Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for sending command to portable storage device

A storage device and portable technology, which can be used to prevent unauthorized use of memory, instruments, electronic digital data processing, etc., and can solve problems such as user inconvenience

Inactive Publication Date: 2007-02-21
OURS TECH INC
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The same limitation exists for other portable storage devices
However, not all computers will log in as an administrator. For users who often use portable storage devices on different hosts, the aforementioned restrictions obviously cause considerable inconvenience to users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for sending command to portable storage device
  • Method for sending command to portable storage device
  • Method for sending command to portable storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Firstly, the characteristics of the present invention will be described by taking the protection area of ​​the login flash drive as an example. The flash drive is connected to a computer, and the computer has an operating system, such as windows XP published by Microsoft Corporation.

[0034] In step 201, the login program starts to start the process of logging into the protected area. The execution of the login procedure can be started due to the user's operation, or can be started automatically after the flash drive is connected to the host.

[0035] Next, in step 203, the user is required to input a password. Generally, a window will appear asking the user to enter the password required to log into the protected area of ​​the pen drive.

[0036] After obtaining the password input by the user, proceed to step 207, store a verification instruction and relevant data such as the password in a predetermined area in a storage unit in the flash drive, and the implementati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for placing command to portable storage unit includes storing command data sent out by application program into a preset region of storing unit in storage unit, executing command represented by said data accordingly by portable storage unit when written in data at preset region is detected by firmware of controller in said storage unit.

Description

technical field [0001] The invention relates to a method for executing instructions, in particular to a method capable of executing instructions without being restricted by the identity of the host user. Background technique [0002] Most of the current portable storage devices use micro-hard drives or flash memory as storage media. Using flash memory as a storage medium is called a flash drive, or pen drive. The following uses the flash drive as an example to illustrate some limitations of the portable storage device. [0003] In order to protect the user's personal data stored in the flash drive or other files or programs that need to be kept secret, such as address books, note files, calendars, text files or pattern files of personal works, passwords, keys for other systems, Or enter the login file of other systems, the security function of the flash disk is developed. [0004] The current flash drive with security function generally plans a security area to store file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00G06F12/14
Inventor 吴仕良刘世杰
Owner OURS TECH INC