CN102609637A - Audit protection system for data leakage - Google Patents

Audit protection system for data leakage Download PDF

Info

Publication number
CN102609637A
CN102609637A CN2011104288207A CN201110428820A CN102609637A CN 102609637 A CN102609637 A CN 102609637A CN 2011104288207 A CN2011104288207 A CN 2011104288207A CN 201110428820 A CN201110428820 A CN 201110428820A CN 102609637 A CN102609637 A CN 102609637A
Authority
CN
China
Prior art keywords
file
user terminal
record
path
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104288207A
Other languages
Chinese (zh)
Inventor
林艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING UVIC SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
BEIJING UVIC SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING UVIC SOFTWARE TECHNOLOGY Co Ltd filed Critical BEIJING UVIC SOFTWARE TECHNOLOGY Co Ltd
Priority to CN2011104288207A priority Critical patent/CN102609637A/en
Publication of CN102609637A publication Critical patent/CN102609637A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an audit protection system for data leakage, wherein a client system and a management end system are arranged on a user terminal and a server in an internal network manner; a client system is used to monitor the using situation of programs and files of the user terminal at any time to generate operation record and screenshot record of the target file or the program, and the operation record and screenshot record of the target file or the program are collected in operation historical record database and screenshot historical record data base of the server so as to form text and video track record during the target operation in the management end system, therefore, all process of data leakage are flexibly reproduced, so that the file leakage and responsibility track can be well documented, the anti-leaking effect is obvious, the protection process is safe and reliable, and the audit protection system is particularly suitable for being installed in units such as enterprises, institutions, offices and so on.

Description

Data disclosure audit guard system
Technical field
The present invention relates to a kind of data security guard system based on internal network, particularly a kind of is the data disclosure audit guard system of main means with data tracing protection and computer screenshotss, belongs to network security control field.
Background technology
Along with popularizing of network, network security becomes the emphasis of enterprise, office, public institution's concern.In recent years, also have the fileinfo that contains security requirements more, revealed to the external world by spiteful inner related personnel, as: the employee of credit card company reveals customer information; The enterprise key technology is replicated or leaks; Advertising agency reveals artist's privacy; The bank clerk reveals customer account information or the like, data disclosure occur at any time we everyone at one's side, and directly or indirectly have influence on our life, even brought serious harm for the survival and development of enterprise.
But in the reality, along with the high speed development of mechanics of communication, utilize just easily receiving and dispatching mail, download or storage file such as floppy disk, CD CD, messenger, mailbox program, mobile memory, operating process is simple, quick, and is disguised higher.But because of need of work, the use of completely forbidding this type of application program is also unrealistic, and this has just brought greatly trouble to management work.And in a single day vital document illegally leaks, and through the propagation of internet, velocity of propagation will be very fast, even catch and investigated and prosecuted leakage person, also possibly all regain or delete the file of leakage hardly.So the illegal sequelae of revealing of file will continue the long duration, the influence power of revealing file also will constantly ferment, enlarge, and the extent of injury is inestimable.
Safety for guarantee company, enterprise, machine-operated internal information; Except paying attention to cultivating Employee Security consciousness at ordinary times; Form good safety custom; Outside the voluntary observance security regulations, set up a data guard system, network environment is monitored in real time just become essential based on the internal network environment.
Summary of the invention
In view of above-mentioned existing situation; The present invention aim to provide a kind of with private data follow the trail of protection and computer screenshotss be means, the track record data disclosure of the generating process guard system of auditing of divulging a secret at any time; Protective capacities and protection deterrent force to improve private data guarantee the security of enterprise, cause, institutional settings data information.
The present invention realizes through following technical scheme:
A kind of data disclosure audit guard system comprises FTP client FTP and management end system based on internal network, and FTP client FTP is installed on the user terminal with cipher mode, and the management end system is installed on the management server. concrete steps comprise:
A, management end system at first set up user terminal ID, for each user terminal ID formulates security personnel's policy rank and sends in the FTP client FTP at respective user terminal.
B, FTP client FTP are monitored user terminal according to security personnel's policy rank; At any time trigger the correlation means in the FTP client FTP; Make the screenshotss record of file operation logout, procedure operation logout and operational process to corresponding document, and be sent in real time in the management end system.
The content of said monitoring comprises the one or more combination in the file that application program takes place generates, reads, preserves, renames, duplicates, moves, deletes; One or more combination in the making of specific file, printing, coding, the Flame Image Process, and the one or more combination of passing through the file transmission of coded program, net dish, mobile memory, web browser, MSN, mailbox program, the generation of network communication program;
C, management end system receive file operation logout, procedure operation logout and screenshotss record, set up operation history run database of record and screenshotss historical record data storehouse, and at any time each FTP client FTP ruuning situation are monitored and managed.
Integrality and operation conditions that the monitoring and the management of FTP client FTP comprised the monitor client system; When integrality and operation are in de-asserted state; Information and data through with the management end system transmit, and keep the FTP client FTP complete sum to be in running status at any time.
D, the utilization operation history run record data library searching of management end system are also created file destination operation operation track record; And/or according to the library searching of screenshotss historical record data and set up the screenshotss tracking image; Through generating video after the video editing, accomplish the literal and/or the video frequency tracking of user terminal object run process.
E, management end system reveal through deletion of database grooming means and file to be had directly and all operations logout and the screenshotss record collected outside the time period of indirect association.
Said correlation means comprises that File Agent means, Application Agent means, network agent means, print agent means, screen interception act on behalf of means and Correspondent means.
One or more combination during the file that said File Agent means take place according to application program generates, reads, preserves, renames, duplicates, moves, deletes; Making comprises that the file operation logout of the program name of source path and the destination path of starting point, filename, file, file destination name, mode of operation, triggered file operation, Program path, file backup takes place for user terminal ID, operation, and is saved in the assigned catalogue.
Said Application Agent means are according to the one or more combination in specific file making, coding, the Flame Image Process; And the one or more combination of passing through the file transmission of coded program, net dish, mobile memory, web browser, MSN, the generation of mailbox program; Read file name, source path and storing path through the File Agent means; Making comprises source path and destination path, file destination name, firing event program name and the path that starting point, filename, file take place for user terminal ID, operation; And file data backup is at interior application program operation logout, and is kept in the assigned catalogue.
The network communication program file information that said network agent means transmit to network according to user terminal; Comprise terminal service, telnet service or FTP service; Making comprises that the flow process and the path thereof of the source path of starting point, filename, file, file destination path, file destination name, initiation take place for user terminal ID, operation; And file data backup is at interior communication program operation logout, and is saved in the assigned catalogue;
Said print agent means read file name, source path and storing path through the File Agent means; Making comprises source path and destination path, file destination name, firing event program name and the path that starting point, filename, file take place for user terminal ID, operation; And file data backup is at interior print routine operation logout, and is kept in the assigned catalogue;
The triggering of means according to File Agent means, Application Agent means, print agent means or network agent means acted on behalf of in said screen interception; And the cycle of security personnel's policy grade setting carry out the user terminal screen interception; Generate the screenshotss image file; Making comprises that the screenshotss record of the corresponding operational process of the program name of source path and the destination path of starting point, filename, file, file destination name, mode of operation, triggered file operation, Program path, screenshotss information takes place for user terminal ID, operation, and is kept in the assigned catalogue;
Logout and screenshotss record that said Correspondent means will be kept in the assigned catalogue at any time are sent in the management end system.
A kind of data disclosure audit guard system of the present invention through the internal network ways of connecting, is installed FTP client FTP and management end system respectively on user terminal and server; Utilize FTP client FTP to monitor each user terminal program and file operating position at any time; Generate the operation logout and the screenshotss record of file destination or program, and be summarised in the operation history run database of record and screenshotss historical record data storehouse of server, thereby in the management end system, finally form the literal and the video tracking record of object run process; Reproduced all processes of data disclosure flexibly; File leakage and responsibility are followed the trail of have good grounds, the anti-effect of divulging a secret is obvious, simultaneously; Because database is in setting up process; Also the original content is backed up, avoided the harm that file is lost or artificial malice deletion brings, improved reliability and security that guard system uses.After installation data is revealed the audit guard system, can effectively improve and establish operating personnel's awareness of safety, cultivate the anti-custom of divulging a secret, ensure information safety, be particularly suitable for installing and using at internal institutions such as enterprise, cause, offices.
Embodiment
Center of the present invention is: through between user terminal and server, setting up data disclosure audit guard system; Utilize system to monitor the program and the file operating position of each user terminal at any time; To set up operation history run database of record and screenshotss historical record data storehouse is means, and the track record of literal and video is carried out in operating process, reproduces the data disclosure process flexibly; Thereby establish operating personnel's awareness of safety, avoid leak case to take place.
A kind of data disclosure audit guard system of the present invention comprises FTP client FTP and management end system based on internal network.Internal network is the network in the internal environment that is in that separates with extraneous LANs such as similar internets.Internal network forms a relatively independent internal network environment by router and fire wall and extraneous network detach.FTP client FTP is installed on the user terminal with cipher mode, and ciphering process both can be software cryptography, also can be hardware enciphers such as softdog, to guarantee the security and the independence of FTP client FTP use.The management end system is installed on the management server, is distributed in the FTP client FTP on the different user terminals through server admin, realizes unification, coordination, effective, real-time management.
Concrete protection process is:
Step 1, management end system at first set up user terminal ID, send in the FTP client FTP at respective user terminal for each user terminal ID formulation security personnel's policy rank and through internal network.
User terminal ID has uniqueness as unique identification code, is the basis of network management.Security personnel's policy rank is based on the security strategy that user terminal is provided with; Monitored object, monitoring period and the monitoring range of having formed user terminal; The user terminal that installs FTP client FTP at first receives the security personnel's policy rank from the management end system; After carrying out encryption, make its standard and criterion of constituting monitor procedure, whole process instructs monitor procedure smoothly, carry out in order.
Step 2, FTP client FTP are monitored user terminal according to security personnel's policy rank; At any time trigger the correlation means in the FTP client FTP; Make the screenshotss record of file operation logout, procedure operation logout and operational process to corresponding document, and be sent in real time in the management end system.
