CN108287988A - Safety management system and method for mobile terminal document - Google Patents

Safety management system and method for mobile terminal document Download PDF

Info

Publication number
CN108287988A
CN108287988A CN201711421731.3A CN201711421731A CN108287988A CN 108287988 A CN108287988 A CN 108287988A CN 201711421731 A CN201711421731 A CN 201711421731A CN 108287988 A CN108287988 A CN 108287988A
Authority
CN
China
Prior art keywords
mobile terminal
usb device
key
document
virtual disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711421731.3A
Other languages
Chinese (zh)
Other versions
CN108287988B (en
Inventor
韩敏
景奕昕
廖巍
刘红宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN KINESISK LABORERS ANDING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
WUHAN KINESISK LABORERS ANDING INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN KINESISK LABORERS ANDING INFORMATION TECHNOLOGY Co Ltd filed Critical WUHAN KINESISK LABORERS ANDING INFORMATION TECHNOLOGY Co Ltd
Priority to CN201711421731.3A priority Critical patent/CN108287988B/en
Publication of CN108287988A publication Critical patent/CN108287988A/en
Application granted granted Critical
Publication of CN108287988B publication Critical patent/CN108287988B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4063Device-to-bus coupling
    • G06F13/4068Electrical coupling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Abstract

The present invention relates to mobile terminal data field of safety protection, provide a kind of safety management system for mobile terminal document, including USB device monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive unit.A kind of method for managing security for mobile terminal document is also provided, is included the following steps:S1 starts the ends PC, and runs client-side program, initializes each unit;S2 has detected whether the ends USB device access PC using USB device monitoring unit;Whether S3 is matched with mobile terminal using USB device authentication unit verification USB device identity;S4, using security kernel driving unit to the security kernel function of the equipment selection load virtual disk after USB device authentication unit verifies identity;S5 is scanned filtering to the operation of data in virtual disk using filtration drive unit, and selects that the data in virtual disk are encrypted or are decrypted.The present invention is safe, and it is convenient to implement, and does not change user's use habit.

Description

Safety management system and method for mobile terminal document
Technical field
The present invention relates to mobile terminal data field of safety protection, particularly for the safety management system of mobile terminal document System and method.
Background technology
Mobile office more and more becomes the scene in people's routine work, but in meeting, the working environments such as go on business In, personnel are complicated, and environmental change factor is big, and the safety of onboard data is faced with very high risk in mobile terminal.Once hair Situations such as raw mobile terminal loss, stolen, unauthorized access, illegal copies, it will lead to the confidential document data information in terminal Leakage, immeasurable loss is caused to unit.
Currently, mainly using data backup, encryption storage, access control, post-audit to the data protection of mobile terminal Etc. technological means, but that there are still efficiency is low, is unable to control data to outside transmission or publication, Wu Fafang using above-mentioned technological means The only drawbacks such as loss of data.
Invention content
The purpose of the present invention is to provide the safety management systems and method for mobile terminal document, can at least solve Segmental defect in the prior art.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:A kind of peace for mobile terminal document Full management system, including USB device monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive list Member;
The USB device monitoring unit judges whether there is USB device and is inserted into or pulls out for monitoring USB port;
The USB device authentication unit, for verifying whether the USB device identity being inserted into matches with mobile terminal;
The security kernel driving unit, for after the USB device authentication unit verifies equipment identities, selection to load Or the security kernel function of unloading virtual disk;
The filtration drive unit, for being scanned filtering to the operation of data in the virtual disk, and to meeting The data of filter condition are encrypted or decrypt.
Further, the USB device authentication unit includes at least:Legitimate verification module, mark check that module, identity obtain Modulus block, identity verification module and mark writing module;
The legitimate verification module carries out identity checks for the U-key equipment to insertion, whether confirms its own ID It is present in the Key ID lists of the system;
The mark checks module, for checking whether the U-key being inserted into has mobile terminal identification;
The identity acquisition module, for obtaining the mobile terminal identification in the U-key equipment being inserted into;
The identity verification module, for confirm the mobile terminal identification in the U-key obtained whether with the shifting that is inserted into The mark matching of dynamic terminal;
The mark writing module, for corresponding mobile terminal mark to be written in the U-key of insertion mobile terminal for the first time Know, realizes the one-to-one binding of mobile terminal and U-key.
Further, the mobile terminal includes notebook or tablet computer or smart mobile phone.
The embodiment of the present invention provides another technical solution:A kind of method for managing security for mobile terminal document, packet Include following steps:
S1 starts the ends PC, and runs client-side program, initialization USB device monitoring unit, USB device authentication unit, peace Full core driving unit and filtration drive unit;
S2 has detected whether the ends USB device access PC using the USB device monitoring unit;
S3 verifies whether the USB device identity matches with mobile terminal using the USB device authentication unit;
S4, using the security kernel driving unit to the equipment after the USB device authentication unit verifies identity The security kernel function of selection load virtual disk;
S5 is scanned filtering to the operation of data in the virtual disk using the filtration drive unit, and selects Data in the virtual disk are encrypted or are decrypted.
Further, in the S2 steps, USB device insertion has been detected whether, specially:
S200, if so, the USB device authentication unit carries out identity legitimacy verification to the U-key of insertion, if being inserted into The ID of U-key is present in the Key ID lists of the client-side program, then continues to carry out down;Otherwise, terminate the step;
S201, to carrying out mobile terminal identification inspection by the U-key of the legitimate verification, if there is mobile terminal mark Know, then loads the security kernel function of virtual disk;Otherwise, illustrate that U-key is to be inserted into mobile terminal for the first time, will accordingly move eventually In the mark write-in U-key at end, it is further continued for the security kernel function of load virtual disk;
S202 obtains the mobile terminal identification in the U-key equipment of insertion, confirms the mobile terminal mark in the U-key Whether knowledge matches with the mark for the mobile terminal being inserted into;If so, continuing to carry out down, otherwise, terminate the step;
S203, after the mobile terminal identification in confirming U-key is matched with the mark for the mobile terminal being inserted into, in local Virtual disk is loaded, exclusive encrypted partition is formed.
Further, in the S2 steps, detected whether that USB device is pulled out, if so, USB device authentication unit is read Take the information of mobile terminal in U-key;If can read, USB device monitoring unit continues to execute monitoring;Otherwise, unloading is empty Quasi- disk, the exclusive encrypted partition are invisible and unavailable.
Further, the document in the exclusive encrypted area is encrypted automatically;It is described when in the exclusive encrypted partition Document can equally be opened, edit and preserve with normal file, when be illegally duplicated leave native en when, the document can not It opens, to ensure the safety of key document data.
Further, the document includes the document of newly-built document and copy.
Further, the S5 steps are specially:Operation of the scanning filtering upper layer application to data in disk, the operation packet Include reading or write-in;Judge whether the operation carries out in virtual disk, if so, being carried out to the data that virtual disk is written Encryption, otherwise, the data to reading virtual disk are decrypted.
Compared with prior art, the beneficial effects of the invention are as follows:
1, using USB device monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive list Being used cooperatively for member, safe, it is convenient to implement, and does not change user's use habit.
2, after client software being installed, by combining special U-key, realize authentication, U-key with terminal is one-to-one ties up Fixed, security performance is high.
3, only after U-key is by verification, virtual disk is locally just being loaded, is forming exclusive encrypted partition;In encryption point When being written in area or reading data, system carries out encryption and decryption automatically.
4, after pulling out U-key, exclusive encrypted partition is invisible and unavailable;It is kept after data are detached from exclusive encrypted partition Encrypted state, if be illegally duplicated leave native en after can not still open, to ensure key document data safety.
Description of the drawings
Fig. 1 is a kind of functional framework of safety management system for mobile terminal document provided in an embodiment of the present invention Figure;
Fig. 2 is that a kind of USB device of method for managing security for mobile terminal document provided in an embodiment of the present invention is supervised Listen the flow chart of unit;
Whether Fig. 3 has USB for a kind of method for managing security for mobile terminal document provided in an embodiment of the present invention The flow chart that equipment is inserted into;
Whether Fig. 4 has USB for a kind of method for managing security for mobile terminal document provided in an embodiment of the present invention The flow chart that equipment is pulled out;
Fig. 5 is a kind of step flow of method for managing security for mobile terminal document provided in an embodiment of the present invention Figure.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the embodiment of the present invention provides a kind of safety management system for mobile terminal document, including USB Equipment monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive unit.In the present system, pass through USB device monitoring unit monitors USB port, judges whether there is USB device and is inserted into or pulls out, is then verified by USB device Unit verifies whether the USB device identity of insertion matches with mobile terminal, is then set by the verification of security kernel driving unit The security kernel function that load or unload virtual disk is selected after standby identity, finally by filtration drive unit to the virtual magnetic The operation of data is scanned filtering in disk, and the data for meeting filter condition are encrypted or are decrypted.Above-mentioned each unit Function realize that, specifically, after needing a cell operation at first, next unit is just started to work in turn.Respectively Module meets the common use habit of user, easy to implement and safe, realizes the confidential document data in mobile terminal Safeguard protection.
It is specific embodiment below:
Optimize said program, referring to Fig. 1, the USB device authentication unit includes at least:Legitimate verification module, mark Know and checks module, identity acquisition module, identity verification module and mark writing module.Wherein, legitimate verification module is used for Identity checks are carried out to the U-key equipment of insertion, confirm that its own ID whether there is in the Key ID lists of the system, mark Know inspection module and is used to check whether the U-key being inserted into there is mobile terminal identification, identity acquisition module to be used to obtain insertion Whether mobile terminal identification in U-key equipment, identity verification module are used to confirm the mobile terminal identification in the U-key obtained It is matched with the mark for the mobile terminal being inserted into, mark writing module is used in the U-key of insertion mobile terminal for the first time be written Corresponding mobile terminal identification realizes the one-to-one binding of mobile terminal and U-key.After client software is installed, pass through combination Special U-key realizes that authentication, U-key and the one-to-one binding of terminal, security performance are high
As the prioritization scheme of the embodiment of the present invention, mobile terminal includes mobile notebook or tablet computer or intelligent hand Machine.All mobile devices that can read USB flash disk on the market can use.
The embodiment of the present invention provides a kind of method for managing security for mobile terminal document, referring to Fig. 5, including as follows Step:S1 starts the ends PC, and runs client-side program, initialization USB device monitoring unit, USB device authentication unit, safety Core driving unit and filtration drive unit;S2 has detected whether USB device access using the USB device monitoring unit The ends PC;S3 verifies whether the USB device identity matches with mobile terminal using the USB device authentication unit;S4 is used The security kernel driving unit is to the equipment selection load virtual disk after the USB device authentication unit verifies identity Security kernel function;S5 is scanned filtering using the filtration drive unit to the operation of data in the virtual disk, And it selects that the data in the virtual disk are encrypted or are decrypted.The step is corresponding with each unit in above system, symbol The common use habit in family is shared, easy to implement and safe, the confidential document data safety realized in mobile terminal is protected Shield.
Optimize said program, please refer to Fig. 2 and Fig. 3, in the S2 steps, detected whether USB device insertion, has Body is:S200, if so, the USB device authentication unit carries out identity legitimacy verification to the U-key of insertion, if being inserted into U- The ID of key is present in the Key ID lists of the client-side program, then continues to carry out down;Otherwise, terminate the step; S201 carries out mobile terminal identification inspection to the U-key by the legitimate verification and is loaded if there is mobile terminal identification The security kernel function of virtual disk;Otherwise, illustrate that U-key is to be inserted into mobile terminal for the first time, by the mark of corresponding mobile terminal It is written in U-key, is further continued for the security kernel function of load virtual disk;S202 obtains the movement in the U-key equipment of insertion Terminal iidentification, confirms whether the mobile terminal identification in the U-key matches with the mark for the mobile terminal being inserted into;If so, Then continue to carry out down, otherwise, terminates the step;S203, mobile terminal identification in confirming U-key and the movement being inserted into After the mark matching of terminal, virtual disk is locally being loaded, exclusive encrypted partition is formed.After client software is installed, pass through knot Special U-key is closed, realizes authentication, U-key and the one-to-one binding of terminal, security performance is high, and if only if U-key passes through verification Afterwards, virtual disk is locally just being loaded, is forming exclusive encrypted partition;When being written in encrypted partition or reading data, system is certainly It is dynamic to carry out encryption and decryption.
Said program is advanced optimized, Fig. 2 and Fig. 4 is please referred to, in the S2 steps, has detected whether USB device It pulls out, if so, USB device authentication unit reads the information of mobile terminal in U-key;If can read, USB device is monitored Unit continues to execute monitoring;Otherwise, virtual disk is unloaded, the exclusive encrypted partition is invisible and unavailable.Pull out U-key Afterwards, exclusive encrypted partition is invisible and unavailable;Encrypted state is kept after data are detached from exclusive encrypted partition, if by illegally copying Shellfish can not still open after leaving native en, to ensure key document data safety.
As the prioritization scheme of the embodiment of the present invention, exclusive encrypted partition is specially:Document in exclusive encrypted area is certainly Dynamic encryption;When in the exclusive encrypted partition, the document can equally be opened, edit and preserve with normal file, when It is illegally duplicated when leaving native en, the document can not be opened, to ensure the safety of key document data.Preferably, Document includes the document of newly-built document and copy, and the document that either newly-built document still copies can obtain exclusive add The protection of close subregion, and when be illegally duplicated leave native en when, also all can cause the document that can not open.
As the prioritization scheme of the embodiment of the present invention, S5 steps are specially:Scanning filtering upper layer application is to data in disk Operation, it is described operation include read or be written;Judge whether the operation carries out in virtual disk, if so, to write-in The data of virtual disk are encrypted, and otherwise, the data to reading virtual disk are decrypted.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with Understanding without departing from the principles and spirit of the present invention can carry out these embodiments a variety of variations, modification, replace And modification, the scope of the present invention is defined by the appended.

