Information safety equipment, control method and system

A technology of information security and control methods, applied in the fields of instruments, electrical digital data processing, etc., can solve the problems of inconvenient use of information security equipment, users cannot log in and use, and operations cannot continue, and achieve the effect of improving the convenience of use.

Active Publication Date: 2010-12-01
SHENZHEN EXCELSECU DATA TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Especially in the Vista system of Windows, the above-mentioned information security equipment is connected to the host through the automatic operation module to run the AUTORUN program, and the Vista system will prompt the user to log in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety equipment, control method and system
  • Information safety equipment, control method and system
  • Information safety equipment, control method and system

Examples

Experimental program
Comparison scheme
Effect test

Example

[0034] Reference figure 1 , The first embodiment of the present invention proposes a method for controlling information security equipment, including the steps:

[0035] S10. After the information security device is connected to the host and powered on, it receives the status query of the host and returns multiple status unsatisfactory instructions;

[0036] S11. Receive the interrupt signal sent by the host, and give the command to the host to stop the return status satisfying, so as to interrupt running the AUTORUN program; or, the return status satisfying command to the host to run the AUTORUN program.

[0037] The above-mentioned information security equipment may include: a USB (Universal Serial Bus) interface module, a SCSI (Small Computer System Interface, special interface for small computer system) protocol module, an automatic operation module, an information security module, and the like. The information security device can communicate with the host through a USB interface...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses information safety equipment, a control method and a system, belonging to the field of information safety. The control method of the information safety equipment comprises the following steps: receiving a state inquiry of a host and returning a state discontent instruction repeatedly after the information safety equipment and the host are connected and electrified; receiving an interrupt signal transmitted by the host and interrupting to return a state content instruction to the host so as to interrupt to operate an AURORUN program; or returning the state content instruction to the host to operate the AUTORUN program. The information safety equipment and the control system can interrupt to operate the AUTORUN program so as to enable the information safety equipment to be used under a Windows operation system of the host free of limitation of user permission by that the host transmits the interrupt signal to the information safety equipment.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an information security device, control method and system. Background technique [0002] The information security equipment in the prior art can be simulated as an optical disc drive of the host computer after being connected with the host computer, and the AUTORUN program is automatically started and run by the automatic operation module, and the program is installed in the host computer. The program may be a driver program or an application program and the like. [0003] When the above-mentioned information security device is connected to the host, the information security device runs the AUTORUN program through the automatic operation module, and at the same time, through the detection function, detects whether the program that needs to be installed has been installed in the host; if not, install the corresponding program; if so, The information security device can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F13/10
Inventor 陈柳章
Owner SHENZHEN EXCELSECU DATA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products