Credible USB flash disk implementation method based on file filtering driver

A file filter drive and implementation method technology, applied in the field of network security, can solve the hidden dangers of information and data confidentiality work, and achieve the effects of reducing the risk of computer virus infection, preventing leaks, and protecting data security

Inactive Publication Date: 2019-08-06
北京天地和兴科技有限公司
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, anyone can use any computer to access the data and files in the ordinary U disk, which is prohibited in some specific fields or usage scenarios involving secrets, such as government departments, companies and industrial control fields, etc. In the case of cross-disc use, it is not allowed, and it brings huge challenges and security risks to the confidentiality of confidential information and data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible USB flash disk implementation method based on file filtering driver
  • Credible USB flash disk implementation method based on file filtering driver
  • Credible USB flash disk implementation method based on file filtering driver

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative work, any modifications, equivalent replacements, improvements, etc., shall be included in the protection scope of the present invention Inside.

[0021] Such as Figure 1 to Figure 3 As shown, the trusted U disk implementation method based on file filtering driver of the present invention comprises the following steps:

[0022] S1. The user initiates a U disk operation. When the user inserts the U disk into the computer with the file system filter driver installed, the user's access request to the U disk is forwarded to the kernel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible USB flash disk implementation method based on a file filtering driver, which comprises the following steps that: S1, a user initiates a USB flash disk operation, andan access request of the user to the USB flash disk is forwarded to a kernel layer by a Windows operating system and is intercepted by an input / output manager; s2, the input / output manager activatesa filtering manager according to the intercepted request type, and loads and calls a corresponding file filtering driver to process the request; s3, after receiving the passing message, the filteringmanager forwards the USB flash disk access request to a file system driver at a lower layer for further processing, so that access to the authorized encrypted USB flash disk is allowed; on the contrary, if it is detected that the ID is not matched, further issuing of the input and output request is stopped in the filtering driver, and therefore read-write access to the unauthorized USB flash diskis forbidden. According to the invention, only the designated computer is allowed to access the designated USB flash disk in an environment requiring high data confidentiality.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for realizing a trusted U disk based on a file filter driver. Background technique [0002] In modern society, the common method of file sharing is to transfer files through computer network, but the disadvantage of this method is that the computers that need to share files are interconnected on the network, otherwise files and data cannot be transferred. The compact and easy-to-carry mobile U disk can easily copy and share data between computers, which makes up for the lack of network transmission methods, and thus becomes an important information transmission tool in people's daily work and life. [0003] However, anyone can use any computer to access the data and files in the ordinary U disk, which is prohibited in some specific fields or usage scenarios involving secrets, such as government departments, companies and industrial control fields, etc. It is no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79G06F21/85
CPCG06F21/79G06F21/85
Inventor 王小东张玮肖俊杰
Owner 北京天地和兴科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products