Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides an artificial intelligence data storage device.
The invention adopts the technical scheme that 1, an artificial intelligence data storage device comprises a Universal Serial Bus (USB) coupling device (1), an interface device (2), a memory control device (3) and a nonvolatile solid-state storage device (4);
preferably, the memory control means (3) are coupled between the interface means (2) and the memory means (4) to control the flow of data from the memory means (4) to the universal serial bus USB coupling means (1).
In the present invention, the universal serial bus USB is integrated into the single portable data storage device without the need for an interconnection cable capable of directly coupling the single portable data storage device to a USB socket of a computer;
preferably a single interface coupled to a universal serial bus, USB, that allows a single portable data storage device to communicate via the USB protocol;
preferably, a non-volatile solid-state memory having sufficient capacity to enable said single portable data storage device to act as a replacement for a disk or CD;
in the present invention, a memory control device is coupled between an interface and a memory for controlling data flow between the memory and a universal serial bus USB to enable the single portable data storage device to be used as a replacement for a disk or a CD and to implement access restriction, wherein access to at least a portion of the data in the memory is necessary for restricted password authentication.
In the present invention, successful authentication under defined security measures is required to obtain access to at least a portion of the data in the memory;
preferably, the storage control means comprises a microcontroller;
preferably, the memory control means is capable of establishing a password to facilitate enforcement of said access restrictions;
preferably, the memory control device is capable of encrypting and decrypting passwords;
preferably, the memory comprises a flash memory.
In the invention, the integrated portable data storage device can be directly connected to a Universal Serial Bus (USB) socket of a computer through a USB, so that the integrated portable data storage device and the computer can be immediately connected without cable interconnection;
in the present invention, a memory control device coupled to a memory to control data flow between the memory and a Universal Serial Bus (USB) such that an integrated portable data storage device can be used as a replacement for a disk or CD and access restriction is implemented, wherein access to at least a portion of data in the memory is authenticated with a restriction password;
preferably, the universal serial bus USB, memory and memory control device are part of an integrated housing, a portion of the USB plug protruding from a side wall of the integrated housing to facilitate direct coupling to the USB socket.
Detailed Description
It should be noted that the embodiments and features of the embodiments can be combined with each other without conflict, and the present application will be further described in detail with reference to the drawings and specific embodiments.
As shown in FIG. 1, the data storage device 10 includes a USB plug 1, the USB plug 1 is coupled to a USB interface 2, the USB interface 2 is coupled to a microcontroller 3, and the microcontroller 3 is coupled to a flash memory 4. The microcontroller 3 includes a read only memory ROM5 which stores a program to control the operation of the microcontroller 3.
The operations performed by the microcontroller 3 include comparing a password entered by a user with a corresponding password stored in the flash memory 4 to determine whether the user is authorized to access the contents of the flash memory 4. The program stored in the ROM5 also controls the flow of data into and out of the flash memory 4 and is able to detect whether a computer to which the storage device 1 is coupled to the flash memory 4 has installed a software program corresponding to a password stored in the flash memory 4. The microcontroller 3 automatically retrieves the password from the installed software and compares it with the password stored in the flash memory to verify that the computer user has authorized access to and operation of the software. Further, the program stored in the ROM5 allows the software provider to set a password in the flash memory so as to correspond to a password contained in the software provided to the user. Typically, the password may correspond to the serial number of the software.
The flash memory 4 is typically divided into a number of different sections or regions. Typically, flash memory is divided into two regions, each region having a unique password. If the data storage device 10 is self-contained with a software package, the software serial number may be set in a field as a password for the user to access and use the software. Another area is typically used for storing user data, which may have a separate password set by the user. Typically, the password is stored in an encrypted form in a secure location in the flash memory. Encryption, decryption, data flow control and USB protocols are all managed by the microcontroller 3.
The microcontroller 3 also comprises a random access memory RAM 6, which random access memory RAM 6 is a temporary storage area to allow the functionality of the microcontroller 3. Furthermore, the method is simple. A manual switch 7 is coupled between the flash memory 4 and the microcontroller 3. The manual switch 7 is movable between a first position in which a user can write data to the flash memory 4 and a second position in which data is prevented from being written to the flash memory 4.
The device 10 also includes a USB socket 8 which is directly connected to the USB plug 1 and allows other USB devices to be connected to the USB via the device 10. For example, if the user wishes to increase memory space, the USB plug 1 of the second storage device 10 may be connected to the USB socket 8.
Fig. 2 is a flowchart showing a setup procedure of the device 10 for a software provider when the software provider intends to provide the device as an authentication device for the software. First, the plug 1 of the device 10 is plugged into the USB socket 20 on the computer. When device 10 is plugged into a USB receptacle on a computer, communication is established between the computer and device 10. The software provider pre-installs the installation software on the computer run by the operator. The operator selects password setup installation 22 from pre-installed software, which in response requires the operator to enter a password or serial number corresponding to the software of rendering device 10. The password or serial number is then encrypted and stored in flash memory.
Fig. 3 is a flow chart showing an end user setting a password for region 2 of flash memory 4. The device 10 typically provides driver software that is loaded onto the computer by the user prior to installation of the device. To set the password for region 2, the user plugs 20 device 10 into a USB port on the computer and communication 21 is established between the computer and device 10. The user then runs driver software which enters the password installation setup mode 23 for region 2. The user then enters a password that they wish to use to prevent unauthorized access to zone 2 of flash memory 4. The input password is stored in the flash memory after being encrypted.
After the end user has performed the initial password setting procedure described above and shown in fig. 3, when the user plugs the device 10 into the USB port 20 on the computer, the computer will establish communication 21 with the device 10 and first check 33 the installation status flag stored in the flash memory 4 (see fig. 4). If the status flag is "Y", the device 10 outputs an "OK" flag to the computer. The microcontroller instructs the computer to issue a request to the user to select the area they want to enter. If the status flag is "N", the device will not output an "OK" flag to the computer and will proceed directly to step 35. In response to the region selection request 35, the user selects 36 in region 1 or region 2.
If zone 1 is selected, the device 10 assumes that the user wishes to install software on a computer stored in flash memory 4 and requires 37 the provision of an appropriate password to confirm that the user has been authorized to install the software. The microcontroller 3 receives the user-entered password, retrieves the zone 1 password stored in the flash memory 4, decrypts the zone 1 password, and compares it with the user-entered password to verify that the user is authorized to install the software. If the passwords do not match, the device prompts the computer to request the user to enter the password again.
If the password entered by the user matches the password stored in the flash memory 4, the microcontroller 3 initiates 39 the installation of software from the flash memory 4 to the computer. To install the software, the computer sends 40 read/write commands in USB format to the microcontroller 3 to obtain the data, the microcontroller 3 retrieves the requested data from the flash memory 4 and sends the data 41 to the drive 2. The drive 2 converts 42 the data to PC format and outputs the data to the computer through the USB plug 1. The microcontroller 3 then checks 43 whether the software installation is complete. If the operation is not complete, the operation returns to step 40. If the installation of the software is completed, the status flag stored in the flash memory 4 is changed to "Y", and then the device 10 can be detached from the USB socket of the computer.
If the user selects area 2, microcontroller 3 sends a command to the computer asking the user to enter the password for area 2. When the user enters a password, the computer sends the password to the microcontroller 3. The microcontroller 3 retrieves the password for region 2 from the flash memory 4, decrypts the password 47 and compares it with the password entered by the user. If the user entered the password incorrectly, operation returns to step 46 and the computer again requests the user to enter the password.
If the password entered by the user is correct, the user may access region 2 of flash memory 4 from: the flash memory 4 reads data and writes data to the flash memory 4. However, data can be written to the flash memory 4 only when the manual switch 7 is in a position that allows data to be written to the flash memory 4. To read or write data from the flash memory 4, the computer 48 sends a read or write command to the microcontroller 3 in USB format. In response to a read or write command the microcontroller 3 either retrieves 49 data from the flash memory 4 and sends it to the drive 2 to convert it 50 to PC format and then output to the computer, or receives data from the drive to write it to the flash memory 4.
The microcontroller 3 then decides whether the read or write operation is complete. If the operation is not complete, return is made to step 48. If the operation is complete, the operation terminates 52.
The device 10 described above is intended to be coupled to a Universal Serial Bus (USB). However, the plug 1, interface device 2 and receptacle 8 may be used with any suitable computer serial bus. For example, the device 10 may be modified for use with the IEEE 1394 (firewire) protocol, replacing the USB plug 1, the USB interface device 2 and the socket 8 with a firewire protocol compatible plug, interface device and socket, respectively.
An advantage of the above-described device 10 is that it provides a portable data storage device for a computer that does not require a mechanically operated read/write device. Furthermore, the device 10 has no moving parts. This makes the data storage device 10 more compact than conventional portable data storage devices.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various equivalent changes, modifications, substitutions and alterations can be made herein without departing from the principles and spirit of the invention, the scope of which is defined by the appended claims and their equivalents.