Wherein, The content of monitoring comprises the one or more combination in the file that application program takes place generates, reads, preserves, renames, duplicates, moves, deletes; One or more combination in the making of specific file, printing, coding, the Flame Image Process, and the one or more combination of passing through the file transmission of coded program, net dish, mobile memory, web browser, MSN, mailbox program, the generation of network communication program.And comprise that with the corresponding trigger means of monitoring content File Agent means, Application Agent means, network agent means, print agent means, screen interception act on behalf of means and Correspondent means.These type of means are arranged on the user terminal through FTP client FTP, carry out corresponding triggering and work, the operation at supervisory user terminal and operating position according to the rank of the policy of ensuring public security separately at any time.As:
One or more combination during the file that the File Agent means take place according to application program generates, reads, preserves, renames, duplicates, moves, deletes; Making comprises that the file operation logout of the program name of source path and the destination path of starting point, filename, file, file destination name, mode of operation, triggered file operation, Program path, file backup takes place for user terminal ID, operation, and is saved in the assigned catalogue.
The Application Agent means are according to the one or more combination in specific file making, coding, the Flame Image Process; And the one or more combination of passing through the file transmission of coded program, net dish, mobile memory, web browser, MSN, the generation of mailbox program; Read file name, source path and storing path through the File Agent means; Making comprises source path and destination path, file destination name, firing event program name and the path that starting point, filename, file take place for user terminal ID, operation; And file data backup is at interior application program operation logout, and is kept in the assigned catalogue.
The network communication program file information that the network agent means transmit to network according to user terminal; Comprise terminal service, telnet service or FTP service; Making comprises that the flow process and the path thereof of the source path of starting point, filename, file, file destination path, file destination name, initiation take place for user terminal ID, operation; And file data backup is at interior communication program operation logout, and is saved in the assigned catalogue.
The print agent means read file name, source path and storing path through the File Agent means; Making comprises source path and destination path, file destination name, firing event program name and the path that starting point, filename, file take place for user terminal ID, operation; And file data backup is at interior print routine operation logout, and is kept in the assigned catalogue.
The triggering of means according to File Agent means, Application Agent means, print agent means or network agent means acted on behalf of in the screen interception; And the cycle of security personnel's policy grade setting carry out the user terminal screen interception; Generate the screenshotss image file; Making comprises that the screenshotss record of the corresponding operational process of the program name of source path and the destination path of starting point, filename, file, file destination name, mode of operation, triggered file operation, Program path, screenshotss information takes place for user terminal ID, operation, and is kept in the assigned catalogue.
Logout and screenshotss record that the Correspondent means will be kept in the assigned catalogue at any time are sent in the management end system through internal network, make monitoring content can transmit in real time, carry out in real time, guarantee the validity of monitoring.
The preservation process of above-mentioned each means in assigned catalogue is for deposit character temporarily; The memory function that does not have real meaning; Completion along with Correspondent means transport process; Automatically the preservation content in the assigned catalogue on the deletion user terminal to avoid taking the usage space at a large number of users terminal, prevents that monitoring content from leaking from user terminal.Preserve in the content, user terminal ID is the code of unique identification user terminal, plays the effect of identity validation at each; The source that starting point is used for identifying fast operating process takes place in operation, constitutes the train of thought of source historical tracking process; Filename, file source path, file destination name, destination path and mode of operation have write down the operating process and the operation file title of concrete file, and the source of file and whereabouts, are most important links in the file operation record; Program name, the Program path of triggered file operation or incident are used for the specific procedure title of recording operation process and the path at program place, thereby confirm possible content of operation and opereating specification; The flow process and the path thereof of causing are that record is carried out in the execution action and the path of causing automatically in the network operation process, guarantee that each link all has monitoring in the network transmission; File backup is that each means is carried out automated back-up to operation file, prevents that file from losing a kind of remedial measures of taking, with further raising protection reliability.
Means are acted on behalf of in the screen interception can carry out the screenshotss processing according to the triggering of File Agent means, Application Agent means, print agent means or network agent means on the one hand, and record screen ruuning situation intuitively reflects operational process; Also can carry out the automatic interception of user terminal screen according to the cycle of security personnel's policy grade setting on the other hand, generate the user terminal snapshot picture of emphasis period on time, the monitor terminal operational process strengthens control and monitoring at random, guarantees monitoring effect.
Step 3, management end system receive file operation logout, procedure operation logout and screenshotss record, set up operation history run database of record and screenshotss historical record data storehouse, and at any time each FTP client FTP ruuning situation are monitored and managed.
The management end system is installed on the server, carries out real time data through server and receives, and accomplishes database manipulation and record queries, so that monitor each FTP client FTP at any time.Reveal process for ease of inquiry and trace files; The management end system receives file operation logout, procedure operation logout and the screenshotss record that sends from each FTP client FTP in real time; Creation operation history run database of record and screenshotss historical record data storehouse are kept at written record information and screenshotss image information respectively in the different databases respectively, to reduce the size of database; Improve retrieval rate; Simultaneously, can also keep mutual being closely connected, prepare with the track record process that snapshot looks like to combine for subsequent step forms written record.
Certainly, when the management end system constantly received the recorded information of each FTP client FTP transmission, the management end system also can monitor and manage FTP client FTP in real time.The monitoring of FTP client FTP and management are mainly comprised the integrality and the operation conditions of monitor client system, when FTP client FTP owing to multiple reason causes system imperfect or when being in run-stopping status, even when artificially being deleted; The management end system at first can send information or data to FTP client FTP; Repair in real time or the renewal FTP client FTP, after the maintenance FTP client FTP is complete, resend steering order; Start FTP client FTP, realize the real-time monitoring of FTP client FTP user terminal.
Step 4, management end system utilization operation history run record data library searching are also created file destination operation operation track record; And according to screenshotss historical record data library searching and create the screenshotss tracking image; After video editing, generate video, accomplish literal and video frequency tracking user terminal file destination operation operational process.
Database is set up for faster, more effective trace files historical record.Wherein, The file operation logout that operation history run database of record is mainly generated by each FTP client FTP, application program operation logout, print routine operation logout, communication program operation logout combine; Can pass through the different Database field in user terminal ID, filename, path or the like between different records as index; Set up the historical record of the different event of desired different phase, form file destination operation operation track record.Because each FTP client FTP is when each user terminal of monitoring; According to the cycle of security personnel's policy grade setting and along with the screenshotss processing is carried out in the triggering of each means at any time, in the management end system, be formed with screenshotss historical record data storehouse, so; When forming file destination operation operation track record; Can correspondingly be index also, form the screenshotss image recording of different phase, different event, utilize the video editing function in the management end system with the Database field; Automatically each screenshotss image recording is changed into video image and displays, make the track record process more intuitively, more reliably, more effective.
Certainly; As required; Management end system utilization operation history run database of record also can only be created file destination operation operation track record or only create the screenshotss tracking image according to screenshotss historical record data storehouse, thereby shows with the mode of literal or video and to follow the trail of the objective.
Step 5, management end system reveal through deletion of database grooming means and file to be had directly and all operations logout and the screenshotss record collected outside the time period of indirect association.
For ease of management and inquiry; The deletion of unnecessary record need be regularly carried out in operation history run database of record and screenshotss historical record data storehouse; In the management end system, be provided with correspondingly database grooming means; Can delete the operation logout and the screenshotss record that do not meet reserve easily through the database grooming means,, improve the later stage retrieval rate to reduce the record number.
Embodiment one
With user terminal the replacing file name of ' abc.txt ' being called ' efg.txt ' is example.
The login management end system; Pass through inquiry mode; In operation history run database of record, search ' abc.txt ' filename, obtain one or more service recorder, wherein; The record that has the file destination name is exactly that we will search, and file destination name ' efg.txt ' is exactly the title behind the Bulk Rename Utility.Through the destination path record case, just can find the deposit position of file afterwards of renaming again, thus finally find the file that will search.Deleted like file, also can carry out file and recover, avoid file to lose and bring loss through backup file.In the query script; Also can in screenshotss historical record data storehouse, search old file name and be the record of ' abc.txt ', obtain one or more service recorder after, the record that contains file destination name ' efg.txt ' is exactly the record that we inquire for; Go up the screenshotss information of record according to record; Just can find the snapshot picture, behind the automatic video frequency editor, the broadcast of screen operational process in the time of just renaming operation with the mode of video.Whole tracing process is simple, directly perceived, convenient.
If file name is through repeatedly changing; The record that in operation history run database of record, finds out can be a clue with the mode of the initial title of initial title → file destination name → next record → next record file destination name then, and many records are together in series; Thereby form file by the track record of the process of renaming; Simultaneously, cooperate the video of screen operational process again, just can file be revealed that process is complete to be shown.Equally, this mode is also applicable to store path conversion, transfer address conversion, mailbox object transformation or the like.

Claims (4)

1. a data disclosure audit guard system is characterized in that comprise FTP client FTP and management end system based on internal network, FTP client FTP is installed on the user terminal with cipher mode, and the management end system is installed on the management server;
A, management end system at first set up user terminal ID, for each user terminal ID formulates security personnel's policy rank and sends in the FTP client FTP at respective user terminal;
B, FTP client FTP are monitored user terminal according to security personnel's policy rank; At any time trigger the correlation means in the FTP client FTP; Make the screenshotss record of file operation logout, procedure operation logout and operational process to corresponding document, and be sent in real time in the management end system;
The content of said monitoring comprises the one or more combination in the file that application program takes place generates, reads, preserves, renames, duplicates, moves, deletes; One or more combination in the making of specific file, printing, coding, the Flame Image Process, and the one or more combination of passing through the file transmission of coded program, net dish, mobile memory, web browser, MSN, mailbox program, the generation of network communication program;
C, management end system receive file operation logout, procedure operation logout and screenshotss record, set up operation history run database of record and screenshotss historical record data storehouse, and at any time each FTP client FTP ruuning situation are monitored and managed;
D, the utilization operation history run record data library searching of management end system are also created file destination operation operation track record; And/or according to the library searching of screenshotss historical record data and set up the screenshotss tracking image; Through generating video after the video editing, accomplish the literal and/or the video frequency tracking of user terminal object run process.
2. based on the described data disclosure audit of claim 1 guard system; It is characterized in that said correlation means comprises that File Agent means, Application Agent means, network agent means, print agent means, screen interception act on behalf of means and Correspondent means;
One or more combination during the file that said File Agent means take place according to application program generates, reads, preserves, renames, duplicates, moves, deletes; Making comprises that the file operation logout of the program name of source path and the destination path of starting point, filename, file, file destination name, mode of operation, triggered file operation, Program path, file backup takes place for user terminal ID, operation, and is saved in the assigned catalogue;
Said Application Agent means are according to the one or more combination in specific file making, coding, the Flame Image Process; And the one or more combination of passing through the file transmission of coded program, net dish, mobile memory, web browser, MSN, the generation of mailbox program; Read file name, source path and storing path through the File Agent means; Making comprises source path and destination path, file destination name, firing event program name and the path that starting point, filename, file take place for user terminal ID, operation; And file data backup is at interior application program operation logout, and is kept in the assigned catalogue;
The network communication program file information that said network agent means transmit to network according to user terminal; Comprise terminal service, telnet service or FTP service; Making comprises that the flow process and the path thereof of the source path of starting point, filename, file, file destination path, file destination name, initiation take place for user terminal ID, operation; And file data backup is at interior communication program operation logout, and is saved in the assigned catalogue;
Said print agent means read file name, source path and storing path through the File Agent means; Making comprises source path and destination path, file destination name, firing event program name and the path that starting point, filename, file take place for user terminal ID, operation; And file data backup is at interior print routine operation logout, and is kept in the assigned catalogue;
The triggering of means according to File Agent means, Application Agent means, print agent means or network agent means acted on behalf of in said screen interception; And the cycle of security personnel's policy grade setting carry out the user terminal screen interception; Generate the screenshotss image file; Making comprises that the screenshotss record of the corresponding operational process of the program name of source path and the destination path of starting point, filename, file, file destination name, mode of operation, triggered file operation, Program path, screenshotss information takes place for user terminal ID, operation, and is kept in the assigned catalogue;
Logout and screenshotss record that said Correspondent means will be kept in the assigned catalogue at any time are sent in the management end system.
3. data disclosure audit guard system according to claim 1; It is characterized in that; Among the said step c, integrality and operation conditions that the monitoring and the management of FTP client FTP comprised the monitor client system are when integrality and operation are in de-asserted state; Information and data through with the management end system transmit, and keep the FTP client FTP complete sum to be in running status at any time.
4. data disclosure audit guard system according to claim 1 is characterized in that, also comprises;
E, management end system reveal through deletion of database grooming means and file to be had directly and all operations logout and the screenshotss record collected outside the time period of indirect association.
CN2011104288207A 2011-12-20 2011-12-20 Audit protection system for data leakage Pending CN102609637A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104288207A CN102609637A (en) 2011-12-20 2011-12-20 Audit protection system for data leakage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104288207A CN102609637A (en) 2011-12-20 2011-12-20 Audit protection system for data leakage

Publications (1)

Publication Number Publication Date
CN102609637A true CN102609637A (en) 2012-07-25

Family

ID=46527000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104288207A Pending CN102609637A (en) 2011-12-20 2011-12-20 Audit protection system for data leakage

Country Status (1)

Country Link
CN (1) CN102609637A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491091A (en) * 2013-09-24 2014-01-01 长沙裕邦软件开发有限公司 Method and system for monitoring user operation based on data bank
CN103778231A (en) * 2014-01-26 2014-05-07 长沙裕邦软件开发有限公司 Method and system for managing operation record information, of databank
CN104102692A (en) * 2014-06-19 2014-10-15 肖龙旭 Electronic document tracking method based on logs
CN104967904A (en) * 2014-04-10 2015-10-07 腾讯科技(深圳)有限公司 Method for recording and playing back terminal video and apparatus thereof
CN105657470A (en) * 2015-12-31 2016-06-08 深圳市海云天科技股份有限公司 Bitmap type video browsing recording method and system
CN105787373A (en) * 2016-05-17 2016-07-20 武汉大学 Android terminal data leak-proof method in mobile office system
CN105809056A (en) * 2016-02-29 2016-07-27 北京金山安全软件有限公司 Communication message management method, device and related equipment
CN106354100A (en) * 2016-11-18 2017-01-25 北京网御星云信息技术有限公司 Operation-maintenance auditing method and device for numerical control machine tool
CN107111539A (en) * 2016-07-11 2017-08-29 深圳前海达闼云端智能科技有限公司 The monitoring method and device of terminal device
CN108494864A (en) * 2018-03-29 2018-09-04 新华三技术有限公司 A kind of data processing method, device and machine readable storage medium
CN109190390A (en) * 2018-08-06 2019-01-11 北京北信源软件股份有限公司 The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication
CN111124845A (en) * 2018-10-30 2020-05-08 千寻位置网络有限公司 Access log generation and audit method and device, and monitoring system
CN111159126A (en) * 2019-12-31 2020-05-15 北京天融信网络安全技术有限公司 Auditing method and device for file compression operation, electronic equipment and storage medium
CN111597382A (en) * 2018-07-13 2020-08-28 北京朋创天地科技有限公司 Network security auditing method and system
CN111866143A (en) * 2020-07-22 2020-10-30 京东数字科技控股股份有限公司 Remote data transmission method, device and monitoring system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729550A (en) * 2009-11-09 2010-06-09 西北大学 Digital content safeguard system based on transparent encryption and decryption method thereof
CN101895578A (en) * 2010-07-06 2010-11-24 国都兴业信息审计系统技术(北京)有限公司 Document monitor and management system based on comprehensive safety audit

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729550A (en) * 2009-11-09 2010-06-09 西北大学 Digital content safeguard system based on transparent encryption and decryption method thereof
CN101895578A (en) * 2010-07-06 2010-11-24 国都兴业信息审计系统技术(北京)有限公司 Document monitor and management system based on comprehensive safety audit

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
康琦: "客户联络中心录屏监控系统UNI-SCRN的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 11, 30 November 2008 (2008-11-30) *
陈刚: "呼叫中心软件录屏模块的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 10, 31 October 2008 (2008-10-31) *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491091A (en) * 2013-09-24 2014-01-01 长沙裕邦软件开发有限公司 Method and system for monitoring user operation based on data bank
CN103778231A (en) * 2014-01-26 2014-05-07 长沙裕邦软件开发有限公司 Method and system for managing operation record information, of databank
CN104967904B (en) * 2014-04-10 2018-08-17 腾讯科技(深圳)有限公司 The method and device of terminal video recording and playback
CN104967904A (en) * 2014-04-10 2015-10-07 腾讯科技(深圳)有限公司 Method for recording and playing back terminal video and apparatus thereof
WO2015154639A1 (en) * 2014-04-10 2015-10-15 Tencent Technology (Shenzhen) Company Limited Method and apparatus for recording and replaying video of terminal
US10453493B2 (en) 2014-04-10 2019-10-22 Tencent Technology (Shenzhen) Company Limited Method and apparatus for recording and replaying video of terminal
CN104102692A (en) * 2014-06-19 2014-10-15 肖龙旭 Electronic document tracking method based on logs
CN105657470A (en) * 2015-12-31 2016-06-08 深圳市海云天科技股份有限公司 Bitmap type video browsing recording method and system
CN105657470B (en) * 2015-12-31 2018-09-28 深圳市海云天科技股份有限公司 A kind of recording method of bit map type video tour and system
CN105809056A (en) * 2016-02-29 2016-07-27 北京金山安全软件有限公司 Communication message management method, device and related equipment
CN105809056B (en) * 2016-02-29 2019-02-15 北京金山安全软件有限公司 Communication message management method, device and related equipment
CN105787373B (en) * 2016-05-17 2018-08-21 武汉大学 Android terminal data leakage prevention method in a kind of mobile office system
CN105787373A (en) * 2016-05-17 2016-07-20 武汉大学 Android terminal data leak-proof method in mobile office system
WO2018010072A1 (en) * 2016-07-11 2018-01-18 深圳前海达闼云端智能科技有限公司 Method and apparatus for monitoring terminal device
CN107111539A (en) * 2016-07-11 2017-08-29 深圳前海达闼云端智能科技有限公司 The monitoring method and device of terminal device
CN106354100A (en) * 2016-11-18 2017-01-25 北京网御星云信息技术有限公司 Operation-maintenance auditing method and device for numerical control machine tool
CN108494864A (en) * 2018-03-29 2018-09-04 新华三技术有限公司 A kind of data processing method, device and machine readable storage medium
CN108494864B (en) * 2018-03-29 2021-02-26 新华三技术有限公司 Data processing method and device and machine-readable storage medium
CN111597382A (en) * 2018-07-13 2020-08-28 北京朋创天地科技有限公司 Network security auditing method and system
CN109190390A (en) * 2018-08-06 2019-01-11 北京北信源软件股份有限公司 The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication
CN111124845A (en) * 2018-10-30 2020-05-08 千寻位置网络有限公司 Access log generation and audit method and device, and monitoring system
CN111159126A (en) * 2019-12-31 2020-05-15 北京天融信网络安全技术有限公司 Auditing method and device for file compression operation, electronic equipment and storage medium
CN111159126B (en) * 2019-12-31 2024-01-23 北京天融信网络安全技术有限公司 Audit method and device for file compression operation, electronic equipment and storage medium
CN111866143A (en) * 2020-07-22 2020-10-30 京东数字科技控股股份有限公司 Remote data transmission method, device and monitoring system

Similar Documents

Publication Publication Date Title
CN102609637A (en) Audit protection system for data leakage
CN109729180B (en) Whole system intelligent community platform
JP5210376B2 (en) Data confidentiality preservation method in fixed content distributed data storage system
CN101410837B (en) System and method for effecting information governance
US20160275294A1 (en) Data system and method
CN102460460A (en) Secure and private backup storage and processing for trusted computing and data services
US20090204817A1 (en) Communication system
Spyridopoulos et al. Incident analysis & digital forensics in SCADA and industrial control systems
Srinivasan Is security realistic in cloud computing?
CN106161629A (en) The method of a kind of business object synchronization, client and server
CN103391216A (en) Alarm and blocking method for illegal external connections
CN101589379A (en) A system and method for managing data across multiple environments
CN102457567A (en) Mirror image backup/recovery method and tool of web management mode
CN102394753A (en) RFID (Radio Frequency Identification Device) mutual authentication method based on secret key and cache mechanism
CN112134695A (en) Cloud platform management method and system based on quantum key distribution technology
CN103269343A (en) Business data safety control platform
CN102170424A (en) Mobile medium safety protection system based on three-level security architecture
CN102142998A (en) Backup interactive method based on remote on-line data disaster tolerance and system for executing method
CN109284426B (en) Multi-data document classification system based on permission level
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
US8745010B2 (en) Data storage and archiving spanning multiple data storage systems
CN204559620U (en) Remote support system, remote access system and remote assisting system
CN113448926A (en) Block chaining operation and maintenance management system and method
KR100879212B1 (en) Method of making duplication file backup
CN110572279A (en) Security management system for privileged account

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120725