CN102622547A - Key based server data reading method - Google Patents
Key based server data reading method Download PDFInfo
- Publication number
- CN102622547A CN102622547A CN2012100670023A CN201210067002A CN102622547A CN 102622547 A CN102622547 A CN 102622547A CN 2012100670023 A CN2012100670023 A CN 2012100670023A CN 201210067002 A CN201210067002 A CN 201210067002A CN 102622547 A CN102622547 A CN 102622547A
- Authority
- CN
- China
- Prior art keywords
- server
- key
- disk
- usb key
- server data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a key based server data reading method. The method includes: any networked computer is accessed through an USB (universal serial bus) key, if USB key passes through authentication, a virtual disk can be added into a system and mapped into a server file directory, a user can read server data in the virtual disk, content written into the disk can be encrypted, and data read out from the disk can be decrypted; and if no authenticated USB key exists, mapping of the disk disappears, and the server data are inaccessible. The networked computer is accessed to read critical data in the server through the USB key under the condition of networking, the computer is dialed to a virtual private network for server authentication by the aid of the USB key, secret keys are downloaded, and the server data are mapped to a local computer for operation, so that the problem that the user on business needs to look up company files but concerns about file leakage is solved.
Description
Technical field
The invention belongs to the computer information safety technique field, relate in particular to a kind of server data read method based on key.
Background technology
Along with development of times; The notion of instant messages is more and more goed deep in people's the routine work and life; General people can be convenient for carrying some important or pending information stores and can use at any time on USB flash disk or other move medias; And for the people that go out to handle official business, go on business in the time of will checking company's file because the hidden danger of information security, more or less can there be the risk of information-leakage; Can't guarantee information be kept absolutely secret, fileinfo is in case the loss of revealing for enterprise also is difficult to the appraisal.
Summary of the invention
The present invention provides a kind of server data read method based on key; Under the situation of networking; Insert any network computer through USBkey and read significant data in the server, solved the problem of going on business and to check company's file and be afraid of the file leakage in the other places.
To achieve these goals, the present invention adopts following technical scheme:
A kind of server data read method based on key, wherein, said method step comprises:
Insert any network computer through USB key; If USB key authentication is passed through; System can add a virtual disk, and this disk is mapped in the server file catalogue, and the user can read server data in virtual disk; The content that is written to this disk can be encrypted, can decipher from the data that this disk is read; If there is not the USB key of authentication, the mapping of this disk disappears, and server data can't be visited.
Said server need be specified the position of protected catalogue on disk, protected catalogue is isolated from the outside, and can't not visit when USB key does not exist.
Said server file carries out encryption, even from Map Disk, be saved in local computing, does not have key can not visit equally.
Said method adopts USB key and password dual-identity authentication, and through the built-in tunnel Connection Service device authentication of USB key, authentication is through then creating network mapping.
The state of said server real-time monitoring USB key, when USB key does not exist, the cancellation network mapping.
Said server is examined the operation of protected catalogue, and decision allows still refusal operation according to authorization conditions.
A kind of server data read method based on key provided by the invention under the situation of networking, inserts any network computer through USB key and reads significant data in the server; Utilize USB key to dial in on the VPN, carry out server authentication, download key; And server data is mapped to the enterprising line operate of local computing, and the reading of file based on VPN, the file of company is with extraneous isolated; When not having USB key, mapping disappears, and the user can't read the data on the server; Even be kept at this locality,, still can not visit because file is through encryption.Solved the problem of going on business and to check company's file and be afraid of the file leakage in the other places.
Description of drawings
Fig. 1 is a principle of work synoptic diagram provided by the invention;
Embodiment
Specify the present invention below in conjunction with accompanying drawing, it explains principle of the present invention as the part of this instructions through embodiment, other aspects of the present invention, and characteristic and advantage thereof will become very clear through this detailed description.
As shown in Figure 1, a kind of server data read method based on key, wherein, said method step comprises:
Insert any network computer through USB key; If USB key authentication is passed through; System can add a virtual disk, and this disk is mapped in the server file catalogue, and the user can read server data in virtual disk; The content that is written to this disk can be encrypted, can decipher from the data that this disk is read; If there is not the USB key of authentication, the mapping of this disk disappears, and server data can't be visited.
Said server need be specified the position of protected catalogue on disk, protected catalogue is isolated from the outside, and can't not visit when USB key does not exist.
Said server file carries out encryption, even from Map Disk, be saved in local computing, does not have key can not visit equally.
Said method adopts USB key and password dual-identity authentication, and through the built-in tunnel Connection Service device authentication of USB key, authentication is through then creating network mapping.
The state of said server real-time monitoring USB key, when USB key does not exist, the cancellation network mapping.
Said server is examined the operation of protected catalogue, and decision allows still refusal operation according to authorization conditions.
Specifically implementation procedure (principle of work) is as follows:
At first, the keeper sets authority to different user and is saved on the server;
The user is inserted into the USB key that authorizes on the computer of networking outside, imports password, and is connected on the server through the mode of program built-in in the USB key with VPN;
Server carries out the authentication of identity and authority to the key that connects, and through after the authentication key being sent on the USBkey, and protected catalogue is mapped on the object computer;
The user relies on USB key, through network mapping disk access server file, the line operate of going forward side by side;
Server is examined user's operation, and decision allows still refusal operation according to authorization conditions;
After the user has operated file, extract USB key, server detects USB key and does not exist, and closes network mapping.
A kind of server data read method based on key provided by the invention under the situation of networking, inserts any network computer through USB key and reads significant data in the server; Utilize USB key to dial in on the VPN, carry out server authentication, download key; And server data is mapped to the enterprising line operate of local computing, and the reading of file based on VPN, the file of company is with extraneous isolated; When not having USB key, mapping disappears, and the user can't read the data on the server; Even be kept at this locality,, still can not visit because file is through encryption.Solved the problem of going on business and to check company's file and be afraid of the file leakage in the other places.
The above disclosed the preferred embodiments of the present invention that are merely can not limit the present invention's interest field certainly with this, so according to the equivalent variations that claim of the present invention is done, still belong to the scope that the present invention is contained.
Claims (6)
1. server data read method based on key is characterized in that said method step comprises:
Insert any network computer through USB key; If USB key authentication is passed through; System can add a virtual disk, and this disk is mapped in the server file catalogue, and the user can read server data in virtual disk; The content that is written to this disk can be encrypted, can decipher from the data that this disk is read; If there is not the USB key of authentication, the mapping of this disk disappears, and server data can't be visited.
Said server is examined the operation of protected catalogue, and decision allows still refusal operation according to authorization conditions.
2. the server data read method based on key as claimed in claim 1 is characterized in that, said server need be specified the position of protected catalogue on disk, and protected catalogue is isolated from the outside, and can't not visit when USB key does not exist.
3. the server data read method based on key as claimed in claim 1 is characterized in that said server file carries out encryption, even from Map Disk, be saved in local computing, does not have key can not visit equally.
4. the server data read method based on key as claimed in claim 1; It is characterized in that; Said method adopts USB key and password dual-identity authentication, and through the built-in tunnel Connection Service device authentication of USB key, authentication is through then creating network mapping.
5. the server data read method based on key as claimed in claim 1 is characterized in that, the state of said server real-time monitoring USB key, and when USB key does not exist, the cancellation network mapping.
6. the server data read method based on key as claimed in claim 1 is characterized in that said server is examined the operation of protected catalogue, and decision allows still refusal operation according to authorization conditions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012100670023A CN102622547A (en) | 2012-03-13 | 2012-03-13 | Key based server data reading method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012100670023A CN102622547A (en) | 2012-03-13 | 2012-03-13 | Key based server data reading method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102622547A true CN102622547A (en) | 2012-08-01 |
Family
ID=46562462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012100670023A Pending CN102622547A (en) | 2012-03-13 | 2012-03-13 | Key based server data reading method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102622547A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077359A (en) * | 2012-12-26 | 2013-05-01 | 华为技术有限公司 | Data decryption method, device and system |
CN103218573A (en) * | 2013-05-07 | 2013-07-24 | 安徽海加网络科技有限公司 | Traceless access controlling method and device based on protection of visual magnetic disc |
CN103400071A (en) * | 2013-07-31 | 2013-11-20 | 清华大学 | Network file system mounting method and system on basis of USB flash disc |
