会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SECURE STORAGE DIGITAL KIOSK DISTRIBUTION
    • 安全存储数字KIOSK分配
    • WO2008021594A2
    • 2008-02-21
    • PCT/US2007/067910
    • 2007-05-01
    • SANDISK CORPORATIONSHEN, EranELHAMIAS, Reuven
    • SHEN, EranELHAMIAS, Reuven
    • G06F21/00
    • G06F21/10
    • A method and system of providing movies or other content is provided where a flash drive or flash memory card is used in place of DVD's or other formats. A user receives the content on the flash drive from a kiosk. The system ensures that a codec supported by the player of the user will be utilized to encode the content, or in certain embodiments a corresponding codec is provided along with the movie. Authentication and encryption mechanisms ensure that the movie is only provided to an authentic card and/or player from a kiosk, so that the movies cannot be provided to flash devices that do not have proper security mechanisms to safeguard the content or to those not authorized to otherwise receive the movie.
    • 提供提供电影或其他内容的方法和系统,其中使用闪存驱动器或闪存卡代替DVD或其他格式。 用户从信息亭接收闪存驱动器上的内容。 系统确保用户播放器支持的编解码器将被用于对内容进行编码,或者在某些实施例中,与电影一起提供相应的编解码器。 身份验证和加密机制确保电影只能从信息亭提供给真实的卡和/或播放器,以便电影不能提供给没有适当安全机制的闪存设备来保护内容或未授权的用户 否则接收电影。
    • 2. 发明申请
    • METHOD AND MEMORY DEVICE FOR PERFORMING AN OPERATION ON DATA
    • 用于执行数据操作的方法和存储器件
    • WO2011002435A1
    • 2011-01-06
    • PCT/US2009/006395
    • 2009-12-04
    • SANDISK CORPORATIONDOLGUNOV, BorisHOLTZMAN, MichaelBARZILAI, RonSHEN, Eran
    • DOLGUNOV, BorisHOLTZMAN, MichaelBARZILAI, RonSHEN, Eran
    • G06F13/38
    • G06F13/385
    • A method and memory device for implementing long operations and supporting multiple streams are provided. In one embodiment, a memory device receives data and a command from a host to perform an operation on the data, wherein a time required for the memory device to complete the operation exceeds a maximum response time for the memory device to respond to the command. The memory device begins performing the operation on the data and, before exceeding the maximum response time and before completing the operation, sends the context of the operation to the host. At a later time, the memory device receives from the host: (i) a command to resume performing the operation and (ii) the context. The memory device then resumes performing the operation on the data based on the context received from the host.
    • 提供了一种用于实现长操作并支持多个流的方法和存储器件。 在一个实施例中,存储器设备从主机接收数据和命令以执行对数据的操作,其中存储器设备完成操作所需的时间超过存储器设备响应命令的最大响应时间。 存储设备开始对数据执行操作,并且在超过最大响应时间之前并且在完成操作之前,将操作的上下文发送到主机。 在稍后的时间,存储器装置从主机接收:(i)恢复执行操作的命令和(ii)上下文。 然后,存储器设备基于从主机接收的上下文恢复对数据的操作。
    • 5. 发明申请
    • METHOD AND APPARATUS FOR PROTECTING CONTENT IN A STORAGE DEVICE
    • 用于保护存储设备中的内容的方法和装置
    • WO2010067346A1
    • 2010-06-17
    • PCT/IL2008/001613
    • 2008-12-14
    • SANDISK IL LTD.SHEN, Eran
    • SHEN, Eran
    • G11B20/00
    • G11B20/00086G06F15/167G06F21/62G06F21/79H04L12/40104
    • A method for protecting content in a non-volatile storage device operatively coupled to a host device is disclosed herein. In some embodiments, a request is received in the non-volatile storage device to access a protectable data object residing in a 'host-hidden' data region of the non-volatile storage device that is hidden from the host. In response to this request, the following steps may be carried out by the non-volatile storage device: (i) ascertaining, in accordance with an identifier of the requested data object, an active security policy; and (ii) subject to ascertaining an active security-policy, enforcing such active security policy for the requested data object. In some embodiments, a different active security policy is respectively applied to each one or more data objects. Storage devices configured to effect one or more methods disclosed herein and computer program products are also disclosed herein.
    • 本文公开了一种用于保护可操作地耦合到主机设备的非易失性存储设备中的内容的方法。 在一些实施例中,在非易失性存储设备中接收到一个请求,以访问驻留在非易失性存储设备的“主机隐藏”数据区域中的可保护数据对象,该主机隐藏的数据区域是从主机隐藏的。 响应于该请求,可以由非易失性存储设备执行以下步骤:(i)根据所请求的数据对象的标识符确定主动安全策略; 和(ii)在确定主动安全策略的情况下,对所请求的数据对象执行此类主动安全策略。 在一些实施例中,不同的活动安全策略分别应用于每个一个或多个数据对象。 配置为实现本文公开的一种或多种方法的存储设备和计算机程序产品也在本文中公开。