Smart card and USB combined equipment and method of self-destroy forillegal access and try to pass valve value

A composite device and illegal access technology, which is applied in the direction of recording carriers used by machines, instruments, and electronic digital data processing, etc., can solve the problems of data without any access control, non-applicable confidentiality requirements, and non-existent self-destruction. To achieve the effect of strong confidentiality

Inactive Publication Date: 2007-07-18
中国信息安全产品测评认证中心 +1
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Ordinary U disk is a mobile storage access media device. Its obvious defect is that it is a completely open and transparent mobile storage media device. There is no access control for data access, that is, as long as it has a USB interface can be used without hindrance
[0008] However, the above two methods do not have the function of self-destruction after unauthorized access, and are not suitable for occasions that require high confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart card and USB combined equipment and method of self-destroy forillegal access and try to pass valve value
  • Smart card and USB combined equipment and method of self-destroy forillegal access and try to pass valve value

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The so-called "self-destruction" function means that the operating system can audit access attempts. When the unsuccessful access attempts exceed a certain threshold, the system will automatically format the storage space of the U disk to prevent the confidential data stored on the U disk from being destroyed. Unauthorized reading or copying is suitable for occasions that require high confidentiality.

[0028] The implementation of the self-destruct function is based on the following three conditions:

[0029] 1) The smart card operating system 203 on the smart card and U disk composite device controls USB access;

[0030] 2) The self-destruction program 111 on the smart card operating system 203 completes the logical judgment that the number of times of unauthorized access exceeds the threshold, and realizes the destruction action;

[0031] 3) The hardware chip of the smart card and U disk composite device adopts an encryption coprocessor 50 and a Z32UF security contr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A integrated device of intelligent card and USB is prepared as setting autonomous operation system based on Java virtual machine on integrated device of intelligent card and USB, erecting self-destroying program on said autonomous system, enabling to finalize logic judgment that non-authorized call frequency is over threshold by self-destroying program and realizing self-destroying function when non-authorized call frequency is over set top-limit threshold.

Description

technical field [0001] The invention relates to the technical fields of information security, access control and USB storage, in particular to the technical fields of information security and self-destruction of smart card and U disk composite equipment. Background technique [0002] Ordinary U disk is a mobile storage access media device, and its obvious defect is that it is a completely open and transparent mobile storage media device, and there is no access control for data access, that is, as long as it has a USB interface can be used without hindrance. Therefore, there is a risk of unauthorized access to sensitive data stored on ordinary USB flash drives. [0003] At present, there are two main methods to solve the above problems: [0004] 1) Use password technology to encrypt the data on the ordinary U disk to prevent illegal viewing: [0005] ①Using software encryption, that is, encrypting the data stored in the ordinary U disk through the encryption software insta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06K19/07G06K19/073G06F21/77
Inventor 吴世忠石超英
Owner 中国信息安全产品测评认证中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products