Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Divulging secret prevention U disk

An anti-leakage and privacy technology, applied in the direction of information storage, static memory, digital memory information, etc., can solve the problems of leaking enterprises, file proliferation, and difficulty in ensuring information security, so as to prevent illegal leakage and prevent the spread of malicious programs Effect

Inactive Publication Date: 2008-11-19
NANJING GOLDEN RULER SOFTWARE
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, financial information may be stored centrally on a server, and only authorized financial personnel can access it. If an authorized financial personnel accesses the files on the server of financial information, temporarily store them in their own computers, process them, and then upload them to the financial information. When the information server goes to the information server, the files temporarily stored in their own computers are easy to spread, and may even have the opportunity to be leaked outside the enterprise. This is a worrying and troublesome matter for the executives of the enterprise
Similar issues include: customer information, technical information of enterprises, sensitive information processed within the government, technical information of defense enterprises, etc., all of which need to be handled by authorized personnel such as secretaries and employees, and these information often remain on the computers of these employees In fact, these computer terminals have a large volume and a wide area, and the system environment is complex and varied, which can easily cause leakage
These measures often bring inconvenience to users, and the environment is complex and diverse, often leaving loopholes
Therefore, the usual measures such as user authentication and autonomous access control are difficult to guarantee the security of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Divulging secret prevention U disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] Comparing with accompanying drawing 1, its structure is that the output / input end of the USB control interface is connected with the input / output end of the controller correspondingly;

[0009] The USB control interface sets the data partition of the Flash memory, and the data partition includes a common area, a hidden area, and a private area.

[0010] The common area is implanted with a login program, and the common area is set as read-only. It makes it impossible for malicious programs to infect.

[0011] The said private area is to store user information and user authentication information, which cannot be read.

[0012] What is said is that the hidden area is the information embedded in the monitoring program, which is also unreadable.

[0013] Described controller uses USB controller (model CBM209X).

[0014] When in use, set the interface access password, so that malicious programs and non-administrators cannot directly read and write the data area of ​​the U ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-leakage U-disk. The I / O terminals of the USB control interface of the U-disk are correspondingly connected with the I / O terminals of a controller. The output terminals of the controller are correspondingly connected with the input terminals of a normal block, a hiding block and a private block. The anti-leakage U-disk has the advantages that: adopting a special USB controller with special control function and special read-write interfaces, the anti-leakage U-disk prevents malicious programs from contacting the files of the user, and unauthorized users can not access to the files. Malicious programs can not infect the anti-leakage U-disk, thus preventing the spreading of the malicious programs. The authentification information and the authorization message of the user are stored in the private block and unauthorized users have no access to information and message, thus totally avoiding authentification of the user through deciphering by software. The operation of the anti-leakage U-disk features that a plurality of monitoring points are inserted into the Windows inner core to monitor the data operation behavior of the user. Totally different from current encrypted U-disks, the anti-leakage U-disk described by the invention is capable of monitoring during the whole operation of the user so as to prevent illegal data leakage.

Description

technical field [0001] The invention relates to an anti-disclosure U disk used for protecting the confidentiality of information in a mobile memory, and belongs to the technical field of computer applications. technical background [0002] At present, the mainstream information security products in the market include access control: network and host firewalls, etc.; detection and protection: host and network intrusion detection and intrusion prevention systems, anti-virus and anti-trojan products, security audit products; cryptographic technology products: user authentication Products such as fingerprint identification products, password products, public key infrastructure and so on. In computers with widely used Windows operating systems, Unix operating systems, and Linux operating systems, these products can help identify users using the system, so that unauthorized users cannot enter the computer system. [0003] For an authorized user's behavior, the existing informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G11C7/24G11C7/10
Inventor 黄皓
Owner NANJING GOLDEN RULER SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products