CN102681949B - A kind of terminal device and its hiding storage chucking method - Google Patents
A kind of terminal device and its hiding storage chucking method Download PDFInfo
- Publication number
- CN102681949B CN102681949B CN201110441997.0A CN201110441997A CN102681949B CN 102681949 B CN102681949 B CN 102681949B CN 201110441997 A CN201110441997 A CN 201110441997A CN 102681949 B CN102681949 B CN 102681949B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- storage card
- bulk
- card
- cards
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
A kind of terminal device and its hiding storage chucking method.After terminal device inserts computer, operating system issues the request of USB descriptors, and the device descriptor and relevant descriptors list that terminal device returns do not include storage card;The descriptor that operating system is reported according to equipment loads related driver, and operating system thinks not include storage card in the terminal device of insertion, then will not load store card drive, be also not in storage card in corresponding equipment manager.Compared with prior art, the present invention is by hiding storage card, so that user can not change the data content among storage card, and partial data is stored in storage card by operator, so as to improve the speed of user's access associated data, Consumer's Experience is lifted, and the correctness and integrality of data can be ensured.
Description
Technical field
The present invention relates to communication technical field, more particularly, to a kind of terminal device and its hides storage chucking method.
Background technology
The communication products such as the wireless data card based on USB (Universal Serial Bus, USB) interface,
In the case where current information content is increasing, the overwhelming majority can possess T card slots, support T card read-write capabilitys.Computer leads to
Often deposited using SCSI (Small Computer System Interface, minicomputer interface) instructions with Large Copacities such as T cards
The transmission that equipment carries out data and state is stored up, SCSI protocol supports user to extend customized SCSI command.It is in general, wireless
T cards in data card are user oriented, are bought by user and are used, and store users personal data.
More and more extensive with the use of Internet, especially " cloud service " expansion is increasingly faster, causes data
Measure increasing, the speed of network is into the key factor for restricting Consumer's Experience lifting.But the speed of network is by hardware condition
Constraint, being impossible infinitely great, now just needs to use method for distinguishing to be made up.Such as our regarding of being watched on network
Frequently, with regard to generally use Streaming Media unicast or multicast technology, user can be allowed to download while watching, listening to, without etc.
Whole file download is to can just watch after the machine of oneself.After having watched, generally whole file also has been downloaded into
In one file as " Cache " (caching) of the machine, it can continue to watch later.
From the angle of operator, of course, it is desirable to the speed for accessing server can be improved, lift Consumer's Experience.With reference to
Some above-mentioned ideas and technology, finally determine using T cards as one " Cache ", can be a part of number when accessing network
According to downloading on T cards, such as webpage, document, it can so significantly improve the speed for accessing server.
It is done so that a problem can be brought, i.e., the content among user can be arbitrarily modification T cards, and operator one
As be not intended to the data of oneself and changed.So in order that user can not change the content among T cards privately, ensure data just
True property and integrality, the best way is exactly to hide T cards, invisible to user, makes user at all can not be on computers to T cards
Operated, be best so to Consumer's Experience.
It is invisible to user to realize T cards, we also to try every possible means so that computer and T cards can interact, otherwise
Exactly without in all senses.
The content of the invention
The present invention seeks to:In order that computer and hiding storage card interact, the present invention proposes that a kind of terminal is set
Standby and its hiding storage chucking method.
This is of the invention to propose a kind of method of concealed terminal equipment storage card to achieve the above object, when terminal device is inserted
After entering computer, operating system issues the request of USB descriptors, the device descriptor and relevant descriptors list that terminal device returns
Do not include storage card;The descriptor that operating system reports according to equipment loads related driver, and operating system thinks to insert
Terminal device in do not include storage card, then will not the driving of load store card, be also not in deposit in corresponding equipment manager
Card storage.
Further, storage card is mounted to the EFS areas of terminal device by the terminal device, storage card is conducted interviews and
Operation.
Further, the computer conducts interviews and operated to the storage card by extending BULK instructions.
Further, a BULK port is enumerated in computer-side, the UI of terminal device to BULK ports by using expansion
BULK instructions are opened up, and extension BULK command receptions and processing are realized in terminal equipment side, are converted into the access to storage card.
Further, it is necessary to which the data of renewal can pass through when the terminal device interacts with the webserver
In the storage card that BULK instruction write-ins are hidden.
The present invention also proposes a kind of terminal device, and the terminal device includes self-defined BULK command process modules and storage
Card hidden module,
The self-defined BULK command process modules transmission simultaneously parses the extension BULK instructions received, is converted into storage card
Operation;
The storage card hidden module hides storage card, user is not operated to the storage card directly.
Further, storage card is mounted to the EFS areas of terminal device by the terminal device, storage card is conducted interviews and
Operation.
Further, computer conducts interviews and operated to the storage card by extending BULK instructions.
Further, computer-side enumerates a BULK port, and the UI of terminal device to BULK ports by using extension
BULK is instructed, and realizes extension BULK command receptions and processing in terminal equipment side, is converted into the access to storage card.
Further, it is necessary to which the data of renewal can pass through when the terminal device interacts with the webserver
In the storage card that BULK instruction write-ins are hidden.
In summary, had the advantages that using the present invention:
Compared with prior art, the present invention is by hiding storage card so that user can not change the data among storage card
Content, and partial data is stored in storage card by operator, so as to improve the speed of user's access associated data,
Consumer's Experience is lifted, and the correctness and integrality of data can be ensured.
Brief description of the drawings
Fig. 1 is Computer of the embodiment of the present invention and wireless data card composition schematic diagram;
Fig. 2 is that the embodiment of the present invention hides T chucking method schematic flow sheets.
Embodiment
Using the BULK instructions extended, (high capacity transmission instructs technical solution of the present invention, and SCSI command is exactly a kind of BULK
Instruction), T cards are operated by other ports on the terminal devices such as data card so that user can only pass through UI (User
Interface, user interface) interacted with storage cards such as T cards, the data in T cards can be so protected to greatest extent, from
And the method for realizing the T cards in a kind of terminal devices such as hiding data card.Instructed using customized BULK, as computer
The means communicated with T cards.The terminal device illustrates by taking data card as an example in the following embodiments, the storage card
Illustrated by taking T cards as an example.
The present invention is by hiding T cards, and then computer and equipment are logical by being instructed to the extension BULK for specifying BULK ports
Letter operates to T cards, it is achieved thereby that the application of T cards can only be operated by UI.
Technical solution of the present invention makes related data (including carrier data, individual subscriber in the terminal devices such as data card
Data etc.) it is stored in the T cards in data card, data card is inserted into computer during use, hides T cards, by being installed on calculating
Related data is loaded into calculator memory by the data card UI transmission extension BULK instructions of machine from hiding T cards to be run, but
User can not arbitrarily change these data.
User can download to T cards through commonly used data, it is only necessary to once download, call T cards using can later
Central data;The data among T cards are protected to hide T cards so that user can not directly be changed by computer not by malicious modification
Data in T cards, ensure the correctness and integrality of T card data;Pass through the BULK ports added and T using extension BULK instructions
Card is communicated, and does not influence other business of wireless data card.
What the present invention utilized is the characteristic of T card modules, and T is stuck in into computer-side hides completely, then passes through computer-side
UI to specified BULK ports using extension BULK instructions, carry out the establishment of the upper file of T cards and deletion etc. and operate.
The technical scheme main thought of concealed terminal equipment storage card of the present invention is:
First, after wireless data card inserts computer, operating system issues the request of USB descriptors, and what equipment returned sets
Standby descriptor and relevant descriptors list do not include T cards;
Secondly, the descriptor that operating system is reported according to equipment loads related driver, because retouching of reporting of equipment
Stating in symbol does not include T cards, so operating system is considered as not including T cards among the equipment of insertion, would not load the driving of T cards,
Also be not in T cards in corresponding equipment manager, be also not in T card icons in operating system, equivalent to operating system
Conceal T cards;
Again, although concealing T cards to operating system, T cards are mounted to the EFS areas of wireless data card, so
T cards can be conducted interviews and be operated.
Computer can conduct interviews and operate to T cards by extending BULK instructions, and this requires to enumerate one in computer-side
Individual BULK ports, UI realize extension BULK command receptions in equipment side by being instructed to BULK ports using extension BULK
And processing, it is converted into the access to T cards.
The embodiment of the present invention is described in detail with reference to the accompanying drawings.
As shown in Figure 1, it is Computer of the embodiment of the present invention and wireless data card composition schematic diagram, the computer bag
Include self-defined BULK command process modules in internal memory and UI.Data card side includes self-defined BULK command process modules and T cards are hidden
Hide module.The operation carried out to T cards that self-defined BULK command process modules in UI are responsible for using is converted to specifying
The extension BULK instructions of BULK ports are accessed, and the self-defined BULK command process modules of data card side, which are responsible for transmitting and parsed, to be received
Extension BULK instruction, be converted into the read and write operation to T cards.T cards hidden module be responsible for T cards are hidden to user, make user without
Method is directly operated.Self-defined BULK instruction modules in UI operate in computer-side, self-defined BULK command process modules
Data card side is operated in T card hidden modules.
As shown in Figure 2, it is T card hidden method schematic flow sheets of the embodiment of the present invention, it comprises the following steps:
Step 201:Data card operation self-starting function installation driving and UI softwares;
Wireless data card with T cards is inserted into main frame, operation self-starting function installation drives and UI softwares, including installed in
The extension BULK instruction modules of computer-side operation.
In this stage, because monochromatic light drive, can only occur in the extension BULK instruction modules being also fitted without in UI and UI
And T cards can not occur, i.e., now T cards can not also be operated.
Step 202:T cards are not reported in data card enumeration process, and T cards are mounted to EFS areas;
After installing driving and UI, wireless data card can be switched to mode of operation, and now equipment side and host computer side start piece
The interaction of act process.In order to hide T cards, when host computer side asks the description informations such as configures descriptor, interface and end points, equipment side
Relevant descriptors are changed, equivalent to not reporting T cards to main frame.And T cards are mounted to EFS areas, prepared for subsequent access T cards.
Step 203:Read data card relevant device descriptor and configures descriptor in PC sides;
After computer reads the descriptor that wireless data card reports, it will be considered that in current device and do not include T cards, because
This will not load the driving of T cards, T card apparatus be there will not be in equipment manager, the icon of T cards is also not in.
Step 204:Start UI, open BULK ports, send BULK instructions, read and write T cards;
After equipment side is ready, it is possible to start UI, extension BULK instruction modules can also start therewith, now can
T cards are operated by UI.And all operations finally can all be expanded BULK instruction modules and be converted to specifying BULK ends
The extension BULK instructions of mouth are sent to equipment side and handled.
Step 205:Equipment side receives BULK instructions, parses and performs;
After equipment side receives extension BULK instructions by USB paths, it can be parsed, be completed in equipment side to T cards
Operation.Computer-side judges whether operation succeeds by the state value of return.
Step 206:Call network savvy connection 3G network;
Except to the T cards certain operations of itself, an important application approach of this function is exactly " cloud computing, by right
Download, the transfer of network data, server corresponding speed is improved, lift Consumer's Experience.
Step 207:Interacted in data card running with the webserver, it is necessary to which the data updated are referred to by BULK
Order write-in is hidden in T cards.
Interacted in networking process with the webserver, can either automatically or manually download some data to T cards,
Such as webpage, document etc., it need not just be re-downloaded when so accessing these data later, can greatly lift access effect
Rate and Consumer's Experience.
Above is the whole process of the present invention, the follow-up work for wireless data card do not repeat herein.
The present invention first hides wireless data card to operating system, that is, user is shielded so that user can not be to T cards
In data directly modify, ensure that the correctness and integrality of T card data, then make use of extension BULK instruction, make
For computer and the means of communication of T cards so that although we can't see T cards in an operating system, UI still can be used,
T cards are operated by extending BULK instructions, are that one kind of the T card occupation modes in wireless data card is innovated.And because
To be communicated by ECP Extended Capabilities Port, so will not be impacted completely for business of networking, there is extraordinary stability.
So far, by extend BULK instruction access T cards and to user shielding T cards function be achieved that.
The present invention, which passes through, hides T cards so that and user can not change the central data content of T cards, and so that operator can be with
Partial data is stored in T cards, so as to improve the speed of user's access associated data, lifts Consumer's Experience, and can protect
The correctness and integrality of data are demonstrate,proved, is used for the T cards in wireless data card and provides new method.
Certainly, the present invention can also have numerous embodiments, in the situation without departing substantially from spirit of the invention and its essence, be familiar with this
The technical staff in field according to the present invention when that can make various corresponding changes or change, as long as in the spirit and principles in the present invention
Within any modification, equivalent substitution and improvements made, should be included in the scope of the protection.
Claims (9)
- A kind of 1. method of concealed terminal equipment storage card, it is characterised in that after terminal device inserts computer, operating system The request of USB descriptors is issued, the device descriptor and relevant descriptors list that terminal device returns do not include storage card;Operation system The descriptor that system reports according to terminal device loads related driver, and operating system thinks not wrap in the terminal device of insertion Include storage card, then will not the driving of load store card, be also not in storage card in corresponding equipment manager;The computer leads to Cross extension BULK instructions the storage card is conducted interviews and operated.
- 2. the method as described in claim 1, it is characterised in that storage card is mounted to terminal device by the terminal device EFS areas, conduct interviews and operate to storage card.
- 3. the method as described in claim 1, it is characterised in that a BULK port is enumerated in computer-side, terminal device UI realizes extension BULK command receptions and processing by being instructed to BULK ports using extension BULK in terminal equipment side, It is converted into the access to storage card.
- 4. the method as described in claim 1, it is characterised in that when the terminal device interacts with the webserver, need The data to be updated can be instructed by BULK and write in the storage card being hidden.
- 5. a kind of terminal device, it is characterised in that the terminal device includes self-defined BULK command process modules and storage card Hidden module,The self-defined BULK command process modules transmission simultaneously parses the extension BULK instructions received, is converted into the behaviour to storage card Make;The storage card hidden module hides storage card, and after terminal device inserts computer, operating system issues USB descriptors Request, the device descriptor and relevant descriptors list that terminal device returns do not include storage card;Operating system is set according to terminal The standby descriptor reported loads related driver, and operating system thinks not include storage card in the terminal device of insertion, then Will not the driving of load store card, be also not in storage card in corresponding equipment manager, user is not deposited to described directly Card storage is operated.
- 6. terminal device as claimed in claim 5, it is characterised in that storage card is mounted to terminal device by the terminal device EFS areas, storage card is conducted interviews and operated.
- 7. terminal device as claimed in claim 5, it is characterised in that computer is by extending BULK instructions to the storage card Conduct interviews and operate.
- 8. terminal device as claimed in claim 7, it is characterised in that computer-side enumerates a BULK port, terminal device UI by realizing extension BULK command receptions and place using extension BULK instructions, and in terminal equipment side to BULK ports Reason, is converted into the access to storage card.
- 9. terminal device as claimed in claim 5, it is characterised in that the terminal device interacts with the webserver When, it is necessary to which the data of renewal can be instructed in the storage card that is hidden of write-in by BULK.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110441997.0A CN102681949B (en) | 2011-12-26 | 2011-12-26 | A kind of terminal device and its hiding storage chucking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110441997.0A CN102681949B (en) | 2011-12-26 | 2011-12-26 | A kind of terminal device and its hiding storage chucking method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102681949A CN102681949A (en) | 2012-09-19 |
CN102681949B true CN102681949B (en) | 2017-11-14 |
Family
ID=46813909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110441997.0A Active CN102681949B (en) | 2011-12-26 | 2011-12-26 | A kind of terminal device and its hiding storage chucking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102681949B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335302B (en) * | 2014-06-19 | 2018-03-02 | 北京壹人壹本信息科技有限公司 | One kind storage display methods, system and intelligent terminal |
CN113867625A (en) * | 2021-08-27 | 2021-12-31 | 福建升腾资讯有限公司 | Communication method, device, equipment and medium for non-inductive drive-free equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1661573A (en) * | 2004-02-24 | 2005-08-31 | 深圳市朗科科技有限公司 | Method for managing notations of disks of mobile storage device |
CN201160005Y (en) * | 2008-03-12 | 2008-12-03 | 高志敏 | U disk for encryption |
CN101593117A (en) * | 2008-05-29 | 2009-12-02 | 北京飞天诚信科技有限公司 | A kind of method that improves intelligent key equipment easy applied performance |
-
2011
- 2011-12-26 CN CN201110441997.0A patent/CN102681949B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1661573A (en) * | 2004-02-24 | 2005-08-31 | 深圳市朗科科技有限公司 | Method for managing notations of disks of mobile storage device |
CN201160005Y (en) * | 2008-03-12 | 2008-12-03 | 高志敏 | U disk for encryption |
CN101593117A (en) * | 2008-05-29 | 2009-12-02 | 北京飞天诚信科技有限公司 | A kind of method that improves intelligent key equipment easy applied performance |
Also Published As
Publication number | Publication date |
---|---|
CN102681949A (en) | 2012-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9052919B2 (en) | Specialized network fileserver | |
EP2664180B1 (en) | Methods and system for providing content to a mobile communication device | |
CN102567074B (en) | USB (universal serial bus) device redirecting method facing virtual machines | |
US20050278418A1 (en) | System and method for use of multiple applications | |
CN101808123B (en) | Method and device for accessing storage resources in storage system | |
US8661502B2 (en) | Determining a sensitivity label of document information in real time | |
US9430217B2 (en) | Method and apparatus for patching | |
CN103401902A (en) | Portable cloud storage system and method | |
CN104321781A (en) | Method, system, and device for securely handling virtual function driver communications with a physical function driver | |
CN109597640B (en) | Account management method, device, equipment and medium for application program | |
US9280677B1 (en) | Secure native application messaging with a browser application | |
CN102346823B (en) | The method and system that in a kind of internet, user logs in | |
CN111400704A (en) | Method, device and equipment for realizing web access security audit and computer readable medium | |
CN102681949B (en) | A kind of terminal device and its hiding storage chucking method | |
US20110161428A1 (en) | Two-way data and resources sharing method | |
CN106775835A (en) | Obtain method, server and the terminal of upgrade file | |
US9087031B2 (en) | Method and program for selective suspension of USB device | |
WO2015074569A1 (en) | Method and apparatus for displaying transmission status of cloud documents | |
CN102685216A (en) | Attribute display method and attribute display system of universal serial bus (USB) equipment, USB equipment and server | |
EP2838232B1 (en) | Method for configuring maximum transmission unit (mtu), terminal and usb data card | |
CN102184112A (en) | Method and device for upgrading widget | |
CN109413070A (en) | A kind of WAF service activating method and relevant apparatus | |
CN113726788B (en) | Network access method, system, electronic equipment and storage medium | |
CN115643109B (en) | Remote control method, system, equipment and medium based on virtualization platform | |
US9104518B2 (en) | Wireless communication terminal and method for securely running industry software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |