Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Intermediary physical isolation method and system applied to USB interface

A USB interface and physical isolation technology, applied in the field of electronic information security, can solve the problems of USB device HID masquerade attack and 0-day vulnerability attack that cannot be prevented, and achieve the effect of preventing and controlling information security problems and ensuring safe and stable operation

Pending Publication Date: 2020-08-28
GUIZHOU POWER GRID CO LTD
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The management and control methods of this type of software can prevent USB phishing attacks, but there is no way to prevent HID masquerading attacks and 0-day vulnerability attacks on USB devices
Moreover, the existing management and control methods are generally through manual monitoring. With the continuous development of intelligent technology, advanced trend technology is applied to the management and control methods, but the above two protective measures cannot be intelligently and effectively avoided under the condition of meeting the work requirements. Therefore, it is of great significance to propose a new method to prevent and control the information security of USB interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intermediary physical isolation method and system applied to USB interface
  • Intermediary physical isolation method and system applied to USB interface
  • Intermediary physical isolation method and system applied to USB interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The current USB protection measures include disabling the USB interface and using various firewalls and monitoring software to control the security of the USB interface. However, these two protection measures cannot effectively avoid potential information security risks while meeting work requirements.

[0037] Therefore, please refer to figure 1 , image 3 , Figure 4 and Figure 8 , for the present invention proposes a kind of intermediary type physical isolation method applied to USB interface: a kind of intermediary type physical isolation method applied to USB interface, comprising:

[0038] The external USB device is connected to the security control module 100, and the memory identification unit judges whether the external USB device is a used authorized device, and sends the information to the management machine 200;

[0039] The management machine 200 receives the information and makes a verification judgment. If it is an authorized device, the management ma...

Embodiment 2

[0091] see figure 2 and Figure 5-9 , the first embodiment of the intermediary physical isolation system applied to the USB interface provided by the present invention: an intermediary physical isolation system applied to the USB interface, comprising:

[0092] The safety management and control module 100 communicates with the management machine 200 wirelessly, and cuts off or connects the power cord of the USB interface according to the control instruction of the management machine 200;

[0093] The management machine 200 is used to manage all the security management and control modules 100, control the on-off of each USB interface according to user needs, provide the functions of authority management, interface display, real-time alarm and query history, and send a notification message when necessary to the user;

[0094] The intermediate detection module 300 is connected with the management machine 200 and the security management and control module 100, and is used to de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intermediary physical isolation method applied to a USB (Universal Serial Bus) interface. The intermediary physical isolation method comprises the following steps that: external USB equipment is connected into a security management and control module; a memory identification unit judges whether the external USB equipment is used authorization equipment or not, and sendsinformation to a management machine; the management machine receives the information and makes a verification judgment, and if the management machine is authorized equipment, the management machine passes the verification, and if the management machine is not authorized equipment, the management machine enters an intermediate detection module to detect permission; the intermediate detection moduletransmits authority detection information to the management machine; and the management machine receives the authority detection information, controls on-off of an internal switch of the security management and control module, physically manages and controls access and use authorities of all USB interfaces of the monitoring system host, effectively prevents and controls an information safety problem, and guarantees secure and stable operation of electric power monitoring.

Description

technical field [0001] The invention relates to the technical field of electronic information security, in particular to an intermediary physical isolation method and system applied to a USB interface. Background technique [0002] As computers and various electronic devices are more and more widely used in daily life, USB interfaces are used more and more frequently, such as mouse, keyboard, U disk, mobile hard disk, external sound card, power bank, electronic cigarette, etc. All use the USB interface, and plug and play. According to statistics, except for the network adapter interface among all physical interfaces, the USB interface has the highest efficiency in spreading malicious virus programs, and the USB protocol can also be used by attackers to attack, so the USB interface has become a target for the spread of many malicious programs and network security attacks. carrier. [0003] The types of attacks via USB are mainly divided into the following categories: USB ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/85G06F9/54G06F13/40G06F13/42
CPCG06F21/44G06F21/85G06F9/546G06F13/4081G06F13/4282
Inventor 王磊黄力张建行张雪清朱皓黄照厅龙志唐磊张其静罗靖陈相吉付锡康朱平王颖方阳李克宋希静曾蓉瞿杨全陈晨居浩淼徐德华余秋衡邓冠汤龙黄伟王予彤
Owner GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products