Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of method and device for protecting U disk

A program and real-time state technology, applied in the direction of digital data protection, computer security device, internal/peripheral computer component protection, etc., can solve the problem that the U disk protection security level and trusted state protection requirements cannot be met.

Active Publication Date: 2022-07-12
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security level and trusted state protection requirements of U disk protection cannot be met.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of method and device for protecting U disk
  • A kind of method and device for protecting U disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, the embodiments in the present application and the features in the embodiments may be arbitrarily combined with each other if there is no conflict.

[0042] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.

[0043] figure 1 It is a flowchart of a method for protecting a U disk according to an embodiment of the present invention, such as figure 1 As shown, the method of the embodiment of the present invention comprises the following steps:

[0044] Step 101: monitor and collect the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a method and device for protecting a USB flash drive. The method includes: monitoring and collecting real-time states of programs or files on a USB flash drive running on a terminal, and acquiring the real-time state of the USB flash drive. compare the acquired metric value of the real-time state with the pre-collected metric value to determine its credible state; determine the U disk according to the preset security level and the credible state of the U disk Read and write permissions for programs or files on the disk in order for the terminal to respond. The embodiments of the present invention can comprehensively protect the U disk through the security level and the trusted state based on the real-time state of the program or file.

Description

technical field [0001] The embodiments of the present invention relate to an operating system security technology, in particular to a method and device for protecting a U disk. Background technique [0002] U disk is an important attack method for network security and the security of confidential information of enterprises and institutions. Through the U disk, the spread of viruses and Trojans brings great threats to the network environment, and the important information of enterprises and institutions through the U disk may be at risk of being stolen. [0003] There are also two requirements for the protection of U disk. One is to prevent the spread of viruses and Trojan horses, and the other is to protect important resources of enterprises and prevent U disk from encroaching on important resources. [0004] Most of the existing U disk protection technologies focus on one aspect, and it is difficult to have both. Therefore, it cannot meet the security level and trusted st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/73
CPCG06F21/73G06F21/6209G06F2221/2141
Inventor 张彬
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD