CN105488436B - A kind of movable storage device access method and device - Google Patents

A kind of movable storage device access method and device Download PDF

Info

Publication number
CN105488436B
CN105488436B CN201510998032.XA CN201510998032A CN105488436B CN 105488436 B CN105488436 B CN 105488436B CN 201510998032 A CN201510998032 A CN 201510998032A CN 105488436 B CN105488436 B CN 105488436B
Authority
CN
China
Prior art keywords
storage device
movable storage
access
access operation
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510998032.XA
Other languages
Chinese (zh)
Other versions
CN105488436A (en
Inventor
胡启宇
潘山
江爱军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qax Technology Group Inc
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Beijing Qianxin Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510998032.XA priority Critical patent/CN105488436B/en
Publication of CN105488436A publication Critical patent/CN105488436A/en
Application granted granted Critical
Publication of CN105488436B publication Critical patent/CN105488436B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of movable storage device access method and devices, the described method includes: the movable storage device to access user terminal configures device identification, and cancel the device identification in the displaying of the operating system relative position of the user terminal accessed, receive the access operation to the movable storage device, the the first safety driving for being preset at the movable storage device is called to carry out safety verification to the access operation, and after being proved to be successful, the movable storage device is accessed according to the access operation.Device identification of the scheme of the embodiment of the present invention due to not showing the movable storage device configuration to access user terminal, movable storage device can not be directly visited by identification device identification and relevant operation, it needs that the first safety driving for being preset at movable storage device is further called to verify access operation, and after being proved to be successful, just allow to access the movable storage device according to the access operation, to ensure that the safety of movable storage device.

Description

A kind of movable storage device access method and device
Technical field
The present invention relates to software technology fields, more particularly to a kind of movable storage device access method and a kind of shifting Dynamic storage device access device.
Background technique
USB flash disk full name USB flash drive is a kind of movable storage device being connect using USB interface with terminal device, has and deposits The advantages that capacity is big, data rate memory is fast, small in size and easy to use is stored up, is just used by more and more users.
When accessing USB flash disk, USB flash disk can be inserted into terminal device, USB flash disk be accessed by opening the USB flash disk drive that the page is shown, by institute Data needed for needing data to be stored in USB flash disk or download from USB flash disk.
But common U disk does not have any access control to the access operation of data, as long as the terminal with USB interface is set Standby to access to USB flash disk, such USB flash disk access mode also brings Virus entry while bringing convenient And the problems such as information-leakage.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the movable storage device access method and movable storage device access mechanism of problem.
According to one aspect of the present invention, a kind of movable storage device access method is provided, comprising:
Device identification is configured to the movable storage device of access user terminal, and cancels the device identification and is being accessed The displaying of the operating system relative position of user terminal;
Receive the access operation to the movable storage device;
The the first safety driving for being preset at the movable storage device is called to carry out safety verification to the access operation, and After being proved to be successful, the movable storage device is accessed according to the access operation.
Optionally, the movable storage device uses NTFS New Technology File System.
Optionally, the displaying of the operating system in the user terminal accessed of cancelling the device identification includes:
The association setting option for modifying the registration table of the operating system of the user terminal is the mobile storage for not showing access Equipment.
Optionally, before the reception user is to the access operation of the movable storage device, the method also includes:
The administration interface of movable storage device is generated, and shows the device identification and correspondence in the administration interface Login frame;
The log-on message that user inputs in login frame is verified, and determination is proved to be successful.
Optionally, the method also includes:
It receives and operation is arranged to the attribute of the movable storage device in the administration interface.
Optionally, described receive includes: to the access operation of the movable storage device
The corresponding file of the movable storage device is generated, the access behaviour that user initiates for the file is received Make;
Or, receiving the access operation that some program is initiated according to the device identification.
Optionally, described that the first safety driving for being preset at the movable storage device is called to carry out the access operation Safety verification includes:
If the access operation is triggered by user by file, verifying the access operation is safety operation;
If the access operation is initiated by some program according to the device identification, verify the access operation whether be Safety operation.
Optionally, it is described call be preset at the movable storage device first safety driving to the access operation into Before row safety verification, the method also includes:
The second driver for being preset at the movable storage device is called to verify whether the access operation is to grasp safely Make.
Optionally, after the described pair of movable storage device accessed configuration device identification, the method also includes:
The device identification of the movable storage device and the first safety driving are associated.
Optionally, described to include: according to the access operation access movable storage device
By accessing the access control interface of the corresponding movable storage device of the device identification, the access operation is sent out It send to the movable storage device.
Optionally, the access operation is to the read operation of the movable storage device, write operation or format manipulation.
According to another aspect of the present invention, a kind of movable storage device access mechanism is provided, comprising:
Module is cancelled in device identification, configures device identification for the movable storage device to access user terminal, and cancel Displaying of the device identification in the operating system relative position of the user terminal accessed;
Access operation receiving module, for receiving the access operation to the movable storage device;
Secure verification module, for calling the first safety driving for being preset at the movable storage device to grasp the access Make carry out safety verification, and after being proved to be successful, the movable storage device is accessed according to the access operation.
Optionally, the movable storage device uses NTFS New Technology File System.
Optionally, module is cancelled in the device identification, the registration of the operating system specifically for modifying the user terminal The association setting option of table is the movable storage device for not showing access.
Optionally, described device further include:
Administration interface generation module, for before the reception user is to the access operation of the movable storage device, The administration interface of movable storage device is generated, and shows the device identification and corresponding login in the administration interface Frame;
Log-on message authentication module, for verifying to the log-on message that user inputs in login frame, and determination is tested It demonstrate,proves successfully.
Optionally, described device further include:
Attribute setting operation receiving module, for receiving in the administration interface to the attribute of the movable storage device Setting operation.
Optionally, the access operation receiving module includes:
File generates submodule, for generating the corresponding file of the movable storage device, receives user and is directed to institute State the access operation of file initiation;
Or, access operation obtains submodule, the access operation initiated for receiving some program according to the device identification.
Optionally, the secure verification module includes:
Safety operation determines submodule, if being triggered by user by file for the access operation, described in verifying Access operation is safety operation;
Submodule is verified in safety operation, if being initiated by some program according to the device identification for the access operation, Then verify whether the access operation is safety operation.
Optionally, described device further include:
Second driver calling module, for calling the first safety for being preset at the movable storage device to drive described Before the dynamic progress safety verification to the access operation, the second driver verifying for being preset at the movable storage device is called Whether the access operation is safety operation.
Optionally, described device further include:
Device identification relating module, after the movable storage device for accessing at described Dui configures device identification, by institute The device identification and the first safety driving for stating movable storage device are associated.
Optionally, the secure verification module, specifically for being set by accessing the corresponding mobile storage of the device identification The access operation is sent to the movable storage device by standby access control interface.
Optionally, the access operation is to the read operation of the movable storage device, write operation or format manipulation.It is logical The embodiment of the present invention is crossed, due to not showing the device identification of the movable storage device configuration to access user terminal, can not be passed through Movable storage device is directly visited in identification device identification and relevant operation, is needed further to call and is preset at the of movable storage device Access operation is verified in one safety driving, and after being proved to be successful, and is just allowed according to the access operation access shifting Dynamic storage equipment, thus the problems such as ensure that the safety of movable storage device, avoiding poisoning intrusion and information-leakage.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart of according to embodiments of the present invention 1 movable storage device access method;
Fig. 2 shows the flow charts of according to embodiments of the present invention 2 movable storage device access method;
Fig. 3 shows the structural block diagram of according to embodiments of the present invention 1 movable storage device access mechanism;
Fig. 4 shows the structural block diagram of according to embodiments of the present invention 2 movable storage device access mechanism.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Referring to Fig.1, a kind of step process of according to embodiments of the present invention 1 movable storage device access method is shown Figure, can specifically include following steps:
Step 101, device identification is configured to the movable storage device of access user terminal, and cancels the device identification and exists The displaying of the operating system relative position of the user terminal accessed.
User terminal can be the terminal devices such as desktop computer, laptop, mobile phone, PAD, the installing terminal equipment There is the card slot (such as USB card slot etc.) for interface (such as USB etc.) insertion.Movable storage device can for interface USB flash disk, Hard disk or other removable equipment (such as mobile terminal etc.) used and can be used as storage medium.It can be deposited by that will move The card slot for storing up the interface insertion user terminal of equipment, connects mobile terminal device and user terminal, realizes user terminal to movement Store the operations such as data read operation and the data write operation of equipment.
Device identification is equipment drive, can be at least one of text, number, character and other identifier, such as " removable Dynamic storage equipment I ".After detecting movable storage device access user terminal, the mobile storage to access can according to need Device configuration device identification.
After the movable storage device to access user terminal configures device identification, traditional method can be in user terminal Operating system relative position is shown device identification, such as presentation device mark " can in the page belonging to " my computer " Movable storage device I " etc..And the method in the embodiment of the present invention movable storage device access user terminal and to it with installing After standby mark, cancel the device identification in the displaying of the operating system relative position of the user terminal accessed, i.e., to configuration Device identification be hidden.Since device identification is not shown, can not directly be accessed by identification device identification and relevant operation Movable storage device needs that movable storage device could be accessed by completing subsequent relevant operation, to realize to movement The control of storage device access ensure that the safety of movable storage device.
Step 102, user is received to the access operation of the movable storage device.
After movable storage device access user terminal, user can receive to the access operation of movable storage device.Example Such as, the file of generation can be shown in the page of pop-up after configuring device identification, user can be for the file shown Folder initiates access operation;Other drivers or non-driven program can also be received by inversely grasping after configuring device identification Make the hiding device identification of discovery, and access operation is initiated to the device identification;It can also be other access modes, the present invention Herein with no restrictions.Wherein, access operation can be the operation such as read operation, write operation or format manipulation.
Step 103, the first safety driving for being preset at the movable storage device is called to pacify the access operation Full verifying, and after being proved to be successful, the movable storage device is accessed according to the access operation.
The first installation file driven safely is preset in movable storage device, after installation first safety driving for pair Access operation carries out safety verification.Specifically, after movable storage device access user terminal, the operating system of user terminal is examined It surveys in user terminal and whether needs to install the first safety driving, detecting that needing to install the first safety in the user terminal drives When dynamic, indicating user terminal runs the first installation file driven safely stored in movable storage device, to realize the first peace Full driving is available.
First driver be used for verify initiate access operation program whether safety, and then authentication-access operate whether be Safety operation.
The first security procedure list is previously provided in the terminal server of movable storage device, for operating to initiation The program of access is verified.Specifically, the first program list can be white list, and defaulting the program in white list is safe journey Sequence illustrates that described program is security procedure if the program for initiating access operation hits white list;It is also possible to blacklist, writes from memory The program in blacklist is recognized for dangerous program, if the program for initiating access operation hits blacklist, illustrates described program for danger Dangerous program.It can also be other verification methods, the present invention is herein with no restrictions.
When authentication-access operates, the application program of the first safety driving verifying initiation access operation can be called or driving is No to belong to the first security procedure list, the first security procedure list determines the access operation if belonging to for white list at this time For safety operation, the movable storage device further can be accessed according to the access operation;If be not belonging to, institute is determined Stating access operation is risky operation, prevents the operation that accesses to movable storage device.
In actual operation, the device identification of the movable storage device and the first safety driving can be closed Connection, can be after the first safety driving be proved to be successful access operation, movable storage device corresponding to associated device identification Access operation.
According to an embodiment of the present invention, due to not showing the equipment mark to the configuration of the movable storage device of access user terminal Know, can not directly visit movable storage device by identification device identification and relevant operation, further call is needed to be preset at movement Access operation is verified in first safety driving of storage equipment, and after being proved to be successful, is just allowed according to access behaviour Make the access movable storage device and avoids poisoning intrusion and information-leakage to ensure that the safety of movable storage device The problems such as.
Referring to Fig. 2, the flow chart of according to embodiments of the present invention 2 movable storage device access method is shown, specifically may be used To include the following steps:
Step 201, the administration interface of movable storage device is generated, and shows the device identification in the administration interface And corresponding login frame.
In the embodiment of the present invention, before movable storage device access user terminal, user can be opened according to predetermined registration operation The access management client of terminal installation, generates the administration interface of movable storage device.
Administration interface is information configuration interface, and the device identification of movable storage device and right can be shown in administration interface The login frame answered, can show multiple attribute informations and associated input field in login frame, such as device manufacturer's information, set The attribute informations such as standby sequence odd numbers, unit information, department's information, user's information, remark information;It can also show initial mouth Enable, password number of attempt and password complexity require etc. attribute informations, and for each attribute information configuration input field.
In concrete operations, for the movable storage device accessed for the first time, it may be received in the administration interface to institute State movable storage device attribute setting operation, by administration interface configuration attribute information complete to movable storage device The registration information of movable storage device, can be stored in the login service device of user terminal the same time shift for checking by registration The registration behavior of dynamic storage equipment can be recorded in login service device in the form of log.
For the non-movable storage device accessed for the first time, attribute information can be inputted in the administration interface of generation, generated , can be by the predetermined registration operation in administration interface to the log-on message of the movable storage device, such as click " determination " and press Button submits the log-on message of input.
In actual operation, movable storage device can use NTFS New Technology File System, compared to common FAT32 File system, NTFS New Technology File System memory is bigger, can on multiple hard disks storage file, while NTFS is capable of providing Performance not available for various FAT versions, safety, reliability and advanced feature advanced file system.For example, NTFS passes through Standard transaction journal function and recovery technology ensure the consistency rolled up.If system breaks down, NTFS is able to use log text Part restores the consistency of file system with checkpoint information.In Windows 2000 and Windows XP, NTFS can also be mentioned For the advanced feature of such as file and file permission, encryption, Disk Quotas and compression etc.
Step 202, the log-on message that user inputs in login frame is verified, and determination is proved to be successful.
After receiving the log-on message that user inputs in the login frame of administration interface, the log-on message is tested Whether correct card, verify the log-on message, if correctly, it is determined that be proved to be successful.
When specific verifying log-on message, the registration of movable storage device can be read from the back-end server of user terminal Information judges whether the log-on message of movable storage device is consistent with registration information, if unanimously, decision verification success can be with User is further received to the access operation of movable storage device;If inconsistent, decision verification failure is forbidden receiving user couple The access operation of movable storage device.
Step 203, device identification is configured to the movable storage device of access user terminal, and cancels the device identification and exists The displaying of the operating system relative position of the user terminal accessed.
After configuring device identification to movable storage device, the device identification is not shown, such as can be by described in modification The association setting option of the registration table of the operating system of user terminal is the movable storage device for not showing access, concealing device mark Know.For example, can in registration table accessed path HKEY_CURRENT_USER → Software → Microsoft → Windows → CurrentVersion → Ploicies → Explorer is deleted after finding the option of " NoDrives ", to hide Device identification.It concealing device can also identify by other means, the present invention is herein with no restrictions.
Step 204, the access operation to the movable storage device is received.
In the concrete realization, the corresponding file of the movable storage device can be generated, is connect after configuring device identification It receives user and is directed to the access operation that file is initiated, such as can show the file of generation, Yong Huke in the page of pop-up To initiate access operation for the file shown;Path where file can also be shown for user in the page of pop-up It searches, such as path " my computer/movable memory equipment I ", user can be according to the path searching file, and to finding File initiate access operation.
The access operation that some program is initiated according to device identification can also be received after configuring device identification, such as by The device identification that other drivers or non-driven program are hidden by contrary operation discovery, and the device identification is initiated to visit Ask operation;Modes can also be received for other, the present invention is herein with no restrictions.Wherein, access operation can be read operation, write behaviour Work or format manipulation etc..
Step 205, call whether the second driver for being preset at the movable storage device verifies the access operation For safety operation.
Second driver be used for verify initiate access operation program whether safety, and then authentication-access operate whether be Safety operation.
The second security procedure list is previously provided in the terminal server of movable storage device, for operating to initiation The program of access is verified.Specifically, the second program list can be white list, and defaulting the program in white list is safe journey Sequence illustrates that described program is security procedure if the program for initiating access operation hits white list;It is also possible to blacklist, writes from memory The program in blacklist is recognized for dangerous program, if the program for initiating access operation hits blacklist, illustrates described program for danger Dangerous program.It can also be other verification methods, the present invention is herein with no restrictions.
When access operation is triggered by some program in user terminal, can receive to the movable storage device After access operation, the second security procedure list is obtained from terminal server, and judges to initiate the program of the access operation Whether second security procedure list is belonged to, and the second access list is white list at this time, if belonging to, determines to initiate the access behaviour The program of work is security procedure, and the access operation is safety operation.Wherein, the first the first security procedure list driven safely The the second security procedure list driven safely different from second, such as program name difference, class of procedures difference, program source are not With (such as outer net downloading, user terminal original program etc.), program size is different and other are different, and the present invention does not limit herein System.Access operation is verified respectively using two safety drivings, further ensures the safety of movable storage device.
In concrete operations, the mode for triggering access request can be user for file initiation, some program root Initiated according to device identification or other applicable patterns.If the access operation is triggered by user by file, described in verifying Access operation is safety operation, that is, never calls the second safety driving and carry out safety verification to the access operation;If the access Operation is initiated by some program according to the device identification, then verifies whether the access operation is safety operation, such as judge The program of the access operation is initiated whether in the second security procedure list, if being proved to be successful, recalling first later Whether the access operation is verified in safety driving safe.
Step 206, the first safety driving for being preset at the movable storage device is called to pacify the access operation Full verifying, and after being proved to be successful, the movable storage device is accessed according to the access operation.
In concrete operations, the mode for triggering access operation can be user for file initiation, some program root Initiated according to device identification or other applicable patterns.If the access operation is triggered by user by file, described in clearance Access operation never calls the first safety driving and carries out safety verification to the access operation;If the access operation is by some Program is initiated according to the device identification, then verifies whether the access operation is safety operation, such as the visit is initiated in judgement The program of operation is asked whether in the first security procedure list, if being proved to be successful.
Movable storage device is built-in with main control chip, and main control chip is provided with one or more access control interfaces, can be with By the access control interface of the corresponding movable storage device of the access device identification, carry out data transmission with other equipment, The access operation is sent to the movable storage device;Further main control chip can carry out data according to access operation Processing, by access control interface will treated data feedback to user terminal connected to it.
According to an embodiment of the present invention, due to not showing the equipment mark to the configuration of the movable storage device of access user terminal Know, can not directly visit movable storage device by identification device identification and relevant operation, further call is needed to be preset at movement Access operation is verified in first safety driving of storage equipment, and after being proved to be successful, is just allowed according to access behaviour Make the access movable storage device and avoids poisoning intrusion and information-leakage to ensure that the safety of movable storage device The problems such as.
Referring to Fig. 3, the structural block diagram of according to embodiments of the present invention 1 movable storage device access mechanism is shown, specifically May include following module:
Module 301 is cancelled in device identification, configures device identification for the movable storage device to access user terminal, and take Disappear the device identification the operating system relative position of the user terminal accessed displaying.
Access operation receiving module 302, for receiving the access operation to the movable storage device.
Secure verification module 303, for calling the first safety driving for being preset at the movable storage device to the visit It asks that operation carries out safety verification, and after being proved to be successful, the movable storage device is accessed according to the access operation.
According to an embodiment of the present invention, due to not showing the equipment mark to the configuration of the movable storage device of access user terminal Know, can not directly visit movable storage device by identification device identification and relevant operation, further call is needed to be preset at movement Access operation is verified in first safety driving of storage equipment, and after being proved to be successful, is just allowed according to access behaviour Make the access movable storage device and avoids poisoning intrusion and information-leakage to ensure that the safety of movable storage device The problems such as.
Referring to Fig. 4, the structural block diagram of according to embodiments of the present invention 2 movable storage device access mechanism is shown, specifically May include following module:
Administration interface generation module 401, for the reception user to the access operation of the movable storage device it Before, the administration interface of movable storage device is generated, and show in the administration interface device identification and corresponding step on Record frame.
Log-on message authentication module 402 for verifying to the log-on message that user inputs in login frame, and determines It is proved to be successful.
Module 403 is cancelled in device identification, configures device identification for the movable storage device to access user terminal, and take Disappear the device identification the operating system relative position of the user terminal accessed displaying.
Access operation receiving module 404, for receiving the access operation to the movable storage device.
Second driver calling module 405, for calling be preset at the movable storage device first to pacify described Before full driving carries out safety verification to the access operation, the second driver for being preset at the movable storage device is called Verify whether the access operation is safety operation.
Secure verification module 406, for calling the first safety driving for being preset at the movable storage device to the visit It asks that operation carries out safety verification, and after being proved to be successful, the movable storage device is accessed according to the access operation.
In the embodiment of the present invention, it is preferable that the movable storage device uses NTFS New Technology File System.
In the embodiment of the present invention, it is preferable that module 403 is cancelled in the device identification, is specifically used for modifying user's end The association setting option of the registration table of the operating system at end is the movable storage device for not showing access.
In the embodiment of the present invention, it is preferable that described device further include:
Attribute setting operation receiving module, for receiving in the administration interface to the attribute of the movable storage device Setting operation.
In the embodiment of the present invention, it is preferable that the access operation receiving module 404 includes:
File generates submodule, for generating the corresponding file of the movable storage device, receives user and is directed to institute State the access operation of file initiation;
Or, access operation obtains submodule, the access operation initiated for receiving some program according to the device identification.
In the embodiment of the present invention, it is preferable that the secure verification module 406 includes:
Safety operation determines submodule, if being triggered by user by file for the access operation, described in verifying Access operation is safety operation;
Submodule is verified in safety operation, if being initiated by some program according to the device identification for the access operation, Then verify whether the access operation is safety operation.
In the embodiment of the present invention, it is preferable that described device further include:
Device identification relating module, after the movable storage device for accessing at described Dui configures device identification, by institute The device identification and the first safety driving for stating movable storage device are associated.
In the embodiment of the present invention, it is preferable that the secure verification module 406 is specifically used for by accessing the equipment mark The access operation is sent to the movable storage device by the access control interface for knowing corresponding movable storage device.
In the embodiment of the present invention, it is preferable that the access operation is the read operation to the movable storage device, write operation Or format manipulation.
According to an embodiment of the present invention, due to not showing the equipment mark to the configuration of the movable storage device of access user terminal Know, can not directly visit movable storage device by identification device identification and relevant operation, further call is needed to be preset at movement Access operation is verified in first safety driving of storage equipment, and after being proved to be successful, is just allowed according to access behaviour Make the access movable storage device and avoids poisoning intrusion and information-leakage to ensure that the safety of movable storage device The problems such as.
For the above-mentioned incoming call managing device embodiment based on geographical location, due to itself and the basic phase of embodiment of the method Seemingly, so being described relatively simple, the relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that: any combination application of above-mentioned each embodiment is all feasible, therefore Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited, This is not just detailed one by one.
Provided herein the incoming call Managed Solution based on geographical location not with any certain computer, virtual system or its Its equipment is inherently related.Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs Structure required by system with the present invention program is obvious.In addition, the present invention is not also directed to any certain programmed Language.It should be understood that can use various programming languages realizes summary of the invention described herein, and above to specific language Say that done description is in order to disclose the best mode of carrying out the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, such as right As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool Thus claims of body embodiment are expressly incorporated in the specific embodiment, wherein each claim conduct itself Separate embodiments of the invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) are realized in movable storage device access scheme according to an embodiment of the present invention Some or all components some or all functions.The present invention is also implemented as executing side as described herein Some or all device or device programs (for example, computer program and computer program product) of method.It is such It realizes that program of the invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape Formula provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (18)

1. a kind of movable storage device access method, wherein include:
Device identification is configured to the movable storage device of access user terminal, and cancels the device identification in the user accessed The displaying of the operating system relative position of terminal;
Receive the access operation to the movable storage device, comprising: generate the corresponding file of the movable storage device, connect It receives user and is directed to the access operation that the file is initiated;Or, receiving the access that some program is initiated according to the device identification Operation;
It calls the first safety driving for being preset at the movable storage device to carry out safety verification to the access operation, and is testing After demonstrate,proving successfully, the movable storage device is accessed according to the access operation, wherein access behaviour is initiated in the verifying of the first driver Whether the program of work is safe, and then whether authentication-access operation is safety operation;
Wherein, described that the first safety driving for being preset at the movable storage device is called to carry out safe test to the access operation If card includes: that the access operation is triggered by user by file, verifying the access operation is safety operation;If described Access operation is initiated by some program according to the device identification, then verifies whether the access operation is safety operation.
2. according to the method described in claim 1, wherein, the movable storage device uses NTFS New Technology File System.
3. described to cancel the device identification in the behaviour of the user terminal accessed according to the method described in claim 1, wherein The displaying for making system includes:
The association setting option for modifying the registration table of the operating system of the user terminal is the movable storage device for not showing access.
4. according to the method described in claim 1, wherein, receiving user to the access operation of the movable storage device described Before, the method also includes:
The administration interface of movable storage device is generated, and shows in the administration interface device identification and corresponding steps on Record frame;
The log-on message that user inputs in login frame is verified, and determination is proved to be successful.
5. according to the method described in claim 4, wherein, the method also includes:
It receives and operation is arranged to the attribute of the movable storage device in the administration interface.
6. according to the method described in claim 1, wherein, being preset at the first safety of the movable storage device in the calling Before driving carries out safety verification to the access operation, the method also includes:
The second driver for being preset at the movable storage device is called to verify whether the access operation is safety operation.
7. according to the method described in claim 1, wherein, the described pair of movable storage device accessed configuration device identification it Afterwards, the method also includes:
The device identification of the movable storage device and the first safety driving are associated.
8. described to access the movable storage device packet according to the access operation according to the method described in claim 1, wherein It includes:
By accessing the access control interface of the corresponding movable storage device of the device identification, the access operation is sent to The movable storage device.
9. according to the method described in claim 1, wherein, the access operation be read operation to the movable storage device, Write operation or format manipulation.
10. a kind of movable storage device access mechanism, wherein include:
Module is cancelled in device identification, configures device identification for the movable storage device to access user terminal, and described in cancellation Displaying of the device identification in the operating system relative position of the user terminal accessed;
Access operation receiving module, for receiving the access operation to the movable storage device, comprising: file generates submodule Block receives user and is directed to the access operation that the file is initiated for generating the corresponding file of the movable storage device; Or, access operation obtains submodule, the access operation initiated for receiving some program according to the device identification;
Secure verification module, for call be preset at the movable storage device first safety driving to the access operation into Row safety verification, and after being proved to be successful, the movable storage device is accessed according to the access operation, wherein the first driving journey Whether the program that access operation is initiated in sequence verifying is safe, and then whether authentication-access operation is safety operation;
Wherein, the secure verification module includes:
Safety operation determines submodule, if being triggered by user by file for the access operation, verifies the access Operation is safety operation;
Submodule is verified in safety operation, if being initiated by some program according to the device identification for the access operation, is tested Demonstrate,prove whether the access operation is safety operation.
11. device according to claim 10, wherein the movable storage device uses NTFS New Technology File System.
12. device according to claim 10, in which:
Module is cancelled in the device identification, and the association of the registration table of the operating system specifically for modifying the user terminal is arranged Item is the movable storage device for not showing access.
13. device according to claim 10, wherein described device further include:
Administration interface generation module, for generating before the reception user is to the access operation of the movable storage device The administration interface of movable storage device, and the device identification and corresponding login frame are shown in the administration interface;
Log-on message authentication module, for being verified to the log-on message that user inputs in login frame, and determine verifying at Function.
14. device according to claim 13, wherein described device further include:
Attribute setting operation receiving module, is arranged the attribute of the movable storage device in the administration interface for receiving Operation.
15. device according to claim 10, wherein described device further include:
Second driver calling module, for calling the be preset at the movable storage device first safe driving pair described Before the access operation carries out safety verification, calls and be preset at described in the second driver verifying of the movable storage device Whether access operation is safety operation.
16. device according to claim 10, wherein described device further include:
Device identification relating module, after the movable storage device for accessing at described Dui configures device identification, by the shifting The device identification of dynamic storage equipment is associated with the first safety driving.
17. device according to claim 10, in which:
The secure verification module, specifically for the access control by accessing the corresponding movable storage device of the device identification The access operation is sent to the movable storage device by interface.
18. device according to claim 10, wherein the access operation is that the reading to the movable storage device is grasped Work, write operation or format manipulation.
CN201510998032.XA 2015-12-25 2015-12-25 A kind of movable storage device access method and device Active CN105488436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510998032.XA CN105488436B (en) 2015-12-25 2015-12-25 A kind of movable storage device access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510998032.XA CN105488436B (en) 2015-12-25 2015-12-25 A kind of movable storage device access method and device

