CN111428272B - Secure access method and device for mobile storage device and storage medium - Google Patents

Secure access method and device for mobile storage device and storage medium Download PDF

Info

Publication number
CN111428272B
CN111428272B CN202010319944.0A CN202010319944A CN111428272B CN 111428272 B CN111428272 B CN 111428272B CN 202010319944 A CN202010319944 A CN 202010319944A CN 111428272 B CN111428272 B CN 111428272B
Authority
CN
China
Prior art keywords
mobile storage
storage device
file
secure
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010319944.0A
Other languages
Chinese (zh)
Other versions
CN111428272A (en
Inventor
连以泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Rongan Networks Technology Co ltd
Original Assignee
Shenzhen Rongan Networks Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Rongan Networks Technology Co ltd filed Critical Shenzhen Rongan Networks Technology Co ltd
Priority to CN202010319944.0A priority Critical patent/CN111428272B/en
Publication of CN111428272A publication Critical patent/CN111428272A/en
Application granted granted Critical
Publication of CN111428272B publication Critical patent/CN111428272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Virology (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a secure access method of mobile storage equipment, which comprises the following steps: after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a secure file directory table, wherein each file corresponding to the secure file directory table is a secure file; and generating a mapping relation table between the secure file directory table and each secure file, so that the data access device can access the secure files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device. The invention also discloses a device and a computer readable storage medium. The data access device indirectly accesses the mobile storage device through the file transmission device, so that the operation is simple and convenient, and the safety of the data access device is improved.

Description

Secure access method and device for mobile storage device and storage medium
Technical Field
The present invention relates to the field of mobile storage technologies, and in particular, to a method and apparatus for secure access to a mobile storage device, and a computer readable storage medium.
Background
At present, the mobile storage device is widely applied to various fields, and has incomparable flexibility, compatibility and convenience. However, the problem that the mobile storage device is easy to infect and spread viruses is not solved well. In the prior art, the mobile storage device is connected to the host, and the access to data is completely dependent on the host system and the antivirus software, so that if the mobile storage device carrying the virus file is connected to the data access device with loopholes or the antivirus software is lagged, the security of the data access device is low.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide a secure access method and device for mobile storage equipment and a computer readable storage medium, and aims to solve the problem of low security of data access equipment.
In order to achieve the above object, the present invention provides a secure access method for a mobile storage device, the secure access method for a mobile storage device comprising the steps of:
after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a secure file directory table, wherein each file corresponding to the secure file directory table is a secure file;
and generating a mapping relation table between the secure file directory table and each secure file, so that the data access device can access the secure files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
Optionally, the step of scanning the mobile storage device to determine a secure file directory table includes:
scanning the mobile storage equipment to obtain virus files in the mobile storage equipment and file directory tables corresponding to the files in the mobile storage equipment;
and marking the catalogs corresponding to the virus files in the file catalogs to obtain a safe file catalogs.
Optionally, the step of obtaining the virus file in the mobile storage device includes:
and acquiring a virus file in the mobile storage device according to the detection report list, wherein the file transmission device scans the mobile storage device to obtain the detection report list.
Optionally, the step of scanning the mobile storage device to determine a secure file directory table further includes:
scanning the mobile storage equipment to obtain security files in the mobile storage equipment and file directory tables corresponding to all files in the mobile storage equipment;
and marking other catalogs except the catalogs corresponding to the security files in the file catalogs table to obtain the security file catalogs table.
Optionally, after the step of generating the mapping relationship table between the secure file directory table and each secure file, the method further includes:
and unloading the mobile storage device after the mapping relation table is generated, wherein when the mobile storage device is accessed to the file transmission device, the mobile storage device is loaded on the file transmission device so that the file transmission device scans files in the mobile storage device.
Optionally, after the step of generating the mapping relationship table between the secure file directory table and each secure file, the method further includes:
and storing the mapping relation table at the output end of the file transmission equipment.
Optionally, after the step of generating the mapping relationship table between the secure file directory table and each secure file, the method further includes:
and acquiring the equipment identifier of the mobile storage equipment, and storing the equipment identifier and the mapping relation table in an associated mode.
Optionally, after the step of scanning the mobile storage device to determine the secure file directory table, the method further includes:
acquiring the equipment identifier of the mobile storage equipment;
and executing the step of generating the mapping relation table between the security file directory table and each security file when the device identifier is associated with a preset mapping relation table and the scanned security file directory table is inconsistent with the security directory table in the preset mapping relation table.
In order to achieve the above object, the present invention also provides a file transfer device, the device including a memory, a processor, and a security access program stored on the memory and executable on the processor, the security access program of the device implementing the steps of the security access method of the mobile storage device of the device as described above when executed by the processor.
The present invention also provides a computer readable storage medium having stored thereon a secure access program of a device, which when executed by a processor implements the steps of the secure access method of a mobile storage device of a device as described above.
The mobile storage device is connected to the data access device through the file transmission device, the file transmission device scans the mobile storage device to determine a secure file directory table after detecting that the mobile storage device is accessed, wherein each file corresponding to the secure file directory table is a secure file, and then a mapping relation table between the secure file directory table and each secure file is generated, so that the data access device accesses the secure file in the mobile storage device based on the mapping relation table, and the mobile storage device can only access the secure file but cannot access the virus file when accessing the file of the mobile storage device.
Drawings
FIG. 1 is a schematic diagram of a device architecture of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a first embodiment of a secure access method for a mobile storage device according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a method for secure access of a mobile storage device according to the present invention;
fig. 4 is a schematic flow chart of a third embodiment of a secure access method for a mobile storage device according to the present invention;
fig. 5 is a flowchart of a fourth embodiment of a secure access method for a mobile storage device according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a secure file directory table, wherein each file corresponding to the secure file directory table is a secure file; and generating a mapping relation table between the secure file directory table and each secure file, so that the data access device can access the secure files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
Referring to fig. 1, fig. 1 is a schematic device structure of a hardware running environment according to an embodiment of the present invention.
The device of the embodiment of the invention can be embedded system hardware, and also can be device devices such as a converter, a card reader and the like.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a CPU, a memory 1003, and a communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The memory 1003 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1003 may alternatively be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the device structure shown in fig. 1 does not constitute a limitation of the secure access device of the mobile storage device, and may include more or fewer components than shown, or may combine certain components, or may be a different arrangement of components.
Referring to fig. 1, a memory 1003, which is a computer storage medium, may include an operating system, a network communication module, a user interface module, and a security access program.
In the device shown in fig. 1, the processor 1001 may be used to call a secure access program stored in the memory 1003, and perform the following operations:
after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a secure file directory table, wherein each file corresponding to the secure file directory table is a secure file;
and generating a mapping relation table between the secure file directory table and each secure file, so that the data access device can access the secure files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
scanning the mobile storage equipment to obtain virus files in the mobile storage equipment and file directory tables corresponding to the files in the mobile storage equipment;
and marking the catalogs corresponding to the virus files in the file catalogs to obtain a safe file catalogs.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
and acquiring a virus file in the mobile storage device according to the detection report list, wherein the file transmission device scans the mobile storage device to obtain the detection report list.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
scanning the mobile storage equipment to obtain security files in the mobile storage equipment and file directory tables corresponding to all files in the mobile storage equipment;
and marking other catalogs except the catalogs corresponding to the security files in the file catalogs table to obtain the security file catalogs table.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
and unloading the mobile storage device after the mapping relation table is generated, wherein when the mobile storage device is accessed to the file transmission device, the mobile storage device is loaded on the file transmission device so that the file transmission device scans files in the mobile storage device.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
and storing the mapping relation table at the output end of the file transmission equipment.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
and acquiring the equipment identifier of the mobile storage equipment, and storing the equipment identifier and the mapping relation table in an associated mode.
In one embodiment, the processor 1001 may call a secure access program stored in the memory 1003, and further perform the following operations:
acquiring the equipment identifier of the mobile storage equipment;
and executing the step of generating the mapping relation table between the security file directory table and each security file when the device identifier is associated with a preset mapping relation table and the scanned security file directory table is inconsistent with the security directory table in the preset mapping relation table.
Referring to fig. 2, the present invention provides a first embodiment of a secure access method of a mobile storage device, the secure access method of the mobile storage device includes the following steps:
step S10, after the file transmission device detects that the mobile storage device is accessed, the mobile storage device is scanned to determine a secure file directory table;
and step S20, generating a mapping relation table between the security file directory table and each security file, so that the data access equipment can access the security files in the mobile storage equipment based on the mapping relation table.
The execution device of the embodiment is a file transmission device, may be embedded system hardware, and is used for connecting a mobile storage device and a data access device, where the data access device may be a device capable of accessing data in the mobile storage device, such as a PC, a smart phone, a tablet computer, etc., the mobile storage device is connected to the data access device through the file transmission device, and the data access device indirectly accesses the mobile storage device through the execution device of the embodiment.
The execution device in this embodiment is provided with a secure access program, and after detecting that the mobile storage device is accessed, the secure file directory table without virus is generated for the data access device to access, so that the data access device indirectly accesses the mobile storage device through the mapping relation table in the execution device in this embodiment.
After detecting that a mobile storage device is accessed, the execution device in this embodiment scans the mobile storage device to determine a secure file directory table, where the secure directory table is a directory set of all secure files in the mobile device, that is, all files corresponding to the secure file directory table are secure files.
It may be appreciated that after the secure file directory table is obtained, a mapping relationship table between the secure file directory table and each secure file is generated, and through the mapping relationship table, the data access device may access, according to the secure file directory table, a corresponding secure file in the mobile storage device, for example: the mapping relation table can record the address of each security file in the security file directory table so that the data access device can access the security files in the mobile storage device based on the address. It can be understood that the mapping relationship table is a mapping relationship between the secure file and a corresponding file directory table in the secure file directory table, so that although the directories of all files in the mobile storage device are also recorded in the secure file directory table, only the directories corresponding to the secure file have a mapping relationship, that is, the data access device can look up all file directories in the mobile storage device, but only the secure file having the mapping relationship can be accessed.
In this embodiment, the mobile storage device is connected to the data access device through the file transmission device, after the file transmission device detects that the mobile storage device is accessed, the mobile storage device is scanned to determine a secure file directory table, and a mapping relationship table between the secure file directory table and each secure file is generated, so that the data access device accesses the secure file in the mobile storage device based on the mapping relationship table, and the data access device indirectly accesses the mobile storage device through the execution terminal in this embodiment.
In an embodiment, after the executing device of the present embodiment generates the mapping relationship table between the secure file directory table and each secure file in the mobile storage device, the mobile storage device is uninstalled, where the uninstalling is to prevent the virus file in the mobile storage device from threatening the data access device.
In an embodiment, after the executing device of the present embodiment generates the mapping relation table between the secure file directory table and each secure file in the mobile storage device, the mapping relation table is stored in an output end of the executing device of the present embodiment, that is, an output end of the file transmitting device, where the output end is connected to the data access device, and the stored mapping relation table is used for providing the data access device to access the mobile storage device.
In an embodiment, after the executing device of the present embodiment generates the mapping relation table between the secure file directory table and each secure file, the file transmitting device may further acquire a device identifier of the mobile storage device, and store the device identifier in association with the mapping relation table, where the device identifier is used to identify the currently accessed mobile storage device.
Referring to fig. 3, the present invention provides a second embodiment of a secure access method of a mobile storage device, based on the embodiment shown in fig. 2, the step of scanning the mobile storage device to determine a secure file directory table includes:
step S11, after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to acquire virus files in the mobile storage device and file directory tables corresponding to all files in the mobile storage device;
and step S12, marking the catalogs corresponding to the virus files in the file catalogs to obtain a safe file catalogs.
After detecting that the mobile storage device is accessed, scanning the mobile storage device, wherein the scanning comprises anti-virus scanning and file directory tree structure scanning, the anti-virus scanning is to scan files with viruses or illegal files in the mobile storage device, specifically, the file transmission device scans the mobile storage device to obtain the detection report list, and then obtains the files with viruses or illegal files in the mobile storage device according to the detection report list. The file directory tree structure scanning is to scan all files in the mobile storage device, and it can be understood that after the antivirus scanning and the file directory tree structure scanning are performed on the mobile storage device, files with viruses in the mobile storage device and file directory tables corresponding to the files in the mobile storage device can be obtained, and the file directory tables record directories of all files in the mobile storage device.
It can be understood that after the file with virus in the mobile storage device and the file directory table corresponding to each file in the mobile storage device are obtained, each directory corresponding to the file with virus or illegal file is marked in the file directory table, so that the file directory table corresponding to the file with virus or illegal file cannot be accessed, and a secure file directory table is obtained, that is, only the security file which is not marked in the secure file directory table can be accessed. The secure file directory table also records the directories of all files in the mobile storage device, but only the files corresponding to the untagged file directories can be accessed. For example: when the mapping relation table between the secure file directory table and each secure file is generated, the marked file directory does not generate a mapping relation, i.e. the marked file directory does not have a corresponding file address.
In this embodiment, after detecting that the mobile storage device is accessed, the mobile storage device is scanned to obtain virus files in the mobile storage device and file directory tables corresponding to all files in the mobile storage device, and in the file directory tables, directories corresponding to all the virus files are marked to obtain a secure file directory table, so that the secure file directory table is obtained according to the virus files and the file directory table, the operation is simple and safe, and security threat is not generated to the data access device.
Referring to fig. 4, the present invention provides a third embodiment of a secure access method of a mobile storage device, based on the embodiment shown in fig. 2, the step of scanning the mobile storage device to determine a secure file directory table further includes:
step S13, after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to acquire security files in the mobile storage device and file directory tables corresponding to all files in the mobile storage device;
and S14, marking other catalogs except the catalogs corresponding to the security files in the file catalogs to obtain a security file catalogs.
After detecting that the mobile storage device is accessed, the mobile storage device can be scanned to obtain the security files in the mobile storage device and the file directory tables corresponding to the files in the mobile storage device, and the security file directory tables are obtained by only reserving the file directories corresponding to the security files in the file directory tables. The scanning comprises anti-virus scanning and file directory tree structure scanning, a detection report list is obtained according to the anti-virus scanning, all security files in the mobile storage device are recorded in the detection report list, file directory tables of all the files in the mobile storage device are obtained according to the file directory tree structure, and it is understood that the security file directory tables can be obtained by marking file directories which are not security files in the file directory tables. Wherein, the secure file directory table also records the directories of all files in the mobile storage device, but only the files corresponding to the untagged file directory can be accessed. For example: when the mapping relation table between the secure file directory table and each secure file is generated, the marked file directory does not generate a mapping relation, i.e. the marked file directory does not have a corresponding file address.
In this embodiment, after detecting that the mobile storage device is accessed, the mobile storage device is scanned to obtain the security files in the mobile storage device and the file directory tables corresponding to the files in the mobile storage device, and then the directories corresponding to the security files are obtained in the file directory tables to obtain the security file directory tables, so that the security file directory tables are obtained according to the security files and the file directory tables, and the operation is simple and convenient.
Referring to fig. 5, the present invention provides a fourth embodiment of a secure access method for a mobile storage device, based on the embodiment shown in fig. 2, after the step of scanning the mobile storage device to determine a secure file directory table, the method further includes:
step S30, obtaining the equipment identification of the mobile storage equipment;
step S20, when a preset mapping relation table is associated with the device identifier, and the scanned secure file directory table is inconsistent with the secure directory table in the preset mapping relation table, the step of generating the mapping relation table between the secure file directory table and each secure file is executed.
After the mobile storage device is scanned to determine the secure file directory table, the device identifier of the mobile storage device may be acquired first, where the device identifier is used to identify whether the mobile storage device currently accessed is the mobile storage device accessed last time. It can be understood that when the device identifier is associated with a preset mapping relationship table, and the scanned secure file directory table is inconsistent with the secure directory table in the preset mapping relationship table, the step of generating the mapping relationship table between the secure file directory table and each secure file is performed. Optionally, when the device identifier is associated with a preset mapping relation table, and the scanned secure file directory table is consistent with the secure directory table in the preset mapping relation table, the stored mapping relation table is directly called for the data access device to use. Optionally, when the device identifier association does not have a preset mapping relation table, the step of generating the mapping relation table between the secure file directory table and each secure file is executed.
In this embodiment, after the mobile storage device is scanned to determine the secure file directory table, the device identifier of the mobile storage device may be first obtained, and when a preset mapping relation table is associated with the device identifier and the scanned secure file directory table is inconsistent with the secure file directory table in the preset mapping relation table, the step of generating the mapping relation table between the secure file directory table and each secure file is executed, so that the mobile storage device that is currently accessed is first identified, and the mapping relation table between the secure file directory table and each secure file is regenerated, which is easy and convenient to operate.
The invention also provides a file transfer device comprising a memory, a processor and a secure access program stored on the memory and executable on the processor, the secure access program of the device implementing the steps of the secure access method of the mobile storage device of the device as described above when executed by the processor.
The present invention also provides a computer readable storage medium having stored thereon a secure access program of a device, which when executed by a processor implements the steps of the secure access method of a mobile storage device of a device as described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A secure access method of a mobile storage device, wherein the mobile storage device is connected to a data access device through a file transfer device, the secure access method of the mobile storage device comprising the steps of:
after detecting that the mobile storage device is accessed, the file transmission device scans the mobile storage device to determine a secure file directory table, wherein each file corresponding to the secure file directory table is a secure file;
and generating a mapping relation table between the secure file directory table and each secure file, so that the data access device can access the secure files in the mobile storage device based on the mapping relation table, wherein the data access device is connected with the file transmission device.
2. The method of secure access for a mobile storage device of claim 1, wherein the step of scanning the mobile storage device to determine a secure file directory table comprises:
scanning the mobile storage equipment to obtain virus files in the mobile storage equipment and file directory tables corresponding to the files in the mobile storage equipment;
and marking the catalogs corresponding to the virus files in the file catalogs to obtain a safe file catalogs.
3. The method for secure access to a mobile storage device of claim 2, wherein the step of obtaining the virus file in the mobile storage device comprises:
and acquiring a virus file in the mobile storage device according to the detection report list, wherein the file transmission device scans the mobile storage device to obtain the detection report list.
4. The method of secure access to a mobile storage device of claim 1, wherein the step of scanning the mobile storage device to determine a secure file directory table further comprises:
scanning the mobile storage equipment to obtain security files in the mobile storage equipment and file directory tables corresponding to all files in the mobile storage equipment;
and marking other catalogs except the catalogs corresponding to the security files in the file catalogs table to obtain the security file catalogs table.
5. The method for secure access to a mobile storage device according to claim 1, wherein after the step of generating the mapping relationship table between the secure file directory table and each of the secure files, further comprising:
and unloading the mobile storage device after the mapping relation table is generated, wherein when the mobile storage device is accessed to the file transmission device, the mobile storage device is loaded on the file transmission device so that the file transmission device scans files in the mobile storage device.
6. The method for secure access to a mobile storage device according to any one of claims 1 to 5, wherein after the step of generating the mapping relation table between the secure file directory table and each of the secure files, further comprising:
and storing the mapping relation table at the output end of the file transmission equipment.
7. The method for secure access to a mobile storage device according to any one of claims 1 to 5, wherein after the step of generating the mapping relation table between the secure file directory table and each of the secure files, further comprising:
and acquiring the equipment identifier of the mobile storage equipment, and storing the equipment identifier and the mapping relation table in an associated mode.
8. The method for secure access to a mobile storage device according to any one of claims 1-5, further comprising, after the step of scanning the mobile storage device to determine a secure file directory table:
acquiring the equipment identifier of the mobile storage equipment;
and executing the step of generating the mapping relation table between the security file directory table and each security file when the device identifier is associated with a preset mapping relation table and the scanned security file directory table is inconsistent with the security directory table in the preset mapping relation table.
9. A file transfer device, characterized in that the device comprises a memory, a processor and a secure access program of a mobile storage device stored on the memory and executable on the processor, which secure access program of the mobile storage device, when executed by the processor, implements the steps of the secure access method of the mobile storage device according to any of claims 1-8.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a secure access program of a mobile storage device, which when executed by a processor, implements the steps of the secure access method of a mobile storage device according to any of claims 1-8.
CN202010319944.0A 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium Active CN111428272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010319944.0A CN111428272B (en) 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010319944.0A CN111428272B (en) 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium

Publications (2)

Publication Number Publication Date
CN111428272A CN111428272A (en) 2020-07-17
CN111428272B true CN111428272B (en) 2023-06-06

Family

ID=71554286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010319944.0A Active CN111428272B (en) 2020-04-21 2020-04-21 Secure access method and device for mobile storage device and storage medium

Country Status (1)

Country Link
CN (1) CN111428272B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609538B (en) * 2021-07-09 2024-03-08 国网福建省电力有限公司电力科学研究院 Access control method, device and equipment for mobile storage medium and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003083670A1 (en) * 2002-04-03 2003-10-09 Invisicom, Inc. Protection of data by hiding the data
CN101350034A (en) * 2008-09-10 2009-01-21 普天信息技术研究院有限公司 Mobile memory apparatus and method for visiting file
US7814554B1 (en) * 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US8086688B1 (en) * 2008-05-16 2011-12-27 Quick Vault, Inc. Method and system for mobile data security
CN102799691A (en) * 2012-08-15 2012-11-28 深圳市宏电技术股份有限公司 File system conversion access method and file system conversion access equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7861302B1 (en) * 2000-11-17 2010-12-28 Emc Corporation Physical scanning of storage based apparatus for antivirus
US7401089B2 (en) * 2005-08-17 2008-07-15 Microsoft Corporation Storage reports file system scanner
CN101800738B (en) * 2009-12-31 2013-01-16 暨南大学 Realization system and method for safely visiting and storing intranet data by mobile equipment
WO2011095484A1 (en) * 2010-02-02 2011-08-11 Gemalto Sa Method of countermeasure against the installation-by-tearing of viruses onto a secure portable mass storage device
US10169571B1 (en) * 2012-07-18 2019-01-01 Sequitur Labs, Inc. System and method for secure, policy-based access control for mobile computing devices
US20190042781A1 (en) * 2017-08-04 2019-02-07 Bitdefender IPR Management Ltd. Secure Storage Device
CN109857587A (en) * 2017-11-30 2019-06-07 西门子公司 Control method, device and the storage medium of movable storage device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003083670A1 (en) * 2002-04-03 2003-10-09 Invisicom, Inc. Protection of data by hiding the data
US7814554B1 (en) * 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US8086688B1 (en) * 2008-05-16 2011-12-27 Quick Vault, Inc. Method and system for mobile data security
CN101350034A (en) * 2008-09-10 2009-01-21 普天信息技术研究院有限公司 Mobile memory apparatus and method for visiting file
CN102799691A (en) * 2012-08-15 2012-11-28 深圳市宏电技术股份有限公司 File system conversion access method and file system conversion access equipment

Also Published As

Publication number Publication date
CN111428272A (en) 2020-07-17

Similar Documents

Publication Publication Date Title
US9235703B2 (en) Virus scanning in a computer system
CN101599947B (en) Trojan horse virus scanning method based on WEB page
RU2468426C2 (en) File conversion in restricted process
CN107480527B (en) Lesso software prevention method and system
KR101120447B1 (en) System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device
RU2551820C2 (en) Method and apparatus for detecting viruses in file system
US6029256A (en) Method and system for allowing computer programs easy access to features of a virus scanning engine
US8474040B2 (en) Environmental imaging
AU2017201667B2 (en) Secure document importation via portable media
US20180084002A1 (en) Malicious hyperlink protection
US9087194B2 (en) Providing information to a security application
US20080141375A1 (en) On Demand Virus Scan
CN108200053B (en) Method and device for recording APT attack operation
EP2998902B1 (en) Method and apparatus for processing file
US7860850B2 (en) Scanning files using direct file system access
WO2015081791A1 (en) Method and apparatus for scanning and removing kernel-level malware
US10747879B2 (en) System, method, and computer program product for identifying a file used to automatically launch content as unwanted
CN103473501A (en) Malware tracking method based on cloud safety
CN111428272B (en) Secure access method and device for mobile storage device and storage medium
CN110826070A (en) Bait file hiding method and device, electronic equipment and storage medium
CN105095758A (en) Processing method and device for lock-screen application program and mobile terminal
US8347389B2 (en) System for protecting devices against virus attacks
CN105095754A (en) Method, device and mobile terminal for processing virus applications
US8627099B2 (en) System, method and computer program product for removing null values during scanning
KR20020002953A (en) Remote virus check service method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant