Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for security management and control of mobile storage device

A mobile storage device, security management and control technology, applied in the direction of internal/peripheral computer component protection, digital data authentication, etc., can solve the problems of mobile storage device abuse, potential safety hazards, mobile storage device infection and computer virus transmission, etc., to achieve structural Simple, safe, easy to use and popularize

Active Publication Date: 2022-03-04
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the popularization and use of mobile storage devices, the abuse of mobile storage devices has also brought a series of hidden dangers to the security of computers and information, and the resulting losses are immeasurable. Therefore, how to effectively control the use of mobile storage devices , to achieve the purpose of safe and standardized utilization, which has become an important topic in the field of information security
[0003] Improper management of mobile storage devices will cause the following hidden dangers: ① mobile storage devices can copy files in the computer at will; ② mobile storage devices are prone to infection and spread of computer viruses
[0004] The random phenomenon in the use of mobile storage devices will cause the abuse of mobile storage devices, which to a certain extent provides the possibility of virus intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for security management and control of mobile storage device
  • Method and system for security management and control of mobile storage device
  • Method and system for security management and control of mobile storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] Example 1 as figure 1 As shown, the present invention provides a mobile storage device security management and control method, including the following steps:

[0103] Step S1. When the host is connected to the mobile storage device, it is determined whether the host is a management terminal or a client;

[0104] Step S2. When the management terminal is connected to the mobile storage device;

[0105] The management terminal detects the mobile storage device, and judges whether the mobile storage device connected to the management terminal is registered;

[0106] Step S3. If not registered, the management terminal registers the mobile storage device; return to step S1;

[0107] Step S4. If it has been registered, it is judged whether to cancel the mobile storage device;

[0108] If so, log out the mobile storage device;

[0109] If not, no operation is performed;

[0110] Return to step S1;

[0111] Step S5. When the client connects to the mobile storage device;

...

Embodiment 2

[0117] Example 2 as figure 2 As shown, a mobile storage device security management and control method includes the following steps:

[0118] Step S1. When the host is connected to the mobile storage device, it is determined whether the host is a management terminal or a client;

[0119] Step S2. When the management terminal is connected to the mobile storage device;

[0120] The management terminal detects the mobile storage device, and judges whether the mobile storage device connected to the management terminal is registered;

[0121] Step S21. The management terminal obtains the partition information of the mobile storage device;

[0122] Step S22. The management terminal traverses the partitions of the mobile storage device to find hidden sectors, and reads the data of the hidden sectors;

[0123] Step S23. The management terminal detects whether the hidden sector contains registration data;

[0124] Step S231. The management terminal traverses the hidden sectors of t...

Embodiment 3

[0155] Example 3 as image 3 As shown, a mobile storage device security management and control system includes a management terminal 1 and a client 2, and the management terminal 1 is connected to the client 2;

[0156] The management terminal 1 includes a main mobile storage device interface 1.1, a main mobile storage device detection and judgment module 1.2, a mobile storage device registration module 1.3, a mobile storage device cancellation module 1.4, a registration information table issuing module 1.5 and a client log receiving module 1.6 ;

[0157] The main mobile storage device interface 1.1 is used to connect the management terminal to the mobile storage device;

[0158] The main mobile storage device detection and judgment module 1.2 is used for the management terminal to detect the mobile storage device and judge whether the mobile storage device connected to the management terminal is registered;

[0159] The mobile storage device registration module 1.3 is used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a mobile storage device security management and control method and system, the method includes the following steps: Step S1. When the host is connected to the mobile storage device, it is judged whether the host is a management terminal or a client; Step S2. When the management terminal is connected to the mobile storage device; The management terminal detects the mobile storage device, and judges whether the mobile storage device connected to the management terminal is registered; step S3. If not registered, the management terminal registers the mobile storage device; returns to step S1; step S4. If registered, then judges whether To log off the mobile storage device; if so, log off the mobile storage device; if not, do not operate; return to step S1; step S5. When the client connects to the mobile storage device; the client detects the mobile storage device and judges the client Whether the mobile storage device connected to the terminal is registered; if yes, allow mounting; if not, prohibit mounting; return to step S1.

Description

technical field [0001] The invention belongs to the field of device management and control, and relates to a mobile storage device safety management and control method and system. Background technique [0002] At present, mobile storage devices such as U disks, mobile hard disks, and SD cards based on USB interfaces have been widely used in daily work and life. Mobile storage devices are developing rapidly towards the direction of large storage capacity, small size, low price and simple operation. With the popularization and use of mobile storage devices, the abuse of mobile storage devices has also brought a series of hidden dangers to the security of computers and information, and the resulting losses are incalculable. Therefore, how to effectively control the use of mobile storage devices , to achieve the purpose of safe and standardized utilization, has become an important topic in the field of information security. [0003] Improper management of mobile storage device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/79
CPCG06F21/44G06F21/79
Inventor 顾昊郭猛善路永柯李岩
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products