CN108287988B - Security management system and method for mobile terminal file - Google Patents
Security management system and method for mobile terminal file Download PDFInfo
- Publication number
- CN108287988B CN108287988B CN201711421731.3A CN201711421731A CN108287988B CN 108287988 B CN108287988 B CN 108287988B CN 201711421731 A CN201711421731 A CN 201711421731A CN 108287988 B CN108287988 B CN 108287988B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- key
- virtual disk
- equipment
- usb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4063—Device-to-bus coupling
- G06F13/4068—Electrical coupling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of mobile terminal data security protection, and provides a security management system for a mobile terminal file. Also provided is a security management method for a mobile terminal file, comprising the steps of: s1, starting the PC terminal, running the client program and initializing each unit; s2, adopting a USB device monitoring unit to detect whether a USB device is accessed to a PC terminal; s3, verifying whether the USB equipment identity is matched with the mobile terminal by using the USB equipment verification unit; s4, selecting a security core function of loading the virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit; and S5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selecting to encrypt or decrypt the data in the virtual disk. The invention has high safety and convenient implementation, and does not change the use habit of the user.
Description
Technical Field
The invention relates to the field of mobile terminal data security protection, in particular to a security management system and a security management method for mobile terminal files.
Background
Mobile office is increasingly becoming a scene in daily work of people, but in office environments such as meetings and business trips, personnel are complex, environment change factors are large, and safety of built-in data in a mobile terminal faces very high risks. Once the mobile terminal is lost, stolen, illegally accessed, illegally copied and the like, confidential document data information in the terminal is leaked, and immeasurable loss is caused to units.
At present, data protection of a mobile terminal mainly adopts technical means such as data backup, encrypted storage, access control, after audit and the like, but the technical means still has the defects of low efficiency, incapability of controlling data to be transmitted or issued to the outside, incapability of preventing data loss and the like.
Disclosure of Invention
The invention aims to provide a security management system and a security management method for a mobile terminal file, which can at least solve part of defects in the prior art.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions: a security management system for mobile terminal files comprises a USB device monitoring unit, a USB device verification unit, a security core driving unit and a filtering driving unit;
the USB device monitoring unit is used for monitoring the USB port and judging whether a USB device is inserted or removed;
the USB equipment verifying unit is used for verifying whether the identity of the inserted USB equipment is matched with the mobile terminal;
the safety core driving unit is used for selecting the safety core function of loading or unloading the virtual disk after the USB equipment verification unit verifies the equipment identity;
and the filter driving unit is used for scanning and filtering the operation of the data in the virtual disk and encrypting or decrypting the data meeting the filter condition.
Further, the USB device authentication unit includes at least: the system comprises a validity verification module, an identification checking module, an identity acquisition module, an identification verification module and an identification writing module;
the legality verifying module is used for checking the identity of the inserted U-Key equipment and confirming whether the ID of the U-Key equipment exists in a Key ID list of the system;
the identification checking module is used for checking whether the inserted U-key has the mobile terminal identification;
the identity acquisition module is used for acquiring the mobile terminal identification in the inserted U-key equipment;
the identification verification module is used for confirming whether the obtained mobile terminal identification in the U-key is matched with the identification of the inserted mobile terminal;
and the identifier writing module is used for writing the corresponding mobile terminal identifier in the U-key which is inserted into the mobile terminal for the first time, so that the one-to-one binding of the mobile terminal and the U-key is realized.
Further, the mobile terminal comprises a notebook computer, a tablet computer or a smart phone.
The embodiment of the invention provides another technical scheme: a security management method for mobile terminal files comprises the following steps:
s1, starting the PC terminal, running the client program, initializing the USB device monitoring unit, the USB device verifying unit, the security core driving unit and the filtering driving unit;
s2, the USB device monitoring unit is adopted to detect whether a USB device is accessed to the PC terminal;
s3, verifying whether the USB equipment identity is matched with the mobile terminal by the USB equipment verification unit;
s4, selecting a security core function of loading a virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit;
and S5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selectively encrypting or decrypting the data in the virtual disk.
Further, in the step S2, detecting whether a USB device is inserted, specifically:
s200, if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step;
s201, mobile terminal identification check is carried out on the U-key passing the validity verification, and if the mobile terminal identification exists, the safety core function of the virtual disk is loaded; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded;
s202, acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step;
s203, after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition.
Further, in the step S2, it is detected whether there is a USB device unplugged, and if so, the USB device verifying unit reads the mobile terminal information in the U-key; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, the virtual disk is unloaded, and the exclusive encryption partition is invisible and unavailable.
Further, the documents in the exclusive encryption area are automatically encrypted; when the file is in the exclusive encryption partition, the file can be opened, edited and stored as a normal file, and when the file is illegally copied and leaves the local environment, the file cannot be opened so as to ensure the safety of key file data.
Further, the documents include a newly created document and a copied document.
Further, the step S5 specifically includes: scanning and filtering the operation of the upper application on the data in the disk, wherein the operation comprises reading or writing; and judging whether the operation is performed in the virtual disk, if so, encrypting the data written into the virtual disk, and otherwise, decrypting the data read from the virtual disk.
Compared with the prior art, the invention has the beneficial effects that:
1. the USB equipment monitoring unit, the USB equipment verification unit, the safety core driving unit and the filtering driving unit are matched for use, so that the safety is high, the implementation is convenient and fast, and the use habit of a user is not changed.
2. After the client software is installed, the identity authentication is realized by combining the special U-key, and the U-key is bound with the terminal in a one-to-one manner, so that the safety performance is high.
3. Only after the U-key passes the verification, the virtual disk is locally loaded to form an exclusive encryption partition; when data is written or read in the encryption partition, the system automatically performs encryption and decryption.
4. After the U-key is removed, the exclusive encryption partition is invisible and unavailable; when the data is separated from the exclusive encryption partition, the data is kept in an encryption state, and the data cannot be opened after being illegally copied and separated from the local environment, so that the safety of key document data is guaranteed.
Drawings
Fig. 1 is a functional framework diagram of a security management system for a mobile terminal file according to an embodiment of the present invention;
fig. 2 is a flowchart of a USB device monitoring unit for a method for managing security of a file in a mobile terminal according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating whether a USB device is inserted in a security management method for a mobile terminal file according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating whether a USB device is removed in the security management method for a mobile terminal file according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating steps of a method for managing security of a file of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention provides a security management system for a mobile terminal file, including a USB device monitoring unit, a USB device verifying unit, a security kernel driving unit, and a filtering driving unit. In the system, a USB port is monitored through a USB device monitoring unit, whether USB devices are inserted or removed is judged, then whether the identities of the inserted USB devices are matched with a mobile terminal is verified through a USB device verifying unit, then a security core function of a virtual disk is selected to be loaded or unloaded after the identities of the devices are verified through a security core driving unit, finally, the operation of data in the virtual disk is scanned and filtered through a filtering driving unit, and the data meeting the filtering condition is encrypted or decrypted. The functions of the above units are implemented one by one, and specifically, after the first unit works, the next unit starts to work. Each module accords with the common use habit of the user, is convenient to implement and high in safety, and realizes the safety protection of confidential document data in the mobile terminal.
The following are specific examples:
to optimize the above solution, referring to fig. 1, the USB device verifying unit at least includes: the device comprises a validity verification module, an identification checking module, an identity acquisition module, an identification verification module and an identification writing module. The legality verifying module is used for checking the identity of the inserted U-Key equipment and confirming whether the ID of the equipment is in a Key ID list of the system or not, the identification checking module is used for checking whether the inserted U-Key has a mobile terminal identification or not, the identity acquiring module is used for acquiring the mobile terminal identification in the inserted U-Key equipment, the identification verifying module is used for confirming whether the acquired mobile terminal identification in the U-Key is matched with the identification of the inserted mobile terminal or not, and the identification writing module is used for writing the corresponding mobile terminal identification in the U-Key which is inserted into the mobile terminal for the first time so as to realize one-to-one binding of the mobile terminal and the U-Key. After the client software is installed, the identity authentication is realized by combining the special U-key, the U-key is bound with the terminal in a one-to-one manner, and the safety performance is high
As an optimization scheme of the embodiment of the invention, the mobile terminal comprises a mobile notebook or a tablet computer or a smart phone. All mobile devices capable of reading the USB flash disk on the market can be used.
An embodiment of the present invention provides a security management method for a mobile terminal file, please refer to fig. 5, which includes the following steps: s1, starting the PC terminal, running the client program, initializing the USB device monitoring unit, the USB device verifying unit, the security core driving unit and the filtering driving unit; s2, the USB device monitoring unit is adopted to detect whether a USB device is accessed to the PC terminal; s3, verifying whether the USB equipment identity is matched with the mobile terminal by the USB equipment verification unit; s4, selecting a security core function of loading a virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit; and S5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selectively encrypting or decrypting the data in the virtual disk. The steps correspond to all units in the system, accord with the common use habit of users, are convenient to implement and high in safety, and realize the safety protection of confidential document data in the mobile terminal.
With reference to fig. 2 and fig. 3, in the step S2, detecting whether a USB device is inserted specifically includes: s200, if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step; s201, mobile terminal identification check is carried out on the U-key passing the validity verification, and if the mobile terminal identification exists, the safety core function of the virtual disk is loaded; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded; s202, acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step; s203, after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition. After client software is installed, identity authentication is achieved by combining with a special U-key, the U-key and a terminal are bound in a one-to-one mode, safety performance is high, and only after the U-key passes verification, a virtual disk is locally loaded to form an exclusive encryption partition; when data is written or read in the encryption partition, the system automatically performs encryption and decryption.
Further optimizing the above scheme, please refer to fig. 2 and 4, in the step S2, detecting whether there is a USB device unplugging, if so, the USB device verifying unit reads the mobile terminal information in the U-key; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, the virtual disk is unloaded, and the exclusive encryption partition is invisible and unavailable. After the U-key is removed, the exclusive encryption partition is invisible and unavailable; when the data is separated from the exclusive encryption partition, the data is kept in an encryption state, and the data cannot be opened after being illegally copied and separated from the local environment, so that the safety of key document data is guaranteed.
As an optimization scheme of the embodiment of the present invention, the exclusive encryption partition specifically includes: the documents in the exclusive encryption area are automatically encrypted; when the file is in the exclusive encryption partition, the file can be opened, edited and stored as a normal file, and when the file is illegally copied and leaves the local environment, the file cannot be opened so as to ensure the safety of key file data. Preferably, the document includes a new document and a copied document, and the new document or the copied document can be protected by the exclusive encryption partition, and the document cannot be opened even if the document is illegally copied and leaves the local environment.
As an optimization scheme of the embodiment of the present invention, the step S5 specifically includes: scanning and filtering the operation of the upper application on the data in the disk, wherein the operation comprises reading or writing; and judging whether the operation is performed in the virtual disk, if so, encrypting the data written into the virtual disk, and otherwise, decrypting the data read from the virtual disk.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (6)
1. A safety management system for mobile terminal files is characterized in that: the system comprises a USB equipment monitoring unit, a USB equipment verifying unit, a security core driving unit and a filtering driving unit;
the USB device monitoring unit is used for monitoring the USB port and judging whether a USB device is inserted or removed; the specific judgment is as follows:
if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step;
carrying out mobile terminal identification check on the U-key passing the validity verification, and loading the safety core function of the virtual disk if the mobile terminal identification exists; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded;
acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step;
after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition;
the USB equipment verifying unit is used for verifying whether the identity of the inserted USB equipment is matched with the mobile terminal;
the safety core driving unit is used for selecting the safety core function of loading or unloading the virtual disk after the USB equipment verification unit verifies the equipment identity;
the filtering drive unit is used for scanning and filtering the operation of the data in the virtual disk and encrypting or decrypting the data meeting the filtering condition;
detecting whether the USB equipment is removed, if so, reading the mobile terminal information in the U-key by the USB equipment verification unit; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, unloading the virtual disk, wherein the exclusive encryption partition is invisible and unavailable;
the documents in the exclusive encryption partition are all automatically encrypted; when the file is in the exclusive encryption partition, the file can be opened, edited and stored as a normal file, and when the file is illegally copied and leaves the local environment, the file cannot be opened so as to ensure the safety of key file data.
2. A security management system for files of a mobile terminal according to claim 1, characterized in that: the USB device authentication unit includes at least: the system comprises a validity verification module, an identification checking module, an identity acquisition module, an identification verification module and an identification writing module;
the legality verifying module is used for checking the identity of the inserted U-Key equipment and confirming whether the ID of the U-Key equipment exists in a Key ID list of the system;
the identification checking module is used for checking whether the inserted U-key has the mobile terminal identification;
the identity acquisition module is used for acquiring the mobile terminal identification in the inserted U-key equipment;
the identification verification module is used for confirming whether the obtained mobile terminal identification in the U-key is matched with the identification of the inserted mobile terminal;
and the identifier writing module is used for writing the corresponding mobile terminal identifier in the U-key which is inserted into the mobile terminal for the first time, so that the one-to-one binding of the mobile terminal and the U-key is realized.
3. A security management system for files of a mobile terminal according to claim 1, characterized in that: the mobile terminal comprises a notebook computer, a tablet computer or a smart phone.
4. A security management method for mobile terminal files is characterized by comprising the following steps:
s1, starting the PC terminal, running the client program, initializing the USB device monitoring unit, the USB device verifying unit, the security core driving unit and the filtering driving unit;
s2, the USB device monitoring unit is adopted to detect whether a USB device is accessed to the PC terminal;
s3, verifying whether the USB equipment identity is matched with the mobile terminal by the USB equipment verification unit;
s4, selecting a security core function of loading a virtual disk for the equipment after the identity of the equipment is verified by the USB equipment verification unit by adopting the security core driving unit;
s5, scanning and filtering the operation of the data in the virtual disk by using the filter driving unit, and selectively encrypting or decrypting the data in the virtual disk;
in the step S2, detecting whether a USB device is inserted, specifically:
s200, if yes, the USB equipment verification unit conducts identity validity verification on the inserted U-Key, and if the ID of the inserted U-Key exists in a Key ID list of the client program, the USB equipment verification unit continues to conduct downward; otherwise, ending the step;
s201, mobile terminal identification check is carried out on the U-key passing the validity verification, and if the mobile terminal identification exists, the safety core function of the virtual disk is loaded; otherwise, the U-key is inserted into the mobile terminal for the first time, the identifier of the corresponding mobile terminal is written into the U-key, and then the safety core function of the virtual disk is continuously loaded;
s202, acquiring a mobile terminal identifier in the inserted U-key equipment, and confirming whether the mobile terminal identifier in the U-key is matched with the identifier of the inserted mobile terminal; if yes, continuing to proceed downwards, otherwise, ending the step;
s203, after the mobile terminal identification in the U-key is confirmed to be matched with the identification of the inserted mobile terminal, a virtual disk is loaded locally to form an exclusive encryption partition;
detecting whether the USB equipment is removed, if so, reading the mobile terminal information in the U-key by the USB equipment verification unit; if the data can be read, the USB equipment monitoring unit continues to monitor; otherwise, unloading the virtual disk, wherein the exclusive encryption partition is invisible and unavailable;
the documents in the exclusive encryption partition are all automatically encrypted; when the document is in the exclusive encryption partition, the document can be opened, edited and stored as a normal document, when the document is illegally copied and leaves the local environment, the document cannot be opened so as to ensure the safety of key document data, the document comprises a newly-created document and a copied document, the newly-created document and the copied document can be protected by the exclusive encryption partition, and when the document is illegally copied and leaves the local environment, the document cannot be opened.
5. The security management method for the file of the mobile terminal according to claim 4, wherein the document includes a newly created document and a copied document.
6. The method for security management of a file of a mobile terminal according to claim 4, wherein the step S5 specifically comprises: scanning and filtering the operation of the upper application on the data in the disk, wherein the operation comprises reading or writing; and judging whether the operation is performed in the virtual disk, if so, encrypting the data written into the virtual disk, and otherwise, decrypting the data read from the virtual disk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711421731.3A CN108287988B (en) | 2017-12-25 | 2017-12-25 | Security management system and method for mobile terminal file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711421731.3A CN108287988B (en) | 2017-12-25 | 2017-12-25 | Security management system and method for mobile terminal file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108287988A CN108287988A (en) | 2018-07-17 |
CN108287988B true CN108287988B (en) | 2022-04-05 |
Family
ID=62832255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711421731.3A Active CN108287988B (en) | 2017-12-25 | 2017-12-25 | Security management system and method for mobile terminal file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108287988B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109460651A (en) * | 2018-10-17 | 2019-03-12 | 航天信息股份有限公司 | The login method and device of billing system |
CN111651786B (en) * | 2020-05-22 | 2024-04-23 | 北京中兴恒工程咨询有限公司 | Office information management method and system |
CN114587295A (en) * | 2020-12-04 | 2022-06-07 | 青岛雅世医疗器械有限公司 | Portable multifunctional health detection system |
CN112528319A (en) * | 2020-12-05 | 2021-03-19 | 江苏秉信科技有限公司 | Information local security caching method based on multiple authentications |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882857A (en) * | 2012-09-10 | 2013-01-16 | 福建伊时代信息科技股份有限公司 | Client side device, encryption storage device, and remote access method and system |
CN102984273A (en) * | 2012-12-13 | 2013-03-20 | 华为技术有限公司 | Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server |
CN203164961U (en) * | 2012-08-31 | 2013-08-28 | 武汉华工安鼎信息技术有限责任公司 | Safe portable storage device |
CN104134294A (en) * | 2014-07-18 | 2014-11-05 | 浪潮软件集团有限公司 | Authorization authentication method based on business hall self-service terminal |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218573B (en) * | 2013-05-07 | 2016-12-28 | 安徽海加技术服务有限公司 | A kind of seamless access control method based on virtual disk protection and device |
CN103632080B (en) * | 2013-11-06 | 2016-08-17 | 国家电网公司 | A kind of mobile data applications method for security protection based on USBKey |
CN104008330B (en) * | 2014-05-23 | 2017-06-27 | 武汉华工安鼎信息技术有限责任公司 | Based on file is centrally stored and anti-data-leakage system of isolation technology and its method |
CN104200176A (en) * | 2014-08-28 | 2014-12-10 | 电子科技大学 | System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal |
CN104361297B (en) * | 2014-11-19 | 2017-09-22 | 成都卫士通信息安全技术有限公司 | A kind of file encryption-decryption method based on (SuSE) Linux OS |
CN104484625B (en) * | 2014-12-29 | 2017-11-03 | 北京明朝万达科技股份有限公司 | A kind of computer and its implementation with dual operating systems |
CN107194264A (en) * | 2017-05-24 | 2017-09-22 | 济南浪潮高新科技投资发展有限公司 | A kind of network interface card with safety certification function based on UEFI |
CN107273769A (en) * | 2017-07-11 | 2017-10-20 | 北京洋浦伟业科技发展有限公司 | The guard method of a kind of electronic equipment and device |
-
2017
- 2017-12-25 CN CN201711421731.3A patent/CN108287988B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203164961U (en) * | 2012-08-31 | 2013-08-28 | 武汉华工安鼎信息技术有限责任公司 | Safe portable storage device |
CN102882857A (en) * | 2012-09-10 | 2013-01-16 | 福建伊时代信息科技股份有限公司 | Client side device, encryption storage device, and remote access method and system |
CN102984273A (en) * | 2012-12-13 | 2013-03-20 | 华为技术有限公司 | Encryption method, decryption method, encryption device and decryption device of virtual disk and cloud server |
CN104134294A (en) * | 2014-07-18 | 2014-11-05 | 浪潮软件集团有限公司 | Authorization authentication method based on business hall self-service terminal |
Non-Patent Citations (1)
Title |
---|
数据安全存储系统的研究与实现;陆海龙;《中国优秀硕士学位论文全文数据库 信息科技辑》;20110315(第03期);正文第4页,第17-19页,第24-27页 * |
Also Published As
Publication number | Publication date |
---|---|
CN108287988A (en) | 2018-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108287988B (en) | Security management system and method for mobile terminal file | |
CN103065102B (en) | Data encryption mobile storage management method based on virtual disk | |
CN102624699B (en) | Method and system for protecting data | |
CN101853363B (en) | File protection method and system | |
CN100449561C (en) | Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology | |
CN100437618C (en) | Portable information safety device | |
CN107679370B (en) | Equipment identifier generation method and device | |
CN102291717B (en) | Data protection method and terminal | |
CN102799803A (en) | Secure removable media and method for managing the same | |
CN102334124A (en) | File protection method and device | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN104954534B (en) | Control method, device and the corresponding communication terminal of communication terminal | |
KR20150128328A (en) | Method of providing digital evidence collecting tools, apparatus and method of collecting digital evidence of mobile devices based on domain isolation | |
CN109766215B (en) | Data processing method and device | |
CN101739361A (en) | Access control method, access control device and terminal device | |
JP7105495B2 (en) | Segmented key authenticator | |
CN110543775B (en) | Data security protection method and system based on super-fusion concept | |
CN106951790A (en) | USB storage medium transparent encryption methods | |
CN103930894A (en) | Storage device reader having security function and security method using same | |
CN101901320A (en) | Data leakage prevention method for electronic book reader | |
CN102567230B (en) | Smart card and method for safely managing same | |
CN103052060A (en) | Method for improving information security of mobile terminal and mobile terminal | |
CN102467625B (en) | Data protection method, device and system | |
CN110781472A (en) | Fingerprint data storage and verification method, terminal and storage medium | |
KR101161686B1 (en) | Memory device with security function and security method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |