会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • File system and method of file access
    • 文件系统和文件访问方法
    • US08645438B2
    • 2014-02-04
    • US12495450
    • 2009-06-30
    • Robert ChangPo YuanXian Jun LiuBahman QawamiHaluk Tanik
    • Robert ChangPo YuanXian Jun LiuBahman QawamiHaluk Tanik
    • G06F12/00
    • G06F17/30091G06F17/30218
    • A file system and method of file access are disclosed. In a particular embodiment, a method is performed at a host device coupled to a non-volatile memory, where the host device includes a memory having a first file data structure. A first directory entry in a file directory of a file system is located where the first directory entry corresponds to a first file stored in the non-volatile memory. First data associated with the first directory entry, including first location data indicating a location of the first file in the non-volatile memory, is retrieved and stored in the first file data structure. A request to open the first file is received. In response, the first location data of the first file is retrieved from the first file data structure and data of the first file from the non-volatile memory is read. First metadata associated with the first file is extracted from the data read from the non-volatile memory.
    • 公开了文件系统和文件访问方法。 在特定实施例中,在耦合到非易失性存储器的主机设备处执行一种方法,其中所述主机设备包括具有第一文件数据结构的存储器。 位于文件系统的文件目录中的第一目录条目位于第一目录条目对应于存储在非易失性存储器中的第一文件的位置。 与第一目录条目相关联的第一数据,包括指示非易失性存储器中的第一文件的位置的第一位置数据被检索并存储在第一文件数据结构中。 接收到打开第一个文件的请求。 作为响应,从第一文件数据结构检索第一文件的第一位置数据,并读取来自非易失性存储器的第一文件的数据。 从与非易失性存储器读取的数据中提取与第一文件相关联的第一元数据。
    • 5. 发明申请
    • Media card command pass through methods
    • 媒体卡命令通过方法
    • US20070136501A1
    • 2007-06-14
    • US11298349
    • 2005-12-08
    • Robert ChangHenry HuttonFarshid SharghiHaluk TanikRon BarzilaiMeytal Ari
    • Robert ChangHenry HuttonFarshid SharghiHaluk TanikRon BarzilaiMeytal Ari
    • G06F13/42G06F12/00
    • G06F13/4291
    • The present invention presents techniques for transmitting application specific instruction between a host and a memory card. The commands for the application specific protocol are embedded along with a signature in the data portion of a transmission protocol that is used to communicate between the host the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the transmission protocol to still be transmitted in that protocol. The method can be implemented on the host side either at the device driver level or the file level. In order to implement a read command in the application specific protocol, a write command in the first protocol with an embedded read command is first sent to a logical address, followed by a second read command to the same logical address.
    • 本发明提供了用于在主机和存储卡之间传送应用特定指令的技术。 应用专用协议的命令与用于在主机之间进行通信的传输协议的数据部分中的签名一起被嵌入。 这允许在传输协议中缺少相应命令的应用专用命令的传输仍然以该协议传输。 该方法可以在主机端在设备驱动程序级别或文件级别上实现。 为了在应用专用协议中实现读取命令,首先将具有嵌入式读取命令的第一协议中的写入命令发送到逻辑地址,然后发送到相同逻辑地址的第二读取命令。
    • 8. 发明申请
    • Method for managing keys and/or rights objects
    • 管理密钥和/或权限对象的方法
    • US20070116287A1
    • 2007-05-24
    • US11283221
    • 2005-11-18
    • Oktay RasizadeBahman QawamiFabrice Jogand-CoulombRobert ChangFarshid Sabet-Sharghi
    • Oktay RasizadeBahman QawamiFabrice Jogand-CoulombRobert ChangFarshid Sabet-Sharghi
    • H04K1/00
    • G06F21/10
    • One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file contains a valid RO or not. Preferably, there is a one-to-one correspondence between the location for a RO in a RO file and a location in the RO navigation file for the status bit which identifies whether its corresponding location in the RO file contains a valid RO or not. Whether a particular location in a RO file contains a valid RO or not can be found by checking its corresponding status bit in the RO navigation file. By finding out whether a particular location in a RO file contains a valid RO or not in this manner, it is possible to delete ROs without having to go through an authentication process. The process of finding an empty slot in the RO file for storing a new RO is also simplified. This greatly increases the efficiency of RO management. A similar system may be used for management of content encryption/encryption keys for protecting content files.
    • 可以使用一个或多个权限对象(RO)文件来存储RO,优选地在仅对经认证的用户可用的保护区域中。 RO导航文件优选地存储在包含状态位的未受保护的公共区域中,其中每个状态位识别RO文件中的位置是否包含有效的RO。 优选地,在RO文件中的RO的位置与用于状态位的RO导航文件中的位置之间存在一一对应关系,其识别其在RO文件中的相应位置是否包含有效的RO。 通过检查RO导航文件中相应的状态位,可以找到RO文件中的特定位置是否包含有效的RO。 通过查找RO文件中的特定位置是否包含有效的RO,以这种方式,可以删除RO而无需经过身份验证过程。 在RO文件中找到用于存储新的RO的空槽的过程也被简化。 这大大提高了RO管理的效率。 类似的系统可以用于管理用于保护内容文件的内容加密/加密密钥。