Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

USB equipment security and secrecy auditing system and auditing method

A technology of security, confidentiality and equipment, applied in the field of information security, it can solve problems such as loopholes in the protection effect, and achieve the effects of accurate audit results, improved protection effect, and strong versatility and universality.

Pending Publication Date: 2021-12-03
成都立鑫新技术科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the patented USB security protection system is only suitable for a specific operating system, and can be bypassed after being attacked by implanting malicious code in actual use, so there are still loopholes in its protection effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB equipment security and secrecy auditing system and auditing method
  • USB equipment security and secrecy auditing system and auditing method
  • USB equipment security and secrecy auditing system and auditing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment discloses a USB device security and confidentiality audit system. The system is separately set up outside the USB device and the host computer. It is applicable to any operating system and can avoid the problem of malicious programs (or USB devices) bypassing the audit. like figure 1 As shown, the USB device security and confidentiality audit system includes a USB communication link data bypass acquisition device and a rule security audit system, and the USB communication link data bypass acquisition device is used for non-intrusive bypass acquisition of USB devices and a host computer. related data between, and filter the data according to the pre-set filtering rules. The rule security audit system is used to analyze and process the filtered data, and conduct a comprehensive audit of the USB device according to the set rules.

[0037] Specifically, as figure 2 As shown, the USB communication link data bypass acquisition equipment includes a data sign...

Embodiment 2

[0042] On the basis of Embodiment 1, this embodiment further limits the central processing unit. like image 3 As shown, the central processing unit includes a data reading unit, a data filtering unit, a filtering rule management unit, a device management unit and an external communication unit, and the data reading unit, the data filtering unit and the external communication unit are sequentially connected to the data buffer unit and the external communication unit. Between the external interface units, one end of the filtering rule management unit is connected to the data filtering unit, and the other end is connected to the external communication unit through the hardware management unit. Among them, the device management unit is responsible for reporting the information and status of the device itself to the rule security audit system, and receives the filtering rules distributed by the rule security audit system; the filtering rule management unit is responsible for the s...

Embodiment 3

[0044] On the basis of Embodiment 1 or Embodiment 2, in this embodiment, a data storage unit is also set in the rule security audit system, and the data storage unit is respectively connected with the hardware management unit, the rule management unit and the security security audit unit, and is used for Store security events or non-security events for later viewing and statistical analysis.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a USB (Universal Serial Bus) equipment security and secrecy auditing system, which comprises USB communication link data bypass acquisition equipment and a rule secrecy auditing system, and provides a USB equipment security and secrecy auditing method based on the system. According to the method, the electric signal on the communication link of the USB equipment is firstly collected and analyzed to obtain the USB communication data packet, then the USB communication data packet is filtered according to the filtering rule, then the USB communication data packet is analyzed and processed according to the set security and secrecy auditing rule, whether various behaviors of the USB equipment are safe or not is detected, and if no non-security event exists, normal use behaviors of the USB equipment are recorded, and if a non-security event exists, an alarm is given, and behaviors and data are recorded. The method is suitable for any operating system, the problem that rogue programs (or USB equipment) bypass auditing is avoided, and auditing of newly-added applications can be rapidly achieved by adding application layer protocol analysis rules.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a USB device security and security audit system and an audit method, which mainly aim at the detection before the use of the USB device and the security and security audit on the USB device and user behavior during the use process. Background technique [0002] With the rapid development of information technology, USB devices have become one of the most commonly used types of electronic devices due to their easy-to-use characteristics. The USB interface is currently the most common peripheral interface on PCs. Communicate with PC via USB interface. With the improvement of the protection performance of anti-virus software, malicious program attackers are no longer limited to using software programs such as viruses to attack, and malicious hardware made by using USB, a widely used universal interface, has begun to be valued by hackers. [0003] The large-s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56G06F21/57G06F21/71
CPCG06F21/55G06F21/56G06F21/57G06F21/71
Inventor 杨建国曹蕾金鑫朱玉梅李涛邱晓怡吴高其
Owner 成都立鑫新技术科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products