CN104951407A (en) * | 2014-03-24 | 2015-09-30 | 哈尔滨安天科技股份有限公司 | U disc capable of being encrypted and encryption method thereof |
CN105610810A (en) * | 2015-12-23 | 2016-05-25 | 北京奇虎科技有限公司 | Data processing method, client and servers |
CN110719266A (en) * | 2019-09-24 | 2020-01-21 | 陕西西部资信股份有限公司 | Credit data processing method and device |
CN112528319A (en) * | 2020-12-05 | 2021-03-19 | 江苏秉信科技有限公司 | Information local security caching method based on multiple authentications |
CN113536345A (en) * | 2021-07-15 | 2021-10-22 | 深圳市高德信通信股份有限公司 | Computer data security protection method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006084800A1 (en) * | 2005-02-09 | 2006-08-17 | Gemplus | Administration of a service application in a microcontroller card from a terminal |
CN102271042A (en) * | 2011-08-25 | 2011-12-07 | 北京神州绿盟信息安全科技股份有限公司 | Certificate authorization method, system, universal serial bus (USB) Key equipment and server |
-
2012
- 2012-03-13 CN CN2012100670023A patent/CN102622547A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006084800A1 (en) * | 2005-02-09 | 2006-08-17 | Gemplus | Administration of a service application in a microcontroller card from a terminal |
CN102271042A (en) * | 2011-08-25 | 2011-12-07 | 北京神州绿盟信息安全科技股份有限公司 | Certificate authorization method, system, universal serial bus (USB) Key equipment and server |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077359A (en) * | 2012-12-26 | 2013-05-01 | 华为技术有限公司 | Data decryption method, device and system |
CN103077359B (en) * | 2012-12-26 | 2015-12-23 | 华为技术有限公司 | Data decryption method and Apparatus and system |
CN103218573B (en) * | 2013-05-07 | 2016-12-28 | 安徽海加技术服务有限公司 | A kind of seamless access control method based on virtual disk protection and device |
CN103218573A (en) * | 2013-05-07 | 2013-07-24 | 安徽海加网络科技有限公司 | Traceless access controlling method and device based on protection of visual magnetic disc |
CN103400071A (en) * | 2013-07-31 | 2013-11-20 | 清华大学 | Network file system mounting method and system on basis of USB flash disc |
CN104951407A (en) * | 2014-03-24 | 2015-09-30 | 哈尔滨安天科技股份有限公司 | U disc capable of being encrypted and encryption method thereof |
CN104951407B (en) * | 2014-03-24 | 2017-11-28 | 哈尔滨安天科技股份有限公司 | One kind can encrypted U disk and its encryption method |
CN105610810A (en) * | 2015-12-23 | 2016-05-25 | 北京奇虎科技有限公司 | Data processing method, client and servers |
WO2017107956A1 (en) * | 2015-12-23 | 2017-06-29 | 北京奇虎科技有限公司 | Data processing method, client and server |
CN105610810B (en) * | 2015-12-23 | 2020-08-07 | 北京奇虎科技有限公司 | Data processing method, client and server |
CN110719266A (en) * | 2019-09-24 | 2020-01-21 | 陕西西部资信股份有限公司 | Credit data processing method and device |
CN110719266B (en) * | 2019-09-24 | 2022-05-17 | 陕西西部资信股份有限公司 | Credit data processing method and device |
CN112528319A (en) * | 2020-12-05 | 2021-03-19 | 江苏秉信科技有限公司 | Information local security caching method based on multiple authentications |
CN113536345A (en) * | 2021-07-15 | 2021-10-22 | 深圳市高德信通信股份有限公司 | Computer data security protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102622547A (en) | Key based server data reading method | |
CN101079882B (en) | Posture-based data protection | |
CN103886234B (en) | A kind of fail-safe computer based on encryption hard disk and data security control method thereof | |
CN104794388B (en) | application program access protection method and application program access protection device | |
CN101953111A (en) | System and method for securing data | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
CN106575342A (en) | Kernel program including relational data base, and method and device for executing said program | |
CN105740725A (en) | File protection method and system | |
CN102799831B (en) | Information safety protection system of application system based on database and information safety protection method | |
CN103634482A (en) | Safety protecting method for application software of portable intelligent equipment | |
CN107563213A (en) | A kind of safe and secret control device of anti-storage device data extraction | |
CN101815292B (en) | Device and method for protecting data of mobile terminal | |
CN102236607B (en) | Data security protection method and data security protection device | |
CN103336746A (en) | Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof | |
CN105631366A (en) | Encryption chip and encryption method therefor | |
CN105530637A (en) | Method for protecting subscriber privacy of intelligent terminal and intelligent terminal | |
CN107194237A (en) | Method, device, computer equipment and the storage medium of application security certification | |
CN106603726A (en) | Personal data distribution storage system based on mailboxes | |
CN104125223B (en) | A kind of security protection system of mobile device private data | |
CN103841097B (en) | A kind of safe NAS authentication methods based on digital certificate | |
CN111046405A (en) | Data processing method, device, equipment and storage medium | |
CN108287988B (en) | Security management system and method for mobile terminal file | |
CN101196967B (en) | U disk safety managing method | |
KR20100040074A (en) | Server and method for preventing information outflow from inside | |
CN102968588A (en) | Intelligent terminal system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120801 |