Abstract: A method (700) of operation of a computing input system (100) includes: entering a memory access code (118) with a button (102), a wheel (106), or a device transceiver (612) for a non-physical mechanism (614); verifying the memory access code (118) with an authentication module (208); and enabling a secure storage sub-system (206) with the memory access code (118) verified by the authentication module (208) for accessing the secure storage sub-system (206) from an external computing device (202).
Abstract: A data security system (500) is provided that includes: verifying the user (122) by providing user identification (202) to retrieve an authentication key (118); employing the authentication key (118) for retrieving an encryption key (116); and employing the encryption key (116) for allowing unencrypted communication through a storage subsystem (106) between a host computer system (120) and a storage media (112).
Abstract: A stored-power system (100) operating method (900) including: providing a human-input power-up signal (308) from a stored-power source (202); turning on power (310) for a power-using-system (304) in response to the human-input power-up signal (308); and waiting for a predetermined power-down signal (312) to turn off power (310) to the power-using-system (304) to zero power consumption.
Abstract: A self-authenticating credit card method (1100) includes: inputting a unique identification (105) to an input device (200) on a credit card (102); comparing the input unique identification (105) with a stored unique identification (105) stored within the credit card (102); and providing an output (104) from the credit card (102) when the received unique identification (105) matches the unique identification (105) stored within the credit card (102).
Abstract: A memory protection method is provided with a user input key: The user input key is compared with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom.
Abstract: A method of operation of a software distribution system includes: providing a compute platform; applying an ad-subsidized application in the compute platform including: providing a software application, joining advertised content to the software application for creating a subsidized software application, and installing from a customized storage device or a global communication system to the compute platform the subsidized software application; providing a display from the compute platform for displaying the ad-subsidized application; and accessing a commercial content through the display while having access to the software application.
Abstract: A method of operation of a self-locking mass storage system includes: providing storage media and an inactivity timer; timing a period of read/write inactivity of the storage media using the inactivity timer; comparing the period of read/write inactivity against a preset maximum idle time; locking access to the storage media when the period of read/write inactivity exceeds the preset maximum idle time; and, resetting the period of read/write inactivity following read/write activity while the self-locking mass-storage system is in an unlocked state.
Type:
Application
Filed:
February 25, 2009
Publication date:
August 27, 2009
Applicant:
CLEVX, LLC
Inventors:
Simon B. Johnson, Lev M. Bolotin, William Storage
Abstract: A data security system [100] [800] [900] [1600] [2000] includes providing a unique identification from a first system [102] to a second system [104] [108]; copying the unique identification in the second system [104] [108] by the first system [102]; and unlocking a memory [122] in the first system [102] or the second system [104] [108] only when the unique identifications in the first system [102] and the second system [104] [108] are the same.
Abstract: A software and/or hardware transfer system is provided including: reading hidden computing device identification; reading computing device identification; and installing or uninstalling software only when the hidden computing device identification and the computing device identification from the computing device match or the hidden computing device identification is blank.
Abstract: A radio frequency identification system includes: supplying a radio frequency identification tag including providing a radio frequency identification transponder and writing transponder content to the radio frequency identification transponder; and feeding the radio frequency identification tag for an assembly line.
Abstract: A memory lock system (900) is provided that includes: providing a controller (212); providing a connector (204) connected to the controller (212) for providing data to the controller (212); providing a memory (216) connected to the controller (212) for receiving and storing information from the controller (212); and manipulating an input device (206) connected to the controller (212) to unlock or lock data transfer between the connector (204) and the controller (212), in the controller (212), between the connector (204) and the memory (216), or in the memory (216).