CN101051293A - Access control method for personal computer storage space - Google Patents

Access control method for personal computer storage space Download PDF

Info

Publication number
CN101051293A
CN101051293A CNA2007100279734A CN200710027973A CN101051293A CN 101051293 A CN101051293 A CN 101051293A CN A2007100279734 A CNA2007100279734 A CN A2007100279734A CN 200710027973 A CN200710027973 A CN 200710027973A CN 101051293 A CN101051293 A CN 101051293A
Authority
CN
China
Prior art keywords
identifying code
space
storer
secret
storage space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100279734A
Other languages
Chinese (zh)
Inventor
李根森
柯宗庆
柯宗贵
郑少荣
陈文浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG
Original Assignee
TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG filed Critical TIANWEI DIGITAL CODES TECH Co Ltd GUANGDONG
Priority to CNA2007100279734A priority Critical patent/CN101051293A/en
Publication of CN101051293A publication Critical patent/CN101051293A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for controlling access to storage space of personal computer includes making a section of storage be secret space being set to be state of refusing access, setting fit verification code separately in said storage and an external device with assigned port, checking verification code in storage with that of external device when external device is switched in with said assigned port and if external device is set with verification code then setting said secret space to be state of allowing access if verification codes are fitted to each other.

Description

Access control method to the PC storage space
Technical field
The present invention relates to access control method, forbid having no right the user and steal the purpose of private data to reach to the PC storage space.
Background technology
Generally speaking, the storer of a PC (personal computer) allows to be visited by Any user, if but the data storage that needs to maintain secrecy is arranged in the storer of PC, then each is attempted to visit the request of private data, all should carry out strict authority audit, to can't being refused, to guarantee that private data is not revealed by the request of access of authentication.Secrecy provision commonly used at present is that when the user sent request of access, system ejected the identifying code input frame, the input media that the user carries by PC (for example keyboard) input validation sign indicating number, this identifying code is checked by system, has only identifying code to coincide, and just allows private data accessed.The defective of this secrecy provision is that its identifying code is used the method for exhaustion easily and attempts one by one and cracked, have multiple special decryption software now on the internet at this time slot scrambling, during running software, automatically attempt identifying code according to the order of setting, coincide the visit that just is opened of the space of storage security data until identifying code.As seen, the secrecy provision that this time slot scrambling provided performs practically no function in face of decryption software, and identifying code just is cracked easily.
Summary of the invention
The objective of the invention is under the prerequisite of the normal use of unclassified data in not influencing the PC storer, solution is used for the technical matters of the identifying code easy crack of private data access authority verification, thereby the storage space of one section safety is provided for private data.
Be head it off, the present invention provides the access control method to the PC storage space, the storage space of described PC originally is in the state accessed by the user that allows, the step of this method comprises: mark off one section as secret space in storer, accessed state is arranged to refuse in secret space; The identifying code that setting matches is stored in one of described storer neutralization respectively and can inserts in the external unit of this machine of PC designated port; When external unit inserts the designated port of this machine of PC, if this external unit has identifying code, just check neutralize identifying code in this external unit of storer, have only identifying code to coincide, just accessed state is arranged to allow in secret space.
The input media input validation sign indicating number that secrecy provision in the background technology allows the user directly to carry by computing machine; The present invention then is set in identifying code to be verified in the described external unit, the user can only allow PC read identifying code in the external unit by the mode that this external unit is inserted this machine of PC designated port, this just makes that the people who does not hold this external unit can't the input validation sign indicating number, also just can't visit secret space, solve the technical matters of identifying code easy crack.Because the present invention only marks off one section as secret space in storer, other storage space that the user who does not hold this external unit is not still normally marked in the reference-to storage is operated unclassified data.
Description of drawings
Accompanying drawing is the state data memory synoptic diagram of the storage space of the storage space of PC and the external unit that can insert this machine of PC designated port.
Embodiment
The storage space of PC originally is in and allows state accessed by the user, now marks off one section as secret space, as shown in drawings, accessed state is arranged to refuse in secret space.The identifying code that setting matches is stored in one of described storer neutralization respectively and can inserts in the external unit of this machine of PC designated port, and the memory device with the band USB port is an example here.Other sets second section identifying code and is stored in the storer.Two sections identifying codes in the storer for example are used technology secrecy storages such as 3DES, in order to avoid stolen.The operation of divide secret space, setting identifying code both can be finished at this machine, also can finish at control center's host computer that network with it links to each other.
When the memory device of band USB port inserts, if this external unit has identifying code, just check the identifying code in the memory device of storer neutral zone USB port, if this identifying code coincide, show in addition that then an identifying code input frame allows the user by second section identifying code of keyboard input, receive second section identifying code that the user imports in second section identifying code and the storer then and check,, just accessed state is arranged to allow in secret space if second section identifying code also coincide.The user just can write, read private data in secret space after verifying by this.Here adopt memory device and artificial twice verification step of input validation sign indicating number of band USB port, the disabled user still can't be by checking after only stealing the memory device of this band USB port or only learning password, and secret double shield that provides of data just is provided for this.Each time operations such as checking, the secret space of visit also can be mail to the control center's host computer that links to each other with native network, and control center can monitor, control the action of this machine.
After secret space is configured to allow accessed state, if testing the connection of the memory device of this band USB port, PC is disconnected, just again secret space is arranged to refuse accessed state, in order to avoid the secret space of late comer's unauthorized access.
Step of the present invention also can comprise: when secret space is in the accessed state of refusal, hide secret space, only be in when allowing accessed state when secret space, just allow to show the drive in secret space, supply the user to click and visit secret space.Non-concerning security matters personnel and do not know that it is provided with secret space when using this machine, this has just increased the disguise of private data.

Claims (7)

1. to the access control method of PC storage space, the storage space of described PC originally is in the state accessed by the user that allows, the step of this method comprises: mark off one section as secret space in storer, accessed state is arranged to refuse in secret space; The identifying code that setting matches is stored in one of described storer neutralization respectively and can inserts in the external unit of this machine of PC designated port; When external unit inserts the designated port of this machine of PC, if this external unit has identifying code, just check neutralize identifying code in this external unit of storer, have only identifying code to coincide, just accessed state is arranged to allow in secret space.
2. according to the access control method to the PC storage space of claim 1, use at least two sections identifying codes, the identifying code that matches of described " being set in one of described storer neutralization respectively can insert in the external unit of this machine of PC designated port " is first section in two sections identifying codes, and second section identifying code only is set in the storer; When the check verify sign indicating number, except checking neutralize first section identifying code in this external unit of storer, also must receive second section identifying code that the user imports in second section identifying code and the storer and check, have only two sections identifying codes all to coincide, just accessed state is arranged to allow in secret space.
3. according to the access control method to the PC storage space of claim 1 or 2, after secret space is configured to allow accessed state,, just again accessed state is arranged to refuse in secret space if be disconnected with being connected of this external unit.
4. according to the PC of claim 3 access control method, when secret space is in the accessed state of refusal, hide secret space to storage space.
5. according to the PC of claim 1 or 2 access control method, when secret space is in the accessed state of refusal, hide secret space to storage space.
6. according to the access control method to the PC storage space of claim 1 or 2, the described encrypted storage of identifying code that is set in the storer.
7. according to the access control method to the PC storage space of claim 1 or 2, described designated port is a USB port.
CNA2007100279734A 2007-05-11 2007-05-11 Access control method for personal computer storage space Pending CN101051293A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100279734A CN101051293A (en) 2007-05-11 2007-05-11 Access control method for personal computer storage space

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100279734A CN101051293A (en) 2007-05-11 2007-05-11 Access control method for personal computer storage space

Publications (1)

Publication Number Publication Date
CN101051293A true CN101051293A (en) 2007-10-10

Family

ID=38782714

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100279734A Pending CN101051293A (en) 2007-05-11 2007-05-11 Access control method for personal computer storage space

Country Status (1)

Country Link
CN (1) CN101051293A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072206B (en) * 2007-06-14 2011-04-13 腾讯科技(深圳)有限公司 Secondary authenticating method and system for instant messaging system
CN104488220A (en) * 2012-05-08 2015-04-01 塞若纳提克有限公司 Method and system for authentication of communication and operation
CN105824765A (en) * 2015-01-27 2016-08-03 艾欧互联有限公司 Method for Generating a Cursor on an External Monitor Connected to a Handheld Computer
CN106960159A (en) * 2017-05-09 2017-07-18 深圳市夏日晨光数码有限公司 Burst disk and safe encryption method with safe encryption function

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072206B (en) * 2007-06-14 2011-04-13 腾讯科技(深圳)有限公司 Secondary authenticating method and system for instant messaging system
US8484748B2 (en) 2007-06-14 2013-07-09 Tencent Tecnology (Shenzhen) Company Limited Method and device for classifying and processing data in instant messaging system
CN104488220A (en) * 2012-05-08 2015-04-01 塞若纳提克有限公司 Method and system for authentication of communication and operation
CN105824765A (en) * 2015-01-27 2016-08-03 艾欧互联有限公司 Method for Generating a Cursor on an External Monitor Connected to a Handheld Computer
CN106960159A (en) * 2017-05-09 2017-07-18 深圳市夏日晨光数码有限公司 Burst disk and safe encryption method with safe encryption function
WO2018205723A1 (en) * 2017-05-09 2018-11-15 深圳市夏日晨光数码有限公司 Secure disk with secure encryption function, and secure encryption method

Similar Documents

Publication Publication Date Title
US10146706B2 (en) Data security system
US6463537B1 (en) Modified computer motherboard security and identification system
CN100498742C (en) Reliable U disc, method for realizing reliable U disc safety and its data communication with computer
CN102521165B (en) Safe USB disk and its recognition methods and device
CN103580872B (en) A kind of system and method generating for key and managing
US9117096B2 (en) Protection of safety token against malware
CN107563213B (en) Safety secrecy control device for preventing data extraction of storage equipment
KR20060134037A (en) Use authentication method, use authentication program, information processing device, and recording medium
CN1263324A (en) Fingerprint identification keyboard device and its identification method
CN105354479A (en) USB flash disk authentication based solid state disk and data hiding method
WO2010030157A1 (en) A method of authentication of computer id for portable data storage devices
CN102799831B (en) Information safety protection system of application system based on database and information safety protection method
CN109190389A (en) A kind of solid state hard disk data guard method based on USB flash disk authentication
CN101673330A (en) BIOS-based computer security protection method and system
CN112083879B (en) Physical partition isolation and hiding method for storage space of solid state disk
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
CN100399304C (en) Method for automatic protecting magnetic disk data utilizing filter driving program combined with intelligent key device
CN1331015C (en) Computer security startup method
CN101051293A (en) Access control method for personal computer storage space
CN102346716A (en) Encryption method and decryption method of hard disk storage device and encryption and decryption system used for hard disk storage device
CN102024115A (en) Computer with user security subsystem
CN1186732C (en) Method and system for protecting hard disk of computer
CN103473512A (en) Mobile storage medium management method and mobile storage medium management device
EP2204753B1 (en) Terminal apparatuses
JP2007148762A (en) External storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication