Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Read-write access control method for plug-in memory device

A storage device, plug-and-play technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve the problems of complicating filter driver program and driver program

Inactive Publication Date: 2006-09-27
NANJING UNIV +1
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are also some security products that control the access of various peripheral storage devices through programs, and simply allow or prohibit the use of peripheral storage devices
[0003] The read and write access of plug-and-play storage devices must be controlled, which is an important measure to ensure the security of intranet information. However, due to the complexity of the lower-level drivers of peripheral storage devices, such as writing filter drivers for each peripheral device is too complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Read-write access control method for plug-in memory device
  • Read-write access control method for plug-in memory device
  • Read-write access control method for plug-in memory device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with accompanying drawing and specific embodiment:

[0027] see figure 1 , the specific execution monitoring system we implemented is composed of six modules, of which five modules are in the application layer, including configuration auditing, monitoring management, log collection, kernel communication, and device plugging monitoring, and the filter driver module works in the kernel layer.

[0028] Since this embodiment is a functional component of a larger monitoring system, the two modules of configuration audit and kernel communication are not necessary modules of the present invention, but for the convenience of use and the unified implementation of design and coding , the abstraction performed.

[0029] see figure 2 , the configuration of the audit module is for the system to communicate with the outside world, such as the user interface or the remote management terminal to communicate, the un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a read-write access control method for plug and play memory device. Wherein, configuring application security policy for the device by a control desk module; using a detection module to real-time detect the device and notify the kernel to start filter device for monitor; realizing the exact operation to access to monitor for the plug-play device according to strategy by a file system filter drive part module; detecting the device removal by the former detection module to notify kernel unload filter device and stop monitor. Besides, the system comprises an application layer for detecting device state and a kernel layer for monitor.

Description

technical field [0001] The invention relates to a method for controlling read and write access of a plug-and-play storage device, in particular to manage the safe use of various removable storage devices under a host platform to ensure the information security of the host, and belongs to the field of computer information security. Background technique [0002] Large-capacity mobile storage devices (such as USB hard drives, tape storage devices, etc.) are widely used to make information transmission more convenient and fast. If their use cannot be effectively controlled, there will be serious problems in the security of intranet information. How to effectively use peripheral storage devices Control is becoming more and more urgent. For the safe use of peripheral storage devices, the existing Windows system can provide simple read and write control for specific types of devices, such as allowing administrators to set the USB flash memory, tape, floppy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/50
Inventor 伍卫民胡静谢俊元谢立
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products