Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reliable U disc, method for realizing reliable U disc safety and its data communication with computer

A data communication and security technology, applied in computer components, computer security devices, computing, etc.

Inactive Publication Date: 2007-10-10
中国信息安全产品测评认证中心 +1
View PDF0 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] The purpose of the present invention is to: provide a trusted U disk that meets the requirements of trusted organizations and has high security performance, to solve the above-mentioned security problems that exist in the use of existing trusted U disks, and provide a reliable connection between trusted U disks and computers. communication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reliable U disc, method for realizing reliable U disc safety and its data communication with computer
  • Reliable U disc, method for realizing reliable U disc safety and its data communication with computer
  • Reliable U disc, method for realizing reliable U disc safety and its data communication with computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0136] The Trusted Computing Organization proposes the necessary attributes, functions and characteristics of trusted devices:

[0137] 1. The Trusted Computing Group (TCG, Trusted Computing Group) defines "trusted" as: trustworthiness is an expectation under which a device operates in a specific way according to a specific purpose.

[0138] According to the Trusted Computing Organization's Trusted Computing Platform Standard Implementation Specification, trusted computing should include the following three attributes and functions:

[0139] ①. Ensure the uniqueness of the user's identity, the integrity and privacy of the user's work space.

[0140] ②. Ensure the integrity of hardware environment configuration, OS kernel, services and applications.

[0141] ③. Ensure the confidentiality / integrity of information stored, processed, and transmitted.

[0142] 2. The Trusted Computing Organization has formulated a series of complete specifications for different terminal types and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A credible U disc is featured as properly solving safety problem of credible U Disc and data communication problem between computer and U disc by utilizing self-destroyed program, certificate certifying program, Applet certification program and SCSI command operated on operation system of intelligent card to carry command of intelligent card.

Description

technical field [0001] The invention relates to the field of trustworthy, USB storage technology and information security technology, in particular to the field of trusted U disk technology. Background technique [0002] At present, the USB interface has become the standard configuration port of the computer, and the USB mobile storage device, especially the trusted U disk, has been increasingly used in daily work due to its fast storage speed, large capacity, convenient use, and small size. Wide range of applications. [0003] Ordinary U disk is a transparent mobile storage media device, there is no access control for data access, as long as the access party with USB interface can use it without hindrance. Therefore, when U disk brings convenience to people, it also brings two important problems: information leakage and implantation of malicious software. [0004] There are two reasons for U disk to cause information leakage: [0005] ① Due to the leakage of confidential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F21/00G06F13/38G06F13/42G06K19/07G06K19/073G06F21/60
Inventor 吴世忠石超英
Owner 中国信息安全产品测评认证中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products