Patents by Inventor Michael Holtzman

Michael Holtzman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080162947
    Abstract: A secure flash memory card or flash drive protects user content from unauthorized duplication. However, even the protected user content can be moved from one flash card or drive to another by its rightful owner or licensee. Additionally, secure firmware applications that may be added to the flash card over time in order to add additional functionality to the card may also be moved, although many of them are device specific and also designed to only operate on one particular piece of hardware.
    Type: Application
    Filed: June 20, 2007
    Publication date: July 3, 2008
    Inventors: Michael Holtzman, Fabrice Jogand-Coulomb
  • Publication number: 20080145941
    Abstract: The present invention relates to methods of diagnosing, monitoring, and assessing treatment effects for neurological and neurodegenerative diseases and disorders, such as Alzheimer's Disease, early in the course of clinical disease or prior to the onset of brain damage and clinical symptoms. Methods of measuring the in vivo metabolism of biomolecules produced in the CNS in a subject are provided.
    Type: Application
    Filed: April 4, 2006
    Publication date: June 19, 2008
    Applicant: WASHINGTON UNIVERSITY IN ST. LOUIS
    Inventors: Randall John Bateman, David Michael Holtzman
  • Patent number: 7374108
    Abstract: A low cost data storage and communication system is disclosed. The low cost data storage and communication system has a host and at least one card connected to the host. A voltage negotiator located in the system for determining a common operating voltage range that is a common denominator of all independent operating voltage ranges of all of the cards connected to the system. In addition, a novel feature of partitioning the memory storages of the card is also disclosed. This feature provides the host the ability to simultaneously erase any combination of sectors in a single erase group, or any combination of the entire erase groups. Another feature provided by this novel method of partitioning the memory storages is the ability to write protect any combination of memory groups in the card.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: May 20, 2008
    Assignee: SanDisk Corporation
    Inventors: Thomas N. Toombs, Michael Holtzman
  • Publication number: 20080034440
    Abstract: At least one software application is stored in a memory device, where a security data structure controls access to information obtainable from data stored in the device and to the at least one software application. A set of protocols control communication between a host and a memory device. Invocation of at least one software application stored in the memory device modifies the protocol. A security data structure controls access to data stored in the memory device according to an access policy. Invocation of at least one software application stored in the memory device imposes at least one condition in addition to the access policy for accessing the data. A data object storing data in the memory device is associated with at least one software application. Accessing the object will invoke the at least one software application which processes the data in the object. Individual ones of a plurality of first sets of protocols are selectable for enabling data to be provided and stored in a data object.
    Type: Application
    Filed: November 6, 2006
    Publication date: February 7, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Publication number: 20080022413
    Abstract: A memory storing public and confidential information is removably connected to a host device. General information on data stored in memory devices is accessible to the host device without authentication. Only a portion of confidential information stored in the memory device is accessible through the host device to an authenticated entity, where the entity has access rights to such portion. The entity is not able to access other portions of confidential information to which it has no rights. The public and confidential information is stored in a non-volatile storage medium, and a controller controls the supply of information. Preferably, the non-volatile storage medium and the controller are enclosed in a housing.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 24, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Publication number: 20080022395
    Abstract: A memory storing public and confidential information is removably connected to a host device. General information on data stored in memory devices is accessible to the host device without authentication. Only a portion of confidential information stored in the memory device is accessible through the host device to an authenticated entity, where the entity has access rights to such portion. The entity is not able to access other portions of confidential information to which it has no rights. The public and confidential information is stored in a non-volatile storage medium, and a controller controls the supply of information. Preferably, the non-volatile storage medium and the controller are enclosed in a housing.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 24, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Publication number: 20080010449
    Abstract: Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb
  • Publication number: 20080010450
    Abstract: Continuous strings of certificates in a certificate chain received by a memory device sequentially in the same order that the strings are verified. Each string except for the last may be overwritten by the next one in the sequence.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb
  • Publication number: 20080010685
    Abstract: At least one software application is stored in a memory device, where a security data structure controls access to information obtainable from data stored in the device and to the at least one software application. A set of protocols control communication between a host and a memory device. Invocation of at least one software application stored in the memory device modifies the protocol. A security data structure controls access to data stored in the memory device according to an access policy. Invocation of at least one software application stored in the memory device imposes at least one condition in addition to the access policy for accessing the data. A data object storing data in the memory device is associated with at least one software application. Accessing the object will invoke the at least one software application which processes the data in the object. Individual ones of a plurality of first sets of protocols are selectable for enabling data to be provided and stored in a data object.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Publication number: 20080010451
    Abstract: Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the memory device. The certificate revocation lists for authenticating host devices to memory devices may be stored in an unsecured area of the memory device for convenience of users.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb
  • Publication number: 20080010458
    Abstract: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by using the private key to sign data provided to it or signals derived from the data. An identity object may be stored in a non-volatile memory as proof of identity, where the memory is controlled by a controller. Preferably, a housing encloses the memory and the controller. In another embodiment, an identity object may be stored in a non-volatile memory of a memory system as proof of identity. The memory system is removably connected to a host device. After the host device has been successfully authenticated, the private key of the object is used to encrypt data from the host device or signals derived from said data, and the at least one certificate and the encrypted data or signals are sent to the host device.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Publication number: 20080010455
    Abstract: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by using the private key to sign data provided to it or signals derived from the data. An identity object may be stored in a non-volatile memory as proof of identity, where the memory is controlled by a controller. Preferably, a housing encloses the memory and the controller. In another embodiment, an identity object may be stored in a non-volatile memory of a memory system as proof of identity. The memory system is removably connected to a host device. After the host device has been successfully authenticated, the private key of the object is used to encrypt data from the host device or signals derived from said data, and the at least one certificate and the encrypted data or signals are sent to the host device.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
  • Publication number: 20080010452
    Abstract: Host devices present both the host certificate and the pertinent certificate revocation lists to the memory device for authentication so that the memory device need not obtain the list on its own. Processing of the certificate revocation list and searching for the certificate identification may be performed concurrently by the memory device. The certificate revocation lists for authenticating host devices to memory devices may be stored in an unsecured area of the memory device for convenience of users.
    Type: Application
    Filed: November 6, 2006
    Publication date: January 10, 2008
    Inventors: Michael Holtzman, Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb
  • Patent number: 7305505
    Abstract: Two or more very small encapsulated electronic circuit cards to which data are read and written are removably inserted into two or more sockets of a host system that is wired to the sockets. According to one aspect of the disclosure, command and response signals are normally communicated between the host and the cards by a single circuit commonly connected between the host and all of the sockets but during initialization of the system a unique relative card address is confirmed to have been written into each card inserted into the sockets by connecting the command and status circuit to each socket one at a time in sequence. This is a fast and relatively simple way of setting card addresses upon initialization of such a system.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: December 4, 2007
    Assignee: SanDisk Corporation
    Inventors: Yoram Cedar, Michael Holtzman, Yosi Pinto
  • Publication number: 20070180539
    Abstract: The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably controlled so that it has a selected data source among a plurality of sources and a selected destination among a plurality of destinations, all without involving the controller. The cryptographic circuit may preferably be configured to enable the processing of multiple pages, selection of one or more cryptographic algorithms among a plurality of algorithms to encryption and/or decryption without involving a controller, and to process data cryptographically in multiple successive stages without involvement of the controller. For a memory system cryptographically processing data from multiple data streams in an interleaved manner, when a session is interrupted, security configuration information may be lost so that it may become impossible to continue the process when the session is resumed.
    Type: Application
    Filed: December 20, 2005
    Publication date: August 2, 2007
    Inventors: Michael Holtzman, Baruch Cohen, David Deitcher, Hagai Bar-El, Aviram Yeruchami
  • Publication number: 20070168292
    Abstract: The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium.
    Type: Application
    Filed: December 20, 2005
    Publication date: July 19, 2007
    Inventors: Fabrice Jogand-Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai, Hagai Bar-El
  • Publication number: 20070130405
    Abstract: Two or more very small encapsulated electronic circuit cards to which data are read and written are removably inserted into two or more sockets of a host system that is wired to the sockets. According to one aspect of the disclosure, command and response signals are normally communicated between the host and the cards by a single circuit commonly connected between the host and all of the sockets but during initialization of the system a unique relative card address is confirmed to have been written into each card inserted into the sockets by connecting the command and status circuit to each socket one at a time in sequence. This is a fast and relatively simple way of setting card addresses upon initialization of such a system.
    Type: Application
    Filed: February 12, 2007
    Publication date: June 7, 2007
    Inventors: Yoram Cedar, Michael Holtzman, Yosi Pinto
  • Publication number: 20070082865
    Abstract: The invention relates generally to the field of treating pulmonary diseases. More specifically, the invention relates to the treatment of airway hypersecretion by the administration of an inhibitor of the epidermal growth factor receptor (EGFR) signaling pathway in combination with an inhibitor of the interleukin-13 (IL-13) signaling pathway, as well as compositions thereof.
    Type: Application
    Filed: October 10, 2006
    Publication date: April 12, 2007
    Applicant: Washington University
    Inventor: Michael Holtzman
  • Publication number: 20070061570
    Abstract: A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of firmware when executed pulls in another portion of firmware to be executed. The hardware of the encryption engine is used to verify the integrity of at least the first portion of the firmware. Therefore, only the firmware that is intended to run the system will be executed.
    Type: Application
    Filed: November 21, 2005
    Publication date: March 15, 2007
    Inventors: Michael Holtzman, Ron Barzilai, Reuven Elhamias, Niv Cohen
  • Publication number: 20070061897
    Abstract: A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of firmware when executed pulls in another portion of firmware to be executed. The hardware of the encryption engine is used to verify the integrity of at least the first portion of the firmware. Therefore, only the firmware that is intended to run the system will be executed.
    Type: Application
    Filed: November 21, 2005
    Publication date: March 15, 2007
    Inventors: Michael Holtzman, Ron Barzilai, Reuven Elhamias, Niv Cohen