CN109033313B - Method and terminal equipment for realizing full-disk scanning function by using USN - Google Patents
Method and terminal equipment for realizing full-disk scanning function by using USN Download PDFInfo
- Publication number
- CN109033313B CN109033313B CN201810786552.8A CN201810786552A CN109033313B CN 109033313 B CN109033313 B CN 109033313B CN 201810786552 A CN201810786552 A CN 201810786552A CN 109033313 B CN109033313 B CN 109033313B
- Authority
- CN
- China
- Prior art keywords
- scanning
- file
- full
- disk
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method and terminal equipment for realizing a full-disk scanning function by using a USN (Universal Serial bus), wherein the method comprises the following steps: the full-disk scanning system receives a trigger operation for scanning the file system; acquiring a scanning log corresponding to the previous scanning operation from a log system; according to a file scanning starting point, sequentially taking out a file to analyze and restore, and sending the related information of the file and the file after analysis and restoration to a strategy system; the strategy system scans the relevant information of the file and the file after analysis and restoration to obtain a scanning result, and updates the scanning log; and if the scanning result is a hit, sending the hit result to the full-disk scanning system. The method and the terminal equipment apply the updated serial number USN and the strategy rule to realize the full-disk scanning, and improve the safety and the flexibility of the full-disk scanning.
Description
Technical Field
The present disclosure belongs to the field of computers, and in particular, to a method and a terminal device for implementing a full-disk scanning function by using a USN.
Background
In computer applications, it is often necessary to scan files in a storage system formed by a magnetic disk or a hard disk, the most common scanning mode is full disk scanning, and conventional full disk scanning is performed by enumerating files in the storage system to be scanned, for example, files are enumerated from a root directory of the storage system and then transmitted to a subsequent scanning engine one after another after enumeration, and one or more scanning engines obtain a scanning result after scanning the files. However, this scanning method is time consuming and consumes system resources. In order to overcome the defects of full-disc scanning, the patent WO2017084557a1 proposes a file scanning method for virus killing, which uses an incremental log to record the cut-off position of the previous scanning to realize the incremental scanning virus killing so as to reduce the scanning time of the traditional full-disc scanning.
Meanwhile, no matter the traditional full-disk scanning or the incremental full-disk scanning, the scanning provided by the prior art is usually a virus scanning engine, only one scanning result based on the existing virus library can be provided for a user, and the fact that many enterprise users pay more attention to the scanning of sensitive information is not considered, namely, a scanning strategy cannot be customized according to the requirements of the user; in addition, in order to ensure the accuracy of the scanning result, the terminal is mostly required to provide the function of surfing the internet, and a user with a high requirement on sensitive data also has a potential safety risk.
In addition, if a scanned file has a new file operation, such as an addition, deletion, or modification, the existing full-disk scanning cannot know whether the operations occur after scanning, so that operations of scanning the file again are omitted, and data security risks are also brought.
Disclosure of Invention
In view of solving the above problems in the prior art, an object of the present disclosure is to provide a method and a terminal device for implementing a full disk scanning function by using a USN.
The utility model provides a method for realizing full-disk scanning by applying update serial number USN, which is used for scanning files of a terminal and is characterized in that the terminal is provided with a full-disk scanning system and a strategy system, and the following steps are executed:
step 1: the full-disk scanning system receives a trigger operation for scanning the file system;
step 2: the full-disk scanning system acquires a scanning log corresponding to the previous scanning operation from a log system;
and step 3: the full-disk scanning system finds the position of the previous scanning ending according to the scanning log, judges whether the position is the last file of the file system, and if so, turns to the step 4; if not, taking the position of the next file of the position as a file scanning starting point, and turning to the step 5;
and 4, step 4: checking whether a log of the USN has a record needing to be scanned, if so, taking the file position of the USN updating record as a file scanning starting point, if not, completing the scanning, and turning to the step 1;
and 5: the full-disk scanning system takes out a file for analysis and restoration according to the file scanning starting point, and the related information of the file and the file after analysis and restoration are sent to the strategy system;
step 6: the strategy system scans the relevant information of the file and the file after analysis and restoration to obtain a scanning result, and updates the scanning log;
and 7: whether the scanning result is hit or not, if yes, the hit result is sent to the full-disk scanning system, and the step 2 is carried out; if not, go to step 2.
The policy system in the method provided by the present disclosure can be configured as a scanning policy for sensitive information, and then data leakage (leakage) can be prevented.
In addition, the method provided by the present disclosure can avoid the situation that the updated file "escapes" scanning, such as: after a file is scanned, the file is updated again, and at this time, the updated file is not scanned again, so that scanning is avoided, and when the updated content belongs to illegal information, a potential safety hazard is brought to the system.
On the basis of the above technical solution, further, the full disk scanning system receives a result returned by the policy system, and stores the scanned result in the log system.
On the basis of the foregoing technical solution, further, the updating the scan log includes:
and adding the position of the current scanning file into the record of the scanning log.
On the basis of the above technical solution, further, before the full disk scanning system receives a trigger operation for scanning the file, the method further includes:
step 1.1: and the user starts the full-disk scanning function, the full-disk scanning system establishes an index table for all files of the terminal file system, and the index result is cached in the user data file of the full-disk scanning system.
On the basis of the above technical solution, further, the location includes an index of a file index table.
On the basis of the above technical solution, further, before the policy system scans the relevant information of the file and the file after the analysis and restoration, the method includes:
step 6.1: an administrator or a user sets the policy system and configures the scanning time period.
On the basis of the technical scheme, further, when the time meets the configured scanning time period, a full-disk scanning system is triggered to scan the file information; or a manual mode is adopted to trigger the full-disk scanning system to scan the file information.
On the basis of the above technical solution, further, the related information of the file includes at least one of the following: (1) storage location, (2) name, (3) author, (4) size, and (5) type.
On the basis of the above technical solution, further, the scanning, by the policy system, the file related information and the file after the parsing and restoring includes: and scanning the related information of the file or scanning the file content of the file after the analysis and the reduction.
On the basis of the above technical solution, further, the policy system includes at least one of the following policy rules, and scans the file according to the policy rule:
(1) a retrieval policy, where the retrieval policy includes a list of a series of persons, devices, or directories or data identifiers, and scans relevant information of the files meeting the list or the data identifiers or the files after parsing and restoring;
(2) and a white list policy, wherein the white list policy comprises a list of a series of persons, devices or directories or data identifiers, and avoids scanning for the scanned file relevant information conforming to the list or the data identifiers or the file after analysis and restoration.
On the basis of the above technical solution, further, some commonly used data identifiers of sensitive content are preset in the policy system, and the data identifiers include: identification card information, business license information, and/or bank card numbers, and provides forward keywords, reverse keywords, fuzzy keywords, and regular expression rules to facilitate configuration of policy rules.
On the basis of the above technical solution, further, when the full disk scanning system receives a hit result, the full disk scanning system performs at least one special operation including:
(1) popup reminding on the terminal; (2) and sending a reminding mail.
On the basis of the above technical solution, further, checking whether a file to be scanned exists in the log of the USN includes:
and checking whether the corresponding file in the record in the USN is scanned by the ongoing scanning process, if so, the file corresponding to the record does not need to be scanned, and if not, the file corresponding to the record needs to be scanned.
When a scanned file has a new file operation, such as: the addition, deletion, modification and the like are all recorded in the USN log, for example, modification time and modification content are recorded, at this time, whether a file subjected to a new operation is scanned or not can be judged through the modification time and the modification content, and if the file is not scanned, subsequent incremental scanning is needed, so that the data risk caused by scanning again due to updating of the scanned file is avoided.
On the basis of the above technical solution, further, the triggering operation includes any one of:
(1) a trigger operation having a parameter for modifying a scan log of the previous scan operation in the step 2;
(2) triggering operation without parameters, namely not modifying the scanning log of the previous scanning operation in the step 2;
wherein, the modifying the scan log of the previous scan operation in the step 2 refers to modifying the position of the previous scan cutoff.
The flexibility of the trigger operation is improved by two forms of trigger operation. When the trigger operation has a parameter, the parameter is a file index set by an administrator or a user, the scan log of the previous scan operation in step 2 is modified, and customized scan is realized, for example: when the files at the first or a certain designated position of the file system need to be scanned one by one, the position of the file is designated by setting the parameter, and the customized file scanning is realized.
On the other hand, the present disclosure further provides a terminal device for implementing full-disc scanning by using a USN, which is characterized by comprising: and the processor executes the program on the storage to realize the method for realizing the full-disk scanning function by applying the USN.
Compared with the prior art, the method has the following beneficial effects:
so as to obtain at least one of the following technical effects:
(1) because the technical scheme of the present disclosure utilizes the USN (Update Service Number or Update serial Number) interface of the NTFS (New technology File System) file System of the Windows operating System, all the resume indexes of the files inside the disk to be scanned are quickly treated, and the change of the file System can be known in time by utilizing the characteristics of the USN, thereby realizing a faster function of incremental scanning;
(2) according to the technical scheme, a strategy system is provided, a system administrator can issue a group of strategies to all the managed and controlled terminals, a terminal user cannot stop the strategies, meanwhile, certain strategy rules for sensitive information, which can be defined by the terminal user, are provided for a scanning engine, the scanning engine can generate a map of a user file system according to the strategies, the map of the user file system is used for filing the sensitive files, and therefore a sensitive information map for each user file system is formed;
(3) according to the technical scheme, data identifiers of common sensitive contents, such as identity card information, business license information, bank card numbers and the like, are preset, forward keywords, reverse keywords, fuzzy keywords and regular expression rules are provided, and therefore an administrator or a user can configure sensitive information strategy rules conveniently;
(4) according to the technical scheme, the scanning result can be prompted to the user, and a reminding mail can be sent to a system administrator or related administrators for the user with more scanned sensitive information, so that the safety is improved;
(5) the technical scheme of this disclosure can regard as full scanning engine, provides some interfaces that supply other applications to use, for example U coil pipe accuse function in the terminal DLP system, prints management and control function etc. can serve whole terminal DLP's scanning demand.
Drawings
Fig. 1 is a schematic flow chart of a method for implementing a full disk scanning function by using a USN according to the present disclosure.
Fig. 2 is a schematic structural diagram of a terminal for implementing a full disc scan function by using a USN according to the present disclosure.
The present disclosure is described in further detail below. However, the following examples are only for the convenience of understanding the technical solutions of the present disclosure, and the listed examples are not intended to represent or limit the scope of the claims of the present disclosure, which shall be controlled by the claims.
Detailed Description
The technical scheme of the disclosure is further explained by the specific implementation mode in combination with the attached drawings.
To better illustrate the present disclosure, and to facilitate an understanding of the technical solutions of the present disclosure, typical but non-limiting examples of the present disclosure are as follows: it should be specifically noted that the embodiments listed in the description of the present disclosure are only exemplary embodiments given for convenience of description, and should not be construed as the only correct embodiments of the present disclosure, nor as a restrictive description of the scope of the present disclosure.
As shown in fig. 1, a flowchart of a specific embodiment of a method for implementing a full disk scanning function by using a USN according to the present disclosure includes the following steps:
the method is used for scanning files of a terminal, and is characterized in that the terminal is provided with a full-disk scanning system and a strategy system, and the following steps are executed:
s1: the full-disk scanning system receives a trigger operation for scanning the file system;
s2: the full-disk scanning system acquires a scanning log corresponding to the previous scanning operation from a log system;
s3: the full-disk scanning system finds the position of the ending of the previous scanning according to the scanning log, judges whether the position is the last file of the file system, and if so, switches to S4; if not, executing S5, taking the position of the file next to the position as the scanning starting point of the file, and then turning to S7;
s4: checking whether a file needing to be scanned exists in the log of the USN, if not, indicating that all files of the file system are completely scanned, turning to S1, and waiting for a new scanning trigger command; if so, executing S6, taking the file position of the USN update record as the file scanning starting point, and then turning to S7;
s7: the full-disk scanning system takes out a file for analysis and restoration according to the file scanning starting point, and the related information of the file and the file after analysis and restoration are sent to the strategy system;
s8: the strategy system scans the relevant information of the file and the file after analysis and restoration to obtain a scanning result, and updates the scanning log;
s9: whether the scanning result is hit or not is judged, if yes, S10 is executed, the hit result is sent to the full-disk scanning system, and then S2 is executed; if not, go to step 2.
As a more preferable embodiment, the strategy system can be configured as a scanning strategy for sensitive information, and data leakage can be prevented.
The embodiment can avoid the situation that the updated file is "evaded" from scanning, for example: after a file is scanned, the file is updated again, and at this time, the updated file is not scanned again, so that the scanning operation is avoided, and when the updated content belongs to illegal information, a potential safety hazard is brought to the system.
As a more preferred embodiment, the policy system includes at least one of the following policy rules, and scans the file according to the policy rule: (1) searching a policy rule, wherein the searching policy comprises a list of a series of persons, equipment or catalogues, and scanning the relevant information of the files meeting the list or the files after analysis and restoration; (2) and a white list policy rule, wherein the white list policy includes a list of a series of persons, equipment or directories, and the related information of the scanned file conforming to the list or the file after analysis and restoration is free from scanning. Different scanning modes are realized through different strategy rules so as to meet the scanning application requirements of different users.
As a more preferable embodiment, some commonly used data identifiers of sensitive content are preset in the policy system, and the data identifiers include: identification card information, business license information, and/or bank card numbers, and provides forward keywords, reverse keywords, fuzzy keywords, and regular expression rules to facilitate configuration of policy rules.
As a more preferred embodiment, the checking whether there is a file to be scanned in the log of the USN includes: and checking whether the corresponding file in the record in the USN is scanned by the ongoing scanning process, if so, the file corresponding to the record does not need to be scanned, and if not, the file corresponding to the record needs to be scanned.
When a scanned file has a new file operation, such as: the addition, deletion, modification and the like are all recorded in the USN log, for example, modification time and modification content are recorded, at this time, whether a file subjected to a new operation is scanned or not can be judged through the modification time and the modification content, and if the file is not scanned, subsequent incremental scanning is needed, so that the data risk caused by scanning again due to updating of the scanned file is avoided.
As a more preferred embodiment, the triggering operation includes any one of: (1) a trigger operation having a parameter for modifying a scan log of the previous scan operation in the step 2; (2) triggering operation without parameters, namely not modifying the scanning log of the previous scanning operation in the step 2; wherein, the modifying the scan log of the previous scan operation in the step 2 refers to modifying the position of the previous scan cutoff. For example: after the full-disk scanning is completed, the position of the last file of the file system is recorded in the scanning log, that is, the full-disk scanning is completed, and no new operation of any file occurs, that is, no new file is recorded in the USN log, at this time, when the user wants to perform the full-disk scanning again, if the no-parameter triggering operation is adopted, the full-disk scanning operation cannot be executed (the full-disk scanning system considers that the full-disk scanning is completed, and directly returns to the state of waiting for receiving the triggering operation); therefore, the starting position of the scanned file needs to be re-specified by adopting the triggering operation with the parameters, that is, the scanning log of the previous scanning operation in step 2 is modified by the set parameters, so as to realize customized full disk scanning again.
The embodiment improves the flexibility of the trigger operation through two forms of the trigger operation. When the trigger operation has a parameter, the parameter is a file index set by an administrator or a user, the scan log of the previous scan operation in step 2 is modified, and customized scan is realized, for example: when the files at the first or a certain designated position of the file system need to be scanned one by one, the position of the file is designated by setting the parameter, and the customized file scanning is realized.
