High security removable storage device
A mobile storage device and memory technology, applied in the direction of preventing unauthorized use of memory, internal/peripheral computer component protection, etc., can solve the problem of not being able to prevent unauthorized users from stealing mobile storage device data by Trojan horses at will, so as to reduce the risk of use, The effect of flexible access control and physical security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] A. The administrator establishes the account number and password of the "Internet cafe" scenario user in the security control software of the mobile storage device, and sets its authority as "prevent file copying"; the security chip storage space stores the authority certificate of the "Internet cafe" scenario user ;
[0047] B. The user connects the mobile storage device to the terminal in the Internet cafe, enters the account number and password of the "Internet cafe" scenario user, and compares the mobile storage device with the authority certificate, and the match is qualified;
[0048] C. Click "Create New Document" on the mobile storage device;
[0049] D. The communication protocol module of the COS system compares the permissions of the "Internet cafe" scenario user account in the mobile storage device security control software in the sandbox, and finds that creating new files is allowed;
[0050] E. A new document is created;
[0051] F. The computer Trojan t...
Embodiment 2
[0055] A. The bidder establishes the account number and password of the "bidding" scenario user in the security control software of the mobile storage device, and sets its authority as "prevent file copying, saving, deleting, modifying, and printing; allow browsing", and the validity period of the certificate is 24 hours; the storage space of the security chip stores the authority certificate of the "bidding" scenario user;
[0056] B. Send the mobile storage device and the account number and password of the "bidding" scenario user to the bidding party;
[0057] C. The tenderee connects the mobile storage device to the terminal, and the mobile storage device management software detects the environmental characteristics of the terminal where it is located. No virus or Trojan horse is found to be running, and the sandbox control module is activated; the account number and password of the input "bidding" scenario user are received. , the mobile storage device is compared with the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com