CN108287988B - Security management system and method for mobile terminal file - Google Patents

Security management system and method for mobile terminal file Download PDF

Info

Publication number
CN108287988B
CN108287988B CN201711421731.3A CN201711421731A CN108287988B CN 108287988 B CN108287988 B CN 108287988B CN 201711421731 A CN201711421731 A CN 201711421731A CN 108287988 B CN108287988 B CN 108287988B
Authority
CN
China
Prior art keywords
mobile terminal
key
virtual disk
equipment
usb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711421731.3A
Other languages
Chinese (zh)
Other versions
CN108287988A (en
Inventor
韩敏
景奕昕
廖巍
刘红宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Huagong Anding Information Technology Co ltd
Original Assignee
Wuhan Huagong Anding Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Huagong Anding Information Technology Co ltd filed Critical Wuhan Huagong Anding Information Technology Co ltd
Priority to CN201711421731.3A priority Critical patent/CN108287988B/en
Publication of CN108287988A publication Critical patent/CN108287988A/en
Application granted granted Critical
Publication of CN108287988B publication Critical patent/CN108287988B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4063Device-to-bus coupling
    • G06F13/4068Electrical coupling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of mobile terminal data security protection, and provides a security management system for a mobile terminal file. Also provided is a security management method for a mobile terminal file, comprising the steps of: s1, starting the PC terminal, running the client program and initializing each unit; s2, adopting a USB device monitoring unit to detect whether a USB device is accessed to a PC terminal; s3, verifying whether the USB equipment identity is matched with the mobile terminal by using the USB equipment verification unit; s4, selecting a security core function of loading the virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit; and S5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selecting to encrypt or decrypt the data in the virtual disk. The invention has high safety and convenient implementation, and does not change the use habit of the user.

Description

Security management system and method for mobile terminal file
Technical Field
The invention relates to the field of mobile terminal data security protection, in particular to a security management system and a security management method for mobile terminal files.
Background
Mobile office is increasingly becoming a scene in daily work of people, but in office environments such as meetings and business trips, personnel are complex, environment change factors are large, and safety of built-in data in a mobile terminal faces very high risks. Once the mobile terminal is lost, stolen, illegally accessed, illegally copied and the like, confidential document data information in the terminal is leaked, and immeasurable loss is caused to units.
At present, data protection of a mobile terminal mainly adopts technical means such as data backup, encrypted storage, access control, after audit and the like, but the technical means still has the defects of low efficiency, incapability of controlling data to be transmitted or issued to the outside, incapability of preventing data loss and the like.
Disclosure of Invention
The invention aims to provide a security management system and a security management method for a mobile terminal file, which can at least solve part of defects in the prior art.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions: a security management system for mobile terminal files comprises a USB device monitoring unit, a USB device verification unit, a security core driving unit and a filtering driving unit;
the USB device monitoring unit is used for monitoring the USB port and judging whether a USB device is inserted or removed;
the USB equipment verifying unit is used for verifying whether the identity of the inserted USB equipment is matched with the mobile terminal;
the safety core driving unit is used for selecting the safety core function of loading or unloading the virtual disk after the USB equipment verification unit verifies the equipment identity;
and the filter driving unit is used for scanning and filtering the operation of the data in the virtual disk and encrypting or decrypting the data meeting the filter condition.
Further, the USB device authentication unit includes at least: the system comprises a validity verification module, an identification checking module, an identity acquisition module, an identification verification module and an identification writing module;
the legality verifying module is used for checking the identity of the inserted U-Key equipment and confirming whether the ID of the U-Key equipment exists in a Key ID list of the system;
the identification checking module is used for checking whether the inserted U-key has the mobile terminal identification;
the identity acquisition module is used for acquiring the mobile terminal identification in the inserted U-key equipment;
the identification verification module is used for confirming whether the obtained mobile terminal identification in the U-key is matched with the identification of the inserted mobile terminal;
and the identifier writing module is used for writing the corresponding mobile terminal identifier in the U-key which is inserted into the mobile terminal for the first time, so that the one-to-one binding of the mobile terminal and the U-key is realized.
Further, the mobile terminal comprises a notebook computer, a tablet computer or a smart phone.
The embodiment of the invention provides another technical scheme: a security management method for mobile terminal files comprises the following steps:
s1, starting the PC terminal, running the client program, initializing the USB device monitoring unit, the USB device verifying unit, the security core driving unit and the filtering driving unit;
s2, the USB device monitoring unit is adopted to detect whether a USB device is accessed to the PC terminal;
s3, verifying whether the USB equipment identity is matched with the mobile terminal by the USB equipment verification unit;
s4, selecting a security core function of loading a virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit;
and S5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selectively encrypting or decrypting the data in the virtual disk.
Further, in the step S2, detecting whether a USB device is inserted, specifically:
s200, if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step;
s201, mobile terminal identification check is carried out on the U-key passing the validity verification, and if the mobile terminal identification exists, the safety core function of the virtual disk is loaded; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded;
s202, acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step;
s203, after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition.
Further, in the step S2, it is detected whether there is a USB device unplugged, and if so, the USB device verifying unit reads the mobile terminal information in the U-key; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, the virtual disk is unloaded, and the exclusive encryption partition is invisible and unavailable.
Further, the documents in the exclusive encryption area are automatically encrypted; when the file is in the exclusive encryption partition, the file can be opened, edited and stored as a normal file, and when the file is illegally copied and leaves the local environment, the file cannot be opened so as to ensure the safety of key file data.
Further, the documents include a newly created document and a copied document.
Further, the step S5 specifically includes: scanning and filtering the operation of the upper application on the data in the disk, wherein the operation comprises reading or writing; and judging whether the operation is performed in the virtual disk, if so, encrypting the data written into the virtual disk, and otherwise, decrypting the data read from the virtual disk.
Compared with the prior art, the invention has the beneficial effects that:
1. the USB equipment monitoring unit, the USB equipment verification unit, the safety core driving unit and the filtering driving unit are matched for use, so that the safety is high, the implementation is convenient and fast, and the use habit of a user is not changed.
2. After the client software is installed, the identity authentication is realized by combining the special U-key, and the U-key is bound with the terminal in a one-to-one manner, so that the safety performance is high.
3. Only after the U-key passes the verification, the virtual disk is locally loaded to form an exclusive encryption partition; when data is written or read in the encryption partition, the system automatically performs encryption and decryption.
4. After the U-key is removed, the exclusive encryption partition is invisible and unavailable; when the data is separated from the exclusive encryption partition, the data is kept in an encryption state, and the data cannot be opened after being illegally copied and separated from the local environment, so that the safety of key document data is guaranteed.
Drawings
Fig. 1 is a functional framework diagram of a security management system for a mobile terminal file according to an embodiment of the present invention;
fig. 2 is a flowchart of a USB device monitoring unit for a method for managing security of a file in a mobile terminal according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating whether a USB device is inserted in a security management method for a mobile terminal file according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating whether a USB device is removed in the security management method for a mobile terminal file according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating steps of a method for managing security of a file of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention provides a security management system for a mobile terminal file, including a USB device monitoring unit, a USB device verifying unit, a security kernel driving unit, and a filtering driving unit. In the system, a USB port is monitored through a USB device monitoring unit, whether USB devices are inserted or removed is judged, then whether the identities of the inserted USB devices are matched with a mobile terminal is verified through a USB device verifying unit, then a security core function of a virtual disk is selected to be loaded or unloaded after the identities of the devices are verified through a security core driving unit, finally, the operation of data in the virtual disk is scanned and filtered through a filtering driving unit, and the data meeting the filtering condition is encrypted or decrypted. The functions of the above units are implemented one by one, and specifically, after the first unit works, the next unit starts to work. Each module accords with the common use habit of the user, is convenient to implement and high in safety, and realizes the safety protection of confidential document data in the mobile terminal.
The following are specific examples:
to optimize the above solution, referring to fig. 1, the USB device verifying unit at least includes: the device comprises a validity verification module, an identification checking module, an identity acquisition module, an identification verification module and an identification writing module. The legality verifying module is used for checking the identity of the inserted U-Key equipment and confirming whether the ID of the equipment is in a Key ID list of the system or not, the identification checking module is used for checking whether the inserted U-Key has a mobile terminal identification or not, the identity acquiring module is used for acquiring the mobile terminal identification in the inserted U-Key equipment, the identification verifying module is used for confirming whether the acquired mobile terminal identification in the U-Key is matched with the identification of the inserted mobile terminal or not, and the identification writing module is used for writing the corresponding mobile terminal identification in the U-Key which is inserted into the mobile terminal for the first time so as to realize one-to-one binding of the mobile terminal and the U-Key. After the client software is installed, the identity authentication is realized by combining the special U-key, the U-key is bound with the terminal in a one-to-one manner, and the safety performance is high
As an optimization scheme of the embodiment of the invention, the mobile terminal comprises a mobile notebook or a tablet computer or a smart phone. All mobile devices capable of reading the USB flash disk on the market can be used.
An embodiment of the present invention provides a security management method for a mobile terminal file, please refer to fig. 5, which includes the following steps: s1, starting the PC terminal, running the client program, initializing the USB device monitoring unit, the USB device verifying unit, the security core driving unit and the filtering driving unit; s2, the USB device monitoring unit is adopted to detect whether a USB device is accessed to the PC terminal; s3, verifying whether the USB equipment identity is matched with the mobile terminal by the USB equipment verification unit; s4, selecting a security core function of loading a virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit; and S5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selectively encrypting or decrypting the data in the virtual disk. The steps correspond to all units in the system, accord with the common use habit of users, are convenient to implement and high in safety, and realize the safety protection of confidential document data in the mobile terminal.
With reference to fig. 2 and fig. 3, in the step S2, detecting whether a USB device is inserted specifically includes: s200, if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step; s201, mobile terminal identification check is carried out on the U-key passing the validity verification, and if the mobile terminal identification exists, the safety core function of the virtual disk is loaded; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded; s202, acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step; s203, after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition. After client software is installed, identity authentication is achieved by combining with a special U-key, the U-key and a terminal are bound in a one-to-one mode, safety performance is high, and only after the U-key passes verification, a virtual disk is locally loaded to form an exclusive encryption partition; when data is written or read in the encryption partition, the system automatically performs encryption and decryption.
Further optimizing the above scheme, please refer to fig. 2 and 4, in the step S2, detecting whether there is a USB device unplugging, if so, the USB device verifying unit reads the mobile terminal information in the U-key; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, the virtual disk is unloaded, and the exclusive encryption partition is invisible and unavailable. After the U-key is removed, the exclusive encryption partition is invisible and unavailable; when the data is separated from the exclusive encryption partition, the data is kept in an encryption state, and the data cannot be opened after being illegally copied and separated from the local environment, so that the safety of key document data is guaranteed.
As an optimization scheme of the embodiment of the present invention, the exclusive encryption partition specifically includes: the documents in the exclusive encryption area are automatically encrypted; when the file is in the exclusive encryption partition, the file can be opened, edited and stored as a normal file, and when the file is illegally copied and leaves the local environment, the file cannot be opened so as to ensure the safety of key file data. Preferably, the document includes a new document and a copied document, and the new document or the copied document can be protected by the exclusive encryption partition, and the document cannot be opened even if the document is illegally copied and leaves the local environment.
As an optimization scheme of the embodiment of the present invention, the step S5 specifically includes: scanning and filtering the operation of the upper application on the data in the disk, wherein the operation comprises reading or writing; and judging whether the operation is performed in the virtual disk, if so, encrypting the data written into the virtual disk, and otherwise, decrypting the data read from the virtual disk.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A safety management system for mobile terminal files is characterized in that: the system comprises a USB equipment monitoring unit, a USB equipment verifying unit, a security core driving unit and a filtering driving unit;
the USB device monitoring unit is used for monitoring the USB port and judging whether a USB device is inserted or removed; the specific judgment is as follows:
if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step;
carrying out mobile terminal identification check on the U-key passing the validity verification, and loading the safety core function of the virtual disk if the mobile terminal identification exists; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded;
acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step;
after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition;
the USB equipment verifying unit is used for verifying whether the identity of the inserted USB equipment is matched with the mobile terminal;
the safety core driving unit is used for selecting the safety core function of loading or unloading the virtual disk after the USB equipment verification unit verifies the equipment identity;
the filtering drive unit is used for scanning and filtering the operation of the data in the virtual disk and encrypting or decrypting the data meeting the filtering condition;
detecting whether the USB equipment is removed, if so, reading the mobile terminal information in the U-key by the USB equipment verification unit; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, unloading the virtual disk, wherein the exclusive encryption partition is invisible and unavailable;
the documents in the exclusive encryption partition are all automatically encrypted; when the file is in the exclusive encryption partition, the file can be opened, edited and stored as a normal file, and when the file is illegally copied and leaves the local environment, the file cannot be opened so as to ensure the safety of key file data.
2. A security management system for files of a mobile terminal according to claim 1, characterized in that: the USB device authentication unit includes at least: the system comprises a validity verification module, an identification checking module, an identity acquisition module, an identification verification module and an identification writing module;
the legality verifying module is used for checking the identity of the inserted U-Key equipment and confirming whether the ID of the U-Key equipment exists in a Key ID list of the system;
the identification checking module is used for checking whether the inserted U-key has the mobile terminal identification;
the identity acquisition module is used for acquiring the mobile terminal identification in the inserted U-key equipment;
the identification verification module is used for confirming whether the obtained mobile terminal identification in the U-key is matched with the identification of the inserted mobile terminal;
and the identifier writing module is used for writing the corresponding mobile terminal identifier in the U-key which is inserted into the mobile terminal for the first time, so that the one-to-one binding of the mobile terminal and the U-key is realized.
3. A security management system for files of a mobile terminal according to claim 1, characterized in that: the mobile terminal comprises a notebook computer, a tablet computer or a smart phone.
4. A security management method for mobile terminal files is characterized by comprising the following steps:
s1, starting the PC terminal, running the client program, initializing the USB device monitoring unit, the USB device verifying unit, the security core driving unit and the filtering driving unit;
s2, the USB device monitoring unit is adopted to detect whether a USB device is accessed to the PC terminal;
s3, verifying whether the USB equipment identity is matched with the mobile terminal by the USB equipment verification unit;
s4, selecting a security core function of loading a virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit;
s5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selectively encrypting or decrypting the data in the virtual disk;
in the step S2, detecting whether a USB device is inserted, specifically:
s200, if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step;
s201, mobile terminal identification check is carried out on the U-key passing the validity verification, and if the mobile terminal identification exists, the safety core function of the virtual disk is loaded; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded;
s202, acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step;
s203, after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition;
detecting whether the USB equipment is removed, if so, reading the mobile terminal information in the U-key by the USB equipment verification unit; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, unloading the virtual disk, wherein the exclusive encryption partition is invisible and unavailable;
the documents in the exclusive encryption partition are all automatically encrypted; when the document is in the exclusive encryption partition, the document can be opened, edited and stored as a normal document, when the document is illegally copied and leaves the local environment, the document cannot be opened so as to ensure the safety of key document data, the document comprises a newly-created document and a copied document, the newly-created document and the copied document can be protected by the exclusive encryption partition, and when the document is illegally copied and leaves the local environment, the document cannot be opened.
5. The security management method for the file of the mobile terminal according to claim 4, wherein the document includes a newly created document and a copied document.
6. The method for security management of a file of a mobile terminal according to claim 4, wherein the step S5 specifically comprises: scanning and filtering the operation of the upper application on the data in the disk, wherein the operation comprises reading or writing; and judging whether the operation is performed in the virtual disk, if so, encrypting the data written into the virtual disk, and otherwise, decrypting the data read from the virtual disk.
CN201711421731.3A 2017-12-25 2017-12-25 Security management system and method for mobile terminal file Active CN108287988B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711421731.3A CN108287988B (en) 2017-12-25 2017-12-25 Security management system and method for mobile terminal file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711421731.3A CN108287988B (en) 2017-12-25 2017-12-25 Security management system and method for mobile terminal file

Publications (2)

Publication Number Publication Date
CN108287988A CN108287988A (en) 2018-07-17
CN108287988B true CN108287988B (en) 2022-04-05

Family

ID=62832255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711421731.3A Active CN108287988B (en) 2017-12-25 2017-12-25 Security management system and method for mobile terminal file

Country Status (1)

Country Link
CN (1) CN108287988B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
CN111651786B (en) * 2020-05-22 2024-04-23 北京中兴恒工程咨询有限公司 Office information management method and system
CN114587295A (en) * 2020-12-04 2022-06-07 青岛雅世医疗器械有限公司 Portable multifunctional health detection system
CN112528319A (en) * 2020-12-05 2021-03-19 江苏秉信科技有限公司 Information local security caching method based on multiple authentications

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882857A (en) * 2012-09-10 2013-01-16 福建伊时代信息科技股份有限公司 Client side device, encryption storage device, and remote access method and system
CN102984273A (en) * 2012-12-13 2013-03-20 华为技术有限公司 Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server
CN203164961U (en) * 2012-08-31 2013-08-28 武汉华工安鼎信息技术有限责任公司 Safe portable storage device
CN104134294A (en) * 2014-07-18 2014-11-05 浪潮软件集团有限公司 Authorization authentication method based on business hall self-service terminal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218573B (en) * 2013-05-07 2016-12-28 安徽海加技术服务有限公司 A kind of seamless access control method based on virtual disk protection and device
CN103632080B (en) * 2013-11-06 2016-08-17 国家电网公司 A kind of mobile data applications method for security protection based on USBKey
CN104008330B (en) * 2014-05-23 2017-06-27 武汉华工安鼎信息技术有限责任公司 Based on file is centrally stored and anti-data-leakage system of isolation technology and its method
CN104200176A (en) * 2014-08-28 2014-12-10 电子科技大学 System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal
CN104361297B (en) * 2014-11-19 2017-09-22 成都卫士通信息安全技术有限公司 A kind of file encryption-decryption method based on (SuSE) Linux OS
CN104484625B (en) * 2014-12-29 2017-11-03 北京明朝万达科技股份有限公司 A kind of computer and its implementation with dual operating systems
CN107194264A (en) * 2017-05-24 2017-09-22 济南浪潮高新科技投资发展有限公司 A kind of network interface card with safety certification function based on UEFI
CN107273769A (en) * 2017-07-11 2017-10-20 北京洋浦伟业科技发展有限公司 The guard method of a kind of electronic equipment and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203164961U (en) * 2012-08-31 2013-08-28 武汉华工安鼎信息技术有限责任公司 Safe portable storage device
CN102882857A (en) * 2012-09-10 2013-01-16 福建伊时代信息科技股份有限公司 Client side device, encryption storage device, and remote access method and system
CN102984273A (en) * 2012-12-13 2013-03-20 华为技术有限公司 Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server
CN104134294A (en) * 2014-07-18 2014-11-05 浪潮软件集团有限公司 Authorization authentication method based on business hall self-service terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
数据安全存储系统的研究与实现;陆海龙;《中国优秀硕士学位论文全文数据库 信息科技辑》;20110315(第03期);正文第4页,第17-19页,第24-27页 *

Also Published As

Publication number Publication date
CN108287988A (en) 2018-07-17

Similar Documents

Publication Publication Date Title
CN108287988B (en) Security management system and method for mobile terminal file
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
CN102624699B (en) Method and system for protecting data
CN101853363B (en) File protection method and system
CN100449561C (en) Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
CN100437618C (en) Portable information safety device
CN107679370B (en) Equipment identifier generation method and device
CN102291717B (en) Data protection method and terminal
CN102799803A (en) Secure removable media and method for managing the same
CN102334124A (en) File protection method and device
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
KR20150128328A (en) Method of providing digital evidence collecting tools, apparatus and method of collecting digital evidence of mobile devices based on domain isolation
CN109766215B (en) Data processing method and device
CN101739361A (en) Access control method, access control device and terminal device
JP7105495B2 (en) Segmented key authenticator
CN110543775B (en) Data security protection method and system based on super-fusion concept
CN106951790A (en) USB storage medium transparent encryption methods
CN103930894A (en) Storage device reader having security function and security method using same
CN101901320A (en) Data leakage prevention method for electronic book reader
CN102567230B (en) Smart card and method for safely managing same
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
CN102467625B (en) Data protection method, device and system
CN110781472A (en) Fingerprint data storage and verification method, terminal and storage medium
KR101161686B1 (en) Memory device with security function and security method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant