Mobile memory divulgence protection method and system

A mobile storage and key technology, applied in the field of data leakage prevention, can solve problems such as increasing the risk of information leakage, and achieve the effect of convenient management and data protection

Inactive Publication Date: 2007-11-28
CHINA NAT SOFTWARE & SERVICE
View PDF1 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This increases the risk of information leakage via mobile storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile memory divulgence protection method and system
  • Mobile memory divulgence protection method and system
  • Mobile memory divulgence protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, the present invention will be described in detail through specific embodiments in conjunction with the accompanying drawings. In the description of this embodiment, the system for protecting against confidentiality of the mobile storage will be simultaneously reflected in the description of the method for preventing leakage of the mobile storage.

[0025] Taking the USB flash drive used by a certain unit as an example, first install a server and authorization center, and each host in the LAN installs a client to form a work security domain. The node organization structure diagram of this security domain is shown in Figure 1. Each node in has a global ID, group ID, user ID, and host ID.

[0026] The mobile memory that prevents data from being leaked does not need to use a special disk encrypted at the hardware level, and only needs an ordinary mobile memory. As shown in Figure 2, after the ordinary U disk is registered in the warehouse, it will be authorize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of shifting memory leaking secret protection and system to realize the method, which is characterized by the following: utilizing virtual disk technique; adopting disk grade bridging method; proceeding encryption for the data in the common memory through the virtual disk with special pattern; storing the data on the shifting memory with cryptogram style; loading the virtual disk before reading or writing data; proceeding order checkout and user identification proved; non-loading without right order or special form; assuring the safety of the data in the shifting memory; setting the system as three module of server, warranting center and custom terminal. This invention can be used to various memories such as flash memory, shifting hard disk, soft disk and so on.

Description

technical field [0001] The invention relates to a method for preventing data leakage, in particular to a method and system for preventing data leakage through a mobile memory through encryption, and belongs to the technical fields of information security and computer software. Background technique [0002] Encrypting information stored on computers has always been one of the most talked about computer technologies. In the known prior art, there are many methods for encrypting computer hard disks, but they are generally implemented through hardware-level encryption. For example, the invention patent "computer hard disk data encryption method and its device" (CN200410025825) is equipped with a hard disk data encryption device on an ordinary computer to encrypt the data transmitted between the computer hard disk and the host computer, thereby achieving hard disk data encryption. The purpose of hard encryption. [0003] At present, the most widely used information storage medi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/31G06F21/78
Inventor 关勇王勇彭海林
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products