Abstract:
A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
Abstract:
Embodiments of the invention include a caching device for temporary storage of content generated using a content-generating device. The caching device and the content-generating device can be operatively coupled. The caching device can be worn on a user's body. The caching device includes a housing, a power source supported by the housing, a storage device adapted to store content, and an antenna supported by the housing. The antenna can transmit or receive content from/to the storage device to/from a content-generating device. The caching device can consume low power and can transfer content at low data rates.
Abstract:
The present invention relates to a method and device for scanning of data for signatures prior to storage. First data are received at a storage device for storage therein. Upon receipt the first data are stored in a temporary storage medium for storing other than guaranteed previously scanned data. Using a processor of the storage device, the first data are compared with at least a predetermined signature and a comparison result is determined in dependence thereupon. In dependence upon the comparison result the first data are provided to the scanned data memory when the comparison result is indicative of other than a match or the first data are other than provided to the scanned data memory when the comparison result is indicative of a match. The method and the device according to the invention substantially reduce the risk that a file infected with a computer virus is transferred from one computer to another via a portable storage medium. In another aspect of the invention, the method and the device according to the invention prevents storage of sensitive data by unauthorized persons.
Abstract:
The present disclosure relates to a perpendicular pole head for creating a perpendicular magnetic moment in a concentrated pattern for writing the pattern on perpendicular magnetic media, such as BaFe based media. The pole head can have flux concentrators in the shape of the written pattern, which can be repeatedly applied to a moving magnetic medium to create a timing pattern on the media, e.g., a servo timing pattern.
Abstract:
Embodiments of the present disclosure provide a unique and novel archiving system that includes two or more network storage systems, each network storage system including removable hard disk drives embedded in removable disk cartridges, referred to simply as removable disk drives. The removable disk drives allow for expandability and replacement such that the archiving system need not be duplicated to add new or more storage capacity. In embodiments, the archiving system accesses, writes, reads, or performs functions on data from one network storage system to another remote network storage system.
Abstract:
Techniques for recovering from unexpected removal of (or other unexpected power loss) a flash memory device from a computer system. An interpolated device driver notes whenever the flash memory device is unexpectedly removed, or otherwise unexpectedly powers off or enters a locked state. If the flash memory device is reinserted, the interpolated device driver reinitializes the flash memory device, and satisfies any flash memory device security protocol, so the flash memory device and the computer system can be restored to their status just before unexpected removal. The interpolated device driver caches requests to the flash memory device, and when status is restored to just before removal, replays those requests to the flash memory device, so the flash memory device responds to those requests as if it had ever been removed. The computer system does not notice any break in service by the flash memory device due to removal and reinsertion.
Abstract:
Storage media, systems, and techniques for storing and accessing information in a servo band are described. For example, the distances between adjacent servo patterns written to the servo band may be varied to represent the supplemental information stored in the servo band. Each of the varied distances may be selected to represent physical parameters of the storage medium, servo recording conditions, or data unrelated to the servo patterns, for example. The supplemental information may be recovered from the servo band by demodulating a signal generated from a servo read head. The distances between each servo pattern in the track may be calculated from the time periods detected in the signal between servo marks of subsequent servo patterns. In some examples, a controller may adjust one or more parameters associated with reading or writing servo marks or data marks of the storage media.
Abstract:
A method for making memory more reliable involves accessing data stored in a removable storage device by translating a logical memory address provided by a host digital device to a physical memory address in the device. A logical memory address is received from the host digital device. The logical memory address corresponds to a location of data stored on the removable storage device. A physical memory address corresponding to the local address is determined by accessing a lookup table corresponding to the logical zone.
Abstract:
A cloud-based hardware security device (HSM) providing core security functions of a physically controlled HSM, such as a USB HSM, while allowing user access within the cloud and from a user device, including user devices without input ports capable of direct connection to the HSM. The HSMs can be connected to multi-HSM appliances on the organization or user side of the cloud network, or on the cloud provider side of the cloud network. HSMs can facilitate multiple users, and multi-HSM appliances can facilitate multiple organizations.
Abstract:
The present disclosure relates to an audio player and speaker system, and particularly, to a wireless audio player and speaker system. More particularly, the present disclosure relates to a semi-permanent, wireless boombox-style audio player, for playing audio from an external audio source.