1
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El: Memory system with versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, Hagai Bar El, Discretix Technologies, HSUE James S, June 29, 2006: WO/2006/069194 (19 worldwide citation)

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


2
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar El: Method for versatile content control. SanDisk Technologies, Discretix Technologies, Brinks Hofer Gilson & Lione, August 6, 2013: US08504849 (12 worldwide citation)

Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle thr ...


3
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar El: Method forversatile content control. Parsons Hsue & de Runtz, October 26, 2006: US20060242068-A1

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


4
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar El: Memory system with versatile content control. Parsons Hsue & de Runtz, July 19, 2007: US20070168292-A1

The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access ...


5
Hagai Bar El, David Deitcher, David Voschina, Eran Rippel: System, device, and method of selectively allowing a host processor to access host-executable code. Discretix Technologies, EMPK & Shiloh, December 16, 2008: US07467304 (13 worldwide citation)

Some demonstrative embodiments of the invention include a method, device and/or system of selectively allowing a host processor to access a host-executable code. A host apparatus may include, for example, a host processor; and a protected memory module comprising: a memory to maintain a host-executa ...


6
Micky Holtzman, Hagai Bar El, Ronen Greenspan, Rony Shapiro: Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory. SanDisk Corporation, Discretix Technologies, Brinks Hofer Gilson & Lione, April 26, 2011: US07934049 (12 worldwide citation)

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and th ...


7
Micky Holtzman, Baruch Boris Cohen, Ron Barzilai, Hagai Bar El, David Deitcher: Methods used in a secure memory card with life cycle phases. SanDisk Technologies, Discretix Technologies, Brinks Hofer Gilson & Lione, January 31, 2012: US08108691 (7 worldwide citation)

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryp ...


8
Micky Holtzman, Baruch Boris Cohen, Ron Barzilai, Hagai Bar El, David Deitcher: Secure memory card with life cycle phases. SanDisk Technologies, Discretix Technologies, Brinks Hofer Gilson & Lione, November 27, 2012: US08321686 (3 worldwide citation)

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryp ...


9
Hagai Bar El, Alexander Klimov, Asaf Shen: Method, system, and device of provisioning cryptographic data to electronic devices. ARM, Eitan Mehulal & Sadot, January 9, 2018: US09866376

System, device, and method of provisioning cryptographic assets to electronic devices. A delegation message is generated at a first provisioning server. The delegation message indicates provisioning rights that are delegated by the first provisioning server to a second provisioning server with regar ...


10
Hagai Bar El, Alexander Klimov, Asaf Shen: Method, device, and system of provisioning cryptographic data to electronic devices. ARM Technologies Israel, Eitan Mehulal & Sadot, July 11, 2017: US09705673

System, device, and method of provisioning cryptographic assets to electronic devices. A delegation message is generated at a first provisioning server. The delegation message indicates provisioning rights that are delegated by the first provisioning server to a second provisioning server with regar ...