Method for preventing Trojans ferrying via movable memories to steal files

A mobile memory and Trojan horse technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc.

Inactive Publication Date: 2010-04-14
CHINA NAT SOFTWARE & SERVICE
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of technology cannot fundamentally solve the problem of Trojans stealing user confidential files. Once the user needs to write data to the USB flash drive and sets its switch to the open state, the Trojan horse program also obtains the write permission at the same time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing Trojans ferrying via movable memories to steal files
  • Method for preventing Trojans ferrying via movable memories to steal files
  • Method for preventing Trojans ferrying via movable memories to steal files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Hereinafter, the present invention will be described in detail through specific embodiments in conjunction with the accompanying drawings.

[0026] Now take the U disk used by a certain unit as an example. First, install a TRSM server and console in the internal network, and install TRSM clients on each host in the LAN to form a work security domain. The system structure diagram of the security domain is as follows: figure 1 As shown, the functions of each component in the figure are as follows:

[0027] The TRSM client (Client) is an agent program installed on the controlled host. The agent program intercepts all API write requests to the U disk, is responsible for the whole process of dynamic verification and generates system logs, that is to say, the agent program simultaneously Undertake the functions of monitoring module, verification process and log module.

[0028] ·TRSM server (Server) is the place where data (user accounts, logs, policies) are stored centrally...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing Trojans ferrying via movable memories to steal files and belongs to the technical field of information security and computer software. The method includes that a monitoring module is arranged, a verification process is started when the module acquires a query of transmitting data to the movable memories, users submit verification information, and then the verification process judges whether the verification information is correct or not, if the verification information is corrected, then the query is received, and if the verification information is uncorrected, then the query is rejected. The verification process can judge correction of the verification information via methods as follows: generating a dynamic verification code by adopting a randomized algorithm after starting the verification process, displaying the verification code to users, and then judging whether the verification information is identical to the verification code by the verification process after the users submit the verification information. By aid of the method, safe data ferrying of the movable memories between the internal network and the external network can be realized.

Description

technical field [0001] The invention relates to a mobile memory, in particular to a method for preventing Trojan horses from stealing files on the internal network through the mobile memory, and belongs to the technical fields of information security and computer software. Background technique [0002] Data ferry refers to bringing data from the isolated internal network to the external network, or bringing data from the external network into the internal network. The former is called "outward ferry" (or simply "outward ferry"), and the latter is called "inward ferry" (or simply "inward ferry"). When the internal and external networks are isolated from each other, U disk (or other mobile storage, such as mobile hard disk) copying becomes one of the main tools for data ferrying. However, although the U disk ferry has the characteristics of simplicity and convenience, it also brings many safety hazards to the ferry. [0003] In recent years, viruses (Trojan horses) have incr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/55G06F21/62
Inventor 陈尚义周博周显敬
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products