WO2013159491A1 - 一种用于u盘隐私保护的软件工具实现方法 - Google Patents

一种用于u盘隐私保护的软件工具实现方法 Download PDF

Info

Publication number
WO2013159491A1
WO2013159491A1 PCT/CN2012/082438 CN2012082438W WO2013159491A1 WO 2013159491 A1 WO2013159491 A1 WO 2013159491A1 CN 2012082438 W CN2012082438 W CN 2012082438W WO 2013159491 A1 WO2013159491 A1 WO 2013159491A1
Authority
WO
WIPO (PCT)
Prior art keywords
hardware device
disk
interrupt
program
software tool
Prior art date
Application number
PCT/CN2012/082438
Other languages
English (en)
French (fr)
Inventor
曾元清
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Publication of WO2013159491A1 publication Critical patent/WO2013159491A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Definitions

  • the present invention relates to U disk privacy protection, and in particular to a software tool implementation method for U disk privacy protection.
  • U disk full name 'USB flash drive', English name 'USB flash Disk'. It is a USB interface with a micro-high-capacity mobile storage product that does not require a physical drive. It can be connected to a computer via a USB interface for plug and play.
  • USB flash drives provide data encryption. This is usually done using full disk encryption at the lower level of the file system.
  • the advantage of encryption is to prevent unauthorized people from accessing data on the USB flash drive.
  • the disadvantage is that there is no uniform standard. This USB flash drive can only be used on a small number of computers with compatible encryption software.
  • the object of the present invention is to overcome the deficiencies of the prior art and to provide a
  • the software tool for U disk privacy protection implements the partition protection of the U disk, so that other users can only see the content of the first partition, and better protect the privacy of the user.
  • a software tool implementation method for U disk privacy protection the software tool is installed on a computer, and the steps of the implementation method are as follows:
  • Step 1 the program starts, detecting that there is an attached hardware device connection on the computer USB interface
  • Step 2 The USB storage driver runs.
  • the function prepares to run the attached hardware device. At this time, the operating system underlying interrupt is intercepted. Run and perform interrupt handlers;
  • Step 3 Obtain a program running space of the interrupt processing program
  • Step 4 Insert an intercept function to obtain information about the attached hardware device
  • Step 5 according to the auxiliary hardware device information obtained by the interrupt, determine whether it is a memory, if yes, go to step 6, otherwise go to step 8;
  • Step 6 Modify the attributes of the memory, and the operating system identifies the memory as a hard disk
  • Step 7 Partition the U disk recognized as a hard disk.
  • the first partition is a normal partition, and all the people are visible.
  • the other partitions are matched with the privacy partition software, and are opened when the computer installs the privacy partition software.
  • the running function described in step 2 is an IoCreateDevice function for creating An attached hardware device object
  • the interrupt is an external interrupt.
  • step 2 the process of intercepting the operating system underlying interrupted auxiliary hardware device and performing the interrupt processing procedure as described in step 2 is:
  • Step 2.1 Save external interrupts and exception information
  • Step 2.2 Remove system protection before intercepting the interruption
  • Step 2.3 interception interruption
  • Step 2.4 Restore system protection.
  • the abnormal information described in step 2.1 is that abnormal information indicating that the attached hardware device is connected to the USB interface of the computer is detected.
  • the program running space for acquiring the interrupt processing program in step 3 includes acquiring a running entry address of the external interrupt program.
  • the insertion interception function described in step 4 is attached to the hardware device.
  • the information is obtained by adding an operation program to the external interrupt program running entry address, jumping to the interception program, acquiring the attached hardware device information through the intercept function, and ending the interruption and transmitting the attached hardware device information after saving.
  • the process of modifying the attributes of the memory in step 6 is: when the attached hardware device is a memory, the program forcibly attributes the memory.
  • RemovableMedia is modified to FALSE and the operating system recognizes the memory as a hard disk.
  • the operating system includes a Windows operating system.
  • the beneficial effects of the present invention are: After installing the U disk privacy protection software tool, the Windows operating system recognizes the U disk as a physical hard disk and partitions and manages it with the disk management tool provided by Windows; and can be viewed on a computer with this privacy partition software tool installed. Go to all the partitions of the U disk, otherwise you can only see the first partition. The user manages the privacy content in the second and later drive letters, thus realizing the function of managing and protecting privacy.
  • Figure 1 is a flow chart of the program of the present invention.
  • the main purpose of the present invention is to utilize the features of the existing Windows operating system, and the Windows operating system can only recognize the first partition of the pluggable U disk storage.
  • the invention realizes partitioning of a pluggable U disk, Let the Windows operating system recognize the pluggable USB flash drive as a physical hard disk, so that more partitions can be created, and these privacy partitions are invisible on a general-purpose computer without software installed to achieve privacy management and protection.
  • the specific implementation is to write a USB driver, this driver realizes the right time, before inserting the USB flash drive, the driver is creating the object, intercepts the interrupt, and enters the interrupted program space and process, modified Hardware information, set the RemovableMedia value of the U disk to FALSE, and the Windows operating system mistakes it for the physical hard disk to achieve the purpose of partitioning.
  • FIG. 1 A software tool implementation method for U disk privacy protection, the software tool is installed on a computer, and the steps of the implementation method are as follows:
  • Step 1 the program starts, detecting that there is an attached hardware device connection on the computer USB interface
  • Step 2 The USB storage driver runs.
  • the function prepares to run the attached hardware device. At this time, the operating system underlying interrupt is intercepted. Run and perform interrupt handlers;
  • Step 3 Obtain a program running space of the interrupt processing program
  • Step 4 Insert an intercept function to obtain information about the attached hardware device
  • Step 5 according to the auxiliary hardware device information obtained by the interrupt, determine whether it is a memory, if yes, go to step 6, otherwise go to step 8;
  • Step 6 Modify the attributes of the memory, and the operating system identifies the memory as a hard disk
  • Step 7 Partition the U disk recognized as a hard disk.
  • the first partition is a normal partition, and all the people are visible.
  • the other partitions are matched with the privacy partition software, and are opened when the computer installs the privacy partition software.
  • the running function described in step 2 is an IoCreateDevice function for creating An attached hardware device object
  • the interrupt is an external interrupt.
  • step 2 the process of intercepting the operating system underlying interrupted auxiliary hardware device and performing the interrupt processing procedure as described in step 2 is:
  • Step 2.1 Save external interrupts and exception information
  • Step 2.2 Remove system protection before intercepting the interruption
  • Step 2.3 interception interruption
  • Step 2.4 Restore system protection.
  • the abnormal information described in step 2.1 is that abnormal information indicating that the attached hardware device is connected to the USB interface of the computer is detected.
  • the program running space for acquiring the interrupt processing program in step 3 includes acquiring a running entry address of the external interrupt program.
  • the insertion interception function described in step 4 is attached to the hardware device.
  • the information is obtained by adding an operation program to the external interrupt program running entry address, jumping to the interception program, acquiring the attached hardware device information through the intercept function, and ending the interruption and transmitting the attached hardware device information after saving.
  • the process of modifying the attributes of the memory in step 6 is: when the attached hardware device is a memory, the program forcibly attributes the memory.
  • RemovableMedia is modified to FALSE and the operating system recognizes the memory as a hard disk.
  • the operating system includes a Windows operating system.
  • the file system of windows is different from other systems. For example, with linux, all other information is not visible in other systems. Of course, there are some technical ways, such as samba service, which can realize mutual access between Linux and Windows through the protocol. However, the privacy protection described in this patent will not be destroyed, because it is still accessed according to the normal windows rules, that is, the U disk or the U disk, and will not be recognized as a hard disk.
  • the invention inserts a USB flash drive, the interrupt is intercepted before the moment the driver is creating the object, and enters the program space and process of the interrupt processing, modifies the hardware information, sets the RemovableMedia value of the USB flash drive to FALSE, and the Windows operating system will It mistakes the physical hard disk to achieve the purpose of partitioning.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种用于U盘隐私保护的软件工具实现方法,步骤如下: 1 、程序开始,检测到电脑USB接口存在附属硬件设备连接;2、 USB 存储驱动运行函数准备运行附属硬件设备,此时截获操作系统底层中断附属硬件设备的运行,并进行中断处理程序; 3 、获取中断处理程序的程序运行空间;4、插入拦截函数对附属硬件设备信息进行获取;5、根据中断获得的附属硬件设备信息,判断是否为存储器,是则执行步骤6,否则执行步骤8;6、将存储器的属性进行修改,操作系统将存储器识别为硬盘;7、对识别为硬盘的U盘进行分区,第一个分区为普通分区,全部人可见,其他分区与隐私分区软件相匹配,在电脑安装隐私分区软件时打开;8、结束程序。

Description

一种用于U盘隐私保护的软件工具实现方法
技术领域
本发明涉及U盘隐私保护,特别是涉及一种用于U盘隐私保护的软件工具实现方法。
背景技术
U 盘,全称'USB闪存盘',英文名'USB flash disk'。它是一个USB接口的无需物理驱动器的微型高容量移动存储产品,可以通过USB接口与电脑连接,实现即插即用。
在目前Flash存储器普遍使用的情况下,隐私保护也成了最让人担心的地方,如此小巧的一个U盘,丢失了,则用户的隐私安全得不到保证。
一些U盘提供数据加密的功能。通常在文件系统的下层使用全磁盘加密来达到。加密功能优点是用来防止未经授权的人访问U盘上的数据;缺点则是因为没有统一的标准,此U盘只能在少部分安装有兼容加密软件的电脑上使用。
发明内容
本发明的目的在于克服现有技术的不足,提供一种 用于U盘隐私保护的软件工具实现方法,对U盘进行分区保护,使其他使用者只能看到第一个分区的内容,更好的保护到用户的隐私 。
为了达到上述目的,本发明采用的技术方案是,一种 用于U盘隐私保护的软件工具实现方法,所述的软件工具安装在电脑端,所述的实现方法步骤如下:
步骤1、程序开始,检测到电脑USB接口存在附属硬件设备连接;
步骤2、 USB 存储驱动运行 函数准备运行附属硬件设备,此时截获 操作系统底层中断 附属硬件设备 的运行,并进行中断处理程序;
步骤3、获取中断处理程序的程序运行空间;
步骤4、插入拦截函数对 附属硬件设备 信息进行获取;
步骤5、根据中断获得的 附属硬件设备 信息,判断是否为存储器,是则执行步骤6,否则执行步骤8;
步骤6、将存储器的属性进行 修改,操作系统将存储器识别为硬盘;
步骤7、对识别为硬盘的U盘进行分区,第一个分区为普通分区,全部人可见,其他分区与隐私分区软件相匹配,在电脑安装隐私分区软件时打开;
步骤8、结束程序。
进一步的,步骤2所述的运行函数为 IoCreateDevice 函数,用于创建 附属硬件设备对象,所述的中断为外部中断。
进一步的,步骤2所述的 截获 操作系统底层中断 附属硬件设备 的运行,并进行中断处理程序的过程为:
步骤2.1、保存外部中断和异常信息;
步骤2.2、在截获中断前去除系统保护;
步骤2.3、截获中断;
步骤2.4、恢复系统保护。
进一步的,步骤2.1所述的异常信息为检测到 电脑USB接口存在附属硬件设备连接的异常信息。
进一步的, 步骤3所述的获取中断处理程序的程序运行空间包括获取外部中断程序的运行入口地址。
进一步的, 步骤4所述的插入拦截函数对 附属硬件设备 信息进行获取为在外部中断程序运行入口地址添加操作程序,跳转到拦截程序,通过拦截函数对附属硬件设备信息进行获取,保存后结束中断并传递附属硬件设备信息。
进一步的, 步骤6所述将存储器的属性进行 修改的过程为:当附属硬件设备为存储器时,程序强行将 存储器的属性 RemovableMedia 修改为FALSE,操作系统将存储器识别为硬盘。
进一步的,所述的操作系统包括Windows操作系统。
与现有技术相比,本发明的有益效果是: 安装此U盘隐私保护软件工具后,Windows操作系统把U盘识别为物理硬盘,用windows自带的磁盘管理工具来分区和管理了;并且在安装了此隐私分区软件工具的电脑上,才能看到U盘的所有分区,否则只能看到第一个分区,用户将隐私内容放在第二及以后的盘符内管理,从而地实现了管理和保护隐私的功能。
附图说明
图1为本发明的程序流程图。
具体实施方式
本发明的主旨在于利用现有Windows操作系统的特点,Windows操作系统只能够识别可插拔的U盘存储器的第一个分区。本发明实现对可插拔的U盘分区, 让Windows操作系统将可插拔U盘识别为物理硬盘,从而能够创建更多的分区,而这些隐私分区在未安装软件的通用电脑上是不可见的,来达到隐私管理和保护的目的。
具体实现是写了一个USB的驱动,此驱动实现了在恰当的时机,在插入U盘,驱动程序正在创建对象的时刻前,截获了中断,并且进入了中断处理的程序空间和进程,修改了硬件信息,将U盘的RemovableMedia值设置为FALSE,Windows操作系统将其误认为物理硬盘,从而达到分区的目的。
在如今U盘使用频繁的情况下,保护和管理U盘的隐私是非常有必要的,安装此U盘隐私保护软件工具后,Windows操作系统将会把U盘识别为物理硬盘,这样就可以用windows自带的磁盘管理工具来分区和管理了;并且在安装了此隐私分区软件工具的电脑上,才能看到U盘的所有分区,否则只能看到第一个分区,我们将隐私内容放在第二及以后的盘符内管理,从而地实现了管理和保护隐私的功能。
下面结合实施例参照附图进行详细说明,以便对本发明的技术特征及优点进行更深入的诠释。
本发明的程序流程图如图1所示,一种 用于U盘隐私保护的软件工具实现方法,所述的软件工具安装在电脑端,所述的实现方法步骤如下:
步骤1、程序开始,检测到电脑USB接口存在附属硬件设备连接;
步骤2、 USB 存储驱动运行 函数准备运行附属硬件设备,此时截获 操作系统底层中断 附属硬件设备 的运行,并进行中断处理程序;
步骤3、获取中断处理程序的程序运行空间;
步骤4、插入拦截函数对 附属硬件设备 信息进行获取;
步骤5、根据中断获得的 附属硬件设备 信息,判断是否为存储器,是则执行步骤6,否则执行步骤8;
步骤6、将存储器的属性进行 修改,操作系统将存储器识别为硬盘;
步骤7、对识别为硬盘的U盘进行分区,第一个分区为普通分区,全部人可见,其他分区与隐私分区软件相匹配,在电脑安装隐私分区软件时打开;
步骤8、结束程序。
进一步的,步骤2所述的运行函数为 IoCreateDevice 函数,用于创建 附属硬件设备对象,所述的中断为外部中断。
进一步的,步骤2所述的 截获 操作系统底层中断 附属硬件设备 的运行,并进行中断处理程序的过程为:
步骤2.1、保存外部中断和异常信息;
步骤2.2、在截获中断前去除系统保护;
步骤2.3、截获中断;
步骤2.4、恢复系统保护。
进一步的,步骤2.1所述的异常信息为检测到 电脑USB接口存在附属硬件设备连接的异常信息。
进一步的, 步骤3所述的获取中断处理程序的程序运行空间包括获取外部中断程序的运行入口地址。
进一步的, 步骤4所述的插入拦截函数对 附属硬件设备 信息进行获取为在外部中断程序运行入口地址添加操作程序,跳转到拦截程序,通过拦截函数对附属硬件设备信息进行获取,保存后结束中断并传递附属硬件设备信息。
进一步的, 步骤6所述将存储器的属性进行 修改的过程为:当附属硬件设备为存储器时,程序强行将 存储器的属性 RemovableMedia 修改为FALSE,操作系统将存储器识别为硬盘。
进一步的,所述的操作系统包括Windows操作系统。windows的文件系统和其他系统不一样,比如和linux的,挂在其他系统是所有的信息都看不到。当然目前有一些技术途径,比如samba服务,通过协议可以实现linux和windows互访。但依然不会破坏本专利中所描述的隐私保护,因为它还是按照正常的windows规则来访问的,即U盘还是U盘,不会识别为硬盘。
本发明在插入U盘,驱动程序正在创建对象的时刻前,截获了中断,并且进入了中断处理的程序空间和进程,修改了硬件信息,将U盘的RemovableMedia值设置为FALSE,Windows操作系统将其误认为物理硬盘,从而达到分区的目的。
上述实施例中提到的内容并非是对本发明的限定,在不脱离本发明的发明构思的前提下,任何显而易见的替换均在本发明的保护范围之内。

Claims (8)

  1. 一种 用于U盘隐私保护的软件工具实现方法,所述的软件工具安装在电脑端,其特征在于,所述的实现方法步骤如下:
    步骤1、程序开始,检测到电脑USB接口存在附属硬件设备连接;
    步骤2、 USB 存储驱动运行 函数准备运行附属硬件设备,此时截获 操作系统底层中断 附属硬件设备 的运行,并进行中断处理程序;
    步骤3、获取中断处理程序的程序运行空间;
    步骤4、插入拦截函数对 附属硬件设备 信息进行获取;
    步骤5、根据中断获得的 附属硬件设备 信息,判断是否为存储器,是则执行步骤6,否则执行步骤8;
    步骤6、将存储器的属性进行 修改,操作系统将存储器识别为硬盘;
    步骤7、对识别为硬盘的U盘进行分区,第一个分区为普通分区,全部人可见,其他分区与隐私分区软件相匹配,在电脑安装隐私分区软件时打开;
    步骤8、结束程序。
  2. 根据权利要求1所述的用于U盘隐私保护的软件工具实现方法,其特征在于:步骤2所述的运行函数为 IoCreateDevice 函数,用于创建 附属硬件设备对象,所述的中断为外部中断。
  3. 根据权利要求2所述的用于U盘隐私保护的软件工具实现方法,其特征在于,步骤2所述的 截获 操作系统底层中断 附属硬件设备 的运行,并进行中断处理程序的过程为:
    步骤2.1、保存外部中断和异常信息;
    步骤2.2、在截获中断前去除系统保护;
    步骤2.3、截获中断;
    步骤2.4、恢复系统保护。
  4. 根据权利要求3所述的用于U盘隐私保护的软件工具实现方法,其特征在于:步骤2.1所述的异常信息为检测到 电脑USB接口存在附属硬件设备连接的异常信息。
  5. 根据权利要求4所述的用于U盘隐私保护的软件工具实现方法,其特征在于: 步骤3所述的获取中断处理程序的程序运行空间包括获取外部中断程序的运行入口地址。
  6. 根据权利要求5所述的用于U盘隐私保护的软件工具实现方法,其特征在于: 步骤4所述的插入拦截函数对 附属硬件设备 信息进行获取为在外部中断程序运行入口地址添加操作程序,跳转到拦截程序,通过拦截函数对附属硬件设备信息进行获取,保存后结束中断并传递附属硬件设备信息。
  7. 根据权利要求6所述的用于U盘隐私保护的软件工具实现方法,其特征在于: 步骤6所述将存储器的属性进行 修改的过程为:当附属硬件设备为存储器时,程序强行将 存储器的属性 RemovableMedia 修改为FALSE,操作系统将存储器识别为硬盘。
  8. 根据权利要求1~7中任一项所述的用于U盘隐私保护的软件工具实现方法,其特征在于:所述的操作系统包括Windows操作系统。
PCT/CN2012/082438 2012-04-26 2012-09-29 一种用于u盘隐私保护的软件工具实现方法 WO2013159491A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210125691.9 2012-04-26
CN2012101256919A CN102708068A (zh) 2012-04-26 2012-04-26 一种用于u盘隐私保护的软件工具实现方法

Publications (1)

Publication Number Publication Date
WO2013159491A1 true WO2013159491A1 (zh) 2013-10-31

Family

ID=46900868

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/082438 WO2013159491A1 (zh) 2012-04-26 2012-09-29 一种用于u盘隐私保护的软件工具实现方法

Country Status (2)

Country Link
CN (1) CN102708068A (zh)
WO (1) WO2013159491A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110413196A (zh) * 2018-04-27 2019-11-05 北京京东尚科信息技术有限公司 外接存储设备的盘符分配方法、系统、电子设备和介质
CN111722879A (zh) * 2020-06-19 2020-09-29 浪潮电子信息产业股份有限公司 U盘识别方法、Linux系统、设备及可读存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255262A (zh) * 2018-09-03 2019-01-22 湖南国科微电子股份有限公司 数据保护方法及固态硬盘

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201160005Y (zh) * 2008-03-12 2008-12-03 高志敏 加密u盘
CN101826057A (zh) * 2009-03-02 2010-09-08 德晶电子股份有限公司 闪存的隐藏存储区段设置方法
CN101893999A (zh) * 2010-06-08 2010-11-24 孟智平 一种将存储设备虚拟划分为多个设备的系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201160005Y (zh) * 2008-03-12 2008-12-03 高志敏 加密u盘
CN101826057A (zh) * 2009-03-02 2010-09-08 德晶电子股份有限公司 闪存的隐藏存储区段设置方法
CN101893999A (zh) * 2010-06-08 2010-11-24 孟智平 一种将存储设备虚拟划分为多个设备的系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ANTON BASSOV: "Hooking the kernel directly", 4 April 2006 (2006-04-04), Retrieved from the Internet <URL:www.codeproject.com/articles/3672/booking-the-kernel-directly> [retrieved on 20130123] *
LIU, ZHIQIANG: "Thinking about safely using computer flash disk", JOURNAL OF SHANDONG TV UNIVERSITY, 10 May 2006 (2006-05-10), pages 22 - 23 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110413196A (zh) * 2018-04-27 2019-11-05 北京京东尚科信息技术有限公司 外接存储设备的盘符分配方法、系统、电子设备和介质
CN111722879A (zh) * 2020-06-19 2020-09-29 浪潮电子信息产业股份有限公司 U盘识别方法、Linux系统、设备及可读存储介质

Also Published As

Publication number Publication date
CN102708068A (zh) 2012-10-03

Similar Documents

Publication Publication Date Title
US10515040B2 (en) Data bus host and controller switch
CN104321781B (zh) 用于安全地处理与物理功能驱动器的虚拟功能驱动器通信的方法、系统和装置
CN111742315B (zh) 安全红-黑气隙便携式计算机
WO2017213473A1 (en) Method for managing files and apparatus using the same
JP2014509421A5 (zh)
WO2012033237A1 (ko) 시스템 테스트 방법
EP3436947B1 (en) Secure driver platform
WO2014027859A1 (en) Device and method for processing transaction request in processing environment of trust zone
WO2018056601A1 (ko) 콘텐츠 파일 접근 제어를 이용한 랜섬웨어 차단 장치 및 차단 방법
WO2013159491A1 (zh) 一种用于u盘隐私保护的软件工具实现方法
WO2016195343A1 (ko) 가상화 시스템에서 파일 입출력 제어를 위한 방법
CN103984591A (zh) 计算机虚拟化系统的PCI设备INTx中断投递方法
WO2021080123A1 (ko) 전자 장치 및 이의 제어 방법
WO2019039730A1 (ko) 랜섬웨어 방지 장치 및 방법
WO2021033868A1 (ko) 가변 컴퓨터 파일시스템이 적용된 데이터 저장장치
WO2014077614A1 (en) Anti-malware system, method of processing data in the same, and computing device
WO2016190485A1 (ko) 데이터 무단 엑세스 차단 방법 및 그 기능이 구비된 컴퓨팅 장치
WO2014084603A1 (ko) 어플리케이션 삭제에 연동한 se 애플릿 관리 방법 및 이를 적용한 모바일 기기와 서비스 관리 서버
CN104991774B (zh) 一种uefi平台下截获系统引导的系统和方法
CN203720844U (zh) 基于usb接口的安全设备
WO2018076539A1 (zh) 伪无线接入点识别方法及系统
WO2013100415A1 (ko) 분산 데이터 품질 관리 시스템 및 그 방법
WO2014030978A1 (ko) 이동식 저장매체 보안시스템 및 그 방법
WO2024106794A1 (ko) 리눅스 기반 운영체제에서의 데이터 보호방법 및 장치
CN102421004B (zh) 电视机软件系统的调试方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12875644

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12875644

Country of ref document: EP

Kind code of ref document: A1