G11B23/28

Destructive system having a functional layer and an adjacent reactive layer and an associated method
09905265 · 2018-02-27 ·

The invention relates to a destruction system for destroying a functional layer, which may receive data or perform other functions, such as optical functions, for example, and a related method. The reactants may be interspersed within the functional layer or may be provided in a separate layer adjacent to the functional layer. The reactants are structured to be ignited to destroy the functionality of the functional layer and the data. Ignition may be obtained through a flame or by suitable electrical current in certain embodiments of the invention.

Apparatus and system to secure and maintain integrity of a physical disc
09899054 · 2018-02-20 ·

Apparatus, systems, and methods disclosed herein include apparatus, systems, and methods for securing the information contained on information discs, such as CD's, DVD's, Blu-Ray discs, or any optical media used for carrying information. The apparatus includes a security device that prevents unauthorized users from accessing the protected disc, discs, or spindle. The apparatus is such that any unauthorized attempts to unlock the locking device will result in damage to the disc, making it unreadable and/or unrenderable. The security device may be part of a system that also includes a network and a remote authentication server. Authentication data is transmitted over the network between the security device and the remote authentication server. The authentication data is then used to determine whether or not to unlock the security device.

Distributed data storage system and method
09705567 · 2017-07-11 · ·

A system for storing long-term digital data comprises data storage equipment including one or more data storage devices 26 stored in a sealed data storage module 10, which is positioned within a data center enclosure 101, which contains a body 12 that is surrounded by a strengthening shield 14. The body contains a network of tunnels 16. One or more data storage modules 10 are stored in a tunnel 16 that is inaccessible to human beings and comprises robotic movement means. Data can be stored before or after the data storage device 26 is sealed within the data storage module body. A utility distribution system can be positioned in proximity to the data storage module 10 for the utility distribution module to provide contactless power and network connection to the data storage module and for the data storage module to retrieve and transmit to the utility distribution module 34 data that is held in the data storage device 26. Powering of the data storage module occurs only when access to the data storage devices is required. One the other or both of the data storage module 10 and the tunnel 16 is operable to self-destruct when tampering is detected. The data storage module can also process the data stored under user instruction and store the results, including secure encryption and decryption of data.

Distributed data storage system and method
09705567 · 2017-07-11 · ·

A system for storing long-term digital data comprises data storage equipment including one or more data storage devices 26 stored in a sealed data storage module 10, which is positioned within a data center enclosure 101, which contains a body 12 that is surrounded by a strengthening shield 14. The body contains a network of tunnels 16. One or more data storage modules 10 are stored in a tunnel 16 that is inaccessible to human beings and comprises robotic movement means. Data can be stored before or after the data storage device 26 is sealed within the data storage module body. A utility distribution system can be positioned in proximity to the data storage module 10 for the utility distribution module to provide contactless power and network connection to the data storage module and for the data storage module to retrieve and transmit to the utility distribution module 34 data that is held in the data storage device 26. Powering of the data storage module occurs only when access to the data storage devices is required. One the other or both of the data storage module 10 and the tunnel 16 is operable to self-destruct when tampering is detected. The data storage module can also process the data stored under user instruction and store the results, including secure encryption and decryption of data.

Vinyl record with integrated authenticity
12223981 · 2025-02-11 · ·

A record (100) may include a disk (102), an embedded electronic authentication tag (104), a cover (106) between the disk and the electronic authentication tag, and one or more record labels (108A, 108B). The disk, electronic authentication tag, and cover have a spindle hole (114) and a common centerline (116). The electronic authentication tag contains a unique identification code pointing to information regarding the record stored as a non-fungible token. This information may be used to verify the authenticity and ownership of the record. A puck used to create the disk may include segments of different colors so that, when the record is pressed the different segments produce a visual pattern unique to that record. A picture may be taken after pressing, recorded, recorded as part of the information in the non-fungible token, and later used to verify the authenticity of the record.

WRITE-PROTECTED RECORDING
20170019640 · 2017-01-19 ·

A surveillance apparatus continuously records imaged data from a camera into a circular buffer in a local memory. When a record signal is received, the system records the video stream that was recorded before the record signal was received, and the video stream that is recorded after the record signal was received. The recorded segment is then write-protected, so that the surveillance apparatus does not overwrite the recorded segment. The recorded segment could then be sent to a remote memory via a wireless connection to free up local memory for future recording sessions.

VINYL RECORD WITH INTEGRATED AUTHENTICITY
20250182789 · 2025-06-05 · ·

A record (100) may include a disk (102), an embedded electronic authentication tag (104), a cover (106) between the disk and the electronic authentication tag, and one or more record labels (108A, 108B). The disk, electronic authentication tag, and cover have a spindle hole (114) and a common centerline (116). The electronic authentication tag contains a unique identification code pointing to information regarding the record stored as a non-fungible token. This information may be used to verify the authenticity and ownership of the record. A puck used to create the disk may include segments of different colors so that, when the record is pressed the different segments produce a visual pattern unique to that record. A picture may be taken after pressing, recorded, recorded as part of the information in the non-fungible token, and later used to verify the authenticity of the record.