1
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: Control structure for versatile content control and method using structure. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HSUE James S, June 29, 2006: WO/2006/069311 (16 worldwide citation)

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissi ...


2
Bahman Qawami
Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron: System for creating control structure for versatile content control. Sandisk Corporation, Jogand Coulomb Fabrice, Holtzman Michael, Qawami Bahman, Barzilai Ron, HETZ Joseph F, June 29, 2006: WO/2006/069312 (12 worldwide citation)

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


3
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Method for creating control structure for versatile content control. SanDisk Technologies, Brinks Hofer Gilson & Lione, November 1, 2011: US08051052 (4 worldwide citation)

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


4
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Method for creating control structure for versatile content control. Parsons Hsue & de Runtz, October 26, 2006: US20060242064-A1

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


5
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: System for creating control structure for versatile content control. Parsons Hsue & de Runtz, October 26, 2006: US20060242067-A1

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corre ...


6
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Method using control structure for versatile content control. Parsons Hsue & de Runtz, October 26, 2006: US20060242150-A1

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissi ...


7
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Control structure for versatile content control. Parsons Hsue & de Runtz, October 26, 2006: US20060242151-A1

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissi ...


8
Scott L Wiegel: Graphical network security policy management. Cisco Technology, Hickman Palermo Truong & Becker, November 19, 2002: US06484261 (396 worldwide citation)

A method of establishing a representation of an abstract network security policy is disclosed. The representation is established in the form of a decision tree that is constructed by assembling graphical symbols representing policy actions and policy conditions. A user modifies properties of the gra ...


9
Michael E Lipman, Russell L Heyda: Network router search engine using compressed tree forwarding table. Redstone Communications, Weingarten Schurgin Gagnebin & Hayes, February 20, 2001: US06192051 (350 worldwide citation)

Network routing apparatus employs multi-level tree data structures in a centralized routing table and in distributed forwarding tables. Each level of each structure is associated with a different field of a network address appearing in received packets. Pointers in each structure are used to identif ...


10
Eric Mohr, Paul B Trevithick, Costas Kitsos, David E Hollingsworth, Stephanie L Houde, Jeffrey L Caruso: Apparatus, methods, programming for automatically laying out documents. Bitstream, Edward W Porter, November 30, 2004: US06826727 (326 worldwide citation)

A computerized system lays out document templates represented as a tree of text and shape elements, including variable elements. The user can define a shape element to have a maximize or minimize property in one or more dimensions. The layout makes the minimized dimensions of a shape as small as its ...



Click the thumbnails below to visualize the patent trend.