11
Patricia Dwyer Fairman: Film cassette. Eastman Kodak Co, YANG SONGLING, November 8, 1989: CN89101582

In a 35mm film cassette, the leading end of a film roll coiled about a film spool is located within the cassette shell. The film spool is comprised of two pieces constructed to telescopically receive one another. Each spool piece includes a radially extending flange normally disposed adjacent one of ...


12
Bahman Qawami, Fabrice Jogand Coulomb, Farshid Sabet Sharghi, Michael Holtzman, Pascal Caillon, Patricia Dwyer, Paul McAvoy, Pedro Vargas, Po Yuan, Robert C Chang: Method for secure storage and delivery of media content. Parsons Hsue & de Runtz Sandisk Corporation, February 22, 2007: US20070043667-A1

The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such ...


13
Bahman Qawami, Fabrice Jogand Coulomb, Farshid Sabet Sharghi, Michael Holtzman, Pascal Caillon, Patricia Dwyer, Paul McAvoy, Pedro Vargas, Po Yuan, Robert C Chang: Mobile memory system for secure storage and delivery of media content. Parsons Hsue & de Runtz Sandisk Corporation, March 8, 2007: US20070056042-A1

The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such ...


14
Mei Yan, Chieh Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet Sharghi, Patricia Dwyer, Po Yuan: File system filter authentication. Sandisk Corporation, Toler Law Group, July 29, 2010: US20100191962-A1

A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to t ...


15
Robert Chin Tse Chang, Henry Ricardo Hutton, Farshid Sabet Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami: Media Card Command Pass Through Methods. BRINKS HOFER GILSON & LIONE SanDisk, July 16, 2009: US20090182919-A1

Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate bet ...


16
Bahman Qawami, Fabrice Jogand Coulomb, Farshid Sabet Sharghi, Pascal Caillon, Patricia Dwyer, Paul McAvoy, Pedro Vargas, Po Yuan, Robert C Chang: Method for Secure Storage and Delivery of Media Content. BRINKS HOFER GILSON & LIONE SanDisk, July 1, 2010: US20100169222-A1

The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such ...


17
Mei Yan, Chieh Hao Yang, Bahman Quwami, Farshid Sabet Sharghi, Patricia Dwyer, Po Yuan: Authentication for access to software development kit for a peripheral device. BRINKS HOFER GILSON & LIONE SanDisk, November 26, 2009: US20090293117-A1

A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the periphera ...


18
Mei Yan, Chieh Hao Yang, Bahman Qawami, Farshid Sabet Sharghi, Patricia Dwyer, Po Yuan: Systems for authentication for access to software development kit for a peripheral device. BRINKS HOFER GILSON & LIONE SanDisk, November 26, 2009: US20090293118-A1

A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the periphera ...


19
Po Yuan, Javier CaƱis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin Tse Chang, Oktay Rasizade, Farshid Sabet Sharghi: Method and system for creating and accessing a secure storage area in a non-volatile memory card. SanDisk Corporaton, June 14, 2012: US20120151576-A1

In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted t ...


20
Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin Tse Chang, Oktay Rasizade, Farshid Sabet Sharghi: Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card. BRINKS HOFER GILSON & LIONE SanDisk, July 2, 2009: US20090172809-A1

In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted t ...