Patents by Inventor Joe Yuen Tom

Joe Yuen Tom has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8356361
    Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: January 15, 2013
    Assignee: Spansion LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
  • Patent number: 8190919
    Abstract: A machine implemented system and method that effectuates secure access to a flash memory associated with a mobile device. The system includes a security component that intercepts transactions between an external processor and the flash memory and implements authentication and access control to the flash memory. The system further includes components that can partition the flash memory and can associate authentication and access control information with the partitioned flash memory.
    Type: Grant
    Filed: December 20, 2006
    Date of Patent: May 29, 2012
    Assignee: Spansion LLC
    Inventors: Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Willy Obereiner, Joe Yuen Tom, Russell Barck
  • Patent number: 7836269
    Abstract: Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: November 16, 2010
    Assignee: Spansion LLC
    Inventors: Willy Obereiner, Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Joe Yuen Tom, Hyun Soo Lee
  • Publication number: 20080162353
    Abstract: Systems and methods that facilitate the management of digital content in a local environment between a limited number of parties. A digital rights management (DRM) agent-server can be created in hardware in which both the agent-server and agent are trusted. A content owner can send digital content along with a rights attachment indicating a scope of the use rights associated with the content. The content can be accessed by the agent and perceived in a presentation component that will only permit the agent to use the content in accordance with the rights granted as to the content. The DRM agent-server can be implemented by an application-specific integrated circuit (ASIC). Further, the DRM agent-server can be implemented on a portable electronic device such as a cellular phone, a personal digital assistant (PDA), or a laptop computer, for example.
    Type: Application
    Filed: December 27, 2006
    Publication date: July 3, 2008
    Applicant: SPANSION LLC
    Inventors: Joe Yuen Tom, Jeremy Isaac Nathaniel Werner, Russell Barck
  • Publication number: 20080162784
    Abstract: Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Applicant: SPANSION LLC
    Inventors: Willy Obereiner, Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Joe Yuen Tom, Hyun Soo Lee
  • Publication number: 20080148414
    Abstract: An architecture is presented that facilitates the transfer of content and rights from a network device to a non-network device. The system comprises a trusted digital rights management (DRM) agent/server that is associated with a network device. The trusted DRM agent/server communicates with a non-network device to transfer content and rights. Specifically, the trusted DRM agent/server of the network device communicates with a second trusted DRM agent/server associated with the non-network device. The trusted DRM agent/server mutually authenticates the second trusted DRM agent/server in order to extend the DRM content and rights provided by the content providers. After mutual authentication, the trusted DRM agent/server transfers rights and contents to the second trusted DRM agent/server. Once the rights and content are transferred, the original copy of the content is guaranteed to be deleted from the trusted DRAM agent/server to preserve the current license rights of the content.
    Type: Application
    Filed: December 19, 2006
    Publication date: June 19, 2008
    Applicant: SPANSION LLC
    Inventor: Joe Yuen Tom
  • Publication number: 20080109903
    Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
    Type: Application
    Filed: December 21, 2006
    Publication date: May 8, 2008
    Applicant: SPANSION LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
  • Publication number: 20080109662
    Abstract: A machine implemented system and method that effectuates secure access to a flash memory associated with a mobile device. The system includes a security component that intercepts transactions between an external processor and the flash memory and implements authentication and access control to the flash memory. The system further includes components that can partition the flash memory and can associate authentication and access control information with the partitioned flash memory.
    Type: Application
    Filed: December 20, 2006
    Publication date: May 8, 2008
    Applicant: SPANSION LLC
    Inventors: Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Willy Obereiner, Joe Yuen Tom, Russell Barck