CN111339526A - USB disk encryption method for enterprise information security - Google Patents

USB disk encryption method for enterprise information security Download PDF

Info

Publication number
CN111339526A
CN111339526A CN202010098047.1A CN202010098047A CN111339526A CN 111339526 A CN111339526 A CN 111339526A CN 202010098047 A CN202010098047 A CN 202010098047A CN 111339526 A CN111339526 A CN 111339526A
Authority
CN
China
Prior art keywords
usb
installation
client
log
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010098047.1A
Other languages
Chinese (zh)
Inventor
盘建财
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fast Soft Information Technology Co ltd
Original Assignee
Shanghai Fast Soft Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fast Soft Information Technology Co ltd filed Critical Shanghai Fast Soft Information Technology Co ltd
Priority to CN202010098047.1A priority Critical patent/CN111339526A/en
Publication of CN111339526A publication Critical patent/CN111339526A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a USB disk encryption method for enterprise information security, which comprises the following steps of S1, installation approach, the USB port management and control system provides a plurality of installation modes to facilitate the installation and maintenance of users, namely: local installation, Web installation, remote push installation and Windows-based shared installation, and client installation is carried out according to the optimal installation mode adapted by enterprises. In the client performance, the CPU occupancy rate is less than 0.1%, the memory occupancy rate is less than 3M, the network bandwidth occupancy rate of the network performance is less than 1%, the network management can be simplified for users, the performance bottleneck caused by gateway equipment is avoided, the security mode can also be used for supervision, the supervision capability of the system cannot be damaged no matter illegal operations such as closing the process, forbidding/starting the equipment, stopping service, clearing a registry, deleting related files and the like, the system is completely hidden after self-encryption, and people trying to attack the system lose the attack target.

Description

USB disk encryption method for enterprise information security
Technical Field
The invention relates to the technical field of information security, in particular to a USB disk encryption method for enterprise information security.
Background
In recent years, the frequency of information leakage events is increasing, and the loss and influence on governments and enterprises are expanding, and firewalls, IDS, intranet and extranet isolation and other access control systems aiming at external networks can effectively prevent attacks from the outside of the network, but no good precaution measures are provided for the information confidentiality problem inside the enterprise, because insiders can easily leak confidential information in computers out through the network, a storage medium or a printing mode.
With the recent prevalence of portable devices (such as a USB disk, a mobile hard disk, a mobile recorder, and other storage devices using USB ports) mainly using USB ports, disclosure of secret through the USB ports is an important way for information leakage in the internal network of a computer, and many experts believe that the potential safety hazards of these devices exceed the convenience of their work.
Disclosure of Invention
Based on the technical problems in the background art, the invention provides a USB disk encryption method for enterprise information security.
The invention provides a USB disk encryption method for enterprise information security, which comprises the following steps:
s1: the installation method comprises the following steps: this USB port management and control system provides multiple mounting means to make things convenient for user's installation and maintenance, promptly: local installation, Web installation, remote push installation and Windows-based shared installation, and client installation is carried out according to the optimal installation mode adapted by enterprises;
s2: and (3) registration and authorization: the USB port management and control system can register and authorize the office USB flash disk, the authorized office USB flash disk can be used under the condition that the USB default authority is blocked, the unauthorized USB flash disk cannot be used, and the registered identification is divided into four authorities: release, read only, write only, block;
s3: and (3) permission setting: all clients are remotely controlled by a server, the read-write permission of USB ports of all clients can be remotely set through a console, a system administrator can add an administrator, set users and computers to be managed and configure specific permission, so that the division of labor is clear, and the management part of the computer can realize management through grouping and independent setting of the clients;
s4: log audit: the log record is used for recording the operation log of the administrator console and the log of the USB storage device used by the end user in detail, and comprises the following steps: the system comprises a system user log, a client USB plug log, a client file operation log and a client online and offline log;
s5: file backup: after the file backup function is started, the terminal automatically uploads and backs up files copied from the terminal to the USB mobile storage to a server machine (a backup path can be checked on a console), so that an administrator can not only see file names copied by employees, but also copy file contents;
s6: maintaining a database: 1. all log information operated by the console and the client is written into a database, and a lot of data can be accumulated by the data in the database day by day and month, and management and maintenance are performed; 2. the backed-up files are backed up on the server, and are accumulated to a certain amount and pushed to a management end for screening treatment;
s7: the system adaptation range is as follows: the USSE can control equipment such as a U disk, a USB card reader, an SD card, a mobile hard disk, a recorder and a WINCE mobile phone which are accessed to a client machine, can control equipment such as infrared, Bluetooth, 1394, 3G network cards, printers and wireless network cards which are arranged outside the client, and thoroughly avoids leakage of information data of the client machine.
Preferably, the definitions of the four rights in S2 are, respectively, pass: the mobile equipment of the client is not limited, and can be randomly read and written as the case when the USSE is not installed, but all operations are recorded by the server log; reading only: the client cannot write any file into the mobile storage device, but allows the file to be viewed and read; write only: the method can only write the personal file into the mobile storage device, does not allow the personal file to be copied out, and does not allow the content of the file in the mobile storage device to be viewed; stopping: the client cannot read and write any files, and the USSE prohibits the mobile storage device from accessing the computer.
Preferably, the USB port management and control system is compatible with an operating system such as Windows10/8/7/Vista/XP/2003/2000, and the operating system supports simplified Chinese, traditional Chinese and English versions.
Preferably, the USB port control system is compatible with antivirus software such as Norton, Trends, Anboshi, Switzerland, Kabaski, Jinshan and the like.
Preferably, the USB port management and control system is compatible with various financial software, ERP software, engineering software, and design tool software.
The beneficial effects of the invention are as follows:
1. in the USB disk encryption method for enterprise information security, the software interface function is embodied in that an administrator can manage all host USB ports in the whole network to support remote cross-wide area network management, the CPU occupancy rate in the client performance is less than 0.1 percent, the memory occupancy rate is less than 3M, the network bandwidth occupancy rate in the network performance is less than 1 percent, the network management can be simplified for users, and the performance bottleneck caused by gateway equipment is avoided;
2. in the USB disk encryption method for enterprise information security, the security mode can be supervised, the system supervision capability cannot be damaged no matter illegal operations such as process closing, equipment forbidding/starting, service stopping, registry clearing, relevant file deleting and the like, the system is completely hidden after self encryption, a person trying to attack the system loses an attack target, and the system can self repair even if a module of the system is damaged.
Drawings
FIG. 1 is a user authentication topology diagram of a USB disk encryption method for enterprise information security according to the present invention;
fig. 2 is a topological diagram of the registration authorization of the USB disk encryption method for enterprise information security according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1, a method for encrypting enterprise information security by using a USB disk includes the following steps:
s1: the installation method comprises the following steps: this USB port management and control system provides multiple mounting means to make things convenient for user's installation and maintenance, promptly: local installation, Web installation, remote push installation and Windows-based shared installation, and client installation is carried out according to the optimal installation mode adapted by enterprises;
s2: and (3) registration and authorization: the USB port management and control system can register and authorize the office USB flash disk, the authorized office USB flash disk can be used under the condition that the USB default authority is blocked, the unauthorized USB flash disk cannot be used, and the registered identification is divided into four authorities: release, read only, write only, block;
s3: and (3) permission setting: all clients are remotely controlled by a server, the read-write permission of USB ports of all clients can be remotely set through a console, a system administrator can add an administrator, set users and computers to be managed and configure specific permission, so that the division of labor is clear, and the management part of the computer can realize management through grouping and independent setting of the clients;
s4: log audit: the log record is used for recording the operation log of the administrator console and the log of the USB storage device used by the end user in detail, and comprises the following steps: the system comprises a system user log, a client USB plug log, a client file operation log and a client online and offline log;
s5: file backup: after the file backup function is started, the terminal automatically uploads and backs up files copied from the terminal to the USB mobile storage to a server machine (a backup path can be checked on a console), so that an administrator can not only see file names copied by employees, but also copy file contents;
s6: maintaining a database: 1. all log information operated by the console and the client is written into a database, and a lot of data can be accumulated by the data in the database day by day and month, and management and maintenance are performed; 2. the backed-up files are backed up on the server, and are accumulated to a certain amount and pushed to a management end for screening treatment;
s7: the system adaptation range is as follows: the USSE can control equipment such as a U disk, a USB card reader, an SD card, a mobile hard disk, a recorder and a WINCE mobile phone which are accessed to a client machine, can control equipment such as infrared, Bluetooth, 1394, 3G network cards, printers and wireless network cards which are arranged outside the client, and thoroughly avoids leakage of information data of the client machine.
In the present invention, the definitions of the four rights in S2 are, respectively, release: the mobile equipment of the client is not limited, and can be randomly read and written as the case when the USSE is not installed, but all operations are recorded by the server log; reading only: the client cannot write any file into the mobile storage device, but allows the file to be viewed and read; write only: the method can only write the personal file into the mobile storage device, does not allow the personal file to be copied out, and does not allow the content of the file in the mobile storage device to be viewed; stopping: the client cannot read and write any files, and the USSE prohibits the mobile storage device from accessing the computer. In the client performance, the occupancy rate of a CPU is less than 0.1%, the occupancy rate of a memory is less than 3M, the occupancy rate of the network bandwidth of the network performance is less than 1%, the network management can be simplified for a user, and the performance bottleneck caused by gateway equipment is avoided; the USB port management and control system can be compatible with an operating system such as Windows10/8/7/Vista/XP/2003/2000, and the operating system supports simplified Chinese, traditional Chinese and English versions. The USB port control system can be compatible with anti-virus software such as Norton, Trends, Anboshi, Switzerland, Kabaski, Jinshan and the like. The USB port management and control system can be compatible with application engineering software including various financial software, ERP software, engineering class and design class tool software.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (5)

1. A USB disk encryption method for enterprise information security is characterized by comprising the following steps:
s1: the installation method comprises the following steps: this USB port management and control system provides multiple mounting means to make things convenient for user's installation and maintenance, promptly: local installation, Web installation, remote push installation and Windows-based shared installation, and client installation is carried out according to the optimal installation mode adapted by enterprises;
s2: and (3) registration and authorization: the USB port management and control system can register and authorize the office USB flash disk, the authorized office USB flash disk can be used under the condition that the USB default authority is blocked, the unauthorized USB flash disk cannot be used, and the registered identification is divided into four authorities: release, read only, write only, block;
s3: and (3) permission setting: all clients are remotely controlled by a server, the read-write permission of USB ports of all clients can be remotely set through a console, a system administrator can add an administrator, set users and computers to be managed and configure specific permission, so that the division of labor is clear, and the management part of the computer can realize management through grouping and independent setting of the clients;
s4: log audit: the log record is used for recording the operation log of the administrator console and the log of the USB storage device used by the end user in detail, and comprises the following steps: the system comprises a system user log, a client USB plug log, a client file operation log and a client online and offline log;
s5: file backup: after the file backup function is started, the terminal automatically uploads and backs up files copied from the terminal to the USB mobile storage to a server machine (a backup path can be checked on a console), so that an administrator can not only see file names copied by employees, but also copy file contents;
s6: maintaining a database: 1. all log information operated by the console and the client is written into a database, and a lot of data can be accumulated by the data in the database day by day and month, and management and maintenance are performed; 2. the backed-up files are backed up on the server, and are accumulated to a certain amount and pushed to a management end for screening treatment;
s7: the system adaptation range is as follows: the USSE can control equipment such as a U disk, a USB card reader, an SD card, a mobile hard disk, a recorder and a WIN CE mobile phone which are accessed to a client machine, can control equipment such as infrared, Bluetooth, 1394, a 3G network card, a printer and a wireless network card which are arranged outside the client, and thoroughly prevents information data of the client machine from leaking.
2. The method for encrypting the USB disk for the enterprise information security according to claim 1, wherein the four permissions in S2 are defined as, pass: the mobile equipment of the client is not limited, and can be randomly read and written as the case when the USSE is not installed, but all operations are recorded by the server log; reading only: the client cannot write any file into the mobile storage device, but allows the file to be viewed and read; write only: the method can only write the personal file into the mobile storage device, does not allow the personal file to be copied out, and does not allow the content of the file in the mobile storage device to be viewed; stopping: the client cannot read and write any files, and the USSE prohibits the mobile storage device from accessing the computer.
3. The USB disk encryption method for enterprise information security as claimed in claim 1, wherein the USB port management and control system is compatible with the operating system Windows10/8/7/Vista/XP/2003/2000, and the operating system supports simplified Chinese, traditional Chinese and English versions.
4. The method for encrypting the USB disk for the enterprise information security according to claim 1, wherein the USB port management and control system is compatible with anti-virus software such as Norton, Trends, An doctor, Switzerland, Kabaski, Jinshan, etc.
5. The USB disk encryption method for enterprise information security as claimed in claim 1, wherein the USB port management and control system compatible application engineering software includes various financial software, ERP software, engineering software and design tool software.
CN202010098047.1A 2020-02-18 2020-02-18 USB disk encryption method for enterprise information security Pending CN111339526A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010098047.1A CN111339526A (en) 2020-02-18 2020-02-18 USB disk encryption method for enterprise information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010098047.1A CN111339526A (en) 2020-02-18 2020-02-18 USB disk encryption method for enterprise information security

Publications (1)

Publication Number Publication Date
CN111339526A true CN111339526A (en) 2020-06-26

Family

ID=71181694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010098047.1A Pending CN111339526A (en) 2020-02-18 2020-02-18 USB disk encryption method for enterprise information security

Country Status (1)

Country Link
CN (1) CN111339526A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836203A (en) * 2021-02-03 2021-05-25 中标软件有限公司 Method for realizing android system equipment management and control based on kernel customization
CN116383901A (en) * 2023-06-02 2023-07-04 北京网藤科技有限公司 U disk management system for preventing U disk data from being divulged

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923678A (en) * 2010-07-30 2010-12-22 武汉天喻信息产业股份有限公司 Data security protection method of enterprise management software
CN110059064A (en) * 2019-03-20 2019-07-26 北京字节跳动网络技术有限公司 Journal file processing method, device and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923678A (en) * 2010-07-30 2010-12-22 武汉天喻信息产业股份有限公司 Data security protection method of enterprise management software
CN110059064A (en) * 2019-03-20 2019-07-26 北京字节跳动网络技术有限公司 Journal file processing method, device and computer readable storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
裔睿: "非涉密移动存储介质管控系统建设研究——政府部门USB端口管控系统建设案例", 《软件导刊》 *
霞光万丈: "防止USB接口泄密", 《个人电脑》 *
高秀霞: "如何控制好您的USB端口", 《办公自动化》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836203A (en) * 2021-02-03 2021-05-25 中标软件有限公司 Method for realizing android system equipment management and control based on kernel customization
CN116383901A (en) * 2023-06-02 2023-07-04 北京网藤科技有限公司 U disk management system for preventing U disk data from being divulged
CN116383901B (en) * 2023-06-02 2023-09-01 北京网藤科技有限公司 U disk management system for preventing U disk data from being divulged

Similar Documents

Publication Publication Date Title
CN101572660B (en) Comprehensive control method for preventing leakage of data
CN101952809B (en) Computer storage device having separate read-only space and read-write space, removable media component, system management interface, and network interface
EP1860590B1 (en) Posture-based data protection
KR101012222B1 (en) Electronic computer data management method, and storing medium storing the program for the method
EP1977364B1 (en) Securing data in a networked environment
CN102948114B (en) Single for accessing enciphered data uses authentication method and system
CA2738466C (en) Apparatus for shielding sensitive file, server computer of the same, method and computer program product for the same
US8805741B2 (en) Classification-based digital rights management
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN201682524U (en) Document transfer authority control system based on document filtering driver
CN101635018A (en) Method of safety ferriage of USB flash disk data
US20080263630A1 (en) Confidential File Protecting Method and Confidential File Protecting Device for Security Measure Application
CN102799539A (en) Safe USB flash disk and data active protection method thereof
CN112329050A (en) File security management terminal and system
JP4044126B1 (en) Information leakage prevention device, information leakage prevention program, information leakage prevention recording medium, and information leakage prevention system
RU2434283C1 (en) System for protecting information containing state secrets from unauthorised access
CN111339526A (en) USB disk encryption method for enterprise information security
CN111488597B (en) Safety audit system suitable for cross-network safety area
CN111539042A (en) Safe operation method based on trusted storage of core data files
RU2443017C1 (en) System of data protection from unauthorized access to the data that constitutes national security information
KR20020005401A (en) Total system for preventing information outflow from inside
CN111291429B (en) Data protection method and system
CN111324900A (en) Anti-disclosure system for enterprise data security
RU2504835C1 (en) System for protecting information containing state secrets from unauthorised access
JP2006350547A (en) Security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200626

RJ01 Rejection of invention patent application after publication