Physical isolation type USB port protection system and method

A USB interface, physical isolation technology, applied in the direction of platform integrity maintenance, electrical digital data processing, internal/peripheral computer component protection, etc. Permission access control strategy, the effect of resisting Trojan theft and preventing internal leakage

Inactive Publication Date: 2015-09-16
王晓楠
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The USB interface is one of the most commonly used communication ports on the computer. The files in the computer can be easily copied through the storage devices such as U disk and mobile hard disk, and the virus and Trojan horse can be easily uploaded to the computer to destroy the files; it can be seen that the USB interface has been become a major threat to data security
[0003] At present, the solutions for USB interface protection at home and abroad can be mainly divided into the following categories: 1) BIOS setting method (cutting the mess quickly), this method is too overbearing and inconvenient to use; 2) Prohibition of flash disk or mobile hard disk Start, hide the drive letter and prohibit viewing, this method is only effective for some USB storage devices, and this method is more complicated, and it is not convenient for users to use; 3) It is forbidden to install USB drivers, because this method will cause all USB devices use, has gradually been eliminated by users; 4) using a single transmitter, the equipment is expensive and the user's usability is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical isolation type USB port protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] refer to figure 1 , is a structural schematic diagram of a physically isolated USB interface protection system of the present invention; the protection system includes a central processing unit, a host computer connected to a plurality of user computers, an external memory for storing user names and passwords, and is used for according to the central The switching signal of the processor controls multiple relays of multiple USB interface switches on the user's computer; Connect to the corresponding port of the CPU.

[0027] Wherein, a signal converter for converting the serial port RS232 level signal of the computer into a TTL level signal is arranged between the upper computer and the central processing unit.

[0028] Wherein, an isolator for isolating digital signals from analog signals and preventing interference signals is provided between the central processing unit and the relays.

[0029] Wherein, the protection system also includes a voltage regulator for stab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a physical isolation type USB port protection system and method. The protection system comprises a central processor, an upper computer connected with multiple user computers, an external memory used for storing user names and passwords and multiple relays used for controlling on-off of multiple USB ports in the user computers according to switching signals of the central processor. The upper computer is connected with the central processor through serial communication, and the control ends of the relays and the output end of the external memory are electrically connected with corresponding ports of the central processor. The protection method includes the steps that according to the user names, the central processor divides users into three levels, namely, common users, senior users and secret commissioners; the users input the user names and the passwords into the user computers, and the central processor controls login of the users according to the user names and the passwords; the central processor determines the levels of the users according to the user names and determines USB port use permission of the users. The protection method guarantees controllability of data in a computer.

Description

technical field [0001] The invention belongs to the technical field of USB interface protection, in particular to a physically isolated USB interface protection system and a protection method thereof. Background technique [0002] For some secret-related units, the internal data of the computer is very important. Once leaked or damaged, the loss is irreparable. Therefore, how to ensure the security of important files in the computer has become a problem that managers must face. The USB interface is one of the most commonly used communication ports on the computer. The files in the computer can be easily copied through the storage devices such as U disk and mobile hard disk, and the virus and Trojan horse can be easily uploaded to the computer to destroy the files; it can be seen that the USB interface has been become a major threat to data security. [0003] At present, the solutions for USB interface protection at home and abroad can be mainly divided into the following ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/85
CPCG06F21/567G06F21/85G06F2221/031G06F2221/032G06F2221/2113G06F2221/2141
Inventor 王晓楠朱思雨高婷周家振娄来威
Owner 王晓楠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products