Unlock instant, AI-driven research and patent intelligence for your innovation.

USB flash disk protection method and device

A real-time state and file technology, applied in digital data protection, computer security devices, internal/peripheral computer component protection, etc., can solve problems that cannot meet the protection requirements of U disk protection security level and trusted state protection

Active Publication Date: 2020-04-14
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security level and trusted state protection requirements of U disk protection cannot be met.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB flash disk protection method and device
  • USB flash disk protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0042] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0043] figure 1 It is the flow chart of the method for U disk protection of the embodiment of the present invention, as figure 1 As shown, the method of the embodiment of the present invention includes the following steps:

[0044] Step 101: monitor and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a USB flash disk protection method and device. The method comprises the steps: carrying out the monitoring and collection of the real-time state of a programor a file, running on a terminal, of a USB flash disk, and obtaining a measurement value of the real-time state of the USB flash disk; comparing the obtained measurement value of the real-time state with a pre-collected measurement value, and determining a credible state; and determining a read-write permission of the program or the file on the USB flash disk according to a preset security level of the USB flash disk and the credible state so that the terminal responds. The USB flash disk can be comprehensively protected through the security level and the creadiable state based on the real-time state of the program or the file.

Description

technical field [0001] The embodiment of the present invention relates to operating system security technology, especially a method and device for protecting a USB disk. Background technique [0002] U disk is an important attack method for network security and confidential information security of enterprises and institutions. The spread of viruses and Trojan horses through the U disk brings great threats to the network environment, and the important information of enterprises and institutions through the U disk may be at risk of being stolen. [0003] There are also two requirements for the protection of the U disk, one is to prevent the spread of viruses and Trojan horses, and the other is to protect the important resources of the enterprise and prevent the U disk from encroaching on important resources. [0004] Most of the existing U disk protection technologies focus on one aspect, and it is difficult to have both. Therefore, the security level and trusted state prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/73
CPCG06F21/73G06F21/6209G06F2221/2141
Inventor 张彬
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD