G11B20/00666

Method and system for verifying a data erasure process

A method of erasing data from a data storage apparatus comprising a memory, the method comprises writing a known data pattern to a plurality of known memory locations of the data storage apparatus, causing the data storage apparatus to perform a data erasure procedure, reading data stored at the known memory locations after completion of the data erasure procedure, comparing the read data and the data of the known data pattern, and determining a verification result based at least in part on the result of the comparison between the read data and the data of the known data pattern.

Concurrent secure communication generation

A recording of an audio stream is initiated. The audio stream is a part of a communication between two or more participants. A first indication related to the audio stream is received. The first indication is that the audio stream should start being altered. A second indication related to the audio stream is received. The second indication is that the audio stream should stop being altered. A portion of the recorded audio stream between the first indication and the second indication is altered.

Erasure of data from a memory of a data storage apparatus by identifying available free space in the memory and iteratively writing a sequence of files decreasing size to the memory using a file-based protocol

A method of erasing data using a file-based protocol from a data storage apparatus for repurposing, reallocation to a new user or retirement of the data storage apparatus, the data storage apparatus comprising a memory using a file-based protocol, and the method comprises: receiving one or more signals representative of the available free space of at least one selected region of the memory; iteratively writing files to the at least one selected region of the memory using the file based protocol, wherein: at least one of the files is sized based on at least one of the received signals and the iterative writing of the files comprises writing the files in sequence such that for at least part of the sequence each file is smaller in size than the preceding file of the sequence; and wherein the files are written to collectively occupy all of the at least one selected region of the memory; and the method further comprises receiving an indication that said at least one selected region of memory is full following the writing of said files, and in response to the indication writing at least one further file to said at least one region of memory.

CONCURRENT SECURE COMMUNICATION GENERATION
20200302968 · 2020-09-24 ·

A recording of an audio stream is initiated. The audio stream is a part of a communication between two or more participants. A first indication related to the audio stream is received. The first indication is that the audio stream should start being altered. A second indication related to the audio stream is received. The second indication is that the audio stream should stop being altered. A portion of the recorded audio stream between the first indication and the second indication is altered.

Method and System for Verifying a Data Erasure Process

A method of erasing data from a data storage apparatus comprising a memory, the method comprises writing a known data pattern to a plurality of known memory locations of the data storage apparatus, causing the data storage apparatus to perform a data erasure procedure, reading data stored at the known memory locations after completion of the data erasure procedure, comparing the read data and the data of the known data pattern, and determining a verification result based at least in part on the result of the comparison between the read data and the data of the known data pattern.

System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state

A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.

System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state

A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.

Data Erasure Method and Apparatus

A method of erasing data using a file-based protocol from a data storage apparatus for repurposing, reallocation to a new user or retirement of the data storage apparatus, the data storage apparatus comprising a memory using a file-based protocol, and the method comprises: receiving one or more signals representative of the available free space of at least one selected region of the memory; iteratively writing files to the at least one selected region of the memory using the file based protocol, wherein: at least one of the files is sized based on at least one of the received signals and the iterative writing of the files comprises writing the files in sequence such that for at least part of the sequence each file is smaller in size than the preceding file of the sequence; and wherein the files are written to collectively occupy all of the at least one selected region of the memory; and the method further comprises receiving an indication that said at least one selected region of memory is full following the writing of said files, and in response to the indication writing at least one further file to said at least one region of memory.

UNAUTHORIZED READOUT PREVENTION MECHANISM AND UNMANNED VEHICLE
20240327043 · 2024-10-03 · ·

An unauthorized readout prevention mechanism includes a power source unit provided outside a casing provided in an unmanned vehicle, a power line for supplying power from the power source unit to a volatile region inside the casing, an opening-closing unit provided in the casing, and a switch that physically separates the power line and shuts off supply of power to inside the casing when the opening-closing unit is opened.

MAGNETIC DISK DEVICE
20240296869 · 2024-09-05 ·

According to the embodiment, an HDC receives a plurality of data segments from a host, and executes generation and addition of a first code and output of a data segment to which the first code is added to each data segment. An HDC calculates exclusive OR with respect to the first codes, and outputs obtained first information. The RWC performs data conversion and calculation of exclusive OR on the plurality of data segments to which the first code is added, and outputs the plurality of data segments after the data conversion and a track parity obtained by the calculation of the exclusive OR. The RWC acquires the first code from the plurality of data segments. The RWC calculates exclusive OR with respect to a group of the second codes which are the acquired first codes to acquire second information. The RWC compares the first information with the second information.