473,404 Members | 2,174 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

Specific USB Key development

Hi all

I've never been coding on the hardware side and so, I am willing to find some help around to help me getting the following functionalities working

My current project involves, if possible, that a person can uses a specific USB key to store encryped data so he can take it with him and by plugging the USB key, getting access to it. For security and no other use reasons (users may want to store other data on it), I want the USB key not to be recognised as an USB drive by the system but when plugged having an application catching the plugged event from the system and getting its content to be decrypted and displayed

Knowing that, I'd llike to know if it is doable. It sounds like I should develop my own USB driver and maybe also have some hardware specific production to avoid oher USB keys to act the same way. If you have any idea on how I could do that, I would appreciate

Here is a summary of the requested features
- USB Key never recognized as an USB drive by the system
- Automatic catch of the plugged event from the system
- Read and Write features on it

Thank

Philippe
Jul 21 '05 #1
2 1360
"Philippe DA SILVA" <am******@wanadoo.fr> wrote in message
news:D4**********************************@microsof t.com...
Hi all,

I've never been coding on the hardware side and so, I am willing to find some help around to help me getting the following functionalities working.
My current project involves, if possible, that a person can uses a specific USB key to store encryped data so he can take it with him and by
plugging the USB key, getting access to it. For security and no other use
reasons (users may want to store other data on it), I want the USB key not
to be recognised as an USB drive by the system but when plugged having an
application catching the plugged event from the system and getting its
content to be decrypted and displayed.
Knowing that, I'd llike to know if it is doable. It sounds like I should develop my own USB driver and maybe also have some hardware specific
production to avoid oher USB keys to act the same way. If you have any idea
on how I could do that, I would appreciate.
Here is a summary of the requested features:
- USB Key never recognized as an USB drive by the system,
- Automatic catch of the plugged event from the system,
- Read and Write features on it.

Thanks

Philippe


You would have better luck posting to comp.arch.embedded.

Jul 21 '05 #2
Thank you for you advice.
Jul 21 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Thomas Weholt | last post by:
Hi, I've been using Python on both Windows 2000 and Linux for some time now. On Windows I've used PythonWin as editor, Emacs on Linux. This has been working ok so far. Now as Python will be a...
3
by: jmh | last post by:
First, for those that view this as an OT post, sorry. I'm not sure where to post (*.jobs?) but from reading there are a number of people in this NG whose opinions I would respect and welcome. ...
0
by: Steven Kelly | last post by:
For those going to XP 2005 (Sheffield, UK, June 18-23) and interested in modeling, the following workshop may be of interest: Agile Development with Domain Specific Languages Scaling up Agile -...
2
by: Samuel R. Neff | last post by:
What options are available for doing full-text searches of database data without using a database-specific full-text engine? The only option I've found is Google's Search Appliance but it's an...
2
by: Karthik | last post by:
I am developing a product , that I would like to compile in different development environments. So if I have to include any header file specific to VC++ 2003 implementation, I would like to put...
3
by: ExclusiveResorts | last post by:
Can the CallContext be used reliably for storing request specific data? We are developing an application library that uses the CallContext to keep an IdentityMap (hashtable of business objects...
2
by: Philippe DA SILVA | last post by:
Hi all I've never been coding on the hardware side and so, I am willing to find some help around to help me getting the following functionalities working My current project involves, if...
4
by: Hermann Maier | last post by:
hi, i need to find out the memory usage of a specific function that i use in my program. this function does some recursive calculations and i want my program to display the amount of memory the...
14
by: John T Ingato | last post by:
I have a contacts table with name address and such but are missing all phone numbers in the phone number fields. I have just received an updated customer list in Excel and have imported into a new...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.