Patents by Inventor Patricia A. Dwyer

Patricia A. Dwyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8997214
    Abstract: In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.
    Type: Grant
    Filed: February 21, 2012
    Date of Patent: March 31, 2015
    Assignee: SanDisk Technologies Inc.
    Inventors: Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand-Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin-Tse Chang, Oktay Rasizade, Farshid Sabet-Sharghi
  • Patent number: 8621601
    Abstract: A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
    Type: Grant
    Filed: May 21, 2008
    Date of Patent: December 31, 2013
    Assignee: SanDisk Technologies Inc.
    Inventors: Mei Yan, Chieh-Hao Yang, Bahman Quwami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Patent number: 8443207
    Abstract: A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to the challenge. A file system filter response is calculated at the file system filter using the challenge, and access to first content on the secure removable memory device is provided if the software entity response matches the file system filter response.
    Type: Grant
    Filed: March 18, 2010
    Date of Patent: May 14, 2013
    Assignee: Sandisk Technologies Inc.
    Inventors: Mei Yan, Chieh-Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Patent number: 8417866
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: April 9, 2013
    Assignee: SanDisk Technologies Inc.
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Publication number: 20120151576
    Abstract: In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.
    Type: Application
    Filed: February 21, 2012
    Publication date: June 14, 2012
    Inventors: Po Yuan, Javier Cañis Robles, Mei Yan, Fabrice Jogand-Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin-Tse Chang, Oktay Rasizade, Farshid Sabet-Sharghi
  • Patent number: 8171310
    Abstract: A software entity on a host device attempting to access protected content in a secure memory device must be authenticated using a challenge/response authentication mechanism before the secure file system can be accessed. A file system filter determines whether requested content is protected. If the content is protected, the file system filter provides a challenge to the software entity and generates a file system filter response using the same challenge. The software entity must then send a software entity response using the challenge to the file system filter. If the file system filter determines that the software entity response matches the file system filter response, the software entity is allowed to access the protected content through a secure file system installed on the host device for the memory device.
    Type: Grant
    Filed: December 24, 2007
    Date of Patent: May 1, 2012
    Assignee: SanDisk Technologies Inc.
    Inventors: Mei Yan, Chieh-Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Quwami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Patent number: 8146153
    Abstract: In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: March 27, 2012
    Assignee: Sandisk Technologies Inc.
    Inventors: Po Yuan, Javier Cañis Robles, Mei Yan, Fabrice Jogand-Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin-Tse Chang, Oktay Rasizade, Farshid Sabet-Sharghi
  • Publication number: 20120066412
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Application
    Filed: November 22, 2011
    Publication date: March 15, 2012
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Patent number: 8078788
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: December 13, 2011
    Assignee: SanDisk Technologies Inc.
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Publication number: 20100191962
    Abstract: A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to the challenge. A file system filter response is calculated at the file system filter using the challenge, and access to first content on the secure removable memory device is provided if the software entity response matches the file system filter response.
    Type: Application
    Filed: March 18, 2010
    Publication date: July 29, 2010
    Applicant: SANDISK CORPORATION
    Inventors: Mei Yan, Chieh-Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20100169222
    Abstract: The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g.
    Type: Application
    Filed: January 29, 2010
    Publication date: July 1, 2010
    Inventors: Bahman Qawami, Fabrice Jogand-Coulomb, Farshid Sabet-Sharghi, Pascal Caillon, Patricia Dwyer, Paul McAvoy, Pedro Vargas, Po Yuan, Robert C. Chang
  • Publication number: 20090293118
    Abstract: A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
    Type: Application
    Filed: May 21, 2008
    Publication date: November 26, 2009
    Inventors: Mei Yan, Chieh-Hao Yang, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20090293117
    Abstract: A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
    Type: Application
    Filed: May 21, 2008
    Publication date: November 26, 2009
    Inventors: Mei Yan, Chieh-Hao Yang, Bahman Quwami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20090182919
    Abstract: Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
    Type: Application
    Filed: November 7, 2008
    Publication date: July 16, 2009
    Inventors: Robert Chin-Tse Chang, Henry Ricardo Hutton, Farshid Sabet-Sharghi, Haluk Kent Tanik, Ron Barzilai, Meytal Soffer, Mei Yan, Patricia Dwyer, Po Yuan, Bahman Qawami
  • Publication number: 20090172809
    Abstract: In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventors: Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin-Tse Chang, Oktay Rasizade, Farshid Sabet-Sharghi
  • Publication number: 20090164779
    Abstract: A software entity on a host device attempting to access protected content in a secure memory device must be authenticated using a challenge/response authentication mechanism before the secure file system can be accessed. A file system filter determines whether requested content is protected. If the content is protected, the file system filter provides a challenge to the software entity and generates a file system filter response using the same challenge. The software entity must then send a software entity response using the challenge to the file system filter. If the file system filter determines that the software entity response matches the file system filter response, the software entity is allowed to access the protected content through a secure file system installed on the host device for the memory device.
    Type: Application
    Filed: December 24, 2007
    Publication date: June 25, 2009
    Inventors: Mei Yan, Chieh-Hao Yang, Junzhi Wang, Paul McAvoy, Bahman Qawami, Farshid Sabet-Sharghi, Patricia Dwyer, Po Yuan
  • Publication number: 20070056042
    Abstract: The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g.
    Type: Application
    Filed: December 30, 2005
    Publication date: March 8, 2007
    Inventors: Bahman Qawami, Fabrice Jogand-Coulomb, Farshid Sabet-Sharghi, Michael Holtzman, Pascal Caillon, Patricia Dwyer, Paul McAvoy, Pedro Vargas, Po Yuan, Robert Chang
  • Publication number: 20070043667
    Abstract: The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g.
    Type: Application
    Filed: December 30, 2005
    Publication date: February 22, 2007
    Inventors: Bahman Qawami, Fabrice Jogand-Coulomb, Farshid Sabet-Sharghi, Michael Holtzman, Pascal Caillon, Patricia Dwyer, Paul McAvoy, Pedro Vargas, Po Yuan, Robert Chang
  • Patent number: 5701567
    Abstract: A transfer member includes separately addressable electrodes separated from the surface of the member by a compliant layer. Preferably, the member is an intermediate transfer member having a thin, hard outer layer usable to receive toner images from an image member and to transfer them to a receiving sheet.
    Type: Grant
    Filed: May 30, 1996
    Date of Patent: December 23, 1997
    Assignee: Eastman Kodak Company
    Inventors: Rodney R. Bucks, Patricia A. Dwyer, Thomas N. Tombs, William B. Vreeland, Robert E. Zeman, John W. May
  • Patent number: 5153627
    Abstract: A film cassette comprises a film spool supported within a lighttight shell for rotation in an unwinding direction to thrust a filmstrip coiled about the spool to the exterior of the shell and for rotation in a winding direction to return the filmstrip to the interior of the shell. According to the invention, a locking device is connected to the spool and the shell for preventing rotation of the spool in the unwinding direction, and is enabled for such purpose in response to rotation of the spool in the winding direction. This prevents a photographer from reusing the cassette in a camera after the filmstrip is fully exposed. The locking device can be manually defeated to reuse the cassette in the camera when the filmstrip is only partly exposed.
    Type: Grant
    Filed: February 15, 1991
    Date of Patent: October 6, 1992
    Assignee: Eastman Kodak Company
    Inventor: Patricia A. Dwyer