Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon
First Claim
1. A method for preventing unauthorized access to data stored on a memory device, the method comprising the following steps:
- (a) coupling the memory device to a host device;
(b) generating a graphical user interface;
(c) requesting authentication information;
(d) inputting authentication information;
(e) determining if the authentication information is correct; and
(f) if the authentication information is correct, then granting access to data stored on the memory device, and if the authentication information is not correct then denying access to the data on the memory device.
1 Assignment
0 Petitions
Accused Products
Abstract
A portable non-volatile memory device and method for preventing unauthorized access to data stored on the memory device is provided. The invented memory device and method prevents unauthorized access to data stored on the device without requiring self-installing software to protect the data stored on the device. Data and information stored on the device may be accessed or manipulated quickly. Coupling the invented device to the computer activates the device. Upon activation, a window is generated on a computer screen. A Graphical User Interface requests authentication information for accessing data stored on the device. If the correct authentication information is input, then access to the data stored on the invented device is granted, otherwise access to the data is denied. Once access is granted, data stored on the device may be displayed in the window and can be transferred between the device and a host computer.
-
Citations
18 Claims
-
1. A method for preventing unauthorized access to data stored on a memory device, the method comprising the following steps:
-
(a) coupling the memory device to a host device;
(b) generating a graphical user interface;
(c) requesting authentication information;
(d) inputting authentication information;
(e) determining if the authentication information is correct; and
(f) if the authentication information is correct, then granting access to data stored on the memory device, and if the authentication information is not correct then denying access to the data on the memory device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for preventing unauthorized access to data stored on a portable memory device without requiring self-installing software to protect the data stored on the device, the method comprising the following steps:
-
(a) coupling the portable memory device to a host device to activate the memory device;
(b) displaying information on the host device (c) generating a graphical user interface requesting authentication information from the host device;
(d) inputting authentication information;
(e) determining if the authentication information is correct; and
(f) if the authentication information is correct, then granting access to data stored on the memory device and displaying the data on the host device, and if the authentication information is not correct then denying access to the data on the memory device, whereby unauthorized access to data stored on the memory device is prevented without uploading self-installing software to the host device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A portable memory device configured to prevent unauthorized access to data stored thereon comprising:
-
a housing containing a processor for processing data and a memory for storing data; and
an interface for coupling the memory device to a host device, the processor coupled to the interface for sensing if the memory device is coupled to a host device, if the memory device is coupled to a host device, then the processor runs a program that displays information on the host device, the program generating a graphical user interface requesting authentication information from the host device, if the authentication information from the host device matches authentication information stored in memory, then access to data stored in memory is granted, and if the authentication information from the host device does not match authentication information stored in memory, then access to data stored in memory is denied. - View Dependent Claims (15, 16, 17, 18)
-
Specification