Patents by Inventor Mei Yan

Mei Yan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110131421
    Abstract: A method of installing an application on a SIM card is disclosed. A host agent in a host device installs an application on a Subscriber Identity Module card from a non-volatile storage device. The host agent coordinates mutual authentication between the non-volatile storage device and a Subscriber Identity Module card in the host device. If the mutual authentication is successful, the host agent reads an application from the non-volatile storage device and installs the application on the Subscriber Identity Module card, wherein installing the application enables the Subscriber Identity Module card to execute the application. The application may be protected from tampering or unauthorized copying during the host agent transfer by creation of a secure communication channel or transferring encrypted applications. The Subscriber Identity Module card may verify the signature associated with an application before installation to prevent the installation of unauthorized or tampered applications.
    Type: Application
    Filed: December 2, 2009
    Publication date: June 2, 2011
    Inventors: Fabrice Jogand-Coulomb, Mei Yan, Javier Cañís Robles, Paul McAvoy
  • Patent number: 7924330
    Abstract: Methods and apparatuses for row-wise dark level non-uniformity compensation of imaging sensor pixel signals. A column dependent dark reference value is determined as one of a linear and parabolic function of signal values from two areas of dark reference pixels and a column location and then used for dark level non-uniformity compensation of signal values from imaging pixels.
    Type: Grant
    Filed: December 20, 2007
    Date of Patent: April 12, 2011
    Assignee: Aptina Imaging Corporation
    Inventors: Chen Xu, Yaowu Mo, Mei Yan
  • Publication number: 20100191962
    Abstract: A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to the challenge. A file system filter response is calculated at the file system filter using the challenge, and access to first content on the secure removable memory device is provided if the software entity response matches the file system filter response.
    Type: Application
    Filed: March 18, 2010
    Publication date: July 29, 2010
    Applicant: SANDISK CORPORATION
    Inventors: Mei Yan, Chieh-Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20100153672
    Abstract: A method of controlling data access to non-volatile memory is disclosed. The method includes storing a data file in a non-volatile memory. The non-volatile memory includes a memory array including a plurality of address ranges one or more of which corresponding to a protected portion of the memory array and one or more of which corresponding to an unprotected portion of the memory array. The method also includes communicating to a host device an indication that a memory request with respect to the protected portion of the memory array is denied. The indication is communicated for instructing the host device to avoid a timeout when the memory request is denied.
    Type: Application
    Filed: December 16, 2008
    Publication date: June 17, 2010
    Applicant: SANDISK CORPORATION
    Inventors: FABRICE JOGAND-COULOMB, ROBERT CHANG, PO YUAN, MEI YAN, XIAN JUN LIU
  • Publication number: 20100048169
    Abstract: Technology for replacing a first storage unit operatively coupled to a device is provided. Content of the first storage unit is sent to a new storage unit that serves as the replacement of the first storage unit. In one embodiment, the content is first sent to a trusted third-party server and then transferred from the server to the new storage unit. A portion of the content on the new storage unit is adjusted in one embodiment to maintain content security features that were implemented in the first storage unit. The upgrading can be performed under the control of a software entity that is installed on the device. In various embodiments, the first storage unit may be bound to a third storage unit prior to the upgrade process. In such cases, the process can include measures to bind the new storage unit to the third storage unit.
    Type: Application
    Filed: August 20, 2008
    Publication date: February 25, 2010
    Inventors: Mei Yan, Robert C. Chang, Farshid Sabet-Sharghi, Po Yuan, Bahman Qawami
  • Publication number: 20100050241
    Abstract: A first storage unit is bound to a second storage unit based on a binding type associated with content on the first storage unit, the first storage unit being operated through a first host device, and the second storage unit being operated through a second host device. When content on the first storage unit is requested in the first host device, the first host device will calculate an account identifier based on the binding type associated with the requested content and send the account identifier to a server. The server will send the account identifier to the second host device, and the second storage unit will use the account identifier to calculate a credential. The credential will be sent to the first host device through the server. The credential can be used to access the requested content if the credential is valid.
    Type: Application
    Filed: August 20, 2008
    Publication date: February 25, 2010
    Inventors: Mei Yan, Robert C. Chang, Farshik Sabet-Sharghi, Po Yuan, Bahman Qawami
  • Publication number: 20090293118
    Abstract: A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
    Type: Application
    Filed: May 21, 2008
    Publication date: November 26, 2009
    Inventors: Mei Yan, Chieh-Hao Yang, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20090293117
    Abstract: A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
    Type: Application
    Filed: May 21, 2008
    Publication date: November 26, 2009
    Inventors: Mei Yan, Chieh-Hao Yang, Bahman Quwami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20090182919
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Application
    Filed: November 7, 2008
    Publication date: July 16, 2009
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Publication number: 20090172809
    Abstract: In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventors: Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin-Tse Chang, Oktay Rasizade, Farshid Sabet-Sharghi
  • Publication number: 20090172235
    Abstract: A MegaSIM adapter is disclosed allowing a MegaSIM card to be used in a standard card slot, such as an SD or MicroSD card slot, of a host device.
    Type: Application
    Filed: December 27, 2007
    Publication date: July 2, 2009
    Inventors: Mei Yan, Robert C. Chang, Patricia Ann Dwyer, Po Yuan, Bahman Qawami, Farshid Sabet-Sharghi, Fabrice J. Jogand-Coulomb, Matthijs C. Hutten
  • Publication number: 20090172279
    Abstract: A non-volatile memory interface device contains first, second, and third communication interfaces configured for first, second, and third protocols, respectively. The device also contains a memory controller that selectively communicates between the first and second communication interfaces, and between the first and third communication interfaces. The device also contains a receptacle that can receive a removable non-volatile memory card and electrically connect the card to the second and third communication interfaces. The first communication interface may be a Universal Serial Bus Interface and may be in communicatively coupled to a USB connector. The second communication interface may be an ISO 7816 interface. A communications adapter is an enclosure containing a receptacle that can receive a non-volatile memory card and a USB connector. The USB connector is communicatively coupled with the non-volatile memory card in the receptacle.
    Type: Application
    Filed: December 28, 2007
    Publication date: July 2, 2009
    Inventors: Po Yuan, Robert Chin-Tse Chang, Mei Yan, Bahman Qawami, Farshid Sabet-Sharghi, Matthijs C. Hutten, Gusti Averbuch
  • Publication number: 20090160979
    Abstract: Methods and apparatuses for row-wise dark level non-uniformity compensation of imaging sensor pixel signals. A column dependent dark reference value is determined as one of a linear and parabolic function of signal values from two areas of dark reference pixels and a column location and then used for dark level non-uniformity compensation of signal values from imaging pixels.
    Type: Application
    Filed: December 20, 2007
    Publication date: June 25, 2009
    Inventors: Chen Xu, Yaowu Mo, Mei Yan
  • Publication number: 20090164779
    Abstract: A software entity on a host device attempting to access protected content in a secure memory device must be authenticated using a challenge/response authentication mechanism before the secure file system can be accessed. A file system filter determines whether requested content is protected. If the content is protected, the file system filter provides a challenge to the software entity and generates a file system filter response using the same challenge. The software entity must then send a software entity response using the challenge to the file system filter. If the file system filter determines that the software entity response matches the file system filter response, the software entity is allowed to access the protected content through a secure file system installed on the host device for the memory device.
