Data transfer based on input device identifying information

ABSTRACT

In one aspect, a first device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to identify a first data transfer command based on input from an input device, receive identifying information associated with the input device, and execute the first data transfer command responsive at least in part to authentication of the input device based at least in part on the identifying information. The first data transfer command pertains to the transfer of first data.

FIELD

The present application relates generally to transferring data based onidentifying information for an input device.

BACKGROUND

Transferring data through e.g. copy, cut, and paste actions has becomeubiquitous in today's computer-enabled environment. However, there arecurrently little if any security procedures and user identificationprocedures that are undertaken when executing a data transfer command,thus leading to data which is to be transferred potentially beingcompromised and not being tailored to specific users issuing such datatransfer commands.

SUMMARY

In one aspect, a first device includes a processor and a memoryaccessible to the processor. The memory bears instructions executable bythe processor to identify a first data transfer command based on inputfrom an input device, receive identifying information associated withthe input device, and execute the first data transfer command responsiveat least in part to authentication of the input device based at least inpart on the identifying information. The first data transfer commandpertains to the transfer of first data.

In another aspect, an input device includes a processor and a memoryaccessible to the processor. The memory bears instructions executable bythe processor to sense contact of the input device against a firstdevice different from the input device, provide identifying informationto at least one of the first device and a server in response to thecontact being sensed, and provide a first data transfer command to atleast one of the first device and the server. The identifyinginformation pertains to the input device.

In still another aspect, a method includes receiving a firstauthentication request at a first device from a second device differentfrom the first device, where the first authentication request isprovided with identifying information for a third device different fromthe first device and different from the second device. The method alsoincludes providing to the second device a first authentication responseto the first authentication request, receiving data from the seconddevice, and receiving a second authentication request at the firstdevice from a fourth device different from the first device, the seconddevice, and the third device. The second authentication request isprovided with at least a portion of the identifying information for thethird device. In addition, the method includes providing to the fourthdevice a second authentication response, and providing the data to thefourth device responsive to the third device being authenticated at thefirst device at least in part based on at least the portion of theidentifying information.

The details of present principles, both as to their structure andoperation, can best be understood in reference to the accompanyingdrawings, in which like reference numerals refer to like parts, and inwhich:

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example system in accordance withpresent principles;

FIG. 2 is a block diagram of a network of devices in accordance withpresent principles;

FIGS. 3-6 are flow charts showing example algorithms according topresent principles;

FIGS. 7-14 illustrate example user interfaces (UIs) according to presentprinciples; and

FIG. 15 is an example input device in accordance with presentprinciples.

DETAILED DESCRIPTION

This disclosure relates generally to device-based information. Withrespect to any computer systems discussed herein, a system may includeserver and client components, connected over a network such that datamay be exchanged between the client and server components. The clientcomponents may include one or more computing devices includingtelevisions (e.g. smart TVs, Internet-enabled TVs), computers such asdesktops, laptops and tablet computers, so-called convertible devices(e.g. having a tablet configuration and laptop configuration), and othermobile devices including smart phones. These client devices may employ,as non-limiting examples, operating systems from Apple, Google, orMicrosoft. A Unix operating system may be used. These operating systemscan execute one or more browsers such as a browser made by Microsoft orGoogle or Mozilla or other browser program that can access webapplications hosted by the Internet servers over a network such as theInternet, a local intranet, or a virtual private network.

As used herein, instructions refer to computer-implemented steps forprocessing information in the system. Instructions can be implemented insoftware, firmware or hardware; hence, illustrative components, blocks,modules, circuits, and steps are set forth in terms of theirfunctionality.

A processor may be any conventional general purpose single- ormulti-chip processor that can execute logic by means of various linessuch as address lines, data lines, and control lines and registers andshift registers. Moreover, any logical blocks, modules, and circuitsdescribed herein can be implemented or performed, in addition to ageneral purpose processor, in or by a digital signal processor (DSP), afield programmable gate array (FPGA) or other programmable logic devicesuch as an application specific integrated circuit (ASIC), discrete gateor transistor logic, discrete hardware components, or any combinationthereof designed to perform the functions described herein. A processorcan be implemented by a controller or state machine or a combination ofcomputing devices.

Any software and/or applications described by way of flow charts and/oruser interfaces herein can include various sub-routines, procedures,etc. It is to be understood that logic divulged as being executed bye.g. a module can be redistributed to other software modules and/orcombined together in a single module and/or made available in ashareable library.

Logic when implemented in software, can be written in an appropriatelanguage such as but not limited to C# or C++, and can be stored on ortransmitted through a computer-readable storage medium (e.g. that maynot be a carrier wave) such as a random access memory (RAM), read-onlymemory (ROM), electrically erasable programmable read-only memory(EEPROM), compact disk read-only memory (CD-ROM) or other optical diskstorage such as digital versatile disc (DVD), magnetic disk storage orother magnetic storage devices including removable thumb drives, etc. Aconnection may establish a computer-readable medium. Such connectionscan include, as examples, hard-wired cables including fiber optics andcoaxial wires and twisted pair wires. Such connections may includewireless communication connections including infrared and radio.

In an example, a processor can access information over its input linesfrom data storage, such as the computer readable storage medium, and/orthe processor can access information wirelessly from an Internet serverby activating a wireless transceiver to send and receive data. Datatypically is converted from analog signals to digital by circuitrybetween the antenna and the registers of the processor when beingreceived and from digital to analog when being transmitted. Theprocessor then processes the data through its shift registers to outputcalculated data on output lines, for presentation of the calculated dataon the device.

Components included in one embodiment can be used in other embodimentsin any appropriate combination. For example, any of the variouscomponents described herein and/or depicted in the Figures may becombined, interchanged or excluded from other embodiments.

“A system having at least one of A, B, and C” (likewise “a system havingat least one of A, B, or C” and “a system having at least one of A, B,C”) includes systems that have A alone, B alone, C alone, A and Btogether, A and C together, B and C together, and/or A, B, and Ctogether, etc.

“A system having one or more of A, B, and C” (likewise “a system havingone or more of A, B, or C” and “a system having one or more of A, B, C”)includes systems that have A alone, B alone, C alone, A and B together,A and C together, B and C together, and/or A, B, and C together, etc.

The term “circuit” or “circuitry” is used in the summary, description,and/or claims. As is well known in the art, the term “circuitry”includes all levels of available integration, e.g., from discrete logiccircuits to the highest level of circuit integration such as VLSI, andincludes programmable logic components programmed to perform thefunctions of an embodiment as well as general-purpose or special-purposeprocessors programmed with instructions to perform those functions.

