CN101542452B - 外部存储设备的认证方法、设备和系统 - Google Patents
外部存储设备的认证方法、设备和系统 Download PDFInfo
- Publication number
- CN101542452B CN101542452B CN200680056202.1A CN200680056202A CN101542452B CN 101542452 B CN101542452 B CN 101542452B CN 200680056202 A CN200680056202 A CN 200680056202A CN 101542452 B CN101542452 B CN 101542452B
- Authority
- CN
- China
- Prior art keywords
- memory device
- flash memory
- authenticate key
- usb flash
- external usb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000004044 response Effects 0.000 claims description 10
- 238000012795 verification Methods 0.000 description 7
- 238000012544 monitoring process Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 241000700605 Viruses Species 0.000 description 3
- 238000002955 isolation Methods 0.000 description 3
- 230000000505 pernicious effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- SAPGTCDSBGMXCD-UHFFFAOYSA-N (2-chlorophenyl)-(4-fluorophenyl)-pyrimidin-5-ylmethanol Chemical compound C=1N=CN=CC=1C(C=1C(=CC=CC=1)Cl)(O)C1=CC=C(F)C=C1 SAPGTCDSBGMXCD-UHFFFAOYSA-N 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 230000003612 virological effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/043—Masking or blinding of tables, e.g. lookup, substitution or mapping
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
一种可操作地连接到主机(10)端口上的外部存储设备(16)的认证方法,其中所述主机(10)与所述外部存储设备(16)进行握手,查找来自所述外部存储设备的认证密钥。如果认证密钥不正确或者未在预定的时间内提供,所述主机(10)电气地将所述外部存储设备(16)由主机(10)断开。如果所述认证密钥正确和在预定时间内提供,所述主机(10)允许利用所述外部存储设备(16)对所述主机(10)的接入。本发明同样提供了相应的设备和系统。
Description
技术领域
本发明涉及一种外部存储设备的认证方法、设备和系统,尤其涉及,但不局限于,一种利用主机阻止外部存储设备的未经认证的使用的方法、设备和系统。
背景技术
市场上有多种外部存储设备。其中包括光学存储设备,例如硬盘驱动,闪存存储设备,包括USB闪存驱动。可使用不同标准的接口将这些外部存储设备连接到主机上,包括但不限于,USB,火线或PCMCIA。同样存在专用接口,例如,“记忆棒”接口,SD卡接口等等。
由于下载速度可相当高,且存储设备的外形尺寸变得相当小,因此给各公司的安全和机密造成了巨大的威胁。这种威胁包括对敏感或者机密信息的未经认证的复制,携带有病毒的恶意或者恶性应用的上传等等。例如,公司的员工可轻易的携带不易被发现的小型USB闪存驱动。它可插入到任何公司计算机的USB端口上,以下载及保存敏感或机密的数据;和/或通过所有的病毒过滤器以上传病毒。而公司没有任何的办法来控制这种情况,除非他们屏蔽所有的外部接口,物理地关闭所有外部接口,或者禁止用户具有从公司计算机系统下载数据或者向公司计算机系统上传数据的能力。而这样做,将会对有权进行这些行为的员工产生明显的限制作用。
发明内容
根据本发明的第一优选方面,本发明提供了一种可操作地连接到主机端口上的外部存储设备的认证方法。所述方法包括:主机与外部存储设备进行握手,查找来自所述外部存储设备的认证密钥;如果所述认证密钥至少是选自下述组合之一,将所述外部存储设备由所述主机上电气地断开,所述组合包括:不正确,以及在预定的时间内没有提供;如果所述密钥是正确的或者在预定的时间内提供,允许利用外部存储设备对主机的接入;
通过以下方式将所述认证密钥分配给不具有认证密钥的外部存储设备:询问所述不具有认证密钥的外部存储设备是否需要认证密钥,如果在预定的时间内得到了肯定的响应,检查所述外部存储设备;如果所述外部存储设备是清楚的,向所述外部存储设备分配所述认证密钥。
根据本发明的第二优选方面,本发明提供了一种利用外部存储设备的连接器,能可操作地连接到主机的端口上的外部存储设备。所述外部存储设备包括:认证模块,用于与主机的认证应用进行通信;所述认证模块配置成包括认证密钥,所述认证密钥是用来发送给认证应用以用于所述外部存储设备的认证;
其中,通过以下方式将所述认证密钥分配给不具有认证密钥的外部存储设备:询问所述不具有认证密钥的外部存储设备是否需要认证密钥,如果在预定的时间内得到了肯定的响应,检查所述外部存储设备;如果所述外部存储设备是清楚的,向所述外部存储设备分配所述认证密钥。
根据本发明的第三优选方面,本发明提供了一种认证系统,该认证系统用于对利用外部存储设备的连接器能可操作地连接到主机的端口上的外部存储设备的认证。所述外部存储设备包括:认证模块,用于与主机的认证应用进行通信;所述认证模块配置成包括认证密钥,所述认证密钥是用来发送给认证应用以用于所述外部存储设备的认证;
其中,通过以下方式将所述认证密钥分配给不具有认证密钥的外部存储设备:询问所述不具有认证密钥的外部存储设备是否需要认证密钥,如果在预定的时间内得到了肯定的响应,检查所述外部存储设备;如果所述外部存储设备是清楚的,向所述外部存储设备分配所述认证密钥。
对于上述所有方面,正确的认证密钥可保存在查找表中。所述查找表可保存在主机或主机所连接的网络的服务器中。所述认证密钥可由特殊用户,特殊主机,主机所连接的网络的特殊终端中的至少一个所限制。所述特殊用户可通过登录密码确定,所述主机可通过主机标识所确定,所述网络的特殊终端可由网络终端标识确定。所述用户登录密码,主机标识和网络终端标识可保存在所述查找表中。
对主机的接入,可由主机特定的应用或特定的数据进行限制,所述限制保存在所述查找表中。对网络的接入,可由特定的应用或特定的数据进行限制,所述限制保存在所述查找表中。
对所述外部存储设备的检查可至少包括下述的一个:外部存储设备标识,用户标识,主机标识,网络终端标识,以及对病毒或其他恶性应用或数据的检测。
所述认证模块可在所述认证密钥发送到所述外部存储设备之前,下载到所述外部存储设备。
在收到的响应是否定的或者在预定的时间内没有收到响应时,所述外部存储设备可电气地与所述主机断开。
附图说明
为了本发明可以被充分地理解并且易于实现,在此将参考相应的附图,对本发明的优选实施例进行描述,但本发明并不局限于此。
在附图中:
图1是要与实施例主机一起使用的实施例外部存储设备的透视图;
图2是图1所示的外部存储设备的框图;
图3是图1所示的主机的部分框图;
图4是本发明实施例的流程图;
图5是本发明又一实施例的流程图。
具体实施方式
首先参照图1,示出了与局域网(LAN)12连接的计算机10。所述计算机10具有一定数量的接口14,所述接口用于连接外部存储设备,例如USB闪存存储设备16。通过利用所述外部存储设备16,数据可由所述计算机10和/或网络12下载,和/或数据可上传到所述计算机10和/或网络12。如图所示,所述外部存储设备16具有连接器18,在此实施例中,所述连接器18是USB连接器。可是,所述连接器可以是能可操作地与一个或多个端口14适配的任何合适的连接器。
在图2中,详细的显示了所述外部存储设备16。所述设备16具有连接器接口20以及存储器22。所述存储器可以是硬盘,闪存或者其他需要的或合适的存储器。所述存储器22由存储器控制器26所控制。微处理器24控制所述设备16的全部操作。认证模块28用于所述设备16的认证。所述认证模块可以是固件,可以包括在所述微处理器24中,或者可以在与所述微处理器24相互独立的处理器中。
所述计算机10包括控制器30,所述控制器30包括当所述连接器18可操作地插入到一个端口14中时,能够与所述认证模块28通信的认证应用32。所述应用32可阻止通过可操作地连接到任何一个端口14并且没有经过认证的外部存储设备16对所述计算机10和/或网络12的任何系统的接入;但是,所述应用32将允许通过可操作地连接到任何一个端口14且已通过认证的外部存储设备16对所述计算机10和/或网络12的任何系统的接入。认证通过登录密码局限于特殊的个体和/或通过计算机标识局限于特殊的计算机。
通过所述设备16与计算机10的可操作的连接,可通过多种方式实现认证。所述设备16可事先以经过认证,其中此情况下的认证的过程在图4中描述。当所述设备16可操作地连接到计算机10上,存在对设备16的另外一种认证方式,所述认证能够依赖所述设备16的后续应用。此过程在图5中显示。
优选的,所述设备16的所有初始认证,无论是否是关于特定的用户和/或计算机的,都是通过管理员完成的,其中所述管理员具有允许所述设备16与所述计算机10和/或网络12功能性的相互作用的功能和能力,以及认证不是由它们发布但是能够被认证的设备16的功能和能力。对于图5所示的实施例,所有后续的认证都是通过图4所示的过程完成的。
参照图4,当所述计算机10启动时,所述认证应用32自动开始(401)。除了上述的管理员外,它在与用户接入隔绝的计算机10中运行。这样,用户就不能篡改,干扰,阻碍或者阻止所述应用32的运行。这可按照其他正常的在计算机10上运行的“安全的”应用的相同方式操作。所述应用32包括,监测模块34,所述监测模块34监测端口14以检测所述外部存储设备16何时连接到任何一个端口14上(402)。例如,这可通过顺序的轮询端口14来完成(403)。如果没有检测到任何插入(404),继续轮询。当检测到设备16插入到一个端口14中时(405),所述应用32将试图通过进行挑战和响应的方式与所述设备16建立认证握手(406)。如果所述设备16在计算机10启动前就已经插入到端口14中,处理方式相同,通过所述存储设备16对计算机10和/或网络12的接入将会被拒绝,直到发生认证过程。
在认证过程(406)中,所述应用32要求所述设备16提供认证密码或密钥。如果由所述认证模块28提供认证密码或密钥(407),所述应用32将会检测当前认证密码或密钥的查找表,以确定所述认证密码或密钥是否列在所述查找表中(408)。如果匹配(409),所述设备16可接入到所述计算机10和/或网络12(410)。所述查找表可包括限制(411)。例如,所述设备16的认证密钥或密码可链接到特殊的个体和/或计算机10。这可参照用户登录密码,以及所述计算机10和/或所述计算机10连接的网络12的终端的标识来检查。接入可限制在计算机10和/或网络12的特定的应用和/或数据。如果存在限制,所述应用32检查所述查找表以确保它们是正确的(412)。
如果所述认证模块28在步骤(407)处的握手过程中不能准确的响应所述应用32,或者如果步骤(409)处不存在匹配,或者步骤(412)处的限制不正确,所述应用32将立即将所述设备16由所述计算机10电气地断开,或者隔离,以防止所述设备16对所述计算机10和/或网络12的任何系统的接入(413)。可是,所述设备16可仍插入在端口14中。
在图5所示的实施例中,在认证过程中,可存在设备16的认证。对于同样的处理过程使用相同的附图标记,但是前缀数字由4变到了5。
再次,当所述计算机10启动时,所述认证应用32自动开始(501)。除了上述的管理员外,它在与用户接入隔绝的计算机10中运行。这样,用户就不能篡改,干扰,阻碍或者阻止所述应用32的运行。这可按照其他正常的在计算机10上运行的“安全的”应用的相同方式操作。所述应用32同样包括,监测模块34,所述监测模块34监测端口14以检测所述外部存储设备16何时连接到任何一个端口14上(502)。例如,这可通过顺序的轮询端口14来完成(503)。如果没有检测到任何插入(504),继续轮询。当检测到设备16插入到一个端口14中时(505),所述应用32将试图通过进行挑战和响应的方式与所述设备16建立认证握手(506)。如果所述设备16在计算器10启动前就已经插入到端口14中,处理方式相同,通过所述存储设备16对计算机10和/或网络12的接入将会被拒绝,直到发生认证过程。
在认证过程(506)中,所述应用32要求所述设备16提供认证密码或密钥。如果所述认证模块28提供认证密码或密钥(507),所述应用32将会检测当前认证密码或密钥的查找表,以确定所述认证密码或密钥列在所述查找表中(508)。如果匹配(509),所述设备16可接入到所述计算机10和/或网络12(510)。所述查找表可包括限制(511)。例如,所述设备16的认证密钥或密码可链接到特殊的个体和/或计算机10。这可参照用户登录密码,以及所述计算机10和/或所述计算机10所连接的网络12的终端的标识来检查。接入可限制在计算机10和/或网络12的特定的应用和/或数据。如果存在限制,所述应用32检查所述查找表以确保它们是正确的(512)。
如果所述认证模块28由于所述设备16事先没有进行认证而在步骤(507)处的握手过程中不能准确的响应所述应用32,认证可通过由所述应用32到设备16之间的查询实现(517)。这将显示在监测器上,并且需要用户输入。如果在预定的时间内,例如30秒内没有响应,或者响应是否定的,所述应用32将立即将所述设备16由所述计算机10电气地断开,或者隔离,以防止所述设备16对所述计算机10和/或网络12的任何系统的接入(515)。可是,所述设备16可仍插入在端口14中。
如果在步骤515处,响应是在预定的时间内并且是肯定的,所述应用32将检查所述设备16。这可至少包括:设备标识,用户标识,计算机标识,以及网络终端标识;并且还可包括对病毒或其他恶性的应用或数据的扫描。如果全部都是有序的,所述管理员可为设备16分配密钥,并在所述查找中记录所述密钥。对于用户和/或计算机/终端的限制可在此时产生,并包括在所述查找表中。如果事先没有下载,必要的模块28将随后下载到设备16中。所述应用然后将所述密钥发送到设备16中,以存储在所述认证模块28或存储器22中。在产生的限制的范围内,将授权对于计算机10和/或网络12的接入。
如果在步骤(509)处不存在匹配,或者步骤(512)处的限制不正确,所述应用32将立即将所述设备16由所述计算机10电气地断开,或者隔离,以防止所述设备16对所述计算机10和/或网络12的任何系统的接入(513)。可是,所述设备16可仍插入在端口14中。
所述查找表可保存在所述主机10中或由所述管理员保存。如果所述计算机10连接到网络12上,所述查找表优选的保存在网络12的服务器中,并再次由管理员保存。可是,无论所述计算机10是否连接到网络12中,所述应用32都保存在所述计算机10中。
在前面的描述中描述本发明的优选实施例的同时,在不离开本发明的前提下,对于本领域技术人员来说,在设计、结构和/或操作的细节上所作的变形种改变是可以理解到的。
Claims (11)
1.一种对连接到网络上第一主机的一个端口上的外部USB闪存存储设备的认证方法,所述方法包括:
所述第一主机与所述外部USB闪存存储设备进行认证握手,查找来自所述外部USB闪存存储设备的认证密钥,其中,正确的认证密钥存储在查找表中,所述查找表包括限制,所述限制用于对网络的特定应用或者特定数据的接入;
如果所述认证密钥不是正确的认证密钥,将所述外部USB闪存存储设备由所述第一主机上电气地断开;
如果所述认证密钥是正确的认证密钥并且在第一预定时间内被提供,允许利用所述外部USB闪存存储设备对第一主机的接入;
通过以下方式将认证密钥分配给事先没有进行初始认证的外部USB闪存存储设备:询问所述事先没有进行初始认证的外部USB闪存存储设备是否分配认证密钥,如果在第二预定的时间内得到了肯定的响应,检查所述事先没有进行初始认证的外部USB闪存存储设备的标识;所述标识选自:外部USB闪存存储设备标识,用户标识,主机标识,和网络终端标识;如果所述事先没有进行初始认证的外部USB闪存存储设备的标识都是可用的,向所述事先没有进行初始认证的外部USB闪存存储设备分配正确的认证密钥;其中由于对于正确的认证密钥,对网络的接入限制在特定应用或者特定数据,当正确的认证密钥被分配时,限制是依据所述外部USB闪存存储设备的标识的。
2.根据权利要求1所述的方法,其中,所述正确的认证密钥由选自以下组合中的至少一个进行限制,所述组合包括:特殊用户,所述第一主机,所述第一主机连接的网络的特殊终端。
3.根据权利要求2所述的方法,其中,所述特殊用户由用户登录密码确定,所述第一主机由主机标识确定,所述网络的特殊终端由网络终端标识确定。
4.根据权利要求3所述的方法,其中,所述用户登录密码,所述第一主机标识以及所述网络终端标识存储在所述查找表中。
5.根据权利要求1-4任一所述的方法,其中,一认证模块在将所述认证密钥发送到所述外部USB闪存存储设备之前下载到所述外部USB闪存存储设备中。
6.一种利用外部存储设备的连接器认证连接到网络上的第一主机的端口上的外部USB闪存存储设备的系统,所述系统包括外部USB闪存存储设备以及第一主机,所述外部USB闪存存储设备包括:认证模块,用于与第一主机的认证应用模块进行通信;
所述认证模块配置成包括认证密钥,所述认证密钥是用来发送给认证应用模块以用于所述外部USB闪存存储设备的认证,其中正确的认证密钥存储在查找表中,所述查找表包括限制,所述限制用于对网络的特定应用或者特定数据的接入;
当所述正确的认证密钥在第一预定时间内分配给所述外部USB闪存存储设备,其中由于对于正确的认证密钥,对网络的接入限制在特定的应用或者特定的数据,限制是依据选自于下述组合的标识的;所述组合包括:外部存储设备标识,用户标识,主机标识,和网络终端标识;
当在第一预定时间内没有提供认证密钥,通过以下方式将认证密钥分配给事先没有进行初始认证的外部USB闪存存储设备:询问所述事先没有进行初始认证的外部USB闪存存储设备是否分配认证密钥,如果在第二预定的时间内得到了肯定的响应,检查所述事先没有进行初始认证的外部USB闪存存储设备的标识;所述标识选自:外部USB闪存存储设备标识,用户标识,主机标识,和网络终端标识;如果所述事先没有进行初始认证的外部USB闪存存储设备的标识都是可用的,向所述事先没有进行初始认证的外部USB闪存存储设备分配正确的认证密钥。
7.根据权利要求6所述的系统,其中,所述第一主机与外部USB闪存存储设备进行认证握手,查找来自所述外部USB闪存存储设备的认证密钥,并确定所述认证密钥是否为正确的认证密钥。
8.根据权利要求6所述的系统,其中,所述正确的认证密钥存储在保存在第一主机或所述第一主机连接的网络的服务器中的查找表中。
9.根据权利要求7所述的系统,其中,所述正确的认证密钥由选自以下组合中的至少一个进行限制,所述组合包括:特殊用户,所述第一主机,所述第一主机连接的网络的特殊终端。
10.根据权利要求9所述的系统,其中,所述特殊用户由用户登录密码确定,所述第一主机由主机标识确定,所述网络的特殊终端由网络终端标识确定。
11.根据权利要求10所述的系统,其中,所述用户登录密码,所述主机标识,所述网络终端标识存储在所述查找表中。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2006/000296 WO2008041950A2 (en) | 2006-10-04 | 2006-10-04 | Method, apparatus and system for authentication of external storage devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101542452A CN101542452A (zh) | 2009-09-23 |
CN101542452B true CN101542452B (zh) | 2016-04-20 |
Family
ID=39268917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200680056202.1A Expired - Fee Related CN101542452B (zh) | 2006-10-04 | 2006-10-04 | 外部存储设备的认证方法、设备和系统 |
Country Status (8)
Country | Link |
---|---|
US (1) | US8412865B2 (zh) |
EP (1) | EP2080100A4 (zh) |
JP (1) | JP5087088B2 (zh) |
KR (1) | KR101052128B1 (zh) |
CN (1) | CN101542452B (zh) |
SG (1) | SG176471A1 (zh) |
TW (1) | TWI389006B (zh) |
WO (1) | WO2008041950A2 (zh) |
Families Citing this family (182)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US8898788B1 (en) | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US9027135B1 (en) | 2004-04-01 | 2015-05-05 | Fireeye, Inc. | Prospective client identification using malware attack detection |
US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
US8566946B1 (en) | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US20100011442A1 (en) * | 2008-07-09 | 2010-01-14 | Sumwintek Corp. | Data security device for preventing the spreading of malware |
US8850571B2 (en) | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
US8997219B2 (en) | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
KR101129380B1 (ko) * | 2008-12-01 | 2012-03-27 | 한국전자통신연구원 | 외부 저장장치로부터 컨텐츠를 제공받는 디지털 컨텐츠 제공 장치 및 그 방법 |
US8943409B2 (en) * | 2008-12-26 | 2015-01-27 | Sandisk Il Ltd. | Storage device managing playable content |
US8166067B2 (en) * | 2008-12-26 | 2012-04-24 | Sandisk Il Ltd. | Method and apparatus for providing access to files based on user identity |
US20100169395A1 (en) * | 2008-12-26 | 2010-07-01 | Sandisk Il Ltd. | Device and method for filtering a file system |
US8239395B2 (en) * | 2008-12-26 | 2012-08-07 | Sandisk Il Ltd. | Storage device presenting to hosts only files compatible with a defined host capability |
DE102009036863A1 (de) * | 2009-08-10 | 2011-02-17 | Bizerba Gmbh & Co Kg | Verfahren zum Betrieb eines Messgeräts |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US8561207B2 (en) * | 2010-08-20 | 2013-10-15 | Apple Inc. | Authenticating a multiple interface device on an enumerated bus |
US9519782B2 (en) | 2012-02-24 | 2016-12-13 | Fireeye, Inc. | Detecting malicious network content |
US8641545B2 (en) * | 2012-03-06 | 2014-02-04 | Brunswick Bowling & Billiards Corporation | Distributed scoring system |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US8990944B1 (en) | 2013-02-23 | 2015-03-24 | Fireeye, Inc. | Systems and methods for automatically detecting backdoors |
US9009823B1 (en) | 2013-02-23 | 2015-04-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications installed on mobile devices |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
US9009822B1 (en) | 2013-02-23 | 2015-04-14 | Fireeye, Inc. | Framework for multi-phase analysis of mobile applications |
US9159035B1 (en) | 2013-02-23 | 2015-10-13 | Fireeye, Inc. | Framework for computer application analysis of sensitive information tracking |
US9824209B1 (en) | 2013-02-23 | 2017-11-21 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications that is usable to harden in the field code |
US9367681B1 (en) | 2013-02-23 | 2016-06-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
US9176843B1 (en) | 2013-02-23 | 2015-11-03 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications |
US9565202B1 (en) | 2013-03-13 | 2017-02-07 | Fireeye, Inc. | System and method for detecting exfiltration content |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9355247B1 (en) | 2013-03-13 | 2016-05-31 | Fireeye, Inc. | File extraction from memory dump for malicious content analysis |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9430646B1 (en) | 2013-03-14 | 2016-08-30 | Fireeye, Inc. | Distributed systems and methods for automatically detecting unknown bots and botnets |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9251343B1 (en) | 2013-03-15 | 2016-02-02 | Fireeye, Inc. | Detecting bootkits resident on compromised computers |
WO2014145805A1 (en) | 2013-03-15 | 2014-09-18 | Mandiant, Llc | System and method employing structured intelligence to verify and contain threats at endpoints |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
US10133863B2 (en) | 2013-06-24 | 2018-11-20 | Fireeye, Inc. | Zero-day discovery system |
US9536091B2 (en) | 2013-06-24 | 2017-01-03 | Fireeye, Inc. | System and method for detecting time-bomb malware |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9888016B1 (en) | 2013-06-28 | 2018-02-06 | Fireeye, Inc. | System and method for detecting phishing using password prediction |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US9294501B2 (en) | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US10192052B1 (en) | 2013-09-30 | 2019-01-29 | Fireeye, Inc. | System, apparatus and method for classifying a file as malicious using static scanning |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US10089461B1 (en) | 2013-09-30 | 2018-10-02 | Fireeye, Inc. | Page replacement code injection |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9921978B1 (en) | 2013-11-08 | 2018-03-20 | Fireeye, Inc. | System and method for enhanced security of storage devices |
US9189627B1 (en) | 2013-11-21 | 2015-11-17 | Fireeye, Inc. | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection |
JP6273800B2 (ja) | 2013-11-29 | 2018-02-07 | 株式会社リコー | 画像投影装置、画像投影システム及びプログラム |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9740857B2 (en) | 2014-01-16 | 2017-08-22 | Fireeye, Inc. | Threat-aware microvisor |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9432389B1 (en) | 2014-03-31 | 2016-08-30 | Fireeye, Inc. | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
US9973531B1 (en) | 2014-06-06 | 2018-05-15 | Fireeye, Inc. | Shellcode detection |
US9438623B1 (en) | 2014-06-06 | 2016-09-06 | Fireeye, Inc. | Computer exploit detection using heap spray pattern matching |
US9594912B1 (en) | 2014-06-06 | 2017-03-14 | Fireeye, Inc. | Return-oriented programming detection |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US9363280B1 (en) | 2014-08-22 | 2016-06-07 | Fireeye, Inc. | System and method of detecting delivery of malware using cross-customer data |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US10075455B2 (en) | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US9690606B1 (en) | 2015-03-25 | 2017-06-27 | Fireeye, Inc. | Selective system call monitoring |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US9438613B1 (en) | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US9594904B1 (en) | 2015-04-23 | 2017-03-14 | Fireeye, Inc. | Detecting malware based on reflection |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US10176321B2 (en) | 2015-09-22 | 2019-01-08 | Fireeye, Inc. | Leveraging behavior-based rules for malware family classification |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US9825976B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Detection and classification of exploit kits |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US10284575B2 (en) | 2015-11-10 | 2019-05-07 | Fireeye, Inc. | Launcher for setting analysis environment variations for malware detection |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
US10621338B1 (en) | 2015-12-30 | 2020-04-14 | Fireeye, Inc. | Method to detect forgery and exploits using last branch recording registers |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US9824216B1 (en) | 2015-12-31 | 2017-11-21 | Fireeye, Inc. | Susceptible environment detection system |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10616266B1 (en) | 2016-03-25 | 2020-04-07 | Fireeye, Inc. | Distributed malware detection system and submission workflow thereof |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US9779405B1 (en) * | 2016-09-26 | 2017-10-03 | Stripe, Inc. | Systems and methods for authenticating a user commerce account associated with a merchant of a commerce platform |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US11023575B2 (en) * | 2017-06-26 | 2021-06-01 | Fortinet, Inc. | Security sanitization of USB devices |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US20210155949A1 (en) * | 2018-04-18 | 2021-05-27 | Pioneer Hi-Bred International, Inc. | Improving agronomic characteristics in maize by modification of endogenous mads box transcription factors |
EP3781693A4 (en) | 2018-04-18 | 2022-01-05 | Pioneer Hi-Bred International, Inc. | GENES, CONSTRUCTIONS AND ACTIVITY OF CORN DP-202216-6 |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
CN109542808B (zh) * | 2018-10-19 | 2020-12-18 | 华为技术有限公司 | 控制硬盘接入的方法和装置 |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
US11176251B1 (en) | 2018-12-21 | 2021-11-16 | Fireeye, Inc. | Determining malware via symbolic function hash analysis |
US11743290B2 (en) | 2018-12-21 | 2023-08-29 | Fireeye Security Holdings Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
US12074887B1 (en) | 2018-12-21 | 2024-08-27 | Musarubra Us Llc | System and method for selectively processing content after identification and removal of malicious content |
US11601444B1 (en) | 2018-12-31 | 2023-03-07 | Fireeye Security Holdings Us Llc | Automated system for triage of customer issues |
US11310238B1 (en) | 2019-03-26 | 2022-04-19 | FireEye Security Holdings, Inc. | System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources |
US11677786B1 (en) | 2019-03-29 | 2023-06-13 | Fireeye Security Holdings Us Llc | System and method for detecting and protecting against cybersecurity attacks on servers |
US11636198B1 (en) | 2019-03-30 | 2023-04-25 | Fireeye Security Holdings Us Llc | System and method for cybersecurity analyzer update and concurrent management system |
TWI741294B (zh) * | 2019-05-10 | 2021-10-01 | 新加坡商核智科技私人有限公司 | 用於執行存取裝置之控制系統及其方法 |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US12200013B2 (en) | 2019-08-07 | 2025-01-14 | Musarubra Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
US11838300B1 (en) | 2019-12-24 | 2023-12-05 | Musarubra Us Llc | Run-time configurable cybersecurity system |
US11522884B1 (en) | 2019-12-24 | 2022-12-06 | Fireeye Security Holdings Us Llc | Subscription and key management system |
US11436327B1 (en) | 2019-12-24 | 2022-09-06 | Fireeye Security Holdings Us Llc | System and method for circumventing evasive code for cyberthreat detection |
CN111414652A (zh) * | 2020-03-15 | 2020-07-14 | 黎明职业大学 | 一种计算机与存储设备相互绑定认证系统及其装置 |
EP3916600A1 (en) | 2020-05-27 | 2021-12-01 | Mettler-Toledo (Albstadt) GmbH | Method for operating an electronic data processing system and electronic data processing system |
CN112052201A (zh) * | 2020-09-27 | 2020-12-08 | 中孚安全技术有限公司 | 一种基于Linux内核层实现的USB设备管控方法与系统 |
CN117744173B (zh) * | 2023-12-25 | 2025-03-04 | 山东东益通通信技术有限公司 | 一种sip用户防盗打装置及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778421A (en) * | 1992-11-26 | 1998-07-07 | Nintendo Co., Ltd. | Information processing system which can check disk-like storage medium having prescribed relation therewith and disk-like storage medium therefor |
CN1435761A (zh) * | 2002-01-29 | 2003-08-13 | 记忆科技(深圳)有限公司 | 能够实现在线离线加解密的移动数据存储设备 |
CN1459168A (zh) * | 2001-03-22 | 2003-11-26 | 大日本印刷株式会社 | 便携式信息记录介质及其验证方法 |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3844648B2 (ja) | 1994-05-24 | 2006-11-15 | ソニー株式会社 | 受信装置及び受信方法 |
US5774821A (en) * | 1994-11-25 | 1998-06-30 | Itt Automotive Europe Gmbh | System for driving stability control |
JP2000187647A (ja) * | 1998-12-21 | 2000-07-04 | Fuji Electric Co Ltd | ネットワークシステムのユーザの認証方法、ネットワークコンピュータにおける使用環境設定方法、ネットワークに接続されたサーバのアクセス方法、ネットワークコンピュータ及びプログラムを記録した記録媒体 |
IL149804A0 (en) * | 1999-12-07 | 2002-11-10 | Pace Anti Piracy Inc | Portable authorization device for authorizing use of protected information and associated method |
US7032240B1 (en) * | 1999-12-07 | 2006-04-18 | Pace Anti-Piracy, Inc. | Portable authorization device for authorizing use of protected information and associated method |
JP4486199B2 (ja) * | 2000-01-13 | 2010-06-23 | カシオ計算機株式会社 | 携帯端末装置、サーバ装置及び記録媒体 |
US6901511B1 (en) * | 2000-01-13 | 2005-05-31 | Casio Computer Co., Ltd. | Portable terminals, servers, systems, and their program recording mediums |
JP2002312326A (ja) | 2001-04-17 | 2002-10-25 | Smart Card Technologies:Kk | Usbインターフェイスを備える電子デバイスを用いた複数認証方法 |
US20030063750A1 (en) | 2001-09-26 | 2003-04-03 | Alexander Medvinsky | Unique on-line provisioning of user terminals allowing user authentication |
JP2003216585A (ja) * | 2002-01-18 | 2003-07-31 | Dainippon Printing Co Ltd | 認証アプリケーション、管理アプリケーション、要認証アプリケーション及びicカード |
DE10211036A1 (de) | 2002-03-13 | 2003-10-09 | Fujitsu Siemens Computers Gmbh | Zugangsschutz |
KR100888471B1 (ko) * | 2002-07-05 | 2009-03-12 | 삼성전자주식회사 | 링크 접속권한을 등급화 한 암호화 키 차등분배방법 및이를 이용한 로밍방법 |
TW588243B (en) * | 2002-07-31 | 2004-05-21 | Trek 2000 Int Ltd | System and method for authentication |
JP2004086584A (ja) | 2002-08-27 | 2004-03-18 | Ntt Comware Corp | パーソナルコンピュータにおける認証装置 |
US7475240B2 (en) * | 2002-11-06 | 2009-01-06 | Symantec Corporation | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems |
AU2003221069A1 (en) | 2003-03-25 | 2004-10-18 | Kenichi Miyamoto | Authentication card and wireless authentication system for mutual authentication using the authentication card |
CN1302382C (zh) * | 2003-06-13 | 2007-02-28 | 联想(北京)有限公司 | 基于usb闪存盘存储介质私有空间的验证方法 |
DE10336246A1 (de) * | 2003-08-07 | 2005-03-10 | Fujitsu Siemens Computers Gmbh | Verfahren zur Sicherung eines Computersystems |
JP4397675B2 (ja) * | 2003-11-12 | 2010-01-13 | 株式会社日立製作所 | 計算機システム |
TWI261175B (en) | 2004-02-27 | 2006-09-01 | Faraday Tech Corp | Method for authentication of USB OTG product |
JP4097623B2 (ja) * | 2004-04-26 | 2008-06-11 | システムニーズ株式会社 | 本人認証インフラストラクチャシステム |
US20050251589A1 (en) | 2004-05-04 | 2005-11-10 | Jung-Chung Wang | Method of authenticating universal serail bus on-the-go device |
KR100976040B1 (ko) * | 2004-06-01 | 2010-08-18 | 에스케이 텔레콤주식회사 | Usb 저장장치를 이용한 사용자 인증 방법과 시스템 |
JP2006092081A (ja) * | 2004-09-22 | 2006-04-06 | Hitachi Software Eng Co Ltd | 不特定者または多数者が利用するパソコンの安全な起動利用方法及びそのような利用を実現する記録媒体 |
KR100618386B1 (ko) * | 2004-10-18 | 2006-08-31 | 삼성전자주식회사 | 하드디스크드라이브의 사용제한이 가능한 화상형성장치 및그 하드디스크드라이브의 사용제한방법 |
JP4709556B2 (ja) * | 2005-01-13 | 2011-06-22 | 株式会社東芝 | 端末機器に装着される電子装置及び通信システム |
JP2006221566A (ja) * | 2005-02-14 | 2006-08-24 | Dainippon Printing Co Ltd | ネットワークを利用した介護サービス支援システム |
JP3799379B1 (ja) | 2005-11-24 | 2006-07-19 | クオリティ株式会社 | 情報処理システム |
US20080148057A1 (en) * | 2006-12-19 | 2008-06-19 | Ohanae, Inc. | Security token |
-
2006
- 2006-10-04 CN CN200680056202.1A patent/CN101542452B/zh not_active Expired - Fee Related
- 2006-10-04 KR KR1020097009240A patent/KR101052128B1/ko not_active Expired - Fee Related
- 2006-10-04 EP EP06799859A patent/EP2080100A4/en not_active Withdrawn
- 2006-10-04 US US12/444,569 patent/US8412865B2/en active Active
- 2006-10-04 SG SG2011082385A patent/SG176471A1/en unknown
- 2006-10-04 WO PCT/SG2006/000296 patent/WO2008041950A2/en active Search and Examination
- 2006-10-04 JP JP2009531359A patent/JP5087088B2/ja not_active Expired - Fee Related
-
2007
- 2007-10-04 TW TW096137224A patent/TWI389006B/zh not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778421A (en) * | 1992-11-26 | 1998-07-07 | Nintendo Co., Ltd. | Information processing system which can check disk-like storage medium having prescribed relation therewith and disk-like storage medium therefor |
CN1459168A (zh) * | 2001-03-22 | 2003-11-26 | 大日本印刷株式会社 | 便携式信息记录介质及其验证方法 |
CN1435761A (zh) * | 2002-01-29 | 2003-08-13 | 记忆科技(深圳)有限公司 | 能够实现在线离线加解密的移动数据存储设备 |
Also Published As
Publication number | Publication date |
---|---|
KR20090094240A (ko) | 2009-09-04 |
CN101542452A (zh) | 2009-09-23 |
SG176471A1 (en) | 2011-12-29 |
TWI389006B (zh) | 2013-03-11 |
TW200834374A (en) | 2008-08-16 |
WO2008041950A2 (en) | 2008-04-10 |
JP5087088B2 (ja) | 2012-11-28 |
KR101052128B1 (ko) | 2011-07-26 |
EP2080100A4 (en) | 2011-03-02 |
US20100017546A1 (en) | 2010-01-21 |
JP2010506292A (ja) | 2010-02-25 |
WO2008041950A3 (en) | 2008-05-22 |
EP2080100A2 (en) | 2009-07-22 |
US8412865B2 (en) | 2013-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101542452B (zh) | 外部存储设备的认证方法、设备和系统 | |
Shwartz et al. | Reverse engineering IoT devices: Effective techniques and methods | |
CN102521165B (zh) | 安全优盘及其识别方法和装置 | |
EP1362271B1 (en) | Portable encryption keys in a network environment | |
CN100587677C (zh) | 数据处理设备和数据处理方法 | |
CN105184179B (zh) | 嵌入式加密移动存储设备及其操作方法 | |
CN108293044A (zh) | 用于经由域名服务流量分析来检测恶意软件感染的系统和方法 | |
CN102422304A (zh) | 指纹扫描器 | |
KR102311336B1 (ko) | 안전 저장소 접근정보를 보호하는 위치고정형 사물인터넷 기기 및 위치고정형 사물인터넷 기기의 안전 저장소 접근정보를 보호하는 방법 | |
US7409563B2 (en) | Method and apparatus for preventing un-authorized attachment of computer peripherals | |
CN100435061C (zh) | 用于释放对计算机系统或程序的访问的方法 | |
EP2650816A1 (en) | User authentication | |
US10250778B2 (en) | Distributed smart card reader for multifunction printer | |
KR20080099117A (ko) | 임베디드 시스템에서 이동성 요소의 인증을 위한 방법 | |
CN108322907B (zh) | 一种开卡方法及终端 | |
CN111292488A (zh) | 图像数据的处理方法、装置及存储介质 | |
CN106850562A (zh) | 一种恶意外设检测系统及方法 | |
CN108322444B (zh) | 命令与控制信道的检测方法、装置和系统 | |
US11737155B2 (en) | Communication with a data storage device using an emulated Wi-Fi captive portal | |
CN108268796B (zh) | 一种基于离线密码的离线管理方法及装置 | |
CN204613946U (zh) | 一种安全的usbhub和sd/tf卡读卡器复合设备 | |
CN104134025A (zh) | 基于sim卡的移动终端加锁方法、装置及移动终端 | |
CN107169381A (zh) | 信息处理装置及对装置中安装加密单元进行辨别的方法 | |
CN115114492B (zh) | 信息查询方法、安全模组、系统、设备和程序产品 | |
CN118233195A (zh) | 服务器信息获取方法、装置、设备和存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160420 Termination date: 20171004 |