Data security protection method of safe mobile storage equipment

A mobile storage device, data security technology, applied in the direction of preventing unauthorized use of memory, etc., can solve the leakage of confidential data, can not solve the problem of illegal copying of confidential data virus and Trojan program spread, corporate and personal losses and other problems

Inactive Publication Date: 2010-09-29
WUHAN TIANYU INFORMATION IND
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] If an enterprise or individual stores confidential files or personal privacy and other confidential data on a mobile storage device, once the mobile storage device is lost or the mobile storage device is used on a host infected with a Trojan virus, it may cause accidental leakage of confidential data
[0006] 2. Illegal copying of confidential data
[0008] 3. The spread of viruses and Trojans caused by cross-use of mobile storage devices
[0010] In recent years, many of the above-mentioned incidents have occurred, causing huge losses to enterprises and individuals
In order to solve the hidden dangers brought by mobile storage devices, many types of secure mobile storage devices have appeared on the market, but these secure mobile s...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The specific implementation manners of the present invention are described in detail below.

[0034] The first embodiment of the present invention is: in order to ensure data security and confidentiality, the enterprise installs relevant access control drivers on each host of the intranet, and then performs the same configuration, and the enterprise intranet becomes a specific security environment. At the same time, in order to facilitate data sharing within the enterprise, the enterprise provides employees with corresponding secure mobile storage devices. On the host computer of the enterprise intranet, only the secure mobile storage device provided by the enterprise can be used, ordinary mobile storage devices or other types of secure mobile storage devices cannot be used, and data is stored on the secure mobile storage device in an encrypted manner. When the secure mobile storage device is used in the enterprise intranet, only one data view of the secure environment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the data security field of mobile storage equipment, in particular to a data security protection method of safe mobile storage equipment, which is used for solving the problems of data security of the mobile storage equipment when the mobile storage equipment is crosswise used among different host computer environments. The safe mobile storage equipment adopts a single-equipment and multi-data view design so that the same safe mobile storage equipment provide a single or a plurality of different data views according to the different applied external host computer environments (different safe environments or different unsafe environments). The different data views correspond to different physical storage zones or logical storage zones isolated from each other. The safe mobile storage equipment invention has the benefits advantages that the safe mobile storage equipment adopts the single-equipment and multi-data view design, realizes the data ferry of the storage zones in the unsafe environments through a special safe browser in a safe environment and automatic identification design on external host computer systems in the unsafe environments and adopts an encryption mode to store data in safety mobile storage equipment.

Description

technical field [0001] The invention belongs to the field of mobile storage device data security, and in particular relates to a data security protection method of a secure mobile storage device for solving the data security problem when the mobile storage device is used in cross-use between different host environments. Background technique [0002] With the continuous advancement of mobile storage technology, mobile storage devices (such as mobile hard disks, U disks, etc.) It is convenient to share and exchange data between them. [0003] However, the use of mobile storage devices has also brought many hidden dangers to people's work and life: [0004] 1. Accidental disclosure of confidential data [0005] If an enterprise or individual stores confidential documents or personal privacy and other confidential data on a mobile storage device, once the mobile storage device is lost or the mobile storage device is used on a host infected with a Trojan virus, it may cause acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 马志军
Owner WUHAN TIANYU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products