CN118709240B - Storage device access system, method, device and medium for stealth demonstration - Google Patents
Storage device access system, method, device and medium for stealth demonstration Download PDFInfo
- Publication number
- CN118709240B CN118709240B CN202411179858.9A CN202411179858A CN118709240B CN 118709240 B CN118709240 B CN 118709240B CN 202411179858 A CN202411179858 A CN 202411179858A CN 118709240 B CN118709240 B CN 118709240B
- Authority
- CN
- China
- Prior art keywords
- secret
- demonstration
- instruction
- stealing
- protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4494—Execution paradigms, e.g. implementations of programming paradigms data driven
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a storage device access system, a method, equipment and a medium for secret-stealing demonstration, which mainly relate to the technical field of secret-stealing performance and are used for solving the problem that the existing secret-stealing demonstration equipment cannot carry out secret-stealing demonstration on a computer end only supporting special U disk access. The password stealing demonstration device comprises a security chip and a storage chip, wherein the security chip is internally provided with an instruction transmission module supporting first protocol transmission and an instruction analysis module for carrying out preset first protocol instruction analysis, password stealing demonstration software reads a computer-side file, adds the computer-side file to a first protocol data writing instruction after the computer-side file is selected, sends the first protocol data writing instruction to the password stealing demonstration device and then writes the first protocol data writing instruction into the storage chip, and is also used for sending a first protocol data reading instruction to the password stealing demonstration device, reading corresponding data in the storage chip and then transmitting the data to the computer-side.
Description
Technical Field
The present application relates to the field of storage device access technologies, and in particular, to a storage device access system, method, device, and medium for secret-stealing demonstration.
Background
At present, international competition is strong, confidentiality situation is more and more severe, confidentiality consciousness work of public and public staff is more and more important, and the secret demonstrating device can enable experients to know the current secret stealing means very intuitively, know the confidentiality work focus deeply, and strengthen confidentiality consciousness.
The prior secret-stealing demonstration equipment has various kinds and different aiming information security, and the secret-stealing demonstration equipment for the storage medium (stored data) management technology mainly comprises the steps of implanting Trojan programs in USB equipment, automatically implanting the Trojan programs in a computer terminal after the USB equipment implanted with the Trojan programs is accessed to the computer terminal, and playing Trojan-implanted secret-stealing demonstration animation at the computer terminal to realize the security warning of a user. The USB equipment purchased in an abnormal way is not used by a warning user through the programming of Trojan horse in the flash memory position of the USB equipment and the password stealing demonstration animation, so that the effect of safety warning is achieved.
But there is a computer end only supporting the access of the special USB flash disk, namely, when the computer end can identify the USB MSC (USB Mass Storage Class, USB mass storage device class) protocol data in the storage device, and then start the storage medium management system to identify whether the storage medium management system is the special USB flash disk or not, the storage medium management system is intercepted. That is, the existing computer end only supporting the access of the special USB flash disk does not support the implantation of the Trojan horse program external storage device (the secret stealing demonstration device), and therefore secret stealing demonstration cannot be realized. Therefore, a storage device access system, method, device and medium for secret-stealing demonstration are needed to solve the problem that the existing secret-stealing demonstration storage device cannot be used for secret-stealing demonstration at a computer end only supporting special USB flash disk access.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides a storage device access system, a method, equipment and a medium for secret-stealing demonstration, which are used for solving the problem that the existing secret-stealing demonstration equipment cannot carry out secret-stealing demonstration on a computer end only supporting the access of a special U disk.
The application provides a storage device access system for secret demonstration, which comprises a secret demonstration device, a storage chip and a security chip, wherein the secret demonstration device comprises a security chip and a storage chip, an instruction transmission module supporting first protocol transmission and an instruction analysis module for carrying out preset first protocol instruction analysis are arranged in the security chip, the first protocol is an HID protocol or a serial port protocol, the preset first protocol instruction at least comprises a first protocol data writing instruction and a first protocol data reading instruction, after the secret demonstration device is inserted into a computer terminal, a device standard request instruction is uploaded to the computer terminal through the instruction transmission module, the device standard request instruction is secret demonstration device information and comprises supporting information of the first protocol, the computer terminal determines that the device type of the secret demonstration device is the first device after the supporting information of the first protocol is detected, a driving program corresponding to the first protocol is loaded, after the driving program corresponding to the first protocol is loaded, the secret demonstration device is ready in computer terminal, secret demonstration software is arranged in the computer terminal, the preset first protocol instruction is arranged in the computer terminal and used for reading a computer terminal file, after the secret demonstration device is inserted into the computer terminal, the first protocol file is added into the computer terminal and the first protocol data writing instruction is read into the computer terminal through the instruction transmission module, the first protocol data writing instruction is further stored into the computer terminal, the first protocol data is further analyzed, the first protocol data is further is stored into the computer terminal through the first protocol analysis module, and the first protocol data is further is stored into the computer terminal, and the first protocol is further analyzed, the first protocol data is further stored.
Further, the secret-stealing demonstration device information at least comprises a device type, a VID, a PID, a device descriptor and a character string descriptor.
Further, the preset first protocol instruction further comprises an equipment information acquisition instruction, and the security chip further comprises an equipment information acquisition module used for uploading basic information of the secret-stealing demonstration equipment to the secret-stealing demonstration software after receiving the equipment information acquisition instruction issued by the secret-stealing demonstration software, wherein the basic information of the secret-stealing demonstration equipment at least comprises storage capacity and sector size.
Further, the secret-stealing demonstration software is provided with a data selection interface for reading and displaying the computer-side files, and the selected computer-side files are determined from the plurality of computer-side files by triggering a preset selection key on the data selection interface.
Further, the first protocol data writing instruction comprises an initial writing sector address, the instruction analyzing module comprises a writing unit for reading the initial writing sector address and a computer side file in the first protocol data writing instruction, and further writing the computer side file into the memory chip from the initial writing sector address, the first protocol data reading instruction comprises an initial reading sector address, and the instruction analyzing module comprises a reading unit for reading the initial reading sector address and the number of sectors which are continuously read in the first protocol data reading instruction, and further reading the number of memory data of the sectors which are continuously read from the initial reading sector address in the memory chip.
In a second aspect, the application provides a storage device access method for secret-stealing demonstration, which is applied to a storage device access system for secret-stealing demonstration, and comprises the steps of uploading a device standard request instruction to a computer end through an instruction transmission module of the secret-stealing demonstration device in a security chip after the secret-stealing demonstration device is inserted into the computer end; the method comprises the steps of determining that a device type of a secret demonstration device is first device after a computer end detects the supporting information of the first protocol, loading a driving program corresponding to the first protocol, enabling the secret demonstration device to be ready at the computer end after the driving program corresponding to the first protocol is loaded, reading a computer end file through secret demonstration software arranged in the computer end, adding the computer end file into a first protocol data writing instruction after the computer end file is selected, sending the first protocol data writing instruction to the secret demonstration device, analyzing the first protocol data writing instruction through an instruction analysis module in the secret demonstration device, obtaining the computer end file, writing the computer end file into a storage chip, analyzing data corresponding to the first protocol data reading instruction in the storage chip through the instruction analysis module, and transmitting the data corresponding to the first protocol data reading instruction to the computer end through the instruction analysis module.
Further, after the secret-stealing demonstration device is ready at the computer end, the method further comprises the step of uploading basic information of the secret-stealing demonstration device to the secret-stealing demonstration software after receiving a device information acquisition instruction issued by the secret-stealing demonstration software, wherein the basic information of the secret-stealing demonstration device at least comprises storage capacity and sector size.
The method comprises the steps of selecting a computer terminal file, namely reading and displaying the computer terminal file through a data selection interface, and determining the selected computer terminal file from a plurality of computer terminal files by triggering a preset selection key on the data selection interface.
In a third aspect, the present application provides a storage device access device for a tamper evidence, the device comprising a processor, and a memory having executable code stored thereon which when executed causes the processor to perform a storage device access method for a tamper evidence as in any of the above.
In a fourth aspect, the present application provides a non-volatile computer storage medium having stored thereon computer instructions which, when executed, implement a storage device access method for a tamper evident presentation as in any of the above.
As will be appreciated by those skilled in the art, the present application has at least the following beneficial effects:
The application relates to a security chip in a secret stealing demonstration device, which is internally provided with an instruction transmission module supporting first protocol transmission and an instruction analysis module for carrying out preset first protocol instruction analysis, wherein the first protocol is HID (Human INTERFACE DEVICE Human-computer interface) protocol or serial port protocol, namely, the application uses a USB storage protocol of non-standard (non-USB MSC protocol) to read and write the secret stealing demonstration device in a self-defined mode, such as HID protocol or serial port protocol, and then carries out file management in cooperation with secret stealing demonstration software. Because the HID protocol or the serial port protocol does not trigger the starting of the storage medium management system, the secret-stealing demonstration device is not limited by the storage medium management system, can avoid the process of starting the storage medium management system to identify whether the storage medium management system is a special U disk, directly accesses a computer end through a driving program corresponding to the first protocol, and further transmits data of the computer end (the computer end only supporting the access of the special U disk) to the secret-stealing demonstration device by using secret-stealing demonstration software corresponding to the secret-stealing demonstration device, or acquires data stolen by the secret-stealing demonstration device at other computer ends by using the secret-stealing demonstration software.
Drawings
Some embodiments of the present disclosure are described below with reference to the accompanying drawings, in which:
Fig. 1 is a schematic diagram of an internal structure of a storage device access system for secret-stealing demonstration according to an embodiment of the application.
Fig. 2 is a flowchart of a storage device access method for a secret-hacking demonstration according to an embodiment of the present application.
Fig. 3 is a schematic diagram of an internal structure of a storage device access device for secret-stealing demonstration according to an embodiment of the application.
Reference numerals illustrate:
100. The device comprises a secret stealing demonstration device, 110 parts of a security chip, 111 parts of an instruction transmission module, 112 parts of an instruction analysis module, 120 parts of a storage chip, 200 parts of a computer, 210 parts of a driver, 220 parts of secret stealing demonstration software.
Detailed Description
It should be understood by those skilled in the art that the embodiments described below are only preferred embodiments of the present disclosure, and do not represent that the present disclosure can be realized only by the preferred embodiments, which are merely for explaining the technical principles of the present disclosure, not for limiting the scope of the present disclosure. Based on the preferred embodiments provided by the present disclosure, all other embodiments that may be obtained by one of ordinary skill in the art without inventive effort shall still fall within the scope of the present disclosure.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The following describes the technical scheme provided by the embodiment of the application in detail through the attached drawings.
Fig. 1 is a storage device access system for secret-stealing demonstration according to an embodiment of the application. As shown in fig. 1, the system provided by the embodiment of the present application mainly includes:
the secret-stealing demonstration device 100 comprises a security chip 110 and a memory chip 120.
The security chip 110 is built with an instruction transmission module 111 supporting the first protocol transmission and an instruction analysis module 112 for performing preset first protocol instruction analysis.
It should be noted that, in order to avoid triggering the USB MSC protocol to start the storage media management system to identify whether the storage media management system is a dedicated USB disk, the first protocol in the present application is an HID protocol or a serial port protocol. The preset first protocol instruction at least comprises a first protocol data writing instruction and a first protocol data reading instruction. In addition, the specific content of the preset first protocol instruction may be implemented by the existing protocol customization technology, which is not limited in the present application.
Specifically, the security chip 110 is responsible for the analysis of the first protocol, the reading and writing of the storage particles, and the like, and has the main functions of converting the received preset first protocol instruction into a corresponding operation, and then returning the operation result to the host. In addition, the security chip 110 has a built-in cryptographic algorithm, and can realize functions such as secure storage of data. The memory chip 120 is a data storage medium, and is responsible for storing data.
After the secret key demonstration device 100 is inserted into the computer terminal 200, the device standard request command is uploaded to the computer terminal 200 through the command transmission module 111.
Wherein the device standard request instruction is a steal of information of the demonstration device 100 and includes supporting information of the first protocol. In particular, the hacking demonstrating device 100 information may include at least a device type, VID, PID, device descriptor, string descriptor.
After the computer end 200 detects the supporting information of the first protocol, it determines that the device type of the secret information capturing demonstration device 100 is the first device, loads the driver 210 corresponding to the first protocol, and after the driver 210 corresponding to the first protocol is loaded, the secret information capturing demonstration device 100 is ready at the computer end 200.
As an example. When the first protocol is the HID protocol, the driver 210 corresponding to the HID protocol is loaded.
The secret verifying software 220 is disposed in the computer terminal 200, and is provided with a preset first protocol command therein, and is used for reading the computer terminal 200 file, adding the computer terminal 200 file to the first protocol data writing command after selecting the computer terminal 200 file, sending the first protocol data writing command to the secret verifying device 100, further analyzing the secret verifying device by the command analyzing module 112 to obtain the computer terminal 200 file, writing the computer terminal 200 file into the memory chip 120, and further sending the first protocol data reading command to the secret verifying device 100, further analyzing the data corresponding to the first protocol data reading command in the memory chip 120 by the command analyzing module 112, and further transmitting the data to the computer terminal 200.
It should be noted that, because the reference storage device protocol (USB MSC protocol) is not used, the operating system does not consider the secret-stealing demonstration device 100 to be a storage device, so that the storage device is not automatically mounted in the operating system, and the read-write operation of the device through the own resource manager of the operating system cannot be realized. Therefore, the password demonstration software 220 is required to write the file in the password-stolen computer into the password demonstration apparatus 100.
In addition, in order to facilitate determination of a storage location in the memory chip 120 where data is stored, or acquisition of a specific location in the memory chip 120 where data is stored. The preset first protocol instruction further includes an equipment information acquisition instruction, and the security chip 110 further includes an equipment information acquisition module, where the equipment information acquisition module is configured to upload basic information of the secret information demonstration device 100 to the secret information demonstration software 220 after receiving the equipment information acquisition instruction issued by the secret information demonstration software 220. The basic information of the secret information-stealing demonstration device 100 at least comprises a storage capacity and a sector size.
The above-mentioned secret verification software 220 selects the computer terminal 200 file, and may specifically be that the secret verification software 220 reads and displays the computer terminal 200 file through a data selection interface, and determines the selected computer terminal 200 file from a plurality of computer terminal 200 files by triggering a preset selection key on the data selection interface.
In addition, the first protocol data writing instruction includes an initial writing sector address, and the above-mentioned file of the computer end 200 is obtained by the instruction parsing module 112 and written into the memory chip 120, which may be specifically:
the writing unit in the instruction parsing module 112 reads the initial writing sector address and the computer side 200 file in the first protocol data writing instruction, and further writes the computer side 200 file into the memory chip 120 from the initial writing sector address.
It should be noted that, in the above-mentioned demonstration process, when the secret computer is opened, the secret demonstration software 220 may read the file specified on the secret computer, and write the file into the secret demonstration device 100 through the first protocol data writing instruction corresponding to the secret demonstration device 100.
In addition, the first protocol data reading instruction includes an initial reading sector address, and the data corresponding to the first protocol data reading instruction in the memory chip 120 is parsed by the instruction parsing module 112, which may specifically be that the initial reading sector address and the number of sectors continuously read in the first protocol data reading instruction are read by the reading unit in the instruction parsing module 112, and then the number of memory data of the number of sectors continuously read from the initial reading sector address in the memory chip 120 is read.
It should be noted that, in the above-mentioned demonstration process, the secret-stealing demonstration device 100 is connected to a general computer, and the secret-stealing demonstration software 220 is run on the general computer, and the software automatically reads the just-stolen file through the first protocol data reading instruction and stores the file in the general computer.
Through the two processes, the application can realize the ferry of data from the computer A (the computer end 200 only supporting the access of the special U disk) provided with the storage medium management system to the common computer B.
In addition, the embodiment of the application also provides a storage device access method for secret-stealing demonstration, as shown in fig. 2, the method provided by the embodiment of the application mainly comprises the following steps:
Step 310, after the secret password demonstration device is inserted into the computer end, uploading the device standard request command to the computer end through the command transmission module of the secret password demonstration device in the security chip.
The device standard request instruction is to steal information of the device, and comprises supporting information of a first protocol.
Step 320, after the computer detects the supporting information of the first protocol, the computer determines that the device type of the secret-stealing demonstration device is the first device, loads the driver corresponding to the first protocol, and after the driver corresponding to the first protocol is loaded, the secret-stealing demonstration device is ready at the computer.
Step 330, reading a computer file through the secret verification software arranged in the computer, adding the computer file to a first protocol data writing instruction after selecting the computer file, sending the first protocol data writing instruction to the secret verification device, and further analyzing the secret verification device through an instruction analysis module in the secret verification device to obtain the computer file, and writing the computer file into a storage chip.
After the secret-stealing demonstration device is ready at the computer end, the method can further comprise:
And after receiving the equipment information acquisition instruction issued by the secret-stealing demonstration software, uploading basic information of the secret-stealing demonstration equipment to the secret-stealing demonstration software.
It should be noted that, the basic information of the secret-stealing demonstration device at least includes a storage capacity and a sector size.
The selecting of the computer side file can be specifically:
Reading and displaying the computer side files through the data selection interface, and determining the selected computer side files from the plurality of computer side files by triggering a preset selection key on the data selection interface.
And 340, issuing a first protocol data reading instruction to the secret password demonstration device through the secret password demonstration software, and further analyzing the data corresponding to the first protocol data reading instruction in the memory chip through the instruction analysis module, and further transmitting the data to the computer end.
The embodiment of the method provided by the application is based on the same inventive concept, and the embodiment of the application also provides storage equipment access equipment for the secret stealing demonstration. As shown in fig. 3, the device includes a processor and a memory having executable code stored thereon that, when executed, causes the processor to perform a storage device access method for a tamper evidence as in one of the above embodiments.
The method comprises the steps that when a secret demonstration device is inserted into a computer end, a server side uploads a device standard request command to the computer end through a command transmission module of the secret demonstration device in a security chip, wherein the device standard request command is secret demonstration device information and comprises supporting information of a first protocol, the computer end determines that the device type of the secret demonstration device is the first device after detecting the supporting information of the first protocol, loads a driving program corresponding to the first protocol, after the driving program corresponding to the first protocol is loaded, the secret demonstration device is ready at the computer end, a secret demonstration software arranged in the computer end reads a computer end file, after the computer end file is selected, the computer end file is added to a first protocol data writing command, the first protocol data writing command is sent to the secret demonstration device, further, the computer end file is obtained through analysis of the command analysis module in the secret demonstration device, the first protocol data reading command is sent to the secret demonstration device and further, the command analysis module analyzes the first protocol data reading command in the storage chip, and the corresponding data is transmitted to the computer end.
In addition, the embodiment of the application also provides a non-volatile computer storage medium, on which executable instructions are stored, which when executed, implement a storage device access method for secret-stealing demonstration as described above.
Thus far, the technical solution of the present disclosure has been described in connection with the foregoing embodiments, but it is easily understood by those skilled in the art that the protective scope of the present disclosure is not limited to only these specific embodiments. The technical solutions in the above embodiments may be split and combined by those skilled in the art without departing from the technical principles of the present disclosure, and equivalent modifications or substitutions may be made to related technical features, which all fall within the scope of the present disclosure.
Claims (8)
1. A storage device access system for a tamper evident, the system comprising:
The secret stealing demonstration device comprises a security chip and a storage chip, wherein the security chip is internally provided with an instruction transmission module supporting first protocol transmission and an instruction analysis module for carrying out preset first protocol instruction analysis, wherein the first protocol is an HID protocol or a serial port protocol, and the preset first protocol instruction at least comprises a first protocol data writing instruction and a first protocol data reading instruction;
after the secret-stealing demonstration device is inserted into the computer end, uploading a device standard request instruction to the computer end through the instruction transmission module, wherein the device standard request instruction is secret-stealing demonstration device information and comprises supporting information of a first protocol;
after the computer end detects the supporting information of the first protocol, determining the equipment type of the secret stealing demonstration equipment as the first equipment, loading a driving program corresponding to the first protocol, and after the driving program corresponding to the first protocol is loaded, preparing the secret stealing demonstration equipment at the computer end;
The device comprises a computer terminal, a secret-stealing demonstration software, an instruction analysis module, a storage chip, a first protocol data reading instruction, a second protocol data writing instruction and a second protocol data reading instruction, wherein the secret-stealing demonstration software is arranged in the computer terminal and is internally provided with the first protocol instruction which is used for reading the computer terminal file, after the computer terminal file is selected, the computer terminal file is added to the first protocol data writing instruction, the first protocol data writing instruction is sent to the secret-stealing demonstration device, the computer terminal file is obtained through analysis of the instruction analysis module and is written into the storage chip;
The data selection interface is used for reading and displaying the computer-side files, and the selected computer-side files are determined from the plurality of computer-side files by triggering a preset selected key on the data selection interface.
2. The storage device access system for a security demonstration of claim 1, wherein,
The hacking demonstrating device information at least comprises a device type, VID, PID, a device descriptor and a character string descriptor.
3. The storage device access system for a tamper evident feature of claim 1, wherein the preset first protocol instructions further comprise device information acquisition instructions, the security chip further comprises a device information acquisition module,
The method is used for uploading basic information of the secret-stealing demonstration device to the secret-stealing demonstration software after receiving a device information acquisition instruction issued by the secret-stealing demonstration software, wherein the basic information of the secret-stealing demonstration device at least comprises storage capacity and sector size.
4. The storage device access system for a bootstrapping demonstration according to claim 1 wherein the first protocol data write instruction comprises an initial write sector address, the instruction parsing module comprises a write unit,
The method comprises the steps of reading an initial writing sector address and a computer-side file in a first protocol data writing instruction, and writing the computer-side file into a memory chip from the initial writing sector address;
the first protocol data read instruction includes an initial read sector address, the instruction parsing module includes a read unit,
The method is used for reading the initial reading sector address and the number of sectors which are continuously read in the first protocol data reading instruction, and further reading the number of storage data of the sectors which are continuously read from the initial reading sector address in the storage chip.
5. A storage device access method for a secret verification, applied to the storage device access system for the secret verification of claim 1, characterized in that the method comprises:
After the secret-stealing demonstration device is inserted into the computer end, uploading a device standard request instruction to the computer end through an instruction transmission module of the secret-stealing demonstration device in the security chip, wherein the device standard request instruction is secret-stealing demonstration device information and comprises supporting information of a first protocol;
after the computer end detects the supporting information of the first protocol, determining the equipment type of the secret stealing demonstration equipment as the first equipment, loading a driving program corresponding to the first protocol, and after the driving program corresponding to the first protocol is loaded, preparing the secret stealing demonstration equipment at the computer end;
Reading a computer terminal file through the secret verifying demonstration software arranged in the computer terminal, adding the computer terminal file to a first protocol data writing instruction after the computer terminal file is selected, and sending the first protocol data writing instruction to secret verifying demonstration equipment, further analyzing by an instruction analyzing module in the secret verifying demonstration equipment to obtain the computer terminal file, and writing the computer terminal file into a storage chip;
wherein, select the computer end file, specifically include:
Reading and displaying the computer-side files through a data selection interface, and determining the selected computer-side files from a plurality of computer-side files by triggering a preset selection key on the data selection interface;
And issuing a first protocol data reading instruction to the secret password demonstration device through the secret password demonstration software, and analyzing corresponding data of the first protocol data reading instruction in the memory chip through the instruction analysis module, so as to transmit the data to the computer end.
6. The method for accessing a storage device for a tamper evident device of claim 5, wherein after the tamper evident device is ready at the computer side, the method further comprises:
After receiving an equipment information acquisition instruction issued by the secret-stealing demonstration software, uploading basic information of the secret-stealing demonstration equipment to the secret-stealing demonstration software, wherein the basic information of the secret-stealing demonstration equipment at least comprises storage capacity and sector size.
7. A storage device access device for a tamper evident, the device comprising:
A processor;
And a memory having executable code stored thereon that, when executed, causes the processor to perform a storage device access method for a bootstrapping demonstration according to any one of claims 5-6.
8. A non-transitory computer storage medium having stored thereon computer instructions that, when executed, implement a storage device access method for a bootstrapping demonstration according to any one of claims 5-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411179858.9A CN118709240B (en) | 2024-08-27 | 2024-08-27 | Storage device access system, method, device and medium for stealth demonstration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411179858.9A CN118709240B (en) | 2024-08-27 | 2024-08-27 | Storage device access system, method, device and medium for stealth demonstration |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118709240A CN118709240A (en) | 2024-09-27 |
CN118709240B true CN118709240B (en) | 2024-12-27 |
Family
ID=92811647
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202411179858.9A Active CN118709240B (en) | 2024-08-27 | 2024-08-27 | Storage device access system, method, device and medium for stealth demonstration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118709240B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021801A (en) * | 2017-11-20 | 2018-05-11 | 深信服科技股份有限公司 | Divulgence prevention method, server and storage medium based on virtual desktop |
CN115130094A (en) * | 2022-06-10 | 2022-09-30 | 北京鼎普科技股份有限公司 | Safety warning method and system based on USB equipment implanted Trojan horse |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004362516A (en) * | 2003-05-30 | 2004-12-24 | Hagiwara Sys-Com:Kk | Usb encryption device and program |
CN107563213B (en) * | 2017-09-29 | 2020-09-08 | 北京计算机技术及应用研究所 | Safety secrecy control device for preventing data extraction of storage equipment |
CN111828788A (en) * | 2020-07-24 | 2020-10-27 | 宁夏政安信息科技有限公司 | Secret education demonstration system for vividly demonstrating secret stealing means |
CN117235816B (en) * | 2023-09-29 | 2024-07-02 | 广州市金其利信息科技有限公司 | Data protection method and device based on chip encryption, computer equipment and medium |
-
2024
- 2024-08-27 CN CN202411179858.9A patent/CN118709240B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021801A (en) * | 2017-11-20 | 2018-05-11 | 深信服科技股份有限公司 | Divulgence prevention method, server and storage medium based on virtual desktop |
CN115130094A (en) * | 2022-06-10 | 2022-09-30 | 北京鼎普科技股份有限公司 | Safety warning method and system based on USB equipment implanted Trojan horse |
Also Published As
Publication number | Publication date |
---|---|
CN118709240A (en) | 2024-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7606946B2 (en) | Removable device and program startup method | |
JP2012515959A (en) | Removable memory storage device having multiple authentication processing function | |
US20120260054A1 (en) | Security system for external data storage apparatus and control method thereof | |
US7984296B2 (en) | Content protection device and content protection method | |
CN113316761A (en) | Self-formatting data storage device | |
US20130333049A1 (en) | Data protection method for portable electronic device and computer program product for the same | |
US20050193195A1 (en) | Method and system for protecting data of storage unit | |
CN118709240B (en) | Storage device access system, method, device and medium for stealth demonstration | |
KR100586063B1 (en) | A flash memory data structure having a variable size and having a system area capable of updating data, a USB storage device having the flash memory, and a method of controlling the system area. | |
US20150370482A1 (en) | Storage apparatus, communication apparatus, and storage control system | |
US20070022222A1 (en) | Memory device and associated method | |
TW200941276A (en) | Method and device for digital rights protection | |
US8266108B2 (en) | Medium drive apparatus, operation method for medium drive apparatus, information processing apparatus, recording and reproduction accessing method for information processing apparatus, program, and program recording medium | |
JP2007122731A (en) | Hard disk apparatus with biometrics sensor and method of protecting data therein | |
US8296275B2 (en) | Data processing method, data processing system, and storage device controller | |
US20080215799A1 (en) | Control Chip of Adapter Interconnecting Pc and Flash Memory Medium and Method of Enabling the Control Chip to Program the Flash Memory Medium to be Accessible by the Pc | |
JP4767619B2 (en) | External storage device and SBC control method | |
US20170228333A1 (en) | Reader/writer device, information processing device, and data transfer control method, and program | |
CN108009039A (en) | Recording method, device, storage medium and the electronic equipment of end message | |
CN1517888A (en) | storage unit data protection method and system | |
US10839055B2 (en) | Storage apparatus managing method and storage apparatus managing system | |
TWI709044B (en) | Storage apparatus managing method and storage apparatus managing system | |
KR101370816B1 (en) | Removable mass storage device and method for automatically running programs on connection | |
KR100811157B1 (en) | Electronic record device and recording medium therefor | |
US9205323B2 (en) | Localization system for mounting game in portable storage device on game console and method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |