Data security protection method of safe mobile storage equipment
A mobile storage device, data security technology, applied in the direction of preventing unauthorized use of memory, etc., can solve the leakage of confidential data, can not solve the problem of illegal copying of confidential data virus and Trojan program spread, corporate and personal losses and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0033] The specific implementation manners of the present invention are described in detail below.
[0034] The first embodiment of the present invention is: in order to ensure data security and confidentiality, the enterprise installs relevant access control drivers on each host of the intranet, and then performs the same configuration, and the enterprise intranet becomes a specific security environment. At the same time, in order to facilitate data sharing within the enterprise, the enterprise provides employees with corresponding secure mobile storage devices. On the host computer of the enterprise intranet, only the secure mobile storage device provided by the enterprise can be used, ordinary mobile storage devices or other types of secure mobile storage devices cannot be used, and data is stored on the secure mobile storage device in an encrypted manner. When the secure mobile storage device is used in the enterprise intranet, only one data view of the secure environment ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com