Abstract: An example method includes, responsive to determining a device is connected to a second computing device, accessing a virtual storage area, the virtual storage area corresponds to storage space on the second computing device; responsive to detecting a first request by a user of the second computer device to read first data stored in the virtual storage area, transmitting the first data to the device; decrypting the first data to produce first decrypted data; transmitting the first decrypted data from the device to the second computing device; detecting a second request by a user of the second computer device to write second data to virtual storage area; responsive to detecting the second request, transmitting the second data to the device; encrypting the second data to produce second encrypted data; transmitting the second encrypted data from the device to the second computing device.
Abstract: An example method includes, responsive to determining a device is connected to a second computing device, accessing a virtual storage area, the virtual storage area corresponds to storage space on the second computing device; responsive to detecting a first request by a user of the second computer device to read first data stored in the virtual storage area, transmitting the first data to the device; decrypting the first data to produce first decrypted data; transmitting the first decrypted data from the device to the second computing device; detecting a second request by a user of the second computer device to write second data to virtual storage area; responsive to detecting the second request, transmitting the second data to the device; encrypting the second data to produce second encrypted data; transmitting the second encrypted data from the device to the second computing device.
Abstract: An example method includes, responsive to determining a device is connected to a second computing device, accessing a virtual storage area, the virtual storage area corresponds to storage space on the second computing device; responsive to detecting a first request by a user of the second computer device to read first data stored in the virtual storage area, transmitting the first data to the device; decrypting the first data to produce first decrypted data; transmitting the first decrypted data from the device to the second computing device; detecting a second request by a user of the second computer device to write second data to virtual storage area; responsive to detecting the second request, transmitting the second data to the device; encrypting the second data to produce second encrypted data; transmitting the second encrypted data from the device to the second computing device.