Automatic-installable information safety equipment and control method thereof

An information security and automatic installation technology, applied in the field of information security, can solve problems such as increased costs, reduced reliability, and user misunderstandings, and achieves cost-effective effects

Active Publication Date: 2009-02-18
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when such a device is connected to the host, it will be reported to the host as HID device type / CCID device type and SCSI device type at the same time when the system enumerates, which is easy to cause user misunderstanding, and more importantly, due to the increase Part of the circuit of the hub and part of the circuit of the U disk are removed, the cost is increased, and the reliability is also reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic-installable information safety equipment and control method thereof
  • Automatic-installable information safety equipment and control method thereof
  • Automatic-installable information safety equipment and control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] This embodiment provides an information security device 100 that can be installed automatically, such as figure 1 As shown, it includes a control module 102, a USB interface module 101, a working mode switching module 105, a SCSI protocol processing module 103, an automatic operation module 104, a HID protocol processing module 107, an information security module 108 and a reset USB bus module 106. The control module is connected with the USB interface module, the reset USB bus module, the working mode switching module, the SCSI protocol processing module, and the HID protocol processing module, the reset USB bus module is connected with the USB interface module, the automatic operation module is connected with the SCSI protocol processing module, and the information The security module is connected with the HID protocol processing module.

[0066] The USB interface module 101 is used to establish a connection between the information security device and the host through...

Embodiment 2

[0077] This embodiment provides an information security device 200 that can be installed automatically, such as figure 2 As shown, it includes a control module 202, a USB interface module 201, a working mode switching module 205, a SCSI protocol processing module 203, an automatic operation module 204, a reset USB bus module 206, a HID protocol processing module 207 and an information security module 208. The control module is connected with the USB interface module, the reset USB bus module, the working mode switching module, the SCSI protocol processing module, and the HID protocol processing module, the automatic operation module is connected with the SCSI protocol processing module, the reset USB bus module is connected with the USB interface module, and the information The security module is respectively connected with the SCSI protocol processing module and the HID protocol processing module.

[0078] The USB interface module 201 is used to establish a connection betwee...

Embodiment 3

[0096] This embodiment proposes a control method for information security equipment that can be automatically installed, such as Figure 4 shown, including the following steps:

[0097] Step 401: Establish a connection between the information security device and the host through a USB interface.

[0098] Step 402: The information security device declares itself as a SCSI device type.

[0099] The host sends a request to obtain the device type to the information security device, and the information security device reports to the host that the device descriptor is a SCSI device descriptor, and declares itself to be a SCSI device type.

[0100] Step 403: Automatically start the Autorun program.

[0101] The Autorun program is pre-stored in the information security equipment and pre-written by the information security equipment manufacturer.

[0102] Step 404: The Autorun program detects whether the application program related to the information security device has been installed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses the information security equipment that can be automatically installed and its control method, belonging to the field of information security. To address the problem that the automatically installed information security equipment can be operated by ordinary users, which is not restricted by mandate, the invention provides the information security equipments that can be installed automatically, which includes control modules, USB interface modules, switch mode modules, SCSI protocol processing modules, automatically run modules, un-limited protocol processing modules, information security modules and reset USB bus modules. The invention also proposes automatically installed security equipment control methods. Using the information security devices in this invention not only reduces the cost of inputs, but also greatly enhances the ease of use.

Description

technical field [0001] The invention relates to the field of information security, in particular to an automatically installed information security device and a control method thereof. Background technique [0002] Because the Windows operating system is an operating system that supports multiple users and multi-tasks, security issues have become a very critical issue, so the Windows operating system needs to set permissions for users. Permissions refer to a user's access rights to system resources. Permissions are set based on users and processes, and different users have different permissions to access the computer. Windows users are divided into many groups, the common user groups are as follows: [0003] Administrator: Administrator group, by default, users in Administrator have unrestricted full access to the computer / domain. [0004] System: It has the same or even higher authority than Administrator, and has the authority required for the normal operation of the sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F13/10G06F13/14G06F9/445G06F21/00G06F21/50
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products