CN1916860A - Method and device for saving and restoring application environment of personal information in computer - Google Patents

Method and device for saving and restoring application environment of personal information in computer Download PDF

Info

Publication number
CN1916860A
CN1916860A CN 200510101675 CN200510101675A CN1916860A CN 1916860 A CN1916860 A CN 1916860A CN 200510101675 CN200510101675 CN 200510101675 CN 200510101675 A CN200510101675 A CN 200510101675A CN 1916860 A CN1916860 A CN 1916860A
Authority
CN
China
Prior art keywords
personal information
individual
computing machine
applied environment
preservation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510101675
Other languages
Chinese (zh)
Other versions
CN100424650C (en
Inventor
许先才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2005101016756A priority Critical patent/CN100424650C/en
Publication of CN1916860A publication Critical patent/CN1916860A/en
Application granted granted Critical
Publication of CN100424650C publication Critical patent/CN100424650C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A method for holding and reproducing personal information application environment on computer includes operating service program stored in storage unit originally on computer after said service program is transmitted from said unit to computer, reproducing personal information application environment of said unit on computer by operating service program on computer and enabling to operate personal application program on computer, stopping operated personal application program and clearing off personal information on computer before service program is disengaged. The device for realizing said method is also disclosed.

Description

The preservation of personal information applied environment and replay method and device on the computing machine
Technical field
The present invention relates to infosystem, relate in particular to personal information and applied environment on the computing machine.
Background technology
In present infosystem, the high capacity exterior storage is widely used, such as USB flash disk, can be a large amount of in order to store, and by the personal information that various application programs generate, also can be in order to carry out the labor management of personal information.In the present information age, everyone may have a lot of accounts and password, as the voucher of the one's own various resources of visit, for example E-mail address, online forum or the like, the memory of these accounts and password and management have become the thing that allows the people have a headache.
The numerous Password Management softwares that are widely used at present, the code management device that pauses of promise for example, can the assisting users memory cipher, but as the software that is installed on the certain computer, can not move use, use even software is installed on the portable USB flash disk, if the user will carry out format manipulation to USB flash disk, just needing derives software and data, thereby has influence on the convenience of use.And at information equipment, in the use such as the personal computer that adopts the Windows system, can the login user identity operate, obtain login user and be stored in the interior whole personal informations of computer system, whole encrypted messages of being preserved by automatic password storage function of web browser for example, the content that also comprises collection, and nearest visit record, also has previous used file of this login user or the like, these information itself are to be kept on the hard disk of computing machine, even not with this user identity login, can obtain above-mentioned information too by analyzing hard disk, also above-mentioned user's password is reseted in the highest weight of available this computing machine limit user---keeper's identity login, then with this user identity login, thereby obtain whole personal informations, as seen, unless in the computer operation of oneself controlling fully, otherwise user's personal information is easy to illegally be stolen.
And, the user will make up the applied environment of own preference on every computing machine that oneself uses, be to waste time and energy very much, sometimes or even can't realize, such as, the user in flash disk, plans that a slide file copy explain demonstration for the client on client's computing machine, but if this demoware is not installed on client's the computing machine, speech probably can be wound up with embarrassment.If demoware also can be installed in the flash disk, and on any computing machine, move, just can address the above problem.But present most of software all had installation process before can using: various program files are copied to hard disc of computer, and revise the setting of numerous systems, so that software can move under the environment that configures.In other words, be exactly in the ordinary course of things, all files that these softwares are related to copies on the different computing machines simply, software can't move, even if the different operating system under the same computing machine has broken away from its original configuration surroundings, software can't move too.
If can be the personal information applied environment that comprises personal information and individual application program, be saved in uniformly in the high capacity external memory device, and being easy to the individual, carries this high capacity external memory device, and can carry out message exchange with computing machine pellucidly, with preservation and the reproduction that realizes the personal information applied environment easily.So, by means of such portable set, the user need not control the computing machine that needs use fully, just can set up a complete one's own environment for use on the computing machine that is used.
At the preservation of above-mentioned personal information applied environment and the application prospect of reproduction, people are always in continuous effort.The preservation of present personal information and reproduction, no matter be that software or hardware are realized, adopt the method for synchronization to carry out mostly, for example: TAANGO company, referring to http://www.taango.com, involved personal information is synchronized to earlier in its product systems, again the personal information of being preserved is synchronized in the computing machine when needing to use, guarantee the above-mentioned data after computer system can be visited renewal like this.U.S. Patent application US 20040193925 discloses a kind of portable Password Management device, can directly be connected with computing machine, need not be pre-configured and install, can realize login automatically at multiple applied environment, but also only limit to the management of cipher type personal information.U3 company, referring to http://www.u3.com, U3 platform agreement can standard flash disk manufacturer and software developer, make the software of supporting this agreement can be installed on the flash disk of supporting this agreement, to realize the mobile use of application program above-mentioned, U3 company also provides development interface at the software developer, but problem is, under this framework, the software that the software developer need revise oneself can move on flash disk.That is to say that if certain software wants to realize movability, must revise, this has just limited the scope of software available on USB flash disk greatly.
As seen, at the preservation and the reproduction of personal information applied environment, prior art does not provide more complete solution.
Summary of the invention
The technical problem to be solved in the present invention is to avoid above-mentioned the deficiencies in the prior art part, need not actually occupy the computing machine that needs use and propose a kind of user, just can set up a complete one's own environment for use on the computing machine that is used.
The technical scheme that the present invention solves the problems of the technologies described above employing comprises, the preservation and the replay method of personal information applied environment on a kind of computing machine are proposed, described personal information applied environment comprises personal information and individual application program, personal information comprises the personal account encrypted message, the exclusive data file of individual, exclusive application configuration of individual and individual exclusive secret file, individual's application program comprises the application program that relates to the personal information processing, which is provided with high capacity external memory device and interface control circuit by being provided with one, can carry out the portable set of communication with computing machine, realize the preservation of personal information applied environment and reproduction on computers, described high capacity external memory device is provided with the preservation and the program storage area that reappears process software of the data storage area and the described personal information applied environment of storage of storage personal information applied environment, may further comprise the steps
A, be stored in service routine program storage area, that must move on computers of equipment, be sent to computing machine by equipment after, operation on computers;
B, by moving described service routine on computers, the feasible personal information applied environment that is stored in the data storage area of equipment reappears on computers, that is: personal information is present in the calculator memory, and/or be kept on the equipment of computer-accessible, individual application program can be moved on computers;
D, service routine stop to be in the individual application program of running status before out of service, and the personal information on the dump that is: is disposed and is present in the calculator memory, and/or are kept at the personal information on the equipment of computer-accessible.
The technical scheme that the present invention solves the problems of the technologies described above employing also comprises, manufacture a kind of device of realizing the preservation and the reproduction of personal information applied environment on the computing machine, high capacity external memory device on the described portable set, it can be flash memory, micro harddisk or smart card, and this high capacity external memory device can be fixed form on equipment, also can be the mode of substituting; Described interface control circuit comprises and the interface section of computing machine communication that this interface section can be USB, IEEE1394, infrared or bluetooth; Described interface control circuit, comprise the micro-processor interface circuit part, the code of this circuit part's branch working procedure, be kept at the program storage area of high capacity external memory device, and the step that its program is carried out comprises with computing machine and cooperating, and carries out the preservation and the reproduction process of personal information applied environment of the data storage area stored of high capacity external memory device.On computing machine of the present invention the preservation of personal information applied environment and replay method and the device in:
The exclusive data file of described individual, computer system is classified as individual exclusive computer directory, file and/or data, include but not limited to: network address commonly used, address book, Email, contact fax, digital certificate, user initiatively are saved in all user-dependent particular system catalogues, for example, desktop, file, operating system and various software under my document etc. automatically that form and user-dependent various files in operational process include but not limited to configuration file or temporary file;
The exclusive secret file of described individual, by the user voluntarily appointment, the user thinks relevant with privacy or relate to the secret the various computer directory that need protection, file and/or data;
The exclusive application configuration of described individual comprises the registration table record of all systems relevant with personal application environment automatic formation or that initiatively be provided with by the user and software, and the various data relevant with personal application environment of otherwise preserving;
Described personal account encrypted message comprises account number cipher and other satellite informations of logining various programs and webpage.Further comprising the steps of: c, when in the use of computing machine, relating to the personal information applied environment, described service routine can be got involved automatically, feasible visit and/or the related visit of individual application program at personal information, the data storage area of sensing equipment.
Described service routine can be got involved automatically and be meant, sets up contact by all application programs of moving on hook and the computing machine.
Described service routine is operational process on computers, may further comprise the steps:
1., judge that service routine whether in operation, is then to withdraw from, otherwise continues:
2., the startup hook moves, and provides user interface by hook;
3., the selection carried out of user comprises configuration, moves or withdraws from, if withdraw from, then withdraw from behind the shutdown hook.The operational process of described hook at the personal account encrypted message, may further comprise the steps:
1., judge current page browse message whether login page or current window create whether login window of message, be not then to continue to judge, be then to continue;
2., judge whether to preserve, be then to eject password to select the interface, finish login process after user's operation, otherwise continue;
3., eject password and preserve the interface, after user's operation, eject password and select the interface, finish login process after user's operation.The operational process of described hook at the exclusive data file of individual, individual exclusive application configuration or individual exclusive secret file, may further comprise the steps:
1., judge whether the current file accessing operation belongs to that the individual is special-purpose, whether the current configuration data accessing operation belong to that the individual is special-purpose, whether the current file accessing operation belongs to the secret file, is then to continue, otherwise change step 3.;
2., judge and to read or write operation, be to write, 1. the data storage area of access means then, and will visit the result and return upper layer application returns step then; Be to read, then judge whether to have preserved, then the data storage area of access means, and will visit the result and return upper layer application, return step then 1., otherwise, the addressable miscellaneous equipment of access computer, and will visit the result and return upper layer application, step returned then 1.;
3., judge whether the application program of current execution belongs to individual application program, is then to change step 2., otherwise 1. the addressable miscellaneous equipment of access computer, and will visit the result and return upper layer application returns step then.
In the installation process of individual application program, the step that described service routine is carried out comprises:
1., start operation hook is installed;
2., start installation procedure;
End to be installed such as 3.;
4., close the installation hook.
The operational process of described installation hook may further comprise the steps::
1., the operation of judging current configuration data and/or installation file is read or write, and is to read, then continue, be to write, then change step 3.;
2., the addressable miscellaneous equipment of access computer, continue;
3., the data storage area of write device, continue;
4., will read and write the result and return to upper layer application, return step then 1..
Compare with prior art, adopt preservation and the replay method and the device of personal information applied environment on the computing machine of the present invention, the user need not actually occupy the computing machine that needs use, and just can set up a complete one's own environment for use on the computing machine that is used.
Description of drawings
Fig. 1 is the preservation and the hardware-initiated process of replay method embodiment of personal information applied environment on the computing machine of the present invention.
Fig. 2 is the service routine start-up course of the inventive method embodiment.
Fig. 3 is the service routine principle of work of the inventive method embodiment.
Fig. 4 is the login window type account password service routine flow process of the inventive method embodiment.
Fig. 5 is the login page type account password service routine flow process of the inventive method embodiment.
Fig. 6 is the individual exclusive data file service routine flow process of the inventive method embodiment.
Fig. 7 is the individual configuration data service routine flow process of the inventive method embodiment.
Fig. 8 is the mobile application build-in services program work principle of the inventive method embodiment.
Fig. 9 is the mobile application build-in services program circuit of the inventive method embodiment.
Figure 10 is the preservation and the reproducer example structure of personal information applied environment on the computing machine of the present invention.
Embodiment
Be described in further detail below in conjunction with the most preferred embodiment shown in the accompanying drawing.
Shown in Fig. 1 to 10, the preservation of personal information applied environment and replay method and device on the computing machine of the present invention, described personal information applied environment comprises personal information and individual application program, personal information comprises the personal account encrypted message, the exclusive data file of individual, exclusive application configuration of individual and individual exclusive secret file, individual's application program comprises the application program that relates to the personal information processing, which is provided with high capacity external memory device and interface control circuit by being provided with one, can carry out the portable set of communication with computing machine, realize the preservation of personal information applied environment and reproduction on computers, described high capacity external memory device is provided with the preservation and the program storage area that reappears process software of the data storage area and the described personal information applied environment of storage of storage personal information applied environment, may further comprise the steps
A, be stored in service routine program storage area, that must move on computers of equipment, be sent to computing machine by equipment after, operation on computers;
B, by moving described service routine on computers, the feasible personal information applied environment that is stored in the data storage area of equipment reappears on computers, that is: personal information is present in the calculator memory, and/or be kept on the equipment of computer-accessible, individual application program can be moved on computers;
D, service routine stop to be in the individual application program of running status before out of service, and the personal information on the dump that is: is disposed and is present in the calculator memory, and/or are kept at the personal information on the equipment of computer-accessible.
The present invention the personal information kind that claimed, comprising:
1, personal account encrypted message
Login account number cipher and other satellite informations of various programs and webpage;
2, individual exclusive data file
Computer system is classified as individual exclusive computer directory, file and/or data, include but not limited to: network address commonly used, address book, Email, contact fax, digital certificate, user initiatively are saved in all user-dependent particular system catalogues, for example, desktop, file, operating system and various software under my document etc. automatically that form and user-dependent various files in operational process include but not limited to configuration file or temporary file;
3, individual exclusive application configuration
The registration table record of that form or that initiatively be provided with by the user automatically all systems relevant and software, and the various data relevant of otherwise preserving with personal application environment with personal application environment;
4, individual exclusive secret file
By the user voluntarily appointment, the user thinks relevant with privacy or relate to the secret various files that need protection and/or data.
Structure of apparatus of the present invention and application note:
Comprise the software and hardware part.Hardware components mainly is made of interface control chip and exterior storage chip.
1, exterior storage adopts jumbo memory device, can be flash memory, micro harddisk and smart card.Can adopt fixed form on the circuit design, also can be extractable and changeable;
2, interface control can be wired with the communication modes of computer computing machine, also can be wireless, comprises USB, and IEEE1394 is infrared, and bluetooth, according to different interface modes, needs to adopt different interface control chips;
3, the software of relevant personal information of operation instruction and operation on computers all is kept in the external memory device;
When equipment insertion-wire communication mode, perhaps pushbutton enable--wireless communication mode, the software program that interface control module will need to move on computers is sent on the computing machine by interface, and starts software program, makes it to move on computers;
The personal information that is kept on the exterior storage before making behind the running software is in upstate on computers, according to different kinds, personal information can be used for the user in two ways: be present in the internal memory, be present on the equipment, can be mapped as a hard disk on computers, rather than be present on the hard disc of computer, the personal information of avoiding system in case of system halt to form leaks.
The user can use or manage above-mentioned personal information: comprise increase, deletion, modification or the like operation.The variation of all personal informations all will be kept in the external memory device; According to different kinds, the aforesaid operations of personal information is had difference on implementation;
The user extracts equipment or initiatively closes above-mentioned software program.Program is before withdrawing from, and the personal information that is arranged in internal memory will be removed thereupon.
After the user takes away equipment with oneself, for computing machine and subsequent user thereof, above-mentioned personal information will not exist.
The inventive method and device, hardware-initiated process is as shown in Figure 1: insert on the computing machine behind the interface at hardware, at first judge whether to use this equipment in computing machine for the first time, the words that are, the watchdog routine of install driver, and startup on computers, watchdog routine confirms that hardware is in the insertion state, the service routine that is on the equipment is cached on the computing machine, starts service routine.Otherwise watchdog routine confirms that hardware is in the insertion state, and the service routine that is on the equipment is cached on the computing machine, starts service routine.And the start-up course of service routine is as shown in Figure 2, comprises step:
1., judge that service routine whether in operation, is then to withdraw from, otherwise continues:
2., the startup hook moves, and provides user interface by hook;
3., the selection carried out of user comprises configuration, moves or withdraws from, if withdraw from, then withdraw from behind the shutdown hook.
The principle of work of the inventive method and device, be to have adopted HOOK (hook) technology, flow process as shown in Figure 3, directly get involved in the workflow of other programs of current operation by hook, when monitoring said procedure need visit the personal information that the present invention pays close attention to the time, change its access mode, point to the data storage area of apparatus of the present invention.
For account password information, the present invention is with the service routine flow process of login window shown in Figure 4, illustrated with the service routine flow process of login page shown in Figure 5, to land window or login page and carry out the uniqueness coding by its feature, when preserving, the personal account encrypted message is set up index with its uniqueness coding, organization and administration voluntarily, when monitoring when landing window or login page and occurring, the encrypted message of being preserved with the data storage area of its uniqueness coded query apparatus of the present invention, automatically finish coupling, whole process need not the user and handles.
Personal information for other classifications, the present invention is illustrated with individual exclusive data file service routine flow process shown in Figure 6, intercept and capture request of access, get involved browsing process, analyze access level, if read individual exclusive data file, individual exclusive application configuration or individual exclusive secret file, and externally find corresponding data in the storage, just directly read the data of the data storage area of apparatus of the present invention, if can not find, then read hard disk correspondence position data, and data are returned to the related software that proposes request of access; If write, then directly be updated to the data storage area of apparatus of the present invention.Whole process need not the client equally intervenes, and also need not consider stationary problem, and after apparatus of the present invention are extracted and closed HOOK, recover original flow process voluntarily, has simplified use flow process and management difficulty greatly.
Above-mentioned flow process reach is extended to whole personal settings, when being not limited to personal information, just can realizes the movability of individual environment.Individual configuration data service routine flow process as shown in Figure 7, the user inserts different computers with apparatus of the present invention, same user's environment for use all can occur, no matter desktop, collection or some other personalized setting all can be consistent on different computers.
The inventive method and device are in the application of move using, and software need not to revise, and just can realize movability, just are installed in apparatus of the present invention and can move everywhere after interior.The user is with mobile application build-in services program work principle shown in Figure 8, mobile application build-in services program circuit shown in Figure 9, finish software installation process, selection is installed in software in apparatus of the present invention, the present invention can be kept at associated documents and configuration in apparatus of the present invention, and this software is joined mobile list of application.When the user starts this software, according to Fig. 5, and/or flow process shown in Figure 6, HOOK judges that this software program belongs to mobile and uses, all these softwares all will be directed to the data storage area of apparatus of the present invention to the visit of personal data and configuration data/file, and software program can not start failure because not having what specific file or configuration data or operation makes mistakes like this.
Basic ideas of the present invention are: the personal information applied environment is kept in the portable equipment that contains the high capacity exterior storage on the computing machine, service routine can start operation automatically on computers, and make visit and/or the related visit of individual application program at personal information, point to this portable equipment.Enforcement of the present invention is not limited to above-mentioned open embodiment.Any based on above-mentioned basic ideas, and make at the foregoing description need not creative work replacement, improvement, all belong to enforcement of the present invention.

Claims (10)

1, the preservation of personal information applied environment and replay method on a kind of computing machine, described personal information applied environment comprises personal information and individual application program, personal information comprises the personal account encrypted message, the exclusive data file of individual, exclusive application configuration of individual and individual exclusive secret file, individual's application program comprises the application program that relates to the personal information processing, which is provided with high capacity external memory device and interface control circuit by being provided with one, can carry out the portable set of communication with computing machine, realize the preservation of personal information applied environment and reproduction on computers, described high capacity external memory device is provided with the preservation and the program storage area that reappears process software of the data storage area and the described personal information applied environment of storage of storage personal information applied environment, it is characterized in that, comprise step:
A, be stored in service routine program storage area, that must move on computers of equipment, be sent to computing machine by equipment after, operation on computers;
B, by moving described service routine on computers, the feasible personal information applied environment that is stored in the data storage area of equipment reappears on computers, that is: personal information is present in the calculator memory, and/or be kept on the equipment of computer-accessible, individual application program can be moved on computers;
D, service routine stop to be in the individual application program of running status before out of service, and the personal information on the dump that is: is disposed and is present in the calculator memory, and/or are kept at the personal information on the equipment of computer-accessible.
2, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 1 is characterized in that:
The exclusive data file of described individual, computer system is classified as exclusive computer directory, file and/or the data of individual, comprising: network address commonly used, address book, Email, contact fax, digital certificate, user initiatively are saved in file, operating system and various software under all user-dependent particular system catalogues that form automatically and user-dependent various files in operational process;
The exclusive secret file of described individual, by the user voluntarily appointment, the user thinks relevant with privacy or relate to the secret the various computer directory that need protection, file and/or data;
The exclusive application configuration of described individual comprises the registration table record of all systems relevant with personal application environment automatic formation or that initiatively be provided with by the user and software, and the various data relevant with personal application environment of otherwise preserving;
Described personal account encrypted message comprises account number cipher and other satellite informations of logging program and webpage.
3, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 2 is characterized in that,
Further comprising the steps of:
C, when in the use of computing machine, relating to the personal information applied environment, described service routine can be got involved automatically, makes visit and/or the related visit of individual application program at personal information, the data storage area of sensing equipment.
4, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 3 is characterized in that:
Described service routine can be got involved automatically and be meant, sets up contact by all application programs of moving on hook and the computing machine.
5, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 4 is characterized in that:
Described service routine is operational process on computers, may further comprise the steps:
1., judge that service routine whether in operation, is then to withdraw from, otherwise continues:
2., the startup hook moves, and provides user interface by hook;
3., the selection carried out of user comprises configuration, moves or withdraws from, if withdraw from, then withdraw from behind the shutdown hook.
6, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 5 is characterized in that:
The operational process of described hook at the personal account encrypted message, may further comprise the steps:
1., judge current page browse message whether login page or current window create whether login window of message, be not then to continue to judge, be then to continue;
2., judge whether to preserve, be then to eject password to select the interface, after user's operation, finish login process, otherwise continue;
3., eject password and preserve the interface, after user's operation, eject password and select the interface, after user's operation, finish login process.
7, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 5 is characterized in that:
The operational process of described hook at the exclusive data file of individual, individual exclusive application configuration or individual exclusive secret file, may further comprise the steps:
1., judge whether the current file accessing operation belongs to that the individual is special-purpose, whether the current configuration data accessing operation belong to that the individual is special-purpose, whether the current file accessing operation belongs to the secret file, is then to continue, otherwise change step 3.;
2., judge and to read or write operation, be to write, 1. the data storage area of access means then, and will visit the result and return upper layer application returns step then; Be to read, then judge whether to have preserved, then the data storage area of access means, and will visit the result and return upper layer application, return step then 1., otherwise, the addressable miscellaneous equipment of access computer, and will visit the result and return upper layer application, step returned then 1.;
3., judge whether the application program of current execution belongs to individual application program, is then to change step 2., otherwise 1. the addressable miscellaneous equipment of access computer, and will visit the result and return upper layer application returns step then.
8, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 4 is characterized in that:
In the installation process of individual application program, the step that described service routine is carried out comprises:
1., start operation hook is installed;
2., start installation procedure;
End to be installed such as 3.;
4., close the installation hook.
9, the preservation and the replay method of personal information applied environment on the computing machine as claimed in claim 8 is characterized in that:
The operational process of described installation hook may further comprise the steps::
1., the operation of judging current configuration data and/or installation file is read or write, and is to read, then continue, be to write, then change step 3.;
2., the addressable miscellaneous equipment of access computer, continue;
3., the data storage area of write device, continue;
4., will read and write the result and return to upper layer application, return step then 1..
10, realize the preservation of personal information applied environment on the described computing machine of claim 1 and the device of replay method, it is characterized in that:
High capacity external memory device on the described portable set can be a flash memory, micro harddisk or smart card, and this high capacity external memory device can be fixed form on equipment, also can be the mode of substituting;
Described interface control circuit comprises and the interface section of computing machine communication that this interface section can be USB, IEEE1394, infrared or bluetooth;
Described interface control circuit, comprise the micro-processor interface circuit part, the code of this circuit part's branch working procedure, be kept at the program storage area of high capacity external memory device, and the step that its program is carried out comprises with computing machine and cooperating, and carries out the preservation and the reproduction process of personal information applied environment of the data storage area stored of high capacity external memory device.
CNB2005101016756A 2005-11-30 2005-11-30 Method and device for saving and restoring application environment of personal information in computer Expired - Fee Related CN100424650C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005101016756A CN100424650C (en) 2005-11-30 2005-11-30 Method and device for saving and restoring application environment of personal information in computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005101016756A CN100424650C (en) 2005-11-30 2005-11-30 Method and device for saving and restoring application environment of personal information in computer

Publications (2)

Publication Number Publication Date
CN1916860A true CN1916860A (en) 2007-02-21
CN100424650C CN100424650C (en) 2008-10-08

Family

ID=37737861

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005101016756A Expired - Fee Related CN100424650C (en) 2005-11-30 2005-11-30 Method and device for saving and restoring application environment of personal information in computer

Country Status (1)

Country Link
CN (1) CN100424650C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079090B (en) * 2007-07-02 2010-04-21 北京飞天诚信科技有限公司 Apparatus for reproducing personal application environment
CN101221510B (en) * 2008-01-24 2012-05-16 清华大学 Method for reappearing user configuration surroundings on computer by mobile memory device
CN103493021A (en) * 2011-04-21 2014-01-01 国际商业机器公司 Virtual machine high availability
WO2016155248A1 (en) * 2015-03-27 2016-10-06 中兴通讯股份有限公司 Method and device for using software
WO2017000928A1 (en) * 2015-06-29 2017-01-05 北京金山安全软件有限公司 Application program-based privacy information storage method and device
CN110249301A (en) * 2017-02-02 2019-09-17 微软技术许可有限责任公司 Application via the application of installation on a portable storage device is portable

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3593241B2 (en) * 1997-07-02 2004-11-24 株式会社日立製作所 How to restart the computer
KR100699621B1 (en) * 2002-03-12 2007-03-23 트렉 2000 인터네셔널 엘티디. System and Apparatus for Accessing and Transporting Electronic Communications Using a Portable Storage Device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079090B (en) * 2007-07-02 2010-04-21 北京飞天诚信科技有限公司 Apparatus for reproducing personal application environment
CN101221510B (en) * 2008-01-24 2012-05-16 清华大学 Method for reappearing user configuration surroundings on computer by mobile memory device
CN103493021A (en) * 2011-04-21 2014-01-01 国际商业机器公司 Virtual machine high availability
US9448895B2 (en) 2011-04-21 2016-09-20 International Business Machines Corporation Recording activity of software threads in a concurrent software environment
WO2016155248A1 (en) * 2015-03-27 2016-10-06 中兴通讯股份有限公司 Method and device for using software
WO2017000928A1 (en) * 2015-06-29 2017-01-05 北京金山安全软件有限公司 Application program-based privacy information storage method and device
CN110249301A (en) * 2017-02-02 2019-09-17 微软技术许可有限责任公司 Application via the application of installation on a portable storage device is portable

Also Published As

Publication number Publication date
CN100424650C (en) 2008-10-08

Similar Documents

Publication Publication Date Title
CN1236592C (en) Smart card enabled mobile personal computing environment system
CN102214127B (en) Method for intensively storing and backing up data based on operating system virtualization theory
US20070130370A1 (en) Portable search engine
US20170208125A1 (en) Method and apparatus for data prefetch in cloud based storage system
TWI420328B (en) Device specific content indexing for optimized device operation
CN1623148A (en) Enhanced storing of personal content
CN1790265A (en) Portable applications
CN1916860A (en) Method and device for saving and restoring application environment of personal information in computer
AU2011329596A1 (en) Contextual history of computing objects
US8108359B1 (en) Methods and systems for tag-based object management
CN104160397A (en) Location independent files
CN104866778A (en) Document safety access control method and device based on Linux kernel
CN1845119A (en) Storage and management of authentication information and method and system for proxy authentication
CN102904944A (en) Remote cloud processing system and method for remote sensing data
CN110806911B (en) Cloud desktop management and control method, device and system
CN101944107A (en) Document management method
CN1920788A (en) Recovery method for computer system or data
US10963430B2 (en) Shared workspaces with selective content item synchronization
CN1866225A (en) Mapping method for mobile memory device
CN1677302A (en) Method and system for acquiring resource usage log and computer product
CN103685408A (en) Server for providing reading base mirror by storage area network, host and method
CN108021372A (en) The management method and device of a kind of application program
CN101350034B (en) Mobile memory apparatus and method for visiting file
CN102567041A (en) Computer device capable of realizing dynamic desktop
CN104156669A (en) Computer information evidence obtaining system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081008

Termination date: 20131130