Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

USB Port Management and Control Application solution

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Solidify the domestic high-speed encryption chip into the computer, set up a hardware encryption bridge between the mobile storage and the computer, and forcibly encrypt and decrypt all the data in and out of the computer, so as to prevent the data from being maliciously copied and lost. It can also realize the dual functions of sharing and secrecy through authorization distribution, confidential information and mobile storage on several authorized machines. Key words: national Secret Bureau independent encryption algorithm domestic high-speed encryption chip blocking USB port leakage function point

Function points:

Based on the 32-bit high-speed stream encryption security chip developed by Tongfang, the computer USB port management scheme, pure hardware scheme, software can not be bypassed, strong anti-*. Using the algorithm designated by the State Secret Administration and a 128-bit key, the encrypted data has strong anti-cracking ability. Tongfang independent research and development of 32 for high-speed stream encryption chip to achieve transparent data encryption and decryption, data encryption speed as high as 20MBps, 5 times that of similar encryption products, fast processing speed. Independent of the upper OS, does not need to install any software, plug and play, easy to operate, does not change the user's operation habits. The configuration management of the work domain can be completed by the hand-held encryption machine, and the management security of the network is guaranteed by the device, which does not depend on the person, and is more convenient and more secure. The USB port of the controlled computer has the following three states: Port encryption: turn on the USB port encryption function, the data flowing through the USB port will be transparently encrypted and decrypted, and the encryption rate can reach 20MBps. It is suitable for scenarios that have confidentiality requirements but need to transfer data to other computers.

Port open: turn off the USB port encryption function, and users can use it as a normal USB port. It is suitable for scenarios with low or no confidentiality requirements.

Port closed: disable the USB port and do not recognize any USB devices. It is suitable for scenarios with high confidentiality requirements and no need to transfer data to other computers. Work scene

Under the management of the traditional secrecy and isolation system, in order to prevent information leakage, information islands are always artificially created, physical isolation is maintained between PC, there is no network connection and USB ports are disabled. When such two PC need to transmit information to each other, need to be approved step by step, and then use the CD to transmit information, the timeliness is low; the plaintext of the file is stored on the CD, once it is lost, the secret will be leaked, which is not safe.

The source of the USB leak is that there is no control on the USB port, and the copied data is plaintext stored on the mobile storage device. The same side USB port control scheme controls the USB port and encrypts the data flowing through the USB port to the user's mobile storage device. Encrypted files can only be accessed on authorized machines. Even if the U disk is lost, the secret will not be disclosed because the data in the U disk is encrypted ciphertext.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report