached storage device; or the like.

The data storage device 215 includes a host interface 230, firmware 240,and storage media 245.

The host interface 230 is communicatively coupled to the communicationsbus 205. The host interface 230 can be, for example, in a form of astandardized interface such as, but not limited to, a serial advancedtechnology attachment (SATA); a universal serial bus (USB); a peripheralcomponent interconnect express (PCIe); or the like. The host interface230 communicates information between the processing device 210 and thestorage media 245.

The host interface 230 is responsible for passing control, access, data,and other signals between the data storage device 215 and the processingdevice 210.

The processing device 210 runs firmware 240 to perform operations.Firmware 240 includes, for example, a type of computer program thatprovides control, monitoring, and data manipulation of data storagedevices. The firmware 240 controls operations of the processing device210 in operating the data storage device 215, such as storing andaccessing data in the storage media 245.

The firmware 240 can be configured to include instructions forcontrolling a usage limit of the data storage device 215. For example,the firmware 240 can include a percentage amount of the storage capacityof the storage media 245. In an embodiment, the firmware 240 can includea specific storage capacity which is equal to or less than the storagecapacity of the storage media 245 which is available to the user. Thefirmware 240 can include a percentage amount of the endurance limit orcan include a specific endurance limit that is less than or equal to theendurance capabilities of the storage media 245.

In an embodiment, the data storage device 215 can be connected to theserver 225 via a network. In response to a modification instruction fromthe server 225, the firmware 240 can be updated to include a modifiedusage limit. In an embodiment, the firmware 240 may not be updated tocontrol the usage limit of the data storage device 215. For example, inan embodiment, a processing device 235 such as a controller for the datastorage device 215 can impose the usage limit on the data storage device215. In such an embodiment, the processing device 235 can also beconfigured to recognize one or more bits in commands from the server 225that indicate a digital signature of the server 125 and verify thedigital signature of the server 225, then impose the usage limit duringthe operation of the data storage device 215.

At least a portion of the storage media 245 is non-volatile. That is,the storage media 245 does not require power to maintain the data orinformation stored in the storage media 245 and the data or informationis retrievable after the storage media 245 is powered off and thenpowered on again. Memory cells 250 of the storage media 245 can beimplemented using, for example, NAND gate-based flash memory;phase-change memory (PCM); magnetic memory (MRAM); resistiverandom-access memory; 3D XPoint; or the like. As a result, the storagemedia 245 is non-volatile and can retain data stored therein withoutpower for days, months, or years. In an embodiment, the memory cells 250can be single-layer cells (SLCs); multi-layer cells (MLCs); triple-layercells (TLCs); quad-layer cells (QLCs); or the like.

The data storage device 215 may utilize volatile memory for the storageof run-time data and instructions used by the processing device 210. Forexample, volatile dynamic random-access memory (DRAM); volatile staticrandom-access memory (SRAM); or the like can be used. The volatilememory requires power to maintain the data or information storedtherein, and the data or information is rapidly or immediately lost whenthe power is interrupted. In an embodiment, the processing device 210can alternatively or additionally include in-process cache memory.

In an embodiment, the processing device 210 can periodically connect tothe server 225 to verify whether there are any changes to the usagelimit. In an embodiment, commands from the server 225 can be pushed tothe data storage device 215 when the data storage device 215 isconnected to a network. That is, the data storage device 215 may notpoll for updates to the usage limit.

A non-transitory computer storage medium can be used to storeinstructions of the firmware 240. When the instructions are executed bythe processing device, the instructions cause the processing device toperform a method discussed in further detail below.

FIG. 4 is a flowchart of a method 300 for provisioning a data storagedevice, according to an embodiment. The method 300 may be performed forthe data storage device 115 (FIGS. 1, 2) or the data storage device 215(FIG. 3). The method 300 generally can be performed to modify usagelimit (e.g., a storage capacity, an endurance limit, combinationthereof, or the like).

At block 305, a computing device including a data storage device (e.g.,the vehicle 100 (FIG. 1) or the computing device 200 (FIG. 2)) canconnect to a server (e.g., the server 125 (FIG. 1) or server 225 (FIG.2)) via a network.

At block 310, the computing device receives a command to modify a usagelimit of the data storage device. As described herein, the usage limitcan include a storage capacity, an endurance limit, combinationsthereof, or the like. For example, at block 310, the computing devicereceives a command from the server including a modified usage limit. Inan embodiment, the server can include a flag or other indicator to notewhether a user has logged in and requested a change to the storagecapacity of the user's data storage device. The command to modify theusage limit of the storage device provided from the server can includeone or more bits representative of a digital signature.

At block 315, in response to receiving the command from the serverincluding a modified usage limit, the method 300 identifies one or morebits of the command that indicate a digital signature of the server. Forexample, this can be to ensure that the command to modify the usagelimits of the data storage device is coming from the expected server andnot an imposter.

In some embodiments, the data storage device can include a cryptographickey to verify whether a received signature associated with the commandreceived matches with the received message. In some embodiments, theserver can have a private key and share a public key (e.g., with thedata storage device). In such embodiments, the server can generate adigital signature using the private key by hashing the message into ahash value and use the private key to encrypt the hash value as thedigital signature. The data storage device can decrypt the digitalsignature to recover the received hash value and compare it to the hashvalue of the received message. If there is a match, the data storagedevice can conclude that the message has not been changed since thegeneration of the digital signature; and the digital signature wasgenerated using the private key (that is known only to the server). Itis to be appreciated that usage of a digital signature utilizingpublic-private key encryption is an example of how the data storagedevice can very whether the command came from the server and not animposter. Other methods of ensuring the server is the sender of themessage by the data storage device are also within the scope of thisdisclosure.

At block 320, the usage limit of the data storage device is updatedbased at least in part on identifying the one or more bits that indicatethe digital signature. In an embodiment, this can include the processingdevice receiving a firmware update with an indication of the change inthe usage limit. In an embodiment, updating the usage limit of thestorage device can include storing the modified usage limit in alocation of the storage media of the data storage device. That is, theusage limit can be stored in the storage media of the data storagedevice and updated as commands are received from the server. Then, inoperation, the data storage device can utilize the modified usage limit.In such an embodiment, an update to the firmware can be avoided. Theusage limit can be changed in either direction (i.e., an increase or adecrease).

If at block 315 the one or more bits of the command that indicate thedigital signature of the server are not identified, at block 325 themethod 300 leaves the usage limit as is. This can, for example, preventan imposter from making changes to the usage limit of the data storagedevice.

Examples of computer-readable storage media include, but are not limitedto, any tangible medium capable of storing a computer program for use bya programmable processing device to perform functions described hereinby operating on input data and generating an output. A computer programis a set of instructions that can be used, directly or indirectly, in acomputer system to perform a certain function or determine a certainresult. Examples of computer-readable storage media include, but are notlimited to, a floppy disk; a hard disk; a random access memory (RAM); aread-only memory (ROM); a semiconductor memory device such as, but notlimited to, an erasable programmable read-only memory (EPROM), anelectrically erasable programmable read-only memory (EEPROM), Flashmemory, or the like; a portable compact disk read-only memory (CD-ROM);an optical storage device; a magnetic storage device; other similardevice; or suitable combinations of the foregoing.

In some embodiments, hardwired circuitry may be used in combination withsoftware instructions. Thus, the description is not limited to anyspecific combination of hardware circuitry and software instructions,nor to any source for the instructions executed by the data processingsystem.

The terminology used herein is intended to describe embodiments and isnot intended to be limiting. The terms “a,” “an,” and “the” include theplural forms as well, unless clearly indicated otherwise. The terms“comprises” and/or “comprising,” when used in this Specification,specify the presence of the stated features, integers, steps,operations, elements, and/or components, but do not preclude thepresence or addition of one or more other features, integers, steps,operations, elements, and/or components.

It is to be understood that changes may be made in detail, especially inmatters of the construction materials employed and the shape, size, andarrangement of parts without departing from the scope of the presentdisclosure. This Specification and the embodiments described areexamples, with the true scope and spirit of the disclosure beingindicated by the claims that follow.

What is claimed is:
 1. A method, comprising: receiving a command tomodify a usage limit of a data storage device from a server connected incommunication with the data storage device via a network, the commandincluding a modified usage limit; identifying one or more bits of thecommand that indicate a digital signature of the server; and updatingthe usage limit of the data storage device according to the modifiedusage limit based at least in part on identifying the one or more bitsthat indicate the digital signature.
 2. The method of claim 1, whereinupdating the usage limit of the data storage device includes updatingfirmware of the data storage device.
 3. The method of claim 1, whereinupdating the usage limit of the data storage device includes updating astorage capacity, an endurance limit, or combination thereof.
 4. Themethod of claim 1, wherein updating the usage limit of the data storagedevice includes storing the modified usage limit in a memory space ofthe data storage device.
 5. A data storage device, comprising: a hostinterface; integrated circuit memory cells; and a processing devicecoupled to the host interface to provide commands with addresses toaccess the integrated circuit memory cells according to the address, andconfigured to execute firmware to perform: operations requested bycommands received via the host interface; and updates to a usage limitof the data storage device.
 6. The data storage device of claim 5,wherein the commands to access integrated circuit memory cells includewrite, erase, or combinations thereof.
 7. The data storage device ofclaim 5, wherein a modified usage limit is greater than the usage limit.8. The data storage device of claim 5, wherein the data storage deviceis configured to receive a modified usage limit in response toconnecting to a network.
 9. The data storage device of claim 8, whereinthe data storage device is configured to receive a command including themodified usage limit from a server identify one or more bits of thecommand that indicate a digital signature of the server, and update theusage limit based at least in part on identifying the one or more bitsthat indicate the digital signature.
 10. The data storage device ofclaim 5, wherein the usage limit includes a storage capacity, anendurance limit, or combinations thereof.
 11. The data storage device ofclaim 5, wherein the data storage device is on board a vehicle.
 12. Thedata storage device of claim 5, wherein the data storage device is in amobile computing device.
 13. A system, comprising: a data storage devicehaving a usage limit, configured to receive a modified usage limit andupdate the usage limit to be the modified usage limit, and including: ahost interface; and integrated circuit memory cells; and a processingdevice coupled to the host interface to provide commands with addressesto access the integrated circuit memory cells according to the address,and configured to execute firmware to perform: operations requested bycommands received via the host interface; and updates to the usage limitof the data storage device; and a server communicable with the datastorage device over a network, wherein the server is configured to senda command to the data storage device to update the usage limit of thedata storage device.
 14. The system of claim 13, wherein the commands toaccess integrated circuit memory cells include write, erase, orcombinations thereof.
 15. The system of claim 13, wherein the modifiedusage limit is greater than the usage limit.
 16. The system of claim 13,wherein the data storage device is configured to receive the modifiedusage limit of the data storage device in response to connecting to thenetwork.
 17. The system of claim 13, wherein the usage limit includes astorage capacity, an endurance limit, or combinations thereof.
 18. Thesystem of claim 13, wherein the processing device is configured toidentify one or more bits of the command that indicate a digitalsignature of the server, and update the usage limit of the data storagedevice based at least in part on identifying the one or more bits thatindicate the digital signature.
 19. The system of claim 13, comprising avehicle, wherein the data storage device is on board the vehicle. 20.The system of claim 13, comprising a mobile computing device, whereinthe data storage device is on board the mobile computing device.