A computing system includes data encryption in the data path between a data source and data storage devices. The data encryption may utilize a key which is derived at least in part from an identification code stored in a non-volatile memory. The key may also be derived at least in part from user input to the computer.

 
Web www.patentalert.com

< Method and apparatus for reporting unauthorized attempts to access nodes in a network computing system

< Method and system for controlling encoded image production using image signatures

> Apparatus and method for TOL client boundary protection

> Signal reproducing/recording/transmitting method and apparatus and signal recording medium

~ 00289