Abstract: A radio frequency identification system, and method of operation thereof, provides: a sensor for sensing the absence or presence of a radio frequency identification transponder at the radio frequency identification system; a supply system connected to the sensor for supplying the radio frequency identification transponder to the radio frequency identification system in the absence of the radio frequency identification transponder at the radio frequency identification system; and a programmer connected to the sensor for writing transponder content to the radio frequency identification transponder at the radio frequency identification system in the presence of the radio frequency identification transponder at the radio frequency identification system.
Abstract: A radio frequency identification system includes: supplying a radio frequency identification tag including providing a radio frequency identification transponder and writing transponder content to the radio frequency identification transponder; and feeding the radio frequency identification tag for an assembly line.
Abstract: A method of operation of a power supply system includes: providing a source voltage with a power source; generating a device voltage with the source voltage; monitoring the source voltage and the device voltage; and supplying the device voltage to a mobile device with the device voltage controlled by a control unit.
Abstract: A method (700) of operation of a computing input system (100) includes: entering a memory access code (118) with a button (102), a wheel (106), or a device transceiver (612) for a non-physical mechanism (614); verifying the memory access code (118) with an authentication module (208); and enabling a secure storage sub-system (206) with the memory access code (118) verified by the authentication module (208) for accessing the secure storage sub-system (206) from an external computing device (202).
Abstract: A data security system (500) is provided that includes: verifying the user (122) by providing user identification (202) to retrieve an authentication key (118); employing the authentication key (118) for retrieving an encryption key (116); and employing the encryption key (116) for allowing unencrypted communication through a storage subsystem (106) between a host computer system (120) and a storage media (112).
Abstract: A stored-power system (100) operating method (900) including: providing a human-input power-up signal (308) from a stored-power source (202); turning on power (310) for a power-using-system (304) in response to the human-input power-up signal (308); and waiting for a predetermined power-down signal (312) to turn off power (310) to the power-using-system (304) to zero power consumption.
Abstract: A self-authenticating credit card method (1100) includes: inputting a unique identification (105) to an input device (200) on a credit card (102); comparing the input unique identification (105) with a stored unique identification (105) stored within the credit card (102); and providing an output (104) from the credit card (102) when the received unique identification (105) matches the unique identification (105) stored within the credit card (102).
Abstract: A memory protection method is provided with a user input key: The user input key is compared with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom.
Abstract: A method of operation of a software distribution system includes: providing a compute platform; applying an ad-subsidized application in the compute platform including: providing a software application, joining advertised content to the software application for creating a subsidized software application, and installing from a customized storage device or a global communication system to the compute platform the subsidized software application; providing a display from the compute platform for displaying the ad-subsidized application; and accessing a commercial content through the display while having access to the software application.
Abstract: A method of operation of a self-locking mass storage system includes: providing storage media and an inactivity timer; timing a period of read/write inactivity of the storage media using the inactivity timer; comparing the period of read/write inactivity against a preset maximum idle time; locking access to the storage media when the period of read/write inactivity exceeds the preset maximum idle time; and, resetting the period of read/write inactivity following read/write activity while the self-locking mass-storage system is in an unlocked state.
Type:
Application
Filed:
February 25, 2009
Publication date:
August 27, 2009
Applicant:
CLEVX, LLC
Inventors:
Simon B. Johnson, Lev M. Bolotin, William Storage
Abstract: A data security system [100] [800] [900] [1600] [2000] includes providing a unique identification from a first system [102] to a second system [104] [108]; copying the unique identification in the second system [104] [108] by the first system [102]; and unlocking a memory [122] in the first system [102] or the second system [104] [108] only when the unique identifications in the first system [102] and the second system [104] [108] are the same.
Abstract: A software and/or hardware transfer system is provided including: reading hidden computing device identification; reading computing device identification; and installing or uninstalling software only when the hidden computing device identification and the computing device identification from the computing device match or the hidden computing device identification is blank.