If necessary a “hub” 30 can be used to connect a removable portable memory device 10 to a host computer system 1 (as shown in
A removable portable memory device 10 and/or hub 30 can allow a profile 100 to be input and selected by internal or external software control or manually through use of buttons or other controls on the hub or device itself. The controls can allow a user to manually switch through a set of profiles or can alternately permit use of automatic detection of profiles (such as with control by a confirmation display). The selectable profile(s) 100 can also be stored on a host computer system 1 by using a software interface to a portable memory device 10 that reproduces the device LED window (or other display) by simulating it in a GUI window (or otherwise) on the computer screen. The profile 100 can also be stored in a data memory area of the removable storage device 10 along with the interfacing software program. This program can then be transferred to the host computer 1 upon installation of the memory device 10 and run via automatic initiation (“autoplay”) to display (and choose) the selectable profile(s) 100 (and the action(s) to be performed on them) using a GUI window or other display.
A user can select from one or more profiles 100 that have been customized for use with a removable portable memory device 10 and can be identified by their user and/or owner and/or type, i.e., “MOM, DAD, TOMMY, SUZY, OLD MUSIC, FUNKY VIDEOS”, etc. The control function(s) for each profile 100 present one or more user-selectable actions (or confirmation of a default action by the user) that can be performed on the information defined by the profile, causing the removable memory device 10 to perform the action after its selection or confirmation. The operation(s) that can be performed on data stored in a portable memory device 10 include: “ENCRYPT”, i.e, downloading unsecured (“unencrypted”) data by erasing it from the memory device and then “encrypting” (or securing the data against unauthorized access) and storing the encrypted data back onto the device; “EMPTY”, i.e., erasing all data from the device; “DOWNLOAD”, i.e., copying all data from the device to another system location or device while leaving the original contents intact; “DOWNLOAD & EMPTY”, i.e., “downloading” all data (as previously described) and then erasing it from the device. “PRINT”, i.e., sending the data contained on the device to a printer for output; “SYNCHRONIZE”, i.e., coordinating the timing of device operation with that of other system components in order to transfer data to or from the device; “VIEW LABEL”, i.e., permitting user viewing of identification labels for stored files and/or profiles; “VIEW CAPACITY”, i.e., permitting user viewing of remaining storage capacity of a device, etc.
While certain preferred features of the invention have been shown by way of illustration, many modifications and changes can be made that fall within the true spirit of the invention as embodied in the following claims, which are to be interpreted as broadly as the law permits to cover the full scope of the invention, including all equivalents thereto.