CN203812232U - Monitoring equipment for computer USB interface - Google Patents

Monitoring equipment for computer USB interface Download PDF

Info

Publication number
CN203812232U
CN203812232U CN201320582832.XU CN201320582832U CN203812232U CN 203812232 U CN203812232 U CN 203812232U CN 201320582832 U CN201320582832 U CN 201320582832U CN 203812232 U CN203812232 U CN 203812232U
Authority
CN
China
Prior art keywords
usb interface
usb device
usb
computer
computing machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201320582832.XU
Other languages
Chinese (zh)
Inventor
韩伟光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Beijing Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201320582832.XU priority Critical patent/CN203812232U/en
Application granted granted Critical
Publication of CN203812232U publication Critical patent/CN203812232U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model discloses monitoring equipment for a computer USB interface. The monitoring equipment for the computer USB interface comprises a first detection part on a computer, a second detection part on the computer, a judging part on the computer and a protective part, wherein the first detection parts detects whether USB equipment in the computer USB interface is removed or not; the second detection part detects whether the computer USB interface is accessed to the USB equipment; the judging part judges whether the USB equipment is safe or not; and the protective part protect the computer. With the monitoring equipment for the computer USB interface, a problem is solved that information leakage of USB interface equipment in the relative technology cannot be fundamentally prevented, so information leakage can be totally prevented.

Description

The watch-dog of USB interface of computer
Technical field
The utility model relates to USB interface field, in particular to a kind of watch-dog of USB interface of computer.
Background technology
USB interface equipment access office machine can threaten and cause information leakage problem the information security of enterprise.In correlation technique, in order to tackle information leakage problem, the general company management's system of formulating, publicity, training and the installation virus of adopting removes (Virus Removed Victor, be called for short VRV) scheme of system, in the time of USB interface equipment access office machine, such scheme only carries out alarm, does not carry out the processing on any backstage, thereby can not fundamentally solve information leakage problem.
Cannot obtain the effectively problem of protection for the USB interface of the USB interface watch-dog in correlation technique, not yet propose at present effective solution.
Utility model content
Fundamental purpose of the present utility model is to provide a kind of watch-dog of USB interface of computer, cannot obtain the effectively problem of protection to solve the USB interface of the USB interface watch-dog in correlation technique.
To achieve these goals, the utility model provides a kind of watch-dog of USB interface of computer.This equipment comprises: the first detection part, be arranged on computing machine, and whether be removed for detection of the USB device of USB interface of computer; The second detection part, is arranged on computing machine, whether accesses USB device for detection of USB interface of computer; Decision means, is arranged on computing machine, for judging whether USB device is safe USB device; And protecting component, for computing machine is carried out to protective treatment.
Further, the watch-dog of USB interface of computer also comprises: protective plug, is arranged in the USB interface of computing machine.
Further, protective plug comprises: pcb board; USB interface, is arranged on pcb board; And resistance, being arranged on pcb board, the first end of resistance is connected with the power lead of USB interface, and the second end of resistance is connected with the ground wire of USB interface.
Further, protecting component comprises: suspension processing element, for computing machine is carried out to suspension processing; And/or screen locking processing element, for computing machine is carried out to screen locking processing; And/or blank screen processing element, for computing machine is carried out to blank screen processing.
Further, the watch-dog of USB interface of computer also comprises: the first control assembly, and in the time that USB device is unsafe USB device, controls computing machine and carry out warning.
Further, the watch-dog of USB interface of computer also comprises: alarm, and for carrying out and report to the police in the time judging USB device and be removed.
Further, the watch-dog of USB interface of computer also comprises: print member, and for printing the transition information of USB interface access USB device.
By the utility model, adopt the first detection part, be arranged on computing machine, whether be removed for detection of the USB device of USB interface of computer; The second detection part, is arranged on computing machine, whether accesses USB device for detection of USB interface of computer; Decision means, is arranged on computing machine, for judging whether USB device is safe USB device; And protecting component, for computing machine is carried out to protective treatment, solve the USB interface watch-dog in correlation technique and can not fundamentally solve the problem of information leakage, and then reached and thoroughly prevent information leakage effect.
Brief description of the drawings
The accompanying drawing that forms the application's a part is used to provide further understanding of the present utility model, and schematic description and description of the present utility model is used for explaining the utility model, does not form improper restriction of the present utility model.In the accompanying drawings:
Fig. 1 is according to the watch-dog of the USB interface of computer of the utility model the first embodiment;
Fig. 2 is the structural drawing of executing routine protective plug according to the utility model;
Fig. 3 is the circuit diagram of executing routine protective plug according to the utility model;
Fig. 4 is according to the watch-dog of the USB interface of computer of the utility model the second embodiment; And
Fig. 5 is according to the watch-dog of the USB interface of computer of the utility model the 3rd embodiment.
Embodiment
It should be noted that, in the situation that not conflicting, the feature in embodiment and embodiment in the application can combine mutually.Describe below with reference to the accompanying drawings and in conjunction with the embodiments the utility model in detail.
It should be noted that, the watch-dog of the application's Computer USB interface can be applied to any USB interface based on JAVA programming and Microsoft's programming, and wherein, USB interface is one or more.
According to embodiment of the present utility model, provide a kind of watch-dog of USB interface of computer, for computing machine is carried out to protective treatment.
Fig. 1 is according to the watch-dog of the USB interface of computer of the utility model the first embodiment.
As shown in Figure 1, this equipment comprises: the first detection part 10, the second detection part 20, decision means 30 and protecting component 40.
Whether the first detection part 10 is arranged on computing machine, be removed for detection of the USB device of USB interface of computer.The USB device here refers to the conventional USB device such as keyboard that has the mouse of USB interface and have USB interface.Conventional USB device was before computer booting, connected USB device on computers and that often apply in the time of computer run.
The second detection part 20 is arranged on computing machine, whether accesses USB device for detection of USB interface of computer.
In the utility model embodiment, whether the second detection part 20 detection computations machine USB interface access USB device can be the whether USB device of access security of detection computations machine USB interface, for example, the USB device of safety is the conventional USB device such as mouse and keyboard with USB interface; Whether the second detection part 20 detection computations machine USB interface access USB device can be also whether detection computations machine USB interface accesses unsafe USB device, for example, unsafe USB device is the memory device that USB flash disk, card reader and portable hard drive etc. have USB interface; Whether the second detection part 20 detection computations machine USB interface access USB device can also be whether detection computations machine USB interface accesses unknown USB device.
Decision means 30 is arranged on computing machine, in the time that USB interface accesses USB device, judges whether USB device is safe USB device.
In the utility model embodiment, if when USB interface access USB device, decision means 30 can be by searching the type that is stored in the pre-conditioned USB device that judges USB interface access in corresponding the first database table, and wherein, this is pre-conditioned is default handle corresponding to USB device.
Particularly, in the time of USB interface access USB device, decision means 30 is obtained the handle of this USB device, and in the first database table, searches the default handle corresponding with this USB device according to the handle of this USB device.If the handle of this USB device of obtaining can find the default handle corresponding with this USB device in the first database table, can to judge this USB device be safe USB device or unsafe USB device to decision means 30; If the handle of this USB device of obtaining can not find the default handle corresponding with this USB device in the first database table, can to judge this USB device be unknown USB device to decision means 30.
Protecting component 40 is arranged on computing machine, when in USB device being unsafe USB device and/or unknown USB device, computing machine is carried out to protective treatment.
In the utility model embodiment, decision means 30 is obtained the handle of the USB device of access, and search the first database table according to the handle of the USB device of this access, on the one hand, if find default handle corresponding to the USB device of this access in this first database table, and default handle corresponding to the USB device of this access finding belongs to Equations of The Second Kind handle, and protecting component 40 generates control command, this control command is used for controlling computing machine and carries out protective treatment; On the other hand, if search the default handle corresponding less than the USB device of this access in this first database table, protecting component 40 also generates control command, and this control command is also carried out protective treatment for controlling computing machine.
Pass through the said equipment, the second detection part 20 is in the time detecting that USB interface accesses unsafe USB device, or detect when USB interface accesses unknown USB device, or detect when USB interface accesses unsafe USB device and unknown USB device, protecting component generates control command and carries out protective treatment to control computing machine, has reached and has thoroughly prevented information leakage effect.
Preferably, in the utility model embodiment, the watch-dog of this USB interface of computer can also comprise protective plug.This protective plug is arranged in the USB interface of computing machine.Particularly, before computer booting, protective plug can set in advance in all idle USB interface of computing machine, like this, as long as USB device or the protection of USB interface of computer are plugged with any variation that removes, whether the first detection part 10 can be removed the detection responding to the USB device of USB interface of computer or protective plug, thereby makes the protection action of response.
Fig. 2 is the structural drawing of executing routine protective plug according to the utility model, and Fig. 3 is the circuit diagram of executing routine protective plug according to the utility model.
As shown in Figure 2, this protective plug comprises: usb 1, pcb board 2 and resistance R.
Usb 1 is arranged on pcb board 2, for being connected to the usb 1 of computing machine.Resistance is also arranged on pcb board 2, and as shown in Figure 3, the first end of resistance R is connected with the power lead L1 of usb 1, and the second end of resistance R is connected with the ground wire L4 of usb 1.The first data line L2 and the second data line L3 of usb 1 are unsettled.
Like this, before computer starting, protective plug can set in advance the available free USB interface at computing machine, for protecting the information leakage of computing machine.Because the first end of resistance and the power lead of USB interface of protective plug are connected, the second end of resistance is connected with the ground wire of USB interface, therefore, after computer starting, have electric current and flow through protective plug, like this, after computer starting, if protective plug is removed, the first detection part 10 just can detect the disappearance of the electric current at the USB interface place at this protective plug place.The first data line and second data line of USB interface are unsettled, between computing machine and protective plug, do not carry out data transmission.
In the utility model embodiment, protecting component can be suspension processing element, and wherein, suspension processing element can be for carrying out suspension processing to computing machine in the time of the unsafe USB device of access,, carry out the processing being connected automatically cutting off computer with this unsafe USB device; Suspension processing element also can be for carrying out the processing being connected automatically cutting off computer with this unsafe USB device in the time accessing unknown USB device; When suspension processing element can also access unsafe USB device and unknown USB device at the same time for carrying out the processing being connected automatically cutting off computer with this unsafe USB device.
Preferably, in the utility model embodiment, protecting component can be also screen locking processing element, and wherein, screen locking processing element can be for carrying out screen locking processing to computing machine in the time of the unsafe USB device of access; Screen locking processing element also can be used for the processing of the screen of carrying out automatic locking computing machine in the time accessing unknown USB device; When screen locking processing element can also access unsafe USB device and unknown USB device at the same time for carrying out the processing of screen of automatic locking computing machine.
Preferably, in the utility model embodiment, protecting component can also be blank screen processing element, and wherein, blank screen processing element can be for carrying out blank screen processing to computing machine in the time of the unsafe USB device of access; Blank screen processing element also can be used for making computing machine to carry out automatic blank screen processing in the time accessing unknown USB device; Screen locking processing element is used for making computing machine to carry out automatic blank screen processing can also access at the same time unsafe USB device and unknown USB device time.
Further preferably, in the utility model embodiment, protecting component can comprise suspension processing element and screen locking processing element.Like this, in access when unsafe USB device, or in the time of the unknown USB device of access, or while accessing at the same time unsafe USB device and unknown USB device, protecting component can be for carrying out suspension processing to computing machine, again can be for computing machine is carried out to screen locking processing.
Fig. 4 is according to the watch-dog of the USB interface of computer of the utility model the second embodiment.This embodiment can be used as preferred implementation embodiment illustrated in fig. 1, the watch-dog of the USB interface of computer of this embodiment, except comprising the first detection part 10, the second detection part 20, decision means 30 and the protecting component 40 of the first embodiment, also comprises the first alarm 50.
Identical with the first embodiment of the effect of the first detection part 10, the second detection part 20, decision means 30 and protecting component 40, does not repeat them here.
In the time that the USB device of access is unsafe USB device, this first alarm 50 can be carried out warning for controlling computing machine.Wherein, this warning can be that computing machine is reported to the police in this locality, can be also to report to the police at server end, can also be to report to the police at local and server end simultaneously.Particularly, the first alarm 50 control computing machine carry out report to the police can comprise three kinds of modes:
Mode one, the first alarm 50 is controlled computing machine and is carried out audio alert; Mode two, the first alarms 50 are controlled computing machine and are carried out picture and text warning; Mode three, the first alarms 50 are controlled computing machine and are carried out audio alert and picture and text warning simultaneously.
Fig. 5 is according to the watch-dog of the USB interface of computer of the utility model the 3rd embodiment.This embodiment can be used as preferred implementation embodiment illustrated in fig. 4, the watch-dog of the USB interface of computer of this embodiment, except comprising the first detection part 10, the second detection part 20, decision means 30, protecting component 40 and the first alarm 50 of the first embodiment, also comprises the second alarm 60.
Identical with the second embodiment of the effect of the first detection part 10, the second detection part 20, decision means 30, protecting component 40 and the first alarm 50, does not repeat them here.
In the utility model embodiment, the second alarm 60 for carrying out and report to the police in the time detecting USB device and/or protective plug and be removed.Particularly, in the time that USB device and/or protective plug are removed, the first detection part 10 can detect that the electric current of USB interface is zero, and after the first detection part 10 can detect that the electric current of USB interface is zero, this USB device judged by the second alarm 60 and/or protective plug is removed.After judging USB device and/or protective plug and being removed, the second alarm 60 is carried out and is reported to the police for controlling computing machine.Wherein, the alarm form at this place can be identical with the alarm form in the second enforcement.
Preferably, in the utility model embodiment, this watch-dog can also comprise print member.This print member is for printing the transition information of USB interface access USB device, or for printing the transition information of removing USB device, or simultaneously for printing the transition information of USB interface access USB device and the transition information of removal USB device, wherein, this transition information is title and the time of USB interface access USB device, or for removing title and the time of USB device, or it is the USB interface access title of USB device and title and the time of time and removal USB device.
Preferably, in the utility model embodiment, if USB is unknown USB device, this watch-dog can also comprise the second decision means.This second decision means is for judging whether unknown USB device is safe USB device.After to judge unknown USB device be safe USB device, protecting component is also carried out and is removed protective treatment for controlling computing machine.
As can be seen from the above description, the utility model is by adopting detection computations machine USB interface whether to access USB device; If USB interface access USB device, judges whether USB device is safe USB device; And if USB device is unsafe USB device and/or unknown USB device, computing machine is carried out to protective treatment, has reached and thoroughly prevented information leakage effect.
Obviously, those skilled in the art should be understood that, above-mentioned of the present utility model each parts or each step can realize with general computing equipment, they can concentrate on single computing equipment, or be distributed on the network that multiple computing equipments form, alternatively, they can be realized with the executable program code of computing equipment, thereby, they can be stored in memory device and be carried out by computing equipment, or they are made into respectively to each integrated circuit components, or the multiple parts in them or step are made into single integrated circuit parts to be realized.Like this, the utility model is not restricted to any specific hardware and software combination.
The foregoing is only preferred embodiment of the present utility model, be not limited to the utility model, for a person skilled in the art, the utility model can have various modifications and variations.All within spirit of the present utility model and principle, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection domain of the present utility model.

Claims (5)

1. a watch-dog for USB interface of computer, is characterized in that, comprising:
Whether the first detection part, is arranged on computing machine, be removed for detection of the USB device of USB interface of computer;
The second detection part, is arranged on described computing machine, whether accesses USB device for detection of described USB interface of computer; And
Protective plug, is arranged in the USB interface of described computing machine,
Wherein, described protective plug comprises:
Pcb board;
USB interface, is arranged on described pcb board; And
Resistance, is arranged on described pcb board, and the first end of described resistance is connected with the power lead of described USB interface, and the second end of described resistance is connected with the ground wire of described USB interface.
2. watch-dog according to claim 1, is characterized in that, described protecting component comprises:
Suspension processing element, for carrying out suspension processing to described computing machine; And/or
Screen locking processing element, for carrying out screen locking processing to described computing machine; And/or
Blank screen processing element, for carrying out blank screen processing to described computing machine.
3. watch-dog according to claim 1, is characterized in that, also comprises:
The first alarm, in the time that described USB device is unsafe USB device, controls described computing machine and carries out warning.
4. watch-dog according to claim 1, is characterized in that, also comprises: the second alarm, and for carrying out and report to the police in the time judging described USB device and be removed.
5. watch-dog according to claim 4, is characterized in that, also comprises: print member, and for printing the transition information of described USB interface access USB device.
CN201320582832.XU 2013-09-18 2013-09-18 Monitoring equipment for computer USB interface Expired - Fee Related CN203812232U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201320582832.XU CN203812232U (en) 2013-09-18 2013-09-18 Monitoring equipment for computer USB interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201320582832.XU CN203812232U (en) 2013-09-18 2013-09-18 Monitoring equipment for computer USB interface

Publications (1)

Publication Number Publication Date
CN203812232U true CN203812232U (en) 2014-09-03

Family

ID=51450958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201320582832.XU Expired - Fee Related CN203812232U (en) 2013-09-18 2013-09-18 Monitoring equipment for computer USB interface

Country Status (1)

Country Link
CN (1) CN203812232U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461819A (en) * 2013-09-18 2015-03-25 国家电网公司 Monitoring device of computer USB interface

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104461819A (en) * 2013-09-18 2015-03-25 国家电网公司 Monitoring device of computer USB interface
CN104461819B (en) * 2013-09-18 2017-12-19 国家电网公司 The monitoring device of USB interface of computer

Similar Documents

Publication Publication Date Title
CN109688097B (en) Website protection method, website protection device, website protection equipment and storage medium
US11750623B2 (en) System and method for conducting a detailed computerized surveillance in a computerized environment
WO2019080429A1 (en) Electronic apparatus, access request control method, and computer readable storage medium
CN109743315A (en) For Activity recognition method, apparatus, equipment and the readable storage medium storing program for executing of website
CN104392175A (en) System and method and device for processing cloud application attack behaviors in cloud computing system
CN107580005A (en) Website protection method, device, website safeguard and readable storage medium storing program for executing
EP2808822A1 (en) Prevention of windowless screen capture
CN104462940A (en) Monitoring method and device for computer USB interface
CN103914342A (en) Electronic equipment process control method, system and electronic equipment
WO2014015753A1 (en) Method and apparatus for intercepting or cleaning-up plugins
CN111125688B (en) Process control method and device, electronic equipment and storage medium
CN105426544B (en) Method and device for monitoring database state
CN106682504B (en) A kind of method, apparatus for preventing file from maliciously being edited and electronic equipment
CN203812232U (en) Monitoring equipment for computer USB interface
CN108304222A (en) Apparatus management/control system and method
CN105184149B (en) A kind of method and system for preventing rogue program from frequently obtaining customer position information
TW201822054A (en) Network attack pattern determination apparatus, determination method, and computer program product thereof
CN106126011A (en) The resource occupation method for information display of a kind of application program and mobile terminal
CN104424403A (en) Information processing method and electronic device
CN106302519A (en) The method of a kind of internet security management and terminal
CN106203119B (en) Hide processing method, device and the electronic equipment of cursor
CN116244677A (en) Method and device for detecting right-raising, electronic equipment and storage medium
CN110874474A (en) Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium
CN104461819A (en) Monitoring device of computer USB interface
CN105740666A (en) Method and device for identifying on-line operational risk

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140903

Termination date: 20180918