Now specifically in reference to FIG. 1, it shows an example blockdiagram of an information handling system and/or computer system 100such as e.g. an Internet enabled, computerized telephone (e.g. a smartphone), a tablet computer, a notebook or desktop computer, an Internetenabled computerized wearable device such as a smart watch, acomputerized television (TV) such as a smart TV, a so-called convertibledevice, etc. Thus, in some embodiments the system 100 may be a desktopcomputer system, such as one of the ThinkCentre® or ThinkPad® series ofpersonal computers sold by Lenovo (US) Inc. of Morrisville, N.C., or aworkstation computer, such as the ThinkStation®, which are sold byLenovo (US) Inc. of Morrisville, N.C.; however, as apparent from thedescription herein, a client device, a server or other machine inaccordance with present principles may include other features or onlysome of the features of the system 100.

As shown in FIG. 1, the system 100 includes a so-called chipset 110. Achipset refers to a group of integrated circuits, or chips, that aredesigned to work together. Chipsets are usually marketed as a singleproduct (e.g., consider chipsets marketed under the brands INTEL®, AMD®,etc.).

In the example of FIG. 1, the chipset 110 has a particular architecture,which may vary to some extent depending on brand or manufacturer. Thearchitecture of the chipset 110 includes a core and memory control group120 and an I/O controller hub 150 that exchange information (e.g., data,signals, commands, etc.) via, for example, a direct management interfaceor direct media interface (DMI) 142 or a link controller 144. In theexample of FIG. 1, the DMI 142 is a chip-to-chip interface (sometimesreferred to as being a link between a “northbridge” and a“southbridge”).

The core and memory control group 120 include one or more processors 122(e.g., single core or multi-core, etc.) and a memory controller hub 126that exchange information via a front side bus (FSB) 124. As describedherein, various components of the core and memory control group 120 maybe integrated onto a single processor die, for example, to make a chipthat supplants the conventional “northbridge” style architecture.

The memory controller hub 126 interfaces with memory 140. For example,the memory controller hub 126 may provide support for DDR SDRAM memory(e.g., DDR, DDR2, DDR3, etc.). In general, the memory 140 is a type ofrandom-access memory (RAM). It is often referred to as “system memory.”

The memory controller hub 126 further includes a low-voltagedifferential signaling interface (LVDS) 132. The LVDS 132 may be aso-called LVDS Display Interface (LDI) for support of a display device192 (e.g., a CRT, a flat panel, a projector, a touch-enabled display,etc.). A block 138 includes some examples of technologies that may besupported via the LVDS interface 132 (e.g., serial digital video,HDMI/DVI, display port). The memory controller hub 126 also includes oneor more PCI-express interfaces (PCI-E) 134, for example, for support ofdiscrete graphics 136. Discrete graphics using a PCI-E interface hasbecome an alternative approach to an accelerated graphics port (AGP).For example, the memory controller hub 126 may include a 16-lane (x16)PCI-E port for an external PCI-E-based graphics card (including e.g. oneof more GPUs). An example system may include AGP or PCI-E for support ofgraphics.

The I/O hub controller 150 includes a variety of interfaces. The exampleof FIG. 1 includes a SATA interface 151, one or more PCI-E interfaces152 (optionally one or more legacy PCI interfaces), one or more USBinterfaces 153, a LAN interface 154 (more generally a network interfacefor communication over at least one network such as the Internet, a WAN,a LAN, etc. under direction of the processor(s) 122), a general purposeI/O interface (GPIO) 155, a low-pin count (LPC) interface 170, a powermanagement interface 161, a clock generator interface 162, an audiointerface 163 (e.g., for speakers 194 to output audio), a total cost ofoperation (TCO) interface 164, a system management bus interface (e.g.,a multi-master serial computer bus interface) 165, and a serialperipheral flash memory/controller interface (SPI Flash) 166, which, inthe example of FIG. 1, includes BIOS 168 and boot code 190. With respectto network connections, the I/O hub controller 150 may includeintegrated gigabit Ethernet controller lines multiplexed with a PCI-Einterface port. Other network features may operate independent of aPCI-E interface.

The interfaces of the I/O hub controller 150 provide for communicationwith various devices, networks, etc. For example, the SATA interface 151provides for reading, writing or reading and writing information on oneor more drives 180 such as HDDs, SDDs or a combination thereof, but inany case the drives 180 are understood to be e.g. tangible computerreadable storage mediums that may not be carrier waves. The I/O hubcontroller 150 may also include an advanced host controller interface(AHCI) to support one or more drives 180. The PCI-E interface 152 allowsfor wireless connections 182 to devices, networks, etc. The USBinterface 153 provides for input devices 184 such as keyboards (KB),mice and various other devices (e.g., cameras, phones, storage, mediaplayers, etc.).

In the example of FIG. 1, the LPC interface 170 provides for use of oneor more ASICs 171, a trusted platform module (TPM) 172, a super I/O 173,a firmware hub 174, BIOS support 175 as well as various types of memory176 such as ROM 177, Flash 178, and non-volatile RAM (NVRAM) 179. Withrespect to the TPM 172, this module may be in the form of a chip thatcan be used to authenticate software and hardware devices. For example,a TPM may be capable of performing platform authentication and may beused to verify that a system seeking access is the expected system.

The system 100, upon power on, may be configured to execute boot code190 for the BIOS 168, as stored within the SPI Flash 166, and thereafterprocesses data under the control of one or more operating systems andapplication software (e.g., stored in system memory 140). An operatingsystem may be stored in any of a variety of locations and accessed, forexample, according to instructions of the BIOS 168.

In addition to the foregoing, the system 100 is understood to include anaudio receiver/microphone 195 in communication with the processor 122and providing input thereto based on e.g. a user providing audible inputto the microphone 195. A camera 196 is also shown, which is incommunication with and provides input to the processor 122. The camera196 may be, e.g., a thermal imaging camera, a digital camera such as awebcam, and/or a camera integrated into the system 100 and controllableby the processor 122 to gather pictures/images and/or video.

Still in reference to FIG. 1, note that a GPS transceiver 199 is alsoshown that is configured to e.g. receive geographic position informationfrom at least one satellite and provide the information to the processor122. However, it is to be understood that another suitable positionreceiver other than a GPS receiver may be used in accordance withpresent principles to e.g. determine the location of the system 100.

Before moving on to FIG. 2, it is to be understood that an exampleclient device or other machine/computer may include fewer or morefeatures than shown on the system 100 of FIG. 1. In any case, it is tobe understood at least based on the foregoing that the system 100 isconfigured to undertake present principles.

Turning now to FIG. 2, it shows example devices communicating over anetwork 200 such as e.g. the Internet in accordance with presentprinciples is shown. It is to be understood that e.g. each of thedevices described in reference to FIG. 2 may include at least some ofthe features, components, and/or elements of the system 100 describedabove. In any case, FIG. 2 shows a notebook computer 202, a desktopcomputer 204, a wearable device 206 such as e.g. a smart watch, a smarttelevision (TV) 208, a smart phone 210, a tablet computer 212, and aserver 214 in accordance with present principles such as e.g. anInternet server that may e.g. provide cloud storage accessible to thedevices 202-212 (including e.g., hosting a “cloud clipboard” for cut,copy, and paste data for transfer between devices), and also at leastone input device 216 and optionally a second input device 218 which maybe e.g. independent input devices in that they are not necessarilyassociated with or attached to any particular one of the other devices202-212 but may still communicate with them.

In some embodiments, the input devices 216 and 218 may be e.g.electronic pens and/or stylus pens in accordance with presentprinciples. Note further that the input devices 216 and 218 areconfigured to provide input to one or more of the devices 202-214,including e.g. providing input to touch-enabled pads and touch-enableddisplays on the devices 202-214 in accordance with present principlese.g. when in physical contact therewith and/or based on manipulation ofthe devices 216 and 218 (e.g. by different users).

Furthermore, it is to be understood that the devices 202-218 areconfigured to communicate with each other over the network 200 toundertake present principles. Is it to also be understood that the inputdevices 216 and 218 each respectively have their own identifyinginformation associated therewith (e.g. different unique user identifiers(UUID)), which the respective input device 216 or 218 is configured toprovide to another device in accordance with present principles.Furthermore, each respective input device 216 and 218 may be associatedwith a different profile for a different user, where each profile may beassociated with a different “cloud clipboard” as described furtherbelow, and hence manipulation of each device 216 or 218 may causedifferent or the same data to be e.g. pasted to a different location.

Referring to FIG. 3, it shows example logic that may be undertaken by adevice such as the system 100 in accordance with present principles whenreceiving input from an input device such as e.g. a stylus pen.Beginning at block 300, the logic identifies a data transfer commandbased on input from the input device. The data transfer command maypertain to e.g. data selected from an area of a touch-enabled display ofthe device undertaking the present logic (referred to below as “thepresent device”) on which the data was presented. E.g., the datatransfer command may be identified based on a change in capacitance atan area of the touch-enabled display with which the input device hascontact, and/or the lapse of a threshold time with which the inputdevice is in (e.g. uninterrupted, unmoving, and/or unbroken) contactwith the area.

From block 300 the logic proceeds to block 302 where the logic receivesidentifying information pertaining to the input device (e.g. from theinput device). The identifying information may include e.g. a uniqueuser identification (UUID) number, a unique input device identification(UIDID) number, profile information for a profile associated with a userof the input device, authentication and data transfer authorizationinformation, etc. The identifying information may be received based one.g. a passive RFID chip on the input device that is “read” by thepresent device according to RFID principles. In addition to or in lieuof the foregoing, the identifying information may be received based onnetwork communication between the input device and present device overe.g. a WiFi network and even e.g. a Wi-Fi direct link specifically. Alsoin addition to or in lieu of the foregoing, the identifying informationmay be received based on Bluetooth communication between the inputdevice and present device, or still other (e.g. peer-to-peer) methods.

In any case, from block 302 the logic proceeds to block 304 where thelogic e.g. automatically without further user input in response toreceipt of the identifying information, transmits an authenticationrequest and the identifying information to another device such as e.g. aserver (e.g. which in some embodiments may have a “clipboard” which ismeant to be a non-limiting term for a e.g. storage area for informationthat has been cut or copied, and/or may be e.g. embodied in e.g. a“cloud” computing environment hosted on the server) for authenticationof the input device based on the identifying information. However, notethat in some embodiments the present device may have the requisiteinformation and resources to undertake authentication of the inputdevice at the present device. In any case, note that in addition to theidentifying information, the present device may also transmit to theother device e.g. device information for the input device and/or presentdevice, and/or command information pertaining to the data transfercommand that was identified at block 300. E.g., the present device maytransmit information specific to the type of data transfer command thatwas identified, such as e.g. a cut or copy command.

Still in reference to FIG. 3, after block 304 the logic proceeds toblock 306, at which the logic receives back from the server anauthentication response regarding whether the input device has beensuccessfully authenticated, and/or determines whether an authenticationattempt executed locally on the present device has been successful. Notefurther that in some embodiments and regardless of whether theauthentication was executed at the server or at the present device, theauthentication response and/or determination may further include aindication and/or determination as to whether the input device has beenauthorized to provide data transfer commands to the present device e.g.based on settings for devices the input device is authorized to providesuch commands to. For instance, a particular input device may be enabledby e.g. an administrator to only provide commands to certain device, orto specifically not be enabled to provide data transfer commands tocertain devices.

In any case but still in reference to block 306, responsive toauthentication of the input device being successful and/or responsive toinput to a user interface (UI) such as the one to be described below inreference to FIG. 8, the present device executes the data transfercommand by e.g. executing a cut or copy function on a selected elemente.g. by cutting or copying the selected element to the clipboard, and/orto a local “clipboard” on the present device, and/or to a “clipboard” onanother device such as the input device itself. E.g., the present devicemay execute the data transfer command by executing a “cutting” or“copying” of a selected element and transmitting data corresponding tothe cut or copy of the element (e.g. transmitting the text itself iftext was copied, or transmitting the image itself if an image wascopied) along with command information (e.g. regarding whether thecommand was a cut or copy function) to another device such as theserver.

Note that as referenced herein, an “element” is understood to be a termthat may encompass many different types of data that may be cut, copied,and/or pasted, such as e.g. an element presented on a display of adevice, an icon presented on a display of a device, an application on adevice, an image presented on a display of a device, an audio file on adevice, a video file on a device, an audio video (AV) file on a device,still other files (e.g. word processing documents) on a device, a screenshot taken responsive to a cut or copy command, text (e.g. from abrowser or word processing document) selected using e.g. a mouse or theinput device, etc.

Now in reference to FIG. 4, it shows example logic that may beundertaken by a device such as the system 100 in accordance with presentprinciples when receiving input from an input device such as e.g. astylus pen. Distinguishing from FIG. 3, FIG. 4 shows logic for when apaste data transfer command is identified. However, it is to beunderstood that the device undertaking the logic of FIG. 4 may be thesame or a different device than a device from which data to be pastedper FIG. 4 was provided.

In any case, beginning at block 400, the logic identifies a datatransfer command based on input from an input device as set forthherein. E.g., the command may be identified based on unbroken touchinput for a threshold time of the input device being positioned againsta display of the device undertaking the logic of FIG. 4 (referred tobelow as the “present device”) on which the data was presented.

From block 400 the logic proceeds to block 402 where the logic receivesidentifying information pertaining to the input device (e.g. from theinput device). The identifying information may include e.g. a UUIDand/or still other information referenced herein. From block 402 thelogic proceeds to block 404 where the logic e.g. automatically withoutfurther user input in response to receipt of the identifyinginformation, transmits an authentication request and the identifyinginformation to another device such as e.g. a server for authenticationof the input device based on the identifying information. However, notethat in some embodiments the present device may have the requisiteinformation and resources and execute authentication of the input deviceat the present device. In any case, note that in addition to theidentifying information, the present device may also transmit to theother device e.g. device information for the input device and/or presentdevice, and/or command information pertaining to the data transfercommand that was identified at block 400. E.g., the present device maytransmit information specific to the type of data transfer command thatwas identified, such as e.g. a paste command.

Still in reference to FIG. 4, after block 404 the logic proceeds toblock 406, at which the logic receives back from the server anauthentication response regarding whether the input device has beensuccessfully authenticated, and/or receives data for executing the pastecommand such as e.g. an image to be pasted (e.g. from the input deviceand/or the server), and/or determines whether an authentication attemptexecuted locally on the present device has been successful. Note furtherthat in some embodiments and regardless of whether the authenticationwas executed at the server or at the present device, the authenticationresponse and/or determination may further include an indication and/ordetermination as to whether the input device has been authorized toprovide data transfer commands to the present device in accordance withpresent principles.

Still in reference to block 406, responsive to authentication of theinput device being successful, responsive to receipt of the data, and/orresponsive to input to a user interface (UI) such as the one to bedescribed below in reference to FIG. 8, the present device executes thedata transfer command in the present instance by executing a pastefunction on a selected element e.g. by pasting the selected element toan indicated location and/or area (e.g. an area of a touch-enableddisplay of the present device, an indicated file location and/or filepath, etc.) from a cloud clipboard, and/or from a local “clipboard” onthe present device, and/or from a “clipboard” on another device such asthe input device itself.

Continuing the detailed description in reference to FIG. 5, it showsexample logic to be undertaken by an input device in accordance withpresent principles. Beginning at block 500, the logic senses contact ofthe input device against another device (e.g., a tablet computer). Thelogic then proceeds to block 502, at which the logic (e.g. in responseto the contact being sensed and without further user input) providesidentifying information for the input device to at least one of thedevice with which contact was made and/or (e.g. directly to) a serverwith which the input device is configured to communicate via e.g. anetwork interface card on the input device.

The logic then proceeds to decision diamond 504, where the logicdetermines whether a cut or copy command, or a paste command, is to beexecuted e.g. based on a data transfer command from the input device tothe other device to transfer to the input device data to be cut orcopied thereto, based on a data transfer command to associate the datato be cut or copied with the input device (e.g. at a clipboard and/orserver) and/or with a profile which is associated with the input device,based on a data transfer command to the server to communicate with theother device with which the input device made contact to receive thedata cut or copied data at the server from the other device, based onthe contact of the input device against the other device, based oninformation stored on the input device pertaining to a data transfercommand, based on information received from another device such as aserver, etc.

Responsive to a determination at diamond 504 that a cut or copy commandis the type of command to be executed, the logic proceeds to block 506where the logic may receive from another device data which has been cutor copied. Also at block 506, the data is stored. Also at block 506,command data pertaining to the cut or copy command may also be receivedand/or stored. From block 506 the logic may then revert back to block500.

However, responsive to a determination at diamond 504 that a pastecommand is the type of command to be executed, the logic instead movesfrom diamond 504 to block 508. At block 508 the logic provides cut orcopied data to the device, and/or provides a data transfer command tothe device to receive and/or store the cut or copied data (e.g. viadownload from a cloud clipboard in accordance with present principles),and/or provides a data transfer command to the device to paste the cutor copied data e.g. to a particular and/or specified area (e.g. astorage area and/or display area). Furthermore, at block 508 the logicmay provide other paste command data, such as e.g. identification of auser profile and/or input device profile with which the paste command isassociated, where at the device to paste the data, and even e.g. whereat a display of the other device to paste the data, etc. From block 508the logic may revert back to block 500.

Before describing FIG. 6, as indicated above, it is to be understoodthat the logic of FIG. 5 is an example. It is to thus be understood thate.g. a data transfer command may in some embodiments be received from aserver and that the input device e.g. provides only identifyinginformation for the input device. Then e.g. based on the identifyinginformation, the device to which the identifying information wasprovided communicates with the server to receive data to be pasted basedon authentication of the input device at the other device and/or server.However, it is to also be understood that in some embodiments the inputdevice may provide the identifying information and the data to bepasted, but the paste command itself may be received at the other devicefrom the server.

Now describing FIG. 6, it shows example logic to be executed by a serverin accordance with present principles. Such a server may e.g. host acloud computing environment that itself has a “cloud clipboard” wherecut or copied data may be stored for pasting to a different device thanthe one from which the cut or copied data was provided. Beginning atblock 600, the logic receives a first authentication request along withidentifying information for an input device from a device e.g. that hasbeen contacted by the input device in accordance with presentprinciples. The logic then proceeds to block 602 where the logicattempts to successfully authenticate the input device e.g. based on theidentifying information that is received at block 600. Also at block602, the logic then provides an authentication response to the devicefrom which the authentication request was received, whether the responseis that the input device was successfully authenticated, thatauthentication failed, etc.

From block 602 the logic proceeds to block 604 where the logic receivese.g. cut or copied data from the requesting device and stores the data(e.g. to a cloud clipboard). The logic then moves to block 606 where thelogic receives a second authentication request (e.g. from a differentdevice than provided the request above) that includes identifyinginformation for the (e.g. same) input device. The logic then proceeds toblock 608 where the logic attempts to successfully authenticate theinput device e.g. based on the identifying information that is receivedat block 606. Also at block 608, the logic then provides anauthentication response to the device from which the authenticationrequest was received at block 606, whether the response is that theinput device was successfully authenticated, that authentication failed,etc. In addition, at block 606 the logic may provide the data receivedand stored at block 604 to the device which provided the secondauthentication request so that e.g. the data may be pasted at thatdevice responsive to receipt of a successful authentication indicationfrom the server undertaking the present logic.

Continuing the detailed description in cross-reference to FIGS. 7-9, atouch-enabled display 700 of a device such as e.g. the system 100described above is shown as presenting an image 702. As shown in FIG. 7,an input device 704 is contacting the display 700 at an area presentingthe image 702. Responsive to e.g. a threshold time expiring during whichthe input device 704 is in (e.g. uninterrupted) contact with the areaand even e.g. during which the portion of input device 704 whichcontacts the display 700 does not move, a UI 800 is presented as shownin FIG. 8.

As may be appreciated from FIG. 8, the UI 800 is presented on a portionof the display 700 and in some embodiments is e.g. overlaid on theportion such that it is overlaid on at least part of the area of thedisplay on which the image 702 would otherwise be presented. Further,the UI 800 may be centered at the point at which the input device makescontact with the display. Further still, it is to be understood that theUI 800 may remain presented e.g. even after the input device ceasescontacting the display 700 such as e.g. for a threshold time. In anycase, the UI 800 includes an indication 802 of a user and/or profilewith which the input device and/or data presented on the UI 800 isassociated. Thus, it is to be understood that the information, selectorelements, etc. presented on the UI 800 may vary depending on the inputdevice being used such as in embodiments when e.g. plural input devicesare associated with different particular users and/or differentparticular profiles.

Still in reference to the UI 800, it includes plural selector elements804, 806, 808, and 810 that are each selectable to automatically withoutfurther user input responsive thereto execute a command associated withthe respective selector element and e.g. indicated in text on therespective selector element as shown. Thus, the selector element 804 maybe selected to automatically responsive thereto cause the image 702 tobe cut (and e.g. cause the associated data to be transferred to one ormore clipboards local to the device of FIG. 8, a server clipboard,and/or input device clipboard), the selector element 806 may be selectedto automatically responsive thereto cause the image 702 to be copied(and e.g. cause the associated data to be transferred to one or moreclipboards local to the device of FIG. 8, a server clipboard, and/orinput device clipboard), the selector element 808 may be selected toautomatically responsive thereto cause a first image to be pasted at thelocation of the contact of the input device and hence be pasted at leastpartially over the image 702 (e.g. based on the data being transferredfrom one or more clipboards), and the selector element 810 may beselected to automatically responsive thereto cause a second imagedifferent from the first image to be pasted at the location of thecontact of the input device and hence be pasted at least partially overthe image 702 (e.g. based on the data being transferred from one or moreclipboards).

Furthermore, note that the selector elements 808 and 810 respectivelyshow representations of the data which will be pasted responsive toselection of the respective selector element to thus provide a previewof the data which will be pasted responsive to selection of the elementand/or allow a user to identify the data which will be pasted responsiveto selection of the element. However, note that the differing data to betransferred responsive to selection of either the elements 808 and 810are still both associated with the same profile and/or input device(e.g. that was used to cut or copy both). Also note that any of theelements 804-810 may optionally also present a respective optionsselector element which if selected causes a different function to beexecuted than the respective cut, copy or paste function of therespective element responsive to selection of a portion of the sameselector element not presenting the options selector element. Theoptions selector element may be selected to automatically responsivethereto e.g. cause settings and/or options UI to be presented forconfiguring data transfer settings, and/or may cause still another UI tobe presented (e.g., the UI 1000 to be described below in reference toFIG. 10) such as e.g. a listing of other data stored on one or more“clipboards” that may be pasted.

FIG. 9 shows an example of when e.g. the selector element 808 has beenselected to thus cause the image 900 (also represented on the selectorelement 808 as shown) to be pasted over at least a portion of the image702 since that is the area of the display 700 with which the inputdevice made contact and hence the area at which the image 900 is to bepasted.

Before moving to the description of FIG. 10, it is to be understood thatstill other selector elements maybe presented on a UI such as the UI800, and that such selector elements may in example embodiments bedependent on, and thus presented based on, context such as e.g. whethera cut or copy command is to be executed or whether a paste command is tobe executed. Thus, e.g. in some embodiments such a UI may only presentcut and/or copy options, while in other embodiments such a UI may onlypresent paste options. What's more, other selector elements that may beincluded may be selector elements for only copying a portion of cut orcopied data from a clipboard. As other examples, e.g., selector elementsmaybe presented for pasting data as a picture or image even if stored ina non-picture format (e.g. to thus be presented as a screen shot), forchanging the color of presentation of the data when pasted such as e.g.changing the color of annotations or other text.

Now in reference to the UI 1000 of FIG. 10, it shows a listing of datafrom one or more clipboards, where data as represented on the UI 1000may be selected from the UI 1000 to be pasted in accordance with presentprinciples. Thus, it is to be understood that in some embodiments, theUI 1000 may be generated e.g. locally at the device presenting the UI1000 based on the clipboards to which the device presenting the UI 1000has access (e.g. a cloud storage area, a storage area on the deviceitself, a storage area on an input device with which the device iscommunicating, etc.). Furthermore, it is to be understood that whilee.g. the UI 1000 may be accessed for selecting data for pasting, in someembodiments e.g. the most-recently cut or copied data from one or moreclipboards may be the default data for a paste command e.g. not providedbased on manipulation of the UI 1000 but instead e.g. automaticallywithout further user input responsive to selection of a paste button onan input device (such as the one to be described in reference to FIG.15), or responsive to still other paste commands not invoking the UI1000 and/or based on input to the UI 1000.

In any case, as may be appreciated from FIG. 10, the UI 1000 includesplural representations 1002-1008 of data that may be pasted, where oneor more may be accompanied by descriptions of the data such as e.g. adescription 1010 that the representation 1008 pertains to text data anda description 1012 that the representation 1012 pertains to a screenshot. Note further that each of the representations 1002-1008 includerespective source indicators 1014-1020 indicating the (e.g. clipboard)source of the data that is associated with the respective one of therepresentations 1002-1008. Furthermore, it is to be understood thatselection of one of the representations 1002-1008 may in someembodiments automatically responsive thereto cause the data associatedtherewith to be pasted at a location indicated using an input device(e.g. in an instance such as when the UI 1000 was presented responsiveto selection of an options selector element from the elements 808 and810 described above).

Continuing the detailed description with reference to FIG. 11, it showsan example representation 1100 of an input device being presented on adisplay of a device. The representation 1100 includes an image 1102 ofan input device along with an indication 1104 of the total currentlyavailable storage capacity of the input device represented by the image1102. Thus, it is to be understood that the representation 1100 pertainsto an input device most-recently in contact with, and/or still incontact with, and/or with which the device is currently communicating(e.g. receiving data and/or data transfer commands therefrom). Note thatthe representation 1102 also includes equidistant storage capacityincrement markers juxtaposed longitudinally along the image 1102, wheresome sections may be e.g. shaded to thus reflect the currentlyunavailable storage capacity, while others may not be shaded to thusreflect the currently available storage capacity.

Note further that the representation 1100 may be presented responsive toand/or during execution of a data transfer command. In the exampleshown, e.g., an element 1106 is being cut or copied to an input device,and hence is shown as being “sucked into” or otherwise absorbed into theimage 1102 of the input device. Also, the shading of the storagecapacity increment markers thus reflects the amount unavailable storageincluding the amount now occupied by data corresponding to the element1106.

Turning now to FIGS. 12-14, it is to be understood that various ways ofmanipulating an input device in accordance with present principles toprovide a cut, copy, or paste command may be used, such as by e.g.tracing a character on a display with an input device, where the devicehaving the display recognizes the tracing and hence the command. Thus,as shown in FIG. 12, a tracing may be made using an input device 1202 bycontacting the display to “draw” a tracing representative of the letter“C” beginning at an initial point 1204, where the point 1204 is thelocation at which the input device makes initial contact with thedisplay when drawing the letter “C,” and is also a point correspondingto and associated with an element or location on which to execute a datatransfer command. E.g. in the present instance where a “C” is drawn, theelement screen shot twenty will be copied responsive to the drawing ofthe “C” beginning at the location point 1204 and/or at least based one.g. the initial point 1204 being at the portion of the displaypresenting the element screen shot twenty to thus provide input to thedevice that screen shot twenty is the data to be copied. However, notethat in addition to or in lieu of the input device and/or device withwhich the input device is making contact determining data to copy basedon an initial contact point, such a determination may be made based one.g. a majority of a tracing being directed to a particular elementand/or a threshold (e.g. initial) amount of a tracing being directed toa particular element.

FIGS. 13 and 14 show other examples, where initial points 1300 and 1400respectively correspond to locations for pasting (e.g. responsive todetection of a tracing 1302 of the letter “P” for paste) and cutting(e.g. responsive to detection of a tracing 1402 of the letter “X” forcut).

Now describing FIG. 15, it shows an example input device 1500 that maybe used in accordance with present principles. Note that the inputdevice 1500 includes a tip 1502 configured for providing input toanother device e.g. based on contact therewith and/or proximity thereto.Also shown is an ID element 1504 which may be e.g. a passive RFIDelement, a storage area storing identifying information for the inputdevice 1500 to be communicated by the device 1500 to another device, anNFC tag, etc.

The element 1504 may also be a biometric and/or pressure sensor forsensing the biometrics of a user and/or for sensing pressure applied toa display device to thus associate the output of the sensor with abiometric output or applied pressure typically provided by a particularuser and hence determine a particular user (and hence particularclipboard) based thereon that is using the input device 1500. E.g.,since sometimes different users exert differing levels of pressure usingthe same input device or a similar one, different pressure and/orcapacitive profiles may be created and associated with the differentusers to thus identify a specific user using the input device 1500 basedon pressure and/or capacitance. Note that although biometrics and/orpressure are disclosed as being sensed at the input device 1500 above,it is to be understood that biometrics and/or pressure may be used todetermine a user providing input based on biometrics and/or pressurebeing sensed at the device with which the input device 1500 is makingcontact as well.

Still in reference to FIG. 15, also shown is a fingerprint reader 1506.The fingerprint reader 1506 may be used to gather data for thefingerprint of a user for authentication purposes, and/or also forgathering data for the fingerprint of a user to identify the user of theinput device 1500 to thus identify data associated with the user and/orthe user's profile for execution of a data transfer command (e.g. toidentify a particular clipboard for access to execute a data transfercommand).

E.g., one input device may be configured for use by plural persons,where each person has their own data transfer clipboard (e.g. indifferent cloud storage areas) from which data may be transferred. Thus,responsive to input from the fingerprint reader, the input device 1500may determine which of plural users is currently manipulating the inputdevice 1500 to execute e.g. a paste command, and thus determine whichclipboard to access to determine an element to be pasted therefrom.

In addition to the foregoing, the input device 1500 may include buttons1508, 1510, and 1512 for respectively inputting cut, copy, and pastecommands. The buttons may be illuminable with different colored lightsas well, such as e.g. different colored light emitting diodes (LEDs).Additionally, an LED bar 1514 may be included on the input device 1500that is illuminated relative to the amount of either available storagecapacity or occupied storage capacity of the input device 1500. Thus,e.g., if seventy percent of the storage capacity of the input device1500 is available, seventy percent of the bar 1514 may be illuminated.Conversely but as another example, if sixty percent of the storagecapacity of the input device 1500 is occupied, sixty percent of the bar1514 may be illuminated.

Without reference to any particular figure, it is to be understood thatselection of e.g. text using a stylus pen in accordance with presentprinciples (e.g. for a cut or copy of the text) may be done by initiallypositioning a portion of the pen against a portion of a displaypresenting the first character sought to be cut or copied, and thenmoving the pen left to right, up to down until the pen is over the lastcharacter sought to be cut or copied. However, when not copying text butinstead copying a file such as an image, any portion thereof may beselected to copy the entire file or image.

Furthermore, it is to be understood that e.g. when data is cut or copiedfrom a first device but presenting the data per a paste command e.g.either requires a particular application not supported by or installedon a device to which the data will be pasted and/or is in a file formatnot supported by the device to which the data will be pasted, the datamay be collected at the cut or copy device as a screen shot and then maybe pasted as a screen shot to the other device. Accordingly, in someembodiments the cutting or copying device and paste device maycommunicate with each other to thus determine the capabilities of theother device and whether or not such data is supported and/or whetherthe pasting device has the application to present the data in its nativefile format. In such an instance, a screen shot may be created in aformat recognized by the pasting device. This may be clone when e.g. anote taking application collects data regarding input to e.g. a desktopscreen of a device and/or to a note taking application UI, where thedevice to which such note taking data is to be pasted does not supportthe note taking application. Thus, the device having the note takingapplication may collect the data and convert it into a screen shotrepresenting the handwriting (e.g. by taking a screen shot of the UIwith the writing from the user included thereon) and then transmit thescreen shot data to e.g. an input device and/or the pasting device.

Still without reference to any particular figure, it is to be understoodthat identifying information for an input device as described herein maybe determined using a capacitive display device in contact with an inputdevice. Thus, e.g. when using a “passive” stylus pen for identificationof a unique user, a unique styli tip may be provided on the input devicethat essentially mimics the uniqueness of a human fingerprint in thateach pen may have its own unique, one of a kind tip for providing inputto a device that may include a set of arcs, loops, unique ending andbranching of lines, etc., and may each even be of different shapes andsizes and/or made of different materials to create unique levels ofcapacitance when in contact with and sensed by a display device. E.g.,to create a unique capacitance, the unique texture tips may be comprisedof several materials such as e.g. metal alloys, cellulose wood fibers,silicone or foamed plastic polymers, etc. Thus, it is to be understoodthat a device communicating with such a pen may have acapacitive-sensing display configured to measure capacitance of thevarying pen tips and/or measure varying tip shapes and sizes when incontact therewith. In addition to the foregoing, such display devicesmay be configured to detect e.g. different pen colors and even e.g.different tip colors to thus identify and distinguish between pens withdifferent colors (e.g. based on the capacitive-sensing display and/orbased on input from a camera).

In addition to the foregoing, other ways may be used of identifyingunique input devices and hence unique users to thus determine whichcut/copy/paste clipboard should be used when undertaking a data transfercommand, such as including on the input device a conductor extendingfrom the body of the pen to the tip that measures the biometricsignature of a user as input to the touch screen. In addition to or inlieu of the other methods described herein, facial recognition of a usermay also be used e.g. responsive to a determination that the user isholding the input device based on at least one image gathered by acamera on either the input device or the device with which the inputdevice is engaging.

Still without reference to any particular figure, e.g. a cloud storagedevice (e.g. a server) may receive input device identifying informationfor authentication of the input device thereat, and/or authenticationmay occur at either or both of the device interacting locally with theinput device for a cut or copy command and the device interactinglocally with the input device for a paste command (e.g. the devices withwhich the input device makes contact in accordance with presentprinciples).

Additionally, it is to be understood that a “clipboard” for storing cutor copied data for pasting to another device in accordance with presentprinciples may exist e.g. on a cloud storage device, on the input deviceitself, and/or on either or both of the device interacting locally withthe input device for a cut or copy command and the device interactinglocally with the input device for a paste command (e.g. the devices withwhich the input device makes contact in accordance with presentprinciples). In addition, it is to be understood that communication ofclipboard information (e.g. cut or copied data) may occur between one ormore of these devices e.g. by WiFi direct communication, the Internet,Bluetooth communication, near field communication (NFC), etc. But in anycase, it is to be further understood that the clipboard to which or fromwhich cut, copy, or paste information is provided may be associated witha particular user, and that input device identifying information for aparticular input device may be associated with the same user and theuser's corresponding profile, e.g. such that manipulation of an inputdevice having identifying information associated with a user's profilemay cause e.g. cut or copied data to be provided to and stored at thatparticular user's clipboard. Thus, when a paste command is provided toanother device with the same input device, the other device is able toaccess the same clipboard by also using the identifying information forthe input device to thus access data cut or copied by that particularuser for pasting. Accordingly, present principles recognize thatdifferent input devices associated with different users may be used onthe same cutting or copying device to cut or copy data to differentclipboards, and that different input devices associated with differentusers may also be used on the same pasting device to paste data theretofrom different clipboards.

Notwithstanding, note that in other embodiments a particular clipboardmay be associated with a group of users, and/or may be accessible by agroup of users for cutting and copying data thereto and pasting datatherefrom based on e.g. manipulation of plural different input devicesall associated with or granted access (e.g. permissions to) the sameclipboard. What's more in some embodiments a user may share his or herown personal clipboard such that others may access, cut, copy, and pastedata to and from it.

Still without reference to any particular figure, it is to be understoodthat when pasting data in accordance with present principles (by e.g.contacting an input device against the display of another device), ifthe contacted area is presenting a folder it may be determined that thefolder is the paste location and the data may be pasted e.g. as a fileto the folder. As another example, if the contact area is to a documentthat is open (e.g. a word processing document), it may be determinedthat the document is the paste location and the data may be pasted atthe point of the document where the input was provided by the inputdevice. Also note that in some embodiments, e.g. when pasting to aparticular device data of a particular file format, the device mayautomatically responsive thereto launch an application for presentingthe data.

In addition to the foregoing, present principles recognize that e.g.when first cutting or copying data at one device, a UI may be presentedfor indicating a particular location at which the data should not onlybe stored but also pasted on another device. E.g., the UI may provide aselector element for commanding the cut or copied data be automaticallypasted to another device, and/or e.g. even another particular area ofthat device, and/or stored in another folder on the other device inaddition to being stored at a particular clipboard.

Again without reference to any particular figure, present principlesrecognize that although e.g. a software application for undertakingpresent principles may be vended with a device such as the system 100,present principles apply in instances where such an application is e.g.downloaded from a server to a device over a network such as theInternet. Furthermore, present principles apply in instances where e.g.such an application is included on a computer readable storage mediumthat is being vended and/or provided, where the computer readablestorage medium is not a carrier wave.

It may now be appreciated based on the foregoing that transferring databetween devices may occur with an action such as touching one devicewith a stylus and later touching another device based on e.g. useridentification and user authentication. Present principles may beundertaken using a pen for user identification and authentication toperform a save action to a e.g. cloud storage location that acts as a“cloud clipboard.” The “cloud clipboard” may also reside locally at theinitial device from which cut or copy data was taken and the data may betransferred e.g. via a peer to peer method such as Bluetooth, Wi-Fidirect, etc. The pen identifies and authenticates the user with a methodthat communicates its identity to the computer and cloud clipboard. Thepen may also communicate an intended user action to the cloud clipboardservice, such as a copy or a paste. Also, note that e.g. identifyinginformation in accordance with present principles may be authenticatedat the devices disclosed herein using software that is also used topresent and/or accept data to be selected and/or transferred.

Furthermore, more than one pen may be used in accordance with presentprinciples, and each pen may have its own unique identity, thus allowingit to be used among different compatible devices. The cloud clipboardservice recognizes the pen's identity, and performs authentication andthe intended user action. For example, if the cloud clipboard servicereceives a copy action, the intended data (e.g. a pen-selected region)may upload from the initial device to the cloud clipboard. If the cloudclipboard receives a paste action, the intended data or last clipboarditem may download from the cloud clipboard to the targeted device, andinsert it at the pen's current contact location. The cloud clipboard mayalso allow a user to bring previous or multiple cut or copied items tothe targeted device(s) e.g. with a special pen context menu.Furthermore, the last clipboard item may in some instances be thedefault item to be pasted. Additionally the cloud clipboard service mayinclude data integrity and security features to assure that the cut,copy, and paste actions are correctly carried out. What's more, as asharing feature, a user can set the cloud clipboard service to be publicor private, to allow one or multiple users to access it (e.g. and onlyaccess rather than cut, copy, or paste data therefrom), and/or cut,copy, and/or paste data therefrom.

Further still, in some embodiments a pen in accordance with presentprinciples may have an element for sensing a gesture to thus berecognized at the device, pen, and/or a cloud clipboard to thus initiateand complete an intended action(s) such as copy or paste. Auser-generated action may come from a gesture such as e.g. a letter “C”to invoke a copy action. Similarly, a letter “P” gesture may invoke apaste action.

By uniquely identifying different pens, a cloud clipboard service mayallow for collaborative pen activities. For example, in a multiple userscenario, users can draw or record simultaneously on the same deviceeach with their own pen ID. The input may be identified as correspondingto a particular pen and/or ID, and thus be stored on a clipboardassociated with the pen and/or ID for pasting.

While the particular DATA TRANSFER BASED ON INPUT DEVICE IDENTIFYINGINFORMATION is herein shown and described in detail, it is to beunderstood that the subject matter which is encompassed by the presentapplication is limited only by the claims.

What is claimed is:
 1. An input device, comprising: a portable housing;at least one processor supported by the portable housing; and at leastone light accessible to the at least one processor, wherein the at leastone light establishes a bar that extends longitudinally along theportable housing relative to a longitudinal axis of the portablehousing; and storage accessible to the at least one processor andbearing instructions executable by the at least one processor to:indicate, via the at least one light, available storage capacity of theinput device, wherein the available storage capacity is indicated byilluminating a first amount of the bar that is less than a totalilluminable amount of the bar; sense physical contact of the inputdevice against a first device different from the input device; and inresponse to the physical contact being sensed, provide information to atleast one of the first device and/or a server as part of a cut, copy, orpaste operation.
 2. The input device of claim 1, wherein theinstructions are further executable by the at least one processor to:receive, from the first device, first data; store the first data at theinput device; and provide, to a second device in response to contact ofthe input device against the second device, the first data.
 3. The inputdevice of claim 1, comprising: a cut selector on the portable housingand selectable to indicate a cut operation; a copy selector on theportable housing and selectable to indicate a copy operation; and apaste selector on the portable housing and selectable to indicate apaste operation; wherein the cut selector, copy selector, and pasteselector are different from each other and are located at differentportions of the portable housing; and wherein the cut copy, and pasteselectors are each illuminable with different color lamps.
 4. The inputdevice of claim 1, wherein the at least one light comprises at least onelight emitting diode (LED).
 5. The input device of claim 1, wherein theat least one light indicates the available storage capacity by conveyingoccupied storage capacity.
 6. The input device of claim 1, wherein theat least one light indicates the available storage capacity by conveyingthe available storage capacity.
 7. The input device of claim 1,comprising a radio frequency identification (MD) element that comprisesdata identifying the input device.
 8. The input device of claim 1,wherein the information comprises data identifying the input device. 9.The input device of claim 1, wherein the information comprises data thatwas cut from another device different from the first device and/or datathat was copied from another device different from the first device. 10.An input device, comprising: at least one housing; at least oneprocessor supported by the at least one housing; at least one light baraccessible to the at least one processor; and storage accessible to theat least one processor and bearing instructions executable by the atleast one processor to: receive data from a second device different fromthe input device, the data being received as a result of at least onecommand comprising a cut command, a copy command, and/or a pastecommand; store the data at the input device; and indicate, via the atleast one light bar, an available storage capacity of the input devicesubsequent to storing the data, wherein the available storage capacityis indicated by illuminating a first amount of the at least one lightbar that is less than a total illuminable amount of the at least onelight bar.
 11. The input device of claim 10, wherein the data isreceived as a result of at least one command comprising a cut commandand/or a copy command.
 12. The input device of claim 10, wherein the atleast one light bar comprises at least one light emitting diode (LED).13. The input device of claim 10, wherein the at least one light barindicates the available storage capacity by conveying occupied storagecapacity.
 14. The input device of claim 10, wherein the at least onelight indicates the available storage capacity by conveying theavailable storage capacity.
 15. The input device of claim 10,comprising: a cut selector coupled to the housing and selectable toindicate a cut operation; a copy selector coupled to the housing andselectable to indicate a copy operation; and a paste selector coupled tothe housing and selectable to indicate a paste operation; wherein thecut selector, copy selector, and paste selector are different from eachother and are located at different portions of the housing; and whereinthe cut, copy, and paste selectors are each illuminable with differentcolor lamps.
 16. A method, comprising: receiving, at an input device,data from a second device different from the input device, the databeing received as a result of at least one command comprising a cutcommand, a copy command, and/or a paste command; storing the data at theinput device; and indicating, via at least one light bar on the inputdevice, an available storage capacity of the input device subsequent tostoring the data, wherein the available storage capacity is indicated byilluminating a first amount of the at least one light bar that is lessthan a total illuminable amount of the at least one light bar.
 17. Themethod of claim 16, wherein the data is received as a result of at leastone command comprising a cut command and/or a copy command.
 18. Themethod of claim 16, wherein the at least one light bar comprises atleast one light emitting diode (LED).
 19. The method of claim 16,wherein the at least one light bar is illuminated to indicate theavailable storage capacity by conveying occupied storage capacity. 20.The method of claim 16, wherein the at least one light is illuminated toindicate the available storage capacity by conveying the availablestorage capacity.