CN101051293A - Access control method for personal computer storage space - Google Patents
Access control method for personal computer storage space Download PDFInfo
- Publication number
- CN101051293A CN101051293A CNA2007100279734A CN200710027973A CN101051293A CN 101051293 A CN101051293 A CN 101051293A CN A2007100279734 A CNA2007100279734 A CN A2007100279734A CN 200710027973 A CN200710027973 A CN 200710027973A CN 101051293 A CN101051293 A CN 101051293A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- space
- storer
- secret
- storage space
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003860 storage Methods 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 title claims abstract description 15
- 238000006386 neutralization reaction Methods 0.000 claims description 4
- 230000008676 import Effects 0.000 claims description 2
- 238000012795 verification Methods 0.000 abstract description 6
- 238000010200 validation analysis Methods 0.000 description 4
- 238000012550 audit Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
A method for controlling access to storage space of personal computer includes making a section of storage be secret space being set to be state of refusing access, setting fit verification code separately in said storage and an external device with assigned port, checking verification code in storage with that of external device when external device is switched in with said assigned port and if external device is set with verification code then setting said secret space to be state of allowing access if verification codes are fitted to each other.
Description
Technical field
The present invention relates to access control method, forbid having no right the user and steal the purpose of private data to reach to the PC storage space.
Background technology
Generally speaking, the storer of a PC (personal computer) allows to be visited by Any user, if but the data storage that needs to maintain secrecy is arranged in the storer of PC, then each is attempted to visit the request of private data, all should carry out strict authority audit, to can't being refused, to guarantee that private data is not revealed by the request of access of authentication.Secrecy provision commonly used at present is that when the user sent request of access, system ejected the identifying code input frame, the input media that the user carries by PC (for example keyboard) input validation sign indicating number, this identifying code is checked by system, has only identifying code to coincide, and just allows private data accessed.The defective of this secrecy provision is that its identifying code is used the method for exhaustion easily and attempts one by one and cracked, have multiple special decryption software now on the internet at this time slot scrambling, during running software, automatically attempt identifying code according to the order of setting, coincide the visit that just is opened of the space of storage security data until identifying code.As seen, the secrecy provision that this time slot scrambling provided performs practically no function in face of decryption software, and identifying code just is cracked easily.
Summary of the invention
The objective of the invention is under the prerequisite of the normal use of unclassified data in not influencing the PC storer, solution is used for the technical matters of the identifying code easy crack of private data access authority verification, thereby the storage space of one section safety is provided for private data.
Be head it off, the present invention provides the access control method to the PC storage space, the storage space of described PC originally is in the state accessed by the user that allows, the step of this method comprises: mark off one section as secret space in storer, accessed state is arranged to refuse in secret space; The identifying code that setting matches is stored in one of described storer neutralization respectively and can inserts in the external unit of this machine of PC designated port; When external unit inserts the designated port of this machine of PC, if this external unit has identifying code, just check neutralize identifying code in this external unit of storer, have only identifying code to coincide, just accessed state is arranged to allow in secret space.
The input media input validation sign indicating number that secrecy provision in the background technology allows the user directly to carry by computing machine; The present invention then is set in identifying code to be verified in the described external unit, the user can only allow PC read identifying code in the external unit by the mode that this external unit is inserted this machine of PC designated port, this just makes that the people who does not hold this external unit can't the input validation sign indicating number, also just can't visit secret space, solve the technical matters of identifying code easy crack.Because the present invention only marks off one section as secret space in storer, other storage space that the user who does not hold this external unit is not still normally marked in the reference-to storage is operated unclassified data.
Description of drawings
Accompanying drawing is the state data memory synoptic diagram of the storage space of the storage space of PC and the external unit that can insert this machine of PC designated port.
Embodiment
The storage space of PC originally is in and allows state accessed by the user, now marks off one section as secret space, as shown in drawings, accessed state is arranged to refuse in secret space.The identifying code that setting matches is stored in one of described storer neutralization respectively and can inserts in the external unit of this machine of PC designated port, and the memory device with the band USB port is an example here.Other sets second section identifying code and is stored in the storer.Two sections identifying codes in the storer for example are used technology secrecy storages such as 3DES, in order to avoid stolen.The operation of divide secret space, setting identifying code both can be finished at this machine, also can finish at control center's host computer that network with it links to each other.
When the memory device of band USB port inserts, if this external unit has identifying code, just check the identifying code in the memory device of storer neutral zone USB port, if this identifying code coincide, show in addition that then an identifying code input frame allows the user by second section identifying code of keyboard input, receive second section identifying code that the user imports in second section identifying code and the storer then and check,, just accessed state is arranged to allow in secret space if second section identifying code also coincide.The user just can write, read private data in secret space after verifying by this.Here adopt memory device and artificial twice verification step of input validation sign indicating number of band USB port, the disabled user still can't be by checking after only stealing the memory device of this band USB port or only learning password, and secret double shield that provides of data just is provided for this.Each time operations such as checking, the secret space of visit also can be mail to the control center's host computer that links to each other with native network, and control center can monitor, control the action of this machine.
After secret space is configured to allow accessed state, if testing the connection of the memory device of this band USB port, PC is disconnected, just again secret space is arranged to refuse accessed state, in order to avoid the secret space of late comer's unauthorized access.
Step of the present invention also can comprise: when secret space is in the accessed state of refusal, hide secret space, only be in when allowing accessed state when secret space, just allow to show the drive in secret space, supply the user to click and visit secret space.Non-concerning security matters personnel and do not know that it is provided with secret space when using this machine, this has just increased the disguise of private data.
Claims (7)
1. to the access control method of PC storage space, the storage space of described PC originally is in the state accessed by the user that allows, the step of this method comprises: mark off one section as secret space in storer, accessed state is arranged to refuse in secret space; The identifying code that setting matches is stored in one of described storer neutralization respectively and can inserts in the external unit of this machine of PC designated port; When external unit inserts the designated port of this machine of PC, if this external unit has identifying code, just check neutralize identifying code in this external unit of storer, have only identifying code to coincide, just accessed state is arranged to allow in secret space.
2. according to the access control method to the PC storage space of claim 1, use at least two sections identifying codes, the identifying code that matches of described " being set in one of described storer neutralization respectively can insert in the external unit of this machine of PC designated port " is first section in two sections identifying codes, and second section identifying code only is set in the storer; When the check verify sign indicating number, except checking neutralize first section identifying code in this external unit of storer, also must receive second section identifying code that the user imports in second section identifying code and the storer and check, have only two sections identifying codes all to coincide, just accessed state is arranged to allow in secret space.
3. according to the access control method to the PC storage space of claim 1 or 2, after secret space is configured to allow accessed state,, just again accessed state is arranged to refuse in secret space if be disconnected with being connected of this external unit.
4. according to the PC of claim 3 access control method, when secret space is in the accessed state of refusal, hide secret space to storage space.
5. according to the PC of claim 1 or 2 access control method, when secret space is in the accessed state of refusal, hide secret space to storage space.
6. according to the access control method to the PC storage space of claim 1 or 2, the described encrypted storage of identifying code that is set in the storer.
7. according to the access control method to the PC storage space of claim 1 or 2, described designated port is a USB port.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA2007100279734A CN101051293A (en) | 2007-05-11 | 2007-05-11 | Access control method for personal computer storage space |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA2007100279734A CN101051293A (en) | 2007-05-11 | 2007-05-11 | Access control method for personal computer storage space |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN101051293A true CN101051293A (en) | 2007-10-10 |
Family
ID=38782714
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2007100279734A Pending CN101051293A (en) | 2007-05-11 | 2007-05-11 | Access control method for personal computer storage space |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN101051293A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101072206B (en) * | 2007-06-14 | 2011-04-13 | 腾讯科技(深圳)有限公司 | Secondary authenticating method and system for instant messaging system |
| CN104488220A (en) * | 2012-05-08 | 2015-04-01 | 塞若纳提克有限公司 | Method and system for authentication of communication and operation |
| CN105824765A (en) * | 2015-01-27 | 2016-08-03 | 艾欧互联有限公司 | Method for Generating a Cursor on an External Monitor Connected to a Handheld Computer |
| CN106960159A (en) * | 2017-05-09 | 2017-07-18 | 深圳市夏日晨光数码有限公司 | Burst disk and safe encryption method with safe encryption function |
-
2007
- 2007-05-11 CN CNA2007100279734A patent/CN101051293A/en active Pending
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101072206B (en) * | 2007-06-14 | 2011-04-13 | 腾讯科技(深圳)有限公司 | Secondary authenticating method and system for instant messaging system |
| US8484748B2 (en) | 2007-06-14 | 2013-07-09 | Tencent Tecnology (Shenzhen) Company Limited | Method and device for classifying and processing data in instant messaging system |
| CN104488220A (en) * | 2012-05-08 | 2015-04-01 | 塞若纳提克有限公司 | Method and system for authentication of communication and operation |
| CN105824765A (en) * | 2015-01-27 | 2016-08-03 | 艾欧互联有限公司 | Method for Generating a Cursor on an External Monitor Connected to a Handheld Computer |
| CN106960159A (en) * | 2017-05-09 | 2017-07-18 | 深圳市夏日晨光数码有限公司 | Burst disk and safe encryption method with safe encryption function |
| WO2018205723A1 (en) * | 2017-05-09 | 2018-11-15 | 深圳市夏日晨光数码有限公司 | Secure disk with secure encryption function, and secure encryption method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6463537B1 (en) | Modified computer motherboard security and identification system | |
| US10146706B2 (en) | Data security system | |
| CN101373437B (en) | Accessing safety memory by embedded controller to increase system safety | |
| CN102521165B (en) | Safe USB disk and its recognition methods and device | |
| JP2837813B2 (en) | Method for controlling access to information, interface device, and personal identification and information storage element | |
| CN107563213B (en) | Safety secrecy control device for preventing data extraction of storage equipment | |
| US9117096B2 (en) | Protection of safety token against malware | |
| CN105243314B (en) | A kind of security system and its application method based on USB key | |
| CN103065102A (en) | Data encryption mobile storage management method based on virtual disk | |
| CN103886234A (en) | Safety computer based on encrypted hard disk and data safety control method of safety computer | |
| CN112083879B (en) | Physical partition isolation and hiding method for storage space of solid state disk | |
| WO2010030157A1 (en) | A method of authentication of computer id for portable data storage devices | |
| CN105871558A (en) | Numerical control system authority management method based on USB flash disk physical serial number | |
| CN105005721A (en) | Computer authorization starting control system and method based on computer starting key | |
| CN102346716B (en) | Encryption method and decryption method of hard disk storage device and encryption and decryption system used for hard disk storage device | |
| CN1331015C (en) | Computer security startup method | |
| CN101051293A (en) | Access control method for personal computer storage space | |
| CN103473512A (en) | Mobile storage medium management method and mobile storage medium management device | |
| CN104361298B (en) | The method and apparatus of Information Security | |
| CN103870769B (en) | Method and system for protecting magnetic disk | |
| CN201845340U (en) | Safety computer provided with user safety subsystem | |
| CN105007267A (en) | Privacy protection method and device | |
| CN103049683B (en) | A kind of BMS host computer procedure mandate time slot scrambling | |
| KR100847659B1 (en) | Method and device for data leakage prevention using ID verification method of key lock board and security USB memory | |
| JP2007148762A (en) | External storage device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C12 | Rejection of a patent application after its publication | ||
| RJ01 | Rejection of invention patent application after publication |