1
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El: Memory system with versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El, Discretix Technologies, HSUE James S, June 29, 2006: WO/2006/069194 (19 worldwide citation)

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


2
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Control structure for versatile content control and method using structure. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HSUE James S, June 29, 2006: WO/2006/069311 (16 worldwide citation)

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissi ...


3
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Versatile content control with partitioning. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, GENIN Kent E, June 29, 2006: WO/2006/069274 (15 worldwide citation)

In some mobile storage devices, content protection is afforded by dividing the memory into separate areas where access to protected areas requires prior authentication. While such feature does provide some protection, it does not protect against a user who obtained a password by illicit means. Thus, ...


4
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: System for creating control structure for versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HETZ Joseph F, June 29, 2006: WO/2006/069312 (12 worldwide citation)

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


5
Holtzman Michael, Cohen Baruch Boris, Barzilai Ron, Bar El Hagai, Deitcher David: Secure memory card with life cycle phases. Sandisk Corporation, Discretix Technologies, Holtzman Michael, Cohen Baruch Boris, Barzilai Ron, Bar El Hagai, Deitcher David, FANUCCI Allan A, August 17, 2006: WO/2006/086232 (25 worldwide citation)

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryp ...


6
Holtzman Michael, Barzilai Ron, Sela Rotem, Coulomb Fabrice Jongand: Content control system and method using certificate chains. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Sela Rotem, Coulomb Fabrice Jongand, HETZ Joseph F, January 31, 2008: WO/2008/013656 (5 worldwide citation)

Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.


7
Holtzman Michael, Barzilai Ron, Elhamias Reuven, Cohen Niv: Hardware driver integrity check of memory card controller firmware. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Elhamias Reuven, Cohen Niv, FANUCCI Allan A, March 22, 2007: WO/2007/033322 (4 worldwide citation)

A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of firmware when executed pulls in another portion of firmware to be executed. The hardware of the encryptio ...


8
Holtzman Michael, Barzilai Ron, Jogand Coulomb Fabrice: System and method for controlling information supplied from memory device. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Jogand Coulomb Fabrice, HETZ Joseph F, January 17, 2008: WO/2008/008245 (4 worldwide citation)

A memory storing public and confidential information is removably connected to a host device. General information on data stored in memory devices is accessible to the host device without authentication. Only a portion of confidential information stored in the memory device is accessible through the ...


9
Holtzman Michael, Barzilai Ron, Jogand Coulomb: Control system and method using identity objects. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Jogand Coulomb, HETZ Joseph F, January 17, 2008: WO/2008/008243 (3 worldwide citation)

An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. This object may be used as proof of identification by using the private key to sign data provi ...


10
Holtzman Michael, Barzilai Ron, Sela Rotem, Jogand Coulomb Fabrice: Content control system and method using certificate revocation lists. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Sela Rotem, Jogand Coulomb Fabrice, HETZ Joseph F, January 31, 2008: WO/2008/013655 (3 worldwide citation)

Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be p ...



Click the thumbnails below to visualize the patent trend.