Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for defending against mobile storage medium virus in island-like Ethernet

A mobile storage medium, Ethernet technology, applied in the field of virus defense of the internal mobile storage medium of the Ethernet, can solve problems such as complicated process, over-reliance on internal mobile storage devices, and difficulty in writing Trojan horses directly into internal mobile storage devices, so as to avoid The possible effects of a leak

Active Publication Date: 2013-03-27
ZHUHAI BAOQU TECH CO LTD +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] iii. Different encryption methods are used in the internal mobile storage device, making it difficult for potential Trojan horses to write directly into the internal mobile storage device;
[0014] In this method, the security depends on the encryption algorithm and implementation of the internal mobile device not being known to the hacker, otherwise the hacker can still imitate the method of reading and writing the internal mobile device on the intranet, so that the Trojan horse can read and write the internal mobile device; and rely too much on the internal mobile device. The process of using the mobile storage device is relatively complicated; there is also the risk of losing the internal mobile storage device; in addition, the internal mobile storage device requires a special secure USB flash drive, and the purchase cost is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for defending against mobile storage medium virus in island-like Ethernet
  • System and method for defending against mobile storage medium virus in island-like Ethernet
  • System and method for defending against mobile storage medium virus in island-like Ethernet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 As shown, the present invention provides a method for defending against removable storage medium viruses in an island-type Ethernet, and the Ethernet includes a client and a server. When a user inserts a removable storage medium, the client monitors each process's read and write operations to the removable storage medium , prevent other processes from reading data (step 1) except the monitoring process, and send a prompt message to prompt the user to upload the file in the removable storage medium to the server, and when the user refuses to upload the file, prevent the file from being accessed ( Step 2); the server records the user information of the uploaded file, and conducts security authentication on the received file (step 3); sends the successfully authenticated file to the user according to the user information (step 4).

[0033] In the process of file downloading in step 4, the server may notify the user to download the file, and download the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system and a method for defending against mobile storage medium virus in island-like Ethernet which comprises a client side and a server. When a user inserts a mobile storage media, the client side monitors read-write operations on the mobile storage media of each process, prevents other processes outside the monitoring processes from reading data, sends prompt messages to prompt users to upload files in the mobile storage media to the server, and prevents the files from being accessed when users refuse to upload the files. The server records information of users uploading files and determines safety of the received files. Files being successfully indentified are sent back to users. The system and the method are capable of improving the effectiveness and practicality of defending mobile storage medium virus with no cost increased.

Description

technical field [0001] The invention relates to the field of virus inspection and killing, in particular to the virus defense technology of the isolated Ethernet internal mobile storage medium. Background technique [0002] The ferry Trojan horse is a Trojan horse that uses mobile storage media such as U disks as a medium to attack and spread. When the mobile storage medium infected with the Trojan horse is connected to the intranet computer, the Trojan horse is implanted into the connected computer. The information is collected and stored in the U disk. When this U disk is taken to the external network for use, the collected information will be sent to the outside world through the Internet. Because the U disk acts as a ferry from the physically isolated intranet to the Internet in the attack, this type of Trojan is called a ferry Trojan. At present, the methods to solve the ferry Trojan horse include the following: [0003] The first method is to use the virus database ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 黄声声
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products