As another aspect of the present disclosure, the present disclosure further provides a terminal implementing a full disk scanning function by using the USN. Fig. 2 is a diagram illustrating a hardware structure of a terminal device according to an embodiment of the present disclosure. The terminal device may be implemented in various forms, and the terminal device in the present disclosure may include, but is not limited to, mobile terminal devices such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation apparatus, a vehicle-mounted terminal device, a vehicle-mounted display terminal, a vehicle-mounted electronic rear view mirror, and the like, and fixed terminal devices such as a digital TV, a desktop computer, and the like. As shown in fig. 2, the terminal device 1100 may include a processor 1120, an input unit 1130, a memory 1140, an output unit 1150, and the like. Fig. 2 shows a terminal device having various components, but it is to be understood that not all of the illustrated components are required to be implemented. More or fewer components may alternatively be implemented.
Among them, the controller 1120 is used to perform the method disclosed in the present disclosure, the input unit 1130 may generate key input data according to a command input by a user to control various operations of the terminal device, and the output unit 1150 is provided with an output signal. The memory 1140 may store software programs or the like for processing and controlling operations performed by the processor 1120, or may temporarily store data that has been output or is to be output. Memory 1140 may include at least one type of storage medium. Also, the terminal device 1100 may cooperate with a network storage that performs a storage function of the memory 1140 by network connection. The processor 1120 generally controls the overall operation of the terminal device.
The applicant declares that the present disclosure illustrates the detailed structural features of the present disclosure through the above-mentioned embodiments, but the present disclosure is not limited to the above-mentioned detailed structural features, i.e. it does not mean that the present disclosure must rely on the above-mentioned detailed structural features for implementation. It will be apparent to those skilled in the art that any modification of the present disclosure, equivalent substitutions of selected elements of the disclosure, additions of auxiliary elements, selection of particular means, etc., are within the scope and disclosure of the present disclosure.
The preferred embodiments of the present disclosure have been described in detail above, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all fall within the protection scope of the present disclosure.
It should be noted that, in the foregoing embodiments, various features described in the above embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, various combinations that are possible in the present disclosure are not described again.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.
Claims (11)
1. A method for realizing full-disk scanning by applying an update serial number USN is used for scanning files of a terminal, and is characterized in that the terminal is provided with a full-disk scanning system and a strategy system, and the following steps are executed:
step 1: the full-disk scanning system receives a trigger operation for scanning a file system;
step 2: the full-disk scanning system acquires a scanning log corresponding to the previous scanning operation from a log system;
and step 3: the full-disk scanning system finds the position of the previous scanning ending according to the scanning log, judges whether the position is the last file of the file system, and if so, turns to the step 4; if not, taking the position of the next file of the position as a file scanning starting point, and turning to the step 5;
and 4, step 4: checking whether a log of the USN has a record needing to be scanned, if so, taking the file position of the USN updating record as a file scanning starting point, if not, completing the scanning, and turning to the step 1;
and 5: the full-disk scanning system takes out a file for analysis and restoration according to the file scanning starting point, and the related information of the file and the file after analysis and restoration are sent to the strategy system;
step 6: the strategy system scans the relevant information of the file and the file after analysis and restoration to obtain a scanning result, and updates the scanning log;
and 7: whether the scanning result is hit or not, if yes, the hit result is sent to the full-disk scanning system, and the step 2 is carried out; if not, turning to the step 2;
the policy system comprises at least one of the following policy rules, and scans files according to the policy rules:
(1) searching a policy rule, wherein the policy rule comprises a list of a series of persons, equipment or catalogues or data identifiers, and scanning the relevant information of the files meeting the list or the data identifiers or the files after analysis and restoration;
(2) a white list policy rule comprising a list of a series of persons, devices or directories, the white list policy rule being free from scanning for the scanned file related information or the parsed and restored file that conforms to the list or the data identifier.
2. The method of claim 1, wherein the full disk scanning system receives results returned by the policy system and stores the results of the scanning in the log system.
3. The method of claim 1, wherein the updating the scan log comprises:
and adding the index of the file index table of the current scanning file into the record of the scanning log.
4. The method of claim 1, wherein before the full disk scanning system receives a trigger to scan the file, the method further comprises:
step 1.1: and the user starts the full-disk scanning function, the full-disk scanning system establishes an index table for all files of the terminal file system, and the index result is cached in the user data file of the full-disk scanning system.
5. The method of claim 1, wherein before the policy system scans the file related information and the parsed and restored file, the policy system comprises:
step 6.1: an administrator or a user sets the policy system and configures a scanning time period;
when the time meets the time period of the configuration scanning, a full-disk scanning system is triggered to scan the file information; or a manual mode is adopted to trigger the full-disk scanning system to scan the file information.
6. The method of claim 1, wherein the policy system scanning the file for information related to the file and the parsed and restored file comprises: and scanning the related information of the file or scanning the file content after the analysis and the reduction.
7. The method of claim 1, wherein data identifiers of some commonly used sensitive contents are preset in the policy system, and the data identifiers comprise: identification card information, business license information, and/or bank card numbers, and provides forward keywords, reverse keywords, fuzzy keywords, and regular expression rules to facilitate configuration of policy rules.
8. The method of claim 1, wherein checking the USN's log for files that need to be scanned comprises:
and checking whether the corresponding file in the record in the USN is scanned by the ongoing scanning process, if so, the file corresponding to the record does not need to be scanned, and if not, the file corresponding to the record needs to be scanned.
9. The method of claim 1, wherein the triggering operation comprises any one of:
(1) a trigger operation having a parameter for modifying a scan log of the previous scan operation in the step 2;
(2) triggering operation without parameters, namely not modifying the scanning log of the previous scanning operation in the step 2;
wherein, the modifying the scan log of the previous scan operation in the step 2 refers to modifying the position of the previous scan cutoff.
10. A terminal device for realizing full-disk scanning by using a USN is characterized in that a full-disk scanning system and a strategy system are deployed on the terminal device;
the full-disk scanning system receives a trigger operation for scanning a file system;
the full-disk scanning system acquires a scanning log corresponding to the previous scanning operation from a log system;
the full-disk scanning system finds out that the position of the last scanning ending is the last file of the file system according to the scanning log, checks whether the log of the USN has a record needing scanning, if so, uses the file position of the USN updating record as the file scanning starting point, and if not, the scanning is completely finished;
the full-disk scanning system finds out that the position of the last scanning ending is not the last file of the file system according to the scanning log, takes the position of the next file of the position as the starting point of file scanning, takes out a file for analysis and restoration according to the starting point of file scanning, and sends the related information of the file and the file after analysis and restoration to a strategy system;
the strategy system scans the relevant information of the file and the file after analysis and restoration to obtain a scanning result, updates the scanning log, and sends the hit result to the full-disk scanning system if the scanning result is hit;
the policy system comprises at least one of the following policy rules, and scans files according to the policy rules:
(1) searching a policy rule, wherein the policy rule comprises a list of a series of persons, equipment or catalogues or data identifiers, and scanning the relevant information of the files meeting the list or the data identifiers or the files after analysis and restoration;
(2) a white list policy rule comprising a list of a series of persons, devices or directories, the white list policy rule being free from scanning for the scanned file related information or the parsed and restored file that conforms to the list or the data identifier.
11. A terminal device for implementing full-disk scanning by using USN is characterized by comprising: a processor, a memory, the processor executing a program on the memory implementing the method of any of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810786552.8A CN109033313B (en) | 2018-07-17 | 2018-07-17 | Method and terminal equipment for realizing full-disk scanning function by using USN |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810786552.8A CN109033313B (en) | 2018-07-17 | 2018-07-17 | Method and terminal equipment for realizing full-disk scanning function by using USN |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109033313A CN109033313A (en) | 2018-12-18 |
CN109033313B true CN109033313B (en) | 2020-09-25 |
Family
ID=64643055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810786552.8A Active CN109033313B (en) | 2018-07-17 | 2018-07-17 | Method and terminal equipment for realizing full-disk scanning function by using USN |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033313B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309683B (en) * | 2020-02-07 | 2023-04-14 | 北京明朝万达科技股份有限公司 | Method and device for scanning full disk data |
US11880459B2 (en) | 2020-04-30 | 2024-01-23 | Siemens Aktiengesellschaft | Method and apparatus for controlling mobile storage device, and computer-readable medium |
CN112528330B (en) * | 2020-12-14 | 2022-12-23 | 建信金融科技有限责任公司 | Log scanning method, device and equipment |
CN112783850B (en) * | 2021-02-09 | 2023-09-22 | 珠海豹趣科技有限公司 | File enumeration method and device based on USN (universal serial bus) log, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105389509A (en) * | 2015-11-16 | 2016-03-09 | 北京奇虎科技有限公司 | Document scanning method and apparatus |
US9465937B1 (en) * | 2008-05-30 | 2016-10-11 | Symantec Corporation | Methods and systems for securely managing file-attribute information for files in a file system |
CN106446707A (en) * | 2016-08-31 | 2017-02-22 | 北京明朝万达科技股份有限公司 | Dynamic data leakage prevention system and method |
CN108009430A (en) * | 2017-12-22 | 2018-05-08 | 北京明朝万达科技股份有限公司 | A kind of sensitive data fast scanning method and device |
CN108052833A (en) * | 2017-12-11 | 2018-05-18 | 北京明朝万达科技股份有限公司 | A kind of executable file anti-data-leakage scan method, system and gateway |
-
2018
- 2018-07-17 CN CN201810786552.8A patent/CN109033313B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9465937B1 (en) * | 2008-05-30 | 2016-10-11 | Symantec Corporation | Methods and systems for securely managing file-attribute information for files in a file system |
CN105389509A (en) * | 2015-11-16 | 2016-03-09 | 北京奇虎科技有限公司 | Document scanning method and apparatus |
CN106446707A (en) * | 2016-08-31 | 2017-02-22 | 北京明朝万达科技股份有限公司 | Dynamic data leakage prevention system and method |
CN108052833A (en) * | 2017-12-11 | 2018-05-18 | 北京明朝万达科技股份有限公司 | A kind of executable file anti-data-leakage scan method, system and gateway |
CN108009430A (en) * | 2017-12-22 | 2018-05-08 | 北京明朝万达科技股份有限公司 | A kind of sensitive data fast scanning method and device |
Non-Patent Citations (1)
Title |
---|
《公安内网敏感信息监测系统技术研究》;李锁雷等;《警察技术》;20171231;正文第1段-倒数第1段 * |
Also Published As
Publication number | Publication date |
---|---|
CN109033313A (en) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109033313B (en) | Method and terminal equipment for realizing full-disk scanning function by using USN | |
US10509905B2 (en) | Ransomware mitigation system | |
CN104699423B (en) | The method and apparatus that drive is bound in linux system | |
US20070208826A1 (en) | System and method of storing data files at a remote storage facility | |
US10402181B2 (en) | Generating and optimizing deployment configurations for enrolled devices | |
US10405156B2 (en) | Managed device migration and configuration | |
US10956383B2 (en) | Device backup and wipe | |
CN109359091B (en) | File management method, device, terminal and computer readable storage medium | |
MX2007014899A (en) | Back-off mechanism for search. | |
US10521423B2 (en) | Apparatus and methods for scanning data in a cloud storage service | |
CN107016123B (en) | File management method and terminal device | |
CN104536792A (en) | Method and device for eliminating application program residual files | |
US20140223535A1 (en) | Information processing system, information processing device, and authentication information management method | |
US20210271491A1 (en) | Application processing method, device, electronic device and storage medium | |
CN114461691A (en) | Control method and device of state machine, electronic equipment and storage medium | |
CN111614730B (en) | File processing method and device of cloud storage system and electronic equipment | |
CN111090882B (en) | Operation control method, device and equipment for redis database | |
CN109117153A (en) | Processing method, device, terminal and the storage medium of application program | |
US20140365430A1 (en) | Information processing apparatus, system, and control method | |
US20200045085A1 (en) | Authentication method for anonymous account and server | |
US20230319072A1 (en) | Proxy services for the secure upload of file system tree structures | |
CN113407999B (en) | File protection method, computing device and storage medium | |
US20170094502A1 (en) | Management method, management device and terminal for contacts in terminal | |
CN114861160A (en) | Method, device, equipment and storage medium for improving non-administrator account authority | |
US20210103577A1 (en) | Reliable detection of deleted assets in data stores |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |