A traceless access control method and device based on virtual disk protection

A virtual disk and virtual access technology, applied in the field of network security, can solve problems such as security risks, and achieve the effect of preventing security risks, avoiding security risks, and protecting security.

Active Publication Date: 2016-12-28
上海海加网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the hidden safety problems in the above-mentioned practical applications, the purpose of the present invention is to provide a method and device for invisible access control based on virtual disk protection, which ensures that only users can access files in the virtual disk and prohibits other processes in the system from accessing. User files in the virtual disk, so as to ensure the security of the files during transmission and protect the security of the user's local files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A traceless access control method and device based on virtual disk protection
  • A traceless access control method and device based on virtual disk protection
  • A traceless access control method and device based on virtual disk protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Such as figure 1 , figure 2 As shown, a non-trace access device based on virtual disk protection includes a client terminal 1 and a web server 4, and the client terminal 1 and the web server 4 are interactively connected through a security gateway device 3; the client terminal 1 is provided with USB interface, described USB interface is plugged with usbkey 2. Described usbkey 2 comprises single-chip microcomputer 2-1, and described single-chip microcomputer 2-1 is interactively connected with memory module 2-2, safety protection module respectively, and described single-chip microcomputer 2-1 carries out interactive connection with security gateway equipment 3. The safety protection module comprises the file filtering driver module 2-3 that prevents the application program or process that visits by usbkey from saving, the copy operation and its cache directory is forced to be redirected to the orientation module 2-4 in the memory module 2-2; The file filtering driver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a traceless access controlling method and a device based on protection of a visual magnetic disc. The traceless access controlling method and the device based on protection of the visual magnetic disc are characterized in that a usbkey is used for setting up a visual magnetic disc in a system of a user terminal. A safety gateway device with a safety plug-in board is arranged between the user terminal and a web server. The usbkey is used for identifying a user identity by accessing a classified web system. The visual magnetic disc is mounted on the safety plug-in board to set up a visual accessing space. Files in the visual accessing space are oriented again to the visual magnetic disc. According to the traceless access controlling method and the device based on protection of the visual magnetic disc, only a user is allowed to access the files in the visual magnetic disc. Other progresses in the system are forbidden from accessing user files in the visual magnetic disc so that safety of the files in a transmission process is ensured and safety of local files of the user is ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for controlling a client's traceless access. Background technique [0002] When a user accesses the web system through a browser, the browser not only saves the browsing history locally, but also saves data such as temporary files and input URL records in the local temporary directory. Even if the user clears all cache files and access history records when exiting the browser, illegal users can still restore the cleared files and records through various data recovery tools. At the same time, illegal users can also steal the user's cache files through tools such as Trojan horses, causing security risks of leaking secrets. [0003] When a user accesses a confidential system through a browser, the data packet is encrypted in plain text during network transmission. When users download and upload files, there is a risk of being eavesdropped and stolen by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/77
Inventor 郑朝晖
Owner 上海海加网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products