METHOD AND APPARATUS OF STORAGE ANTI-PIRACY KEY ENCRYPTION (SAKE) DEVICE TO CONTROL DATA ACCESS FOR NETWORKS
First Claim
11. A method of anti-piracy for providing controlled disseminating information through computer networks, the method comprising:
- coupling a SAKE to a host system;
obtaining user'"'"'s fingerprint from fingerprint sensor;
verifying user'"'"'s identity according to fingerprint data stored in a first memory unit of SAKE;
retrieving a public key associated with the user from the first memory unit of SAKE;
providing the public key to the information provider via the computer networks through the host system;
establishing a communication between SAKE and an information provider when a message of verified public key is received;
obtaining information from the information provider; and
storing the information in a second memory unit of SAKE.
0 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method of modular manufacturing process for a transmitter, receiver and/or transceiver is disclosed. The modular process assembles an array of optoelectronic devices to an array header to form an optoelectronic array package. Once the optoelectronic array package is assembled, it is tested and verified the functionality and alignment between the optoelectronic devices and optical fibers. The optoelectronic array package is subsequently coupled to an optical lens array to form an array optical subassembly. After the array optical subassembly is tested, it is coupled to an optical fiber connector to form an optical module. The optical module is then tested to verify its functionality and alignment.
-
Citations
40 Claims
-
11. A method of anti-piracy for providing controlled disseminating information through computer networks, the method comprising:
-
coupling a SAKE to a host system;
obtaining user'"'"'s fingerprint from fingerprint sensor;
verifying user'"'"'s identity according to fingerprint data stored in a first memory unit of SAKE;
retrieving a public key associated with the user from the first memory unit of SAKE;
providing the public key to the information provider via the computer networks through the host system;
establishing a communication between SAKE and an information provider when a message of verified public key is received;
obtaining information from the information provider; and
storing the information in a second memory unit of SAKE. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
15-1. The method of claim 11, wherein the obtaining information from the information provider further includes:
-
sending an on-line transaction request to the information provider; and
receiving the information in response to the on-line transaction request.
-
-
21. An anti-piracy device for providing controlled disseminating information through Internet comprising:
-
a processor;
an internal memory unit, coupled to the processor, configured to store identification data;
a fingerprint sensor coupled to the processor and capable of reading user'"'"'s fingerprint;
a fingerprint verification unit, coupled to the fingerprint sensor, configured to authenticate user identity according to authentication data stored in the internal storage;
a flash memory unit coupled to the processor for storing large amounts of data;
a hashing algorithm unit coupled to the processor and configured to hash a public key for network access; and
a universal serial bus (“
USB”
) connector coupled to the processor for attaching to a system. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method for accessing restricted information by a user, said method comprising the steps of:
-
coupling a portable storage device to a communication port of a client computer, said client computer communicatively coupled to a content server over a network, said content server storing restricted information, said portable storage device having a biometric detector disposed thereon and being capable of verifying user identity against a stored biometric template of an authorized user;
capturing biometric information of a requester using said biometric detector;
provided said portable data storage device authenticates said requester'"'"'s identity, transmitting a first notification from said portable storage device to said content server;
receiving a device authentication request from said content server and in response thereto transmitting a device authentication reply from said portable storage device to said content server, said device authentication reply for completing an authentication handshake between said content server and said portable storage device;
receiving a key request from said content server and in response thereto transmitting a first key representative of said requester from said portable storage device to said content server, said first key for allowing said content server to confirm said requester'"'"'s identity;
receiving said restricted information from said content server;
encrypting said restricted information using a second key representative of said requester'"'"'s identity; and
storing said restricted information into said portable storage device in encrypted form, wherein said stored encrypted information cannot be decrypted without using said second key. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification