1
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El: Memory system with versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El, Discretix Technologies, HSUE James S, June 29, 2006: WO/2006/069194 (19 worldwide citation)

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


2
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Control structure for versatile content control and method using structure. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HSUE James S, June 29, 2006: WO/2006/069311 (16 worldwide citation)

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissi ...


3
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Versatile content control with partitioning. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, GENIN Kent E, June 29, 2006: WO/2006/069274 (15 worldwide citation)

In some mobile storage devices, content protection is afforded by dividing the memory into separate areas where access to protected areas requires prior authentication. While such feature does provide some protection, it does not protect against a user who obtained a password by illicit means. Thus, ...


4
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: System for creating control structure for versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HETZ Joseph F, June 29, 2006: WO/2006/069312 (12 worldwide citation)

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


5

6
Holtzman Michael, Cohen Baruch Boris, Barzilai Ron, Bar El Hagai, Deitcher David: Secure memory card with life cycle phases. Sandisk Corporation, Discretix Technologies, Holtzman Michael, Cohen Baruch Boris, Barzilai Ron, Bar El Hagai, Deitcher David, FANUCCI Allan A, August 17, 2006: WO/2006/086232 (25 worldwide citation)

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryp ...


7
Holtzman Michael, Barzilia Ron, Jogand Coulomb Fabrice: Content control system and method using versatile control structure. Sandisk Corporation, Holtzman Michael, Barzilia Ron, Jogand Coulomb Fabrice, HETZ Joseph F, January 17, 2008: WO/2008/008244 (7 worldwide citation)

At least one software application is stored in a memory device, where a security data structure controls access to information obtainable from data stored in the device and to the at least one software application. A set of protocols control communication between a host and a memory device. Invocati ...


8
Holtzman Michael, Bar El Hagai, Greenspan Ronen, Shapiro Rony: Secure yet flexible system architecture for secure devices with flash mass storage memory. Sandisk Corporation, Discretix Technologies, Holtzman Michael, Bar El Hagai, Greenspan Ronen, Shapiro Rony, FANUCCI Allan A, March 22, 2007: WO/2007/033321 (6 worldwide citation)

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and th ...


9
Holtzman Michael, Barzilai Ron, Sela Rotem, Coulomb Fabrice Jongand: Content control system and method using certificate chains. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Sela Rotem, Coulomb Fabrice Jongand, HETZ Joseph F, January 31, 2008: WO/2008/013656 (5 worldwide citation)

Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.


10
Holtzman Michael, Cohen Baruch B, Islam Muhammed R, Davidson Matthew: Memory system with in stream data encryption/decryption and error correction. Sandisk Corporation, Holtzman Michael, Cohen Baruch B, Islam Muhammed R, Davidson Matthew, HSUE James S, June 29, 2006: WO/2006/069273 (5 worldwide citation)

The throughput of the memory system is improved where error correction of data in a data stream is cryptographically processed with minimal involvement of any controller. To perform error correction when data from the memory cells are read, the bit errors in the data in the data stream passing betwe ...



Click the thumbnails below to visualize the patent trend.