CN104361300A - Theft monitoring method for mobile hard disk - Google Patents
Theft monitoring method for mobile hard disk Download PDFInfo
- Publication number
- CN104361300A CN104361300A CN201410651382.4A CN201410651382A CN104361300A CN 104361300 A CN104361300 A CN 104361300A CN 201410651382 A CN201410651382 A CN 201410651382A CN 104361300 A CN104361300 A CN 104361300A
- Authority
- CN
- China
- Prior art keywords
- module
- hard drive
- portable hard
- control module
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a theft monitoring method for a mobile hard disk, and belongs to the field of memory equipment. The method comprises the following steps: A, detecting whether a USB (Universal Serial Bus) jack is in a use state in real time through a jack detection module; B, detecting whether a password input module inputs a password in a set time by a control module if the USB jack is in the use state; C, judging that the mobile hard disk is in normal use by the control module if the password is input; D, judging, by the control module, that the mobile hard disk is illegally stolen if no password is input, starting a breaker module through the control module and disconnecting a transmission circuit of the mobile hard disk; E, starting a positioning module to position the mobile hard disk, and transmitting positioning information to a mobile terminal through a wireless communication module. When illegal theft is detected, the positioning information can be automatically transmitted to the mobile terminal, and the transmission circuit can be disconnected through the breaker module, so that theft monitoring is enhanced, and the anti-theft performance of the method is improved.
Description
Technical field
The present invention relates to memory device field, usurp method for supervising in particular to a kind of portable hard drive.
Background technology
Existing hard disc storage a large amount of data, arbitrarily can be used, be easy to stolen, cause leakage of data or loss, makes the use safety of hard disk be subject to great threat.The antitheft means of existing hard disk comprise hardware encryption, namely anti-theft panel is set at the USB place of portable hard drive, and locks, but lockset and anti-theft panel are easily destroyed, thief still can steal the confidential data in hard disk, and owner does not know portable hard drive just stolen.
Summary of the invention
What the object of the present invention is to provide a kind of portable hard drive usurps method for supervising, and to solve existing portable hard drive theft preventing method poor effect, owner cannot know portable hard drive just in stolen problem.
For realizing the object of the invention, the technical scheme of employing is: a kind of portable hard drive usurp method for supervising, comprise the following steps:
Steps A, detect USB in real time by socket detection module and whether be in using state;
If step B USB is in using state, then whether control module detects Password Input module has Password Input in setting-up time;
If step C has Password Input, then control module is judged to be normal use;
If step D is without Password Input, then control module is judged to illegally to usurp, and starts turn-off module by control module, is disconnected by the transmission circuit of portable hard drive;
Step e, startup locating module position portable hard drive, and by wireless communication module, this locating information are sent to mobile terminal.
The invention has the beneficial effects as follows:
1. by judging that whether portable hard drive is just stolen to the joint-detection of USB using state and password, if find just stolen, locating module can be started position portable hard drive, and this locating information is sent to mobile terminal, make owner can Timeliness coverage hard disk stolen, and by locating information find portable hard drive;
2. portable hard drive starts turn-off module after receiving the clearance order of mobile terminal, is disconnected by the transmission circuit of portable hard drive, makes it cannot complete data transmission, stops thief to steal inside information.
Accompanying drawing explanation
Fig. 1 is process flow diagram of the present invention.
Embodiment
Also by reference to the accompanying drawings the present invention is described in further detail below by specific embodiment.
The method for supervising of usurping of portable hard drive provided by the invention comprises the following steps:
Steps A, detect USB in real time by socket detection module and whether be in using state;
If step B USB is in using state, then whether control module detects Password Input module has Password Input in setting-up time; If be in unused state, then socket detection module continues to detect;
If step C has Password Input, then control module is judged to be normal use;
If step D is without Password Input, then control module is judged to illegally to usurp, and control module controls to start locating module and positions portable hard drive, and by wireless communication module, this locating information is sent to mobile terminal;
Step e, control module control to start turn-off module, are disconnected by the transmission circuit of portable hard drive, make it carry out data transmission.
Further, whether steps A detects USB in real time specifically by socket detection module has electric current to pass through, if there is electric current to pass through, namely shows that USB is in using state.
Further, password is specially numerical ciphers or finger-print cipher, also can be the double verification of numerical ciphers and finger-print cipher composition, promote theftproof performance.
Further, whether correct by control module authentication password after step C, if correct, allow portable hard drive transmission data, if incorrect, start turn-off module by control module, the transmission circuit of portable hard drive is disconnected, make it carry out data transmission.This turn-off module mainly adopts a relay to be connected with hard drive internal transmission circuit, and transmission circuit connected by this relay at ordinary times, makes it form loop, can carry out the transmission of data; When control module starts turn-off module, i.e. starting relay, makes transmission circuit disconnect, and cannot carry out the transmission of data, the safety of protection inside information.When searching out hard disk or being found to be wrong report, by the reset instruction of mobile terminal, relay is connected, now can recover the transmission of data, theft preventing method of the present invention can effectively stop stealer to steal data, can not damage inside information again, and the continuation being convenient to post-flight data uses.
Further, after step D, portable hard drive passes through the clearance order of wireless communication module mobile terminal receive.The locating information that mobile terminal receives according to step D, can deciding to want to send clearance order according to the distance of oneself and portable hard drive, if close together, can stoping pilferage behavior in time, then without the need to sending clearance order; If distant, then send clearance order, allow portable hard drive self not be stolen to protect internal data.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (5)
1. portable hard drive usurp a method for supervising, it is characterized in that: comprise the following steps:
Steps A, detect USB in real time by socket detection module and whether be in using state;
If step B USB is in using state, then whether control module detects Password Input module has Password Input in setting-up time;
If step C has Password Input, then control module is judged to be normal use;
If step D is without Password Input, then control module is judged to illegally to usurp, and control module controls to start locating module and positions portable hard drive, and by wireless communication module, this locating information is sent to mobile terminal;
Step e, control module control to start turn-off module, are disconnected by the transmission circuit of portable hard drive.
2. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: whether described steps A detects USB in real time specifically by socket detection module has electric current to pass through.
3. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: described password is specially numerical ciphers and/or finger-print cipher.
4. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: whether correct by control module authentication password after described step C, if correct, allow portable hard drive transmission data, if incorrect, start turn-off module by control module, the transmission circuit of portable hard drive is disconnected.
5. according to claim 1 portable hard drive usurp method for supervising, it is characterized in that: after described step D, portable hard drive is by the clearance order of wireless communication module mobile terminal receive.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410651382.4A CN104361300A (en) | 2014-11-17 | 2014-11-17 | Theft monitoring method for mobile hard disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410651382.4A CN104361300A (en) | 2014-11-17 | 2014-11-17 | Theft monitoring method for mobile hard disk |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104361300A true CN104361300A (en) | 2015-02-18 |
Family
ID=52528559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410651382.4A Pending CN104361300A (en) | 2014-11-17 | 2014-11-17 | Theft monitoring method for mobile hard disk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104361300A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426778A (en) * | 2015-11-18 | 2016-03-23 | 罗满清 | Information processing method and apparatus |
CN106446633A (en) * | 2016-09-22 | 2017-02-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for storage requiring identification and terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1482393A2 (en) * | 2000-02-21 | 2004-12-01 | Trek 2000 International Ltd | A portable data storage device |
CN102270284A (en) * | 2010-06-03 | 2011-12-07 | 元太科技工业股份有限公司 | Electronic reading device and data protection method thereof |
CN102567235A (en) * | 2011-12-29 | 2012-07-11 | 武汉市工程科学技术研究院 | Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk |
CN203870616U (en) * | 2013-12-18 | 2014-10-08 | 四川卫士通信息安全平台技术有限公司 | Security U disk based on fingerprint identification |
-
2014
- 2014-11-17 CN CN201410651382.4A patent/CN104361300A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1482393A2 (en) * | 2000-02-21 | 2004-12-01 | Trek 2000 International Ltd | A portable data storage device |
CN102270284A (en) * | 2010-06-03 | 2011-12-07 | 元太科技工业股份有限公司 | Electronic reading device and data protection method thereof |
CN102567235A (en) * | 2011-12-29 | 2012-07-11 | 武汉市工程科学技术研究院 | Intelligent active anti-virus U disk based on partition authentication and anti-virus method of U disk |
CN203870616U (en) * | 2013-12-18 | 2014-10-08 | 四川卫士通信息安全平台技术有限公司 | Security U disk based on fingerprint identification |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426778A (en) * | 2015-11-18 | 2016-03-23 | 罗满清 | Information processing method and apparatus |
CN106446633A (en) * | 2016-09-22 | 2017-02-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for storage requiring identification and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107508679B (en) | Binding and authentication method for intelligent terminal main control chip and encryption chip | |
CN102289623A (en) | Anti-leakage laptop | |
WO2014079139A1 (en) | Method and system for protecting data of mobile terminal | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
CN103020553B (en) | A kind of guarding against theft for mobile terminal guard method | |
CN102495983B (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
CN104282058A (en) | Unlocking method of Bluetooth-based safety intelligent lock system with video monitoring function | |
CN103634482A (en) | Safety protecting method for application software of portable intelligent equipment | |
CN103440446A (en) | Protective unlocking operating method and device of private content of intelligent terminal | |
CN106161476A (en) | A kind of security protection method and system of data in mobile phone | |
CN103559435A (en) | Method and device for controlling debugging ports of terminal equipment | |
CN103488920A (en) | Implementation method and system of wireless information safety device | |
CN105383443B (en) | A kind of motor vehicle can position automatic alarm intelligent burglary-resisting system | |
CN105282337A (en) | Intelligent mobile phone encryption method | |
CN104361300A (en) | Theft monitoring method for mobile hard disk | |
CN102387494A (en) | Android-mobile-platform-based remote automatic information exchange and control solution | |
CN104282059A (en) | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods | |
CN102833067B (en) | Trilateral authentication method and system and authentication state management method of terminal equipment | |
CN103442120A (en) | Smart phone locking and unlocking method | |
CN104281800A (en) | Unlocking method of safety intelligent lock system with video-monitoring function on basis of bluetooth | |
CN104156653A (en) | Application protection method and device of mobile terminal | |
CN103532697A (en) | Realizing method and system for wireless information safety equipment | |
WO2019032947A1 (en) | Auto-immobilization of machines capable of moving | |
CN103929674B (en) | A kind of set-top box authorization method and set-top box | |
CN102857641A (en) | Method and system for preventing anti-theft mode from being broken by third-party desktop |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150218 |
|
RJ01 | Rejection of invention patent application after publication |