CN108985095B - Non-public file access method, system, electronic equipment and storage medium - Google Patents

Non-public file access method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN108985095B
CN108985095B CN201810731977.9A CN201810731977A CN108985095B CN 108985095 B CN108985095 B CN 108985095B CN 201810731977 A CN201810731977 A CN 201810731977A CN 108985095 B CN108985095 B CN 108985095B
Authority
CN
China
Prior art keywords
digital signature
module
signature information
public file
unidentified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810731977.9A
Other languages
Chinese (zh)
Other versions
CN108985095A (en
Inventor
杜琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN201810731977.9A priority Critical patent/CN108985095B/en
Publication of CN108985095A publication Critical patent/CN108985095A/en
Application granted granted Critical
Publication of CN108985095B publication Critical patent/CN108985095B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a system and a device for accessing non-public files and a computer readable storage medium, wherein the method comprises the following steps: when an access request of a process to a non-public file is detected, acquiring digital signature information of the process; judging whether a pre-stored digital signature white list comprises digital signature information of the process; if not, intercepting the access request of the process. According to the non-public file access method, the trusted white list (such as the digital signature list) is set in the filter layer in a digital signature mode, and a hacker must crack the digital signature when invading the non-public file.

Description

Non-public file access method, system, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a system for accessing a non-public file, an electronic device, and a computer-readable storage medium.
Background
With the development of communication technology, users store more and more data on terminal devices, wherein the data include many private information of individuals, namely non-public files, such as private contacts, private photos, private documents and the like, and even store some confidential information of businesses in the terminal devices. The data is stored on the terminal equipment, which brings great convenience to life and work of people, but also greatly increases the possibility of user information leakage.
For the access of the non-public file, a filter layer intercepting and white list setting mode is generally adopted in the prior art, that is, when an access request of a process to the non-public file is detected, process information is obtained, whether the process information exists in the white list preset on the filter layer is judged, if yes, the process is allowed to access the non-public file, and if not, the access operation of the process is intercepted. Based on the filtering method, a hacker can cut in from the white list of the filtering layer and add the risk process into the white list, so that the non-public files can be freely accessed, and the security of the non-public files is low.
Therefore, how to improve the safety of the non-public documents is a problem to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a non-public file access method, a non-public file access system, an electronic device and a computer readable storage medium, and safety of the non-public file is improved.
In order to achieve the above object, the present application provides a non-public file access method, including:
when an access request of a process to a non-public file is detected, acquiring digital signature information of the process;
judging whether a pre-stored digital signature white list comprises digital signature information of the process;
if not, intercepting the access request of the process.
Wherein, acquiring the digital signature information of the process comprises:
and acquiring an executable file of the process, and acquiring the digital signature information of the process through the executable file.
If the digital signature information of the process is not acquired, intercepting an access request of the process.
Wherein the digital signature information includes requestor identification information of the process.
After intercepting the access request of the process, the method further comprises the following steps:
and sending alarm information to the user side according to the process information of the process.
Wherein, still include:
when an unidentified module is detected to exist in a process space, acquiring digital signature information of the unidentified module;
judging whether the digital signature information white list comprises the digital signature information of the unidentified module;
and if not, removing the unidentified module from the process space.
Wherein, after removing the unidentified module from the process space, the method further comprises:
and sending alarm information to the user side according to the module information of the unidentified module.
To achieve the above object, the present application provides a non-public file access system, comprising:
the system comprises a first acquisition module, a second acquisition module and a first processing module, wherein the first acquisition module is used for acquiring digital signature information of a process when an access request of the process to a non-public file is detected;
the first judgment module is used for judging whether a pre-stored digital signature white list comprises the digital signature information of the process;
and the interception module is used for intercepting the access request of the process when the digital signature information does not exist in the digital signature list in the memory.
To achieve the above object, the present application provides an electronic device including:
a memory for storing a computer program;
a processor for implementing the steps of the non-public file access method as described above when executing said computer program.
To achieve the above object, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the non-public file access method as described above.
According to the scheme, the non-public file access method provided by the application comprises the following steps: when an access request of a process to a non-public file is detected, acquiring digital signature information of the process; judging whether a pre-stored digital signature white list comprises digital signature information of the process; if not, intercepting the access request of the process.
