会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明申请
    • Methods used in a nested memory system with near field communications capability
    • 在具有近场通信能力的嵌套存储系统中使用的方法
    • US20070145135A1
    • 2007-06-28
    • US11321833
    • 2005-12-28
    • Fabrice Jogand-CoulombYosi Pinto
    • Fabrice Jogand-CoulombYosi Pinto
    • G06K7/08G06K19/06
    • G06K19/0723G06K7/10237G06K19/07732G06K19/07741G06K19/07743G06K19/07749
    • A mass storage memory card adds functionality to host devices with which it is used. In addition to the ability to store large amounts of user files and protect them from unauthorized duplication, a mass storage device according to the present invention enables near field communications with a portable electronic device that otherwise does not have such functionality. In a preferred embodiment the mass storage device has a mother/daughter configuration wherein the daughter card is a fully functioning micro-SD card that can be used independently. The mother card can be accepted in an SD card slot and communicates via the SD protocol. Whether or not the daughter card is present in the mother card, a host with the mass storage device therein will be capable of near field communications. These communications can be peer to peer or can be used to purchase goods or services as a sort of electronic wallet. A controller of the device is also operable to coordinate, control, and safeguard the financial transactions made when using the device and host as an electronic wallet.
    • 大容量存储存储卡为其使用的主机设备添加功能。 除了存储大量用户文件并保护它们免于未经授权的复制的能力之外,根据本发明的大容量存储设备能够实现与便携式电子设备的近场通信,否则不具有这样的功能。 在优选实施例中,大容量存储设备具有母/子配置,其中子卡是可以独立使用的完全功能的微型SD卡。 母卡可以在SD卡插槽中接受,并通过SD协议进行通信。 子卡是否存在于母卡中,其中具有大容量存储设备的主机将能够进行近场通信。 这些通信可以是对等的,也可以用来作为一种电子钱包购买商品或服务。 该设备的控制器还可操作地协调,控制和保护在使用设备和主机时作为电子钱包进行的金融交易。
    • 82. 发明申请
    • Method for managing keys and/or rights objects
    • 管理密钥和/或权限对象的方法
    • US20070116287A1
    • 2007-05-24
    • US11283221
    • 2005-11-18
    • Oktay RasizadeBahman QawamiFabrice Jogand-CoulombRobert ChangFarshid Sabet-Sharghi
    • Oktay RasizadeBahman QawamiFabrice Jogand-CoulombRobert ChangFarshid Sabet-Sharghi
    • H04K1/00
    • G06F21/10
    • One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file contains a valid RO or not. Preferably, there is a one-to-one correspondence between the location for a RO in a RO file and a location in the RO navigation file for the status bit which identifies whether its corresponding location in the RO file contains a valid RO or not. Whether a particular location in a RO file contains a valid RO or not can be found by checking its corresponding status bit in the RO navigation file. By finding out whether a particular location in a RO file contains a valid RO or not in this manner, it is possible to delete ROs without having to go through an authentication process. The process of finding an empty slot in the RO file for storing a new RO is also simplified. This greatly increases the efficiency of RO management. A similar system may be used for management of content encryption/encryption keys for protecting content files.
    • 可以使用一个或多个权限对象(RO)文件来存储RO,优选地在仅对经认证的用户可用的保护区域中。 RO导航文件优选地存储在包含状态位的未受保护的公共区域中,其中每个状态位识别RO文件中的位置是否包含有效的RO。 优选地,在RO文件中的RO的位置与用于状态位的RO导航文件中的位置之间存在一一对应关系,其识别其在RO文件中的相应位置是否包含有效的RO。 通过检查RO导航文件中相应的状态位,可以找到RO文件中的特定位置是否包含有效的RO。 通过查找RO文件中的特定位置是否包含有效的RO,以这种方式,可以删除RO而无需经过身份验证过程。 在RO文件中找到用于存储新的RO的空槽的过程也被简化。 这大大提高了RO管理的效率。 类似的系统可以用于管理用于保护内容文件的内容加密/加密密钥。
    • 83. 发明申请
    • Control structure for versatile content control
    • 多功能内容控制的控制结构
    • US20060242151A1
    • 2006-10-26
    • US11313536
    • 2005-12-20
    • Fabrice Jogand-CoulombMichael HoltzmanBahman QawamiRon Barzilai
    • Fabrice Jogand-CoulombMichael HoltzmanBahman QawamiRon Barzilai
    • G06F17/30
    • G06F21/10G06F2221/2145
    • A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissions at a node of the tree has a predetermined relationship to permission or permissions at another node at a higher or lower or the same level in the same tree. By requiring entities to comply with the permissions so specified at each of the nodes, the tree feature of this application allows a content owner to control which entities can take action, and which actions each of the entities can take, irrespective of whether the tree has different levels. To enhance the commercial value that can be provided by the mobile storage medium, it is desirable for mobile storage devices to be capable of supporting more than one application simultaneously. When two or more applications are accessing the mobile storage device at the same time, it can be important to be able to separate the operations of the two or more applications so that they do not interfere with one another in a phenomena referred to herein as crosstalk. Two or more preferably hierarchical trees control access to the memory. Each tree comprises nodes at different levels for controlling access to data by a corresponding set of entities where a node of each tree specifies permission or permissions of the corresponding entity or entities for accessing memory data. The permission or permissions at a node of each of the trees has a predetermined relationship to permission or permissions at another node at a higher or lower level in the same tree. Preferably, there is no crosstalk between at least two of the trees.
    • 存储在存储介质中的树结构提供对实体甚至在获得访问之后可以执行什么的控制。 树中的每个节点都指定通过树的这种节点获取入口的实体的权限。 一些树具有不同的级别,其中树的节点上的许可或许可与在同一树中较高或较低或相同级别的另一节点处的权限或权限具有预定关系。 通过要求实体遵守在每个节点上如此指定的权限,该应用的树特征允许内容所有者控制哪些实体可以采取行动,以及每个实体可以采取哪些动作,而不管树是否具有 不同层次。 为了增强可由移动存储介质提供的商业价值,期望移动存储设备能够同时支持多个应用。 当两个或多个应用程序同时访问移动存储设备时,能够分离两个或更多应用程序的操作是非常重要的,使得它们在这里被称为串扰的现象中不会彼此干扰 。 两个或更多个优选的分级树控制对存储器的访问。 每个树包括不同级别的节点,用于控制对应的实体集合的访问,其中每个树的节点指定用于访问存储器数据的对应实体或实体的许可或许可。 每个树的节点上的权限或权限与同一棵树中较高或较低级别的另一个节点的权限或权限具有预定关系。 优选地,在至少两棵树之间不存在串扰。
    • 84. 发明申请
    • Method using control structure for versatile content control
    • 使用控制结构进行多功能内容控制的方法
    • US20060242150A1
    • 2006-10-26
    • US11313870
    • 2005-12-20
    • Fabrice Jogand-CoulombMichael HoltzmanBahman QawamiRon Barzilai
    • Fabrice Jogand-CoulombMichael HoltzmanBahman QawamiRon Barzilai
    • G06F17/30
    • G06F21/6218G06F21/10G06F21/78
    • A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissions at a node of the tree has a predetermined relationship to permission or permissions at another node at a higher or lower or the same level in the same tree. By requiring entities to comply with the permissions so specified at each of the nodes, the tree feature of this application allows a content owner to control which entities can take action, and which actions each of the entities can take, irrespective of whether the tree has different levels. To enhance the commercial value that can be provided by the mobile storage medium, it is desirable for mobile storage devices to be capable of supporting more than one application simultaneously. When two or more applications are accessing the mobile storage device at the same time, it can be important to be able to separate the operations of the two or more applications so that they do not interfere with one another in a phenomena referred to herein as crosstalk. Two or more preferably hierarchical trees control access to the memory. Each tree comprises nodes at different levels for controlling access to data by a corresponding set of entities where a node of each tree specifies permission or permissions of the corresponding entity or entities for accessing memory data. The permission or permissions at a node of each of the trees has a predetermined relationship to permission or permissions at another node at a higher or lower level in the same tree. Preferably, there is no crosstalk between at least two of the trees.
    • 存储在存储介质中的树结构提供对实体甚至在获得访问之后可以执行什么的控制。 树中的每个节点都指定通过树的这种节点获取入口的实体的权限。 一些树具有不同的级别,其中树的节点上的许可或许可与在同一树中较高或较低或相同级别的另一节点处的权限或权限具有预定关系。 通过要求实体遵守在每个节点上如此指定的权限,该应用的树特征允许内容所有者控制哪些实体可以采取行动,以及每个实体可以采取哪些动作,而不管树是否具有 不同层次。 为了增强可由移动存储介质提供的商业价值,期望移动存储设备能够同时支持多个应用。 当两个或多个应用程序同时访问移动存储设备时,能够分离两个或更多应用程序的操作是非常重要的,使得它们在这里被称为串扰的现象中不会彼此干扰 。 两个或更多个优选的分级树控制对存储器的访问。 每个树包括不同级别的节点,用于控制对应的实体集合的访问,其中每个树的节点指定用于访问存储器数据的相应实体或实体的许可或许可。 每个树的节点上的权限或权限与同一棵树中较高或较低级别的另一个节点的权限或权限具有预定关系。 优选地,在至少两棵树之间不存在串扰。
    • 85. 发明申请
    • Method forversatile content control
    • 方法无效内容控制
    • US20060242068A1
    • 2006-10-26
    • US11314411
    • 2005-12-20
    • Fabrice Jogand-CoulombMichael HoltzmanBahman QawamiRon BarzilaiHagai Bar-El
    • Fabrice Jogand-CoulombMichael HoltzmanBahman QawamiRon BarzilaiHagai Bar-El
    • G06Q99/00
    • G06F21/6218G06F21/78
    • The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium. When implemented in a flash memory, the above features result in a particularly useful medium for content protection. Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle through which the memory retains complete and exclusive control over the generation and use of the key value for cryptographic processes, while the host retains control of files.
    • 如果加密解密密钥存储在介质本身并且对外部设备基本不可访问,则所有者利益的所有者处于更好的位置以控制对介质中的加密内容的访问。 只有那些具有正确凭据的主机才能访问密钥。 可以存储访问策略,其授予不同的权限(例如,到不同的授权实体)以访问存储在介质中的数据。 结合上述两个特征的组合的系统是特别有利的。 一方面,内容所有者或所有者具有通过使用外部设备基本上不可访问的密钥来控制对内容的访问的能力,并且同时具有授予访问媒体中的内容的不同权限的能力。 因此,即使在外部设备获得访问的情况下,他们的访问仍然可能受到记录在存储介质中的内容所有者或所有者设置的不同权限。 当在闪存中实现时,上述特征导致用于内容保护的特别有用的介质。 许多存储设备不知道文件系统,而许多计算机主机设备以文件的形式读取和写入数据。 主机设备提供密钥引用或ID,而存储器系统生成响应中的密钥值,该密钥值与密钥ID相关联,该密钥ID用作存储器保持完整的句柄,并且专用于控制生成和使用 密码过程的关键值,而主机保留对文件的控制。
    • 90. 发明授权
    • Method for controlling information supplied from memory device
    • 用于控制从存储器件提供的信息的方法
    • US08266711B2
    • 2012-09-11
    • US11557052
    • 2006-11-06
    • Michael HoltzmanRon BarzilaiFabrice Jogand-Coulomb
    • Michael HoltzmanRon BarzilaiFabrice Jogand-Coulomb
    • G06F21/00
    • G06F21/6218G06F21/78
    • A memory storing public and confidential information is removably connected to a host device. General information on data stored in memory devices is accessible to the host device without authentication. Only a portion of confidential information stored in the memory device is accessible through the host device to an authenticated entity, where the entity has access rights to such portion. The entity is not able to access other portions of confidential information to which it has no rights. The public and confidential information is stored in a non-volatile storage medium, and a controller controls the supply of information. Preferably, the non-volatile storage medium and the controller are enclosed in a housing.
    • 存储公共和机密信息的存储器可拆卸地连接到主机设备。 存储在存储设备中的数据的一般信息可以被主机设备访问,而不进行认证。 存储在存储设备中的机密信息的一部分只能通过主机设备访问认证实体,其中该实体对该部分具有访问权限。 该实体无法访问其无权的其他机密信息部分。 公共和机密信息存储在非易失性存储介质中,并且控制器控制信息的提供。 优选地,非易失性存储介质和控制器被封装在壳体中。