Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Storage device access control method and system

A storage device and access control technology, applied in internal/peripheral computer component protection, digital data authentication, etc., can solve the problems of no storage device legality detection, insufficient terminal data security, data security impact, etc.

Inactive Publication Date: 2016-12-21
BEIJING YUANXIN SCI & TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of technology, many smart storage chips can also run certain programs when connected to terminal devices, and access user data, etc., which will affect data security.
However, for some special terminal devices, the data generated by them is highly private, and they only store the data in certified storage devices.
[0003] Existing systems do not detect the legitimacy of storage devices, especially whether smart storage devices will run some malicious code to steal or destroy data, so the security of some highly confidential private data cannot be guaranteed
[0004] The existing technology does not check the terminal equipment that accesses the data. If the user uses an unauthenticated storage device, the data processing terminal can still write data into the storage device, which makes the data generated by the terminal itself not safe enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Storage device access control method and system
  • Storage device access control method and system
  • Storage device access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The scope of applicability of the present invention will become apparent from the detailed description given below. It should be understood, however, that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are given for purposes of illustration only.

[0022] figure 1 A flow chart of a method for controlling storage device access according to an embodiment of the present invention is shown. The method starts at step S10. For example, a storage device access event is detected through a service (resident process) of a terminal such as a computer that manages storage device access. When a storage device access is detected, the legality and availability of the storage device Credibility certification. The authentication method can adopt one or more of the following: 1) Determine whether the terminal and the storage device match according to the customized communication protocol and instruction, for example, use a sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a storage device access control method and system, wherein the method includes: in response to a terminal detecting a storage device access, authenticating the legitimacy of the storage device; in response to successful authentication, authorizing the storage device The center requests authorization; the terminal mounts the storage device according to the confirmed authorized mounting manner in response to confirming the authorization. The invention prevents the storage device without security authentication and authorization from being loaded correctly, the terminal application cannot write data into the storage device, and the operation of the terminal application that generates data is restricted, so as to ensure the safe generation and storage of terminal data .

Description

technical field [0001] The present application relates to the security field of protecting computers, their components, programs or data from unauthorized actions, and in particular to a storage device access control method and system. Background technique [0002] The storage device is the place where the terminal application normally uses to store the data generated by it. With the development of technology, many smart storage chips can also run certain programs when they are connected to terminal devices, and access operations on user data, etc., which affect data security. However, for some special terminal devices, the data generated by them are highly private, and they only store the data in certified storage devices. [0003] Existing systems do not detect the legitimacy of storage devices, especially whether smart storage devices will run some malicious code to steal or destroy data, so the security of some highly confidential private data cannot be guaranteed. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44G06F21/78
CPCG06F21/44G06F21/78
Inventor 周宏斌
Owner BEIJING YUANXIN SCI & TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More