Method and system for controlling access authority of information safety equipment

A technology of information security and access rights, applied in computer security devices, instruments, digital data authentication, etc., to achieve competitive and widely used effects

Active Publication Date: 2009-02-18
FEITIAN TECHNOLOGIES
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to make information security equipment not restricted by user authority under the Windows operating system and solve various problems such as how to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling access authority of information safety equipment
  • Method and system for controlling access authority of information safety equipment
  • Method and system for controlling access authority of information safety equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] see figure 1 , the embodiment of the present invention provides a method for controlling the access authority of information security equipment. The method provided by the embodiment of the present invention is applicable to the operating system platforms of Windows 2000 and above. To facilitate the description of the embodiment of the present invention, the information security equipment described Specifically, take the USB Key as an example. For details, see the following:

[0089] Step 101, USB Key establishes connection with computer;

[0090] Wherein, the connection relationship between the USB Key and the computer is established by inserting the USB Key into the computer through the USB interface.

[0091] Step 102, the computer sends a request to obtain the device type to the USB Key;

[0092] Step 103, the USB Key receives the request from the computer, and declares itself as an optical disc device type;

[0093] Wherein, in step 103 of this embodiment, the i...

Embodiment 2

[0142] see figure 2 , the embodiment of the present invention provides a method for controlling the access authority of an information security device. When the access authority is elevated, the embodiment of the present invention implements it by means of a security token. The method provided by the embodiment of the present invention is applicable to Windows 2000 / XP / 2003 operating system, still using the information security device as an example of a USB Key, the specific content is as follows:

[0143] Step 201, USB Key establishes connection with computer;

[0144] Step 202, the computer sends a request to obtain the device type to the USB Key;

[0145] Step 203, the USB Key receives the request from the computer, and declares itself as an optical disc device type;

[0146] In step 203 of this embodiment, the information security device USB Key declares itself as an optical disc device type by reporting the device descriptor to the computer as an optical disc device de...

Embodiment 3

[0193] see image 3 , the embodiment of the present invention provides a method for controlling the access authority of an information security device. When the access authority is increased in the embodiment of the present invention, it is realized by using a function to obtain the free access list of the "Properties" key of the optical disc device class. The method provided by the embodiment of the invention is applicable to the Windows 2000 / XP / 2003 operating system, and the information security device is still specifically described as a USB Key as an example. The specific content is as follows:

[0194] Step 301, USB Key establishes connection with computer;

[0195] Step 302, the computer sends a request to obtain the device type to the USB Key;

[0196] Step 303, the USB Key receives the request from the computer and declares itself as an optical disc device type;

[0197] In step 303 of this embodiment, the information security device declares itself as an optical dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of controlling access right of an information security device and a system, belonging to the field of controlling the access right of the device. The method comprises: starting an automatic operation program by an information security device; advancing the right of the automatic operation program, building Security items under Properties keys of CD devices in a register table of the computer; obtaining values of safe descriptors; setting values of the safe descriptors as values of Security items; modifying the access right of the CD devices in the computer according to the values of the Security items; transmitting operation instructions to the information security device by application programs in the computer, completing data communication of the computer and the information security device. The system comprises an information security device and a computer. According to the invention, the information security device is free of restrict of the user right in Windows operating system, and problems how the right of the information security device is modified are solved.

Description

technical field [0001] The invention relates to the field of controlling device access rights, in particular to a method and system for controlling information security device access rights. Background technique [0002] Since the widely used Windows operating system is an operating system that supports multi-users and multi-tasking, the security issue of users has become a very critical issue. Therefore, the Windows operating system needs to set permissions for users. The so-called permissions are Refers to a user's access rights to system resources. Permissions are set based on users and processes, and different users have different permissions to access the computer. Windows users are divided into many groups, the common user groups are as follows: [0003] Administrator: administrator group; System: has the same or even higher authority than Administrator; Power User: advanced user group, in the permission setting, the authority of this group is second only to Administ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/31
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products