Safety U disk system for enterprises
A security and enterprise technology, applied in the field of data security, can solve the problem of inability to meet the requirements of the security level of the U disk, and achieve the effect of security improvement and extension of the use period
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be specifically described through embodiments below in conjunction with the accompanying drawings.
[0026] Such as figure 1 As shown, the present invention is a complete set of security system, which is composed of an authentication server, one or more management terminals, and one or more security U disks.
[0027] 1. Authentication server
[0028] The authentication server includes the authentication root key, and the authentication server must be inserted with the authentication root key before it can be used normally. The authentication root key is bound with the management key of each management terminal and the information of the secure USB disk, so as to prevent illegal authentication of the non-authorized secure USB disk after having this set of authentication service system. At the same time, the authentication server can assign permissions to the management users.
[0029] Second, the management terminal
[0030] The management ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 