1
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El: Memory system with versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El, Discretix Technologies, HSUE James S, June 29, 2006: WO/2006/069194 (19 worldwide citation)

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


2
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Control structure for versatile content control and method using structure. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HSUE James S, June 29, 2006: WO/2006/069311 (16 worldwide citation)

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissi ...


3
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Versatile content control with partitioning. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, GENIN Kent E, June 29, 2006: WO/2006/069274 (15 worldwide citation)

In some mobile storage devices, content protection is afforded by dividing the memory into separate areas where access to protected areas requires prior authentication. While such feature does provide some protection, it does not protect against a user who obtained a password by illicit means. Thus, ...


4
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: System for creating control structure for versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HETZ Joseph F, June 29, 2006: WO/2006/069312 (12 worldwide citation)

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


5
Bahman Qawami
Sharghi Farshid Sabet, Jogand Coulomb Fabrice, Qawami Bahman: Methods and apparatuses for binding content to a seperate memory device. Sandisk Corporation, Sharghi Farshid Sabet, Jogand Coulomb Fabrice, Qawami Bahman, HETZ Joseph F, May 22, 2008: WO/2008/060467 (8 worldwide citation)

A method for accessing content is provided. In the method, information from a first memory device is retrieved. A parameter is generated based on the information and an account on a second memory device is accessed based on the parameter. The second memory device is configured to store the content a ...


6
Jogand Coulomb Fabrice, Pinto Yosi: Nested memory system with near field communications capability. Sandisk Corporation, Jogand Coulomb Fabrice, Pinto Yosi, FANUCCI Allan A, July 5, 2007: WO/2007/076456 (16 worldwide citation)

A mass storage memory card adds functionality to host devices with which it is used. In addition to the ability to store large amounts of user files and protect them from unauthorized duplication, a mass storage device according to the present invention enables near field communications (NFC) with a ...


7
Holtzman Michael, Barzilia Ron, Jogand Coulomb Fabrice: Content control system and method using versatile control structure. Sandisk Corporation, Holtzman Michael, Barzilia Ron, Jogand Coulomb Fabrice, HETZ Joseph F, January 17, 2008: WO/2008/008244 (7 worldwide citation)

At least one software application is stored in a memory device, where a security data structure controls access to information obtainable from data stored in the device and to the at least one software application. A set of protocols control communication between a host and a memory device. Invocati ...


8
Holtzman Michael, Jogand Coulomb Fabrice: Upgrading a memory card that has security mechanisms that prevent copying of secure content and applications. Sandisk Corporation, Holtzman Michael, Jogand Coulomb Fabrice, GENIN Kent E, July 10, 2008: WO/2008/082949 (5 worldwide citation)

A secure flash memory card or flash drive protects user content from unauthorized duplication. However, even the protected user content can be moved from one flash card or drive to another by its rightful owner or licensee. Additionally, secure firmware applications that may be added to the flash ca ...


9
Holtzman Michael, Barzilai Ron, Jogand Coulomb Fabrice: System and method for controlling information supplied from memory device. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Jogand Coulomb Fabrice, HETZ Joseph F, January 17, 2008: WO/2008/008245 (4 worldwide citation)

A memory storing public and confidential information is removably connected to a host device. General information on data stored in memory devices is accessible to the host device without authentication. Only a portion of confidential information stored in the memory device is accessible through the ...


10
Holtzman Michael, Barzilai Ron, Sela Rotem, Jogand Coulomb Fabrice: Content control system and method using certificate revocation lists. Sandisk Corporation, Holtzman Michael, Barzilai Ron, Sela Rotem, Jogand Coulomb Fabrice, HETZ Joseph F, January 31, 2008: WO/2008/013655 (3 worldwide citation)

Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be p ...



Click the thumbnails below to visualize the patent trend.