Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information configuration method and device in data safety prevention and control

A technology for information configuration and data security, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as huge complexity, unsatisfactory effect, increasing mobile storage devices infected by viruses or Trojan horses, etc., to ensure system security and realize data security. The effect of prevention and control

Inactive Publication Date: 2012-10-17
CHINA DIGITAL VIDEO BEIJING
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This greatly increases the chance of mobile storage devices being infected by viruses or Trojan horses
On the other hand, for some specific work fields, the computer network systems involved are becoming larger and more complex, which provides an extremely convenient channel for the spread of viruses and increases the difficulty of data security protection.
[0004] Although major computer security service providers and mobile storage device suppliers have adopted some measures to prevent and control the access of mobile storage devices, the effect is not satisfactory, and the prevention and control of mobile storage device security is still a difficult problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information configuration method and device in data safety prevention and control
  • Information configuration method and device in data safety prevention and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It should be noted that the described embodiments are only part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] There are many types of mobile storage devices accessed by terminals, which can be various types of mobile storage devices such as U disks and Blu-ray cards. However, in practical applications, some terminals often only allow access to fixed data devices. The present invention provides a Access prevention and control of mobile storage devices is performed by configuring the configuration information list of data storage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information configuration method in data safety prevention and control. The method comprises the following steps of: detecting whether the local has configuration information which is used for identifying the authority of data equipment, if not, loading the configuration, if yes, judging whether the configuration is required for updating or not; when the data equipment is plugged, identifying the authority of data equipment according to the configuration information; and generating an operating log according to the identification result and storing at the local. By utilizing the method and system, the safety of the access system can be ensured, and the purpose of data safety prevention and control of mobile storage devices can be achieved.

Description

technical field [0001] The invention relates to TV program production and broadcasting technology in the field of radio and television, in particular to an information configuration method and device in data security prevention and control. Background technique [0002] Mobile storage devices are more and more widely used in various fields, and the types of mobile storage devices are also very rich. While bringing great convenience to work and life, it also brings great security risks. [0003] In the prior art, on the one hand, a terminal only needs to have the driver and related configurations of the mobile storage device (some mobile devices do not even need a driver or such drivers have been integrated in the terminal operating system), and the mobile storage device for read / write operations. This has just greatly increased the chance that removable storage device is infected by virus or trojan horse. On the other hand, for some specific work fields, the computer netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 芦怡鹏闫鹏
Owner CHINA DIGITAL VIDEO BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products