Unlock instant, AI-driven research and patent intelligence for your innovation.

USB storage medium protector

A storage medium and protector technology, applied in the fields of instruments, preventing unauthorized use of memory, special data processing applications, etc., can solve problems such as easy implantation of "ferry" Trojans, data theft, inconvenience, etc., to prevent leaks Hidden dangers, safe and reliable confidentiality measures, and the effect of convenient use

Inactive Publication Date: 2011-07-27
中国人民解放军68002部队
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The mobile storage medium based on the computer’s USB interface (referred to as U disk), because it is extremely convenient to use, is often used to transfer data and temporarily store important files between Internet computers and confidential computers; but the computer is very easy to be implanted with a "ferry" Trojan horse , the moment the U disk is inserted into the Internet computer, the data on the U disk will be stolen; some "ferry" Trojan horses are very powerful, even if the files that have been deleted or the U disk that has been quickly formatted, the remaining data will be stolen. stolen; some "ferry" Trojans can even hide the files stolen from the intranet host on the U disk, so that users do not know that once the U disk is used on the Internet host, it will be transmitted through the Internet, almost every year Both reported major leaks due to U disk Internet access
For the sake of confidentiality and security, safety measures such as burning CDs are taken, but these measures only achieve safety, but not convenience, and still bring a lot of inconvenience to the work. , how to effectively block the leaking channel of the U disk when it is used on the Internet computer is an urgent problem to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB storage medium protector
  • USB storage medium protector
  • USB storage medium protector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and embodiments

[0018] refer to figure 1 , figure 2 , as shown in the embodiment in the figure, a USB storage medium protector includes a built-in embedded computer structure and two external high-speed USB interfaces, namely the upstream USB interface Slave and the downstream USB interface Host; the embedded computer The structure further includes a CPU, a power supply module, a program memory, a data memory, a data encryption module, and a high-speed USB controller; the main technology is: the upstream USB interface Slave is connected with the host, and the downstream USB interface Host is connected with the U disk. Driven by the embedded computer, the upstream USB interface Slave and the downstream USB interface Host are linked, and technical measures such as file content identification, "forbidden reading" or "encryption" and other techn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a USB storage medium protector comprising an internal embedded computer structure, two external high-speed USB interfaces, namely an uplink USB interface Slave and a downlink USB interface host. The embedded computer structure further comprises a CPU, a power supply module, a program memory, a data memory, a data encryption module, and a high speed USB controller. The main technique comprises that: the uplink USB interface Slave is connected with a host computer, and the downlink USB interface Host is connected with a U-disk; the ''read access forbidden'' protection or ''U-disk encryption'' protection to the U-disk file data are realized by technical measures such as linkage driving of the uplink USB interface Slave and the downlink USB interface Host of the embedded computer, the file content discrimination, ''read forbidden'' or ''encryption'' and the like; the embedded computer is utilized to intercept the U-disk operating commands received by the uplink USB Slave to judge whether the sector data needing to be read / written are file contents or not; if not, the sector data is shown to be a file system information, the normal reading / writing is carried out; and if so, the ''read forbidden'' or ''encryption / decryption'' protection is carried out.

Description

technical field [0001] The invention relates to the technical field of computer information security equipment, in particular to a USB storage medium protector with a "forbidden reading" or "encryption" protection function. Background technique [0002] With the rapid development of computer technology, the Internet has become an important guarantee for social development; it involves the country's government, military, culture, education, industry and many other fields. Many of the information stored, transmitted and processed are government macro-control decisions, commercial and economic information, energy resource data, scientific research data and other important information, and even involve state secrets; however, with the development of the Internet, loopholes in computers , viruses, hackers and frequent information and data security incidents, especially devices that can be connected to the network, no longer make people feel safe and secure, and the security of da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F12/14
Inventor 孙岳刘大虎李军金栋
Owner 中国人民解放军68002部队