CN104361300A - Theft monitoring method for mobile hard disk - Google Patents

Theft monitoring method for mobile hard disk Download PDF

Info

Publication number
CN104361300A
CN104361300A CN201410651382.4A CN201410651382A CN104361300A CN 104361300 A CN104361300 A CN 104361300A CN 201410651382 A CN201410651382 A CN 201410651382A CN 104361300 A CN104361300 A CN 104361300A
Authority
CN
China
Prior art keywords
module
hard drive
portable hard
control module
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410651382.4A
Other languages
Chinese (zh)
Inventor
唐立忠
黄诚
杨建�
卢强
徐泽民
何小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN ZHICHENG TIANYI TECHNOLOGY Co Ltd
Original Assignee
SICHUAN ZHICHENG TIANYI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN ZHICHENG TIANYI TECHNOLOGY Co Ltd filed Critical SICHUAN ZHICHENG TIANYI TECHNOLOGY Co Ltd
Priority to CN201410651382.4A priority Critical patent/CN104361300A/en
Publication of CN104361300A publication Critical patent/CN104361300A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a theft monitoring method for a mobile hard disk, and belongs to the field of memory equipment. The method comprises the following steps: A, detecting whether a USB (Universal Serial Bus) jack is in a use state in real time through a jack detection module; B, detecting whether a password input module inputs a password in a set time by a control module if the USB jack is in the use state; C, judging that the mobile hard disk is in normal use by the control module if the password is input; D, judging, by the control module, that the mobile hard disk is illegally stolen if no password is input, starting a breaker module through the control module and disconnecting a transmission circuit of the mobile hard disk; E, starting a positioning module to position the mobile hard disk, and transmitting positioning information to a mobile terminal through a wireless communication module. When illegal theft is detected, the positioning information can be automatically transmitted to the mobile terminal, and the transmission circuit can be disconnected through the breaker module, so that theft monitoring is enhanced, and the anti-theft performance of the method is improved.

Description

A kind of portable hard drive usurp method for supervising
Technical field
The present invention relates to memory device field, usurp method for supervising in particular to a kind of portable hard drive.
Background technology
Existing hard disc storage a large amount of data, arbitrarily can be used, be easy to stolen, cause leakage of data or loss, makes the use safety of hard disk be subject to great threat.The antitheft means of existing hard disk comprise hardware encryption, namely anti-theft panel is set at the USB place of portable hard drive, and locks, but lockset and anti-theft panel are easily destroyed, thief still can steal the confidential data in hard disk, and owner does not know portable hard drive just stolen.
Summary of the invention
What the object of the present invention is to provide a kind of portable hard drive usurps method for supervising, and to solve existing portable hard drive theft preventing method poor effect, owner cannot know portable hard drive just in stolen problem.
For realizing the object of the invention, the technical scheme of employing is: a kind of portable hard drive usurp method for supervising, comprise the following steps:
Steps A, detect USB in real time by socket detection module and whether be in using state;
If step B USB is in using state, then whether control module detects Password Input module has Password Input in setting-up time;
If step C has Password Input, then control module is judged to be normal use;
If step D is without Password Input, then control module is judged to illegally to usurp, and starts turn-off module by control module, is disconnected by the transmission circuit of portable hard drive;
Step e, startup locating module position portable hard drive, and by wireless communication module, this locating information are sent to mobile terminal.
The invention has the beneficial effects as follows:
1. by judging that whether portable hard drive is just stolen to the joint-detection of USB using state and password, if find just stolen, locating module can be started position portable hard drive, and this locating information is sent to mobile terminal, make owner can Timeliness coverage hard disk stolen, and by locating information find portable hard drive;
2. portable hard drive starts turn-off module after receiving the clearance order of mobile terminal, is disconnected by the transmission circuit of portable hard drive, makes it cannot complete data transmission, stops thief to steal inside information.
Accompanying drawing explanation
Fig. 1 is process flow diagram of the present invention.
Embodiment
Also by reference to the accompanying drawings the present invention is described in further detail below by specific embodiment.
The method for supervising of usurping of portable hard drive provided by the invention comprises the following steps:
Steps A, detect USB in real time by socket detection module and whether be in using state;
If step B USB is in using state, then whether control module detects Password Input module has Password Input in setting-up time; If be in unused state, then socket detection module continues to detect;
If step C has Password Input, then control module is judged to be normal use;
If step D is without Password Input, then control module is judged to illegally to usurp, and control module controls to start locating module and positions portable hard drive, and by wireless communication module, this locating information is sent to mobile terminal;
Step e, control module control to start turn-off module, are disconnected by the transmission circuit of portable hard drive, make it carry out data transmission.
 
Further, whether steps A detects USB in real time specifically by socket detection module has electric current to pass through, if there is electric current to pass through, namely shows that USB is in using state.
Further, password is specially numerical ciphers or finger-print cipher, also can be the double verification of numerical ciphers and finger-print cipher composition, promote theftproof performance.
Further, whether correct by control module authentication password after step C, if correct, allow portable hard drive transmission data, if incorrect, start turn-off module by control module, the transmission circuit of portable hard drive is disconnected, make it carry out data transmission.This turn-off module mainly adopts a relay to be connected with hard drive internal transmission circuit, and transmission circuit connected by this relay at ordinary times, makes it form loop, can carry out the transmission of data; When control module starts turn-off module, i.e. starting relay, makes transmission circuit disconnect, and cannot carry out the transmission of data, the safety of protection inside information.When searching out hard disk or being found to be wrong report, by the reset instruction of mobile terminal, relay is connected, now can recover the transmission of data, theft preventing method of the present invention can effectively stop stealer to steal data, can not damage inside information again, and the continuation being convenient to post-flight data uses.
Further, after step D, portable hard drive passes through the clearance order of wireless communication module mobile terminal receive.The locating information that mobile terminal receives according to step D, can deciding to want to send clearance order according to the distance of oneself and portable hard drive, if close together, can stoping pilferage behavior in time, then without the need to sending clearance order; If distant, then send clearance order, allow portable hard drive self not be stolen to protect internal data.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (5)

1. portable hard drive usurp a method for supervising, it is characterized in that: comprise the following steps:
Steps A, detect USB in real time by socket detection module and whether be in using state;
If step B USB is in using state, then whether control module detects Password Input module has Password Input in setting-up time;
If step C has Password Input, then control module is judged to be normal use;
If step D is without Password Input, then control module is judged to illegally to usurp, and control module controls to start locating module and positions portable hard drive, and by wireless communication module, this locating information is sent to mobile terminal;
Step e, control module control to start turn-off module, are disconnected by the transmission circuit of portable hard drive.
2. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: whether described steps A detects USB in real time specifically by socket detection module has electric current to pass through.
3. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: described password is specially numerical ciphers and/or finger-print cipher.
4. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: whether correct by control module authentication password after described step C, if correct, allow portable hard drive transmission data, if incorrect, start turn-off module by control module, the transmission circuit of portable hard drive is disconnected.
5. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: after described step D, portable hard drive is by the clearance order of wireless communication module mobile terminal receive.
CN201410651382.4A 2014-11-17 2014-11-17 Theft monitoring method for mobile hard disk Pending CN104361300A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410651382.4A CN104361300A (en) 2014-11-17 2014-11-17 Theft monitoring method for mobile hard disk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410651382.4A CN104361300A (en) 2014-11-17 2014-11-17 Theft monitoring method for mobile hard disk

Publications (1)

Publication Number Publication Date
CN104361300A true CN104361300A (en) 2015-02-18

Family

ID=52528559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410651382.4A Pending CN104361300A (en) 2014-11-17 2014-11-17 Theft monitoring method for mobile hard disk

Country Status (1)

Country Link
CN (1) CN104361300A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426778A (en) * 2015-11-18 2016-03-23 罗满清 Information processing method and apparatus
CN106446633A (en) * 2016-09-22 2017-02-22 宇龙计算机通信科技(深圳)有限公司 Method and device for storage requiring identification and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1482393A2 (en) * 2000-02-21 2004-12-01 Trek 2000 International Ltd A portable data storage device
CN102270284A (en) * 2010-06-03 2011-12-07 元太科技工业股份有限公司 Electronic reading device and data protection method thereof
CN102567235A (en) * 2011-12-29 2012-07-11 武汉市工程科学技术研究院 Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk
CN203870616U (en) * 2013-12-18 2014-10-08 四川卫士通信息安全平台技术有限公司 Security U disk based on fingerprint identification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1482393A2 (en) * 2000-02-21 2004-12-01 Trek 2000 International Ltd A portable data storage device
CN102270284A (en) * 2010-06-03 2011-12-07 元太科技工业股份有限公司 Electronic reading device and data protection method thereof
CN102567235A (en) * 2011-12-29 2012-07-11 武汉市工程科学技术研究院 Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk
CN203870616U (en) * 2013-12-18 2014-10-08 四川卫士通信息安全平台技术有限公司 Security U disk based on fingerprint identification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426778A (en) * 2015-11-18 2016-03-23 罗满清 Information processing method and apparatus
CN106446633A (en) * 2016-09-22 2017-02-22 宇龙计算机通信科技(深圳)有限公司 Method and device for storage requiring identification and terminal

Similar Documents

Publication Publication Date Title
CN107508679B (en) Binding and authentication method for intelligent terminal main control chip and encryption chip
CN102289623A (en) Anti-leakage laptop
WO2014079139A1 (en) Method and system for protecting data of mobile terminal
CN103370717A (en) Always-available embedded theft reaction subsystem
CN103020553B (en) A kind of guarding against theft for mobile terminal guard method
CN102495983B (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN104282058A (en) Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function
CN103634482A (en) Safety protecting method for application software of portable intelligent equipment
CN103440446A (en) Protective unlocking operating method and device of private content of intelligent terminal
CN106161476A (en) A kind of security protection method and system of data in mobile phone
CN103559435A (en) Method and device for controlling debugging ports of terminal equipment
CN103488920A (en) Implementation method and system of wireless information safety device
CN105383443B (en) A kind of motor vehicle can position automatic alarm intelligent burglary-resisting system
CN105282337A (en) Intelligent mobile phone encryption method
CN104361300A (en) Theft monitoring method for mobile hard disk
CN102387494A (en) Android-mobile-platform-based remote automatic information exchange and control solution
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN102833067B (en) Trilateral authentication method and system and authentication state management method of terminal equipment
CN103442120A (en) Smart phone locking and unlocking method
CN104281800A (en) Unlocking method of safety intelligent lock system with video-monitoring function on basis of bluetooth
CN104156653A (en) Application protection method and device of mobile terminal
CN103532697A (en) Realizing method and system for wireless information safety equipment
WO2019032947A1 (en) Auto-immobilization of machines capable of moving
CN103929674B (en) A kind of set-top box authorization method and set-top box
CN102857641A (en) Method and system for preventing anti-theft mode from being broken by third-party desktop

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150218

RJ01 Rejection of invention patent application after publication