Safe USB flash disk and data active protection method thereof

A USB flash drive and security technology, applied in the direction of preventing unauthorized use of memory, etc., can solve the problem that USB flash drives cannot prevent unauthorized users from copying files without authorization, Trojan horses stealing USB flash drive data at will, so as to reduce use risks, enhance security, and protect physical security. Effect

Active Publication Date: 2012-11-28
CHANGSHA WENDUN INFORMATION TECH
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a safe USB flash drive and its data active protection method to solve the technical proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe USB flash disk and data active protection method thereof
  • Safe USB flash disk and data active protection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0064] Example one

[0065] A. The administrator establishes the account and password of the "Internet cafe" scenario user in the USB flash drive security control software, and sets its authority to "Prevent file copying"; the storage space of the security chip stores the authorization certificate of the "Internet cafe" scenario user;

[0066] B. The user connects the USB flash drive with the terminal in the Internet cafe, enters the account and password of the user in the "Internet cafe" scenario, and compares the authorization certificate with the USB flash drive, and the match is qualified;

[0067] C. Click "Create New Document" on the USB flash drive;

[0068] D. The communication protocol module of the COS system compares the permissions of the user account in the "Internet cafe" scenario in the USB security control software in the sandbox, and it is found that the creation of new documents is allowed;

[0069] E. The new document is created;

[0070] F. The computer Trojan attempt...

Example Embodiment

[0073] Embodiment two

[0074] A. The bidder establishes the account and password of the "bidding" scenario user in the USB security control software, and sets its authority to "Prevent file copy, save, delete, modify, and print; allow browsing", and its certificate is valid for 24 Hours; the storage space of the security chip stores the authorization certificate of the user in the "bidding" scenario;

[0075] B. Send the account and password of the USB flash drive and "bidding" scenario users to the tenderer;

[0076] C. The bidder connects the USB flash drive with the terminal, the security USB flash drive management software detects the environmental characteristics of the terminal where no viruses and Trojan horses are running, and activates the sandbox control module; the user account and password of the user in the "bid" scenario are received, and the USB flash drive is compared Authority certificate, matching qualified;

[0077] C. Click "Open Document" on the USB flash drive;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe USB flash disk and a data active protection method thereof. The safe USB flash disk comprises a safe main control chip, a chip operating system (COS) in a chip, a Flash memory and USB flash disk safe management software built in the Flash memory, wherein the COS system is used for storing and managing an authority certificate corresponding to a user; and the USB flash disk safe management software is used for monitoring and filtering various operations carried out on the USB flash disk by the user and a program, checking use environment and access authority of the USB flash disk equipment in cooperation with the COS system, controlling a unauthorized use behaviour of a USB flash disk data document which is deciphered to the memory and recording various key sensitive operations by adopting a memory sandbox technology. Since the USB flash disk adopts a hardware-software integrated protection technology, the safe access control of the USB flash disk is realized and users having different authorities have different USB flash disk data views and fine-grit operation authorities so that users can be prevented from privately copying documents and contents in the USB flash disk and the USB flash disk data is prevented from be destroyed and stole due to viruses and Trojans.

Description

technical field [0001] The invention relates to the field of mobile information storage, in particular to a safe flash drive and a data active protection method thereof. Background technique [0002] Because of its flexible and convenient use, USB flash drives have become an important mobile storage medium for information storage and transmission, and are also widely used in enterprises, institutions, governments and the military. However, the vulnerability of the USB flash drive in information security protection makes the stored important data related to personal privacy information, corporate business confidential information or government military confidential information face serious security threats. [0003] According to statistics, 30%-40% of the losses caused by various security breaches in recent years are caused by the leakage of electronic documents; more than 60% of the data theft cases are related to the loss or theft of mobile devices that store files. Accord...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 任江春
Owner CHANGSHA WENDUN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products