Security management system and method used for mobile terminal file

A mobile terminal and security management technology, applied in the fields of electronic digital data processing, internal/peripheral computer component protection, instruments, etc., can solve problems such as complex personnel, large environmental change factors, leakage of confidential document data information, etc., to ensure data security , high safety performance, and convenient implementation

Active Publication Date: 2018-07-17
武汉华工安鼎信息技术有限责任公司
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Mobile office has increasingly become a scene in people's daily work, but in office environments such as conferences and business trips, where the personnel are complex and the environment changes greatly, the security of the built-in data in mobile terminals is facing very high risks
Once the mobile terminal is lost, stolen, illegally accessed, illegally copied, etc., the confidential document data information in the terminal will be leaked, causing immeasurable losses to the unit
[0003] At present, the data protection of mobile terminals mainly adopts technical means such as data backup, encrypted storage, access control, and post-event auditing. However, the above-mentioned technical means still have disadvantages such as low efficiency, inability to control data transmission or release to the outside, and inability to prevent data loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management system and method used for mobile terminal file
  • Security management system and method used for mobile terminal file
  • Security management system and method used for mobile terminal file

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0045] To optimize the above scheme, see figure 1 , the USB device verification unit at least includes: a legality verification module, an identification check module, an identity acquisition module, an identification verification module and an identification writing module. Wherein, the legitimacy verification module is used to check the identity of the inserted U-key device, confirming whether its own ID exists in the Key ID list of the system, and the identification check module is used to check whether the inserted U-key has a mobile terminal Identification, the identity acquisition module is used to obtain the mobile terminal identification in the inserted U-key device, and the identification verification module is used to confirm whether the mobile terminal identification in the obtained U-key matches the identification of the inserted mobile terminal, and the identification is written The module is used to write the corresponding mobile terminal identification in the U-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of mobile terminal data security protection, and provides a security management system used for a mobile terminal file. The security management system comprises a USB equipment monitoring unit, a USB equipment verifying unit, a security kernel driving unit and a filtering driving unit. The invention further provides a security management method used for the mobile terminal file. The method includes the following steps that S1, a PC end is started, a client side program is run, and all the units are initialized; S2, the USB equipment monitoring units is adopted for detecting whether USB equipment is connected into the PC end; S3, the USB equipment verifying unit verifies whether the identity of the USB equipment is matched with the mobile terminal or not;S4, the security kernel driving unit is adopted for selecting to load the security kernel function of a virtual disk for the equipment, wherein the identity of the equipment is verified by the USB equipment verifying unit; S5, the filtering driving unit is adopted for scanning and filtering data operation in the virtual disk, and selecting to encrypt or decrypt the data in the virtual disk. The security management system and method are high in security and convenient and rapid to implement, and will not change the using habit of a user.

Description

technical field [0001] The invention relates to the field of mobile terminal data security protection, in particular to a security management system and method for mobile terminal files. Background technique [0002] Mobile office has increasingly become a scene in people's daily work, but in office environments such as conferences and business trips, where the personnel are complex and the environment changes greatly, the security of built-in data in mobile terminals is facing very high risks. Once the mobile terminal is lost, stolen, illegally accessed, illegally copied, etc., the confidential document data information in the terminal will be leaked, causing immeasurable losses to the unit. [0003] At present, the data protection of mobile terminals mainly adopts technical means such as data backup, encrypted storage, access control, and post-event auditing. However, the above-mentioned technical means still have disadvantages such as low efficiency, inability to control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/85G06F13/40
CPCG06F13/4068G06F21/34G06F21/85
Inventor 韩敏景奕昕廖巍刘红宇
Owner 武汉华工安鼎信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products