摘要:
A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table.
摘要:
A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table
摘要:
A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table.
摘要:
A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table.
摘要:
Systems and methods of generating and providing a set of randomly selected substitute characters in place of a user entered key phrase are described here. One embodiment includes receiving a key phrase input by a user to gain access to secured data, and, in response to receiving the user entered key phrase, randomly selecting a set of substitute characters and providing the set of substitute characters in place of the key phrase entered by the user. In one embodiment, the randomly selecting comprises using a random number generator to select from a substitute character from a pre-generated set of substitute characters for each character, number, or text of the user entered key phrase. In one embodiment, the providing the set of substitute characters further comprises providing the randomly selected set of substitute characters in a display buffer as the user entered key phrase.
摘要:
Systems and methods for generating and displaying a keyboard comprising a random layout of keys are described here. One embodiment includes displaying a keyboard comprising a random layout of keys, to receive a user entered key phrase to be entered to gain access to secure data, and receiving the user entered key phrase by the user selecting keys of the keyboard via a pointing input device. The displaying includes, individually mapping keys of the keyboard to a separate value within a first value range, selecting a key for the keyboard based on the random value generated, and repeating the generating the random value and selecting a key for the keyboard based on the random value to select a remainder of keys for generating the random layout of keys for the keyboard.