Patents Assigned to Memory Experts International, Inc.
  • Publication number: 20110078785
    Abstract: A method is disclosed for a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. In a second mode of operation, a portion of the peripheral portable desktop device is operatively coupled with the workstation for operation therewith to provide an ancillary function. In a first mode of operation data within the peripheral portable desktop device is used to support a personal desktop on the workstation.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20110078428
    Abstract: A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20110078787
    Abstract: A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data file relating to an image for being stored within the peripheral portable desktop device is provided. The image includes secured data that is other than accessible absent user authorization data of a virtual user. Within the peripheral portable desktop device is stored data reflective of the image. A first user is then authorized to the peripheral portable desktop device by providing first user authorization data. For the first user is created a user account secured based on the first user authorization data. The account of the virtual user is accessed via the user account and the user account is configured to access the account of the virtual user upon access to the user account.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence Hamid
  • Publication number: 20110078347
    Abstract: A method is disclosed for a portable peripheral memory storage device. The peripheral memory storage device is coupled with a workstation. In a first mode of operation, a portion of the peripheral memory storage device is mounted on the workstation for operation therewith as a storage medium in a first mode of operation. In a second other mode of operation data within the peripheral memory storage device is used to support a personal desktop on the workstation.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20100205355
    Abstract: A method of storing data within a plurality of memory devices is disclosed. Each memory device of the plurality of memory devices comprises flash memory, and supports a first data transfer rate, A. Data is provided from a data interface to a multiplexer using a second data transfer rate, B, which is faster than the data transfer rate, A. Using the multiplexer, the data is divided into N data portions. Each one of the N data portions is provided to a different memory device of the plurality of memory devices using a third data transfer rate B/N, wherein B/N?A. The N data portions are stored in parallel, each within a respective different memory device of the plurality of memory devices.
    Type: Application
    Filed: January 28, 2010
    Publication date: August 12, 2010
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Victor MOSKALIK
  • Publication number: 20100186084
    Abstract: A method comprises providing first user authentication data of a user and comparing the first user authentication data to first stored template data. When the comparison is indicative of a match, a first session is provided, which supports one of user access for retrieving first data that are stored within a peripheral memory storage device and user access for modifying a data content of the peripheral memory storage device. The first session does not support the other one of user access for retrieving first data that are stored within the peripheral memory storage device and user access for modifying a data content of the peripheral memory storage device. During the first session, second user authentication data of the same user is provided and compared to second stored template data.
    Type: Application
    Filed: January 21, 2010
    Publication date: July 22, 2010
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20100174909
    Abstract: A method for transmitting digital data to a recipient via a communications network includes providing digital data and digitally signing the digital data using N cryptographic keys. Each of the N cryptographic keys is associated with a same sender of the digital data, and N>1. The recipient receives the digital data and verifies the digital signature using N cryptographic keys associated with the N cryptographic keys used to sign the digital data. In dependence upon verifying the digital signature, the recipient accepts the digital data as being authentic.
    Type: Application
    Filed: December 15, 2009
    Publication date: July 8, 2010
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Scott Newman ASHDOWN
  • Publication number: 20100100966
    Abstract: A method includes providing a processor comprising memory for storing of blacklist data therein and memory for storing of programming data therein for execution on the processor. Version data indicative of a version of first programming data is retrieved from memory external to the processor. The version data is compared with blacklist data stored within the processor. When the blacklist data is indicative of the version data indicating a version of the programming data that is blacklisted, then the processor other than executes the first programming data.
    Type: Application
    Filed: October 20, 2009
    Publication date: April 22, 2010
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20100031372
    Abstract: When executing a licensing management application, data indicative of licensing privileges of a software application for simultaneous execution on a subset of a plurality of computers are received from a licensor of the software application. The data indicative of licensing privileges comprise data indicative of a licensing key. For each of a plurality of users a peripheral licensing device is provided and the data indicative of a licensing key are then stored in memory thereof. Data indicative of a total number of users—equal to a number of the subset—are determined and provided to the licensor, or storage of the licensing key is prevented, when the total number is greater than a predetermined number of the subset.
    Type: Application
    Filed: July 29, 2009
    Publication date: February 4, 2010
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20100031373
    Abstract: When executing a licensing management application, data indicative of licensing privileges of a software application for simultaneous execution on a subset of a plurality of computers are received from a licensor of the software application. The data indicative of licensing privileges comprise data indicative of a licensing key. For each of a plurality of users a peripheral licensing device is provided and the data indicative of a licensing key are then stored in memory thereof. Data indicative of a total number of users—equal to a number of the subset—are determined and provided to the licensor, or storage of the licensing key is prevented, when the total number is greater than a predetermined number of the subset.
    Type: Application
    Filed: July 29, 2009
    Publication date: February 4, 2010
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventor: Laurence HAMID
  • Publication number: 20100005317
    Abstract: Temporary digital data received for storage in non-volatile memory are encoded using a key stored in volatile memory. The encoded digital data are then stored in the non-volatile memory. As long as there has been no interruption of supply of power to the volatile memory, the key is available enabling decoding of the encoded digital data stored in the non-volatile memory. Upon interruption of supply of power to the volatile memory the key is erased. Absent the key, access to the encoded digital data stored in the non-volatile memory is prevented.
    Type: Application
    Filed: July 2, 2008
    Publication date: January 7, 2010
    Applicant: Memory Experts International Inc.
    Inventors: Kris Pribadi, Laurence Hamid
  • Publication number: 20090235081
    Abstract: A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Application
    Filed: March 16, 2009
    Publication date: September 17, 2009
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventors: Laurence HAMID, Darren KRAHN
  • Publication number: 20090106556
    Abstract: Disclosed is a method of improving electronic security by establishing a path between a user and a secure transaction appliance. The secure transaction appliance receiving information destined for the user which includes a tagged portion, said tagged portion triggering the secure transaction appliance to forward the information to the computer from which the request was issued, and to seeking an electronic signature to verify the content or transaction by transmitting a watermark, tagged portion of the content, or similar electronic content. The secure trusted path providing the user with the tagged portion incorporating additional elements such as a watermark, or in some embodiments only the additional elements, upon a personalized security device associated with the user making interception or manipulation more complex and difficult.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Applicant: Memory Experts International Inc.
    Inventor: Laurence Hamid
  • Publication number: 20090094597
    Abstract: A method of providing new functionality to an electronic product is provided. The new functionality for the electronic product being installed via a new firmware load from a memory card. The new firmware load being released to the electronic product upon the provision of an authentication by the user of the electronic product that matches the authentification credentials stored within the memory card. In a further embodiment of the invention the authentication further supports the transfer of additional content relating to the authenticated user thereby providing the electronic device with a “personality” determined by the user. In another embodiment of the invention the new firmware load is “personalized” to the memory card such that it cannot be illegally duplicated or copied thereby allowing vendors to provide via the Internet new functionalities for electronic products on a procurement basis.
    Type: Application
    Filed: October 2, 2008
    Publication date: April 9, 2009
    Applicant: Memory Experts International Inc.
    Inventors: Victor Moskalik, Laurence Hamid
  • Publication number: 20090049301
    Abstract: Electronic transactions employing prior art approaches of digital certificates and authentification are subject to attacks resulting in fraudulent transactions and abuse of identity information. Disclosed is a method of improving electronic security by establishing a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a predetermined portion of the request from the institution for a signature upon a personalized device that cannot be intercepted or manipulated by malware to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Application
    Filed: August 6, 2008
    Publication date: February 19, 2009
    Applicant: Memory Experts International Inc.
    Inventors: Laurence HAMID, Darren Krahn
  • Publication number: 20090044250
    Abstract: A set of commands is provided to a system for execution in order to modify a security related aspect of the system. The system executes the set of commands absent an intervening command being executed.
    Type: Application
    Filed: August 1, 2008
    Publication date: February 12, 2009
    Applicant: Memory Experts International Inc.
    Inventors: Darren KRAHN, Laurence Hamid
  • Publication number: 20080263352
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Application
    Filed: April 1, 2008
    Publication date: October 23, 2008
    Applicant: Memory Experts International Inc.
    Inventors: Darren Krahn, Laurence Hamid
  • Publication number: 20080134314
    Abstract: A method of secure communication involves determining that a remote system is trusted prior to authorizing secure communication therewith. A removable security device is coupled with a first system. When the first system communicates with a remote system securely, the remote system is evaluated to ensure that it is a trusted remote system prior to secure communication therewith being allowed.
    Type: Application
    Filed: September 10, 2007
    Publication date: June 5, 2008
    Applicant: Memory Experts International Inc.
    Inventor: Laurence Hamid
  • Publication number: 20080066176
    Abstract: A method of providing authorization, access rights, is provided wherein authentification/authorization for provision of a service is established between the system intended to provide the service and the user granting/limiting the access rights to the service being provided. Accordingly the request for providing a service by a system is communicated to a converged authentication device, typically a wireless device such as a cellular telephone or PDA, wherein authorization of the request is granted/denied. The converged authentification device thereby allowing authorization of the request to be given only by the owner of the access rights.
    Type: Application
    Filed: September 10, 2007
    Publication date: March 13, 2008
    Applicant: Memory Experts International Inc.
    Inventor: Laurence Hamid
  • Publication number: 20080060060
    Abstract: A method of secure communication involves determining that a remote system is trusted prior to authorizing secure communication therewith. A removable security device is coupled with a first system. When the first system communicates with a remote system securely, the remote system is evaluated to ensure that it is a trusted remote system prior to secure communication therewith being allowed.
    Type: Application
    Filed: August 28, 2007
    Publication date: March 6, 2008
    Applicant: Memory Experts International Inc.
    Inventor: Laurence Hamid