1
Fred Thomas Fred Thomas
Thomas Fred C Iii, Watson Brent, Fowler Steven M, Bero James M, Taylor Wilhelm: Distributed cryptography technique for protecting removable data storage media. Iomega, September 5, 2001: EP1130494-A2 (3 worldwide citation)

An apparatus, system and technique for cryptographically securing data in a secure computing environment are provided. Different components of a computer system have associated cryptographic data that is either common to the enterprise or unique to the system component for a given file transfer. In ...


2
Vincent Le Chevalier Vincent Le Chevalier
LE CHEVALIER Vincent, GEIGER Charles F, JOSHI Ashit, TWORETZKY Brent S, ECKENBERG Dax, DESAI Ravindra Mutalik: [fr] GESTION DE CONTENU ÉLECTRONIQUE ET PLATE-FORME DE LIVRAISON, [en] ELECTRONIC CONTENT MANAGEMENT AND DELIVERY PLATFORM. CHEGG, HULSE Robert R, April 11, 2013: WO/2013/052601

[en] An education digital reading platform provides aggregation, management, and distribution of digital education content and services. The platform ingests content from a variety of content sources, transforms the content for web-based publication, and distributes the content to connected end-user ...


3
Bahman Qawami
Sharghi Farshid Sabet, Jogand Coulomb Fabrice, Qawami Bahman: Methods and apparatuses for binding content to a seperate memory device. Sandisk Corporation, Sharghi Farshid Sabet, Jogand Coulomb Fabrice, Qawami Bahman, HETZ Joseph F, May 22, 2008: WO/2008/060467 (8 worldwide citation)

A method for accessing content is provided. In the method, information from a first memory device is retrieved. A parameter is generated based on the information and an account on a second memory device is accessed based on the parameter. The second memory device is configured to store the content a ...


4

5
Bahman Qawami
Po Yuan, Javier Cañis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin Tse Chang, Oktay Rasizade, Farshid Sabet Sharghi: Method and system for creating and accessing a secure storage area in a non-volatile memory card. Sandisk Technologies, Brinks Hofer Gilson & Lione, March 27, 2012: US08146153 (4 worldwide citation)

In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted t ...


6
James Kraemer Ph.D.
Samuel S Adams, Robert R Friedlander, James R Kraemer, Jeb R Linton: Security filter for context-based data gravity wells. International Business Machines Corporation, John R Pivnichny, Law Office of Jim Boice, October 7, 2014: US08856946 (2 worldwide citation)

A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-base ...


7
Bahman Qawami
Mei Yan, Chieh Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet Sharghi, Patricia Dwyer, Po Yuan: File system filter authentication. Sandisk Technologies, Toler Law Group PC, May 14, 2013: US08443207 (2 worldwide citation)

A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to t ...


8
Bahman Qawami
Mei Yan, Robert C Chang, Farshid Sabet Sharghi, Po Yuan, Bahman Qawami: Accessing memory device content using a network. SanDisk Technologies, Brinks Gilson & Lione, March 17, 2015: US08984645 (1 worldwide citation)

A first storage unit is bound to a second storage unit based on a binding type associated with content on the first storage unit, the first storage unit being operated through a first host device, and the second storage unit being operated through a second host device. When content on the first stor ...


9
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Method for versatile content control with partitioning. SanDisk Technologies, Brinks Gilson & Lione, December 3, 2013: US08601283 (1 worldwide citation)

In some applications, it may be more convenient to the user to be able to log in the memory system using one application, and then be able to use different applications to access protected content without having to log in again. In such event, all of the content that the user wishes to access in thi ...


10
Bahman Qawami
Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin Tse Chang, Oktay Rasizade, Farshid Sabet Sharghi: Method and system for creating and accessing a secure storage area in a non-volatile memory card. SanDisk Technologies, Brinks Gilson & Lione, March 31, 2015: US08997214

In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted t ...