Patent application number | Description | Published |
20080244140 | EXTENDER STRIP AND TEST ASSEMBLY FOR TESTING MEMORY CARD OPERATION - A semiconductor device is disclosed including die bond pads which are heightened to allow wire bonding of offset stacked die even in tight offset configurations. After a first die is affixed to a substrate, one or more layers of an electrical conductor may be provided on some or all of the die bond pads of the first substrate to raise the height of the bond pads. The conductive layers may for example be conductive balls deposited on the die bond pads of the first substrate using a known wire bond capillary. Thereafter, a second die may be added, and wire bonding of the first die may be accomplished using a known wire bond capillary mounting a wire bond ball on a raised surface of a first semiconductor die bond pad. | 10-02-2008 |
20080244143 | METHOD OF TESTING MEMORY CARD OPERATION - A semiconductor device is disclosed including die bond pads which are heightened to allow wire bonding of offset stacked die even in tight offset configurations. After a first die is affixed to a substrate, one or more layers of an electrical conductor may be provided on some or all of the die bond pads of the first substrate to raise the height of the bond pads. The conductive layers may for example be conductive balls deposited on the die bond pads of the first substrate using a known wire bond capillary. Thereafter, a second die may be added, and wire bonding of the first die may be accomplished using a known wire bond capillary mounting a wire bond ball on a raised surface of a first semiconductor die bond pad. | 10-02-2008 |
20090006724 | Method of Storing and Accessing Header Data From Memory - Methods of storing and accessing data using a header portion of a file are disclosed. In an embodiment, a method of storing content in a non-volatile memory is disclosed. The method includes reading a content file including media content and including a trailer, storing information related to the trailer together with secure data in a header portion of a file, and storing the file to a storage element of the non-volatile memory or a memory area of a host device coupled to the non-volatile memory device. | 01-01-2009 |
20090006796 | Media Content Processing System and Non-Volatile Memory That Utilizes A Header Portion of a File - A computer readable media storing operational instructions is disclosed. The instructions includes at least one instruction to store data of an encrypted computer readable file that includes a header portion and associated content data into a storage area of a non-volatile memory. The storage area includes a secure memory area to store data from the header portion including at least one encryption ID. The storage area further includes a memory area to store the content data. The header portion further includes trailer data derived from a portion of the content data. The instructions also include at least one instruction to provide data read access to the header portion and to the content data with respect to a host device. | 01-01-2009 |
20090043984 | METHOD FOR MANAGING PARTITIONS IN A STORAGE DEVICE - A method for re-allocating memory partition space is provided. The method comprises determining when a first memory partition is full or has reached a threshold value, determining that a second memory partition has unused storage space that can be allocated to the first memory partition, and assigning the unused storage space from the second memory partition to the first memory partition. A memory controller embedded within the mass storage device and having an interface to an external host assigns the unused storage space from the second memory partition to the first memory partition. | 02-12-2009 |
20090157971 | Integration of Secure Data Transfer Applications for Generic IO Devices - Techniques are presented for sending an application instruction from a hosting digital appliance to a portable medium, where the instruction is structured as one or more units whose size is a first size, or number of bytes. After flushing the contents of a cache, the instruction is written to the cache, where the cache is structured as logical blocks having a size that is a second size that is larger (in terms of number of bytes) than the first size. In writing the instruction (having a command part and, possibly, a data part), the start of the instruction is aligned with one of the logical block boundaries in the cache and the instruction is padded out with dummy data so that it fills an integral number of the cache blocks. When a response from a portable device to an instruction is received at a hosting digital appliance, the cache is similarly flushed prior to receiving the response. The response is then stored to align with a logical block boundary of the cache. | 06-18-2009 |
20090164779 | FILE SYSTEM FILTER AUTHENTICATION - A software entity on a host device attempting to access protected content in a secure memory device must be authenticated using a challenge/response authentication mechanism before the secure file system can be accessed. A file system filter determines whether requested content is protected. If the content is protected, the file system filter provides a challenge to the software entity and generates a file system filter response using the same challenge. The software entity must then send a software entity response using the challenge to the file system filter. If the file system filter determines that the software entity response matches the file system filter response, the software entity is allowed to access the protected content through a secure file system installed on the host device for the memory device. | 06-25-2009 |
20090172235 | MEGASIM CARD ADAPTER - A MegaSIM adapter is disclosed allowing a MegaSIM card to be used in a standard card slot, such as an SD or MicroSD card slot, of a host device. | 07-02-2009 |
20090172279 | System For Accessing A Removable Non-Volatile Memory Card - A non-volatile memory interface device contains first, second, and third communication interfaces configured for first, second, and third protocols, respectively. The device also contains a memory controller that selectively communicates between the first and second communication interfaces, and between the first and third communication interfaces. The device also contains a receptacle that can receive a removable non-volatile memory card and electrically connect the card to the second and third communication interfaces. The first communication interface may be a Universal Serial Bus Interface and may be in communicatively coupled to a USB connector. The second communication interface may be an ISO 7816 interface. A communications adapter is an enclosure containing a receptacle that can receive a non-volatile memory card and a USB connector. The USB connector is communicatively coupled with the non-volatile memory card in the receptacle. The receptacle's second communication interface with the non-volatile memory card is disabled. | 07-02-2009 |
20090172393 | Method And System For Transferring Data And Instructions Through A Host File System - A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a command and passed to a host file system process. The packet, now associated with a second command, is received from the host file system process. The encryption instruction and the payload of data are extracted from the packet. At least a portion of the payload of data is encrypted based on the encryption instruction. A method for decrypting data may receive a packet and generate a decryption instruction. At least a portion of the packet is decrypted using at least the decryption instruction. The second packet comprising the decrypted packet is passed to a host file system process. A third packet comprising the decrypted packet is received from the host file system process. The decrypted packet is extracted from the third packet. | 07-02-2009 |
20090172809 | Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 07-02-2009 |
20090182919 | Media Card Command Pass Through Methods - Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions. | 07-16-2009 |
20090259771 | Identification of memory cards by host - A host connected to two or more memory cards includes an interface manager that assigns card identifiers to memory cards according to the types of memory cards present. The interface manager also assigns volume identifiers to partitions within memory cards. Applications use a pathname that includes a card identifier and a volume identifier to access a partition and files. | 10-15-2009 |
20090293118 | SYSTEMS FOR AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 11-26-2009 |
20100048169 | Memory device upgrade - Technology for replacing a first storage unit operatively coupled to a device is provided. Content of the first storage unit is sent to a new storage unit that serves as the replacement of the first storage unit. In one embodiment, the content is first sent to a trusted third-party server and then transferred from the server to the new storage unit. A portion of the content on the new storage unit is adjusted in one embodiment to maintain content security features that were implemented in the first storage unit. The upgrading can be performed under the control of a software entity that is installed on the device. In various embodiments, the first storage unit may be bound to a third storage unit prior to the upgrade process. In such cases, the process can include measures to bind the new storage unit to the third storage unit. | 02-25-2010 |
20100050241 | Accessing memory device content using a network - A first storage unit is bound to a second storage unit based on a binding type associated with content on the first storage unit, the first storage unit being operated through a first host device, and the second storage unit being operated through a second host device. When content on the first storage unit is requested in the first host device, the first host device will calculate an account identifier based on the binding type associated with the requested content and send the account identifier to a server. The server will send the account identifier to the second host device, and the second storage unit will use the account identifier to calculate a credential. The credential will be sent to the first host device through the server. The credential can be used to access the requested content if the credential is valid. | 02-25-2010 |
20100077214 | Host Device and Method for Protecting Data Stored in a Storage Device - The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially inaccessible to external devices. Only those host devices with the proper credentials are able to access the key. An access policy may be stored which grants different permissions (e.g. to different authorized entities) for accessing data stored in the medium. A system incorporating a combination of the two above features is particularly advantageous. On the one hand, the content owner or proprietor has the ability to control access to the content by using keys that are substantially inaccessible to external devices and at the same time has the ability to grant different permissions for accessing content in the medium. Thus, even where external devices gain access, their access may still be subject to the different permissions set by the content owner or proprietor recorded in the storage medium. When implemented in a flash memory, the above features result in a particularly useful medium for content protection. Many storage devices are not aware of file systems while many computer host devices read and write data in the form of files. The host device provides a key reference or ID, while the storage device generates a key value in response which is associated with the key ID, which is used as the handle through which the memory retains complete and exclusive control over the generation and use of the key value for cryptographic processes, while the host retains control of files. | 03-25-2010 |
20100169222 | Method for Secure Storage and Delivery of Media Content - The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the distribution. A wide variety of different avenues become available for distributing media content using such memory devices, such as where the devices contain one or more of the following: abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content. The memory device has a type of control structures that enable a service provider (who can also be the content owner) to create a secure environment for media content distribution where end users and terminals register with the service provider, and gain access to the content in a manner controlled by the service provider. The various components to be loaded (e.g. abridged preview media content, encrypted unabridged media content, prepaid content, rights and/or rules governing access to such content) may be generated and loaded in a secure and efficient manner. | 07-01-2010 |
20100191955 | SYSTEM AND METHOD FOR DISTRIBUTING DIGITAL CONTENT - A method for distributing digital content is disclosed. The method includes receiving, at an operator of a wireless communications network, a request for digital content from a first mobile device. The method further includes determining, at the operator, that a second mobile device has the digital content. The method further includes receiving the digital content from the second mobile device at the operator of the wireless communications network and sending a message including a pointer related to the digital content to the first mobile device | 07-29-2010 |
20100191962 | FILE SYSTEM FILTER AUTHENTICATION - A method of accessing content includes installing a file system filter for a secure removable memory device on a host device. A challenge is sent from the file system filter to a software entity on the host device, and a software entity response is received at the file system filter in response to the challenge. A file system filter response is calculated at the file system filter using the challenge, and access to first content on the secure removable memory device is provided if the software entity response matches the file system filter response. | 07-29-2010 |
20100205457 | Portable Mass Storage Device with Virtual Machine Activation - A portable mass storage device is used to store large files such as digital pictures, movies and music. The mass storage device has firmware with security mechanisms that limit access to read write operations to ensure reliable operation of the device to prevent unwanted copying or storing of secure content such a copyrighted material. Although the security mechanisms generally limit access, the firmware is operable to work with a virtual machine and allows the virtual machine to access the secure content and work in conjunction with the firmware to read and write data to the mass storage memory, if the virtual machine is present. The virtual machine is either loaded but not activated at the time of manufacture, or is downloaded and activated post manufacture. Any royalty for the virtual machine is paid for only if and when the virtual machine is both present and activated in the device. | 08-12-2010 |
20100218001 | Method for Managing Keys and/or Rights Objects - One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file contains a valid RO or not. Preferably, there is a one-to-one correspondence between the location for a RO in a RO file and a location in the RO navigation file for the status bit which identifies whether its corresponding location in the RO file contains a valid RO or not. Whether a particular location in a RO file contains a valid RO or not can be found by checking its corresponding status bit in the RO navigation file. By finding out whether a particular location in a RO file contains a valid RO or not in this manner, it is possible to delete ROs without having to go through an authentication process. The process of finding an empty slot in the RO file for storing a new RO is also simplified. This greatly increases the efficiency of RO management. A similar system may be used for management of content encryption/encryption keys for protecting content files. | 08-26-2010 |
20100332534 | FILE SYSTEM AND METHOD OF FILE ACCESS - A file system and method of file access are disclosed. In a particular embodiment, a method is performed at a host device coupled to a non-volatile memory, where the host device includes a memory having a first file data structure. A first directory entry in a file directory of a file system is located where the first directory entry corresponds to a first file stored in the non-volatile memory. First data associated with the first directory entry, including first location data indicating a location of the first file in the non-volatile memory, is retrieved and stored in the first file data structure. A request to open the first file is received. In response, the first location data of the first file is retrieved from the first file data structure and data of the first file from the non-volatile memory is read. First metadata associated with the first file is extracted from the data read from the non-volatile memory. | 12-30-2010 |
20110191600 | System, Method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media - A secure software package for original equipment manufacturers to run in electronic devices in order to access and dynamically decrypt encrypted audio video or other content from a memory storage device such as a memory card, optical or hard disk such that the user interface of the device need only send simple commands and the decrypted content is output. | 08-04-2011 |
20120066412 | MEDIA CARD COMMAND PASS THROUGH METHODS - Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions. | 03-15-2012 |
20120151576 | METHOD AND SYSTEM FOR CREATING AND ACCESSING A SECURE STORAGE AREA IN A NON-VOLATILE MEMORY CARD - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 06-14-2012 |
20120159644 | Method for Managing Keys and/or Rights Objects - One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file contains a valid RO or not. Preferably, there is a one-to-one correspondence between the location for a RO in a RO file and a location in the RO navigation file for the status bit which identifies whether its corresponding location in the RO file contains a valid RO or not. Whether a particular location in a RO file contains a valid RO or not can be found by checking its corresponding status bit in the RO navigation file. By finding out whether a particular location in a RO file contains a valid RO or not in this manner, it is possible to delete ROs without having to go through an authentication process. The process of finding an empty slot in the RO file for storing a new RO is also simplified. This greatly increases the efficiency of RO management. A similar system may be used for management of content encryption/encryption keys for protecting content files. | 06-21-2012 |
20120290421 | Enabling a Merchant's Storefront POS (Point of Sale) System to Accept a Payment Transaction Verified by SMS Messaging with Buyer's Mobile Phone - A mobile payment system authorizes payment by sending a Short Message Service (SMS) text message or secure hypertext transfer protocol (HTTPS) request to a customer's mobile phone or mobile device requiring customer to respond by SMS or HTTPS. A SMS payment software-plugin is installed on a Point-Of-Sale (POS) terminal. When a customer requests to pay by SMS, the plugin is activated and the customer's mobile phone number and zip code or POS PIN are entered on the POS terminal. The POS terminal sends a request to a SMS payment system, which sends the SMS text message to the customer's mobile device. When the customer replies to the SMS message with an approval code, the SMS payment system uses payment information for the customer to create a transaction request to a bank authorization network. When the SMS payment system receives authorization, it notifies the POS terminal to complete the purchase transaction | 11-15-2012 |
20120331208 | ADAPTIVE INTERNAL TABLE BACKUP FOR NON-VOLATILE MEMORY SYSTEM - Methods and apparatus for allowing tables to be adaptively backed up are disclosed. According to one aspect of the present invention, a method for operating a memory system with a non-volatile memory that includes a reserved memory area, a plurality of physical blocks and a plurality of data structures including an erase count block involves determining when contents associated with at least one data structure of the plurality of data structures are to be substantially backed up. A request to substantially back up the contents associated with the at least one data structure is executed when it is determined that the contents associated with the at least one data structure are to be substantially backed up. Executing the request allows contents associated with the at least one data structure are substantially backed up in the reserved memory area. | 12-27-2012 |
20130144663 | Online and Offline Authentication for Instant Physical or Virtual Access and Purchases - A customer enters his mobile phone number to logon to a third-party website without a username or password. A Short Message Service (SMS) Applications-Programming Interface (API) sends the phone number to a SMS control system that authorizes the logon by sending a SMS text message or secure hypertext transfer protocol (HTTPS) request to the customer's mobile phone or mobile device requiring customer to respond by SMS or HTTPS. When the customer replies to the SMS message with an approval code such as a Personal-Identification-Number (PIN), the SMS control system approves the logon to the third-party website. An admittance gate at an event such as a concert or movie may also get the customer's phone number and use the API to activate the SMS control system to exchange SMS text messages to authorize admittance. A pre-paid ticket in an admittance queue is redeemed in the customer's account. | 06-06-2013 |
20130144706 | Aggregating Consumer Rewards, Memberships, Receipts, Lowest-Price Matches, and Preferred Payment Transactions - A customer selects a payment source and authorizes payment by sending Short Message Service (SMS) text messages or secure hypertext transfer protocol (HTTPS) requests from the customer's mobile phone or device. A SMS payment software-plugin is installed on a Point-Of-Sale (POS) terminal and launches a price match search and can fetch customer rewards. When a customer requests to pay by SMS, the plugin is activated and the customer's mobile phone number and zip code or POS PIN are entered on the POS terminal. The POS terminal sends a request to a SMS payment system, which sends SMS text messages to the customer's mobile device. When the customer replies to the SMS message with a payment source selection and an approval code, the SMS payment system uses the selected payment source from the customer to create a transaction request to a bank authorization network. | 06-06-2013 |
20130144738 | Gifting and Sharing Using SMS Messages for Shared Coupon/Gift-Card Auto-Redemption and Multi-Source Payment from Buyer's Mobile Phone - A giving customer sends to a Short Message Service (SMS) gifting system a SMS text message with a gift amount, mobile phone number, and personal message for a receiving customer. The SMS gifting system authorizes payment for gifts by sending a SMS text message or secure hypertext transfer protocol (HTTPS) request to the giving customer's mobile phone or mobile device requiring customer to respond by SMS or HTTPS. When the giving customer replies to the SMS message with an approval code such as a Personal-Identification-Number (PIN), the SMS gifting system uses a queue of payment sources for the giving customer to create transaction requests to a bank authorization network. When the SMS gifting system receives authorization, it completes the gift transaction by sending a SMS message to the receiving user's mobile phone. Deals and vouchers may be shared among sub-users in a grouped account. | 06-06-2013 |
20140108465 | File System and Method of File Access - A file system and method of file access are disclosed. In a particular embodiment, a method is performed at a host device coupled to a data storage device, where the host device includes a memory storing a file data structure. The host device receives a request to open a file and, in response to the request, retrieves location data of the file from the file data structure. The host device reads data of the file from the data storage device based on the location data and extracts metadata from the data of the file. | 04-17-2014 |
20140115698 | Method for Versatile Content Control with Partitioning - A mechanism or structure may be provided to divide a memory into partitions and so that at least some data in the partitions can be encrypted with a key, so that in addition to authentication that is required for accessing some of the partitions, access to one or more keys may be required to decrypt the encrypted data in such partitions. All of the content that the user wishes to access may be associated with a first account, so that all such content can be accessed via different applications (e.g. music player, email, cellular communication etc.) without having to log in multiple times. Then a different set of authentication information may then be used for logging in to access protected content that is in an account different from the first account, even where the different accounts are for the same user or entity. | 04-24-2014 |
20140249901 | SYSTEM AND METHOD FOR CIRCLE OF FAMILY AND FRIENDS MARKETPLACE - A customer selects a payment source and authorizes payment by sending Short Message Service (SMS) text messages or secure hypertext transfer protocol (HTTPS) requests from the customer's mobile phone or device. A SMS payment software-plugin is installed on a Point-Of-Sale (POS) terminal and launches a price match search and can fetch customer rewards. When a customer requests to pay by SMS, the plugin is activated and the customer's mobile phone number and zip code or POS PIN are entered on the POS terminal. The POS terminal sends a request to a SMS payment system, which sends SMS text messages to the customer's mobile device. The details are discussed. The application on marketplace based on circle of friends and family is also discussed, which connects the people to schools or universities, to support them financially, through Koincloud marketplace. | 09-04-2014 |
20140359285 | METHOD AND SYSTEM FOR TRANSFERRING DATA INSTRUCTIONS THROUGH A HOST FILE SYSTEM - A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a command and passed to a host file system process. The packet, now associated with a second command, is received from the host file system process. The encryption instruction and the payload of data are extracted from the packet. At least a portion of the payload of data is encrypted based on the encryption instruction. A method for decrypting data may receive a packet and generate a decryption instruction. At least a portion of the packet is decrypted using at least the decryption instruction. The second packet comprising the decrypted packet is passed to a host file system process. A third packet comprising the decrypted packet is received from the host file system process. The decrypted packet is extracted from the third packet. | 12-04-2014 |