1
Bahman Qawami
Bahman Qawami, Farshid Sabet Sharghi, Robert C Chang: System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media. SanDisk Corporation, Winston & Strawn, June 5, 2007: US07227952 (31 worldwide citation)

A secure software system for a portable device or computer that provides a simple interface to the device or computer and that retrieves and dynamically decrypts keys and content from a secure media while minimizing exposure of the keys and eliminating the need for manufacturers of the device or com ...


2
Olivier Benoit
Jean Sebastien Coron, Nathalie Feyt, Olivier Benoit: Method for countermeasure in an electronic component using a secret key algorithm. Gemplus, Buchanan Ingersoll & Rooney PC, December 30, 2008: US07471791 (4 worldwide citation)

A countermeasure method in an electronic component using a secret key algorithm K on an input message M executes an operation OPN(D) on input data D. A random value, of one first random information U, is generated that is of identical size as the input information D. A second random information V, i ...


3
Olivier Benoit
Etienne Cambois, Olivier Benoit: Method of securely unlocking a mobile terminal. Gemalto, Buchanan Ingersoll & Rooney P C, December 28, 2010: US07860487 (1 worldwide citation)

A method of unlocking a mobile terminal after a period of use and ensuring that the first operator who sold the terminal receives adequate payment prior to the use thereof. The identity of the terminal is saved and a security algorithm, which is not known to the operator, is implemented in a securit ...


4
Olivier Benoit
Eric Brier, Jacques Fournier, Pascal Moitrel, Olivier Benoit, Philippe Proust: Secure data transmission between two modules. Gemalto, Buchanan Ingersoll & Rooney PC, December 21, 2010: US07856099 (1 worldwide citation)

The invention relates to a method for secure data transmission in connections between two functional modules of an electronic unit. A first module of a message of k bits in a word code of n bits is injection coded with a constant Hamming weight of w. The word of code is transmitted to a second modul ...


5
Ramandeep Ahuja
Donald G Newberg, Ramandeep Ahuja, Michelle M Antonelli, Gregory D Bishop, Peter M Drozt, Michael F Korus, Peter E Thomas: System and method of increasing encryption synchronization availability. Motorola, June 23, 2011: US20110150219-A1

Methods for increasing encryption synchronization availability include collecting encryption synchronization data from a first superframe received at a gateway. The encryption synchronization data is for decrypting media in a second superframe also received at the gateway. The encryption synchroniza ...


6
Bahman Qawami
Fabrice Jogand Coulomb, Farshid Sabet Sharghi, Bahman Qawami: Methods for binding content to a separate memory device. BRINKS HOFER GILSON & LIONE SanDisk, May 15, 2008: US20080115211-A1

A method for accessing content is provided. In this method, information from a first memory device is retrieved. A parameter is generated based on the information and an account on a second memory device is accessed based on the parameter. The second memory device is configured to store the content ...


7
Bahman Qawami
Oktay Rasizade, Bahman Qawami, Fabrice Jogand Coulomb, Robert C Chang, Farshid Sabet Sharghi: Method for managing keys and/or rights objects. Parsons Hsue & de Runtz Sandisk Corporation, May 24, 2007: US20070116287-A1

One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file ...


8
Bahman Qawami
Oktay Rasizade, Bahman Qawami, Fabrice Jogand Coulomb, Robert C Chang, Farshid Sabet Sharghi: System for managing keys and/or rights objects. Parsons Hsue & de Runtz Sandisk Corporation, May 24, 2007: US20070116288-A1

One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file ...


9
Robert Deng
Feng Bao, Jianying Zhou, Huijie Deng: Method of generating an authentication. Agency For Science Technology and Research, Greenblum & Berstein, June 19, 2007: US07233782 (18 worldwide citation)

A method of generating an authentication for updating a mobile communications device's 40 location to a second communications device 60 is disclosed herein. The mobile communications device 40 is registered to a home network 30 comprising a proxy server but roams to a foreign network 40 with a diffe ...


10
Robert Deng
Feng Bao, Huijie Robert Deng: Method and apparatus for encrypting and decrypting data. Kent Ridge Digital Labs, Conley Rose P C, September 19, 2006: US07110539 (7 worldwide citation)

A method and apparatus for encrypting and decrypting data is disclosed which employs two or more cryptographic algorithms to achieve high throughput without compromizing security. The invention is especially useful for software implementation to protect large amounts of multimedia data over high-spe ...



Click the thumbnails below to visualize the patent trend.