Samsung electronics co., ltd. (20240129282). SYSTEMS, METHODS, AND APPARATUS FOR PROTECTION FOR DEVICE DATA TRANSFERS simplified abstract
Contents
- 1 SYSTEMS, METHODS, AND APPARATUS FOR PROTECTION FOR DEVICE DATA TRANSFERS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEMS, METHODS, AND APPARATUS FOR PROTECTION FOR DEVICE DATA TRANSFERS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
SYSTEMS, METHODS, AND APPARATUS FOR PROTECTION FOR DEVICE DATA TRANSFERS
Organization Name
Inventor(s)
Daniel Lee Helmick of Broomfield CO (US)
Eric Hibbard of Sunnyvale CA (US)
SYSTEMS, METHODS, AND APPARATUS FOR PROTECTION FOR DEVICE DATA TRANSFERS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240129282 titled 'SYSTEMS, METHODS, AND APPARATUS FOR PROTECTION FOR DEVICE DATA TRANSFERS
Simplified Explanation
The apparatus described in the abstract is a device with two controllers that can receive, protect, and send data with different protection schemes. The first controller applies a protection scheme to the data, while the second controller applies a different protection scheme before sending it out. The protection schemes may involve salts, with the first salt determined by the device and the second salt determined by a user. Additionally, the device can apply a third protection scheme to controller state information.
- The apparatus includes a device with two controllers for data protection.
- The first controller applies a protection scheme to the data, while the second controller applies a different protection scheme.
- Protection schemes may involve salts, with one determined by the device and the other by a user.
- A third protection scheme can be applied to controller state information.
Potential Applications
This technology could be applied in secure data transmission, password protection, and encryption methods.
Problems Solved
This technology solves the problem of data security and protection by allowing for multiple layers of protection with different schemes.
Benefits
The benefits of this technology include enhanced data security, customizable protection schemes, and improved control over data transmission.
Potential Commercial Applications
One potential commercial application of this technology could be in the development of secure communication devices for businesses and organizations.
Possible Prior Art
One possible prior art for this technology could be existing data encryption methods and devices that offer multiple layers of protection for data transmission.
Unanswered Questions
How does the device determine the first salt for the protection scheme?
The abstract does not provide details on how the device determines the first salt for the protection scheme. Further information on this process would be helpful in understanding the technology better.
What are the specific controller state information that the third protection scheme is applied to?
The abstract mentions applying a third protection scheme to generate controller state information, but it does not specify the exact nature of this information. Understanding the specific details of this process would provide more insight into the technology's functionality.
Original Abstract Submitted
an apparatus may include a device including a first controller, and a second controller, wherein the device may be configured to receive, using the first controller, data, apply, to the data, a first protection scheme, and send, from the device, using the second controller, the data having a second protection scheme. the first protection scheme and the second protection scheme may be the same. the second controller may be configured to apply, to the data, the second protection scheme. the first protection scheme may include a first salt, and the second protection scheme may include a second salt. the first salt may be determined by the device, and the second salt may be determined by a user. the method may further include applying, at the device, to controller state information for the first controller, a third protection scheme to generate controller state information having the third protection scheme.