CN111428272A - Secure access method and device of mobile storage device and storage medium - Google Patents

Secure access method and device of mobile storage device and storage medium Download PDF

Info

Publication number
CN111428272A
CN111428272A CN202010319944.0A CN202010319944A CN111428272A CN 111428272 A CN111428272 A CN 111428272A CN 202010319944 A CN202010319944 A CN 202010319944A CN 111428272 A CN111428272 A CN 111428272A
Authority
CN
China
Prior art keywords
mobile storage
storage device
file
secure
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010319944.0A
Other languages
Chinese (zh)
Other versions
CN111428272B (en
Inventor
连以泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Rongan Networks Technology Co ltd
Original Assignee
Shenzhen Rongan Networks Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Rongan Networks Technology Co ltd filed Critical Shenzhen Rongan Networks Technology Co ltd
Priority to CN202010319944.0A priority Critical patent/CN111428272B/en
Publication of CN111428272A publication Critical patent/CN111428272A/en
Application granted granted Critical
Publication of CN111428272B publication Critical patent/CN111428272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a safe access method of mobile storage equipment, which comprises the following steps: after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a safe file directory table, wherein each file corresponding to the safe file directory table is a safe file; and generating a mapping relation table between the security file directory table and each security file so that the data access device can access the security files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device. The invention also discloses a device and a computer readable storage medium. The data access equipment indirectly accesses the mobile storage equipment through the file transmission equipment, the operation is simple and convenient, and the safety of the data access equipment is improved.

Description

Secure access method and device of mobile storage device and storage medium
Technical Field
The present invention relates to the field of mobile storage technologies, and in particular, to a secure access method and device for a mobile storage device, and a computer-readable storage medium.
Background
At present, mobile storage devices are widely applied to various fields, and have incomparable flexibility, compatibility and convenience. However, the problem that the mobile storage device is susceptible to infection and virus transmission is not solved well. In the prior art, the mobile storage device is connected to the host, and the access to the data completely depends on the host system and the antivirus software, so that if the mobile storage device carrying the virus file is connected to the data access device with a bug or lagging the antivirus software, the security of the data access device is low.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a secure access method and device of a mobile storage device and a computer readable storage medium, aiming at solving the problem of low security of a data access device.
In order to achieve the above object, the present invention provides a secure access method for a mobile storage device, where the secure access method for the mobile storage device includes the following steps:
after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a safe file directory table, wherein each file corresponding to the safe file directory table is a safe file;
and generating a mapping relation table between the security file directory table and each security file so that the data access device can access the security files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
Optionally, the step of scanning the mobile storage device to determine a secure file directory table includes:
scanning the mobile storage device to acquire virus files in the mobile storage device and a file directory table corresponding to each file in the mobile storage device;
and marking the directories corresponding to the virus files in the file directory table to obtain a safe file directory table.
Optionally, the step of obtaining the virus file in the mobile storage device includes:
and acquiring the virus file in the mobile storage device according to a detection report list, wherein the file transmission device scans the mobile storage device to obtain the detection report list.
Optionally, the step of scanning the mobile storage device to determine a secure file directory table further includes:
scanning the mobile storage equipment to acquire security files in the mobile storage equipment and a file directory table corresponding to each file in the mobile storage equipment;
and marking other directories except the directory corresponding to the security file in the file directory table to obtain a security file directory table.
Optionally, after the step of generating the mapping relationship table between the secure file directory table and each secure file, the method further includes:
and after the mapping relation table is generated, unloading the mobile storage device, wherein when the mobile storage device is accessed to the file transmission device, the mobile storage device is loaded on the file transmission device so that the file transmission device can scan files in the mobile storage device.
Optionally, after the step of generating the mapping relationship table between the secure file directory table and each secure file, the method further includes:
and storing the mapping relation table at the output end of the file transmission equipment.
Optionally, after the step of generating the mapping relationship table between the secure file directory table and each secure file, the method further includes:
and acquiring the equipment identifier of the mobile storage equipment, and storing the equipment identifier and the mapping relation table in an associated manner.
Optionally, after the step of scanning the mobile storage device to determine the secure file directory table, the method further includes:
acquiring a device identifier of the mobile storage device;
and when the equipment identifier is associated with a preset mapping relation table and a scanned security file directory table is inconsistent with a security directory table in the preset mapping relation table, executing the step of generating the mapping relation table between the security file directory table and each security file.
In order to achieve the above object, the present invention further provides a file transfer device, which includes a memory, a processor, and a security access program stored on the memory and operable on the processor, wherein the security access program of the device, when executed by the processor, implements the steps of the security access method of the mobile storage device of the device as described above.
Furthermore, the present invention also provides a computer readable storage medium, on which a security access program of a device is stored, which when executed by a processor implements the steps of the security access method of a mobile storage device of the device as described above.
The embodiment of the invention provides a safe access method and equipment of a mobile storage device and a computer readable storage medium, wherein the mobile storage device is connected to the data access device through the file transfer device, the file transfer device scans the mobile storage device to determine the safe file directory table after detecting the access of the mobile storage device, wherein, each file corresponding to the safe file directory table is a safe file, then a mapping relation table between the safe file directory table and each safe file is generated, the data access device accesses the security file in the mobile storage device based on the mapping relation table to ensure that when the mobile storage device accesses the file of the mobile storage device, only the safe file can be accessed, but the virus file cannot be accessed, and the safety of the data access equipment is high.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a first embodiment of a secure access method for a mobile storage device according to the present invention;
fig. 3 is a schematic flowchart of a second embodiment of a secure access method for a mobile storage device according to the present invention;
fig. 4 is a schematic flowchart of a third embodiment of a secure access method for a mobile storage device according to the present invention;
fig. 5 is a schematic flowchart of a fourth embodiment of a secure access method for a mobile storage device according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a safe file directory table, wherein each file corresponding to the safe file directory table is a safe file; and generating a mapping relation table between the security file directory table and each security file so that the data access device can access the security files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
As shown in fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
The device of the embodiment of the invention can be embedded system hardware, and can also be equipment such as a converter, a card reader and the like.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a CPU, a memory 1003, and a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The memory 1003 may be a high-speed RAM memory or a non-volatile memory (e.g., a disk memory). The memory 1003 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the device architecture shown in fig. 1 does not constitute a limitation of the secure access device of a mobile storage device and may include more or fewer components than shown, or some components in combination, or a different arrangement of components.
Referring to fig. 1, the memory 1003, which is a computer storage medium, may include an operating system, a network communication module, a user interface module, and a security access program.
In the device shown in fig. 1, the processor 1001 may be configured to call a secure access program stored in the memory 1003 and perform the following operations:
after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a safe file directory table, wherein each file corresponding to the safe file directory table is a safe file;
and generating a mapping relation table between the security file directory table and each security file so that the data access device can access the security files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
scanning the mobile storage device to acquire virus files in the mobile storage device and a file directory table corresponding to each file in the mobile storage device;
and marking the directories corresponding to the virus files in the file directory table to obtain a safe file directory table.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
and acquiring the virus file in the mobile storage device according to a detection report list, wherein the file transmission device scans the mobile storage device to obtain the detection report list.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
scanning the mobile storage equipment to acquire security files in the mobile storage equipment and a file directory table corresponding to each file in the mobile storage equipment;
and marking other directories except the directory corresponding to the security file in the file directory table to obtain a security file directory table.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
and after the mapping relation table is generated, unloading the mobile storage device, wherein when the mobile storage device is accessed to the file transmission device, the mobile storage device is loaded on the file transmission device so that the file transmission device can scan files in the mobile storage device.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
and storing the mapping relation table at the output end of the file transmission equipment.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
and acquiring the equipment identifier of the mobile storage equipment, and storing the equipment identifier and the mapping relation table in an associated manner.
In one embodiment, processor 1001 may invoke a secure access procedure stored in memory 1003, and further perform the following operations:
acquiring a device identifier of the mobile storage device;
and when the equipment identifier is associated with a preset mapping relation table and a scanned security file directory table is inconsistent with a security directory table in the preset mapping relation table, executing the step of generating the mapping relation table between the security file directory table and each security file.
Referring to fig. 2, the present invention provides a first embodiment of a secure access method for a mobile storage device, where the secure access method for the mobile storage device includes the following steps:
step S10, after detecting the access of the mobile storage device, the file transmission device scans the mobile storage device to determine a safe file directory table;
step S20, a mapping relationship table between the secure file directory table and each secure file is generated, so that the data access device accesses the secure file in the mobile storage device based on the mapping relationship table.
The execution device of this embodiment is a file transfer device, may be embedded system hardware, and is used to connect a mobile storage device and a data access device, where the data access device may be a device capable of accessing data in the mobile storage device, such as a PC, a smart phone, a tablet computer, and the like, the mobile storage device is connected to the data access device through the file transfer device, and the data access device indirectly accesses the mobile storage device through the execution device of this embodiment.
The execution device of this embodiment is provided with a secure access program, and generates a secure file directory table without viruses for the data access device to access after detecting that the mobile storage device is accessed, so that the data access device indirectly accesses the mobile storage device through the mapping relationship table in the execution device of this embodiment.
After detecting that the mobile storage device is accessed, the execution device of this embodiment scans the mobile storage device to determine a secure file directory table, where the secure directory table is a directory set of all secure files in the mobile device, that is, all files corresponding to the secure file directory table are secure files.
It can be understood that, after obtaining the secure file directory table, a mapping relationship table between the secure file directory table and each secure file is generated, and through the mapping relationship table, the data access device can access the corresponding secure file in the mobile storage device according to the secure file directory table, for example: the mapping relationship table may record addresses of the security files in the security file directory table, so that the data access device can access the security files in the mobile storage device based on the addresses. It is understood that the mapping relationship table is a mapping relationship between the secure file and a corresponding file directory table in the secure file directory table, and therefore, although directories of all files in the mobile storage device are also recorded in the secure file directory table, only directories corresponding to the secure file have a mapping relationship, that is, the data access device can look up all file directories in the mobile storage device, but only the secure file having a mapping relationship can be accessed.
In this embodiment, a mobile storage device is connected to a data access device through a file transfer device, the file transfer device scans the mobile storage device to determine a security file directory table after detecting that the mobile storage device is accessed, and generates a mapping relationship table between the security file directory table and each security file, so that the data access device accesses the security files in the mobile storage device based on the mapping relationship table, so that the data access device indirectly accesses the mobile storage device through the execution terminal of this embodiment, the operation is simple, and the mobile storage device is communicated to the data access device according to the mapping relationship table after being isolated by security scanning, thereby ensuring that virus files cannot run in the data access device.
In an embodiment, after the execution device of this embodiment generates a mapping relationship table between a secure file directory table and each secure file in the mobile storage device, the mobile storage device is uninstalled, where the uninstallation is to prevent a virus file in the mobile storage device from threatening the data access device.
In an embodiment, after the executing device of this embodiment generates a mapping relationship table between a secure file directory table and each secure file in the mobile storage device, the mapping relationship table is stored at an output end of the executing device of this embodiment, that is, an output end of the file transmission device, where the output end is connected to the data access device, and the stored mapping relationship table is used for the data access device to access the mobile storage device.
In an embodiment, after the executing device of this embodiment generates the mapping relationship table between the secure file directory table and each secure file, the file transmission device may further obtain a device identifier of the mobile storage device, and store the device identifier and the mapping relationship table in an associated manner, where the device identifier is used to identify the currently accessed mobile storage device.
Referring to fig. 3, a second embodiment of a secure access method for a mobile storage device according to the present invention is provided, where based on the embodiment shown in fig. 2, the step of scanning the mobile storage device to determine a secure file directory table includes:
step S11, after detecting the access of the mobile storage device, the file transmission device scans the mobile storage device to obtain the virus files in the mobile storage device and the file directory table corresponding to each file in the mobile storage device;
step S12, in the file directory table, marking the directory corresponding to each virus file to obtain a secure file directory table.
After detecting that the mobile storage device is accessed, scanning the mobile storage device, wherein the scanning comprises antivirus scanning and file directory tree structure scanning, the antivirus scanning is scanning files with viruses or illegal files in the mobile storage device, specifically, the file transmission device scans the mobile storage device to obtain the detection report list, and then obtains the files with viruses or illegal files in the mobile storage device according to the detection report list. The file directory tree structure scanning is to scan all files in the mobile storage device, and it can be understood that after the mobile storage device is subjected to antivirus scanning and file directory tree structure scanning, files with viruses in the mobile storage device and a file directory table corresponding to each file in the mobile storage device can be obtained, and the file directory table records directories of all files in the mobile storage device.
It can be understood that, after the file with the virus in the mobile storage device and the file directory table corresponding to each file in the mobile storage device are obtained, in the file directory table, each directory corresponding to the file with the virus or the illegal file is marked, so that the file directory table corresponding to the file with the virus or the illegal file cannot be accessed, and a secure file directory table is obtained, that is, only the secure file which is not marked in the secure file directory table can be accessed. Although the directories of all files in the mobile storage device are also recorded in the secure file directory table, only the files corresponding to the unmarked file directories can be accessed. For example: when the mapping relation table between the secure file directory table and each secure file is generated, the marked file directory does not generate the mapping relation, that is, the marked file directory does not have a corresponding file address.
In this embodiment, after it is detected that the mobile storage device is accessed, the mobile storage device is scanned to obtain the virus files in the mobile storage device and the file directory tables corresponding to the files in the mobile storage device, and directories corresponding to the virus files are marked in the file directory tables to obtain the secure file directory tables, so that the secure file directory tables are obtained according to the virus files and the file directory tables, the operation is simple and safe, and no security threat is generated on the data access device.
Referring to fig. 4, a third embodiment of the secure access method for a mobile storage device according to the present invention is provided, where based on the embodiment shown in fig. 2, the step of scanning the mobile storage device to determine a secure file directory table further includes:
step S13, after detecting the access of the mobile storage device, the file transmission device scans the mobile storage device to obtain the security files in the mobile storage device and the file directory table corresponding to each file in the mobile storage device;
step S14, marking other directories except the directory corresponding to the secure file in the file directory table to obtain a secure file directory table.
After detecting that the mobile storage device is accessed, the mobile storage device can be scanned to obtain the security files in the mobile storage device and the file directory table corresponding to each file in the mobile storage device, and the security file directory table is obtained by only reserving the file directory corresponding to the security files in the file directory table. The scanning includes antivirus scanning and file directory tree structure scanning, a detection report list is obtained according to the antivirus scanning, all the security files in the mobile storage device are recorded in the detection report list, a file directory table of all the files in the mobile storage device is obtained according to the file directory tree structure, and it can be understood that a security file directory table can be obtained by marking file directories which are not security files in the file directory table. Although directories of all files in the mobile storage device are recorded in the secure file directory table, only files corresponding to unmarked file directories in the secure file directory table can be accessed. For example: when the mapping relation table between the secure file directory table and each secure file is generated, the marked file directory does not generate the mapping relation, that is, the marked file directory does not have a corresponding file address.
In this embodiment, after it is detected that the mobile storage device is accessed, the mobile storage device is scanned to obtain the security files in the mobile storage device and the file directory tables corresponding to the files in the mobile storage device, and then directories corresponding to the security files are obtained in the file directory tables to obtain the security file directory tables, so that the security file directory tables are obtained according to the security files and the file directory tables, and the operation is simple and convenient.
Referring to fig. 5, a fourth embodiment of the secure access method for a mobile storage device according to the present invention is based on the embodiment shown in fig. 2, and after the step of scanning the mobile storage device to determine a secure file directory table, the method further includes:
step S30, obtaining the device identification of the mobile storage device;
step S20, when the device identifier is associated with a preset mapping relationship table and the scanned secure file directory table is inconsistent with a secure directory table in the preset mapping relationship table, executing the step of generating the mapping relationship table between the secure file directory table and each secure file.
After the mobile storage device is scanned to determine the secure file directory table, a device identifier of the mobile storage device may be obtained first, where the device identifier is used to identify whether the currently accessed mobile storage device is the last accessed mobile storage device. It can be understood that, when the device identifier is associated with a preset mapping relationship table, and the scanned secure file directory table is inconsistent with a secure directory table in the preset mapping relationship table, the step of generating the mapping relationship table between the secure file directory table and each secure file is executed. Optionally, when the device identifier is associated with a preset mapping relationship table, and the scanned security file directory table is consistent with a security directory table in the preset mapping relationship table, the stored mapping relationship table is directly called for the data access device to use. Optionally, when the device identifier is associated with no preset mapping relationship table, the step of generating the mapping relationship table between the secure file directory table and each secure file is performed.
In this embodiment, after the mobile storage device is scanned to determine the security file directory table, the device identifier of the mobile storage device may be obtained first, and when the device identifier is associated with a preset mapping relationship table and the scanned security file directory table is inconsistent with the security directory table in the preset mapping relationship table, the step of generating the mapping relationship table between the security file directory table and each security file is performed, so that the currently accessed mobile storage device is identified first, and then the mapping relationship table between the security file directory table and each security file is generated, which is simple and convenient to operate.
The invention also provides a file transfer device, which comprises a memory, a processor and a security access program stored on the memory and capable of running on the processor, wherein when the security access program of the device is executed by the processor, the steps of the security access method of the mobile storage device of the device are realized.
Furthermore, the present invention also provides a computer readable storage medium, on which a security access program of a device is stored, which when executed by a processor implements the steps of the security access method of a mobile storage device of the device as described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A secure access method of a mobile storage device, wherein the mobile storage device is connected to a data access device through a file transfer device, the secure access method of the mobile storage device comprising the following steps:
after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a safe file directory table, wherein each file corresponding to the safe file directory table is a safe file;
and generating a mapping relation table between the security file directory table and each security file so that the data access device can access the security files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
2. The method for secure access of a mobile storage device according to claim 1, wherein the step of scanning the mobile storage device to determine a secure file directory table comprises:
scanning the mobile storage device to acquire virus files in the mobile storage device and a file directory table corresponding to each file in the mobile storage device;
and marking the directories corresponding to the virus files in the file directory table to obtain a safe file directory table.
3. The method for secure access of a mobile storage device according to claim 2, wherein the step of obtaining the virus file in the mobile storage device comprises:
and acquiring the virus file in the mobile storage device according to a detection report list, wherein the file transmission device scans the mobile storage device to obtain the detection report list.
4. The method for secure access of a mobile storage device according to claim 1, wherein the step of scanning the mobile storage device to determine a secure file directory table further comprises:
scanning the mobile storage equipment to acquire security files in the mobile storage equipment and a file directory table corresponding to each file in the mobile storage equipment;
and marking other directories except the directory corresponding to the security file in the file directory table to obtain a security file directory table.
5. The method for secure access of a mobile storage device according to claim 1, wherein the step of generating a table of mapping relationships between the secure file directory table and each of the secure files further comprises:
and after the mapping relation table is generated, unloading the mobile storage device, wherein when the mobile storage device is accessed to the file transmission device, the mobile storage device is loaded on the file transmission device so that the file transmission device can scan files in the mobile storage device.
6. The method for secure access of a mobile storage device according to any of claims 1 to 5, wherein the step of generating a table of mapping relationships between the secure file directory table and each of the secure files is followed by further comprising:
and storing the mapping relation table at the output end of the file transmission equipment.
7. The method for secure access of a mobile storage device according to any of claims 1 to 5, wherein the step of generating a table of mapping relationships between the secure file directory table and each of the secure files is followed by further comprising:
and acquiring the equipment identifier of the mobile storage equipment, and storing the equipment identifier and the mapping relation table in an associated manner.
8. The method for secure access of a mobile storage device according to any of claims 1 to 5, wherein the step of scanning the mobile storage device to determine a secure file directory table further comprises:
acquiring a device identifier of the mobile storage device;
and when the equipment identifier is associated with a preset mapping relation table and a scanned security file directory table is inconsistent with a security directory table in the preset mapping relation table, executing the step of generating the mapping relation table between the security file directory table and each security file.
9. A file transfer device, characterized in that the device comprises a memory, a processor and a security access program stored on the memory and executable on the processor, the security access program of the device implementing the steps of the method for secure access of a mobile storage device of a device according to any of claims 1-8 when executed by the processor.
10. A computer-readable storage medium, on which a secure access program of a device is stored, which, when executed by a processor, implements the steps of a secure access method of a mobile storage device of a device according to any one of claims 1-8.
CN202010319944.0A 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium Active CN111428272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010319944.0A CN111428272B (en) 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010319944.0A CN111428272B (en) 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium

Publications (2)

Publication Number Publication Date
CN111428272A true CN111428272A (en) 2020-07-17
CN111428272B CN111428272B (en) 2023-06-06

Family

ID=71554286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010319944.0A Active CN111428272B (en) 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium

Country Status (1)

Country Link
CN (1) CN111428272B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609538A (en) * 2021-07-09 2021-11-05 国网福建省电力有限公司电力科学研究院 Access control method, device and equipment for mobile storage medium and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003083670A1 (en) * 2002-04-03 2003-10-09 Invisicom, Inc. Protection of data by hiding the data
US20070043747A1 (en) * 2005-08-17 2007-02-22 Microsoft Corporation Storage reports file system scanner
CN101350034A (en) * 2008-09-10 2009-01-21 普天信息技术研究院有限公司 Mobile memory apparatus and method for visiting file
CN101800738A (en) * 2009-12-31 2010-08-11 暨南大学 Realization system and method for safely visiting and storing intranet data by mobile equipment
US7814554B1 (en) * 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US7861302B1 (en) * 2000-11-17 2010-12-28 Emc Corporation Physical scanning of storage based apparatus for antivirus
WO2011095484A1 (en) * 2010-02-02 2011-08-11 Gemalto Sa Method of countermeasure against the installation-by-tearing of viruses onto a secure portable mass storage device
US8086688B1 (en) * 2008-05-16 2011-12-27 Quick Vault, Inc. Method and system for mobile data security
CN102799691A (en) * 2012-08-15 2012-11-28 深圳市宏电技术股份有限公司 File system conversion access method and file system conversion access equipment
US10169571B1 (en) * 2012-07-18 2019-01-01 Sequitur Labs, Inc. System and method for secure, policy-based access control for mobile computing devices
US20190042781A1 (en) * 2017-08-04 2019-02-07 Bitdefender IPR Management Ltd. Secure Storage Device
CN109857587A (en) * 2017-11-30 2019-06-07 西门子公司 Control method, device and the storage medium of movable storage device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7861302B1 (en) * 2000-11-17 2010-12-28 Emc Corporation Physical scanning of storage based apparatus for antivirus
WO2003083670A1 (en) * 2002-04-03 2003-10-09 Invisicom, Inc. Protection of data by hiding the data
US7814554B1 (en) * 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US20070043747A1 (en) * 2005-08-17 2007-02-22 Microsoft Corporation Storage reports file system scanner
US8086688B1 (en) * 2008-05-16 2011-12-27 Quick Vault, Inc. Method and system for mobile data security
CN101350034A (en) * 2008-09-10 2009-01-21 普天信息技术研究院有限公司 Mobile memory apparatus and method for visiting file
CN101800738A (en) * 2009-12-31 2010-08-11 暨南大学 Realization system and method for safely visiting and storing intranet data by mobile equipment
WO2011095484A1 (en) * 2010-02-02 2011-08-11 Gemalto Sa Method of countermeasure against the installation-by-tearing of viruses onto a secure portable mass storage device
US10169571B1 (en) * 2012-07-18 2019-01-01 Sequitur Labs, Inc. System and method for secure, policy-based access control for mobile computing devices
CN102799691A (en) * 2012-08-15 2012-11-28 深圳市宏电技术股份有限公司 File system conversion access method and file system conversion access equipment
US20190042781A1 (en) * 2017-08-04 2019-02-07 Bitdefender IPR Management Ltd. Secure Storage Device
CN109857587A (en) * 2017-11-30 2019-06-07 西门子公司 Control method, device and the storage medium of movable storage device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王亚文 等: "移动存储设备的安全保护系统设计", 《信息安全与技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609538A (en) * 2021-07-09 2021-11-05 国网福建省电力有限公司电力科学研究院 Access control method, device and equipment for mobile storage medium and storage medium
CN113609538B (en) * 2021-07-09 2024-03-08 国网福建省电力有限公司电力科学研究院 Access control method, device and equipment for mobile storage medium and storage medium

Also Published As

Publication number Publication date
CN111428272B (en) 2023-06-06

Similar Documents

Publication Publication Date Title
US9235703B2 (en) Virus scanning in a computer system
RU2551820C2 (en) Method and apparatus for detecting viruses in file system
CN101599947B (en) Trojan horse virus scanning method based on WEB page
RU2468426C2 (en) File conversion in restricted process
CN109583202B (en) System and method for detecting malicious code in address space of process
US6029256A (en) Method and system for allowing computer programs easy access to features of a virus scanning engine
CN109657488B (en) Resource file encryption processing method, intelligent terminal and storage medium
US20110271347A1 (en) Pre-boot firmware based virus scanner
US20130067577A1 (en) Malware scanning
US8572738B2 (en) On demand virus scan
CN109189496B (en) Dynamic library information acquisition method and device for application program
AU2017201667B2 (en) Secure document importation via portable media
EP2998902B1 (en) Method and apparatus for processing file
CN103473501A (en) Malware tracking method based on cloud safety
US7860850B2 (en) Scanning files using direct file system access
CN103679027A (en) Searching and killing method and device for kernel level malware
US20080028462A1 (en) System and method for loading and analyzing files
CN111428272B (en) Secure access method and device for mobile storage device and storage medium
CN105095758A (en) Processing method and device for lock-screen application program and mobile terminal
US8347389B2 (en) System for protecting devices against virus attacks
CN114564158A (en) Method, device, equipment and medium for controlling document printing under Linux system
US11397812B2 (en) System and method for categorization of .NET applications
US10169582B2 (en) System, method, and computer program product for identifying a file used to automatically launch content as unwanted
CN105095754A (en) Method, device and mobile terminal for processing virus applications
US9787699B2 (en) Malware detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant