USB status restriction equipment and method of use thereof

A device and state technology, applied in the field of information security, can solve problems such as leakage and loss, virus infection, flooding of sensitive information, etc., to enhance security and reduce abuse.

Active Publication Date: 2008-07-02
FEITIAN TECHNOLOGIES
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem in the prior art that due to the unlimited use of USB devices such as U disks, which may cause virus infection, flooding, and leakage and loss of sensitive information, the present invention provides a USB state limiting device and its use method. The specific scheme as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB status restriction equipment and method of use thereof
  • USB status restriction equipment and method of use thereof
  • USB status restriction equipment and method of use thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0036] In the technical solution provided by the embodiment of the present invention, the USB state limiting device adopts the S3C4510B chip developed by Samsung for ARM7. The S3C4510B chip is a chip commonly used in the industry at present and has a USB-Host function. Thus, the USB state-limited device has a USB port, a signal line, a pull-up resistor and a pull-down resistor.

[0037] Two of the signal lines (D+ and D-) of the USB state limit device, and each signal line has a pull-down resistor of 15kΩ. USB devices such as U disks are on D+ (full-speed devices) or D- (low-speed devices). There is a 1.5kΩ pull-up resistor. When a USB device such as a U disk is inserted into a port of the USB state limiting device, the upper resistan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a USB state limiting device for reducing abuse of USB device and reinforcing the safety of internal sensitive information of host computer, which comprises a communication module, a control module, a connecting module, a USB port module and an authority module. The communication module is used for realizing communication. The control module is used for controlling the work of internal individual modules in the USB state limiting device, coordinate and control communication work with outside, and monitor whether USB device is inserted into the USB port. The connecting module is used for establishing the connection between the host computer connected with the USB state limiting device and the USB device which is inserted into the USB port. The USB port module is used for connecting with the USB device which is inserted into the USB port to complete information interaction. The authority module is connected with the control module, and at the same time has the functions of approval and authority. The invention further provides a using method of the USB state limiting device.

Description

technical field [0001] The invention relates to the field of information security, in particular to a USB state limiting device and a using method thereof. Background technique [0002] In today's increasingly developed information technology, more and more data information, personal privacy and business secrets are stored or backed up in the host, and these sensitive information stored or backed up in the host are vulnerable to viruses or human attacks, resulting in the loss of sensitive information , missing or illegal tampering, not only bring huge economic losses to people, but also make it impossible to continue normal work. Therefore, the security and confidentiality of sensitive information such as data, privacy or business secrets are increasingly valued by people. [0003] In the prior art, the USB device represented by the U disk has been widely used in daily life and work due to its flexible use, convenience and portability, which greatly facilitates the exchange...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G11C7/24
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products