1
Bahman Qawami
Po Yuan, Javier CaƱis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin Tse Chang, Oktay Rasizade, Farshid Sabet Sharghi: Method and system for creating and accessing a secure storage area in a non-volatile memory card. Sandisk Technologies, Brinks Hofer Gilson & Lione, March 27, 2012: US08146153 (4 worldwide citation)

In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted t ...


2
Bahman Qawami
Robert Chin Tse Chang, Henry Ricardo Hutton, Farshid Sabet Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami: Media card command pass through methods. SanDisk Technologies, Brinks Hofer Gilson & Lione, December 13, 2011: US08078788 (2 worldwide citation)

Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate bet ...


3
Bahman Qawami
Mei Yan, Robert C Chang, Farshid Sabet Sharghi, Po Yuan, Bahman Qawami: Memory device upgrade. SanDisk Technologies, Brinks Hofer Gilson & Lione, April 23, 2013: US08428649 (1 worldwide citation)

Technology for replacing a first storage unit operatively coupled to a device is provided. Content of the first storage unit is sent to a new storage unit that serves as the replacement of the first storage unit. In one embodiment, the content is first sent to a trusted third-party server and then t ...


4
Bahman Qawami
Mei Yan, Chieh Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet Sharghi, Patricia Dwyer, Po Yuan: File system filter authentication. Sandisk Technologies, Toler Law Group PC, May 14, 2013: US08443207 (1 worldwide citation)

A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to t ...


5
Bahman Qawami
Robert Chin Tse Chang, Henry Ricardo Hutton, Farshid Sabet Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami: Media card command pass through methods. SanDisk Technologies, Brinks Hofer Gilson & Lione, April 9, 2013: US08417866

Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate bet ...


6
Bahman Qawami
Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin Tse Chang, Oktay Rasizade, Farshid Sabet Sharghi: Method and system for creating and accessing a secure storage area in a non-volatile memory card. SanDisk Technologies, Brinks Gilson & Lione, March 31, 2015: US08997214

In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted t ...


7
Bahman Qawami
Robert C Chang, Po Yuan, Bahman Qawami, Farshid Sabet sharghi, Junzhi Wang, Xian Jun Liu, Chieh Hao Yang, June Li, Mei Yan, Fabrice Jogand Coulomb: Method of storing and accessing header data from memory. SanDisk Technologies, Toler Law Group, November 29, 2011: US08069298

Methods of storing and accessing data using a header portion of a file are disclosed. In an embodiment, a method of storing content in a non-volatile memory is disclosed. The method includes reading a content file including media content and including a trailer, storing information related to the tr ...


8
Bahman Qawami
Mei Yan, Robert C Chang, Farshid Sabet Sharghi, Po Yuan, Bahman Qawami: Accessing memory device content using a network. SanDisk Technologies, Brinks Gilson & Lione, March 17, 2015: US08984645

A first storage unit is bound to a second storage unit based on a binding type associated with content on the first storage unit, the first storage unit being operated through a first host device, and the second storage unit being operated through a second host device. When content on the first stor ...


9
Lu Chun Hung, Li Mei Yan: The end-point detection method of cmp polishing using the principle of optical confocal feedback. Taiwan Semiconductor Manufacturing Company, May 28, 2001: TW436383 (33 worldwide citation)

This invention relates to a end-point detection method of CMP polishing using the principle of optical confocal feedback, wherein the optical feedback method is used to replace the conventional interference method, and can accurately detect the end-point of CMP polishing. The aforementioned method c ...


10
Bradley Carlson, Mei Yan: Single chip, noise-resistant, one-dimensional, CMOS sensor for target imaging. Symbol Technologies, Kirschstein et al, November 4, 2008: US07446806 (8 worldwide citation)

A linear sensor array for imaging coded indicia includes an analog front end and a digital back end integrated on a single CMOS chip. A real-time, correlated double sampling circuit is used for noise suppression.



Click the thumbnails below to visualize the patent trend.