Unlock instant, AI-driven research and patent intelligence for your innovation.

Input peripheral equipment locking method and locking device

A locking device and storage device technology, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems of small application area, inability to limit and operate USB devices, and inability to manage permissions for computer-controlled peripherals, etc. To achieve the effect of convenient operation and good confidentiality

Inactive Publication Date: 2012-11-07
GUANGZHOU SHIRUI ELECTRONICS
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It can be seen that the two solutions in the prior art are less applicable, and the software solution can only limit the reading and writing of the USB to the mobile storage device
and requires two USB keys to complete
Unable to restrict and operate custom USB devices and some special USB
Its purpose is to ensure that the data will not be leaked, and it is impossible to realize the rights management of the computer's controllable peripherals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Input peripheral equipment locking method and locking device
  • Input peripheral equipment locking method and locking device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The invention provides a low-cost, flexible device capable of managing various peripherals of PC equipment (including input peripherals such as touch boxes, mice, and keyboards), and prohibiting them from operating and inputting computers. The USB key device is installed, and by reading the USB key and verifying it locally or through the network, the restrictions on the USB peripherals can be released.

[0015] figure 1 The flow chart of the method for locking the input peripherals of the present invention is shown in the figure: the present invention can automatically poll and scan and identify the current input peripherals after the target device is turned on (S100); monitor whether the USB interface on the target device is plugged in USB key device (S101), if not inserted, lock the input peripheral of the target device (S102), if inserted, obtain a USB key from the USB key device (S103), and determine the Whether the USB key matches the pre-stored management policy ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an input peripheral equipment locking device and a locking method. According to the method, one or a plurality of USB (universal serial bus) keys is / are stored through a USB key device; whether the USB key device is plugged into a USB interface or not is monitored through a locking and unlocking device, in addition, the polling scanning is carried out, the current input peripheral equipment is identified, if the USB key device is not plugged, the current input peripheral equipment is locked, is the USB key device is plugged, the USB key is obtained, whether the USB key and the pre-stored management strategy are matched or not is judged, and if so, the input peripheral equipment is subjected to decryption. The device and the method provided by the invention realize the goal that only some specific people with the key are allowed to operate the machine under the specific occasions. The method and the device have the advantages that the operation is convenient, all of the peripheral equipment can be used only after the USB key is plugged, and all of the peripheral equipment is forbidden to be used after the USB key is unplugged.

Description

【Technical field】 [0001] The invention relates to the authority control technology of computer equipment, in particular to a locking method and locking device for input peripherals. 【Background technique】 [0002] When using computer equipment, it is often encountered in certain specific usage environments that only certain people are expected to operate the machine. One of the existing solutions is based on hardware occlusion, such as adding a lock, or directly occluding it and not allowing it to be used. Existing software solutions are mainly similar to a USB interface lock based on a dual-USB key device, mainly to lock the access of the USB to the mobile storage device. [0003] It can be seen that the two solutions in the prior art are less applicable, and the software solution can only limit the reading and writing of the USB to the removable storage device. And requires two USB keys to complete. Unable to restrict and operate custom USB devices and some special USBs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/04
Inventor 赵海钦
Owner GUANGZHOU SHIRUI ELECTRONICS