Method for detecting crossing use of mobile storage equipment

A technology of a mobile storage device and a detection method, which is applied in the detection field of mobile storage devices, can solve the problem of not realizing the cross-use detection of mobile storage media, etc., and achieve the effect of avoiding file loss.

Inactive Publication Date: 2013-09-11
中国人民解放军91655部队
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] None of the existing detection systems realize the cross-use detection of mobile storage media, that is, the system detects whether the U disk inserted into the computer has been cross-used by comparing the status information of the U disk inserted into the computer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting crossing use of mobile storage equipment
  • Method for detecting crossing use of mobile storage equipment
  • Method for detecting crossing use of mobile storage equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] The detection method for cross-use of mobile storage devices of the present invention operates under the stand-alone version, and the steps are as follows:

[0024] Such as figure 1 As shown, when the program runs on the computer for the first time, the program registration is performed, that is, the program is automatically copied to the system directory for operating the computer, and registers itself as an interrupt operation mode; when the mobile storage medium is found to have cross-use behavior, It is determined through the policy setting that the mobile storage medium is processed in a mode that prohibits reading and writing or read-only; the mobile storage medium registration module is responsible for obtaining its relevant information when the mobile storage medium is inserted, and storing it in a fixed location; when the insertion of the mobile storage medium is detected again When the system is running, read and compare the existing information of the mobile ...

Embodiment 2

[0032] The detection method for cross-use of mobile storage devices of the present invention runs under the network version, and the steps are as follows:

[0033] This solution can be used in the network. It adds an authentication server on the basis of the stand-alone version, uploads the registration information of the mobile storage medium to the server, and adds a step of limiting the range of cross-use, that is, the mobile storage Modifications within the scope of use are not considered cross-use, and only use outside the limited scope of cross-use is considered cross-use.

[0034] In the network model, it includes a plurality of computers 1-n, and a server for saving the authentication database. The general process of this program is as follows Figure 5 As shown, all computers in the network, such as computers 1-n, run the authentication program independently, and the authentication program is similar to the program registration function in the above-mentioned stand-a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for detecting crossing use of mobile storage equipment. The method comprises the following steps: (1) when a mobile storage medium runs on a certain computer for the first time, automatically running an automatic registering program along with startup of a system, duplicating the program of the mobile storage equipment, and setting as an interrupt mode; (2) when the mobile storage medium inserts into the computer again, automatically starting the program, detecting inserted information of the mobile storage medium by invoking a system command, then reading the information on the mobile storage medium, and storing the information on the mobile storage medium into a fixed position operating system of the computer or the mobile storage medium for automatically invoking the interrupt; (3) comparing last information read at a fixed position of the computer or the mobile storage medium with current information read in a memory; and (4) executing a sending strategy according to a comparison result, and setting a read-only or read-write mode of the mobile storage medium by an execution thread according to the strategy.

Description

technical field [0001] The invention relates to a detection method for mobile storage devices, in particular to a detection method for cross-use of mobile storage devices. Background technique [0002] None of the existing detection systems realize cross-use detection of removable storage media, that is, the system detects whether the U disk inserted into the computer has been cross-used by comparing the status information of the U disk inserted into the computer. Contents of the invention [0003] The invention provides a detection method for cross-use of mobile storage devices, through which the purpose of avoiding file loss and being used by Trojan horses is achieved, and the use of mobile storage media is regulated by technical means. [0004] The method for detecting cross-use of mobile storage devices to achieve the purpose of the present invention includes the following steps: [0005] (1) When the mobile storage medium runs for the first time on a certain computer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 刘福强马琳刘嵩刘鹏李玉东
Owner 中国人民解放军91655部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products