Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment shielding method and device for data security prevention and control

A technology of data security and shielding devices, which is applied in computer security devices, electrical digital data processing, instruments, etc.

Inactive Publication Date: 2012-10-17
CHINA DIGITAL VIDEO BEIJING
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (2) Click processing is also required for untrusted devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment shielding method and device for data security prevention and control
  • Equipment shielding method and device for data security prevention and control
  • Equipment shielding method and device for data security prevention and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It should be noted that the described embodiments are only part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] The security prevention and control of mobile storage devices connected to the windows system generally involves three levels: driver layer, SSDT (System Service Dispatch Table, system service descriptor table) and API (Application Programming Interface, application programming interface). After being identified by the driver layer, the information can be directly forwarded to the API, and the API will display the devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment shielding method and an equipment shielding device for data security prevention and control. The method comprises the following steps of: receiving an access request for an accessible equipment interface; judging whether the accessible equipment interface is open or not; when the accessible equipment interface is open, recording the access request in a system service dispatch table (SSDT); judging whether access equipment corresponding to the access request has security access right or not; if the access equipment has the security access right, forwarding the access request in the SSDT to an application programming interface (API), and marking the upper-layer application operation of an operating system to be executable; and if the access equipment does not have the security access right, shielding the access request in the SSDT, and stopping reading the access equipment. The aim of data security prevention and control is really fulfilled.

Description

technical field [0001] The invention relates to the fields of mobile storage, data security, etc., and in particular to a device shielding method and device in data security prevention and control. Background technique [0002] Mobile storage devices are more and more widely used in various fields, and the types of mobile storage devices are also very rich. While bringing great convenience to work and life, it also brings great security risks. [0003] When a terminal needs to access a mobile storage device, it only needs to have the driver and related configuration of the mobile storage device. Some mobile devices do not even need a driver or such a driver has been integrated in the terminal operating system to read / write to the mobile storage device. write operation. This has just greatly increased the chance that removable storage device is infected by virus or trojan horse. [0004] In the prior art, major computer security service providers and mobile storage device s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/02
Inventor 芦怡鹏闫鹏
Owner CHINA DIGITAL VIDEO BEIJING