Access control method for mobile memory

A mobile storage and access control technology, applied in the field of information security, can solve the problems of static passwords being easily peeped, and secure U disk files unable to be protected.

Inactive Publication Date: 2016-04-13
王晓伟
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a mobile memory access control method, mobile memory and system, which can solve the problem that the current security U disk uses static passwords for access control, and the static password is easy to be peeped or intercepted, resulting in storage in the security U disk. The problem that the file cannot be protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] An embodiment of the present invention provides an access control method of a mobile storage, the method comprising:

[0021] After the mobile storage is connected to the terminal, the mobile storage receives authentication parameters input by the user through the terminal, which at least include a dynamic password;

[0022] The mobile storage compares and authenticates the dynamic password included in the authentication parameter with the dynamic password locally generated by the mobile storage;

[0023] After the authentication is successful, the mobile storage performs access control on the read and write operations initiated by the user through the terminal.

[0024] In the above method, the dynamic password is: a dynamic password generated based on time, or a dynamic password generated based on a challenge code.

[0025] In the above method, the dynamic password is a dynamic password generated based on a challenge code;

[0026] The dynamic password contained in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method for a mobile memory and belongs to the field of information security. The method comprises the steps that after being connected with a terminal, the mobile memory receives an authentication parameter at least containing a dynamic password and input by a user through the terminal; the mobile memory performs comparative authentication on the dynamic password contained in the authentication parameter and a dynamic password locally generated by the mobile memory; and after the authentication is successful, the mobile memory performs access control on reading-writing operation initiated by the user through the terminal. Due to the adoption of a dynamic password based access control mechanism, a great threat is not posed to the security of the mobile memory even if a password is carelessly leaked, so that the security of the mobile memory is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an access control method of a mobile memory. Background technique [0002] With the rapid popularization of mobile storage, especially mobile storage with USB as the interface (hereinafter referred to as U disk), the security of files stored in the U disk is increasingly concerned. [0003] In order to enhance the security of the USB flash disk, the secure USB flash disk capable of controlling the file access operation of the USB flash disk has been gradually applied to fields such as military affairs, finance, and commerce. The basic principle of access control of the secure USB flash drive is: before the user accesses the files in the secure USB flash drive, the user needs to send an authentication password (hereinafter referred to as the password) to the secure USB flash drive through the computer terminal, and the secure USB flash drive authenticates the password. Operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/60G06F21/62
CPCG06F21/46G06F21/604G06F21/62G06F2221/2133
Inventor 王晓伟
Owner 王晓伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products