Claims (9)

1. a kind of safety management system for mobile terminal document, it is characterised in that:It is set including USB device monitoring unit, USB Standby authentication unit, security kernel driving unit and filtration drive unit;
The USB device monitoring unit judges whether there is USB device and is inserted into or pulls out for monitoring USB port;
The USB device authentication unit, for verifying whether the USB device identity being inserted into matches with mobile terminal;
The security kernel driving unit, for after the USB device authentication unit verifies equipment identities, selection to be loaded or unloaded Carry the security kernel function of virtual disk;
The filtration drive unit, for being scanned filtering to the operation of data in the virtual disk, and to meeting filtering The data of condition are encrypted or decrypt.
2. a kind of safety management system for mobile terminal document as described in claim 1, it is characterised in that:The USB Device authentication unit includes at least:Legitimate verification module, mark check module, identity acquisition module, identity verification module with And mark writing module;
The legitimate verification module carries out identity checks for the U-key equipment to insertion, confirms that its own ID whether there is In the Key ID lists of the system;
The mark checks module, for checking whether the U-key being inserted into has mobile terminal identification;
The identity acquisition module, for obtaining the mobile terminal identification in the U-key equipment being inserted into;
The identity verification module, for confirm the mobile terminal identification in the U-key obtained whether with mobile end for being inserted into The mark at end matches;
The mark writing module, it is real for corresponding mobile terminal identification to be written in the U-key of insertion mobile terminal for the first time The one-to-one binding of existing mobile terminal and U-key.
3. a kind of safety management system for mobile terminal document as described in claim 1, it is characterised in that:The movement Terminal includes notebook or tablet computer or smart mobile phone.
4. a kind of method for managing security for mobile terminal document, which is characterized in that include the following steps:
S1 starts the ends PC, and runs client-side program, initialization USB device monitoring unit, USB device authentication unit, safe kernel Heart driving unit and filtration drive unit;
S2 has detected whether the ends USB device access PC using the USB device monitoring unit;
S3 verifies whether the USB device identity matches with mobile terminal using the USB device authentication unit;
S4 selects the equipment after the USB device authentication unit verifies identity using the security kernel driving unit Load the security kernel function of virtual disk;
S5 is scanned filtering to the operation of data in the virtual disk using the filtration drive unit, and selects to institute The data in virtual disk are stated to be encrypted or decrypt.
5. a kind of method for managing security for mobile terminal document as claimed in claim 4, which is characterized in that in the S2 In step, USB device insertion has been detected whether, specially:
S200, if so, the USB device authentication unit carries out identity legitimacy verification to the U-key of insertion, if being inserted into U- The ID of key is present in the Key ID lists of the client-side program, then continues to carry out down;Otherwise, terminate the step;
S201, to carrying out mobile terminal identification inspection by the U-key of the legitimate verification, if there is mobile terminal identification, Load the security kernel function of virtual disk;Otherwise, illustrate that U-key is to be inserted into mobile terminal for the first time, by corresponding mobile terminal In mark write-in U-key, it is further continued for the security kernel function of load virtual disk;
S202 obtains the mobile terminal identification in the U-key equipment of insertion, confirms that the mobile terminal identification in the U-key is The no mark with the mobile terminal being inserted into matches;If so, continuing to carry out down, otherwise, terminate the step;
S203, after the mobile terminal identification in confirming U-key is matched with the mark for the mobile terminal being inserted into, in local load Virtual disk forms exclusive encrypted partition.
6. a kind of method for managing security for mobile terminal document as claimed in claim 5, which is characterized in that in the S2 In step, detect whether that USB device is pulled out, if so, USB device authentication unit reads the information of mobile terminal in U-key; If can read, USB device monitoring unit continues to execute monitoring;Otherwise, virtual disk is unloaded, the exclusive encrypted partition is not It can be seen that and unavailable.
7. a kind of method for managing security for mobile terminal document as claimed in claim 5, which is characterized in that described exclusive Document in encrypted area is encrypted automatically;When in the exclusive encrypted partition, the document can equally be beaten with normal file Open, edit and preserve, when be illegally duplicated leave native en when, the document can not be opened, to ensure key document The safety of data.
8. a kind of method for managing security for mobile terminal document as claimed in claim 7, which is characterized in that the document Include the document of newly-built document and copy.
9. a kind of method for managing security for mobile terminal document as claimed in claim 4, which is characterized in that the S5 steps It is rapid to be specially:Operation of the scanning filtering upper layer application to data in disk, the operation include reading or being written;Judge the behaviour Whether work carries out in virtual disk, if so, the data that virtual disk is written are encrypted, otherwise, to reading virtual magnetic The data of disk are decrypted.
CN201711421731.3A 2017-12-25 2017-12-25 Security management system and method for mobile terminal file Active CN108287988B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711421731.3A CN108287988B (en) 2017-12-25 2017-12-25 Security management system and method for mobile terminal file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711421731.3A CN108287988B (en) 2017-12-25 2017-12-25 Security management system and method for mobile terminal file

Publications (2)

Publication Number Publication Date
CN108287988A true CN108287988A (en) 2018-07-17
CN108287988B CN108287988B (en) 2022-04-05

Family

ID=62832255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711421731.3A Active CN108287988B (en) 2017-12-25 2017-12-25 Security management system and method for mobile terminal file

Country Status (1)

Country Link
CN (1) CN108287988B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
CN111651786A (en) * 2020-05-22 2020-09-11 北京中兴恒工程咨询有限公司 Office information management method and system
CN112528319A (en) * 2020-12-05 2021-03-19 江苏秉信科技有限公司 Information local security caching method based on multiple authentications

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882857A (en) * 2012-09-10 2013-01-16 福建伊时代信息科技股份有限公司 Client side device, encryption storage device, and remote access method and system
CN102984273A (en) * 2012-12-13 2013-03-20 华为技术有限公司 Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server
CN103218573A (en) * 2013-05-07 2013-07-24 安徽海加网络科技有限公司 Traceless access controlling method and device based on protection of visual magnetic disc
CN203164961U (en) * 2012-08-31 2013-08-28 武汉华工安鼎信息技术有限责任公司 Safe portable storage device
CN103632080A (en) * 2013-11-06 2014-03-12 国家电网公司 Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN104008330A (en) * 2014-05-23 2014-08-27 武汉华工安鼎信息技术有限责任公司 Data leakage prevention system based on file set storage and isolation technology and method thereof
CN104134294A (en) * 2014-07-18 2014-11-05 浪潮软件集团有限公司 Authorization authentication method based on business hall self-service terminal
CN104200176A (en) * 2014-08-28 2014-12-10 电子科技大学 System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal
CN104361297A (en) * 2014-11-19 2015-02-18 成都卫士通信息安全技术有限公司 File encryption and decryption method based on Linux operating system
CN104484625A (en) * 2014-12-29 2015-04-01 北京明朝万达科技有限公司 Computer with dual operating systems and implementation method thereof
CN107194264A (en) * 2017-05-24 2017-09-22 济南浪潮高新科技投资发展有限公司 A kind of network interface card with safety certification function based on UEFI
CN107273769A (en) * 2017-07-11 2017-10-20 北京洋浦伟业科技发展有限公司 The guard method of a kind of electronic equipment and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203164961U (en) * 2012-08-31 2013-08-28 武汉华工安鼎信息技术有限责任公司 Safe portable storage device
CN102882857A (en) * 2012-09-10 2013-01-16 福建伊时代信息科技股份有限公司 Client side device, encryption storage device, and remote access method and system
CN102984273A (en) * 2012-12-13 2013-03-20 华为技术有限公司 Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server
CN103218573A (en) * 2013-05-07 2013-07-24 安徽海加网络科技有限公司 Traceless access controlling method and device based on protection of visual magnetic disc
CN103632080A (en) * 2013-11-06 2014-03-12 国家电网公司 Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN104008330A (en) * 2014-05-23 2014-08-27 武汉华工安鼎信息技术有限责任公司 Data leakage prevention system based on file set storage and isolation technology and method thereof
CN104134294A (en) * 2014-07-18 2014-11-05 浪潮软件集团有限公司 Authorization authentication method based on business hall self-service terminal
CN104200176A (en) * 2014-08-28 2014-12-10 电子科技大学 System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal
CN104361297A (en) * 2014-11-19 2015-02-18 成都卫士通信息安全技术有限公司 File encryption and decryption method based on Linux operating system
CN104484625A (en) * 2014-12-29 2015-04-01 北京明朝万达科技有限公司 Computer with dual operating systems and implementation method thereof
CN107194264A (en) * 2017-05-24 2017-09-22 济南浪潮高新科技投资发展有限公司 A kind of network interface card with safety certification function based on UEFI
CN107273769A (en) * 2017-07-11 2017-10-20 北京洋浦伟业科技发展有限公司 The guard method of a kind of electronic equipment and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陆海龙: "数据安全存储系统的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
CN111651786A (en) * 2020-05-22 2020-09-11 北京中兴恒工程咨询有限公司 Office information management method and system
CN111651786B (en) * 2020-05-22 2024-04-23 北京中兴恒工程咨询有限公司 Office information management method and system
CN112528319A (en) * 2020-12-05 2021-03-19 江苏秉信科技有限公司 Information local security caching method based on multiple authentications

Also Published As

Publication number Publication date
CN108287988B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN101079882B (en) Posture-based data protection
CN100449561C (en) Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
US20150227748A1 (en) Method and System for Securing Data
CN103198263B (en) By the method that the peripheral hardware key of personal computer sets up enciphering/deciphering memory space
CN202795383U (en) Device and system for protecting data
CN103701977B (en) Portable electronic equipment, communication system and information authentication method
CN108287988A (en) Safety management system and method for mobile terminal document
CN109344598A (en) The binding of equipment room and authority control method, device, equipment and storage medium
CN106484570A (en) A kind of backpu protecting method and system extorting software document data for defence
CN101739361A (en) Access control method, access control device and terminal device
CN109766215B (en) Data processing method and device
CN110543775B (en) Data security protection method and system based on super-fusion concept
Sporea et al. On the availability of anti-forensic tools for smartphones
CN108319867A (en) Dualized file divulgence prevention method and system based on HOOK and window filter
CN109657490B (en) Transparent encryption and decryption method and system for office files
CN106295386A (en) The guard method of data file, device and terminal unit
JP2008108232A (en) Information leakage suppression apparatus, information leakage suppression program, information leakage suppression recording medium and information leakage suppression system
CN107704337A (en) Method, mobile terminal and the device with store function of factory reset
CN201489538U (en) Terminal safety and security equipment
CN106453057A (en) Method and terminal for preventing short message from being stolen
CN101901320A (en) Data leakage prevention method for electronic book reader
CN104200173A (en) Electronic document trust and security control method and system
CN103052060B (en) A kind of method and a kind of mobile terminal for improving information of mobile terminal safety
CN107273725A (en) A kind of data back up method and system for classified information
JP4138854B1 (en) External device management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant