Unlock instant, AI-driven research and patent intelligence for your innovation.

Key based server data reading method

A data reading and server technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve problems such as file leakage

Inactive Publication Date: 2012-08-01
上海华御信息技术有限公司
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a key-based server data reading method. In the case of networking, the USB key is connected to any networked computer to read important data in the server. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key based server data reading method
  • Key based server data reading method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.

[0015] Such as figure 1 As shown, a key-based server data reading method, wherein the method steps include:

[0016] Connect to any networked computer through a USB key. If the USB key is authenticated, the system will add a virtual disk. This disk is mapped to the server file directory. Users can read server data in the virtual disk and write to the disk. It will be encrypted, and the data read from the disk will be decrypted; if there is no certified USB key, the mapping of the disk will disappear, and the server data will not be accessible.

[0017] The server needs to specify the location of the protected directory on the disk,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key based server data reading method. The method includes: any networked computer is accessed through an USB (universal serial bus) key, if USB key passes through authentication, a virtual disk can be added into a system and mapped into a server file directory, a user can read server data in the virtual disk, content written into the disk can be encrypted, and data read out from the disk can be decrypted; and if no authenticated USB key exists, mapping of the disk disappears, and the server data are inaccessible. The networked computer is accessed to read critical data in the server through the USB key under the condition of networking, the computer is dialed to a virtual private network for server authentication by the aid of the USB key, secret keys are downloaded, and the server data are mapped to a local computer for operation, so that the problem that the user on business needs to look up company files but concerns about file leakage is solved.

Description

technical field [0001] The invention belongs to the technical field of computer information security, in particular to a key-based server data reading method. Background technique [0002] With the development of the times, the concept of instant information has penetrated more and more into people's daily work and life. Generally, people will store some important or to-do information on USB flash drives or other mobile media for easy portability and use at any time. For people who go out to work, due to the hidden dangers of information security when they are on a business trip, there is a risk of information leakage. The absolute confidentiality of information cannot be guaranteed. Once the file information is leaked, the loss to the enterprise is also incalculable. . Contents of the invention [0003] The present invention provides a key-based server data reading method. In the case of networking, the USB key is connected to any networked computer to read important dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00H04L29/06G06F21/62
Inventor 曾曙卜亚楠
Owner 上海华御信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More