会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • MEMORY SYSTEM WITH IN-STREAM DATA ENCRYPTION/DECRYPTION
    • 具有流内数据加密/解码的存储器系统
    • WO2006071725A2
    • 2006-07-06
    • PCT/US2005/046586
    • 2005-12-21
    • SANDISK CORPORATIONDISCRETIX TECHNOLOGIES LTD.HOLTZMAN, MichaelCOHEN, Baruch BorisDEITCHER, DavidBAR-EL, HagaiYERUCHAMI, Aviram
    • HOLTZMAN, MichaelCOHEN, Baruch BorisDEITCHER, DavidBAR-EL, HagaiYERUCHAMI, Aviram
    • G06F21/78
    • G06F21/78
    • The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably controlled so that it has a selected data source among a plurality of sources and a selected destination among a plurality of destinations, all without involving the controller. The cryptographic circuit may preferably be configured to enable the processing of multiple pages, selection of one or more cryptographic algorithms among a plurality of algorithms to encryption and/or decryption without involving a controller, and to process data cryptographically in multiple successive stages without involvement of the controller. For a memory system cryptographically processing data from multiple data streams in an interleaved manner, when a session is interrupted, security configuration information may be lost so that it may become impossible to continue the process when the session is resumed. To retain the security configuration information, the controller preferably causes the security configuration information for the session to be stored before the interruption so that it is retrievable after the interruption.
    • 在数据流中的数据由电路加密处理而不涉及任何控制器的情况下,存储器系统的吞吐量得到改善。 优选地控制数据流,使得其具有多个源中的选择的数据源和多个目的地中的所选择的目的地,全部不涉及控制器。 优选地,加密电路可被配置为能够处理多个页面,在多个算法之间选择一个或多个加密算法以加密和/或解密而不涉及控制器,并且在多个连续阶段以密码方式处理数据,而不涉及 控制器。 对于以交织方式从多个数据流加密处理数据的存储器系统,当会话被中断时,可能丢失安全配置信息,从而当会话被恢复时可能变得不可能继续该过程。 为了保持安全配置信息,控制器优选地在中断之前存储会话的安全配置信息,以便在中断之后可以检索会话的安全配置信息。
    • 4. 发明申请
    • MEMORY SYSTEM WITH VERSATILE CONTENT CONTROL
    • 带有多种内容控制的内存系统
    • WO2006069194A2
    • 2006-06-29
    • PCT/US2005/046478
    • 2005-12-21
    • SANDISK CORPORATIONDISCRETIX TECHNOLOGIES LTD.JOGAND-COULUMB, FabriceHOLTZMAN, MichaelQAWANI, BahmanBARZILAI, RonHAGAI, Bar-el
    • JOGAND-COULUMB, FabriceHOLTZMAN, MichaelQAWANI, BahmanBARZILAI, RonHAGAI, Bar-el
    • G06F21/31G06F21/62G06F21/79
    • G06F21/79G06F21/31G06F21/6218G06F2221/2103
    • The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium. When implemented in a flash memory, the above features result in a particularly useful medium for content protection. Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the memory system generates a key value in response which is associated with the key ID, which is used as the handle through which the memory retains complete and exclusive control over the generation and use of the key value for cryptographic processes, while the host retains control of files.
    • 如果加密 - 解密密钥存储在介质本身中并且基本上不能被外部设备访问,则所有者感兴趣的所有者能够更好地控制对介质中加密内容的访问。 只有具有正确凭据的主机设备才能访问密钥。 访问策略可以被存储,其授予不同的许可(例如,针对不同的授权实体)以访问存储在介质中的数据。 包含上述两个特征的组合的系统是特别有利的。 一方面,内容拥有者或所有者能够通过使用外部设备基本上不可访问的密钥来控制对内容的访问,并且同时能够授予访问介质中内容的不同权限。 因此,即使外部设备获得访问权限,他们的访问仍可能受到记录在存储介质中的内容所有者或所有者设置的不同权限的限制。 当在闪存中实施时,上述特征导致用于内容保护的特别有用的介质。 许多存储设备不知道文件系统,而许多计算机主机设备以文件形式读取和写入数据。 主机设备提供密钥引用或ID,而存储器系统产生与密钥ID相关联的响应中的密钥值,该密钥值用作通过其存储器保持完整和排他地控制生成和使用 密钥处理的关键价值,而主机保留对文件的控制。
    • 5. 发明申请
    • METHOD AND MEMORY DEVICE FOR PERFORMING AN OPERATION ON DATA
    • 用于执行数据操作的方法和存储器件
    • WO2011002435A1
    • 2011-01-06
    • PCT/US2009/006395
    • 2009-12-04
    • SANDISK CORPORATIONDOLGUNOV, BorisHOLTZMAN, MichaelBARZILAI, RonSHEN, Eran
    • DOLGUNOV, BorisHOLTZMAN, MichaelBARZILAI, RonSHEN, Eran
    • G06F13/38
    • G06F13/385
    • A method and memory device for implementing long operations and supporting multiple streams are provided. In one embodiment, a memory device receives data and a command from a host to perform an operation on the data, wherein a time required for the memory device to complete the operation exceeds a maximum response time for the memory device to respond to the command. The memory device begins performing the operation on the data and, before exceeding the maximum response time and before completing the operation, sends the context of the operation to the host. At a later time, the memory device receives from the host: (i) a command to resume performing the operation and (ii) the context. The memory device then resumes performing the operation on the data based on the context received from the host.
    • 提供了一种用于实现长操作并支持多个流的方法和存储器件。 在一个实施例中,存储器设备从主机接收数据和命令以执行对数据的操作,其中存储器设备完成操作所需的时间超过存储器设备响应命令的最大响应时间。 存储设备开始对数据执行操作,并且在超过最大响应时间之前并且在完成操作之前,将操作的上下文发送到主机。 在稍后的时间,存储器装置从主机接收:(i)恢复执行操作的命令和(ii)上下文。 然后,存储器设备基于从主机接收的上下文恢复对数据的操作。