    Type: Application
    Filed: December 24, 2007
    Publication date: June 25, 2009
    Inventors: Mei Yan, Chieh-Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20090006796
    Abstract: A computer readable media storing operational instructions is disclosed. The instructions includes at least one instruction to store data of an encrypted computer readable file that includes a header portion and associated content data into a storage area of a non-volatile memory. The storage area includes a secure memory area to store data from the header portion including at least one encryption ID. The storage area further includes a memory area to store the content data. The header portion further includes trailer data derived from a portion of the content data. The instructions also include at least one instruction to provide data read access to the header portion and to the content data with respect to a host device.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: SanDisk Corporation
    Inventors: Robert C. Chang, Po Yuan, Bahman Qawami, Farshid Sabet-sharghi, Junzhi Wang, Xian Jun Liu, Chieh-Hao Yang, June Li, Mei Yan
  • Publication number: 20090006724
    Abstract: Methods of storing and accessing data using a header portion of a file are disclosed. In an embodiment, a method of storing content in a non-volatile memory is disclosed. The method includes reading a content file including media content and including a trailer, storing information related to the trailer together with secure data in a header portion of a file, and storing the file to a storage element of the non-volatile memory or a memory area of a host device coupled to the non-volatile memory device.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: SanDisk Corporation
    Inventors: Robert C. Chang, Po Yuan, Bahman Qawami, Farshid Sabet-sharghi, Junzhi Wang, Xian Jun Liu, Chieh-Hao Yang, June Li, Mei Yan
  • Patent number: 7446806
    Abstract: A linear sensor array for imaging coded indicia includes an analog front end and a digital back end integrated on a single CMOS chip. A real-time, correlated double sampling circuit is used for noise suppression.
    Type: Grant
    Filed: December 19, 2003
    Date of Patent: November 4, 2008
    Assignee: Symbol Technologies, Inc.
    Inventors: Bradley Carlson, Mei Yan
  • Patent number: 7423124
    Abstract: The present invention is a method of purifying recombinant human serum albumin (rHSA) from a solution, which method comprises to subject a cell culture supernatant (CCS) comprising rHSA cation exchange on a bimodal high salt tolerant matrix; hydrophobic interaction chromatography (HIC); anion exchange; and recovering the purified rHSA. The bimodal high salt tolerant cation exchange matrix used enables performing a purification of a cell culture supernatant directly, in the sense that no further dilution thereof is necessary. Due to its high binding capacity, said bimodal cation exchange matrix also allows use of a smaller amount of matrix as compared to a corresponding conventional cation exchanger matrix. Accordingly, the present invention allows substantial savings as regards volumes and consequently operation costs.
    Type: Grant
    Filed: May 9, 2003
    Date of Patent: September 9, 2008
    Assignee: Ge Healthcare Bio-Sciences AB
    Inventors: Makonnen Belew, Mei Yan Li, Wei Zhang
  • Publication number: 20060036959
    Abstract: A user interface for a computer or the like for accessing media files. The interface includes a resizable window displaying a preview image of each of a plurality of media files and providing access thereto for use in at least one of a plurality of applications.
    Type: Application
    Filed: August 4, 2005
    Publication date: February 16, 2006
    Inventors: Chris Heatherly, Cordell Ratzlaff, Phillip Bensaid, Mei-Yan Chan
  • Publication number: 20050214902
    Abstract: The present invention is a method of purifying recombinant human serum albumin (rHSA) from a solution, which method comprises to subject a cell culture supernatant (CCS) comprising rHSA cation exchange on a bimodal high salt tolerant matrix; hydrophobic interaction chromatography (HIC); anion exchange; and recovering the purified rHSA. The bimodal high salt tolerant cation exchange matrix used enables performing a purification of a cell culture supernatant directly, in the sense that no further dilution thereof is necessary. Due to its high binding capacity, said bimodal cation exchange matrix also allows use of a smaller amount of matrix as compared to a corresponding conventional cation exchanger matrix. Accordingly, the present invention allows substantial savings as regards volumes and consequently operation costs.
    Type: Application
    Filed: May 9, 2003
    Publication date: September 29, 2005
    Inventors: Makonnen Belew, Mei Yan Li, Wei Zhang