Thus, a data storage device can be controlled using a first user profile provided for allowing at least the writing and reading of data in memory of the data storage device, and a second user profile provided for at least prohibiting the reading of data, stored in the memory of the device, that were not previously written in the memory by the user having this second profile. Therefore, any user having the second user profile can write data in the memory of the storage device, but as they have no read access rights, cannot view the data previously written in the memory of the storage device except for those data the user himself or herself has written, which advantageously guarantees that the confidentiality of the data stored in the memory of the storage device is protected against users other than those associated with the first user profile while allowing a second-profile user to check the writes that he or she has made in the memory of the device, for example by viewing these writes from a graphical user interface.
The proposed solution also has the advantage of being independent and universal, particularly as it is not limited to a particular ecosystem, whether from the point of view of the data storage device or of a computing device with which the storage device is used.
In addition, the proposed solution allows an intermediate storage of data, by making use of a storage device that can be external, physical, and secure. This avoids a direct transfer of data between two computing devices (for example between a smartphone and a personal computer), which is not always desired by users, and offers a very useful alternative in cases where such a direct transfer of data between two computing devices is not possible.