According to the non-public file access method, the process for accessing the non-public file is required to have legal digital signature information, and when the process requests to access the non-public file, the non-public file can be accessed only if the digital signature information of the process is in a digital signature white list. That is to say, according to the non-public file access method provided by the embodiment of the application, by setting the trusted white list of the digital signature, a hacker must crack the digital signature when invading the non-public file, compared with the prior art, the cracking difficulty is higher, the risk of invading the white list by the hacker is greatly reduced, and the security of the non-public file is improved. The application also discloses a non-public file access system, an electronic device and a computer readable storage medium, which can also achieve the technical effects.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a non-public document access method disclosed in an embodiment of the present application;
FIG. 2 is a flow chart of another non-public document access method disclosed in an embodiment of the present application;
FIG. 3 is a block diagram of a non-public document access system disclosed in an embodiment of the present application;
FIG. 4 is a block diagram of another non-public file access system disclosed in an embodiment of the present application;
fig. 5 is a block diagram of an electronic device disclosed in an embodiment of the present application;
fig. 6 is a block diagram of another electronic device disclosed in the embodiments of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application discloses a non-public file access method, which improves the safety of non-public files.
Referring to fig. 1, a flowchart of a non-public file access method disclosed in an embodiment of the present application is shown in fig. 1, and includes:
s101: when an access request of a process to a non-public file is detected, acquiring digital signature information of the process;
preferably, the non-public file access method provided by the embodiment of the present invention may be executed in a filter layer, that is, the filter layer is set at a client where a process initiating access is located and/or a terminal where the non-public file is located, and is configured to intercept an access request of the process for the non-public file, and when the access request is detected, obtain digital signature information of the process.
The non-public files in the present embodiment may include office software documents in various formats, media files in various formats, and other types of files, which are not specifically limited herein. The embodiment also does not limit the selection manner of the non-public file, for example, the user may directly set a certain file as the non-public file in the property bar of the file on the device, or may set the certain file as the non-public file by performing a preset operation on the certain file.
It will be appreciated that this step defaults to each process that is allowed to access non-public documents having its corresponding digital signature. In a specific implementation, a digital signature may be issued by GlobalSign (global certificate authority) for each device requesting access to a non-public file, i.e., a digital signature of a process initiated by the device to access the non-public file. The device may be a mobile device such as a mobile phone, a tablet computer, a notebook computer, or other devices such as a desktop computer.
The specific form of the digital signature is not limited in this embodiment, and those skilled in the art can flexibly select the digital signature according to the actual situation, and as a preferred embodiment, the digital signature may include requester identification information of the process, for example, a name and a signature id of a requester who initiates the access request.
In a specific implementation, when an access request of a process is detected, a digital signature of the process is acquired and the process proceeds to step S102. Specifically, an executable file of the process may be obtained, and the digital signature information of the process may be determined by the executable file. It can be understood that if the digital signature information of the process is not obtained, for example, if the process does not have the digital signature information, the access request of the process can be directly intercepted.
S102: judging whether a pre-stored digital signature white list comprises digital signature information of the process; if yes, entering S131; if not, the process goes to S132;
s131: allowing the process to access the non-public file;
it will be appreciated that this step is by default pre-stored with the digitally signed white list, i.e. the process that owns the digital signature in the digitally signed white list has access to the non-public file. It should be noted that the digital signature white list may be stored in the filter layer, and when the filter layer intercepts the access request of the process, the filter layer performs the filtering of the digital signature in time. When the digital signature white list includes the digital signature information of the process, the access request of the process is allowed, and if the access request does not exist, the process proceeds to S132.
The digital signature list is generated for the Globalsign and stored in the filter layer, so that the security is high, when a hacker invades the non-public file, the digital signature must be cracked, the cracking difficulty is high, the risk of the hacker invading the white list is greatly reduced, and the security of the non-public file is improved.
S132: an access request of the process is intercepted.
In a specific implementation, when the digital signature information of the process does not exist in the digital signature white list, the access request of the process is intercepted. As a preferred embodiment, after intercepting the access request of the process, the method further includes sending an alarm message to the user side according to the process information of the process. The specific manner of the alarm is not limited herein, and those skilled in the art can flexibly select the alarm according to the actual situation, for example, the alarm can be issued by displaying the process information of the process.
According to the non-public file access method provided by the embodiment of the application, the process accessing the non-public file is required to have legal digital signature information, and when the process requests to access the non-public file, the non-public file can be accessed only if the digital signature information of the process is in a digital signature white list. That is to say, according to the non-public file access method provided by the embodiment of the application, the trusted white list (such as the digital signature list) is set on the filter layer in a digital signature mode, and a hacker must crack the digital signature when invading the non-public file.
It should be noted that, in order to further ensure the security of the non-public file, each module of the process may be monitored in real time while the non-public file access method provided in the previous embodiment is executed, specifically:
referring to fig. 2, the non-public file access method provided in the embodiment of the present application may further include:
s201: when an unidentified module is detected to exist in a process space, acquiring digital signature information of the unidentified module;
in a specific implementation, each module (e.g., thread, function, or the like) of the process is monitored in real time, and if there is an unidentified module, the unidentified module may be an illegal module, for example, an injection attack from a remote thread, an APC (Asynchronous process Call) injection attack, or the like. S202: judging whether the digital signature information white list comprises the digital signature information of the unidentified module; if yes, go to S231; if not, entering S232;
s231: allowing the module to be identified to join the process space;
in particular implementations, software developed by companies such as microsoft, Tencent, Baidu, etc. have their own official signature information, which may also be stored on a white list of digital signature information. And when the filter layer monitors that the module is not identified, the digital signature information of the module is screened in time. And when the white list of the digital signature information comprises the digital signature information of the unidentified module, allowing the module to be added into the process space, namely allowing the process containing the module to access the non-public file, and if the process does not exist, entering S232.
S232: and removing the module to be identified from the process space.
It should be noted that, in the embodiment of the present application, each module in the process space of each process accessing a non-public document may be monitored, and of course, in another implementation, each module in the process space of another process running in the system may also be monitored, which is not limited herein.
In a specific implementation, when the white list of digital signature information includes digital signature information of unidentified modules, the unidentified modules are removed from the process space. As a preferred embodiment, after the unidentified module is removed from the process space, sending an alarm message to the user side according to the module information of the unidentified module. The specific manner of the alarm is not limited here, and those skilled in the art can flexibly select the alarm according to the actual situation, for example, the alarm can be issued by displaying the module information of the module.
Therefore, according to the non-public file access method provided by the embodiment of the application, each module of a process is required to have legal digital signature information, when an unidentified module exists in a process space, only the module with the official signature information is allowed to be added into the process space, and through monitoring each module in the process space, an illegal module can be prevented from being injected into the process, so that the safety of the non-public file is further improved.
In the following, a non-public file access system provided by an embodiment of the present application is introduced, and a non-public file access system described below and a non-public file access method described above may be referred to each other.
Referring to fig. 3, a structure diagram of a non-public file access system provided in an embodiment of the present application is shown in fig. 3, and includes:
a first obtaining module 301, configured to obtain digital signature information of a process when an access request of the process to a non-public file is detected;
a first judging module 302, configured to judge whether a pre-stored digital signature white list includes digital signature information of the process;
an intercepting module 303, configured to intercept the access request of the process when the digital signature information does not exist in the digital signature list in the memory.
The non-public file access system provided by the embodiment of the application requires that a process accessing a non-public file has legal digital signature information, and when the process requests to access the non-public file, the non-public file can be accessed only if the digital signature information of the process is in a digital signature white list. That is to say, according to the non-public file access method provided by the embodiment of the application, the trusted white list (such as the digital signature list) is set on the filter layer in a digital signature mode, and a hacker must crack the digital signature when invading the non-public file.
On the basis of the foregoing embodiment, as a preferred implementation manner, the first obtaining module 301 is specifically a module that obtains an executable file of a process when detecting an access request of the process to a non-public file, and obtains digital signature information of the process through the executable file.
On the basis of the above embodiment, as a preferred implementation, the digital signature information includes requester identification information of the process.
On the basis of the above embodiment, as a preferred implementation, the method further includes:
and the first alarm module is used for sending alarm information to the user side according to the process information of the process.
The embodiment of the application discloses a non-public file access system, and compared with the previous embodiment, the embodiment further explains and optimizes the technical scheme. Specifically, the method comprises the following steps:
referring to fig. 4, the non-public file access system provided in the embodiment of the present application may further include:
a second obtaining module 401, configured to obtain, when it is detected that an unidentified module exists in a process space, digital signature information of the unidentified module;
a second determining module 402, configured to determine whether the white list of digital signature information includes the digital signature information of the unidentified module; if not, starting the working process of the eliminating module;
the culling module 403 is configured to cull the unidentified module from the process space.
On the basis of the above embodiment, as a preferred implementation, the method further includes:
and the second alarm module is used for sending alarm information to the user side according to the module information of the unidentified module.
The present application further provides an electronic device, referring to fig. 5, a structure diagram of an electronic device provided in an embodiment of the present application, as shown in fig. 5, includes:
a memory 100 for storing a computer program;
the processor 200, when executing the computer program, may implement the steps provided by the above embodiments.
In particular, the memory 100 may include a nonvolatile storage medium, an internal memory. The non-volatile storage medium stores an operating system and computer-readable instructions, and the internal memory provides an environment for the operating system and the computer-readable instructions in the non-volatile storage medium to run.
The processor 200 provides computing and control capabilities for the electronic device, and when executing the computer program stored in the memory 100, the non-public file access method as described in the foregoing embodiments can be implemented, for example, including the following steps: when an access request of a process to a non-public file is detected, acquiring digital signature information of the process; judging whether a pre-stored digital signature white list comprises digital signature information of the process; if not, intercepting the access request of the process.
The electronic device provided by the embodiment of the application requires that a process accessing a non-public file has legal digital signature information, and when the process requests to access the non-public file, the non-public file can be accessed only if the digital signature information of the process is in a digital signature white list. That is to say, according to the non-public file access method provided by the embodiment of the application, the trusted white list (such as the digital signature list) is set on the filter layer in a digital signature mode, and a hacker must crack the digital signature when invading the non-public file.
Preferably, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and acquiring an executable file of the process, and acquiring the digital signature information of the process through the executable file.
Preferably, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and if the digital signature information of the process is not acquired, intercepting an access request of the process.
Preferably, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and sending alarm information to the user side according to the process information of the process.
Preferably, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: when an unidentified module is detected to exist in a process space, acquiring digital signature information of the unidentified module; judging whether the digital signature information white list comprises the digital signature information of the unidentified module; and if not, removing the unidentified module from the process space.
Preferably, when the processor 200 executes the computer subprogram stored in the memory 100, the following steps can be implemented: and sending alarm information to the user side according to the module information of the unidentified module.
On the basis of the above embodiment, as a preferred implementation, referring to fig. 6, the electronic device further includes:
and an input interface 300 connected to the processor 200, for acquiring computer programs, parameters and instructions imported from the outside, and storing the computer programs, parameters and instructions into the memory 100 under the control of the processor 200. The input interface 300 may be connected to an input device for receiving parameters or instructions manually input by a user. The input device may be a touch layer covered on a display screen, or a button, a track ball or a touch pad arranged on a terminal shell, or a keyboard, a touch pad or a mouse, etc.
And a display unit 400 connected to the processor 200 for displaying data transmitted by the processor 200. The display unit 400 may be a display screen on a PC, a liquid crystal display screen, or an electronic ink display screen. Specifically, in the present embodiment, the abnormal progress information, the abnormal module information, and the like may be displayed through the display unit 400.
And a network port 500 connected to the processor 200 for performing communication connection with each external terminal device. The communication technology adopted by the communication connection can be a wired communication technology or a wireless communication technology, such as a mobile high definition link (MHL) technology, a Universal Serial Bus (USB), a High Definition Multimedia Interface (HDMI), a wireless fidelity (WiFi), a bluetooth communication technology, a low power consumption bluetooth communication technology, an ieee802.11 s-based communication technology, and the like. Specifically, in this embodiment, a digital signature list or the like may be imported to the processor 200 through the network port 500.
The present application also provides a computer-readable storage medium, which may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. The storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of: when an access request of a process to a non-public file is detected, acquiring digital signature information of the process; judging whether a pre-stored digital signature white list comprises digital signature information of the process; if not, intercepting the access request of the process.
The method and the device require that a process accessing the non-public file has legal digital signature information, and when the process requests to access the non-public file, the process can access the non-public file only if the digital signature information of the process is in a digital signature white list. That is to say, according to the non-public file access method provided by the embodiment of the application, the trusted white list (such as the digital signature list) is set on the filter layer in a digital signature mode, and a hacker must crack the digital signature when invading the non-public file.
Preferably, when executed by the processor, the computer sub-program stored in the computer-readable storage medium may specifically implement the following steps: and acquiring an executable file of the process, and acquiring the digital signature information of the process through the executable file.
Preferably, when executed by the processor, the computer sub-program stored in the computer-readable storage medium may specifically implement the following steps: and if the digital signature information of the process is not acquired, intercepting an access request of the process.
Preferably, when executed by the processor, the computer sub-program stored in the computer-readable storage medium may specifically implement the following steps: and sending alarm information to the user side according to the process information of the process.
Preferably, when executed by the processor, the computer sub-program stored in the computer-readable storage medium may specifically implement the following steps: when an unidentified module is detected to exist in a process space, acquiring digital signature information of the unidentified module; judging whether the digital signature information white list comprises the digital signature information of the unidentified module; and if not, removing the unidentified module from the process space.
Preferably, when executed by the processor, the computer sub-program stored in the computer-readable storage medium may specifically implement the following steps: and sending alarm information to the user side according to the module information of the unidentified module.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (9)

1. A non-public file access method, comprising:
when an access request of a process to a non-public file is detected, acquiring digital signature information of the process;
judging whether a pre-stored digital signature white list comprises digital signature information of the process;
if not, intercepting an access request of the process;
wherein, still include:
monitoring each module of a process in real time, and acquiring digital signature information of an unidentified module when detecting that the unidentified module exists in a process space;
judging whether the digital signature information white list comprises the digital signature information of the unidentified module;
and if not, removing the unidentified module from the process space.
2. The non-public file access method of claim 1, wherein obtaining the digital signature information of the process comprises:
and acquiring an executable file of the process, and acquiring the digital signature information of the process through the executable file.
3. The non-public file access method according to claim 1, wherein if the digital signature information of the process is not acquired, the access request of the process is intercepted.
4. The non-public file access method of claim 1, wherein the digital signature information includes requestor identification information of the process.
5. The non-public file access method according to claim 1, further comprising, after intercepting the access request of the process:
and sending alarm information to the user side according to the process information of the process.
6. The non-public file access method of claim 1, wherein after removing the unidentified module from the process space, further comprising:
and sending alarm information to the user side according to the module information of the unidentified module.
7. A non-public file access system, comprising:
the system comprises a first acquisition module, a second acquisition module and a first processing module, wherein the first acquisition module is used for acquiring digital signature information of a process when an access request of the process to a non-public file is detected;
the first judgment module is used for judging whether a pre-stored digital signature white list comprises the digital signature information of the process;
the interception module is used for intercepting the access request of the process when the digital signature information does not exist in a digital signature list in the memory;
wherein, still include:
the second acquisition module is used for monitoring each module of the process in real time, and acquiring the digital signature information of an unidentified module when detecting that the unidentified module exists in the process space;
the second judgment module is used for judging whether the digital signature information white list comprises the digital signature information of the unidentified module; if not, starting the working process of the eliminating module;
the removing module is used for removing the unidentified module from the process space.
8. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the non-public file access method according to any one of claims 1 to 6 when executing said computer program.
9. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the non-public file access method according to any one of claims 1 to 6.
CN201810731977.9A 2018-07-05 2018-07-05 Non-public file access method, system, electronic equipment and storage medium Active CN108985095B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810731977.9A CN108985095B (en) 2018-07-05 2018-07-05 Non-public file access method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810731977.9A CN108985095B (en) 2018-07-05 2018-07-05 Non-public file access method, system, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108985095A CN108985095A (en) 2018-12-11
CN108985095B true CN108985095B (en) 2022-04-01

Family

ID=64536180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810731977.9A Active CN108985095B (en) 2018-07-05 2018-07-05 Non-public file access method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108985095B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059499A (en) * 2019-03-22 2019-07-26 华为技术有限公司 A kind of file access purview certification method and electronic equipment
CN110222508A (en) * 2019-06-12 2019-09-10 深圳市网心科技有限公司 Extort virus defense method, electronic equipment, system and medium
CN111931192B (en) * 2020-09-10 2021-01-26 杭州海康威视数字技术股份有限公司 rootkit detection method and device and electronic equipment
CN112383548A (en) * 2020-11-13 2021-02-19 杭州弗兰科信息安全科技有限公司 Database access method, transmitting device, receiving device and terminal host
CN115906184B (en) * 2023-01-09 2023-06-16 闪捷信息科技有限公司 Method, device, medium and electronic equipment for controlling process to access files

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855274A (en) * 2012-07-17 2013-01-02 北京奇虎科技有限公司 Method and device for detecting suspicious progresses
CN103685151A (en) * 2012-09-03 2014-03-26 腾讯科技(深圳)有限公司 Account number single sign on protecting method and device
CN103795703A (en) * 2011-04-18 2014-05-14 北京奇虎科技有限公司 Method for ensuring user network security and client
CN106326699A (en) * 2016-08-25 2017-01-11 广东七洲科技股份有限公司 Method for reinforcing server based on file access control and progress access control
CN107506642A (en) * 2017-08-10 2017-12-22 四川长虹电器股份有限公司 The method and system for preventing file from being damaged by malicious operation behavior

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110036426A (en) * 2009-10-01 2011-04-07 윤성진 System and method for backtracing stack
CN103679035B (en) * 2012-09-24 2016-12-28 腾讯科技(深圳)有限公司 Safety detecting method and device
CN108197475B (en) * 2018-01-11 2020-12-08 广州汇智通信技术有限公司 Malicious so module detection method and related device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795703A (en) * 2011-04-18 2014-05-14 北京奇虎科技有限公司 Method for ensuring user network security and client
CN102855274A (en) * 2012-07-17 2013-01-02 北京奇虎科技有限公司 Method and device for detecting suspicious progresses
CN103685151A (en) * 2012-09-03 2014-03-26 腾讯科技(深圳)有限公司 Account number single sign on protecting method and device
CN106326699A (en) * 2016-08-25 2017-01-11 广东七洲科技股份有限公司 Method for reinforcing server based on file access control and progress access control
CN107506642A (en) * 2017-08-10 2017-12-22 四川长虹电器股份有限公司 The method and system for preventing file from being damaged by malicious operation behavior

Also Published As

Publication number Publication date
CN108985095A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN108985095B (en) Non-public file access method, system, electronic equipment and storage medium
US9712565B2 (en) System and method to provide server control for access to mobile client data
CN106534277B (en) Data sharing method and device
Ferreira et al. Securacy: an empirical investigation of Android applications' network usage, privacy and security
EP2852913B1 (en) Method and apparatus for determining malicious program
US9246918B2 (en) Secure application leveraging of web filter proxy services
US20130333039A1 (en) Evaluating Whether to Block or Allow Installation of a Software Application
CN112703496B (en) Content policy based notification to application users regarding malicious browser plug-ins
US9858400B2 (en) Information processing system, terminal, and authentication method
EP3021250B1 (en) Electronic device and method for suggesting response manual in occurrence of denial
CN107483503A (en) A kind of application program login method, apparatus and system
JP4850159B2 (en) External device management system
CN109190376B (en) Webpage Trojan horse detection method and system, electronic equipment and storage medium
CN111274598B (en) Privacy protection method and device
JP6354382B2 (en) Authentication system, authentication method, authentication apparatus, and program
CN109948341B (en) File scanning method, system, device and medium
CN108804122B (en) Information security processing system, virtual dedicated server, and control method thereof
KR101331075B1 (en) Method of filtering application framework for portable device and apparatus for performing the same
US20140074906A1 (en) Information processing apparatus, system, and method
US20140283132A1 (en) Computing application security and data settings overrides
CN111092867A (en) SSH back door account detection method and device, electronic equipment and storage medium
US20180144155A1 (en) System and method for confidential data management
JP7268742B2 (en) Policy evaluation device, control method, and program
US11902327B2 (en) Evaluating a result of enforcement of access control policies instead of enforcing the access control policies
CN115348261A (en) 5G-based cloud trusted data processing method and device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant