CN114943072B - Method and system for realizing U disk linkage management and control among various software systems - Google Patents

Method and system for realizing U disk linkage management and control among various software systems Download PDF

Info

Publication number
CN114943072B
CN114943072B CN202210880598.2A CN202210880598A CN114943072B CN 114943072 B CN114943072 B CN 114943072B CN 202210880598 A CN202210880598 A CN 202210880598A CN 114943072 B CN114943072 B CN 114943072B
Authority
CN
China
Prior art keywords
disk
version number
file
unique identification
volume
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210880598.2A
Other languages
Chinese (zh)
Other versions
CN114943072A (en
Inventor
李斌
钱国明
王亮
杨晟收
赵师伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wangteng Technology Co ltd
Original Assignee
Beijing Wangteng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wangteng Technology Co ltd filed Critical Beijing Wangteng Technology Co ltd
Priority to CN202210880598.2A priority Critical patent/CN114943072B/en
Publication of CN114943072A publication Critical patent/CN114943072A/en
Application granted granted Critical
Publication of CN114943072B publication Critical patent/CN114943072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides a method and a system for realizing U disk linkage management and control among various software systems, which are characterized in that a unique Identification (ID) is created for a U disk, a mark file is created for the U disk, and when the U disk is used, the U disk is connected with a certain device through byte counting of the residual space of each volume, after the device detects the U disk, the U disk is read, detection processing software is installed in the device, the detection processing software is used for processing and judging the result, and if the U disk is not marked, normal processing is carried out on the U disk; if the U disk is marked, the U disk is normally used, and when the U disk is connected with other equipment for use, the method is repeated, so that the problem that the work efficiency is low because the U disk is rechecked by the inspection processing software when the U disk is used on different equipment and the inspection processing software is installed on the equipment is solved, the working time is saved, the information safety of the U disk is ensured, and the linkage management and control of the U disk is realized.

Description

Method and system for realizing U disk linkage management and control among various software systems
Technical Field
The invention relates to the technical field of mobile data information safety protection, in particular to a method and a system for realizing U disk linkage management and control among various software systems.
Background
The USB flash disk is used as a portable storage device and widely used in various occasions, but is an important channel for spreading viruses or malicious software on the premise of convenient use, and an effective virus prevention method is lacking at present, so that the information safety or the equipment safety of enterprises is influenced.
In the existing mode of checking and killing viruses of the U disk, the virus killing is mainly realized by installing checking processing software in equipment, and the virus killing time of the virus killing software is in a period of several minutes or more than ten minutes each time, but when the U disk is used on different equipment and the checking processing software is installed on the equipment, the U disk can be checked and killed again by the checking processing software, and the virus killing is carried out again in a period of several minutes or more than ten minutes; if a certain device is not provided with the checking processing software, whether the USB flash disk contains malicious software cannot be determined, the safety risk of the device is increased, and meanwhile the enterprise safety index is influenced.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a method and a system for realizing U disk linkage management and control among various software systems, which solve the problems that in the prior art, when U disks are used on different devices and the devices are provided with inspection processing software, the U disks are rechecked and killed by the inspection processing software, and the working efficiency is low due to time consumption.
A method for realizing U disk linkage control among a plurality of software systems comprises the following steps: creating and encrypting a mark file in the root directory of the first volume of the U disk, wherein the content of the mark file comprises a linkage algorithm version number, a unique identification ID of the U disk and byte count of the residual space of each volume;
when the USB flash disk is connected with any equipment, judging whether the marking file exists in the USB flash disk or not;
if the marked file does not exist, the marked file is regarded as an unmarked USB flash disk; if yes, decrypting the mark file, and acquiring a linkage algorithm version number, a unique identification ID of the U disk and byte count of the residual space of each volume in the decrypted mark file;
judging whether the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume are consistent with the information stored in the U disk or not;
if the data is consistent, the data is regarded as a safe USB flash disk; if the two types of the USB flash disk are not matched, the USB flash disk is regarded as an unlabeled USB flash disk;
and detecting the un-marked USB flash disk, and generating a marked file if no malicious software exists based on the detection result.
Further, the determining whether the linkage algorithm version number, the unique identifier ID of the usb disk, and the byte count of the remaining space of each volume match with the information stored in the usb disk includes:
reading the linkage algorithm version number;
judging whether the linkage algorithm version number is consistent with the linkage algorithm version number of the connecting equipment, and updating to the latest algorithm version when the linkage algorithm version number is inconsistent with the linkage algorithm version number of the connecting equipment; when the linkage algorithm version number is consistent with the linkage algorithm version number of the connected equipment, continuing to use the U disk;
judging whether the unique identification ID of the U disk is consistent with the ID of the U disk;
and reading the byte count value of each volume of the residual space, and judging whether the byte count value of each volume of the residual space is consistent with the value in the mark file.
Further, judging whether the unique identification ID of the U disk is consistent with the ID of the U disk;
reading the value of the residual space byte count of each volume, and judging whether the value of the residual space byte count of each volume is consistent with the value in the mark file or not, wherein the method comprises the following steps:
and when the unique identification ID of the USB flash disk is matched with the ID of the USB flash disk and the byte count value of the residual space of each volume is matched with the value in the mark file, the USB flash disk is regarded as safe, and the USB flash disk is continuously used.
Further, the version number of the linkage algorithm, the unique identification ID of the usb disk, and the byte count of the remaining space of each volume are in json, text, binary or xml format.
Further, the unique identifier ID of the U disc includes:
and calculating the unique identification ID of the U disk according to the ID string of the U disk, and calculating the crc32 value of the ID string by a crc32 algorithm and a private mask to serve as the unique identification ID of the U disk.
A system for realizing U disk linkage control among various software systems comprises:
the system comprises a mark file creating module, a file managing module and a file managing module, wherein the mark file creating module is used for creating and encrypting a mark file in a root directory of a first volume of the U disk, and the content of the mark file comprises a linkage algorithm version number, a unique identification ID of the U disk and byte count of a residual space of each volume;
the marking file judging module is used for judging whether the marking file exists in the U disk or not when the U disk is connected with any equipment;
the marked file decryption module is used for decrypting the marked file, and if the marked file does not exist, the marked file is regarded as an unmarked U disk; if yes, decrypting the mark file, and acquiring the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume in the decrypted mark file;
the marking file and USB flash disk detection module is used for judging whether the linkage algorithm version number, the unique identification ID of the USB flash disk and the byte count of the residual space of each volume are consistent with the information stored in the USB flash disk;
the unmarked USB flash disk detection module is used for detecting the safety of the USB flash disk, and if the version number of the linkage algorithm, the unique identification ID of the USB flash disk and the byte count of the residual space of each volume are consistent with the USB flash disk, the USB flash disk is regarded as a safe USB flash disk; if the two types of the USB flash disk are not matched, the USB flash disk is regarded as an unlabeled USB flash disk;
and the unmarked USB flash disk determining module is used for detecting the unmarked USB flash disk, and generating a marked file if no malicious software exists based on a detection result.
Further, the tag file and USB flash disk detection module includes:
the linkage algorithm version number reading unit is used for reading the linkage algorithm version number;
the linkage algorithm version number judging unit is used for judging whether the linkage algorithm version number accords with the linkage algorithm version number of the connecting equipment or not, and updating the linkage algorithm version number to the latest version when the linkage algorithm version number does not accord with the linkage algorithm version number of the connecting equipment; when the linkage algorithm version number is consistent with the linkage algorithm version number of the connected equipment, continuing to use the U disk;
the unique identification ID judgment unit of the U disk is used for judging whether the unique identification ID of the U disk in the mark file is consistent with the ID of the U disk per se;
and the number judging unit is used for reading the byte count value of each volume of the residual space and judging whether the byte count value of each volume of the residual space accords with the value in the mark file.
Further, judging whether the unique identification ID of the U disk in the mark file is consistent with the ID of the U disk; reading the byte count value of each volume of the residual space, and judging whether the byte count value of each volume of the residual space is consistent with the value in the mark file or not, wherein the method comprises the following steps:
and when the unique identification ID of the U disk is matched with the ID of the U disk and the byte count value of the residual space of each volume is matched with the value in the mark file, the U disk is regarded as a safe U disk, and the U disk is continuously used.
Further, the version number of the linkage algorithm, the unique identification ID of the usb disk, and the byte count of the remaining space of each volume are in json, text, binary or xml format.
Further, the markup file creating module comprises a unique identification ID creating unit of the U disk,
the unique identification ID creation unit of the U disk is used for creating the unique identification ID of the U disk, calculating the unique identification ID of the U disk according to the ID string of the U disk, and calculating the crc32 value of the ID string as the unique identification ID of the U disk by a crc32 algorithm and matching with a private mask.
The technical principle of the invention is as follows: when the USB flash disk is connected with any equipment, judging whether the marking file exists in the USB flash disk or not;
if the marked file does not exist, the marked file is regarded as an unmarked USB flash disk; if yes, decrypting the mark file, and acquiring a linkage algorithm version number, a unique identification ID of the U disk and byte count of the residual space of each volume in the decrypted mark file;
judging whether the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume are consistent with the U disk or not;
if the data is consistent, the data is regarded as a safe USB flash disk; if the two types of the USB flash disk are not matched, the USB flash disk is regarded as an unlabeled USB flash disk;
and detecting the un-marked USB flash disk, and generating a marked file if no malicious software exists based on the detection result.
Through the detection mark of the USB flash disk mark file, the time for repeated checking and killing of the USB flash disk is saved, and the safety of the USB flash disk information is ensured.
Compared with the prior art, the invention has the following beneficial effects: by creating the unique identification ID for the U disk, creating the marking file for the U disk, and counting the residual space of each volume through bytes in the marking file, the detection processing software processes and marks the U disk content, so that the problem that the work efficiency is low is solved because the U disk is rechecked by the detection processing software when the U disk is used on different equipment and the detection processing software is installed on the equipment, the time for rechecking and killing the U disk is saved, the safety of U disk information is guaranteed, and the work efficiency of a user is improved.
Drawings
Fig. 1 is a schematic diagram of a method for implementing U-disk linkage control among various software systems according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a system for implementing U-disk linkage control among various software systems according to an embodiment of the present invention.
Detailed Description
The technical scheme of the invention is further described below with reference to the accompanying drawings and examples.
As shown in fig. 1, an embodiment of the present invention provides a method for implementing U-disk linkage control among multiple software systems, including:
s001, creating and encrypting a mark file in the root directory of the first volume of the U disk, wherein the content of the mark file comprises a linkage algorithm version number, a unique identification ID of the U disk and byte count of the residual space of each volume;
specifically, the byte count of the remaining space of each volume refers to the remaining storage space in the markup file after each volume occupies the memory space of the markup file after each detection and control of the usb disk, and the remaining storage space is calculated in a byte count manner;
s002, judging whether the marking file exists in the U disk or not when the U disk is connected with any equipment;
s003, if the marked file does not exist, the marked file is regarded as an unmarked U disk; if yes, decrypting the mark file, and acquiring the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume in the decrypted mark file;
s004, judging whether the linkage algorithm version number, the unique identification ID of the U disk and the residual space byte count of the first volume are consistent with the U disk or not;
s005, if the data are matched, the data are regarded as the safe USB flash disk; if the two types of the USB flash disk are not matched, the USB flash disk is regarded as an unlabeled USB flash disk;
s006, detecting the un-marked U disk, and generating a marked file if no malicious software exists based on the detection result.
By creating the unique identification ID of the USB flash disk and creating the mark file in the USB flash disk, the problem that the time is consumed, the work efficiency is low and the time of the repeated detection processing of the USB flash disk is saved is solved, the safety of USB flash disk information is ensured, the work efficiency of a user is improved, and the linkage management and control of the USB flash disk is realized.
As an implementation manner, determining whether the linkage algorithm version number, the unique identifier ID of the U disk, and the remaining space byte count of the first volume match the U disk includes:
judging the linkage algorithm version number, if the linkage algorithm version number is not consistent with the version number of the connected equipment, judging that the U disk is not marked, detecting the U disk, and generating a marked file if malicious software is not present based on the detection result;
judging whether the unique identification ID of the U disk in the mark file is consistent with the ID of the U disk, if not, indicating that the file is copied, regarding the U disk as an unlabeled U disk, detecting the U disk, and generating the mark file if no malicious software exists based on the detection result;
reading the residual space of each volume of the U disk, judging whether the value of the residual space is consistent with the value in the mark file, if not, regarding the U disk as an unlabeled U disk, detecting the U disk, and if no malicious software exists based on the detection result, generating the mark file;
judging the version number of the linkage algorithm, and if the version number is consistent with the version number of the connected equipment, judging the safety of the U disk, so that the U disk can be used with confidence;
judging whether the unique identification ID of the U disk in the mark file is equal to the ID of the U disk, if so, the U disk is safe and can be used with confidence;
and reading the residual space of each volume of the U disk, judging whether the value of the residual space is in accordance with the value in the mark file, and if so, ensuring that the U disk is safe and can be used with confidence.
In the markup file, the version number of the linkage algorithm indicates the version of the algorithm, and the version of the algorithm can be updated at any time, for example, the version of the algorithm can be: version 1.0, version 2.0, version 3.0, etc.;
in the marking file, the unique identification ID of the U disk is prevented from being copied to other U disks by the unique identification ID of the U disk, the unique identification ID of the U disk is created, the unique identification ID of the U disk can be calculated according to the ID string of the U disk, and the crc32 value of the ID string is calculated by a crc32 algorithm in combination with a private mask to be used as the unique identification ID of the U disk;
counting the residual space of each volume by byte in the mark file to judge whether the U disk content is updated after the mark file is produced;
when the number of bytes of the remaining space of each volume in the markup file is changed, the content of the USB flash disk is judged to be updated, and when the number of bytes of the remaining space of each volume in the markup file is not changed, the content of the USB flash disk is judged to be not updated.
As an embodiment, the version number of the linkage algorithm, the unique ID of the usb disk, and the remaining space of each volume in the markup file may be stored in the markup file in a format of json, text, binary, xml or the like.
As shown in fig. 2, a system for implementing U-disk linkage control among multiple software systems includes:
a markup file creating module 10 for creating and encrypting a markup file in a root directory of a first volume of the usb disk, the markup file content including a linked algorithm version number, a unique identification ID of the usb disk, and a byte count of a remaining space of each volume by byte count in the markup file, the markup file creating module 10 including a unique identification ID creating unit 17 of the usb disk;
the marking file judging module 11 is used for judging whether the marking file exists in the U disk or not when the U disk is connected with any equipment;
the tag file decryption module 12, if the tag file does not exist, regards the tag file as an untagged USB flash disk; if so, the tag file decryption module 12 is configured to decrypt the tag file, and obtain the linkage algorithm version number, the unique identifier ID of the usb disk, and the remaining space byte count of the first volume after decryption;
the marking file and USB flash disk detection module 13 judges whether the linkage algorithm version number, the unique identification ID of the USB flash disk and the residual space byte count of the first volume are consistent with the USB flash disk;
the unmarked usb disk detection module 14 is configured to consider a secure usb disk if the linkage algorithm version number, the unique identifier ID of the usb disk, and the byte count of the remaining space of each volume match the usb disk; if the two types of the USB flash disk are not matched, the USB flash disk is regarded as an unlabeled USB flash disk; the method comprises the steps of carrying out a first treatment on the surface of the
The unmarked usb disk determining module 15 is configured to detect a usb disk regarded as unmarked, and generate a markup file if no malware exists based on a detection result, so as to facilitate linkage management and control of the usb disk.
As an implementation manner, the marking file and usb disk detection module 13 determines whether the linkage algorithm version number, the unique identifier ID of the usb disk, and the byte count of the remaining space of each volume match the usb disk, including:
a linkage algorithm version number reading unit 18, configured to read the linkage algorithm version number;
the linkage algorithm version number judging unit 19 is configured to judge whether the linkage algorithm version number is consistent with a linkage algorithm version number of the connected device, update the latest version when the linkage algorithm version number is not consistent with the linkage algorithm version number of the connected device, and continue to use the usb disk when the linkage algorithm version number is consistent with the linkage algorithm version number of the connected device;
specifically, for example, when the linkage algorithm version number is 1.0 version and the linkage algorithm version of the connecting device is 2.0 version, the linkage algorithm version number is 1.0 version and is updated to 2.0 version;
the unique identifier ID determining unit 20 of the usb disk is configured to determine whether the unique identifier ID of the usb disk in the markup file matches the ID of the usb disk itself, and if not, indicate that the file is copied and is considered as an unlabeled usb disk;
a number judgment unit 21 for judging whether the value of the remaining space byte count of each volume matches the value in the tag file, and judging whether the value of the remaining space byte count of each volume matches the value in the tag file, if not, the remaining space byte count of each volume is regarded as an unlabeled USB flash disk;
when the unique identification ID of the U disk is matched with the ID of the U disk and the value of the byte count of the residual space of each volume is matched with the value in the mark file, the U disk is safe and continues to be used, when the number of the byte counts of the residual space of each volume in the mark file is changed, the content of the U disk is judged to be updated, and when the number of the bytes of the residual space of each volume in the mark file is not changed, the content of the U disk is not updated.
As an implementation manner, the version number of the linkage algorithm, the unique identifier ID of the usb disk and the remaining space of each volume in the markup file are stored in the markup file in a format of json, text, binary, xml, and under the arrangement, the usage scenario of the usb disk is widened.
The unique identification ID creation unit 17 of the usb disk is configured to create a unique identification ID of the usb disk, calculate the unique identification ID of the usb disk according to the ID string of the usb disk, and calculate the crc32 value of the ID string as the unique identification ID of the usb disk by using the crc32 algorithm in combination with the private mask.
Finally, it is noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made thereto without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered by the scope of the claims of the present invention.

Claims (4)

1. A method for realizing U disk linkage control among a plurality of software systems is characterized by comprising the following steps:
creating and encrypting a mark file in the root directory of the first volume of the U disk, wherein the content of the mark file comprises a linkage algorithm version number, a unique identification ID of the U disk and byte counts of the residual space of each volume, the linkage algorithm version number, the unique identification ID of the U disk and the byte counts of the residual space of each volume adopt json, text, binary or xml format, the linkage algorithm version number represents the version of the algorithm, and the version of the algorithm can be updated at any time;
when the USB flash disk is connected with any equipment, judging whether the marking file exists in the USB flash disk or not;
if the marked file does not exist, the marked file is regarded as an unmarked USB flash disk; if yes, decrypting the mark file, and acquiring the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume in the decrypted mark file;
judging whether the linkage algorithm version number accords with the information stored in the U disk, reading the linkage algorithm version number, judging whether the linkage algorithm version number accords with the linkage algorithm version number of the connecting device, updating to the latest algorithm version when the linkage algorithm version number does not accord with the linkage algorithm version number of the connecting device, and continuously using the U disk when the linkage algorithm version number accords with the linkage algorithm version number of the connecting device;
judging whether the unique identification ID of the USB flash disk and the byte count of each volume of the residual space are consistent with the information stored in the USB flash disk, reading the byte count value of each volume of the residual space, judging whether the byte count value of each volume of the residual space is consistent with the value in the mark file, and when the unique identification ID of the USB flash disk is consistent with the ID of the USB flash disk and the byte count value of each volume of the residual space is consistent with the value in the mark file, regarding the USB flash disk as safe, continuing to use the USB flash disk, and if the unique identification ID of the USB flash disk is not consistent with the value in the mark file, regarding the USB flash disk as unmarked;
and detecting the un-marked USB flash disk, and generating a marked file if no malicious software exists based on the detection result.
2. The method for implementing U-disk linkage management and control among multiple software systems according to claim 1, wherein the unique identification ID of the U-disk comprises:
and calculating the unique identification ID of the U disk according to the ID string of the U disk, and calculating the crc32 value of the ID string by a crc32 algorithm and a private mask to serve as the unique identification ID of the U disk.
3. The system for realizing the U disk linkage control among various software systems is characterized by comprising the following components:
the system comprises a marking file creation module, a storage module and a storage module, wherein the marking file creation module is used for creating and encrypting a marking file in a root directory of a first volume of the U disk, the marking file content comprises a linkage algorithm version number, a unique identification ID of the U disk and a byte count of a residual space of each volume, the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume adopt json, text, binary or xml format, the linkage algorithm version number represents an algorithm version, and the algorithm version can be updated at any time;
the marking file judging module is used for judging whether the marking file exists in the U disk or not when the U disk is connected with any equipment;
the marked file decryption module is used for decrypting the marked file, and if the marked file does not exist, the marked file is regarded as an unmarked U disk; if yes, decrypting the mark file, and acquiring the linkage algorithm version number, the unique identification ID of the U disk and the byte count of the residual space of each volume in the decrypted mark file;
the linkage algorithm version number reading and judging module is used for judging whether the linkage algorithm version number accords with the information stored in the U disk, reading the linkage algorithm version number, judging whether the linkage algorithm version number accords with the linkage algorithm version number of the connecting device, updating the U disk into the latest algorithm version when the linkage algorithm version number does not accord with the linkage algorithm version number of the connecting device, and continuously using the U disk when the linkage algorithm version number accords with the linkage algorithm version number of the connecting device
The system comprises a unique identification ID of a U disk and a byte count reading judgment module of each volume of residual space, wherein the unique identification ID of the U disk and the byte count of each volume of residual space are judged to be consistent with information stored in the U disk, the value of each volume of residual space byte count is read, whether the value of each volume of residual space byte count is consistent with the value in a mark file is judged, and when the unique identification ID of the U disk is consistent with the ID of the U disk and the value of each volume of residual space byte count is consistent with the value in the mark file, the U disk is regarded as safe, and if the unique identification ID of the U disk is not consistent with the value in the mark file, the U disk is regarded as unlabeled;
and the unmarked USB flash disk determining module is used for detecting the unmarked USB flash disk, and generating a marked file if no malicious software exists based on a detection result.
4. A system for implementing U-disk linked management among a plurality of software systems as defined in claim 3, wherein said markup file creation module comprises:
the unique identification ID creation unit of the U disk is used for creating the unique identification ID of the U disk, calculating the unique identification ID of the U disk according to the ID string of the U disk, and calculating the crc32 value of the ID string as the unique identification ID of the U disk by a crc32 algorithm in combination with a private mask.
CN202210880598.2A 2022-07-25 2022-07-25 Method and system for realizing U disk linkage management and control among various software systems Active CN114943072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210880598.2A CN114943072B (en) 2022-07-25 2022-07-25 Method and system for realizing U disk linkage management and control among various software systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210880598.2A CN114943072B (en) 2022-07-25 2022-07-25 Method and system for realizing U disk linkage management and control among various software systems

Publications (2)

Publication Number Publication Date
CN114943072A CN114943072A (en) 2022-08-26
CN114943072B true CN114943072B (en) 2023-05-05

Family

ID=82910669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210880598.2A Active CN114943072B (en) 2022-07-25 2022-07-25 Method and system for realizing U disk linkage management and control among various software systems

Country Status (1)

Country Link
CN (1) CN114943072B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116340270B (en) * 2023-05-31 2023-07-28 深圳市科力锐科技有限公司 Concurrent traversal enumeration method, device, equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3785983B2 (en) * 2001-10-05 2006-06-14 株式会社日立製作所 Digital information recording apparatus and information recording / reproducing apparatus
CN101655893B (en) * 2009-10-10 2011-07-20 郑界涵 Manufacture method of intelligent blog lock, Blog access control method and system thereof
WO2012161505A1 (en) * 2011-05-23 2012-11-29 Samsung Electronics Co., Ltd. Method and apparatus for authenticating a non-volatile memory device
CN103065102B (en) * 2012-12-26 2015-05-27 中国人民解放军国防科学技术大学 Data encryption mobile storage management method based on virtual disk
CN105871558B (en) * 2016-05-30 2019-06-07 科德数控股份有限公司 A kind of digital control system right management method based on USB flash disk physical serial numbers
CN106357402A (en) * 2016-11-11 2017-01-25 武汉斗鱼网络科技有限公司 Data encryption-decryption processing method and device
CN208172797U (en) * 2017-12-28 2018-11-30 航天信息股份有限公司 USB flash disk isolator
CN108898005B (en) * 2018-07-09 2021-06-11 郑州云海信息技术有限公司 Hard disk identification method, system, equipment and computer readable storage medium
CN114722379A (en) * 2022-04-08 2022-07-08 深信服科技股份有限公司 USB flash disk identification method, control method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114943072A (en) 2022-08-26

Similar Documents

Publication Publication Date Title
CN106796634B (en) Code pointer verification for hardware flow control
US8719580B2 (en) Data verification method
US20110060915A1 (en) Managing Encryption of Data
CN114943072B (en) Method and system for realizing U disk linkage management and control among various software systems
JP2006092574A (en) Method for protecting volatile file using single hash
CN108255505A (en) A kind of firmware update, device, equipment and computer readable storage medium
JP2009230741A (en) Method and apparatus for verifying archived data integrity in integrated storage system
JP2012099100A (en) Trustworthy time stamps on data storage devices
CN107688463B (en) Method for packaging version file of embedded equipment
US11481476B2 (en) Method for extracting data from a database of data are watermarked according to a reversible watermarking mechaism
CN103235911B (en) A kind of endorsement method
CN1439129A (en) Embedded security device within a nonvolatile memory device
CN105706099A (en) Software update device, and software update program
BRPI0715478A2 (en) Method for controlling unauthorized use of digital content, system, computer program product, electronic device, and network device
US20200089884A1 (en) Method and apparatus for ransomware detection
CN109214204B (en) Data processing method and storage device
JP2001147898A (en) Electronic preserving method and device for guaranteeing originality and computer readable recording medium
CN112685436A (en) Traceability information processing method and device
CN102542319A (en) Method for protecting keys of purchase secure access module (PSAM) card
WO2022001944A1 (en) Method for modifying linux kernel, and terminal device and storage medium
CN104361280B (en) A kind of method realizing carrying out authentic authentication to USB storage device by SMI interrupt
CN106570395A (en) Security protection method for operation system command
CN103873238A (en) Safety protection method of software integrity of cryptographic machine
CN101819619A (en) Method for preventing virus and Trojan horse
CN105956478B (en) Data isolation system and Method based on iOS Method Swizzling technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant