CN108287988A - Safety management system and method for mobile terminal document - Google Patents
Safety management system and method for mobile terminal document Download PDFInfo
- Publication number
- CN108287988A CN108287988A CN201711421731.3A CN201711421731A CN108287988A CN 108287988 A CN108287988 A CN 108287988A CN 201711421731 A CN201711421731 A CN 201711421731A CN 108287988 A CN108287988 A CN 108287988A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- usb device
- key
- document
- virtual disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4063—Device-to-bus coupling
- G06F13/4068—Electrical coupling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
Abstract
The present invention relates to mobile terminal data field of safety protection, provide a kind of safety management system for mobile terminal document, including USB device monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive unit.A kind of method for managing security for mobile terminal document is also provided, is included the following steps:S1 starts the ends PC, and runs client-side program, initializes each unit;S2 has detected whether the ends USB device access PC using USB device monitoring unit;Whether S3 is matched with mobile terminal using USB device authentication unit verification USB device identity;S4, using security kernel driving unit to the security kernel function of the equipment selection load virtual disk after USB device authentication unit verifies identity;S5 is scanned filtering to the operation of data in virtual disk using filtration drive unit, and selects that the data in virtual disk are encrypted or are decrypted.The present invention is safe, and it is convenient to implement, and does not change user's use habit.
Description
Technical field
The present invention relates to mobile terminal data field of safety protection, particularly for the safety management system of mobile terminal document
System and method.
Background technology
Mobile office more and more becomes the scene in people's routine work, but in meeting, the working environments such as go on business
In, personnel are complicated, and environmental change factor is big, and the safety of onboard data is faced with very high risk in mobile terminal.Once hair
Situations such as raw mobile terminal loss, stolen, unauthorized access, illegal copies, it will lead to the confidential document data information in terminal
Leakage, immeasurable loss is caused to unit.
Currently, mainly using data backup, encryption storage, access control, post-audit to the data protection of mobile terminal
Etc. technological means, but that there are still efficiency is low, is unable to control data to outside transmission or publication, Wu Fafang using above-mentioned technological means
The only drawbacks such as loss of data.
Invention content
The purpose of the present invention is to provide the safety management systems and method for mobile terminal document, can at least solve
Segmental defect in the prior art.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:A kind of peace for mobile terminal document
Full management system, including USB device monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive list
Member;
The USB device monitoring unit judges whether there is USB device and is inserted into or pulls out for monitoring USB port;
The USB device authentication unit, for verifying whether the USB device identity being inserted into matches with mobile terminal;
The security kernel driving unit, for after the USB device authentication unit verifies equipment identities, selection to load
Or the security kernel function of unloading virtual disk;
The filtration drive unit, for being scanned filtering to the operation of data in the virtual disk, and to meeting
The data of filter condition are encrypted or decrypt.
Further, the USB device authentication unit includes at least:Legitimate verification module, mark check that module, identity obtain
Modulus block, identity verification module and mark writing module;
The legitimate verification module carries out identity checks for the U-key equipment to insertion, whether confirms its own ID
It is present in the Key ID lists of the system;
The mark checks module, for checking whether the U-key being inserted into has mobile terminal identification;
The identity acquisition module, for obtaining the mobile terminal identification in the U-key equipment being inserted into;
The identity verification module, for confirm the mobile terminal identification in the U-key obtained whether with the shifting that is inserted into
The mark matching of dynamic terminal;
The mark writing module, for corresponding mobile terminal mark to be written in the U-key of insertion mobile terminal for the first time
Know, realizes the one-to-one binding of mobile terminal and U-key.
Further, the mobile terminal includes notebook or tablet computer or smart mobile phone.
The embodiment of the present invention provides another technical solution:A kind of method for managing security for mobile terminal document, packet
Include following steps:
S1 starts the ends PC, and runs client-side program, initialization USB device monitoring unit, USB device authentication unit, peace
Full core driving unit and filtration drive unit;
S2 has detected whether the ends USB device access PC using the USB device monitoring unit;
S3 verifies whether the USB device identity matches with mobile terminal using the USB device authentication unit;
S4, using the security kernel driving unit to the equipment after the USB device authentication unit verifies identity
The security kernel function of selection load virtual disk;
S5 is scanned filtering to the operation of data in the virtual disk using the filtration drive unit, and selects
Data in the virtual disk are encrypted or are decrypted.
Further, in the S2 steps, USB device insertion has been detected whether, specially:
S200, if so, the USB device authentication unit carries out identity legitimacy verification to the U-key of insertion, if being inserted into
The ID of U-key is present in the Key ID lists of the client-side program, then continues to carry out down;Otherwise, terminate the step;
S201, to carrying out mobile terminal identification inspection by the U-key of the legitimate verification, if there is mobile terminal mark
Know, then loads the security kernel function of virtual disk;Otherwise, illustrate that U-key is to be inserted into mobile terminal for the first time, will accordingly move eventually
In the mark write-in U-key at end, it is further continued for the security kernel function of load virtual disk;
S202 obtains the mobile terminal identification in the U-key equipment of insertion, confirms the mobile terminal mark in the U-key
Whether knowledge matches with the mark for the mobile terminal being inserted into;If so, continuing to carry out down, otherwise, terminate the step;
S203, after the mobile terminal identification in confirming U-key is matched with the mark for the mobile terminal being inserted into, in local
Virtual disk is loaded, exclusive encrypted partition is formed.
Further, in the S2 steps, detected whether that USB device is pulled out, if so, USB device authentication unit is read
Take the information of mobile terminal in U-key;If can read, USB device monitoring unit continues to execute monitoring;Otherwise, unloading is empty
Quasi- disk, the exclusive encrypted partition are invisible and unavailable.
Further, the document in the exclusive encrypted area is encrypted automatically;It is described when in the exclusive encrypted partition
Document can equally be opened, edit and preserve with normal file, when be illegally duplicated leave native en when, the document can not
It opens, to ensure the safety of key document data.
Further, the document includes the document of newly-built document and copy.
Further, the S5 steps are specially:Operation of the scanning filtering upper layer application to data in disk, the operation packet
Include reading or write-in;Judge whether the operation carries out in virtual disk, if so, being carried out to the data that virtual disk is written
Encryption, otherwise, the data to reading virtual disk are decrypted.
Compared with prior art, the beneficial effects of the invention are as follows:
1, using USB device monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive list
Being used cooperatively for member, safe, it is convenient to implement, and does not change user's use habit.
2, after client software being installed, by combining special U-key, realize authentication, U-key with terminal is one-to-one ties up
Fixed, security performance is high.
3, only after U-key is by verification, virtual disk is locally just being loaded, is forming exclusive encrypted partition;In encryption point
When being written in area or reading data, system carries out encryption and decryption automatically.
4, after pulling out U-key, exclusive encrypted partition is invisible and unavailable;It is kept after data are detached from exclusive encrypted partition
Encrypted state, if be illegally duplicated leave native en after can not still open, to ensure key document data safety.
Description of the drawings
Fig. 1 is a kind of functional framework of safety management system for mobile terminal document provided in an embodiment of the present invention
Figure;
Fig. 2 is that a kind of USB device of method for managing security for mobile terminal document provided in an embodiment of the present invention is supervised
Listen the flow chart of unit;
Whether Fig. 3 has USB for a kind of method for managing security for mobile terminal document provided in an embodiment of the present invention
The flow chart that equipment is inserted into;
Whether Fig. 4 has USB for a kind of method for managing security for mobile terminal document provided in an embodiment of the present invention
The flow chart that equipment is pulled out;
Fig. 5 is a kind of step flow of method for managing security for mobile terminal document provided in an embodiment of the present invention
Figure.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the embodiment of the present invention provides a kind of safety management system for mobile terminal document, including USB
Equipment monitoring unit, USB device authentication unit, security kernel driving unit and filtration drive unit.In the present system, pass through
USB device monitoring unit monitors USB port, judges whether there is USB device and is inserted into or pulls out, is then verified by USB device
Unit verifies whether the USB device identity of insertion matches with mobile terminal, is then set by the verification of security kernel driving unit
The security kernel function that load or unload virtual disk is selected after standby identity, finally by filtration drive unit to the virtual magnetic
The operation of data is scanned filtering in disk, and the data for meeting filter condition are encrypted or are decrypted.Above-mentioned each unit
Function realize that, specifically, after needing a cell operation at first, next unit is just started to work in turn.Respectively
Module meets the common use habit of user, easy to implement and safe, realizes the confidential document data in mobile terminal
Safeguard protection.
It is specific embodiment below:
Optimize said program, referring to Fig. 1, the USB device authentication unit includes at least:Legitimate verification module, mark
Know and checks module, identity acquisition module, identity verification module and mark writing module.Wherein, legitimate verification module is used for
Identity checks are carried out to the U-key equipment of insertion, confirm that its own ID whether there is in the Key ID lists of the system, mark
Know inspection module and is used to check whether the U-key being inserted into there is mobile terminal identification, identity acquisition module to be used to obtain insertion
Whether mobile terminal identification in U-key equipment, identity verification module are used to confirm the mobile terminal identification in the U-key obtained
It is matched with the mark for the mobile terminal being inserted into, mark writing module is used in the U-key of insertion mobile terminal for the first time be written
Corresponding mobile terminal identification realizes the one-to-one binding of mobile terminal and U-key.After client software is installed, pass through combination
Special U-key realizes that authentication, U-key and the one-to-one binding of terminal, security performance are high
As the prioritization scheme of the embodiment of the present invention, mobile terminal includes mobile notebook or tablet computer or intelligent hand
Machine.All mobile devices that can read USB flash disk on the market can use.
The embodiment of the present invention provides a kind of method for managing security for mobile terminal document, referring to Fig. 5, including as follows
Step:S1 starts the ends PC, and runs client-side program, initialization USB device monitoring unit, USB device authentication unit, safety
Core driving unit and filtration drive unit;S2 has detected whether USB device access using the USB device monitoring unit
The ends PC;S3 verifies whether the USB device identity matches with mobile terminal using the USB device authentication unit;S4 is used
The security kernel driving unit is to the equipment selection load virtual disk after the USB device authentication unit verifies identity
Security kernel function;S5 is scanned filtering using the filtration drive unit to the operation of data in the virtual disk,
And it selects that the data in the virtual disk are encrypted or are decrypted.The step is corresponding with each unit in above system, symbol
The common use habit in family is shared, easy to implement and safe, the confidential document data safety realized in mobile terminal is protected
Shield.
Optimize said program, please refer to Fig. 2 and Fig. 3, in the S2 steps, detected whether USB device insertion, has
Body is:S200, if so, the USB device authentication unit carries out identity legitimacy verification to the U-key of insertion, if being inserted into U-
The ID of key is present in the Key ID lists of the client-side program, then continues to carry out down;Otherwise, terminate the step;
S201 carries out mobile terminal identification inspection to the U-key by the legitimate verification and is loaded if there is mobile terminal identification
The security kernel function of virtual disk;Otherwise, illustrate that U-key is to be inserted into mobile terminal for the first time, by the mark of corresponding mobile terminal
It is written in U-key, is further continued for the security kernel function of load virtual disk;S202 obtains the movement in the U-key equipment of insertion
Terminal iidentification, confirms whether the mobile terminal identification in the U-key matches with the mark for the mobile terminal being inserted into;If so,
Then continue to carry out down, otherwise, terminates the step;S203, mobile terminal identification in confirming U-key and the movement being inserted into
After the mark matching of terminal, virtual disk is locally being loaded, exclusive encrypted partition is formed.After client software is installed, pass through knot
Special U-key is closed, realizes authentication, U-key and the one-to-one binding of terminal, security performance is high, and if only if U-key passes through verification
Afterwards, virtual disk is locally just being loaded, is forming exclusive encrypted partition;When being written in encrypted partition or reading data, system is certainly
It is dynamic to carry out encryption and decryption.
Said program is advanced optimized, Fig. 2 and Fig. 4 is please referred to, in the S2 steps, has detected whether USB device
It pulls out, if so, USB device authentication unit reads the information of mobile terminal in U-key;If can read, USB device is monitored
Unit continues to execute monitoring;Otherwise, virtual disk is unloaded, the exclusive encrypted partition is invisible and unavailable.Pull out U-key
Afterwards, exclusive encrypted partition is invisible and unavailable;Encrypted state is kept after data are detached from exclusive encrypted partition, if by illegally copying
Shellfish can not still open after leaving native en, to ensure key document data safety.
As the prioritization scheme of the embodiment of the present invention, exclusive encrypted partition is specially:Document in exclusive encrypted area is certainly
Dynamic encryption;When in the exclusive encrypted partition, the document can equally be opened, edit and preserve with normal file, when
It is illegally duplicated when leaving native en, the document can not be opened, to ensure the safety of key document data.Preferably,
Document includes the document of newly-built document and copy, and the document that either newly-built document still copies can obtain exclusive add
The protection of close subregion, and when be illegally duplicated leave native en when, also all can cause the document that can not open.
As the prioritization scheme of the embodiment of the present invention, S5 steps are specially:Scanning filtering upper layer application is to data in disk
Operation, it is described operation include read or be written;Judge whether the operation carries out in virtual disk, if so, to write-in
The data of virtual disk are encrypted, and otherwise, the data to reading virtual disk are decrypted.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
Understanding without departing from the principles and spirit of the present invention can carry out these embodiments a variety of variations, modification, replace
And modification, the scope of the present invention is defined by the appended.
Claims (9)
1. a kind of safety management system for mobile terminal document, it is characterised in that:It is set including USB device monitoring unit, USB
Standby authentication unit, security kernel driving unit and filtration drive unit;
The USB device monitoring unit judges whether there is USB device and is inserted into or pulls out for monitoring USB port;
The USB device authentication unit, for verifying whether the USB device identity being inserted into matches with mobile terminal;
The security kernel driving unit, for after the USB device authentication unit verifies equipment identities, selection to be loaded or unloaded
Carry the security kernel function of virtual disk;
The filtration drive unit, for being scanned filtering to the operation of data in the virtual disk, and to meeting filtering
The data of condition are encrypted or decrypt.
2. a kind of safety management system for mobile terminal document as described in claim 1, it is characterised in that:The USB
Device authentication unit includes at least:Legitimate verification module, mark check module, identity acquisition module, identity verification module with
And mark writing module;
The legitimate verification module carries out identity checks for the U-key equipment to insertion, confirms that its own ID whether there is
In the Key ID lists of the system;
The mark checks module, for checking whether the U-key being inserted into has mobile terminal identification;
The identity acquisition module, for obtaining the mobile terminal identification in the U-key equipment being inserted into;
The identity verification module, for confirm the mobile terminal identification in the U-key obtained whether with mobile end for being inserted into
The mark at end matches;
The mark writing module, it is real for corresponding mobile terminal identification to be written in the U-key of insertion mobile terminal for the first time
The one-to-one binding of existing mobile terminal and U-key.
3. a kind of safety management system for mobile terminal document as described in claim 1, it is characterised in that:The movement
Terminal includes notebook or tablet computer or smart mobile phone.
4. a kind of method for managing security for mobile terminal document, which is characterized in that include the following steps:
S1 starts the ends PC, and runs client-side program, initialization USB device monitoring unit, USB device authentication unit, safe kernel
Heart driving unit and filtration drive unit;
S2 has detected whether the ends USB device access PC using the USB device monitoring unit;
S3 verifies whether the USB device identity matches with mobile terminal using the USB device authentication unit;
S4 selects the equipment after the USB device authentication unit verifies identity using the security kernel driving unit
Load the security kernel function of virtual disk;
S5 is scanned filtering to the operation of data in the virtual disk using the filtration drive unit, and selects to institute
The data in virtual disk are stated to be encrypted or decrypt.
5. a kind of method for managing security for mobile terminal document as claimed in claim 4, which is characterized in that in the S2
In step, USB device insertion has been detected whether, specially:
S200, if so, the USB device authentication unit carries out identity legitimacy verification to the U-key of insertion, if being inserted into U-
The ID of key is present in the Key ID lists of the client-side program, then continues to carry out down;Otherwise, terminate the step;
S201, to carrying out mobile terminal identification inspection by the U-key of the legitimate verification, if there is mobile terminal identification,
Load the security kernel function of virtual disk;Otherwise, illustrate that U-key is to be inserted into mobile terminal for the first time, by corresponding mobile terminal
In mark write-in U-key, it is further continued for the security kernel function of load virtual disk;
S202 obtains the mobile terminal identification in the U-key equipment of insertion, confirms that the mobile terminal identification in the U-key is
The no mark with the mobile terminal being inserted into matches;If so, continuing to carry out down, otherwise, terminate the step;
S203, after the mobile terminal identification in confirming U-key is matched with the mark for the mobile terminal being inserted into, in local load
Virtual disk forms exclusive encrypted partition.
6. a kind of method for managing security for mobile terminal document as claimed in claim 5, which is characterized in that in the S2
In step, detect whether that USB device is pulled out, if so, USB device authentication unit reads the information of mobile terminal in U-key;
If can read, USB device monitoring unit continues to execute monitoring;Otherwise, virtual disk is unloaded, the exclusive encrypted partition is not
It can be seen that and unavailable.
7. a kind of method for managing security for mobile terminal document as claimed in claim 5, which is characterized in that described exclusive
Document in encrypted area is encrypted automatically;When in the exclusive encrypted partition, the document can equally be beaten with normal file
Open, edit and preserve, when be illegally duplicated leave native en when, the document can not be opened, to ensure key document
The safety of data.
8. a kind of method for managing security for mobile terminal document as claimed in claim 7, which is characterized in that the document
Include the document of newly-built document and copy.
9. a kind of method for managing security for mobile terminal document as claimed in claim 4, which is characterized in that the S5 steps
It is rapid to be specially:Operation of the scanning filtering upper layer application to data in disk, the operation include reading or being written;Judge the behaviour
Whether work carries out in virtual disk, if so, the data that virtual disk is written are encrypted, otherwise, to reading virtual magnetic
The data of disk are decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711421731.3A CN108287988B (en) | 2017-12-25 | 2017-12-25 | Security management system and method for mobile terminal file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711421731.3A CN108287988B (en) | 2017-12-25 | 2017-12-25 | Security management system and method for mobile terminal file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108287988A true CN108287988A (en) | 2018-07-17 |
CN108287988B CN108287988B (en) | 2022-04-05 |
Family
ID=62832255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711421731.3A Active CN108287988B (en) | 2017-12-25 | 2017-12-25 | Security management system and method for mobile terminal file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108287988B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109460651A (en) * | 2018-10-17 | 2019-03-12 | 航天信息股份有限公司 | The login method and device of billing system |
CN111651786A (en) * | 2020-05-22 | 2020-09-11 | 北京中兴恒工程咨询有限公司 | Office information management method and system |
CN112528319A (en) * | 2020-12-05 | 2021-03-19 | 江苏秉信科技有限公司 | Information local security caching method based on multiple authentications |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882857A (en) * | 2012-09-10 | 2013-01-16 | 福建伊时代信息科技股份有限公司 | Client side device, encryption storage device, and remote access method and system |
CN102984273A (en) * | 2012-12-13 | 2013-03-20 | 华为技术有限公司 | Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server |
CN103218573A (en) * | 2013-05-07 | 2013-07-24 | 安徽海加网络科技有限公司 | Traceless access controlling method and device based on protection of visual magnetic disc |
CN203164961U (en) * | 2012-08-31 | 2013-08-28 | 武汉华工安鼎信息技术有限责任公司 | Safe portable storage device |
CN103632080A (en) * | 2013-11-06 | 2014-03-12 | 国家电网公司 | Mobile data application safety protection system and mobile data application safety protection method based on USBKey |
CN104008330A (en) * | 2014-05-23 | 2014-08-27 | 武汉华工安鼎信息技术有限责任公司 | Data leakage prevention system based on file set storage and isolation technology and method thereof |
CN104134294A (en) * | 2014-07-18 | 2014-11-05 | 浪潮软件集团有限公司 | Authorization authentication method based on business hall self-service terminal |
CN104200176A (en) * | 2014-08-28 | 2014-12-10 | 电子科技大学 | System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal |
CN104361297A (en) * | 2014-11-19 | 2015-02-18 | 成都卫士通信息安全技术有限公司 | File encryption and decryption method based on Linux operating system |
CN104484625A (en) * | 2014-12-29 | 2015-04-01 | 北京明朝万达科技有限公司 | Computer with dual operating systems and implementation method thereof |
CN107194264A (en) * | 2017-05-24 | 2017-09-22 | 济南浪潮高新科技投资发展有限公司 | A kind of network interface card with safety certification function based on UEFI |
CN107273769A (en) * | 2017-07-11 | 2017-10-20 | 北京洋浦伟业科技发展有限公司 | The guard method of a kind of electronic equipment and device |
-
2017
- 2017-12-25 CN CN201711421731.3A patent/CN108287988B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203164961U (en) * | 2012-08-31 | 2013-08-28 | 武汉华工安鼎信息技术有限责任公司 | Safe portable storage device |
CN102882857A (en) * | 2012-09-10 | 2013-01-16 | 福建伊时代信息科技股份有限公司 | Client side device, encryption storage device, and remote access method and system |
CN102984273A (en) * | 2012-12-13 | 2013-03-20 | 华为技术有限公司 | Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server |
CN103218573A (en) * | 2013-05-07 | 2013-07-24 | 安徽海加网络科技有限公司 | Traceless access controlling method and device based on protection of visual magnetic disc |
CN103632080A (en) * | 2013-11-06 | 2014-03-12 | 国家电网公司 | Mobile data application safety protection system and mobile data application safety protection method based on USBKey |
CN104008330A (en) * | 2014-05-23 | 2014-08-27 | 武汉华工安鼎信息技术有限责任公司 | Data leakage prevention system based on file set storage and isolation technology and method thereof |
CN104134294A (en) * | 2014-07-18 | 2014-11-05 | 浪潮软件集团有限公司 | Authorization authentication method based on business hall self-service terminal |
CN104200176A (en) * | 2014-08-28 | 2014-12-10 | 电子科技大学 | System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal |
CN104361297A (en) * | 2014-11-19 | 2015-02-18 | 成都卫士通信息安全技术有限公司 | File encryption and decryption method based on Linux operating system |
CN104484625A (en) * | 2014-12-29 | 2015-04-01 | 北京明朝万达科技有限公司 | Computer with dual operating systems and implementation method thereof |
CN107194264A (en) * | 2017-05-24 | 2017-09-22 | 济南浪潮高新科技投资发展有限公司 | A kind of network interface card with safety certification function based on UEFI |
CN107273769A (en) * | 2017-07-11 | 2017-10-20 | 北京洋浦伟业科技发展有限公司 | The guard method of a kind of electronic equipment and device |
Non-Patent Citations (1)
Title |
---|
陆海龙: "数据安全存储系统的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109460651A (en) * | 2018-10-17 | 2019-03-12 | 航天信息股份有限公司 | The login method and device of billing system |
CN111651786A (en) * | 2020-05-22 | 2020-09-11 | 北京中兴恒工程咨询有限公司 | Office information management method and system |
CN111651786B (en) * | 2020-05-22 | 2024-04-23 | 北京中兴恒工程咨询有限公司 | Office information management method and system |
CN112528319A (en) * | 2020-12-05 | 2021-03-19 | 江苏秉信科技有限公司 | Information local security caching method based on multiple authentications |
Also Published As
Publication number | Publication date |
---|---|
CN108287988B (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101079882B (en) | Posture-based data protection | |
CN100449561C (en) | Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology | |
US20150227748A1 (en) | Method and System for Securing Data | |
CN103198263B (en) | By the method that the peripheral hardware key of personal computer sets up enciphering/deciphering memory space | |
CN202795383U (en) | Device and system for protecting data | |
CN103701977B (en) | Portable electronic equipment, communication system and information authentication method | |
CN108287988A (en) | Safety management system and method for mobile terminal document | |
CN109344598A (en) | The binding of equipment room and authority control method, device, equipment and storage medium | |
CN106484570A (en) | A kind of backpu protecting method and system extorting software document data for defence | |
CN101739361A (en) | Access control method, access control device and terminal device | |
CN109766215B (en) | Data processing method and device | |
CN110543775B (en) | Data security protection method and system based on super-fusion concept | |
Sporea et al. | On the availability of anti-forensic tools for smartphones | |
CN108319867A (en) | Dualized file divulgence prevention method and system based on HOOK and window filter | |
CN109657490B (en) | Transparent encryption and decryption method and system for office files | |
CN106295386A (en) | The guard method of data file, device and terminal unit | |
JP2008108232A (en) | Information leakage suppression apparatus, information leakage suppression program, information leakage suppression recording medium and information leakage suppression system | |
CN107704337A (en) | Method, mobile terminal and the device with store function of factory reset | |
CN201489538U (en) | Terminal safety and security equipment | |
CN106453057A (en) | Method and terminal for preventing short message from being stolen | |
CN101901320A (en) | Data leakage prevention method for electronic book reader | |
CN104200173A (en) | Electronic document trust and security control method and system | |
CN103052060B (en) | A kind of method and a kind of mobile terminal for improving information of mobile terminal safety | |
CN107273725A (en) | A kind of data back up method and system for classified information | |
JP4138854B1 (en) | External device management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |