Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for protecting mobile storage equipment, equipment and storage medium

A mobile storage device and protection status technology, applied in the direction of internal/peripheral computer component protection, etc., can solve problems such as file outflow, computer blue screen, kernel compatibility issues, etc., and achieve the effect of reducing the probability of blue screen and low impact on system performance

Active Publication Date: 2020-05-08
SANGFOR TECH INC
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Employees usually copy and copy the core data in the enterprise computer to the mobile storage device, which causes the core data to leak
[0003] In the prior art, the protection of mobile storage devices includes the following: 1) The method of adding a read-only switch to the hardware, first of all, it is necessary to purchase hardware with a read-only switch, and the switch can be freely controlled by the user, but it cannot be used in In the anti-leakage scenario
2) The group policy method used in the operating system can only be used in systems above vista, and is invalid for Active Directory (Active Directory, AD) domain users, and cannot be used according to the identification of the U (Universal Serial Bus, Universal Serial Bus) disk ( IDentity, ID) differentiated control, this method is more general, users can turn off read-only, but it is easy to cause file leakage in the anti-leakage scenario
3) The method of modifying the write protection (WriteProtect) of the registry is also a relatively common method. The user can turn off the read-only by himself, and it needs to be restarted to take effect, but if it is not restarted, the file will be leaked
4) Intercept file operations at the driver layer. This method will cause compatibility issues with the kernel and cause the computer to blue screen easily.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting mobile storage equipment, equipment and storage medium
  • Method and device for protecting mobile storage equipment, equipment and storage medium
  • Method and device for protecting mobile storage equipment, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solution of the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0032] An embodiment of the present application provides a method for protecting a mobile storage device, the operation method is applied to a terminal, figure 1 It is a schematic diagram of the implementation flow of a method for protecting a mobile storage device according to an embodiment of the present application, as shown in figure 1 As shown, the method includes:

[0033] Step 101: When the terminal edits the file in the mobile storage device, hook the read and write functions of the mobile storage device to obtain a hook result;

[0034] Here, the terminal is an electronic device capable of editing files in a mobile storage device, and the electronic device may include a notebook computer, a desktop computer, and the like. The mobile storage device is a device that can move all storable types of data betwe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for protecting mobile storage equipment, equipment and a storage medium, and the method comprises the steps: carrying out the Hook of a reading and writing function of the mobile storage equipment when a terminal edits a file in the mobile storage equipment, and obtaining a Hook result; determining a protection state of the mobile storage device according to the Hook result; and outputting the protection state of the mobile storage device.

Description

technical field [0001] The embodiments of the present application relate to, but are not limited to, data protection technologies, and in particular, relate to a method, device, device, and storage medium for protecting a mobile storage device. Background technique [0002] As the most commonly used terminal outgoing channel, mobile storage devices are one of the most commonly used leaking channels for enterprise employees. Employees usually copy and duplicate the core data in the corporate computer to mobile storage devices, which causes core data leakage. [0003] In the prior art, the protection of mobile storage devices includes the following: 1) The method of adding a read-only switch to the hardware, first of all, it is necessary to purchase hardware with a read-only switch, and the switch can be freely controlled by the user, but it cannot be used in In the anti-leakage scenario. 2) The group policy method used in the operating system can only be used in systems abo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/79
CPCG06F21/79
Inventor 王威
Owner SANGFOR TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More