1
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El: Memory system with versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El, Discretix Technologies, HSUE James S, June 29, 2006: WO/2006/069194 (19 worldwide citation)

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


2
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar El: Method for versatile content control. SanDisk Technologies, Discretix Technologies, Brinks Hofer Gilson & Lione, August 6, 2013: US08504849 (12 worldwide citation)

Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle thr ...


3
Holtzman Michael, Cohen Baruch Boris, Barzilai Ron, Bar El Hagai, Deitcher David: Secure memory card with life cycle phases. Sandisk Corporation, Discretix Technologies, Holtzman Michael, Cohen Baruch Boris, Barzilai Ron, Bar El Hagai, Deitcher David, FANUCCI Allan A, August 17, 2006: WO/2006/086232 (25 worldwide citation)

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryp ...


4
Hagai Bar El, David Deitcher, David Voschina, Eran Rippel: System, device, and method of selectively allowing a host processor to access host-executable code. Discretix Technologies, EMPK & Shiloh, December 16, 2008: US07467304 (13 worldwide citation)

Some demonstrative embodiments of the invention include a method, device and/or system of selectively allowing a host processor to access a host-executable code. A host apparatus may include, for example, a host processor; and a protected memory module comprising: a memory to maintain a host-executa ...


5
Micky Holtzman, Hagai Bar El, Ronen Greenspan, Rony Shapiro: Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory. SanDisk Corporation, Discretix Technologies, Brinks Hofer Gilson & Lione, April 26, 2011: US07934049 (12 worldwide citation)

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and th ...


6
Micky Holtzman, Baruch Boris Cohen, Ron Barzilai, Hagai Bar El, David Deitcher: Methods used in a secure memory card with life cycle phases. SanDisk Technologies, Discretix Technologies, Brinks Hofer Gilson & Lione, January 31, 2012: US08108691 (7 worldwide citation)

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryp ...


7
Holtzman Michael, Bar El Hagai, Greenspan Ronen, Shapiro Rony: Secure yet flexible system architecture for secure devices with flash mass storage memory. Sandisk Corporation, Discretix Technologies, Holtzman Michael, Bar El Hagai, Greenspan Ronen, Shapiro Rony, FANUCCI Allan A, March 22, 2007: WO/2007/033321 (6 worldwide citation)

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and th ...


8
Greenspan Ronen: Method, device, and system of maintaining a context of a secure execution environment. Discretix Technologies, Greenspan Ronen, PEARL COHEN ZEDEK LATZER, December 14, 2006: WO/2006/131921 (5 worldwide citation)

Some demonstrative embodiments of the invention include a method, device and/or system of maintaining a context of a secure execution environment. According to some demonstrative embodiments of the invention, the device may include a secure context processing module to receive a processed context fr ...


9
Holtzman Michael, Cohen Baruch Boris, Deitcher David, Bar El Hagai, Yeruchami Aviram: Memory system with in-stream data encryption/decryption. Sandisk Corporation, Discretix Technologies, Holtzman Michael, Cohen Baruch Boris, Deitcher David, Bar El Hagai, Yeruchami Aviram, HSUE James S, July 6, 2006: WO/2006/071725 (3 worldwide citation)

The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably controlled so that it has a selected data source among a plurality of sources and a selected destination ...


10
Gueron Shay, Parzanchevski Ori, Zuk Or: Device and method of manipulating masked data. Discretix Technologies, Gueron Shay, Parzanchevski Ori, Zuk Or, EITAN PEARL LATZER 7 Shenkar Street 46725 Herzlia, August 19, 2004: WO/2004/070510 (3 worldwide citation)

Embodiments of the invention provide a method and a device for manipulating data (108) by converting masked data in a first representation of a finite field into converted data in a second representation of the finite field (102), and manipulating the converted data (106) to obtain manipulated maske ...