[go: up one dir, main page]

CN101308700A - Divulging secret prevention U disk - Google Patents

Divulging secret prevention U disk Download PDF

Info

Publication number
CN101308700A
CN101308700A CNA200810123379XA CN200810123379A CN101308700A CN 101308700 A CN101308700 A CN 101308700A CN A200810123379X A CNA200810123379X A CN A200810123379XA CN 200810123379 A CN200810123379 A CN 200810123379A CN 101308700 A CN101308700 A CN 101308700A
Authority
CN
China
Prior art keywords
disk
user
leakage
information
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200810123379XA
Other languages
Chinese (zh)
Inventor
黄皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING GOLDEN RULER SOFTWARE CO Ltd
Original Assignee
NANJING GOLDEN RULER SOFTWARE CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING GOLDEN RULER SOFTWARE CO Ltd filed Critical NANJING GOLDEN RULER SOFTWARE CO Ltd
Priority to CNA200810123379XA priority Critical patent/CN101308700A/en
Publication of CN101308700A publication Critical patent/CN101308700A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-leakage U-disk. The I/O terminals of the USB control interface of the U-disk are correspondingly connected with the I/O terminals of a controller. The output terminals of the controller are correspondingly connected with the input terminals of a normal block, a hiding block and a private block. The anti-leakage U-disk has the advantages that: adopting a special USB controller with special control function and special read-write interfaces, the anti-leakage U-disk prevents malicious programs from contacting the files of the user, and unauthorized users can not access to the files. Malicious programs can not infect the anti-leakage U-disk, thus preventing the spreading of the malicious programs. The authentification information and the authorization message of the user are stored in the private block and unauthorized users have no access to information and message, thus totally avoiding authentification of the user through deciphering by software. The operation of the anti-leakage U-disk features that a plurality of monitoring points are inserted into the Windows inner core to monitor the data operation behavior of the user. Totally different from current encrypted U-disks, the anti-leakage U-disk described by the invention is capable of monitoring during the whole operation of the user so as to prevent illegal data leakage.

Description

Divulging secret prevention U disk
Technical field
What the present invention relates to is the Divulging secret prevention U disk that is used for mobile memory information Confidentiality protection, belongs to the Computer Applied Technology field.
Technical background
The safety information product of existing market main flow has the access control class: network and host firewall etc.; Detect the protection class: main frame and network invasion monitoring and intrusion prevention system (IPS), anti-virus anti-Trojan product, security audit product; Cryptographic technique series products: authentification of user series products such as fingerprint recognition product, password product, Public Key Infrastructure or the like.In the computing machine of widely used Windows operating system, Unix operating system, (SuSE) Linux OS, these products can help to discern the user of using system, make unauthorized user can not enter computer system.
For the user's of a mandate behavior, the protective equipment of existing information security is controlled just seldom.For example, financial information may be left concentratedly on a server, have only the financial staff of mandate to visit, if the financial staff of a mandate visits the file on the server of financial information, be temporarily stored in the computing machine of oneself, handle, and then upload to the financial information server and get on, the file that is temporarily stored in oneself the computing machine forms diffusion easily, even has the outside that chance is leaked to enterprise, and this is that the person in charge of enterprise worries and thorny thing.Similar problem comprises: the customer information of enterprise, technical information, the sensitive information of government's inter-process, technical information of National defense enterprise or the like, these information all need authorized persons such as secretary, employee to handle, and these information are often stayed on these employees' the computing machine, these terminals have a large capacity and a wide range, and system environments complexity, different very easily causes leakage.The way that solves this class problem at present mainly is the host terminal system reinforcement, the equipment of control computer terminal and input and output, anti-Trojan anti-virus, security audit or the like.These measures are often made troubles to the user, and circumstance complication is various, often leave leak.Therefore, measure such as common authentification of user, autonomous access control is difficult to the security of the information that ensures.
Summary of the invention
The Divulging secret prevention U disk that purpose of the present invention is intended to adopt the USB controller of special control function and special read-write interface to make.Use user's data to handle behavior by watchdog routine complete monitoring specific on this USB flash disk; The control strategy that the keeper formulates is set and thinks that the keeper provides using user's behavior audit by supervisory routine, the method for comprehensive software and hardware prevents that the information in the USB flash disk from illegally divulging a secret.
Technical solution of the present invention: corresponding the joining of I/O end that it is characterized in that output/input end with the controller of USB control interface; The output terminal of controller respectively with corresponding joining of input end of normal areas, hidden area, privacy areas.
Advantage of the present invention: first: make rogue program can't directly touch the user's data file by the USB controller that adopts special control function and special read-write interface, unauthorized user also can't touch subscriber data file.Rogue program just can't infect Divulging secret prevention U disk like this, has prevented the propagation of rogue program.Second: user's authentication information and authorization message are all in privacy areas, and unauthorized user can't obtain these information, have thoroughly stopped to walk around authentification of user by the mode that software cracks.The 3rd, the Divulging secret prevention U disk operation is to have inserted a plurality of control points in the Windows kernel, and the user's data operation behavior is used in monitoring, and is different fully with the theory of existing encrypted U disk, can carry out the monitoring of overall process, and the information that prevents is illegally revealed.
Description of drawings
Accompanying drawing 1 is the structural representation of Divulging secret prevention U disk.
Embodiment
Contrast accompanying drawing 1, its structure is corresponding the joining of I/O end of output/input end with the controller of USB control interface; The output terminal of controller respectively with corresponding joining of input end of normal areas, hidden area, privacy areas.
Described USB control interface is provided with the data partition of Flash storer, and this data partition comprises normal areas, hidden area, privacy areas.
Described normal areas is to implant landing program, and normal areas is configured to read-only.It can make rogue program infect.
Described privacy areas is to preserve user's information and user authentication information, and it can't read.
Described is that hidden area is the information of implant monitor program, and it also can't read.
Described controller USB controller (model C BM209X).
During use, the interface accessing password is set, like this data field that rogue program and non-administrator can't the direct read USB flash disks; By the control interface of USB the data partition of Flash storer is set, is divided into normal areas, hidden area, privacy areas; The user that can use Divulging secret prevention U disk is set, user's information and user authentication information is kept at privacy areas; The authority of authorized user is set, and authority is divided into: be limited in Divulging secret prevention U disk inediting file permission, copy file in the Divulging secret prevention U disk authority from computing machine, with the authority of the document copying in the Divulging secret prevention U disk in the computing machine, the authority of managing log information; Watchdog routine is implanted the hidden area of Divulging secret prevention U disk, and landing program is implanted normal areas, and normal areas is set to read-only.
The insertion of Divulging secret prevention U disk: according to the Divulging secret prevention U disk that said process is made, when inserting computing machine, operating system can only be discerned normal areas, and normal areas is read-only, and rogue program can't infect normal areas.Hidden partition and privacy areas are to read.
The use of authorized user: (1) user's first step is unique, and what can do is to carry out landing program to carry out authentification of user.(2) user loads watchdog routine by authentication back landing program, and operating under the watchdog routine of user carried out, and is subjected to strict control, and the flow direction of strict control data prevents leakage of data.
So the user has only by the landing program that is placed on normal areas and lands, after authentification of user, just can be by the data on service routine on the Divulging secret prevention U disk and the watchdog routine accesses disk.The watchdog routine of Divulging secret prevention U disk can be handled data according to the user of gerentocratic tactful complete monitoring Divulging secret prevention U disk: can forbid/allow using the user with other storage areas outside the USB flash disk of the copying data in the USB flash disk; Can forbid/allow using the user with the copying data outside the USB flash disk among USB flash disk; Can limit Divulging secret prevention U disk can use on which computing machine, and when using on the computing machine outside this scope, the watchdog routine of Divulging secret prevention U disk forbids opening the passage of hidden area and privacy areas, thereby can't use.
The keeper can be provided with the user of different authority such as data processing user, data importing user, data derivation user, audit user by supervisory routine, and access times, term of life, usable range, printing control, networking control strategy etc. are set.

Claims (5)

1, Divulging secret prevention U disk is characterized in that corresponding joining of I/O end of output/input end with the controller of USB control interface; The output terminal of controller respectively with corresponding joining of input end of normal areas, hidden area, privacy areas.
2, Divulging secret prevention U disk according to claim 1 is characterized in that described USB control interface is provided with the data partition of Flash storer, and this data partition comprises normal areas, hidden area, privacy areas.
3, Divulging secret prevention U disk according to claim 1 is characterized in that described normal areas is to implant landing program, and normal areas is configured to read-only.
4, Divulging secret prevention U disk according to claim 1 is characterized in that described privacy areas is to implant user's information and user authentication information, and it can't read.
5, Divulging secret prevention U disk according to claim 1, it is characterized in that described is that hidden area is the information of implant monitor program, it also can't read.
CNA200810123379XA 2008-06-16 2008-06-16 Divulging secret prevention U disk Pending CN101308700A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200810123379XA CN101308700A (en) 2008-06-16 2008-06-16 Divulging secret prevention U disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200810123379XA CN101308700A (en) 2008-06-16 2008-06-16 Divulging secret prevention U disk

Publications (1)

Publication Number Publication Date
CN101308700A true CN101308700A (en) 2008-11-19

Family

ID=40125087

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200810123379XA Pending CN101308700A (en) 2008-06-16 2008-06-16 Divulging secret prevention U disk

Country Status (1)

Country Link
CN (1) CN101308700A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807424A (en) * 2010-03-03 2010-08-18 孟晋 Multifunctional U disk and U disk system
CN103207976A (en) * 2013-01-25 2013-07-17 贵州信安达科技有限公司 Mobile storage file leakage-preventing method and confidential U-disk based on same
CN103390125A (en) * 2013-07-19 2013-11-13 丁贤根 Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal
CN103544419A (en) * 2012-07-17 2014-01-29 联想(北京)有限公司 Control method and electronic equipment
CN104064210A (en) * 2013-11-14 2014-09-24 苏州天趣信息科技有限公司 USB (universal serial bus) flash drive and using method thereof
CN107358110A (en) * 2017-07-24 2017-11-17 山东华芯半导体有限公司 Mobile terminal USB flash disk based on the close safety chip of state and its communication means with Android device
WO2020082811A1 (en) * 2018-10-26 2020-04-30 深圳大普微电子科技有限公司 Storage method and apparatus having hidden partition, and host device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807424A (en) * 2010-03-03 2010-08-18 孟晋 Multifunctional U disk and U disk system
CN101807424B (en) * 2010-03-03 2013-04-10 孟晋 Multifunctional USB flash disk and USB flash disk system
CN103544419A (en) * 2012-07-17 2014-01-29 联想(北京)有限公司 Control method and electronic equipment
CN103207976A (en) * 2013-01-25 2013-07-17 贵州信安达科技有限公司 Mobile storage file leakage-preventing method and confidential U-disk based on same
CN103207976B (en) * 2013-01-25 2016-04-27 贵州信安达科技有限公司 Mobile storage file prevents the method for divulging a secret and the secret USB flash disk based on the method
CN103390125A (en) * 2013-07-19 2013-11-13 丁贤根 Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal
CN103390125B (en) * 2013-07-19 2016-01-06 丁贤根 Design method of safety mobile storage controller using wireless terminal authorization and encryption and decryption
CN104064210A (en) * 2013-11-14 2014-09-24 苏州天趣信息科技有限公司 USB (universal serial bus) flash drive and using method thereof
CN107358110A (en) * 2017-07-24 2017-11-17 山东华芯半导体有限公司 Mobile terminal USB flash disk based on the close safety chip of state and its communication means with Android device
WO2020082811A1 (en) * 2018-10-26 2020-04-30 深圳大普微电子科技有限公司 Storage method and apparatus having hidden partition, and host device

Similar Documents

Publication Publication Date Title
JP7545419B2 (en) Ransomware Mitigation in Integrated and Isolated Applications
US11947688B2 (en) Secure computing system
US10162975B2 (en) Secure computing system
CN102034052B (en) Operation system architecture based on separation of permissions and implementation method thereof
CN110287739B (en) Data security management method and system based on hardware private key storage technology
US8782782B1 (en) Computer system with risk-based assessment and protection against harmful user activity
CN101308700A (en) Divulging secret prevention U disk
US20110126293A1 (en) System and method for contextual and behavioral based data access control
Kaghazgaran et al. Toward an Insider Threat Detection Framework Using Honey Permissions.
CN107273725A (en) A kind of data back up method and system for classified information
Peisert et al. Dynamic, flexible, and optimistic access control
CN102098313A (en) Waterproof wall system and authentication method thereof
DRAKE et al. Healthcare cybersecurity vulnerabilities
Lee et al. A study on a secure USB mechanism that prevents the exposure of authentication information for smart human care services
KR102004505B1 (en) System for real-time protection of computer storage devices using user behavior analysis and control method thereof
Simeon et al. Smart phone security threats and risk mitigation strategies
Cho et al. User credential cloning attacks in android applications: exploiting automatic login on android apps and mitigating strategies
Zeybek et al. A study on security awareness in mobile devices
RU2311676C2 (en) Method for providing access to objects of corporate network
CN112000953A (en) Big data terminal safety protection system
KR101636802B1 (en) File management method and system for preventing security incident by portable memory
RU2817533C1 (en) Method and system for unidirectional data transmission between computing devices
Guo et al. Research on risk analysis and security testing technology of mobile application in power system
KR20110098983A (en) Secure smartphones and solutions or programs that block hacking with removable IC card controls
Paul Identity-Centric Security for Cloud Workloads: A Zero-Trust Approach to Cyber Threats

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20081119