CN111027046A - Access control method and device for USB network equipment - Google Patents
Access control method and device for USB network equipment Download PDFInfo
- Publication number
- CN111027046A CN111027046A CN201911041256.6A CN201911041256A CN111027046A CN 111027046 A CN111027046 A CN 111027046A CN 201911041256 A CN201911041256 A CN 201911041256A CN 111027046 A CN111027046 A CN 111027046A
- Authority
- CN
- China
- Prior art keywords
- network equipment
- usb network
- access
- usb
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The application provides an access control method and device of USB network equipment. The method comprises the following steps: if the USB network equipment is detected to be accessed, judging whether the USB network equipment is the network equipment with limited access or not according to a preset USB network equipment limiting strategy; if the USB network equipment is the network equipment with limited access, continuously judging whether the access of the USB network equipment is in a time period of limited access according to the limitation strategy; if so, setting the USB network equipment to be in a forbidden access state; if not, setting the USB network equipment to be in an access permission state. Therefore, private data on the terminal can be flexibly limited from being stolen.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for controlling access to a USB network device.
Background
In order to protect the security and the privacy of the private data of the terminal user and prevent a stealer from stealing the private data of the terminal by using USB network equipment; the approaches used in the prior art generally include: 1. plugging the USB interface by using solid glue or transparent glue; 2. and (4) removing the USB interface of the computer. The USB interface is blocked by using the solid glue or the transparent glue, if the blockage is not thorough, if personnel can open the seal of the solid glue, a stealer still has a chance to insert the USB equipment into the USB interface for information stealing, and therefore the mode has higher risk; if the USB interface of the computer is directly removed, the computer cannot use the USB interface at all.
Disclosure of Invention
In view of this, the present application provides an access control method and apparatus for a USB network device, so as to protect the security of private data on a terminal in a software manner.
Specifically, the method is realized through the following technical scheme:
in a first aspect, an embodiment of the present application provides an access control method for a USB network device, including:
if the USB network equipment is detected to be accessed, judging whether the USB network equipment is the network equipment with limited access or not according to a preset USB network equipment limiting strategy;
if the USB network equipment is the network equipment with limited access, continuously judging whether the access of the USB network equipment is in a time period of limited access according to the limitation strategy, and if so, setting the USB network equipment in a state of access prohibition; if not, setting the USB network equipment to be in an access permission state.
Optionally, the preset USB network device restriction policy includes: a second identification of the restricted-access USB network device;
the judging whether the USB network device is the network device which is limited to access according to the preset USB network device limiting strategy comprises the following steps:
acquiring a first identifier of the USB network equipment;
and comparing the first identifier with a second identifier of the network equipment with limited access in the limitation strategy, and if the first identifier is consistent with the second identifier, judging that the USB network equipment is the network equipment with limited access.
Optionally, the method further includes:
and acquiring access information of the USB network equipment, generating an audit log, and storing the audit log.
Optionally, the method further includes:
and if the USB network equipment is not the network equipment with limited access, setting the USB network equipment to be in an access permission state.
In a second aspect, an embodiment of the present application provides an access control apparatus for a USB network device, including:
the first judgment module is used for judging whether the USB network equipment is the network equipment with limited access or not according to a preset USB network equipment limiting strategy if the USB network equipment is detected to be accessed;
the second judgment module is used for continuously judging whether the access of the USB network equipment is in the access limiting time period or not according to the limitation strategy if the USB network equipment is the network equipment with limited access;
the setting module is used for setting the USB network equipment to be in a forbidden access state if the USB network equipment is in the forbidden access state; if not, setting the USB network equipment to be in an access permission state.
Optionally, the preset USB network device restriction policy includes: a second identification of the restricted-access USB network device;
the first judging module is specifically configured to:
acquiring a first identifier of the USB network equipment;
and comparing the first identifier with a second identifier of the network equipment with limited access in the limitation strategy, and if the first identifier is consistent with the second identifier, judging that the USB network equipment is the network equipment with limited access.
Optionally, the apparatus further includes:
and the audit log generation module is used for acquiring the access information of the USB network equipment and generating an audit log.
Optionally, the setting module is further configured to:
and if the USB network equipment is not the network equipment with limited access, setting the USB network equipment to be in an access permission state.
In a third aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the method according to the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer device, which is characterized by comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the steps of the method according to the first aspect are implemented.
According to the access control method and device for the USB network equipment, when the USB network equipment is detected to be accessed, whether the accessed USB network equipment is the network equipment with limited access or not is judged according to the USB network equipment limiting strategy; if the USB network equipment is the network equipment which is restricted from being accessed, whether the access of the USB network equipment is within the access restriction time period or not is continuously judged according to the restriction strategy, if so, the USB network equipment is set to be in an access prohibition state, further, the illegal USB network equipment is restricted from being accessed to the terminal within the specific time period in a software mode, and compared with the prior art, the method can flexibly prevent the private data on the terminal from being stolen.
Drawings
Fig. 1 is a flowchart illustrating an access control method for a USB network device according to an exemplary embodiment of the present application;
FIG. 2 is a flowchart illustrating a method for determining whether a USB network device is a restricted access network device according to an exemplary embodiment of the present application;
FIG. 3 is a block diagram illustrating an access control system of a USB network device according to an exemplary embodiment of the present application;
fig. 4 is a schematic structural diagram of an access control apparatus of a USB network device according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
At present, in order to prevent a stealer from stealing private data of a terminal by using USB network equipment; the mode adopted in the prior art generally has the characteristics of higher risk and inflexibility; based on this, the embodiment of the application provides an access control method and device for a USB network device. The present application is described in detail below with reference to specific embodiments.
Fig. 1 is a flowchart illustrating an access control method for a USB network device according to an exemplary embodiment of the present application; referring to fig. 1, the method is applied to a terminal, which may be an electronic device such as a computer capable of being inserted into a USB network device, and includes the following steps:
and S10, if the access of the USB network equipment is detected, judging whether the USB network equipment is the network equipment with limited access according to a preset USB network equipment limiting strategy.
In this embodiment, the terminal obtains a preset USB network device restriction policy in advance, where the restriction policy may be set by the user directly on the terminal, or may be obtained by the terminal from the server.
S20, if the USB network device is the network device with limited access, continuing to judge whether the access of the USB network device is in the time period of limited access according to the limitation strategy.
The USB network device restriction policy includes an identifier of the USB network device to be restricted from access and a time to be restricted from access.
S30, if yes, setting the USB network equipment to be in a state of access prohibition; if not, setting the USB network equipment to be in an access permission state.
In this embodiment, when the detected USB network device is a USB network device with access restriction, and the USB network device is set to be in an access prohibition state within a time period of access restriction, in the access prohibition state, the USB network device cannot acquire any data on the terminal.
In this embodiment of the present application, if the USB network device is not a network device with restricted access, the USB network device is set to be in an access-allowed state. In the access-allowed state, the USB network device may access any data of the terminal, or a part of the data, which is not limited in this application.
Furthermore, in the embodiment, the illegal USB network device is limited to access the terminal within a specific time period in a software mode, and compared with the prior art, the method can flexibly prevent the private data on the terminal from being stolen.
FIG. 2 is a flowchart illustrating a method for determining whether a USB network device is a restricted access network device according to an exemplary embodiment of the present application; referring to fig. 2, the preset USB network device restriction policy includes: a second identification of the restricted-access USB network device;
in the step S10, determining whether the USB network device is a network device to which access is restricted according to a preset USB network device restriction policy, specifically including the following steps S101 to S102:
s101, acquiring a first identifier of the USB network equipment.
After the USB network device accesses the terminal, the terminal may identify the USB network device and obtain the first identifier of the USB network device.
S102, comparing the first identifier with a second identifier of the network equipment with limited access in the limitation strategy, and if the first identifier is consistent with the second identifier, judging that the USB network equipment is the network equipment with limited access.
In this embodiment, the types of the first identifier and the second identifier should be consistent; such as serial numbers of all products, etc.
In this embodiment, the first identifier of the accessed USB network device is compared with the second identifier in the restriction policy, and whether the accessed USB network device is the restricted-access USB device is determined according to the comparison result.
Optionally, in an embodiment of the present application, the method further includes the following step a 10:
and A10, acquiring the access information of the USB network equipment, generating an audit log, and storing the audit log.
In this embodiment of the present application, the audit log includes: the first identification, the access time, the access state and other information of the USB network equipment. Furthermore, in this embodiment, effective monitoring of the USB network device is achieved by generating an audit log, where the audit log may be stored locally in the terminal or may be uploaded to the server, so as to facilitate subsequent reference and use.
Fig. 3 is a schematic structural diagram of an access control system of a USB network device according to an exemplary embodiment of the present application. Referring to fig. 3, when the above method is specifically implemented, the method may be implemented by the system provided in this embodiment, where the system includes an engine server 301, an acquisition server 302, a client 303, and a kernel module 304, where the engine server 301 is configured to customize a restriction policy and issue the policy to the acquisition server 302, the acquisition server 302 further forwards the restriction policy to the client 303, the client 303 loads the restriction policy to the kernel module 304, and the kernel module 304 specifically implements the above access control method; and the client 303 generates an audit log and uploads the audit log to the collection server for storage.
Fig. 4 is a schematic structural diagram of an access control apparatus of a USB network device according to an exemplary embodiment of the present application; referring to fig. 4, the apparatus 400 includes:
a first determining module 401, configured to determine, if it is detected that a USB network device is accessed, whether the USB network device is a network device to which access is restricted according to a preset USB network device restriction policy;
a second determining module 402, configured to, if the USB network device is a network device whose access is restricted, continue to determine whether the access of the USB network device is within a time period for restricting access according to the restriction policy;
a setting module 403, configured to set the USB network device in an access prohibited state if the access of the USB network device is within the access restriction time period; if not, setting the USB network equipment to be in an access permission state.
Optionally, the preset USB network device restriction policy includes: a second identification of the restricted-access USB network device;
the first determining module 401 is specifically configured to:
acquiring a first identifier of the USB network equipment;
and comparing the first identifier with a second identifier of the network equipment with limited access in the limitation strategy, and if the first identifier is consistent with the second identifier, judging that the USB network equipment is the network equipment with limited access.
Optionally, the above apparatus further comprises:
and an audit log generating module (not shown in the figure) configured to obtain the access information of the USB network device, and generate an audit log.
Optionally, the setting module 403 is further configured to:
and if the USB network equipment is not the network equipment with limited access, setting the USB network equipment to be in an access permission state.
In another embodiment of the present application, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the steps of the access control method of a USB network device as described in any of the above embodiments
An implementation of the application also provides an electronic device. The electronic device comprises at least a memory and a processor; the memory is connected with the processor through a communication bus and is used for storing computer instructions executable by the processor; the processor is configured to read the computer instructions from the memory to implement the steps of the access control of the USB network device according to any of the above embodiments.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform corresponding functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Computers suitable for executing computer programs include, for example, general and/or special purpose microprocessors, or any other type of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory and/or a random access memory. The basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer does not necessarily have such a device. Further, the computer may be embedded in another device.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CDROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. An access control method for a USB network device, comprising:
if the USB network equipment is detected to be accessed, judging whether the USB network equipment is the network equipment with limited access or not according to a preset USB network equipment limiting strategy;
if the USB network equipment is the network equipment with limited access, continuously judging whether the access of the USB network equipment is in a time period of limited access according to the limitation strategy;
if so, setting the USB network equipment to be in a forbidden access state; if not, setting the USB network equipment to be in an access permission state.
2. The method of claim 1, wherein the preset USB network device restriction policy comprises: a second identification of the restricted-access USB network device;
the judging whether the USB network device is the network device which is limited to access according to the preset USB network device limiting strategy comprises the following steps:
acquiring a first identifier of the USB network equipment;
and comparing the first identifier with a second identifier of the network equipment with limited access in the limitation strategy, and if the first identifier is consistent with the second identifier, judging that the USB network equipment is the network equipment with limited access.
3. The method of claim 1, further comprising:
and acquiring access information of the USB network equipment, generating an audit log, and storing the audit log.
4. The method of claim 1, further comprising:
and if the USB network equipment is not the network equipment with limited access, setting the USB network equipment to be in an access permission state.
5. An access control apparatus of a USB network device, comprising:
the first judgment module is used for judging whether the USB network equipment is the network equipment with limited access or not according to a preset USB network equipment limiting strategy if the USB network equipment is detected to be accessed;
the second judgment module is used for continuously judging whether the access of the USB network equipment is in the access limiting time period or not according to the limitation strategy if the USB network equipment is the network equipment with limited access;
the setting module is used for setting the USB network equipment to be in an access prohibition state if the access of the USB network equipment is within the access limit time period; if not, setting the USB network equipment to be in an access permission state.
6. The apparatus of claim 1, wherein the predetermined USB network device restriction policy comprises: a second identification of the restricted-access USB network device;
the first judgment module is specifically configured to:
acquiring a first identifier of the USB network equipment;
and comparing the first identifier with a second identifier of the network equipment with limited access in the limitation strategy, and if the first identifier is consistent with the second identifier, judging that the USB network equipment is the network equipment with limited access.
7. The apparatus of claim 5, further comprising:
and the audit log generation module is used for acquiring the access information of the USB network equipment and generating an audit log.
8. The apparatus of claim 5, wherein the setup module is further configured to:
and if the USB network equipment is not the network equipment with limited access, setting the USB network equipment to be in an access permission state.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of the first aspect when executing the computer program.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911041256.6A CN111027046A (en) | 2019-10-30 | 2019-10-30 | Access control method and device for USB network equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201911041256.6A CN111027046A (en) | 2019-10-30 | 2019-10-30 | Access control method and device for USB network equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN111027046A true CN111027046A (en) | 2020-04-17 |
Family
ID=70204718
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201911041256.6A Pending CN111027046A (en) | 2019-10-30 | 2019-10-30 | Access control method and device for USB network equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111027046A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113485895A (en) * | 2021-07-22 | 2021-10-08 | 北京天空卫士网络安全技术有限公司 | Method and device for determining IO device type |
| CN113630415A (en) * | 2021-08-10 | 2021-11-09 | 工银科技有限公司 | Network admission control method, apparatus, system, device, medium and product |
| US11561917B2 (en) * | 2020-09-23 | 2023-01-24 | Hewlett Packard Enterprise Development Lp | USB connection management |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101901315A (en) * | 2010-07-12 | 2010-12-01 | 浪潮齐鲁软件产业有限公司 | A USB mobile storage medium security isolation and monitoring management method |
| CN102118749A (en) * | 2009-12-30 | 2011-07-06 | 比亚迪股份有限公司 | Network access control device for mobile terminal and mobile terminal equipment |
| CN105468999A (en) * | 2015-11-17 | 2016-04-06 | 北京奇虎科技有限公司 | Data security method and mobile hard disk |
| CN106203187A (en) * | 2016-06-26 | 2016-12-07 | 厦门天锐科技股份有限公司 | The USB storage device method for limiting of a kind of filter Driver on FSD and system |
| CN107395386A (en) * | 2016-05-17 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of method and system, gateway device for controlling intelligent terminal |
| CN108009432A (en) * | 2017-11-29 | 2018-05-08 | 郑州云海信息技术有限公司 | A kind of management method, device and equipment for accessing storage system |
-
2019
- 2019-10-30 CN CN201911041256.6A patent/CN111027046A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102118749A (en) * | 2009-12-30 | 2011-07-06 | 比亚迪股份有限公司 | Network access control device for mobile terminal and mobile terminal equipment |
| CN101901315A (en) * | 2010-07-12 | 2010-12-01 | 浪潮齐鲁软件产业有限公司 | A USB mobile storage medium security isolation and monitoring management method |
| CN105468999A (en) * | 2015-11-17 | 2016-04-06 | 北京奇虎科技有限公司 | Data security method and mobile hard disk |
| CN107395386A (en) * | 2016-05-17 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of method and system, gateway device for controlling intelligent terminal |
| CN106203187A (en) * | 2016-06-26 | 2016-12-07 | 厦门天锐科技股份有限公司 | The USB storage device method for limiting of a kind of filter Driver on FSD and system |
| CN108009432A (en) * | 2017-11-29 | 2018-05-08 | 郑州云海信息技术有限公司 | A kind of management method, device and equipment for accessing storage system |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11561917B2 (en) * | 2020-09-23 | 2023-01-24 | Hewlett Packard Enterprise Development Lp | USB connection management |
| CN113485895A (en) * | 2021-07-22 | 2021-10-08 | 北京天空卫士网络安全技术有限公司 | Method and device for determining IO device type |
| CN113630415A (en) * | 2021-08-10 | 2021-11-09 | 工银科技有限公司 | Network admission control method, apparatus, system, device, medium and product |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2022095901A (en) | System and method for detecting exploitation of components connected to in-vehicle network | |
| US9401925B1 (en) | Systems and methods for detecting security threats based on user profiles | |
| CN111027046A (en) | Access control method and device for USB network equipment | |
| US9219611B1 (en) | Systems and methods for automating cloud-based code-signing services | |
| US11762989B2 (en) | Securing electronic data by automatically destroying misdirected transmissions | |
| CN106295381A (en) | For monitoring device and the internal storage of the data access to internal storage | |
| US20160335433A1 (en) | Intrusion detection system in a device comprising a first operating system and a second operating system | |
| WO2017107896A1 (en) | Document protection method and device | |
| CN112069499A (en) | Detection method, detection device, storage medium and electronic equipment | |
| CN108667802B (en) | Method and system for monitoring power application network security | |
| KR20190003222A (en) | Method and system for configuration of ecu security | |
| CN102257506A (en) | Copy safe storage | |
| CN113836529A (en) | Process detection method, device, storage medium, and computer device | |
| CN113014381A (en) | Secret key processing method and device of vehicle-mounted terminal, electronic equipment and medium | |
| CN103500311B (en) | software detecting method and system | |
| CN113726673B (en) | Service gateway flow control method, device, equipment and storage medium | |
| CN108256351B (en) | File processing method and device, storage medium and terminal | |
| CN109446847B (en) | Configuration method of dual-system peripheral resources, terminal equipment and storage medium | |
| CN113791707A (en) | Screen capture method and device for instant messaging system | |
| CN108647516B (en) | Method and device for defending against illegal privilege escalation | |
| US20220140995A1 (en) | Detection of Unauthorized Encryption Using Key Length Evaluation | |
| CN110633585A (en) | Hard disk locking and unlocking method, device, equipment and readable storage medium | |
| CN116415236A (en) | Distributed storage data safety state identification and protection method | |
| WO2019210106A1 (en) | Edge device disablement | |
| US11196575B2 (en) | On-chipset certification to prevent spy chip |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |