A kind of method and device for protecting U disk
A program and real-time state technology, applied in the direction of digital data protection, computer security device, internal/peripheral computer component protection, etc., can solve the problem that the U disk protection security level and trusted state protection requirements cannot be met.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, the embodiments in the present application and the features in the embodiments may be arbitrarily combined with each other if there is no conflict.
[0042] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.
[0043] figure 1 It is a flowchart of a method for protecting a U disk according to an embodiment of the present invention, such as figure 1 As shown, the method of the embodiment of the present invention comprises the following steps:
[0044] Step 101: monitor and collect the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

