CN102681949B - A kind of terminal device and its hiding storage chucking method - Google Patents

A kind of terminal device and its hiding storage chucking method Download PDF

Info

Publication number
CN102681949B
CN102681949B CN201110441997.0A CN201110441997A CN102681949B CN 102681949 B CN102681949 B CN 102681949B CN 201110441997 A CN201110441997 A CN 201110441997A CN 102681949 B CN102681949 B CN 102681949B
Authority
CN
China
Prior art keywords
terminal device
storage card
bulk
card
cards
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110441997.0A
Other languages
Chinese (zh)
Other versions
CN102681949A (en
Inventor
刘勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110441997.0A priority Critical patent/CN102681949B/en
Publication of CN102681949A publication Critical patent/CN102681949A/en
Application granted granted Critical
Publication of CN102681949B publication Critical patent/CN102681949B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A kind of terminal device and its hiding storage chucking method.After terminal device inserts computer, operating system issues the request of USB descriptors, and the device descriptor and relevant descriptors list that terminal device returns do not include storage card;The descriptor that operating system is reported according to equipment loads related driver, and operating system thinks not include storage card in the terminal device of insertion, then will not load store card drive, be also not in storage card in corresponding equipment manager.Compared with prior art, the present invention is by hiding storage card, so that user can not change the data content among storage card, and partial data is stored in storage card by operator, so as to improve the speed of user's access associated data, Consumer's Experience is lifted, and the correctness and integrality of data can be ensured.

Description

A kind of terminal device and its hiding storage chucking method
Technical field
The present invention relates to communication technical field, more particularly, to a kind of terminal device and its hides storage chucking method.
Background technology
The communication products such as the wireless data card based on USB (Universal Serial Bus, USB) interface, In the case where current information content is increasing, the overwhelming majority can possess T card slots, support T card read-write capabilitys.Computer leads to Often deposited using SCSI (Small Computer System Interface, minicomputer interface) instructions with Large Copacities such as T cards The transmission that equipment carries out data and state is stored up, SCSI protocol supports user to extend customized SCSI command.It is in general, wireless T cards in data card are user oriented, are bought by user and are used, and store users personal data.
More and more extensive with the use of Internet, especially " cloud service " expansion is increasingly faster, causes data Measure increasing, the speed of network is into the key factor for restricting Consumer's Experience lifting.But the speed of network is by hardware condition Constraint, being impossible infinitely great, now just needs to use method for distinguishing to be made up.Such as our regarding of being watched on network Frequently, with regard to generally use Streaming Media unicast or multicast technology, user can be allowed to download while watching, listening to, without etc. Whole file download is to can just watch after the machine of oneself.After having watched, generally whole file also has been downloaded into In one file as " Cache " (caching) of the machine, it can continue to watch later.
From the angle of operator, of course, it is desirable to the speed for accessing server can be improved, lift Consumer's Experience.With reference to Some above-mentioned ideas and technology, finally determine using T cards as one " Cache ", can be a part of number when accessing network According to downloading on T cards, such as webpage, document, it can so significantly improve the speed for accessing server.
It is done so that a problem can be brought, i.e., the content among user can be arbitrarily modification T cards, and operator one As be not intended to the data of oneself and changed.So in order that user can not change the content among T cards privately, ensure data just True property and integrality, the best way is exactly to hide T cards, invisible to user, makes user at all can not be on computers to T cards Operated, be best so to Consumer's Experience.
It is invisible to user to realize T cards, we also to try every possible means so that computer and T cards can interact, otherwise Exactly without in all senses.
The content of the invention
The present invention seeks to:In order that computer and hiding storage card interact, the present invention proposes that a kind of terminal is set Standby and its hiding storage chucking method.
This is of the invention to propose a kind of method of concealed terminal equipment storage card to achieve the above object, when terminal device is inserted After entering computer, operating system issues the request of USB descriptors, the device descriptor and relevant descriptors list that terminal device returns Do not include storage card;The descriptor that operating system reports according to equipment loads related driver, and operating system thinks to insert Terminal device in do not include storage card, then will not the driving of load store card, be also not in deposit in corresponding equipment manager Card storage.
Further, storage card is mounted to the EFS areas of terminal device by the terminal device, storage card is conducted interviews and Operation.
Further, the computer conducts interviews and operated to the storage card by extending BULK instructions.
Further, a BULK port is enumerated in computer-side, the UI of terminal device to BULK ports by using expansion BULK instructions are opened up, and extension BULK command receptions and processing are realized in terminal equipment side, are converted into the access to storage card.
Further, it is necessary to which the data of renewal can pass through when the terminal device interacts with the webserver In the storage card that BULK instruction write-ins are hidden.
The present invention also proposes a kind of terminal device, and the terminal device includes self-defined BULK command process modules and storage Card hidden module,
The self-defined BULK command process modules transmission simultaneously parses the extension BULK instructions received, is converted into storage card Operation;
The storage card hidden module hides storage card, user is not operated to the storage card directly.
Further, storage card is mounted to the EFS areas of terminal device by the terminal device, storage card is conducted interviews and Operation.
Further, computer conducts interviews and operated to the storage card by extending BULK instructions.
Further, computer-side enumerates a BULK port, and the UI of terminal device to BULK ports by using extension BULK is instructed, and realizes extension BULK command receptions and processing in terminal equipment side, is converted into the access to storage card.
Further, it is necessary to which the data of renewal can pass through when the terminal device interacts with the webserver In the storage card that BULK instruction write-ins are hidden.
In summary, had the advantages that using the present invention:
Compared with prior art, the present invention is by hiding storage card so that user can not change the data among storage card Content, and partial data is stored in storage card by operator, so as to improve the speed of user's access associated data, Consumer's Experience is lifted, and the correctness and integrality of data can be ensured.
Brief description of the drawings
Fig. 1 is Computer of the embodiment of the present invention and wireless data card composition schematic diagram;
Fig. 2 is that the embodiment of the present invention hides T chucking method schematic flow sheets.
Embodiment
Using the BULK instructions extended, (high capacity transmission instructs technical solution of the present invention, and SCSI command is exactly a kind of BULK Instruction), T cards are operated by other ports on the terminal devices such as data card so that user can only pass through UI (User Interface, user interface) interacted with storage cards such as T cards, the data in T cards can be so protected to greatest extent, from And the method for realizing the T cards in a kind of terminal devices such as hiding data card.Instructed using customized BULK, as computer The means communicated with T cards.The terminal device illustrates by taking data card as an example in the following embodiments, the storage card Illustrated by taking T cards as an example.
The present invention is by hiding T cards, and then computer and equipment are logical by being instructed to the extension BULK for specifying BULK ports Letter operates to T cards, it is achieved thereby that the application of T cards can only be operated by UI.
Technical solution of the present invention makes related data (including carrier data, individual subscriber in the terminal devices such as data card Data etc.) it is stored in the T cards in data card, data card is inserted into computer during use, hides T cards, by being installed on calculating Related data is loaded into calculator memory by the data card UI transmission extension BULK instructions of machine from hiding T cards to be run, but User can not arbitrarily change these data.
User can download to T cards through commonly used data, it is only necessary to once download, call T cards using can later Central data;The data among T cards are protected to hide T cards so that user can not directly be changed by computer not by malicious modification Data in T cards, ensure the correctness and integrality of T card data;Pass through the BULK ports added and T using extension BULK instructions Card is communicated, and does not influence other business of wireless data card.
What the present invention utilized is the characteristic of T card modules, and T is stuck in into computer-side hides completely, then passes through computer-side UI to specified BULK ports using extension BULK instructions, carry out the establishment of the upper file of T cards and deletion etc. and operate.
The technical scheme main thought of concealed terminal equipment storage card of the present invention is:
First, after wireless data card inserts computer, operating system issues the request of USB descriptors, and what equipment returned sets Standby descriptor and relevant descriptors list do not include T cards;
Secondly, the descriptor that operating system is reported according to equipment loads related driver, because retouching of reporting of equipment Stating in symbol does not include T cards, so operating system is considered as not including T cards among the equipment of insertion, would not load the driving of T cards, Also be not in T cards in corresponding equipment manager, be also not in T card icons in operating system, equivalent to operating system Conceal T cards;
Again, although concealing T cards to operating system, T cards are mounted to the EFS areas of wireless data card, so T cards can be conducted interviews and be operated.
Computer can conduct interviews and operate to T cards by extending BULK instructions, and this requires to enumerate one in computer-side Individual BULK ports, UI realize extension BULK command receptions in equipment side by being instructed to BULK ports using extension BULK And processing, it is converted into the access to T cards.
The embodiment of the present invention is described in detail with reference to the accompanying drawings.
As shown in Figure 1, it is Computer of the embodiment of the present invention and wireless data card composition schematic diagram, the computer bag Include self-defined BULK command process modules in internal memory and UI.Data card side includes self-defined BULK command process modules and T cards are hidden Hide module.The operation carried out to T cards that self-defined BULK command process modules in UI are responsible for using is converted to specifying The extension BULK instructions of BULK ports are accessed, and the self-defined BULK command process modules of data card side, which are responsible for transmitting and parsed, to be received Extension BULK instruction, be converted into the read and write operation to T cards.T cards hidden module be responsible for T cards are hidden to user, make user without Method is directly operated.Self-defined BULK instruction modules in UI operate in computer-side, self-defined BULK command process modules Data card side is operated in T card hidden modules.
As shown in Figure 2, it is T card hidden method schematic flow sheets of the embodiment of the present invention, it comprises the following steps:
Step 201:Data card operation self-starting function installation driving and UI softwares;
Wireless data card with T cards is inserted into main frame, operation self-starting function installation drives and UI softwares, including installed in The extension BULK instruction modules of computer-side operation.
In this stage, because monochromatic light drive, can only occur in the extension BULK instruction modules being also fitted without in UI and UI And T cards can not occur, i.e., now T cards can not also be operated.
Step 202:T cards are not reported in data card enumeration process, and T cards are mounted to EFS areas;
After installing driving and UI, wireless data card can be switched to mode of operation, and now equipment side and host computer side start piece The interaction of act process.In order to hide T cards, when host computer side asks the description informations such as configures descriptor, interface and end points, equipment side Relevant descriptors are changed, equivalent to not reporting T cards to main frame.And T cards are mounted to EFS areas, prepared for subsequent access T cards.
Step 203:Read data card relevant device descriptor and configures descriptor in PC sides;
After computer reads the descriptor that wireless data card reports, it will be considered that in current device and do not include T cards, because This will not load the driving of T cards, T card apparatus be there will not be in equipment manager, the icon of T cards is also not in.
Step 204:Start UI, open BULK ports, send BULK instructions, read and write T cards;
After equipment side is ready, it is possible to start UI, extension BULK instruction modules can also start therewith, now can T cards are operated by UI.And all operations finally can all be expanded BULK instruction modules and be converted to specifying BULK ends The extension BULK instructions of mouth are sent to equipment side and handled.
Step 205:Equipment side receives BULK instructions, parses and performs;
After equipment side receives extension BULK instructions by USB paths, it can be parsed, be completed in equipment side to T cards Operation.Computer-side judges whether operation succeeds by the state value of return.
Step 206:Call network savvy connection 3G network;
Except to the T cards certain operations of itself, an important application approach of this function is exactly " cloud computing, by right Download, the transfer of network data, server corresponding speed is improved, lift Consumer's Experience.
Step 207:Interacted in data card running with the webserver, it is necessary to which the data updated are referred to by BULK Order write-in is hidden in T cards.
Interacted in networking process with the webserver, can either automatically or manually download some data to T cards, Such as webpage, document etc., it need not just be re-downloaded when so accessing these data later, can greatly lift access effect Rate and Consumer's Experience.
Above is the whole process of the present invention, the follow-up work for wireless data card do not repeat herein.
The present invention first hides wireless data card to operating system, that is, user is shielded so that user can not be to T cards In data directly modify, ensure that the correctness and integrality of T card data, then make use of extension BULK instruction, make For computer and the means of communication of T cards so that although we can't see T cards in an operating system, UI still can be used, T cards are operated by extending BULK instructions, are that one kind of the T card occupation modes in wireless data card is innovated.And because To be communicated by ECP Extended Capabilities Port, so will not be impacted completely for business of networking, there is extraordinary stability.
So far, by extend BULK instruction access T cards and to user shielding T cards function be achieved that.
The present invention, which passes through, hides T cards so that and user can not change the central data content of T cards, and so that operator can be with Partial data is stored in T cards, so as to improve the speed of user's access associated data, lifts Consumer's Experience, and can protect The correctness and integrality of data are demonstrate,proved, is used for the T cards in wireless data card and provides new method.
Certainly, the present invention can also have numerous embodiments, in the situation without departing substantially from spirit of the invention and its essence, be familiar with this The technical staff in field according to the present invention when that can make various corresponding changes or change, as long as in the spirit and principles in the present invention Within any modification, equivalent substitution and improvements made, should be included in the scope of the protection.

Claims (9)

  1. A kind of 1. method of concealed terminal equipment storage card, it is characterised in that after terminal device inserts computer, operating system The request of USB descriptors is issued, the device descriptor and relevant descriptors list that terminal device returns do not include storage card;Operation system The descriptor that system reports according to terminal device loads related driver, and operating system thinks not wrap in the terminal device of insertion Include storage card, then will not the driving of load store card, be also not in storage card in corresponding equipment manager;The computer leads to Cross extension BULK instructions the storage card is conducted interviews and operated.
  2. 2. the method as described in claim 1, it is characterised in that storage card is mounted to terminal device by the terminal device EFS areas, conduct interviews and operate to storage card.
  3. 3. the method as described in claim 1, it is characterised in that a BULK port is enumerated in computer-side, terminal device UI realizes extension BULK command receptions and processing by being instructed to BULK ports using extension BULK in terminal equipment side, It is converted into the access to storage card.
  4. 4. the method as described in claim 1, it is characterised in that when the terminal device interacts with the webserver, need The data to be updated can be instructed by BULK and write in the storage card being hidden.
  5. 5. a kind of terminal device, it is characterised in that the terminal device includes self-defined BULK command process modules and storage card Hidden module,
    The self-defined BULK command process modules transmission simultaneously parses the extension BULK instructions received, is converted into the behaviour to storage card Make;
    The storage card hidden module hides storage card, and after terminal device inserts computer, operating system issues USB descriptors Request, the device descriptor and relevant descriptors list that terminal device returns do not include storage card;Operating system is set according to terminal The standby descriptor reported loads related driver, and operating system thinks not include storage card in the terminal device of insertion, then Will not the driving of load store card, be also not in storage card in corresponding equipment manager, user is not deposited to described directly Card storage is operated.
  6. 6. terminal device as claimed in claim 5, it is characterised in that storage card is mounted to terminal device by the terminal device EFS areas, storage card is conducted interviews and operated.
  7. 7. terminal device as claimed in claim 5, it is characterised in that computer is by extending BULK instructions to the storage card Conduct interviews and operate.
  8. 8. terminal device as claimed in claim 7, it is characterised in that computer-side enumerates a BULK port, terminal device UI by realizing extension BULK command receptions and place using extension BULK instructions, and in terminal equipment side to BULK ports Reason, is converted into the access to storage card.
  9. 9. terminal device as claimed in claim 5, it is characterised in that the terminal device interacts with the webserver When, it is necessary to which the data of renewal can be instructed in the storage card that is hidden of write-in by BULK.
CN201110441997.0A 2011-12-26 2011-12-26 A kind of terminal device and its hiding storage chucking method Active CN102681949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110441997.0A CN102681949B (en) 2011-12-26 2011-12-26 A kind of terminal device and its hiding storage chucking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110441997.0A CN102681949B (en) 2011-12-26 2011-12-26 A kind of terminal device and its hiding storage chucking method

Publications (2)

Publication Number Publication Date
CN102681949A CN102681949A (en) 2012-09-19
CN102681949B true CN102681949B (en) 2017-11-14

Family

ID=46813909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110441997.0A Active CN102681949B (en) 2011-12-26 2011-12-26 A kind of terminal device and its hiding storage chucking method

Country Status (1)

Country Link
CN (1) CN102681949B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335302B (en) * 2014-06-19 2018-03-02 北京壹人壹本信息科技有限公司 One kind storage display methods, system and intelligent terminal
CN113867625A (en) * 2021-08-27 2021-12-31 福建升腾资讯有限公司 Communication method, device, equipment and medium for non-inductive drive-free equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1661573A (en) * 2004-02-24 2005-08-31 深圳市朗科科技有限公司 Method for managing notations of disks of mobile storage device
CN201160005Y (en) * 2008-03-12 2008-12-03 高志敏 U disk for encryption
CN101593117A (en) * 2008-05-29 2009-12-02 北京飞天诚信科技有限公司 A kind of method that improves intelligent key equipment easy applied performance

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1661573A (en) * 2004-02-24 2005-08-31 深圳市朗科科技有限公司 Method for managing notations of disks of mobile storage device
CN201160005Y (en) * 2008-03-12 2008-12-03 高志敏 U disk for encryption
CN101593117A (en) * 2008-05-29 2009-12-02 北京飞天诚信科技有限公司 A kind of method that improves intelligent key equipment easy applied performance

Also Published As

Publication number Publication date
CN102681949A (en) 2012-09-19

Similar Documents

Publication Publication Date Title
US9052919B2 (en) Specialized network fileserver
EP2664180B1 (en) Methods and system for providing content to a mobile communication device
CN102567074B (en) USB (universal serial bus) device redirecting method facing virtual machines
US20050278418A1 (en) System and method for use of multiple applications
CN101808123B (en) Method and device for accessing storage resources in storage system
US8661502B2 (en) Determining a sensitivity label of document information in real time
US9430217B2 (en) Method and apparatus for patching
CN103401902A (en) Portable cloud storage system and method
CN104321781A (en) Method, system, and device for securely handling virtual function driver communications with a physical function driver
CN109597640B (en) Account management method, device, equipment and medium for application program
US9280677B1 (en) Secure native application messaging with a browser application
CN102346823B (en) The method and system that in a kind of internet, user logs in
CN111400704A (en) Method, device and equipment for realizing web access security audit and computer readable medium
CN102681949B (en) A kind of terminal device and its hiding storage chucking method
US20110161428A1 (en) Two-way data and resources sharing method
CN106775835A (en) Obtain method, server and the terminal of upgrade file
US9087031B2 (en) Method and program for selective suspension of USB device
WO2015074569A1 (en) Method and apparatus for displaying transmission status of cloud documents
CN102685216A (en) Attribute display method and attribute display system of universal serial bus (USB) equipment, USB equipment and server
EP2838232B1 (en) Method for configuring maximum transmission unit (mtu), terminal and usb data card
CN102184112A (en) Method and device for upgrading widget
CN109413070A (en) A kind of WAF service activating method and relevant apparatus
CN113726788B (en) Network access method, system, electronic equipment and storage medium
CN115643109B (en) Remote control method, system, equipment and medium based on virtualization platform
US9104518B2 (en) Wireless communication terminal and method for securely running industry software

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant