A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Secure computer internal and external memory devices for
user-authentication via built-in or remote means; recorded
and downloadable software for user-authentication for the
purpose of accessing external and internal data storage and
permitting data storage and transfer. Secure data storage services with user-authentication
granted via cloud, or on-premises based services, or
internet-connected devices.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Secure computer internal and external memory devices for user-authentication via built-in or remote means; Recorded and downloadable software for user-authentication for the purpose of accessing external and internal data storage and permitting data storage and transfer Secure data storage services with user-authentication granted via cloud, or on-premises based services, or internet-connected devices
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable or recorded computer software programs to back up and sync data between a data storage device and a remote system for secure collaboration
09 - Scientific and electric apparatus and instruments
Goods & Services
External computer memories with a built-in input mechanism
and built-in software for self-authenticating the user and
data encryption for secure data storage.
Methods, systems, and computer programs are presented for a self-encrypting device (SED) incorporated into a host system. In one example, the host system includes a memory, a processor, a data channel in communication with the memory and the processor, and the SED. The SED comprises an authentication subsystem, a storage subsystem that stores encrypted data that is encrypted with an encryption key provided by the authentication subsystem, a radio frequency (RF) transceiver, and a data interface in electrical contact with the data channel. The data interface is locked from sending and receiving data until the SED is unlocked by the authentication subsystem with user-authentication information received via the RF transceiver.
H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
Methods, systems, and computer programs are presented for a self-encrypting device (SED) incorporated into a host system. In one example, the host system includes a memory, a processor, a data channel in communication with the memory and the processor, and the SED. The SED comprises an authentication subsystem, a storage subsystem that stores encrypted data that is encrypted with an encryption key provided by the authentication subsystem, a radio frequency (RF) transceiver, and a data interface in electrical contact with the data channel. The data interface is locked from sending and receiving data until the SED is unlocked by the authentication subsystem with user-authentication information received via the RF transceiver.
H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Methods, systems, and computer programs are presented for managing electronic devices with autonomous wireless authentication. In one example, the security system includes one or more computer processors, a memory, and a communication channel configured to be coupled to an electronic system. The security system further includes a radio frequency (RF) transceiver configured to receive user-authentication information from a wireless device, and an authentication subsystem for authenticating a user. The authentication subsystem enables the use of the electronic system based on the received user-authentication information. Further, the authentication subsystem sends, over the communication channel, an enable command to the electronic system after the user is authenticated, and the electronic system is not operable until the enable command is received.
09 - Scientific and electric apparatus and instruments
Goods & Services
External and internal secure data storage devices, namely, USB Flash drives, hard disk drives, solid state drives, secure digital cards, micro-cards, fixed hard disk drives and solid state drives used inside of host devices, and secure access devices for door-locking and instruments and equipment that require user-authentication to get access in applications for computers, embedded systems, mobile devices, and Internet of Things (IOT) devices; external portable and desktop secure data storage devices, namely, hardware encrypted or recorded and downloadable software encrypted drives; recorded and downloadable antivirus software applications to protect content on the drives against malware; hardware encrypted and recorded and downloadable software applications for encrypting and decrypting data on the external drive, on the computer, in transit to the cloud, and in the cloud; recorded and downloadable software encryption applications for portable storage devices; none of the aforementioned goods relating to perimeter access control devices intended for control or monitoring of doors, door locks, gates, pet access doors and controls, cameras, lights and lighting systems except that require user-authentication to get access in applications for computers, embedded systems, mobile devices, and Internet of Things (IOT) devices
A self-authenticating credit card includes an input device for entering a PIN. The PIN is accepted by a micro-controller that uses the entered PIN as an encryption key for decrypting stored account information. A portion of the account information includes data, that when decrypted, contains an image that is rendered on an integral display, with account information sent to a transaction terminal. A timer is used to limit access to account data while in the unlocked state.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
23.
SELF-ENCRYPTING MODULE WITH EMBEDDED WIRELESS USER AUTHENTICATION
Methods, systems, and computer programs are presented for a self-encrypting device (SED) incorporated into a host system. In one example, the host system includes a memory, a processor, a data channel in communication with the memory and the processor, and the SED. The SED comprises an authentication subsystem, a storage subsystem that stores encrypted data that is encrypted with an encryption key provided by the authentication subsystem, a radio frequency (RF) transceiver, and a data interface in electrical contact with the data channel. The data interface is locked from sending and receiving data until the SED is unlocked by the authentication subsystem with user-authentication information received via the RF transceiver.
G06F 21/80 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A portable media system for a host computer system, and method of operation thereof, that includes: a controller in the portable media system for communicating clear information between the portable media system and the host computer system; and an encryption system in the portable media system for providing an encryption algorithm for the controller to decrypt cipher information for the host computer system.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 12/14 - Protection against unauthorised use of memory
Methods, systems, and computer programs are presented for a self-encrypting device (SED) incorporated into a host system. In one example, the host system includes a memory, a processor, a data channel in communication with the memory and the processor, and the SED. The SED comprises an authentication subsystem, a storage subsystem that stores encrypted data that is encrypted with an encryption key provided by the authentication subsystem, a radio frequency (RF) transceiver, and a data interface in electrical contact with the data channel. The data interface is locked from sending and receiving data until the SED is unlocked by the authentication subsystem with user-authentication information received via the RF transceiver.
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Methods, systems, and computer programs are presented for remote management of self-encrypting managed devices (SEMDs) with embedded wireless authentication. One method includes providing a user interface to access a management server for managing users and devices. The SEMD is in wireless communication with the mobile device and is connection with the management server. Additionally, the management server checks user-authentication information of the user for unlocking access to the SEMD before is enabled to unlock the SEMD via mobile application of the mobile device. Further, the management server sends an unlock command to the mobile device based on the checking, the mobile device sending an unlock request to the SEMD via the wireless communication. The SEMD is configured to unlock the data channel to provide data access to encrypted storage in the SEMD.
G06F 21/45 - Structures or tools for the administration of authentication
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/80 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Approaches, techniques, and mechanisms are disclosed for providing referral identity systems and services. The referral identity system can provide a hardware based system for identifying users and the devices they are using and recognizing referrals from one device to another and/or from one user to another. Each of the users can be uniquely identified using a device identifier associated with a device that the user is using. The authentication and identity services can be used to license software and/or devices coupled with such software dynamically using integrated hardware, software, and firmware, and provide a validated identification difficult to spoof.
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
A method of operation of an automatic back-up system includes: providing a mobile device; coupling a removable media device to the mobile device; automatically launching an application on the mobile device; and backing-up user data selected by the application from the mobile device to the removable media device.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A network information system, and a method of operation thereof, includes: an extraction module for extracting a unique device identification for sending to an e-commerce server, wherein the unique device identification is extracted from a network-connected device with a software application installed and not activated on the network-connected device; a settlement process module, coupled to the extraction module, for generating a notification based on the unique device identification for sending to a license server; and a key generation module, coupled to the settlement process module, for generating a product key for the unique device identification based on the notification for activating the software application to run on a computing device.
A portable media system for a host computer system, and method of operation thereof, that includes: a controller in the portable media system for communicating clear information between the portable media system and the host computer system; and an encryption system in the portable media system for providing an encryption algorithm for the controller to decrypt cipher information for the host computer system.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 12/14 - Protection against unauthorised use of memory
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.
A network information system, and a method of operation thereof, includes: an extraction module for extracting a unique device identification for sending to an e-commerce server, wherein the unique device identification is extracted from a network-connected device with a software application installed and not activated on the network-connected device; a settlement process module, coupled to the extraction module, for generating a notification based on the unique device identification for sending to a license server; and a key generation module, coupled to the settlement process module, for generating a product key for the unique device identification based on the notification for activating the software application to run on a computing device.
A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer storage devices, namely, blank flash drives;
pre-recorded flash drives featuring, gift cards, digital
currency, promotional materials, educational materials,
customer data materials, manuals, documents, employee data,
financial materials, intellectual property materials,
bookmarks, marketing materials, URL address information,
cryptographic parameter materials, one-time password data,
encoded password data, source code data, electronic currency
data, gaming files, graphical files, image files, video
files featuring television programs, movies, fictional
works, documentaries, commercials, short clips, and
entertainment materials, audio files featuring musical
performances, spoken human voice, natural sounds, and
computer generated sounds, software applications and
executable program files featuring demonstration programs,
trial programs, evaluation version programs, simulation
programs, and entertainment programs, and database files
featuring financial data, inventory data, structural data,
and usage log data; secure encrypted flash drives; external
memory devices; electronic memory card readers; USB web keys
for automatically launching pre-programmed website URLs; USB
electronic security token in the nature of a fob-like device
used by an authorized user of a computer system facilitate
authentication; and electrical connectors.
A data security system includes a first computer system including: a memory for containing data, and a processing unit connected to the memory for locking and unlocking the memory, the processing unit including: a first identification unit for providing a first identification, a modifying unit connected to the first identification unit to provide a modified number, and a checking unit for receiving the modified number; and the first computer system connectible to a second computer system, the second computer system including: a second identification unit for providing a second identification, and an application for receiving the second identification to provide a further modified number; and the first computer system connectible to the checking unit to have the processing unit unlock the memory when the modified number and the further modified number are the same and lock the memory when the modified number and the further modified number are different.
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A power supply, and a method of operation thereof, includes: a power source; a microcontroller for comparing a first sense potential with a second sense potential for generating a potential booster enable; and a relative isolation unit for isolating the first sense potential from the second sense potential; and a potential booster for controlling an output potential, the potential booster controlled by the potential booster enable from the microcontroller.
H02M 3/156 - Conversion of DC power input into DC power output without intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H02M 1/08 - Circuits specially adapted for the generation of control voltages for semiconductor devices incorporated in static converters
A method of operation of an automatic back-up system includes: providing a mobile device; coupling a removable media device to the mobile device; automatically launching an application on the mobile device; and backing-up user data selected by the application from the mobile device to the removable media device.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A data security system, and method of operation thereof, is provided that includes: an electronic authentication subsystem for verifying a user identification against an authentication key and for employing the authentication key for retrieving an encryption key, the authentication key only accessible from inside the electronic authentication subsystem, and the user identification supplied from outside the data security system to a receiver within the electronic authentication subsystem; and a storage subsystem employing the encryption key for allowing unencrypted communication through the storage subsystem between a host computer system and a storage media.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
A system and method of generating an encryption key in a self-encrypting mass storage device that includes using a manual input device as input for a micro-controller that contains a cyclic counter. An input device event triggers the micro-controller to read the current state of the cyclic counter. An accumulation of cyclic counter values is used as a source of entropy to seed a deterministic random number generator. The output of the deterministic random number generator is used as an encryption key for encryption/decryption processes within the mass storage device.
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/80 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
H04L 29/06 - Communication control; Communication processing characterised by a protocol
46.
LICENSING SYSTEM FOR COMPUTER SYSTEM AND SERVER SYSTEM AND METHOD THEREFOR
A network information system, and a method of operation thereof, includes: an extraction module for extracting a unique device identification for sending to an e-commerce server, wherein the unique device identification is extracted from a network-connected device with a software application installed and not activated on the network-connected device; a settlement process module, coupled to the extraction module, for generating a notification based on the unique device identification for sending to a license server; and a key generation module, coupled to the settlement process module, for generating a product key for the unique device identification based on the notification for activating the software application to run on a computing device.
A network information system, and a method of operation thereof, includes: an extraction module for extracting a unique device identification for sending to an e-commerce server, wherein the unique device identification is extracted from a network-connected device with a software application installed and not activated on the network-connected device; a settlement process module, coupled to the extraction module, for generating a notification based on the unique device identification for sending to a license server; and a key generation module, coupled to the settlement process module, for generating a product key for the unique device identification based on the notification for activating the software application to run on a computing device.
A security system for an external data storage apparatus and method of control thereof includes: a data storage, in which data is stored; a high-speed serial bus, which connects the data storage with a data terminal, which reads and writes the data stored in the data storage; a key input unit, which converts an identification (ID), which is input by operation of the user, to an electrical signal and outputs the converted signal; a memory, which stores and sets the ID input by the key input unit; and a control circuit, which, when the ID input by the key input unit is applied, compares the input ID with the preset ID stored in the memory and drives the data storage based on the compared results.
G06F 1/16 - Constructional details or arrangements
G06F 3/0362 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
An electronic memory system and method of operation thereof includes: a manipulatable lock for receiving an input; a controller for enabling a communication channel from a connector to the controller based on the input; a locking function controller for unlocking a locking function for providing access to a data transfer function; and a transfer function controller for enabling the data transfer function for transferring data from a memory to the controller.
G06F 1/16 - Constructional details or arrangements
G06F 3/0362 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 1/26 - Power supply means, e.g. regulation thereof
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
An authentication system and method of operation thereof includes: an input device for receiving a login credential for inputting into a memory lock system; a controller for detecting a communication channel from the memory lock system to an electronic system; a locking function controller for setting an unlocked status to a memory of the memory lock system based on the login credential; a transfer function controller for providing authentication information from the memory based on the unlocked status; and wherein: the controller is for enabling an access to an account based on the communication channel and based on the authentication information.
G06F 3/0362 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 1/16 - Constructional details or arrangements
G06F 1/26 - Power supply means, e.g. regulation thereof
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
H04L 29/06 - Communication control; Communication processing characterised by a protocol
51.
DATA STORAGE SYSTEM WITH REMOVABLE DEVICE AND METHOD OF OPERATION THEREOF
A data storage system, and a method of operation thereof, includes: an interface module for creating a login credential for storing on a removable storage device; a backup module, coupled to the interface module, for transferring data for an automatic backup of the removable storage device to a remote backup system based on the login credential and a status of the removable storage device; and a close module, coupled to the backup module, for disconnecting an application from a cloud backup service for closing a connection between a computing device and the remote backup system with the data from the automatic backup.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 9/44 - Arrangements for executing specific programs
52.
Data storage system with removable device and method of operation thereof
A data storage system, and a method of operation thereof, includes: an interface module for creating a login credential for storing on a removable storage device; a backup module, coupled to the interface module, for transferring data for an automatic backup of the removable storage device to a remote backup system based on the login credential and a status of the removable storage device; and a close module, coupled to the backup module, for disconnecting an application from a cloud backup service for closing a connection between a computing device and the remote backup system with the data from the automatic backup.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
53.
Foldable electrical connector-housing system and method of manufacture thereof
A method of manufacture of a foldable electrical connector-housing system includes: providing a first end panel having an outer first end panel side with first end panel contacts that substantially span from one edge of the outer first end panel side to an opposite edge of the outer first end panel side; providing a second end panel having an outer second end panel side, the second end panel and the first end panel with the outer second end panel side facing away from the outer first end panel side and the first end panel contacts exposed in a folded configuration; mounting an electronic component between the outer first end panel side and the outer second end panel side; and connecting a conductor to the first end panel contacts and the electronic component.
A portable media system for a host computer system and method of operation thereof includes: metadata programming in the portable media system, the metadata programming for constructing metadata of a file in the portable media system; and construction programming for constructing new metadata in the portable media system in response to a new file loaded into the portable media system.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
A music tempo calculation system includes an amplitude adjuster for receiving an electrical signal of the music and outputting an amplitude-adjusted electrical signal; a detector for receiving said amplitude-adjusted electrical signal and outputting a beat signal when an amplitude of said amplitude-adjusted electrical signal exceeds a threshold value; and a computer for receiving said beat signal and calculating the tempo of the music.
A method of manufacture of a foldable electrical connector-housing system includes: providing a first end panel having an outer first end panel side with first end panel contacts that substantially span from one edge of the outer first end panel side to an opposite edge of the outer first end panel side; providing a second end panel having an outer second end panel side, the second end panel and the first end panel with the outer second end panel side facing away from the outer first end panel side and the first end panel contacts exposed in a folded configuration; mounting an electronic component between the outer first end panel side and the outer second end panel side; and connecting a conductor to the first end panel contacts and the electronic component.
A music tempo calculation system uses a microphone to input ambient music; the input is then processed in real time to display beats per minute (BPM). Input from the microphone is decomposed by a detector into a plurality of digital signals ranging from a most sensitive signal to a least sensitive signal. A software-implemented algorithm is applied to the time between peak music values to determine tempo. BPM is then output to a display to provide feedback to performing musicians regarding tempo. The sensitivity of the detector adjusts automatically to compensate for changes in music volume. In another embodiment, the calculated tempo is used to control motors used to animate toys. Once BPM is known, the moment of an upcoming beat can be anticipated. It then becomes possible to start, stop, and reverse directions of a motor in anticipation of an upcoming beat thereby providing the appearance the animated toy is responding to music beat.
A system and method of manufacture of a foldable electrical connector-housing system includes: a first end panel with an outer first end panel side having first end panel contacts; a second end panel having an outer second end panel side; a clip mechanism in at least one of the two end panels for attaching the foldable electrical connector-housing system to a flat surface; a fold mechanism is connected between the first end panel and the second end panel for folding into a folded configuration; and an electronic unit on the first end panel, the electronic unit coupled to the first end panel contacts.
H01R 43/18 - Apparatus or processes specially adapted for manufacturing, assembling, maintaining, or repairing of line connectors or current collectors or for joining electric conductors for manufacturing bases or cases for contact members
H05K 5/02 - Casings, cabinets or drawers for electric apparatus Details
59.
Power supply system with automatic sensing mechanism and method of operation thereof
A method of operation of a power supply system includes: providing a source voltage with a power source; generating a device voltage with the source voltage; monitoring the source voltage and the device voltage; and supplying the device voltage to a mobile device with the device voltage controlled by a control unit.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer hardware and software systems for use in the fields of data security, data storage and backup, encryption, authentication, automatic syncing, smart mobile chargers, and the Internet-of-Things Design and development services of computer hardware and software for others in the fields of data security, data storage and backup, encryption, authentication, automatic syncing, smart mobile chargers, and the Internet-of-Things
A data security system includes providing a unique identification from a first system to a second system; copying the unique identification in the second system by the first system; and unlocking a memory in the first system or the second system only when the unique identifications in the first system and the second system are the same.
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
A self-authenticating credit card includes an input device for entering a PIN. The PIN is accepted by a micro-controller that uses the entered PIN as an encryption key for decrypting stored account information. A portion of the account information includes data, that when decrypted, contains an image that is rendered on an integral display, with account information sent to a transaction terminal. A timer is used to limit access to account data while in the unlocked state.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
67.
Encryption key generation in encrypted storage devices
A system and method of generating an encryption key in a self-encrypting mass storage device that includes using a manual input device as input for a micro-controller that contains a cyclic counter. An input device event triggers the micro-controller to read the current state of the cyclic counter. An accumulation of cyclic counter values is used as a source of entropy to seed a deterministic random number generator. The output of the deterministic random number generator is used as an encryption key for encryption/decryption processes within the mass storage device.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
G06F 21/80 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
H04L 29/06 - Communication control; Communication processing characterised by a protocol
A battery power supply with extended shelf-life is composed of a plurality of batteries connected in series with a switching element and voltage booster. The switching element is composed of a transistor in parallel with a passive component that produces a voltage drop when the transistor is off. The voltage booster maintains an output voltage at set value when battery capacity deteriorates. A micro-controller is used to monitor voltage potentials to detect the presence of an external load. When no load is detected, all active components are disabled to conserve energy and avoid self-discharge.
H02M 3/156 - Conversion of DC power input into DC power output without intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H02J 1/00 - Circuit arrangements for dc mains or dc distribution networks
42 - Scientific, technological and industrial services, research and design
Goods & Services
[ Computer services, namely, on-site management of the information technology (IT) systems; Computer services, namely, remote and on-site management of cloud computing systems and applications for others; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer services, namely, remote and on-site management of the information technology (IT) systems of others; Computer services, namely, search engine optimization; Consultation services in the field of search engine optimization; Consulting services in the field of cloud computing; ] Consulting services in the field of computer-based information systems for businesses; Consulting services in the field of identification, support, and implementation of computer-based information systems for businesses; Information technology consultation [ ; Planning, design and management of information technology systems; Technical consulting and assistance with computer-based information systems and components; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems ]
71.
Encrypting portable media system and method of operation thereof
A portable media system for a host computer system, and method of operation thereof, that includes: a controller in the portable media system for communicating clear information between the portable media system and the host computer system; and an encryption system in the portable media system for providing an encryption algorithm for the controller to decrypt cipher information for the host computer system.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 12/14 - Protection against unauthorised use of memory
72.
Portable media system with virus blocker and method of operation thereof
A portable media system with a host computer system and method of operation thereof includes: accessing a public partition of the portable media system for a virus blocker for activation on the host computer system, the portable media system having a private partition for storing a file; sending a command from the virus blocker on the host computer system to open the private partition in the portable media system when the virus blocker is downloaded on the host computer system; blocking transfer of a virus between the host computer system and the portable media system with the virus blocker executing on the host computer system; and sending a command from the virus blocker on the host computer system to close the private partition when the virus blocker terminates activity on the host computer system.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
A data security system is provided that includes: verifying the user by providing user identification to retrieve an authentication key; employing the authentication key for retrieving an encryption key; and employing the encryption key for allowing unencrypted communication through a storage subsystem between a host computer system and a storage media.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
A stored-power system operating method includes: providing a human-input power-up signal from a stored-power source; turning on power for a power-using-system in response to the human-input power-up signal; and waiting for a predetermined power-down signal provided by the power-using system and determined by current to turn off power to the power-using-system to zero power consumption.
H01H 47/00 - Circuit arrangements not adapted to a particular application of the relay and designed to obtain desired operating characteristics or to provide energising current
A self-authenticating credit card method includes: inputting a unique identification to an input device on a credit card; comparing the input unique identification with a stored unique identification stored within the credit card; and providing an output from the credit card when the received unique identification matches the unique identification stored within the credit card.
G06K 7/00 - Methods or arrangements for sensing record carriers
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
A method of operation of an encryption bridge system that includes: verifying an authentication parameter using a self-authenticating encryption bridge; and controlling encryption for using the self-authenticating encryption bridge disposed between a computer system and a storage system in response to the verification including determining whether data is received from the computer system or received from the storage system.
G06F 21/80 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
77.
Foldable electrical connector-housing system and method of manufacture thereof
A method of manufacture of a foldable electrical connector-housing system includes: providing a first end panel having an outer first end panel side with first end panel contacts that substantially span from one edge of the outer first end panel side to an opposite edge of the outer first end panel side; providing a second end panel having an outer second end panel side, the second end panel and the first end panel with the outer second end panel side facing away from the outer first end panel side and the first end panel contacts exposed in a folded configuration; mounting an electronic component between the outer first end panel side and the outer second end panel side; and connecting a conductor to the first end panel contacts and the electronic component.
A method (700) of operation of a computing input system (100) includes: entering a memory access code (118) with a button (102), a wheel (106), or a device transceiver (612) for a non-physical mechanism (614); verifying the memory access code (118) with an authentication module (208); and enabling a secure storage sub-system (206) with the memory access code (118) verified by the authentication module (208) for accessing the secure storage sub-system (206) from an external computing device (202).
A method of operation of a self-locking mass storage system includes: providing storage media and an inactivity timer; timing a period of read/write inactivity of the storage media using the inactivity timer; comparing the period of read/write inactivity against a preset maximum idle time; locking access to the storage media when the period of read/write inactivity exceeds the preset maximum idle time; and, resetting the period of read/write inactivity following read/write activity while the self-locking mass-storage system is in an unlocked state.
A stored-power system (100) operating method (900) including: providing a human- input power-up signal (308) from a stored-power source (202); turning on power (310) for a power-using-system (304) in response to the human-input power-up signal (308); and waiting for a predetermined power-down signal (312) to turn off power (310) to the power-using- system (304) to zero power consumption.
A self-authenticating credit card method (1100) includes: inputting a unique identification (105) to an input device (200) on a credit card (102); comparing the input unique identification (105) with a stored unique identification (105) stored within the credit card (102); and providing an output (104) from the credit card (102) when the received unique identification (105) matches the unique identification (105) stored within the credit card (102).
A data security system (500) is provided that includes: verifying the user (122) by providing user identification (202) to retrieve an authentication key (118); employing the authentication key (118) for retrieving an encryption key (116); and employing the encryption key (116) for allowing unencrypted communication through a storage subsystem (106) between a host computer system (120) and a storage media (112).
A data security system includes providing a unique identification from a first system to a second system; copying the unique identification in the second system by the first system; and unlocking a memory in the first system or the second system only when the unique identifications in the first system and the second system are the same.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
09 - Scientific and electric apparatus and instruments
Goods & Services
External computer memories with a built-in input mechanism and built-in software for self-authenticating the user and data encryption for secure data storage
A memory protection system is provided with a user input key (206). The user input key (206) is compared with an internal private key (208) in a memory security circuit (213) having an integral connection with a solid-state memory (216) for controlling data flow therefrom.
A memory lock system is provided that includes: providing a controller; providing a connector connected to the controller for providing data to the controller; providing a memory connected to the controller for receiving and storing information from the controller; and manipulating an input device connected to the controller to unlock or lock data transfer between the connector and the controller, in the controller, between the connector and the memory, or in the memory.
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 1/16 - Constructional details or arrangements
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 3/0362 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
An information backup system [700] is provided including receiving information from a memory in a handheld device [104]; writing the information into a removable non-volatile memory [106] in an information backup device [102]; and rewriting the information from the removable non-volatile memory [106] into a different handheld device [204].