Mass storage device with automated credentials loading

A technology of large-capacity storage and host device, applied in computer security device, protection of storage content to prevent loss, digital data authentication, etc., can solve problems such as inconvenience and restrict user acceptance, and achieve the effect of risk reduction

Inactive Publication Date: 2008-09-03
SANDISK TECH LLC
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Carrying such devices around is inconvenient and limits user acceptance, especially when tech-savvy users may already be carrying cellular phones, music players, PDAs or Blackberries, digital cameras, and other assorted electronic devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mass storage device with automated credentials loading
  • Mass storage device with automated credentials loading
  • Mass storage device with automated credentials loading

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Portable mass storage devices are widely used to store digital content such as photos, music, videos and documents. It's also large enough to store large software applications. Typically, portable mass storage devices now use flash memory for storage purposes and have a memory card or portable USB drive form factor. These mass storage devices differ from other portable devices that can only store minimal information such as that required for transaction or identification purposes. Mass storage devices also differ from other special-purpose devices, such as key fobs and tokens used for authentication, in that while special-purpose devices may have small amounts of memory to store relevant user-identifying information, they are not designed to Store and transfer relatively large and often encrypted files frequently and in a repeatable manner.

[0039] For example, a memory card, one embodiment of a portable mass storage device, must be able to quickly store pictures of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a portable mass storage device for use in two factor authentication systems and methods. A secure portable mass storage device protects content from being freely copied with security mechanisms and firmware. The security functionality also protects confidential user credentials and passwords, as well as algorithms and seeds needed for two factor authentication or asymmetric authentication methods. A client application residing in the mass storage device acts as both a password manager and an authentication manager that seamlessly performs the authentication procedures in the background while signing a user into various institutions of his choosing. A very high level of security is integrated into a mass storage device the user has for purposes other than two factor authentication, and the convenience of highly secure password management also comes in a convenient pocket sized package easy for the user to transport. This facilitates the acceptance of two factor authentication, and increases security for a wide variety of online transactions.

Description

technical field [0001] The present invention relates generally to portable mass storage devices, such as memory cards and portable Universal Serial Bus ("USB") flash memory drives, for storing and transferring large files to and from digital devices, and more particularly Involves security and access control mechanisms implemented within a device to access the device, as well as other mechanisms. Background technique [0002] Remembering passwords is troublesome. Office computers require usernames and passwords. Every e-mail account needs a username and password, as does every online account. If security wasn't an issue, one might just need to have one username and password for all accounts. [0003] However, security is a serious issue, and so is password management and access to accounts. A number of current approaches address this serious problem by attempting to make passwords easy to remember or more robust and less likely to be revealed. [0004] One method is a o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20H04L9/32H04L29/06G06F21/34G06F21/41
CPCH04L63/0815G06F2221/2115H04L63/0838G06F21/34H04L63/0853G06F21/41H04L2463/082G06F13/16H04L9/32G06F12/16
Inventor 卡洛斯·J·冈萨雷斯约尔格·费尔绍法布里斯·亚贡-库仑
Owner SANDISK TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products