Safe USB flash disk and data active protection method thereof
A USB flash drive and security technology, applied in the direction of preventing unauthorized use of memory, etc., can solve the problem that USB flash drives cannot prevent unauthorized users from copying files without authorization, Trojan horses stealing USB flash drive data at will, so as to reduce use risks, enhance security, and protect physical security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0064] Example one
[0065] A. The administrator establishes the account and password of the "Internet cafe" scenario user in the USB flash drive security control software, and sets its authority to "Prevent file copying"; the storage space of the security chip stores the authorization certificate of the "Internet cafe" scenario user;
[0066] B. The user connects the USB flash drive with the terminal in the Internet cafe, enters the account and password of the user in the "Internet cafe" scenario, and compares the authorization certificate with the USB flash drive, and the match is qualified;
[0067] C. Click "Create New Document" on the USB flash drive;
[0068] D. The communication protocol module of the COS system compares the permissions of the user account in the "Internet cafe" scenario in the USB security control software in the sandbox, and it is found that the creation of new documents is allowed;
[0069] E. The new document is created;
[0070] F. The computer Trojan attempt...
Example Embodiment
[0073] Embodiment two
[0074] A. The bidder establishes the account and password of the "bidding" scenario user in the USB security control software, and sets its authority to "Prevent file copy, save, delete, modify, and print; allow browsing", and its certificate is valid for 24 Hours; the storage space of the security chip stores the authorization certificate of the user in the "bidding" scenario;
[0075] B. Send the account and password of the USB flash drive and "bidding" scenario users to the tenderer;
[0076] C. The bidder connects the USB flash drive with the terminal, the security USB flash drive management software detects the environmental characteristics of the terminal where no viruses and Trojan horses are running, and activates the sandbox control module; the user account and password of the user in the "bid" scenario are received, and the USB flash drive is compared Authority certificate, matching qualified;
[0077] C. Click "Open Document" on the USB flash drive;...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap