Patents by Inventor Ron Barzilai

Ron Barzilai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8255655
    Abstract: These embodiments relate to authentication and securing of write-once, read-many (WORM) memory devices. In one embodiment, a memory device comprises a controller operable in first and second modes of operation after stored security information is validated, wherein in the first mode of operation, the memory device operates in a read-only mode, and wherein in the second mode of operation, the memory device operates in a write-once, read-many (WORM) mode. In another embodiment, the controller is operative to perform security methods.
    Type: Grant
    Filed: October 2, 2009
    Date of Patent: August 28, 2012
    Assignee: SanDisk Technologies Inc.
    Inventors: Samuel Y. Yu, Christopher S. Moore, Jason S. Whetstone, Ron Barzilai, Hironaga Ino
  • Patent number: 8245031
    Abstract: Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the memory device. The certificate revocation lists for authenticating host devices to memory devices may be stored in an unsecured area of the memory device for convenience of users.
    Type: Grant
    Filed: November 6, 2006
    Date of Patent: August 14, 2012
    Assignee: SanDisk Technologies Inc.
    Inventors: Michael Holtzman, Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb
  • Patent number: 8140843
    Abstract: Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.
    Type: Grant
    Filed: November 6, 2006
    Date of Patent: March 20, 2012
    Assignee: SanDisk Technologies Inc.
    Inventors: Michael Holtzman, Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb
  • Publication number: 20120066412
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Application
    Filed: November 22, 2011
    Publication date: March 15, 2012
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Patent number: 8108691
    Abstract: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: January 31, 2012
    Assignees: SanDisk Technologies Inc., Discretix Technologies Ltd.
    Inventors: Micky Holtzman, Baruch Boris Cohen, Ron Barzilai, Hagai Bar-El, David Deitcher
  • Patent number: 8078788
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: December 13, 2011
    Assignee: SanDisk Technologies Inc.
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Patent number: 8051052
    Abstract: The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corresponding entity or entities for accessing memory data. The permission or permissions at the node of each of the trees has a predetermined relationship to permission or permissions at nodes at a higher or lower or the same level in the same tree. Thus, the mobile storage devices may be issued without any trees already created so that the purchaser of the devices has a free hand in creating hierarchical trees adapted to the applications the purchaser has in mind. Alternatively, the mobile storage devices may also be issued with the trees already created so that a purchaser does not have to go through the trouble of creating the trees.
    Type: Grant
    Filed: December 20, 2005
    Date of Patent: November 1, 2011
    Assignee: SanDisk Technologies Inc.
    Inventors: Fabrice Jogand-Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai
  • Publication number: 20110162075
    Abstract: A storage device and method for providing a scalable content protection system are disclosed. In one embodiment, a storage device is provided comprising a memory operative to store a plurality of versions of content, wherein each version of the content is of a different quality and is associated with a different level of content protection. The storage device receives information from the host identifying a level of content protection supported by the host. The storage device sends, to the host, a version of the content that is associated with the level of content protection supported by the host, wherein the version of the content is sent to the host using the level of content protection that is supported by the host. In another embodiment, different levels of content protection are applied to different types of content.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Inventors: Jason T. Lin, Ron Barzilai
  • Publication number: 20110082966
    Abstract: These embodiments relate to authentication and securing of write-once, read-many (WORM) memory devices. In one embodiment, a memory device comprises a controller operable in first and second modes of operation after stored security information is validated, wherein in the first mode of operation, the memory device operates in a read-only mode, and wherein in the second mode of operation, the memory device operates in a write-once, read-many (WORM) mode. In another embodiment, the controller is operative to perform security methods.
    Type: Application
    Filed: October 2, 2009
    Publication date: April 7, 2011
    Inventors: Samuel Y. Yu, Christopher S. Moore, Jason S. Whetstone, Ron Barzilai, Hironaga Ino
  • Publication number: 20100332855
    Abstract: A method and memory device for implementing long operations and supporting multiple streams are provided. In one embodiment, a memory device receives data and a command from a host to perform an operation on the data, wherein a time required for the memory device to complete the operation exceeds a maximum response time for the memory device to respond to the command. The memory device begins performing the operation on the data and, before exceeding the maximum response time and before completing the operation, sends the context of the operation to the host. At a later time, the memory device receives from the host: (i) a command to resume performing the operation and (ii) the context. The memory device then resumes performing the operation on the data based on the context received from the host.
    Type: Application
    Filed: June 30, 2009
    Publication date: December 30, 2010
    Inventors: Boris Dolgunov, Michael Holtzman, Ron Barzilai, Eran Shen
  • Publication number: 20100310076
    Abstract: A method for performing double domain encryption is provided. In one embodiment a memory device receives content encrypted with a transport encryption key. The memory device decrypts the content with the transport encryption key and then re-encrypts the content with a key unique to the memory device. The memory device then stores the re-encrypted content in the memory device.
    Type: Application
    Filed: June 4, 2009
    Publication date: December 9, 2010
    Inventors: Ron Barzilai, Michael Holtzman
  • Publication number: 20100161928
    Abstract: Enhanced configuration of security and access control for data in a storage device is disclosed. A request is received to access an addressable memory location in a storage media within the storage device. A set of addressable memory locations with contiguous addresses identified by an address range is associated with first and second characteristics. The first characteristic is applied if the addressable memory location is within the set of addressable memory locations, and an entity is currently authenticated to and authorized to access the set of addressable memory locations. The second characteristic is applied if the addressable memory location is within the set of addressable memory locations, and no entity is currently authenticated to and authorized to access the set of addressable memory locations. The set of addressable memory locations can also be a logical partition, where the first and second characteristics are stored in a logical partition table.
    Type: Application
    Filed: December 18, 2008
    Publication date: June 24, 2010
    Inventors: Rotem Sela, Michael Holtzman, Ron Barzilai, Donald Ray Bryant-Rich
  • Publication number: 20100161927
    Abstract: The embodiments described herein generally use a challenge to protect a removable mobile flash memory storage device, where the challenge may be in the form of a “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (“CAPTCHA”). In one embodiment, a method is provided in which a removable mobile flash memory storage device receives a command from a host device, generates a CAPTCHA challenge, provides the CAPTCHA challenge to the host device, receives a response to the CAPTCHA challenge from the host device, determines if the response satisfies the CAPTCHA challenge, and performs the command only if the response satisfies the CAPTCHA challenge. In another embodiment, a removable mobile flash memory storage device is provided for performing these acts.
    Type: Application
    Filed: December 18, 2008
    Publication date: June 24, 2010
    Inventors: Steven T. Sprouse, Carlos J. Gonzalez, Ron Barzilai, Dhaval Parikh
  • Publication number: 20100138652
    Abstract: Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the memory device. The certificate revocation lists for authenticating host devices to memory devices may be stored in an unsecured area of the memory device for convenience of users.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 3, 2010
    Inventors: Rotem Sela, Ron Barzilai, Michael Holtzman, Avraham Shmuel, Jason T. Lin
  • Publication number: 20100077214
    Abstract: The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium.
    Type: Application
    Filed: November 23, 2009
    Publication date: March 25, 2010
    Inventors: Fabrice Jogand-Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar-El
  • Publication number: 20100024000
    Abstract: A method for improving accuracy of a time estimate used in digital rights management (DRM) license validation is disclosed. In one embodiment, a memory device receives a request to validate a DRM license stored on the memory device, wherein the DRM license is associated with a time stamp update policy (TUP) that specifies when a new time stamp is needed. Before attempting to validate the DRM license, the memory device determines if a new time stamp is needed based on the TUP associated with the DRM license. If a new time stamp is needed, the memory device receives the new time stamp and then attempts to validate the DRM license using a time estimate based on the new time stamp. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination.
    Type: Application
    Filed: June 8, 2007
    Publication date: January 28, 2010
    Inventors: Michael Holtzman, Rotem Sela, Ron Barzilai, Fabrice E. Jogand-Coulomb
  • Publication number: 20090182919
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Application
    Filed: November 7, 2008
    Publication date: July 16, 2009
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Patent number: 7554842
    Abstract: A flash non-volatile memory system that normally operates its memory cells in multiple storage states is provided with the ability to operate some selected or all of its memory cell blocks in two states instead. The two states are selected to be the furthest separated of the multiple states, thereby providing an increased margin during two state operation. This allows faster programming and a longer operational life of the memory cells being operated in two states when it is more desirable to have these advantages than the increased density of data storage that multi-state operation provides. An exemplary embodiment is as a memory card where the user can choice between two state and multi-state operation.
    Type: Grant
    Filed: July 6, 2004
    Date of Patent: June 30, 2009
    Assignee: SanDisk Corporation
    Inventors: Ron Barzilai, Reuven Elhamias
  • Publication number: 20090157971
    Abstract: Techniques are presented for sending an application instruction from a hosting digital appliance to a portable medium, where the instruction is structured as one or more units whose size is a first size, or number of bytes. After flushing the contents of a cache, the instruction is written to the cache, where the cache is structured as logical blocks having a size that is a second size that is larger (in terms of number of bytes) than the first size. In writing the instruction (having a command part and, possibly, a data part), the start of the instruction is aligned with one of the logical block boundaries in the cache and the instruction is padded out with dummy data so that it fills an integral number of the cache blocks. When a response from a portable device to an instruction is received at a hosting digital appliance, the cache is similarly flushed prior to receiving the response. The response is then stored to align with a logical block boundary of the cache.
    Type: Application
    Filed: December 13, 2007
    Publication date: June 18, 2009
    Inventors: Xian Jun Liu, Robert C. Chang, Po Yuan, Junzhi Wang, Ron Barzilai, Bahman Qawami, Farshid Sabet-Sharghi
  • Patent number: 7536540
    Abstract: A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of firmware when executed pulls in another portion of firmware to be executed. The hardware of the encryption engine is used to verify the integrity of at least the first portion of the firmware. Therefore, only the firmware that is intended to run the system will be executed.
    Type: Grant
    Filed: November 21, 2005
    Date of Patent: May 19, 2009
    Assignee: SanDisk Corporation
    Inventors: Michael Holtzman, Ron Barzilai, Reuven Elhamias, Niv Cohen