Access monitoring method and device of movable equipment

A technology that allows access to mobile devices, applied in the field of information security, can solve the problems of inability to use removable devices, unable to meet the needs of enterprises to exchange information normally, and can only be used within enterprises, to prevent virus infection and solve leaks. problems, the effect of improving safety

Active Publication Date: 2013-04-17
BEIJING QIANXIN TECH
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to protect important data within the enterprise, some enterprises use security management software within the enterprise to force automatic encryption when files are created and edited, so that files can only be used within the enterprise; For mobile devices, for example, some companies adopt closed USB ports and cannot use removable devices to achieve the purpose of preventing data leakage, but these practices have brought a lot of inconvenience and cannot meet the needs of companies to exchange information normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access monitoring method and device of movable equipment
  • Access monitoring method and device of movable equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0074] One of the core concepts of the embodiments of the present invention is to determine whether to allow the access of the mobile device by checking whether the unique identifier of the mobile device exists in the list of legal mobile device information preset by the security control server. The write operation of the removable device is monitored during access, so that the source and destination of the data can be accurately tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access monitoring method and an access monitoring device of movable equipment. The method comprises the following steps of: presetting a list of legal movable equipment information in a security control server, wherein the security control server is used for controlling security of a client connected with the security control server, and the list of the legal movable equipment information comprises unique identifiers of the movable equipment allowed to be accessed; calculating the unique identifier of one movable equipment when the client monitors that the movable equipment is accessed; and transmitting the unique identifier to the security control server, judging whether the unique identifier exists in the list of the legal movable equipment information by the security control server, allowing access of the movable equipment if the unique identifier exists in the list of the legal movable equipment information, and refusing the access of the movable equipment if the unique identifier does not exist in the list of the legal movable equipment information. According to the access monitoring method and the access monitoring device, the source and the destination of data can be accurately tracked, the data can be prevented from being infected by virus, the security for use of the movable equipment is improved, and the security of network information is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method for access monitoring of a mobile device, and a device for access monitoring of a mobile device. Background technique [0002] At present, with the popularization of mobile devices and the convenience of data transmission and portability, mobile devices are widely used in daily life and work. However, in enterprises, the problem of file leakage is often encountered. One of the main leakage channels is Removable devices are a very big threat to enterprises that cannot afford data loss and leakage. [0003] In order to protect important data within the enterprise, some enterprises use security management software within the enterprise to force automatic encryption when files are created and edited, so that files can only be used within the enterprise; For mobile devices, for example, some companies use closed USB ports to prevent the use of removable ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李宇
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products