Secure storage device
A technology for safe storage and equipment, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of insufficient data encryption key transmission means, no data transmission security measures, etc. Effects of data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0058] The first embodiment is: (1) The server module 102 supports Hypertext Markup Language 5 (HTML5) or an earlier version of HTML. The server module 102 can support various file operations in addition to generating traditional pages; (2) When the user When the local computer accesses the storage, it is completed through the HTML browser, and the server module 102 receives the file access request sent by the user's local computer through the HTML browser; when the user's local computer opens the file on the storage, it is equivalent to the server module 102 completing a series of operations , And display the operation results in the form of HTML5 objects or HTML pages.
Example Embodiment
[0059] The second embodiment is: (1) the server module 102 is an X-server, and the user's local computer issues a file access request through x-client or RDP; (2) when the user's local computer accesses the memory, the local X-client will be started. All operations are completed by the processor on the memory, and the user's local computer only displays the graphical results after the processing is completed. Among them, X-server means that the server is a device that supports the client to access through the graphics protocol, and the X-client terminal interacts with the server through the graphics protocol.
[0060] In addition, if the method of X-Server or HTML Server is not used, the server module 103 can be realized by starting a server software program on the secure storage. At the same time, the storage provides a client program that can be obtained by the user's local computer. The server module interacts. The client program can communicate with the server through secure...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap