CN101221510B - Method for reappearing user configuration surroundings on computer by mobile memory device - Google Patents

Method for reappearing user configuration surroundings on computer by mobile memory device Download PDF

Info

Publication number
CN101221510B
CN101221510B CN2008100567416A CN200810056741A CN101221510B CN 101221510 B CN101221510 B CN 101221510B CN 2008100567416 A CN2008100567416 A CN 2008100567416A CN 200810056741 A CN200810056741 A CN 200810056741A CN 101221510 B CN101221510 B CN 101221510B
Authority
CN
China
Prior art keywords
configuration information
user
privately owned
storage device
movable storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008100567416A
Other languages
Chinese (zh)
Other versions
CN101221510A (en
Inventor
张悠慧
王小玲
洪亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN2008100567416A priority Critical patent/CN101221510B/en
Publication of CN101221510A publication Critical patent/CN101221510A/en
Application granted granted Critical
Publication of CN101221510B publication Critical patent/CN101221510B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention relates to a method which utilizes a mobile memory device for recurrence of user configuration environment on a computer, wherein, configuration information related to user individuation configuration environment can be extracted and stored on the mobile memory device, and operation of the configuration information is redirected to the mobile memory device on a target computer, thereby the user individuation configuration environment is recurred. The technical proposal of the invention is that: system configuration information and environment variables are stored on the mobile memory device; moreover, resource access is intercepted and captured during the operating process through a system call package technology and redirected to the mobile memory device, and the user individuation configuration environment is recurred under the precondition that performance and reliability are almost not affected. The invention is compatible with existing window application software, and source codes of the invention are unnecessary to be modified.

Description

Utilize the movable storage device method of reappearing user configuration surroundings on computers
Technical field
The invention belongs to the environment of reappearing user preparation on computers method field, especially a kind of movable storage device reappearing user preparation on computers environment method of utilizing.
Background technology
Along with the decline of hardware price and increasing of application software, computing machine has spread to people's work and life.Simultaneously, because the access of Internet is also more and more universal, the user not only can stay at home, company, Internet bar connect Internet, can also on coffee shop, train, aircraft, surf the web; If computer configuration wireless network card, insert Internet and just be more convenient for.
Yet the user always gets used to the desktop application environment that oneself configures, the position of " my document " for example, the homepage of " Internet Explorer ", icon that application tool bar shows or the like.But the change in geographic position cause usually the user need be on different computing machines switch operating, and the desktop configure environment on each computing machine maybe and inequality, the user often need change configuration surroundings to adapt to own the custom by the flower certain hour before using.
Simultaneously, use that common programs can stay the certain operations vestige usually on the public computer, these vestiges are very likely revealed user's privacy, and user's information security is constituted a threat to.For example, the mail account setting of " Outlook Express ", the historical record and the cookies of " Internet Explorer ", or the like.
Usually the method that addresses this problem has: it is notebook computer that portable computer is adopted in (1); The portability of notebook computer can solve well because the unhandy problem that the environment conversion brings; But notebook computer itself has a lot of restrictions in use again simultaneously; As the thing of carrying several kilograms is still not too convenient after all, and the service time of computer battery is limited or the like.(2) remote access, the advantage of this method are to need not to carry anything, and shortcoming is too high to the network dependence, must in LAN or VPN (VPN), just suitable performance can be arranged.(3) utilize virtual machine; Operating system is contained on the virtual machine (VMware or VirtualPC); Then virtual machine image is placed on and carries on the movable storage device also and can address this problem; But exist target machine that software virtual machine must be installed simultaneously, start-up time is long, and machine performance is required high shortcoming.
Summary of the invention
The purpose of this invention is to provide a kind of movable storage device reappearing user preparation on computers environment method of utilizing; Can extract and deposit in the configuration information relevant on the movable storage device with the user individual configuration surroundings; Be redirected to operation on the movable storage device on the object computer these configuration informations, thus the personalized configuration surroundings of reappearing user oneself.
Technical scheme of the present invention is: utilize movable storage device reappearing user preparation on computers environment method, it is characterized in that may further comprise the steps:
---extract user's personalized configuration surroundings relevant information is privately owned configuration information, is stored on the movable storage device;
---privately owned the configuration information that is stored on the mobile device is carried out initialization, it comprises:
Reset the user environment variable according to the drive of movable storage device; Revise item of information relevant in the privately owned configuration information according to the drive of movable storage device with drive;
The parcel program that---use preset is wrapped up the registry operations of destination application, promptly in the target program execute file, inserts code, with rewrite the registry system that will wrap up be invoked at the inlet in the execute file;
Whether---detect application program visits preparation information, when detecting the application access configuration information, carries out following steps:
If read operation comprises and opens, inquires about, enumerates, judge earlier whether the information of reading is present in the privately owned configuration information, if then read the content in the privately owned configuration information; Otherwise read the content of configuration information in the computing machine;
If write operation: comprise the increase operation if revise, the object of then no matter operating is deposited and is not present in the privately owned configuration information, all operates privately owned configuration information; Be not present in the privately owned configuration information if deletion action, the object of then no matter operating are deposited, all operate privately owned configuration information, and the increase judgement symbol shows that this operand is deleted;
---when detecting application program and do not have access configuration information continues to detect; If application program withdraws from, preserve user's personalized configuration information.
Effect of the present invention is: at present; Portable movable storage device is (like portable hard drive; USB flash disk) use more and more widely, simultaneously, increasing digital equipment is (like mobile phone; MP3, digital camera) can use memory device and computing machine directly to carry out high-speed data exchange based on Flash Memory (flash memory).Flash Memory is a development in recent years internal memory rapidly; Belong to non-voltile memory (Non-volatile promptly cut off the power supply data also can preserve); It has the advantages that electricity is wiped, and also has advantages such as low-power consumption, density is high, volume is little, reliability is high, can wipe, can rewrite.
On the other hand, the message transmission rate of USB2.0 can reach 480Mbps, and the transfer rate of IEEE-1394 (being commonly called as live wire) also can reach 400Mbps, and some PCI storage cards can reach higher transfer rate.Like this, the exchanges data speed of CPU and portable memory apparatus can near with the exchanges data speed of internal memory.
Based on above-mentioned analysis; The present invention proposes to extract and deposit in the configuration information relevant with the user individual configuration surroundings on the movable storage device; Be redirected to operation on the movable storage device on the object computer these configuration informations, thus the personalized configuration surroundings of reappearing user oneself.
Method of the present invention has following characteristics: (1) is with low cost, only needs a movable storage device, and the price of current Flash Memory is Tu Po $100/GB, the Jia Ge $5/GB of portable hard drive; (2) versatility is good, under the operating system of any prepackage Windows XP (or higher), can work, need not other hardware of additional configuration; (3) high efficiency, the exchanges data speed of movable storage device and intercomputer near or be equal to computer-internal exchanges data speed; (4) advance, the development of general formula calculating and mobile computing is in the ascendant, from technical standpoint, can be not out-of-date; (5) transparency; Concerning the user, use transparent; Simultaneously need not the retouching operation system and the code of application program, (6) are prone to expand, and the present invention has accomplished the realization that the configuration surroundings to several Windows application program commonly used moves; Through same procedure, can be easy to realize the configuration surroundings migration of other application program.
The core of the present invention's technology is; Configuration information that will be relevant with the user individual configuration surroundings (note is made privately owned configuration information) extracts and deposits on the movable storage device; Intercept and capture the API that application program reads configuration information then; If visit is privately owned configuration information, then be redirected on the movable storage device; Otherwise the configuration information (being designated as local configuration information) of direct access destination machine.Simultaneously, any modification to the configuration information relevant with application program all is redirected to movable storage device, the local operation system is not done any change.
Its main innovate point is: the configuration information of application program is only preserved in (1), rather than whole application program; (2) only be redirected to the write operation of configuration information with to the read operation of personalized configuration information; (3) to operating system and the transparent realization of application program.
We can see through Figure of description; Application program and operating system need not to revise, but directly (essence is exactly between system call that the user uses and the actual function that realizes, to insert code, so that intercept and capture the information such as call parameters of user program through system call is wrapped up; See next part for details); Can directly intercept and capture application program like this configuration information is operated, (comprise increase, deletion if operation is a write operation; Revise) and to the read operation of personalized configuration information, then operation is redirected on the movable storage device.
Below in conjunction with accompanying drawing and embodiment the present invention is done further explanation.
Description of drawings
Fig. 1 is a hardware block diagram of the present invention;
Fig. 2 is a program flow diagram of the present invention.
Embodiment:
The present invention is made up of a computing machine and a movable storage device that has high bandwidth Peripheral Interface (comprising USB, IEEE-1394).Its extracts the configuration information with the user individual environmental correclation, and with movable storage device as carrier.Movable storage device links to each other through high band wide data line (comprising usb interface, IEEE-1394 interface) with computing machine.This technology is reset environmental variance earlier; Wrap up through the registry operations of the transparent technique for packing application programs of system call then; Thereby will be redirected on the movable storage device the personalized configuration surroundings of reappearing user under the prerequisite that influences Performance And Reliability hardly to the operation of user individual configuration information.Technology of the present invention is transparent fully to the user.
1, the installation of high-speed mobile memory device and use
Current by many high-speed mobile memory devices, distinguish from storage medium and to comprise portable hard drive and multiple storer based on Flash Memory, the latter comprises flash disk (flash disk); The CompactFlash card; The SmartMedia card, Memory Stick, MultiMedia Card card etc.Wherein flash disk has replaced the standard configuration that floppy disk is called PC, and the multiple storage card that the back is mentioned also has been widely used in multiple digital devices such as digital camera, MP3 player.
From seeing with the connection protocol of computing machine, Windows series and other mainstream operation system can be supported USB interface (present 2.0 standards are main flows), IEEE-1394, pcmcia interface etc.Their maximum data transfer rate has all reached 400Mbps or higher, can satisfy the requirement in the movable storage device store configuration information of operating system and application program fully.
Therefore, technology of the present invention need not solve the installation question of movable storage device, has good ease for use.
2, extract the user individual configuration surroundings
Configuration information relevant with user configuration surroundings in the operating system is always stored with certain mode, like configuration file.Be the example explanation below with Windows.
Windows operating system environment for use variable and registration table come leading subscriber environment configurations information.
(1) environmental variance
Environmental variance is the character string that comprises about the environmental information of system and current login user.Some software programs use this information to confirm to place wherein file (like temporary file).
In installation process, Windows setup is with the allocating default system variable, like the path of Windows file.The so-called system environment variable of this type of environmental variance.
The user environment variable can be added, revises or deleted to Any user.These variablees are set up by Windows setup, some program and user.These environmental variances are commonly referred to as the user environment variable.
Technology of the present invention is mainly revised the user environment variable.For example, the memory location of user " my document ", the temporary file of Internet Explorer adds the memory location, or the like.
Because environmental variance is heritable, each process has the different environment variant duplication.Like this, only need when technological initialization, to set environmental variance, just all duplicate these environmental variance copies by the program that this technology starts.
(2) registration table
Registration table is a huge relevant database that is used for the various configuration informations of centralized and unified management system of windows operating system, and it is the basis and the core of windows operating system.Environmental variance also is kept in the registration table.
Write down the information of system's various aspects in the registration table; The interrelated data that roughly comprise the various software programs of user installation to the computing machine; The hardware configuration information (comprise behind the computer starting equipment such as the flash disk and the existing various apparatus configurations information etc. of plug and play) automatically that also comprises computing machine; Also depositing the installation of controlling windows os starting, hardware drive program and the configuration parameter that starts the various application programs of windows in addition in the registration table, these data play the core control action in whole windows operating system.
Technology of the present invention is mainly paid close attention to the registry information relevant with the user individual configuration surroundings.The preservation position of user Outlook Express inbox for example, homepage of InternetExplorer or the like.
Comprehensively to the analysis of environmental variance and registration table, it is fully feasible peeling off the user individual relevant configuration information.
3, the transparent technique for packing of system call
The essence of system call technique for packing is exactly between system call that the user uses and the actual function that realizes, to insert code, so that intercept and capture the information such as call parameters of user program.
In Windows, technology of the present invention is is mainly intercepted and captured among the Windows API the API of registry operations, and this can pass through the Detours tool implementation.Thereby the Detours developing instrument that Microsoft provides can be through being overwritten in the code interception win32 function in the internal memory for objective function.The Detours software package can also be injected into dll and data slot (being referred to as useful load) arbitrarily arbitrarily in the middle of the win32 binary file.
Behind the registration table api function through the routine call of detours plug-in mounting, can through the parameter of api function come the operand of discriminant function be we the operand that will pay close attention to.If, then operation is redirected to privately owned registration table through privately owned registration table api function, otherwise, then return and let the windows registry handling function continue carry out.
4, the reference implementation of system
Technology of the present invention realizes in Windows XP system, its concrete composition as follows:
Windows?XP?SP2;
USB 2.0 portable hard drives;
The present invention's technology start-up routine and plug-in mounting DLL;
The configuration file of user individual environment
(1) sets
During technical application program initialization of the present invention, the user environment variable is set through calling Windows API.Because the inherited characteristics of environmental variance just need not reset environmental variance by this technology application program started.
The user environment variable that is provided with during the initialization of the present invention's technology comprises: ALLUSERPROFILE, APPDATA, CommonPogramFiles, HOMEDRIVE, HOMEPATH, TEMP, TMP, USERPROFILE or the like.
(2) extraction is disposed relevant registry information with the user
The registry entry (be privately owned registration table) relevant with the personalized configuration surroundings of Windows user is more; Mainly comprise SOFTWARE USER SHELLFOLDERS, SOFTWARE USER SHELLFOLDERS or the like.The main registry entry that extracts under HKEY_LOCAL_AMCHINE and the HKEY_CURRENT_USER of the present invention's technology; Relevant registry entry under other root key with the user individual configuration surroundings; All be to be combined according to ad hoc rules by the registry entry under these two root keys, concrete rule is please developed document referring to MSDN.
Technology of the present invention is saved in the registration table content that extracts below user.r and the system.r, representes the registry entry under HKEY_CURRENT_USER and the HKEY_LOCAL_MACHINE respectively.
(3) parcel registry operations
The registration table API of the main parcel of the present invention's technology comprises: RegCreateKeyEx, RegOpenKeyEx, RegCloseKey; RegDeleteKey, RegSetValueEx, RegQueryValueEx; RegEnumKeyEx, RegEnumValue, RegDeleteValue; RegQueryInfoKeyEx, RegOpenCurrentUser, RegOpenUserClass.
The overall procedure of parcel is following:
Step1: initialization mainly comprises the initial configuration file.
Step2: intercept and capture relevant Registry API Calls, and judge as follows:
If read operation if operand also has, is then read content recorded in the privately owned registration table in privately owned registration table; If write operation (comprise modification, deletion increases) then is redirected to privately owned registration table, the registration table content on this machine is not changed.
Behind the parcel function (wide byte function (the function name end is W) has only been described here as follows; Narrow byte function (the function end is A) carries out calling wide byte function after the A/W conversion to parameter again); Wherein the function of Real_ beginning shows Windows Registry API, the privately owned Registry API of function representation of My beginning.Mine_RegCreateKeyExW(HKEY?a0,LPCWSTR?a1,DWORD?a2,LPWSTR?a3,DWORD?a4,REGSAM?a5,LPSECURITY_ATTRIBUTES?a6,PHKEY?a7,LPDWORD?a8))
{
HKEY?mine_hkey;
if(MineRegOpenKeyEx(a0,a1,0,a5,a7)==ERROR_SUCCESS)
{
*a8=REG_OPENED_EXISTING_KEY;
Return?ERROR_SUCCESS;
}
else
{
It is opened to increase record expression a0+a1;
MyRegCreateKeyEx(a0,a1,a2,a3,a4,a5,a6,a7,a8)
}
}
Mine_RegOpenKeyExW(HKEY?a0,LPCWSTR?a1,DWORD?a2,REGSAM?a3,PHKEY?a4)
{
HKEY?mine_hkey;
If (combination of a0+a1 is present in privately owned registration table)
{
Record a0+a1 opens;
Return?MyRegOpenKeyEx(a0,a1,a2,a3,&mine_hkey);
}
}
Mine_RegCloseKey(HKEY?a0)
{
If (a0 is the handle of privately owned registration table)
{
If the real_handle that a0 is corresponding is also opened, then Real_RegCloseKey (real_handle);
return?MyRegCloseKey(a0);
}
Else
{
If the private_handle that a0 is corresponding is also opened, then MyRegCloseKey (private_handle);
return?Real_RegCloseKey(a0);
}
}
Mine_RegDeleteKeyW(HKEY?a0,LPCWSTR?a1)
{
if(MyRegDeleteKey(a0,a1)==ERROR_SUCCESS)
{
Mark a0+a1 is for delete
}
Else
The corresponding error code of Return
}
Mine_RegSetValueExW(HKEY?a0,LPCWSTR?a1,DWORD?a2,DWORD?a3,const?BYTE*a4,DWORD?a5)
{
Return?MyRegSetValueExW(a0,a1,a2,a3,a4,a5);
}
Mine_RegQueryValueExW(HKEY?a0,LPCWSTR?a1,LPDWORD?a2,LPDWORD?a3,LPBYTE?a4,LPDWORD
a5)
{
If (a0+a1+valuename is present in privately owned registration table)
Return?MyRegQueryValueExW(a0,a1,a2,a3,a4,a5);
Else
Return?Real_RegQueryValueExW(a0,a1,a2,a3,a4,a5);
}
Mine_RegEnumKeyExW(HKEY?a0,DWORD?a1,LPWSTR?a2,LPDWORD?a3,LPDWORD?a4,LPWSTR?a5,
LPDWORD?a6,LPFILETIME?a7)
{
MyRegEnumKeyExW(a0,a1,a2,a3,a4,a5,a6,a7);
Real_RegEnumKeyExW(a0,a1,a2,a3,a4,a5,a6,a7);
Two results that enumerate are merged, return then
}
Mine_RegEnumValueW(HKEY?a0,DWORD?a1,LPWSTR?a2,LPDWORD?a3,LPDWORD?a4,LPDWORD?a5,
LPBYTE?a6,LPDWORD?a7)
{
If (a0 is not present in the privately owned registration table the property registry entry)
return?Real_RegEnumValueW(a0,a1,a2,a3,a4,a5,a6,a7);
else
{
MyRegEnumValue(a0,a1,a2,a3,a4,a5,a6,a7);
Real_RegEnumValue(a0,a1,a2,a3,a4,a5,a6,a7);
Two results that enumerate are merged, return then
}
}
Mine_RegDeleteValueW(HKEY?a0,LPCWSTR?a1)
{
LONG?res=MyRegDeleteValueW(a0,a1)
If(res==ERROR_SUCCESS)
{
A0+a1 is labeled as deletes;
}
Return?res;
}
Mine_RegQueryInfoKeyW(HKEY?a0,LPWSTR?a1,LPDWORD?a2,LPDWORD?a3,LPDWORD?a4,
LPDWORD?a5,LPDWORD?a6,LPDWORD?a7,LPDWORD?a8,LPDWORD?a9,LPDWORD?a10,LPFILETIME
a11)
{
If (the corresponding registry entry of a0 is not present in the privately owned registration table)
Return?Real_RegQueryInfoKeyW(a0,a1,a2,a3,a4,a5,a6,a7,a8,a9,a10,a11);
Else
{
Real_RegQueryInfoKeyW(a0,a1,a2,a3,a4,a5,a6,a7,a8,a9,a10,a11);
MyRegQueryInfoKeyW(a0,a1,a2,a3,a4,a5,a6,a7,a8,a9,a10,a11);
Merging two Query Results returns then;
}
}
Mine_RegOpenCurrentUser(REGSAM?a0,PHKEY?a1)
{
HKEY?real_hkey;
Real_RegOpenCurrentUser(a0,&real_hkey);
The corresponding registry entry of record a0 is opened;
Return?MyRegOpenCurrentUser(a0,a1);
}
Mine_RegOpenUserClassesRoot(HANDLE?a0,DWORD?a1,REGSAM?a2,PHKEY?a3)
{
HKEY?real_hkey;
Real_RegOpenUserClassRoot(a0,a1,a2,&real_hkey);
The corresponding registry entry of record a0 is opened;
Return?MyRegOpenUserClassRoot(a0,a1,a2,a3);
}
1. performance test
Under the Windows XP system, method of the present invention has been carried out the technical feature test.Concrete configuration is following:
Windows?XP?Professional?XP2
CPU:Pentium?4?2.41Ghz
Internal memory: 1GB
USB drives: the USB Mass Storage Device of Microsoft, 5.1.2600.2800
Portable hard drive: the 60G of Hitachi 5400 changes
Technical program of the present invention start-up time: 3 seconds
The program start time that utilization the inventive method starts (unit: second) The normal program start time that starts (unit: second)
?Internet?Explorer?6 2 2
?Outlook?Express 2 2
?Microsoft?Word?2003 2 2
?Microsoft?Excel?2003 2 2
?Microsoft?Powerpoint?2003 2 2
?Internet?Explorer?7 4 4
?Microsoft?Word?2007 5 5
?Microsoft?Excel?2007 5 5
?Microsfot?Powerpoint?2007 5 5

Claims (1)

1. utilize movable storage device reappearing user preparation on computers environment method, it is characterized in that may further comprise the steps:
---extract user's personalized configuration surroundings relevant information is privately owned configuration information, is stored on the movable storage device;
---privately owned the configuration information that is stored on the mobile device is carried out initialization, it comprises:
---reset the user environment variable according to the drive of movable storage device;
---revise item of information relevant in the privately owned configuration information with drive according to the drive of movable storage device;
---the use parcel program that presets is called the registry system of destination application and is wrapped up; Promptly in the target program execute file, insert code; And rewrite the registry system that institute will wrap up and be invoked at the entry address in the execute file, make it point to the code of insertion;
Detect application program and whether visit preparation information, when detecting the application access configuration information, carry out following steps:
If read operation comprises and opens, inquires about, enumerates, judge earlier whether the information of reading is present in the privately owned configuration information, if then read the content in the privately owned configuration information; Otherwise read the content of configuration information in the computing machine;
If write operation: comprise the increase operation if revise, the object of then no matter operating is deposited and is not present in the privately owned configuration information, all operates privately owned configuration information; Be not present in the privately owned configuration information if deletion action, the object of then no matter operating are deposited, all operate privately owned configuration information, and the increase judgement symbol shows that this operand is deleted;
---when detecting application program and do not have access configuration information continues to detect; If application program withdraws from, the personalized configuration information of preserving the user is to movable storage device.
CN2008100567416A 2008-01-24 2008-01-24 Method for reappearing user configuration surroundings on computer by mobile memory device Expired - Fee Related CN101221510B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100567416A CN101221510B (en) 2008-01-24 2008-01-24 Method for reappearing user configuration surroundings on computer by mobile memory device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100567416A CN101221510B (en) 2008-01-24 2008-01-24 Method for reappearing user configuration surroundings on computer by mobile memory device

Publications (2)

Publication Number Publication Date
CN101221510A CN101221510A (en) 2008-07-16
CN101221510B true CN101221510B (en) 2012-05-16

Family

ID=39631370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100567416A Expired - Fee Related CN101221510B (en) 2008-01-24 2008-01-24 Method for reappearing user configuration surroundings on computer by mobile memory device

Country Status (1)

Country Link
CN (1) CN101221510B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006583B (en) * 2010-11-30 2015-06-03 中兴通讯股份有限公司 Wireless communication terminal and dynamic equipment experiencing method
CN102184368A (en) * 2011-06-13 2011-09-14 上海置水软件技术有限公司 Method for safely using mobile storage device
CN102231116A (en) * 2011-07-04 2011-11-02 成都市华为赛门铁克科技有限公司 Application program virtualization installing and loading method and device
CN104731628A (en) * 2015-04-01 2015-06-24 浪潮电子信息产业股份有限公司 U-disk-based Canaima system and Canaima drive storage method
CN105700914A (en) * 2015-12-31 2016-06-22 北京金山安全软件有限公司 Application software installation and starting method and device
CN112083963B (en) * 2020-09-04 2024-04-16 深圳市视美泰技术股份有限公司 System function configuration method based on external storage medium and related equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439134A (en) * 2000-02-28 2003-08-27 360度网络股份有限公司 Smart card enabled mobile personal computing environment system
CN1916860A (en) * 2005-11-30 2007-02-21 许先才 Method and device for saving and restoring application environment of personal information in computer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439134A (en) * 2000-02-28 2003-08-27 360度网络股份有限公司 Smart card enabled mobile personal computing environment system
CN1916860A (en) * 2005-11-30 2007-02-21 许先才 Method and device for saving and restoring application environment of personal information in computer

Also Published As

Publication number Publication date
CN101221510A (en) 2008-07-16

Similar Documents

Publication Publication Date Title
CN101221510B (en) Method for reappearing user configuration surroundings on computer by mobile memory device
US8165177B2 (en) System and method for hybrid virtual machine monitor file system operations
CN100478952C (en) Method and equipment for sharing computer data among computers
US20090019223A1 (en) Method and systems for providing remote strage via a removable memory device
CN110531987A (en) Management method, device and computer readable storage medium based on Kubernetes cluster
US20030110272A1 (en) System and method for filtering content
CN100524302C (en) File management in a computing device
US8458232B1 (en) Systems and methods for identifying data files based on community data
BRPI0614287A2 (en) partial item modification tracking and synchronization
CN101110656A (en) File transferring method for wireless network hard disk system
CN102497424A (en) Method for achieving cloud storage through mobile storage device
CN103064637A (en) Network disk cache synchronizing method and system
CN104539665A (en) Remote file control system based on routers
CN102841782B (en) global variable management method and device
CN102122248A (en) Method for managing wire clip software of communication equipment
CN100424650C (en) Method and device for saving and restoring application environment of personal information in computer
US6959309B2 (en) Interface between programming languages and method therefor
WO2013170612A1 (en) Method and device for upgrading telephone number in wireless terminal self-adaptive network upgrade
CN102158529A (en) Professional hypertext preprocessor (PHP) environment-based highly-efficient network storage management method
CN107861761A (en) A kind of startup method and system of physical host
US20050101311A1 (en) Data driven engine and system for wireless communications
CN111273958A (en) Large-scale software cloud operating system
CN112597102A (en) High-efficiency mirror image file system implementation method
CN203480606U (en) Small fee desk-type POS machine by TCP/IP communication
CN101517540A (en) Resource-based event typing in a rules system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120516

CF01 Termination of patent right due to non-payment of annual fee