Universal serial bus (USB) device and method for recognition of host operating system

A host operating system and device identification technology, applied in the field of information security, can solve the problem that USB devices cannot identify the host operating system, and achieve the effect of optimizing USB devices and their applications

Active Publication Date: 2013-05-08
FEITIAN TECHNOLOGIES
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a USB device and a method for identifying the host operating system to solve the defect that the USB device cannot identify the host operating system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal serial bus (USB) device and method for recognition of host operating system
  • Universal serial bus (USB) device and method for recognition of host operating system
  • Universal serial bus (USB) device and method for recognition of host operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Such as figure 1 As shown, it is a flowchart of a method for identifying a host operating system by a USB device in Embodiment 1 of the present invention, including the following steps:

[0064] Step 101, the USB device is powered on.

[0065] Specifically, the USB device is connected to the host through the USB bus, and obtains the operating voltage from the host Vcc (power supply voltage or operating voltage). Among them, the USB device is specifically a security device (such as a USB Key), a card reader, a storage device (such as a U disk), or a keyboard, a mouse and other computer peripherals;

[0066] Step 102, the USB device initializes the first identification bit and the second identification bit.

[0067] Specifically, the USB device may set the value of the first identification bit as a first preset value, and set the value of the second identification bit as a second preset value. Wherein, the first identification bit is used to identify whether the USB de...

Embodiment 2

[0109] Such as figure 2 As shown, it is a flowchart of a method for identifying a host operating system by a USB device in Embodiment 2 of the present invention, including the following steps:

[0110] In step 201, the USB device is powered on.

[0111] Step 202, the USB device waits to receive a USB command from the host.

[0112] In step 203, the USB device receives the first acquire-configuration-descriptor command and the second acquire-configuration-descriptor command continuously sent by the host.

[0113] Wherein, the first acquire-configuration-descriptor command and the second acquire-configuration-descriptor command are USB commands sent by the host to the USB device during the enumeration phase of the USB device. The host requests to obtain the configuration descriptor of the USB device by sending the first obtain configuration descriptor command and the second obtain configuration descriptor command to the USB device. The first Get Configuration Descriptor comm...

Embodiment 3

[0130] Such as image 3 As shown, it is a flowchart of a method for identifying a host operating system by a USB device in Embodiment 3 of the present invention, including the following steps:

[0131] In step 301, the USB device is powered on.

[0132] Specifically, the USB device is connected to the host through the USB bus, and obtains the operating voltage from the host Vcc (power supply voltage or operating voltage). Among them, the USB device is specifically a security device (such as a USB Key), a card reader, a storage device (such as a U disk), or a keyboard, a mouse and other computer peripherals;

[0133] Step 302, the USB device initializes the first identification bit and the second identification bit.

[0134] Specifically, the USB device may set the value of the first identification bit as a first preset value, and set the value of the second identification bit as a second preset value. Wherein, the first identification bit is used to identify whether the USB...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a universal serial bus (USB) device and a method for recognition of a host operating system. The method comprises the following steps: waiting for and receiving a USB command coming from a host by the USB device, judging whether the received USB command is a command for obtaining a deployment descriptor or not, if yes, confirming the host operating system according to values of a first identification bit and a second identification bit and values of length bytes in the command for obtaining the deployment descriptor, after the host operating system is confirmed, utilizing a corresponding communication protocol to carry out data communication with the host according to the host operating system, shielding files which cannot be operated under the host operating system, enabling the host to recognize and operate the USB device accurately, and enabling the USB device and the application of the USB device to be optimized.

Description

technical field [0001] The invention relates to the field of information security, in particular to a USB (Universal Serial Bus, Universal Serial Bus) device and a method for identifying a host operating system. Background technique [0002] USB protocol technology is a serial bus standard for connecting hosts and external devices. It is widely used on hosts (such as personal computers, personal digital assistants, and mobile computers, etc.), supports hot plugging and plug-and-play, and supports bus power supply. Almost all peripheral devices such as mice, keyboards, game controllers, scanners, digital cameras, printers, hard disks, security devices, optical drives and network cards can be connected to and communicate with the host computer through the USB interface. The default interface through which the host peripherals are connected to the computer. [0003] In terms of operating system platform support, Windows system platforms such as Windows 98, Windows 2000, Window...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F13/38G06F13/42
CPCG06F13/38G06F13/385G06F9/4411G06F9/441G06F13/387G06F13/4221
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products