Content Control Method Using Versatile Control Structure
First Claim
1. A method for providing data processing services to a host by means of an apparatus comprising a non-volatile memory system with data stored therein, a security data structure stored in said non-volatile memory system and at least one software application stored in said non-volatile memory system;
- said method comprising;
removably connecting the non-volatile memory system to the host;
invoking using the host said at least one software application to process said data to obtain information; and
accessing said information by the host, wherein said invoking and said accessing are controlled by the security data structure.
3 Assignments
0 Petitions
Accused Products
Abstract
At least one software application is stored in a memory device, where a security data structure controls access to information obtainable from data stored in the device and to the at least one software application. A set of protocols control communication between a host and a memory device. Invocation of at least one software application stored in the memory device modifies the protocol. A security data structure controls access to data stored in the memory device according to an access policy. Invocation of at least one software application stored in the memory device imposes at least one condition in addition to the access policy for accessing the data. A data object storing data in the memory device is associated with at least one software application. Accessing the object will invoke the at least one software application which processes the data in the object. Individual ones of a plurality of first sets of protocols are selectable for enabling data to be provided and stored in a data object. A second set of protocols can be used to retrieve data from the data object, or data derived from such data, irrespective of which of the first set of protocols was used to enable the provision and storing of data in the object.
-
Citations
22 Claims
-
1. A method for providing data processing services to a host by means of an apparatus comprising a non-volatile memory system with data stored therein, a security data structure stored in said non-volatile memory system and at least one software application stored in said non-volatile memory system;
- said method comprising;
removably connecting the non-volatile memory system to the host; invoking using the host said at least one software application to process said data to obtain information; and accessing said information by the host, wherein said invoking and said accessing are controlled by the security data structure. - View Dependent Claims (2, 3, 4, 5, 6)
- said method comprising;
-
7. A method for providing data processing services to hosts by means of a non-volatile memory device, said device storing therein a plurality of software applications, comprising:
-
receiving data at the non-volatile memory device from a data source through one of the hosts; invoking, in response to a request from said one host, a first software application of said plurality of software applications to create a data object in the non-volatile memory device and store said data or derivative data derived from said data in the data object; and associating said data object with a second software application of said plurality of software applications, so that when said data object is accessed, said second software application is invoked. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for providing data processing services to hosts using a data storage apparatus comprising:
-
a non-volatile memory system configured to be removably connected to individual ones of the hosts and capable of storing data; a security data structure stored in said non-volatile memory system; at least one data object stored in said non-volatile memory system; a plurality of first sets of different protocols stored in said non-volatile memory system; a second set of protocols that is stored in said non-volatile memory system and that enables said data or derivative data derived from said data to be retrieved from said at least one data object under the control of said security data structure; said method comprising; selecting one of the first sets to enable data from the host, to which the memory system is connected, or derivative data to be provided to and stored in said at least one data object under the control of said security data structure; and using said second set of protocols to enable the retrieval of said data or derivative data irrespective of which of the first sets of protocols enabled the providing and storing. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification