System and method for realizing multifunctional information security device

An information security and multi-function technology, applied in the system field of realizing multi-function information security equipment, can solve the problems of increased cost, reduced reliability, and the inability of two devices to appear at the same time.

Active Publication Date: 2011-05-18
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] 1).In HID type information security equipment / CCID type information security equipment, add part of the circuit of the U disk to realize the function of the optical disc, and the part of the circuit of the hub (HUB), but because of this method, part of the circuit of the hub and the U disk are added. For some circuits, the cost increases and the reliability decreases;
[0022] 2). Make the information security equipment realize the mutual conversion process of SCSI and HID / CCID. However, with this technical solution, only SCSI equipment or HID / CCID equipment can work at the same time, and the two equipments cannot appear in the system at the same time. It needs to be manually switched by the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing multifunctional information security device
  • System and method for realizing multifunctional information security device
  • System and method for realizing multifunctional information security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Such as figure 1 As shown, this embodiment provides a system for realizing multifunctional information security equipment, including a host module 1 and a USB Key 2, and the USB Key 2 includes a USB interface module 21, a protocol processing module 22, an intelligent key module 23, an automatic operation Module 24, protocol processing module 22 includes device description unit 221 and configuration description unit 222, configuration description unit 222 includes HID / CCID device interface descriptor and SCSI device interface descriptor, HID / CCID device interface descriptor and smart key module 23 Connected, the SCSI device interface descriptor is connected with the automatic operation module 24.

[0073] In USB Key 2,

[0074] The USB interface module 21 is used to establish a connection between the USB Key 2 and the host module 1 through the USB interface, and analyze and process the USB communication protocol;

[0075] The USB interface module 21 is a USB interface ...

Embodiment 2

[0094] Such as figure 2 As shown, this embodiment provides a method for implementing a multifunctional information security device, which specifically includes the following steps:

[0095] Step 201: establish a connection between the USB Key and the host;

[0096] Step 202: USB Key declares itself as HID device type and SCSI device type;

[0097] In this embodiment, the USB Key declares itself to be an HID device type and a SCSI device type by reporting the device descriptors to the host as HID device descriptors and SCSI device descriptors.

[0098] Step 203: automatically start the Autorun program;

[0099] The Autorun program is pre-written by the USB Key manufacturer and stored in the USB Key.

[0100] Step 204: Autorun program detects whether the application program related to USB Key has been installed in the host computer, if the application program related to USB Key has been installed in the host computer, then perform step 206, if the application program related...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and a method for realizing a multifunctional information security device, and belongs to the field of information security. The method provided by the invention can beused in Windows 98 PE, Windows 2000, Windows XP, Windows 2003, Windows Vista and above operation systems, does not need to install a driver, does not need a user to manually install software, does not need an optical disk or an installation packet, and simultaneously can be used in super-user and non-super-user accounts; the method avoids the problem of administrator authority brought by an SCSIprotocol access information security device; and the information security device in the prior art cannot be limited by user authority under a Windows operation system, and does not need the user to carry out manual switch, namely the information security device has the automatic installation function of a USB-SCSI device type and the function of an HID device / CCID device type during use at the same time. The system comprises a host module and the information security device.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system and method for realizing multifunctional information security equipment. Background technique [0002] Because the Windows operating system is an operating system that supports multiple users and multi-tasks, security issues have become a very critical issue, so the Windows operating system needs to set permissions for users. Permissions refer to a user's access rights to system resources. Permissions are set based on users and processes, and different users have different permissions to access the computer. Windows users are divided into many groups, the common user groups are as follows: [0003] Administrator: Administrator group, by default, users in Administrator have first-class full access to the computer / domain. [0004] System: It has the same or even higher authority than Administrator, and has the authority required for the normal operation of the system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/62
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products