Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment access method and user equipment and device in data security protection and control

A technology for data security and equipment access, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as inability to access equipment

Inactive Publication Date: 2012-10-17
CHINA DIGITAL VIDEO BEIJING
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, major computer security service providers and mobile storage device suppliers have taken some measures to prevent and control mobile storage devices and their data files. The prevention and control of mobile storage devices generally adopts the underlying BIOS ( Basic Input Output System (Basic Input Output System) directly shields the device so that unnecessary devices cannot be connected to the local terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment access method and user equipment and device in data security protection and control
  • Equipment access method and user equipment and device in data security protection and control
  • Equipment access method and user equipment and device in data security protection and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It should be noted that the described embodiments are only part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] Embodiment 1 of the present invention provides a device access method in data security prevention and control, the specific implementation method is as follows figure 1 shown, including:

[0032] Step S101, detecting whether the communication with the server is normal.

[0033] Step S102, when it is detected that the communication is normal, if the interface of the accessible device is open, record the access request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment access method, user equipment and a user system in data security protection and control. The method comprises the following steps of: detecting whether the communication between the user equipment and a server is normal or not; recording an access request obtained through an access equipment interface in a bottom driver when the communication is detected to be normal and the access equipment interface is open; judging whether access equipment corresponding to the access request has safety access right or not; if yes, transmitting the access request in the bottom driver to upper application of an operating system and marking upper application operation of the operating system to be executable; if not, quitting the access request in the bottom driver; and uploading the recorded operation process to the server. The purpose of the data equipment security protection and control is truly realized.

Description

technical field [0001] The present invention relates to the fields of mobile storage, data security, etc., and in particular to a device access method, user equipment and device in data security prevention and control. Background technique [0002] Mobile storage devices are more and more widely used in various fields, and the types of mobile storage devices are also very rich. While bringing great convenience to work and life, it also brings great security risks. [0003] When a terminal needs to access a mobile storage device, it only needs to have the driver and related configuration of the mobile storage device. Some mobile devices do not even need a driver or such a driver has been integrated in the terminal operating system to read / write to the mobile storage device. write operation. This has just greatly increased the chance that removable storage device is infected by virus or trojan horse. [0004] In the prior art, major computer security service providers and mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 芦怡鹏闫鹏
Owner CHINA DIGITAL VIDEO BEIJING