Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe USB flash disk and data active protection method thereof

A USB flash drive and security technology, applied in the direction of preventing unauthorized use of memory, etc., can solve the problem that USB flash drives cannot prevent unauthorized users from copying files without authorization, Trojan horses stealing USB flash drive data at will, so as to reduce use risks, enhance security, and protect physical security. Effect

Active Publication Date: 2012-11-28
CHANGSHA WENDUN INFORMATION TECH
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a safe USB flash drive and its data active protection method to solve the technical problem that the current USB flash drive cannot prevent unauthorized users from copying files and Trojan horses from stealing USB flash drive data at will

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe USB flash disk and data active protection method thereof
  • Safe USB flash disk and data active protection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] A. The administrator establishes the account number and password of the "Internet cafe" scenario user in the USB security control software, and sets its authority as "prevent file copying"; the security chip storage space stores the authority certificate of the "Internet cafe" scenario user;

[0066] B. The user connects the USB flash drive to the terminal in the Internet cafe, enters the account number and password of the "Internet cafe" scenario user, compares the USB flash drive with the authority certificate, and the match is qualified;

[0067] C. Click "Create New Document" on the USB flash drive;

[0068] D. The communication protocol module of the COS system compares the authority of the "Internet cafe" scenario user account in the USB security control software in the sandbox, and finds that creating new files is allowed;

[0069] E. A new document is created;

[0070] F. The computer Trojan attempts to copy the files on the USB flash drive;

[0071] G. The CO...

Embodiment 2

[0074] A. The bidder establishes the account number and password of the "bidding" scenario user in the USB security control software, and sets its authority as "prevent file copy, save, delete, modify, print; allow browsing", and the validity period of the certificate is 24 Hours; the storage space of the security chip stores the authority certificate of the "bidding" scenario user;

[0075] B. Send the USB flash drive and the account number and password of the "bidding" scenario user to the bidding party;

[0076] C. The tenderee connects the USB flash drive to the terminal, and the secure USB flash drive management software detects the environmental characteristics of the terminal where no virus or Trojan horse is running, and starts the sandbox control module; receives the input account and password of the "bidding" scenario user, and compares the USB flash drive Authority certificate, matching qualified;

[0077] C. Click "Open Document" on the USB flash drive;

[0078] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe USB flash disk and a data active protection method thereof. The safe USB flash disk comprises a safe main control chip, a chip operating system (COS) in a chip, a Flash memory and USB flash disk safe management software built in the Flash memory, wherein the COS system is used for storing and managing an authority certificate corresponding to a user; and the USB flash disk safe management software is used for monitoring and filtering various operations carried out on the USB flash disk by the user and a program, checking use environment and access authority of the USB flash disk equipment in cooperation with the COS system, controlling a unauthorized use behaviour of a USB flash disk data document which is deciphered to the memory and recording various key sensitive operations by adopting a memory sandbox technology. Since the USB flash disk adopts a hardware-software integrated protection technology, the safe access control of the USB flash disk is realized and users having different authorities have different USB flash disk data views and fine-grit operation authorities so that users can be prevented from privately copying documents and contents in the USB flash disk and the USB flash disk data is prevented from be destroyed and stole due to viruses and Trojans.

Description

technical field [0001] The invention relates to the field of mobile information storage, in particular to a safe flash drive and a data active protection method thereof. Background technique [0002] Because of its flexible and convenient use, USB flash drives have become an important mobile storage medium for information storage and transmission, and are also widely used in enterprises, institutions, governments and the military. However, the vulnerability of the USB flash drive in information security protection makes the stored important data related to personal privacy information, corporate business confidential information or government military confidential information face serious security threats. [0003] According to statistics, 30%-40% of the losses caused by various security breaches in recent years are caused by the leakage of electronic documents; more than 60% of the data theft cases are related to the loss or theft of mobile devices that store files. Accord...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14
Inventor 任江春
Owner CHANGSHA WENDUN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products