1
Fred Thomas Fred Thomas
Thomas Fred C Iii, Watson Brent, Fowler Steven M, Bero James M, Taylor Wilhelm: Distributed cryptography technique for protecting removable data storage media. Iomega, September 5, 2001: EP1130494-A2 (3 worldwide citation)

An apparatus, system and technique for cryptographically securing data in a secure computing environment are provided. Different components of a computer system have associated cryptographic data that is either common to the enterprise or unique to the system component for a given file transfer. In ...


2
Fred Thomas Fred Thomas
Thomas Fred C Iii, Bero James M, Watson Brent, Taylor Wilhelm, Fowler Steven M: Detachable data storage system protected with encryption. Iomega, September 7, 2001: JP2001-243105 (1 worldwide citation)

PROBLEM TO BE SOLVED: To provide a distributed encryption method for a portable storage system.SOLUTION: A computer system has a common cipher data component (C) for an enterprise system to transfer files and a unique cipher data component (U). One or more users (300), a host (90), a data storage (5 ...


3
Fred Thomas Fred Thomas
Fred C Thomas III: Method and apparatus for secure transmission of identifier for removable storage media. Jerry W Mills Esq, Baker Botts, October 24, 2002: US20020157011-A1

A media serial number (MS#) for a removable data storage cartridge (22) is asymmetrically encrypted using a private key (106) from a key list (103) which never leaves the factory. This factory encrypted value (FEMS#) is stored in a secure memory device (46) in the cartridge, along with an identifier ...


4
Bahman Qawami
Bahman Qawami, Farshid Sabet Sharghi, Robert C Chang: System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media. SanDisk Corporation, Winston & Strawn, June 5, 2007: US07227952 (31 worldwide citation)

A secure software system for a portable device or computer that provides a simple interface to the device or computer and that retrieves and dynamically decrypts keys and content from a secure media while minimizing exposure of the keys and eliminating the need for manufacturers of the device or com ...


5
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar El: Method for versatile content control. SanDisk Technologies, Discretix Technologies, Brinks Hofer Gilson & Lione, August 6, 2013: US08504849 (12 worldwide citation)

Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle thr ...


6
Bahman Qawami
Farshid Sabet Sharghi, Bahman Qawami, Robert C Chang: System, method, and device for playing back recorded content. SanDisk Corporation, Brinks Hofer Gilson & Lione, November 23, 2010: US07840818 (6 worldwide citation)

A secure software package for original equipment manufacturers to run in electronic devices in order to access and dynamically decrypt encrypted audio video or other content from a memory storage device such as a memory card, optical or hard disk such that the user interface of the device need only ...


7
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Method for versatile content control with partitioning. SanDisk Technologies, Brinks Gilson & Lione, December 3, 2013: US08601283 (1 worldwide citation)

In some applications, it may be more convenient to the user to be able to log in the memory system using one application, and then be able to use different applications to access protected content without having to log in again. In such event, all of the content that the user wishes to access in thi ...


8
Olivier Benoit
Olivier Benoit: Method and securing electronic device data processing. Gemalto, Buchanan Ingersoll & Rooney PC, August 23, 2011: US08006058 (1 worldwide citation)

A method for securing electronic device processes against attacks (e.g. side channel attacks) during the processing of sensitive and/or confidential data by a Central Processing Unit (CPU) to the volatile memory (e.g. RAM) of an electronic device such as, for example, a smart card, a PDA or a cellul ...


9
James Kraemer Ph.D.
Timothy Durniak, Robert R Friedlander, James R Kraemer: Born encrypted optical data. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, November 25, 2014: US08898483

A device for generating a born encrypted optical file includes a photovoltaic matrix for converting an optical image into a digital file. The digital file is a collection of digital data that has not been processed by any image processing logic and thus cannot be used to directly generate a reproduc ...


10
James Kraemer Ph.D.
Robert R Friedlander, James R Kraemer: Hierarchical organization of data associated with events. International Business Machines Corporation, Yudell Isidore Ng Russell PLLC, July 15, 2014: US08782780

Methods, data structures, systems and computer program products are provided for organizing security data. A triggering security event is hierarchically related to at least one additional security event based on a possible relationship between the triggering security event and the at least one addit ...