Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A encryption U disk system with journal and audits

A log, encryption and decryption module technology, applied in the direction of computing, computer security devices, instruments, etc., can solve the problems that data confidentiality is difficult to be reliably guaranteed, the problem of U disk usage auditing cannot be well solved, and the user cannot be known, etc. , to achieve the effect of preventing viruses

Inactive Publication Date: 2007-04-25
冯浩然 +3
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Through the analysis of the new security requirements, the existing solutions cannot solve the problem of U disk usage auditing well, that is, it is impossible to know what operations the user has performed on the disk, and who has operated the U disk
Also because only using a password lock, the confidentiality of data is difficult to be reliably guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A encryption U disk system with journal and audits
  • A encryption U disk system with journal and audits

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] A kind of encrypted U disk system with log strong audit proposed by the present invention, combined with drawings and embodiments, is described in detail as follows:

[0021] Overall composition structure of the present invention as shown in Figure 1, comprises the user layer and driver layer that are arranged on host computer (computer) end, and the U disk that is made of memory, safety control module and USB interface control module; U disk passes through standard USB interface Access to the host side, the user layer of the host side performs data and command interaction with the U disk through the USB bus (according to the USB protocol).

[0022] The composition of each component is described as follows:

[0023] user layer

[0024] The user layer provides an interactive interface for user operations, monitors user operations, generates log information and file read and write data to interact with the driver layer; the user layer includes an interactive interface mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a code U disc system with log check in computer information safety field, which comprises the following parts: user layer and drive layer set in host end; memory, safety control module and USB interface control module, wherein, the user layer is to provide interacting interface user operation to monitor user operation to generate log information and files read data and drive layer for interacting; one u disc for data coding and check.

Description

technical field [0001] The invention belongs to the field of computer information security, and in particular relates to the design of an encrypted U disk system capable of ensuring the safety of important data stored on the U disk and performing real-time and accurate log records on data operations performed by users. Background technique [0002] With the development of computer technology, computer storage media has gradually replaced paper as the main way of information storage. Paperless office has gradually become the main working method of the government, enterprises and military. However, in the current construction of various network systems, we often only care about the security of data transmitted on the network and the security of identity during access, while ignoring the security of information storage, especially the security of mobile storage media. This has become a new and urgent problem in the field of information security. [0003] The research on the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F21/00G06F9/44G06F11/00G06F21/50
Inventor 冯浩然胡建斌谢永强陈钟
Owner 冯浩然
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products