Peripheral device data integrity
First Claim
1. A method for protecting against corruption of data stored in a peripheral storage device, the method comprising:
- communicatively coupling the peripheral storage device with a host computer, the peripheral storage device comprising a portable storage device having at least memory and a controller;
storing data from the host computer to a first portion of the peripheral storage device memory;
the controller backing up some or all of the data to a second portion of the peripheral storage device memory;
setting a pointer to indicate that the first portion of the peripheral storage device memory is to be used and the second portion is a backup portion;
the controller restoring some or all of the data from the backup portion of the peripheral storage device memory to the first portion of the peripheral storage device memory to be used; and
changing the pointer to indicate that the second portion of the peripheral storage device memory is to be used and the first portion is to be considered the backup portion;
wherein the data is encrypted by the controller, the controller being an on-board processor included within the portable storage device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for protecting against corruption of data stored in a peripheral storage device. The peripheral storage device is communicatively coupled with a host computer. The peripheral storage device includes at least memory and a controller. Data from the host computer is stored to a first portion of the peripheral storage device memory. The controller backs up some or all of the data to a second portion of the data to a second portion of the peripheral storage device memory. The controller restores some or all of the data from the second portion of the peripheral storage device memory to the first portion of the peripheral storage device memory.
-
Citations
50 Claims
-
1. A method for protecting against corruption of data stored in a peripheral storage device, the method comprising:
-
communicatively coupling the peripheral storage device with a host computer, the peripheral storage device comprising a portable storage device having at least memory and a controller; storing data from the host computer to a first portion of the peripheral storage device memory; the controller backing up some or all of the data to a second portion of the peripheral storage device memory; setting a pointer to indicate that the first portion of the peripheral storage device memory is to be used and the second portion is a backup portion; the controller restoring some or all of the data from the backup portion of the peripheral storage device memory to the first portion of the peripheral storage device memory to be used; and changing the pointer to indicate that the second portion of the peripheral storage device memory is to be used and the first portion is to be considered the backup portion; wherein the data is encrypted by the controller, the controller being an on-board processor included within the portable storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for protecting against corruption of data stored in a peripheral storage device, the system comprising:
-
a peripheral storage device comprising a portable storage device having at least memory and a controller, the memory including a first portion of memory and a second portion of memory; a host computer communicatively coupled with the peripheral storage device for storing data from the host computer to the first portion of the peripheral storage device memory; and a controller configured to; backup some or all of the data to the second portion of the peripheral storage device memory; set a pointer to indicate that the first portion of the peripheral storage device memory is to be used and the second portion is a backup portion; restore some or all of the data from the backup portion of the peripheral storage device memory to the first portion of the peripheral storage device memory to be used; and change the pointer to indicate that the second portion of the peripheral memory storage device is to be used and the first portion is to be considered the backup portion; wherein the data is encrypted by the controller, the controller being an on-board processor included within the portable storage device. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A non-transitory computer readable storage medium having a program embodied thereon, the program executable by a processor to perform a method for protecting against corruption of data stored in a peripheral storage device,
the method comprising: -
communicatively coupling the peripheral storage device with a host computer, the peripheral storage device comprising a portable storage device having at least memory and a controller; storing data from the host computer to a first portion of the peripheral storage device memory; the controller backing up some or all of the data to a second portion of the peripheral storage device memory; the controller setting a pointer to indicate that the first portion of the peripheral storage device memory is to be used and the second portion is a backup portion; the controller restoring some or all of the data from the backup portion of the peripheral storage device memory to the first portion of the peripheral storage device memory to be used; the controller changing the pointer to indicate that the second portion of the peripheral storage device memory is to be used and the first portion is to be considered the backup portion; wherein the data is encrypted by the controller, the controller being an on-board processor included within the portable storage device.
-
Specification