Publications (2)

Publication Number Publication Date
CN105488436A CN105488436A (en) 2016-04-13
CN105488436B true CN105488436B (en) 2019-05-10

Family

ID=55675408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510998032.XA Active CN105488436B (en) 2015-12-25 2015-12-25 A kind of movable storage device access method and device

Country Status (1)

Country Link
CN (1) CN105488436B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108304222A (en) * 2017-01-13 2018-07-20 中标软件有限公司 Apparatus management/control system and method
CN108376224A (en) * 2018-02-24 2018-08-07 深圳市大迈科技有限公司 A kind of movable storage device and its encryption method and device
CN110162946B (en) * 2019-05-30 2022-08-16 奇安信科技集团股份有限公司 Mobile storage management and control method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1661573A (en) * 2004-02-24 2005-08-31 深圳市朗科科技有限公司 Method for managing notations of disks of mobile storage device
CN1866225A (en) * 2005-05-20 2006-11-22 联想(北京)有限公司 Mapping method for mobile memory device
CN101350034A (en) * 2008-09-10 2009-01-21 普天信息技术研究院有限公司 Mobile memory apparatus and method for visiting file
CN102495986A (en) * 2011-12-15 2012-06-13 上海中标凌巧软件科技有限公司 Calling control method for avoiding embezzlement of enciphered data in computer system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1661573A (en) * 2004-02-24 2005-08-31 深圳市朗科科技有限公司 Method for managing notations of disks of mobile storage device
CN1866225A (en) * 2005-05-20 2006-11-22 联想(北京)有限公司 Mapping method for mobile memory device
CN101350034A (en) * 2008-09-10 2009-01-21 普天信息技术研究院有限公司 Mobile memory apparatus and method for visiting file
CN102495986A (en) * 2011-12-15 2012-06-13 上海中标凌巧软件科技有限公司 Calling control method for avoiding embezzlement of enciphered data in computer system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于虚拟卷技术的安全U盘研究与实现;周峰;《中国优秀硕士学位论文全文数据库信息科技辑》;20140615;第2-5、14-27、32-46页

Also Published As

Publication number Publication date
CN105488436A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
CN105550598B (en) A kind of method for managing security and device of movable storage device
KR102347562B1 (en) Security Control Methods and Computer Systems
CN104885092B (en) Security system and method for operating system
CN104685510B (en) Recognition application whether be rogue program method, system and storage medium
US20040122774A1 (en) Method and system for executing applications on a mobile device
EP3089494A1 (en) Trusted execution environment initialization method and device
Miller Exploring the NFC attack surface
CN110516428B (en) Data reading and writing method and device of mobile storage equipment and storage medium
US11205512B2 (en) Usage control method and system for medical detection device, and medical detection device
CN105488436B (en) A kind of movable storage device access method and device
US9292701B1 (en) System and method for launching a browser in a safe mode
CN106096418B (en) SELinux-based startup security level selection method and device and terminal equipment
CN106294102A (en) The method of testing of application program, client, server and system
JP2005182798A (en) Subscriber identification module (sim) emulator
CN107563748B (en) Processing method and device for account, medium and computing equipment
US11436131B2 (en) Systems and methods for software testing using a disposable code
CN111355720A (en) Method, system and equipment for accessing intranet by application and computer storage medium
CN111756703A (en) Debugging interface management method and device and electronic equipment
EP2579153A1 (en) Information generation system and method therefor
CN105653991B (en) A kind for the treatment of method and apparatus of movable storage device
CN112788017A (en) Safety verification method, device, equipment and medium
CN106127054B (en) A kind of system-level safety protecting method towards smart machine control instruction
CN111177752B (en) Credible file storage method, device and equipment based on static measurement
US10530835B2 (en) Application recording
CN103632086B (en) The method and apparatus for repairing basic input-output system BIOS rogue program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Co-patentee after: QAX Technology Group Inc.

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Co-patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.