Patent application number | Description | Published |
20090119782 | METHOD AND DEVICE FOR DIGITAL RIGHTS PROTECTION - Data stored in a memory are provided to a host by monitoring how the host accesses the data, and by responding to a deviation of the access from a dynamic access profile that corresponds to the data, e.g. by terminating the access, by issuing a report of the deviation, or by sending spurious data to the host. Preferably, the dynamic access profile is stored in the memory in association with the data. A data storage device includes a memory for storing the data and an access control mechanism. | 05-07-2009 |
20090164746 | METHODS AND DEVICES FOR EXPANDABLE STORAGE - Embodiments described herein disclose methods and devices for expanding the storage capacity in a storage device, including the steps of creating at least one partition in a storage memory of the storage device; designating a reserved-storage area and an enabled-storage area in at least one partition; storing a partition size in a FAT of the storage memory; and upon authorization, increasing the partition size to include sectors in the reserved-storage area, thereby expanding the storage capacity in a storage device. Preferably, the reserved-storage area is not accessible by a host system. Preferably, the partition size is determined from a partition range stored in a master boot record in the storage memory. Most preferably, the partition range is determined from an enabled capacity stored in a memory-management area in the storage memory, and wherein the memory-management area is not accessible by a host system. | 06-25-2009 |
20090164804 | SECURED STORAGE DEVICE - A method of preventing unauthorized access to digital content includes obtaining from a trusted entity a public key of a public-private key pair, encrypting content being received by a storage device using the public key, and storing the encrypted content on the storage device. The public-private key pair includes the public key and a corresponding private key. The content is encrypted on the storage device using the public key so as to be decipherable using a corresponding private key. Access to the corresponding private key is restricted to the trusted entity alone and encrypted content may be decipherable by the trusted entity, only after an indication of authorization for use of the corresponding private key is provided to the trusted entity. Also provided is a method of controlling access to encrypted content that is stored on a storage device operating as a secure storage device. | 06-25-2009 |
20090172219 | DEVICE AND METHOD FOR AUTOMATICALLY LAUNCHING APPLICATIONS RESIDING ON USB FLASH DRIVES - A USB peripheral device may automatically launch an application residing in its memory after it is connected to a host or after restarting the host if the USB flash drive has already been connected. Alternatively, the USB peripheral \device can automatically launch an application residing on the host or on a network, which is accessible by the host. The USB peripheral device has a USB interface and a controller, which is operative to execute instructions for sending and receiving messages through the USB interface. The controller is further operative, when executing the instructions, to send to a host a stream of emulated keystrokes, which emulated keystrokes cause the host to generate and execute a startup script. Embodiments of the invention include a USB peripheral device able to control a host and a method of using a USB peripheral device to control a host. | 07-02-2009 |
20090172275 | DATA USAGE PROFILING BY LOCAL STORAGE DEVICE - A local storage device (LSD) is provided configured to have a host device (HD) in communication with the LSD. The LSD includes a memory array. The LSD is configured to characterize data access usage of the LSD by at least one program executing on the HD. The LSD is configured to monitor access to the LSD as a result of data access operations by the HD relative to the memory array of the LSD. The LSD is additionally configured to determine characteristics of the monitored access. The LSD is additionally configured to, based on characteristics of the monitored access, determine and store data on the LSD indicative of the characterized monitored access. | 07-02-2009 |
20090191843 | METHOD OF RECRUITING A NEW SUBSCRIBER TO A COMMUNICATION SERVICES PROVIDER - To recruit a new subscriber to a communication services provider, when a request is received, from a host of an identity module that lacks any portion of a provider profile that associates the identity module with a communication services provider, to provide a customization suite for installing substantially all of the provider profile in the identity module, terms of usage are proposed to the host. If the host consents to the terms of usage, the customization suite is sent to the host. | 07-30-2009 |
20090191916 | GENERIC IDENTITY MODULE FOR TELECOMMUNICATION SERVICES - An identity module includes a memory and a processor. In the memory are stored installation code for installing in the memory a customization suite that associates the identity module with a communication services provider and communication code that, in combination with the customization suite, supports communication by a host of the identity module using services of the communication services provider. The processor executes the installation code to install the customization suite and then executes the communication code in support of the communication. Preferably, no portion of any such communication suite is stored initially in the identity module. The host requests the customization suite from a server that includes a communication interface for communicating with the host, a memory wherein is stored code for providing substantially the entire customization suite to the host, and a processor for executing the code. | 07-30-2009 |
20090191918 | GENERIC IDENTITY MODULE FOR TELECOMMUNICATION SERVICES - An identity module includes a memory and a processor. In the memory are stored installation code for installing in the memory a provider profile that associates the identity module with a communication services provider and communication code that, in combination with the provider profile, supports communication by a host of the identity module using services of the communication services provider. The processor executes the installation code to install the provider profile and then executes the communication code in support of the communication. Preferably, no portion of any such communication suite is stored initially in the identity module. The host requests the provider profile from a server that includes a communication interface for communicating with the host, a memory wherein is stored code for providing to the host a customization suite that includes substantially all of the provider profile, and a processor for executing the code. | 07-30-2009 |
20090287349 | Device for controlling access to user-selectable content - A device having user-selectable content includes a storage having the capacity to store pre-loaded content and a controller. The controller is operative to manage access to the pre-loaded content, by way of limiting the access to a user-selected portion of the pre-loaded content. The controller limits access subject to and performed according to an indication of an initial purchase transaction. Also provided is a controller that includes a processing unit and an interface to a memory. The processing unit is operative to manage access to pre-loaded content stored on the memory. | 11-19-2009 |
20090288173 | Method for controlling access to user-selectable content - A method of controlling access to user selectable content includes receiving, by a storage controller, an indication of an initial purchase transaction; and managing access to the pre-loaded content. The indication of the initial purchase transaction is associated with pre-loaded content in a storage that is controlled by the storage controller, the indication including user-selected identification of or criteria for delineating a particular portion of the pre-loaded content. The access management includes limiting the access to the particular portion of the pre-loaded content and making such limited access subject to and performed according to the indication of the initial purchase transaction. | 11-19-2009 |
20090300227 | METHOD OF MONITORING HOST ACTIVITY - A method of using a device, including monitoring host activity in an autonomous manner, without the host reporting to the device about its activity. The method also including initiating communications from the device and using resources of the host for such communications, thereby enabling the device to function as a proactive device. | 12-03-2009 |
20090327528 | DATA STORAGE METHOD WITH MULTIPLE PROTOCOLS FOR PRELOADING DATA - A method uses multiple communication modes for fast uploading of a datum preloaded from a manufacturing device to a data storage device over existing external contacts of the data storage device. Preferentially the data storage device is a high capacity SIM card and a user mode allows communication by standard protocols such as ISO, SD/MMC and USB whereas a manufacturer mode applies a multi data line SD/MMC protocol or a custom protocol for high speed data uploading. | 12-31-2009 |
20090327529 | DATA STORAGE DEVICE WITH MULTIPLE PROTOCOLS FOR PRELOADING DATA - A system uses multiple communication modes for fast uploading of a datum preloaded from a manufacturing device to a data storage device over existing external contacts of the data storage device. Preferentially the data storage device is a high capacity SIM card and a user mode allows communication by standard protocols such as ISO, SD/MMC and USB whereas a manufacturer mode applies a multi data line SD/MMC protocol or a custom protocol for high speed data uploading. | 12-31-2009 |
20100011163 | PORTABLE DEVICE FOR MANAGING MEMORY CARDS - A portable device includes n (n≧2) electrical sockets, each of which is configured to accommodate and to electrically engage a removable external memory card; an input device for selecting accommodated and electrically engaged external memory cards for data reading; and an output device for outputting information that is derived from or related to data read from such selected electrically engaged external memory cards. The information may pertain to digital content of the selected external memory card, to the identity of the selected external memory card, or to the storage capacity of the selected external memory card. | 01-14-2010 |
20100036973 | Storage device for mounting to a host - A storage device comprising a non-volatile memory for storing data, and an input device that is operative to select an operating mode of the storage device prior to mounting the storage device, such that each operating mode represents a different type of storage device. A controller interfaces with the input device to establish the selected operating mode of the storage device once the storage device is mounted. | 02-11-2010 |
20100235605 | ENHANCEMENT OF STORAGE LIFE EXPECTANCY BY BAD BLOCK MANAGEMENT - A method and system are disclosed that permit a storage device to remain fully functional despite running out of a sufficient supply of spare blocks in memory. The storage device includes a non-volatile memory and a controller, where the controller is configured to detect an insufficiency of spare blocks and convert operative blocks to spare blocks. The method includes techniques for selecting certain operative blocks for conversion to spare blocks using the storage manager on the storage device and a file system manager that may or may not be part of the storage device. | 09-16-2010 |
20100299744 | SERVICE BINDING METHOD AND SYSTEM - A method and system of binding content is disclosed. A non-volatile storage device creates a secure communication channel with a service provider system via a host device, and obtains a content access authorization. The host device facilitates the establishment of the secure communication channel. A removable device in communication with the host is bypassed when establishing the secure communication channel. The authorization may be based on identification information transmitted by the non-volatile storage device to the service provider system over the secure communication channel. The identification information may identify the non-volatile storage device, the host device, or the subscriber to the service provider system. The service provider system, in turn, may use the identification information to determine the type of authorization (if any) to send to the non-volatile storage device. The non-volatile storage device processes requests received from the host device to access the content according to the received authorization. | 11-25-2010 |
20100311394 | MOBILE SYSTEM FOR PROVIDING PERSONALIZED INFORMATION - An information system includes a server that creates an information reservoir with data units for a user of a mobile communication device based on a unique user profile of the user of the mobile communication device. The server creates the unique user profile based on interaction of the user with the mobile communication device or with another computing system. The server transfers the information reservoir to the mobile communication device and each time the user requests data from a web site, the server scans it to find key terms. If the server finds key term(s) in the data, it uses a tagging rule to mark the key term(s) and, then, it transfers the data with the marked term(s) to the mobile communication device. The user may, then, select a marked key term to call/display a data unit that is locally stored on the mobile communication device. The server may also mark terms in data units and a data unit stored on the mobile communication device may be called using a key term that is marked in another data unit. | 12-09-2010 |
20110022665 | DEVICE IDENTIFIER SELECTION - Systems and methods of device identifier selection are disclosed. In a particular embodiment, a method includes receiving an enumeration message via a host interface of a device operatively coupled to a host device as well as to one or more other devices and identifying the enumeration message as a command originated by the host device or as a response message from one of the other devices. The method includes, in response to identifying the enumeration message as a command, selectively sending an enumeration response message to the host device. The enumeration response message indicates a distinctive device identifier value. The method also includes, in response to identifying the enumeration message as a response message from one of the other devices, reading from the response message an identifier value used by such other device and at least temporarily storing this identifier value at the device to enable the device to select the distinctive device identifier value. | 01-27-2011 |
20110078341 | METHOD OF MONITORING HOST ACTIVITY - A method of using a device, including monitoring host activity in an autonomous manner, without the host reporting to the device about its activity. The method also including initiating communications from the device and using resources of the host for such communications, thereby enabling the device to function as a proactive device. | 03-31-2011 |
20110302224 | DATA STORAGE DEVICE WITH PRELOADED CONTENT - Data storage devices and methods that maintain pre-loaded content in storage available to a user are disclosed. A method may include, in a data storage device with a non-volatile memory and a file system database, storing content at a first location in the non-volatile memory and storing metadata at a second location of the non-volatile memory. The metadata includes an indicator of the first location for use during retrieval of the stored content from the first location. After storing the content and the metadata, the first location and the second location are denoted as empty by the file system database. | 12-08-2011 |
20120005557 | VIRTUAL COPY AND VIRTUAL WRITE OF DATA IN A STORAGE DEVICE - A storage device with a memory and a controller, and a method of copying data on a storage device are provided to perform virtual copy and virtual write of data in a storage device without physically storing data in the storage device. The controller includes, or incorporates with an executable module that handles a command to copy data from a source logical address to a destination logical address, where the source logical memory address data is already associated with a first physical memory address storing the data. | 01-05-2012 |
20120023297 | USING AN ADD-ON STORAGE DEVICE FOR EXTENDING THE STORAGE CAPACITY OF A STORAGE DEVICE - A storage device with a memory, a controller, a storage device interface and a host interface, and a method of data transfer to and from a storage device are provided. The storage device is operative to connect with a host device and the storage device interface is operative to couple with an add-on memory. When the host interface is connected to a host device, the controller is configured to receive a data transfer command specifying a memory address from the host interface; and if the memory address is beyond the address space of the memory, to route the data transfer command to the storage device interface for access to the add-on memory. The address space of the memory and an address space of the add-on memory are addressed as one integral address space transparently to the host. | 01-26-2012 |
20120023298 | USING AN ADD-ON STORAGE DEVICE FOR EXTENDING THE STORAGE CAPACITY OF A STORAGE DEVICE IN A HOST DEVICE - A storage device with a memory, a controller, a storage device interface and a host interface, and a method of data transfer to and from a storage device are provided. The storage device is operative to connect with a host device and the storage device interface is operative to couple with an add-on memory. When the host interface is connected to a host device, the controller is configured to receive a data transfer command specifying a memory address from the host interface; and if the memory address is beyond the address space of the memory, to route the data transfer command to the storage device interface for access to the add-on memory. The address space of the memory and an address space of the add-on memory are addressed as one integral address space transparently to the host. | 01-26-2012 |
20120140401 | REMOTE ATTACHABLE FLASH DRIVE - A sticky drive includes a flash storage device and a mounting structure having a stickable surface. The mounting structure is coupled to the flash storage device to enable a user to attach the flash storage device to a user-selected object. | 06-07-2012 |
20120277636 | APPARATUS AND METHOD FOR REAL-TIME MEASUREMENT OF CHANGES IN VOLUME OF BREAST AND OTHER ORGANS - An apparatus and method for determination of change in volume of a body part or body organ on a real-time basis. In a breastfeeding application, an inflatable cuff is positioned on a nursing breast and allows direct access to the nipple by the breastfeeding infant. The inflatable cuff includes an outer shell portion and an inner inflatable bladder. The pressure in the bladder is monitored regularly by a pressure sensor, during a breastfeeding session. When the pressure drops below a preselected pressure, a controller directs a pump to pump air into the inflatable bladder to maintain the preselected pressure. The volume of added air is monitored during the breastfeeding session. Various calibrations are used to correlate the amount of added air, to the volume of breast milk withdrawn from the breast. The volume of breast milk withdrawn during breastfeeding is calculated and displayed throughout the breastfeeding session. | 11-01-2012 |
20120284455 | Storage Device for Mounting to a Host - A storage device comprising a non-volatile memory for storing data, and an input device that is operative to select an operating mode of the storage device prior to mounting the storage device, such that each operating mode represents a different type of storage device. A controller interfaces with the input device to establish the selected operating mode of the storage device once the storage device is mounted. | 11-08-2012 |
20130151677 | DEVICE IDENTIFIER SELECTION - A method includes receiving an enumeration message via a host interface of a device that is operatively coupled to a host device and to one or more other devices. The method includes identifying the enumeration message as a command originated by the host device or as a response message from one of the other devices. In response to identifying the enumeration message as a command, an enumeration response message is sent to the host device. The enumeration response message indicates a distinctive device identifier value. The method also includes, in response to identifying the enumeration message as a response message from one of the other devices, reading from the response message an identifier value used by such other device and at least temporarily storing this identifier value at the device to enable the device to select the distinctive device identifier value. | 06-13-2013 |
20140289378 | DEVICE IDENTIFIER SELECTION - A method includes receiving an enumeration message via a host interface of a device that is operatively coupled to a host device and to one or more other devices. The method includes identifying the enumeration message as a command originated by the host device or as a response message from one of the other devices. In response to identifying the enumeration message as a command, an enumeration response message is sent to the host device. The enumeration response message indicates a distinctive device identifier value. The method also includes, in response to identifying the enumeration message as a response message from one of the other devices, reading from the response message an identifier value used by such other device and at least temporarily storing this identifier value at the device to enable the device to select the distinctive device identifier value. | 09-25-2014 |