Security isolation and monitoring management method of USB mobile storage media

A mobile storage medium, monitoring and management technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problem of unable to solve the problem of safe collection of external data

Active Publication Date: 2013-01-02
INSPUR SOFTWARE TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This system plays a role of security protection to a certain extent, but it makes the intranet system an "information island" and cannot solve the problem of safe collection of external data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security isolation and monitoring management method of USB mobile storage media
  • Security isolation and monitoring management method of USB mobile storage media
  • Security isolation and monitoring management method of USB mobile storage media

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The method of the present invention is described in detail below with reference to the accompanying drawings.

[0023] The method of the present invention, system network topological structure is referring to accompanying drawing 1, deploys a monitoring and management system server in the internal network, as the management center and the database center of the system of the present invention, the administrator can log in this system server by browser, to equipment Configure and manage with personnel, the server provides web service interfaces to the client program, and the client program communicates and exchanges data with the server by calling these interfaces. The client program is also connected with the monitoring and management system through the internal private network.

[0024] The workflow of the system can be found in the appendix figure 2 And attached image 3 , first, the client program requests the server to obtain information such as the file security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system of USB mobile storage medium security isolation and monitoring management. In the system, U disk isolator equipment is used for physically isolating the U disks of the users from hosts. Several file security policies are set and allocated for each equipment by a network management system. The files are only allowed to enter into the system or be copied onto the U disks as long as the files are in consistent with the security policies. Audit data are generated for each file access to the system so as to be convenient for tracing the information flow direction. Through the mode of software and hardware combination, the invention thoroughly solves the problem of security when the internal network system with information security and confidentiality requirements receives and acquires the mobile storage media data of the external network. Information security places emphasis on prevention and control, and the invention adopts the file security policy management mode, just embodying the emphasis, thus being a quite effective monitoring management means for the condition that the internal network system uses the USB mobile storage media.

Description

technical field [0001] The invention relates to the technical field of security isolation and information exchange of a USB mobile storage medium, in particular to a security isolation and monitoring management system for transferring files using a USB mobile storage medium in an internal network environment with information security and confidentiality requirements. Background technique [0002] With the continuous advancement of science and technology and the rapid expansion of the Internet network, information security and confidentiality have become a concern in the current society. As a portable, easy-to-use, high-quality and low-cost mobile storage medium, U disk has been integrated into everyone's In work, study and life, it has become the most popular digital technology product in the market. Because of the convenience and mobility of the U disk, it has become one of the main tools for information leakage, and it is also the most and widest way to spread computer vir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74G06F21/78
Inventor 刘庆华刘来波牛玉山王培元
Owner INSPUR SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products