Patents by Inventor Joe Yuen Tom
Joe Yuen Tom has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8356361Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.Type: GrantFiled: December 21, 2006Date of Patent: January 15, 2013Assignee: Spansion LLCInventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
-
Patent number: 8190919Abstract: A machine implemented system and method that effectuates secure access to a flash memory associated with a mobile device. The system includes a security component that intercepts transactions between an external processor and the flash memory and implements authentication and access control to the flash memory. The system further includes components that can partition the flash memory and can associate authentication and access control information with the partitioned flash memory.Type: GrantFiled: December 20, 2006Date of Patent: May 29, 2012Assignee: Spansion LLCInventors: Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Willy Obereiner, Joe Yuen Tom, Russell Barck
-
Patent number: 7836269Abstract: Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.Type: GrantFiled: December 29, 2006Date of Patent: November 16, 2010Assignee: Spansion LLCInventors: Willy Obereiner, Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Joe Yuen Tom, Hyun Soo Lee
-
Publication number: 20080162353Abstract: Systems and methods that facilitate the management of digital content in a local environment between a limited number of parties. A digital rights management (DRM) agent-server can be created in hardware in which both the agent-server and agent are trusted. A content owner can send digital content along with a rights attachment indicating a scope of the use rights associated with the content. The content can be accessed by the agent and perceived in a presentation component that will only permit the agent to use the content in accordance with the rights granted as to the content. The DRM agent-server can be implemented by an application-specific integrated circuit (ASIC). Further, the DRM agent-server can be implemented on a portable electronic device such as a cellular phone, a personal digital assistant (PDA), or a laptop computer, for example.Type: ApplicationFiled: December 27, 2006Publication date: July 3, 2008Applicant: SPANSION LLCInventors: Joe Yuen Tom, Jeremy Isaac Nathaniel Werner, Russell Barck
-
Publication number: 20080162784Abstract: Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.Type: ApplicationFiled: December 29, 2006Publication date: July 3, 2008Applicant: SPANSION LLCInventors: Willy Obereiner, Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Joe Yuen Tom, Hyun Soo Lee
-
Publication number: 20080148414Abstract: An architecture is presented that facilitates the transfer of content and rights from a network device to a non-network device. The system comprises a trusted digital rights management (DRM) agent/server that is associated with a network device. The trusted DRM agent/server communicates with a non-network device to transfer content and rights. Specifically, the trusted DRM agent/server of the network device communicates with a second trusted DRM agent/server associated with the non-network device. The trusted DRM agent/server mutually authenticates the second trusted DRM agent/server in order to extend the DRM content and rights provided by the content providers. After mutual authentication, the trusted DRM agent/server transfers rights and contents to the second trusted DRM agent/server. Once the rights and content are transferred, the original copy of the content is guaranteed to be deleted from the trusted DRAM agent/server to preserve the current license rights of the content.Type: ApplicationFiled: December 19, 2006Publication date: June 19, 2008Applicant: SPANSION LLCInventor: Joe Yuen Tom
-
Publication number: 20080109903Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.Type: ApplicationFiled: December 21, 2006Publication date: May 8, 2008Applicant: SPANSION LLCInventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
-
Publication number: 20080109662Abstract: A machine implemented system and method that effectuates secure access to a flash memory associated with a mobile device. The system includes a security component that intercepts transactions between an external processor and the flash memory and implements authentication and access control to the flash memory. The system further includes components that can partition the flash memory and can associate authentication and access control information with the partitioned flash memory.Type: ApplicationFiled: December 20, 2006Publication date: May 8, 2008Applicant: SPANSION LLCInventors: Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Willy Obereiner, Joe Yuen Tom, Russell Barck