High security removable storage device

A mobile storage device and memory technology, applied in the direction of preventing unauthorized use of memory, internal/peripheral computer component protection, etc., can solve the problem of not being able to prevent unauthorized users from stealing mobile storage device data by Trojan horses at will, so as to reduce the risk of use, The effect of flexible access control and physical security protection

Inactive Publication Date: 2014-10-15
张永昌
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a high-secret removable storage device to solve the technical problem that the current mobile storage device cannot prevent unauthorized users from copying files and Trojan horses from stealing the data of the mobile storage device at will

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High security removable storage device
  • High security removable storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A. The administrator establishes the account number and password of the "Internet cafe" scenario user in the security control software of the mobile storage device, and sets its authority as "prevent file copying"; the security chip storage space stores the authority certificate of the "Internet cafe" scenario user ;

[0047] B. The user connects the mobile storage device to the terminal in the Internet cafe, enters the account number and password of the "Internet cafe" scenario user, and compares the mobile storage device with the authority certificate, and the match is qualified;

[0048] C. Click "Create New Document" on the mobile storage device;

[0049] D. The communication protocol module of the COS system compares the permissions of the "Internet cafe" scenario user account in the mobile storage device security control software in the sandbox, and finds that creating new files is allowed;

[0050] E. A new document is created;

[0051] F. The computer Trojan t...

Embodiment 2

[0055] A. The bidder establishes the account number and password of the "bidding" scenario user in the security control software of the mobile storage device, and sets its authority as "prevent file copying, saving, deleting, modifying, and printing; allow browsing", and the validity period of the certificate is 24 hours; the storage space of the security chip stores the authority certificate of the "bidding" scenario user;

[0056] B. Send the mobile storage device and the account number and password of the "bidding" scenario user to the bidding party;

[0057] C. The tenderee connects the mobile storage device to the terminal, and the mobile storage device management software detects the environmental characteristics of the terminal where it is located. No virus or Trojan horse is found to be running, and the sandbox control module is activated; the account number and password of the input "bidding" scenario user are received. , the mobile storage device is compared with the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a high security removable storage device which comprises a safe main control chip, a chip operating system (COS) arranged in the chip, a flash memory and removable storage device safety management software arranged in the flash memory, wherein the COS system is stored in the safe chip and is used for managing the authority certificates corresponding to users; the removable storage device safety management software adopts a memory sandbox technology, and is used for monitoring and filtering various operations which are carried out on a removable storage device by the users and programs, checking the device service environment and the access authority of the removable storage device by being matched with the COS system, controlling the unauthorized use behaviors of data files of the removable storage device decoded to the memory, and recording various key sensitive operations. The high security removable storage device adopts an integral protection technology combining software and hardware, so that the security access control of the removable storage device can be realized, and the users having different authorities have different data views and fine grit operation authorities for the removable storage device; therefore, the users are prevented from privately copying the files and the content in the removable storage device, and the data of the removable storage device is prevented from being broken and stolen by viruses and Trojan horses.

Description

technical field [0001] The invention relates to the field of mobile information storage, in particular to a high-security removable storage device. Background technique [0002] Due to its flexible and convenient use, mobile storage devices have become an important mobile storage medium for information storage and transmission, and are also widely used in enterprises, institutions, governments and the military. However, the vulnerability of mobile storage devices in information security protection makes the stored important data related to personal privacy information, corporate business confidential information or government military confidential information face serious security threats. [0003] According to statistics, 30%-40% of the losses caused by various security breaches in recent years are caused by the leakage of electronic documents; more than 60% of data theft cases are related to the loss or theft of mobile devices storing files. According to a report by a res...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/79
Inventor 张永昌
Owner 张永昌
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products