CN103023651A - Method and device for monitoring access of mobile device - Google Patents

Method and device for monitoring access of mobile device Download PDF

Info

Publication number
CN103023651A
CN103023651A CN2012105207822A CN201210520782A CN103023651A CN 103023651 A CN103023651 A CN 103023651A CN 2012105207822 A CN2012105207822 A CN 2012105207822A CN 201210520782 A CN201210520782 A CN 201210520782A CN 103023651 A CN103023651 A CN 103023651A
Authority
CN
China
Prior art keywords
movable equipment
access
information
described movable
control server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105207822A
Other languages
Chinese (zh)
Other versions
CN103023651B (en
Inventor
李宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qax Technology Group Inc
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201210520782.2A priority Critical patent/CN103023651B/en
Publication of CN103023651A publication Critical patent/CN103023651A/en
Application granted granted Critical
Publication of CN103023651B publication Critical patent/CN103023651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and device for monitoring access of a mobile device. The device comprises a preset legal list module arranged on a safety control server, a unique identification logo calculating module arranged at a client side; a unique identification logo transmitting module arranged at the client side, a unique identification logo judging module arranged on the safety control server, an access allowing module for allowing access of the mobile device, an access refusing module for refusing access of the mobile device, an access monitoring module arranged at the client side and used for monitoring the write-in operation of the mobile device when the access of the mobile device is allowed, and a write-in information transmitting module arranged at the client side and used for transmitting the information of the write-in operation to the safety control server. The method and device for monitoring the access of the mobile device can accurately track the source and destination of data, prevent the data from being infected by viruses, improve safety in using the mobile device and guarantee the safety of the network information.

Description

The method and apparatus that is used for the access of monitoring movable equipment
Technical field
The present invention relates to field of information security technology, be specifically related to a kind of method of the access for monitoring movable equipment, and, a kind of device of the access for monitoring movable equipment.
Background technology
At present; popularizing and make things convenient for the transmission of data and carry along with movable equipment; movable equipment is widely used in daily life and work; and in enterprise, often can run into the problem that file is divulged a secret; one of channel of mainly divulging a secret is exactly movable equipment, is a very large threat for the enterprise of holding the loss of data of daring not accept, leakage.
In order to protect the capsule information of enterprises, some enterprise can use safety management software in enterprises, forces automatically to encrypt in document creation, editor, and file just can only use in enterprises like this; Also some enterprise has variety of way management movable equipment, taking to seal USB interface such as some enterprise can't use movable equipment to reach the purpose of divulging a secret of the data of preventing, but these ways have been brought inconvenience, can not satisfy the demand of the normal exchange of information of enterprise.
Therefore, those skilled in the art's technical problem in the urgent need to address is: the method and apparatus that a kind of access for monitoring movable equipment is provided, can accurately follow the trail of source and the whereabouts of data, prevent by virus infections, improve the fail safe that movable equipment uses, guarantee the network information, the especially safety of inner-mesh network information.
Summary of the invention
In view of the above problems, the present invention has been proposed in order to provide a kind of method of a kind of access for monitoring movable equipment that overcomes the problems referred to above or address the above problem at least in part and the device of corresponding a kind of access for monitoring movable equipment.
According to one aspect of the present invention, a kind of method of the access for monitoring movable equipment is provided, comprising:
In the security control server, preset the tabulation of legal movable equipment information; Described security control server is used for controlling the safety of coupled client, comprises unique identification marking of the movable equipment that allows access in the tabulation of described legal movable equipment information;
When client control when the access of movable equipment is arranged, calculate unique identification marking of described movable equipment;
Described unique identification marking is sent to the security control server, judge by the security control server whether described unique identification marking is present in the tabulation of described legal movable equipment information, if then allow the access of described movable equipment; If not, then refuse the access of described movable equipment;
When allowing the access of described movable equipment, monitor the write operation of described movable equipment;
The information of said write operation is sent to the security control server.
Alternatively, described when client control when the access of movable equipment is arranged, the step of calculating unique identification marking of described movable equipment comprises:
Obtain the hardware attributes information of described movable equipment;
Judge and whether have signature identification in the described movable equipment;
If then from described movable equipment, extract signature identification;
If not, write in the movable equipment then according to described hardware attributes information calculations signature identification, and with described signature identification;
According to the hardware attributes information of described movable equipment and unique identification marking that signature identification calculates described movable equipment.
Alternatively, described method also comprises:
If when described signature identification is write operation failure in the movable equipment, the information of said write operation failure is sent to the security control server;
Described security control server is refused the access of described movable equipment according to the information of said write operation failure.
Alternatively, described security control server presets the time interval that movable equipment allows access, and described method also comprises:
Judge whether described movable equipment accesses in the time interval of described permission access;
If described movable equipment is to access in the time interval of described permission access, then the security control server allows the access of described movable equipment;
If described movable equipment is not to access in the time interval of described permission access, then the security control server is refused the access of described movable equipment.
Alternatively, described hardware attributes information comprises the movable equipment sign, and/or, manufacturer's information of movable equipment, and/or, the space size of movable equipment.
Alternatively, described according to hardware attributes information calculations signature identification, and the step that described signature identification is write in the movable equipment comprises:
With described movable equipment sign, and the hardware attributes information combination is the first character string;
Adopt Message Digest 5 MD5 to calculate the signature identification of described movable equipment according to described the first character string;
The signature identification of described movable equipment is write in the described movable equipment.
Alternatively, comprise according to the hardware attributes information of described movable equipment and the step of unique identification marking that signature identification calculates described movable equipment:
With the signature identification of described movable equipment, and the hardware attributes information combination is the second character string;
Adopt Message Digest 5 MD5 to calculate unique identification marking of described movable equipment according to described the second character string.
Alternatively, the access of described movable equipment is monitored by the default driving in the client.
Alternatively, described access comprises readable access, the access that can write and the non-readable access of writing.
According to another aspect of the present invention, a kind of device of the access for monitoring movable equipment is provided, comprising:
Preset the legitimate list module, be positioned at the security control server, be used for controlling the safety of coupled client, comprise unique identification marking of the movable equipment that allows access in the tabulation of described legal movable equipment information;
Unique identification marking computing module is positioned at client, is used for calculating unique identification marking of described movable equipment when the access that monitors movable equipment;
Unique identification marking sending module is positioned at client, is used for described unique identification marking is sent to the security control server;
Unique identification marking judge module is positioned at the security control server, is used for judging whether described unique identification marking is present in the tabulation of described legal movable equipment information, if, then call the clearance module, if not, then call the refusal module;
The clearance module is used for allowing the access of described movable equipment;
The refusal module is used for refusing the access of described movable equipment;
The access monitoring module is positioned at client, is used for monitoring the write operation of described movable equipment when allowing the access of described movable equipment;
The writing information sending module is positioned at client, is used for the information of said write operation is sent to the security control server.
Alternatively, described unique identification marking computing module comprises:
Hardware attributes acquisition of information submodule is for the hardware attributes information of obtaining described movable equipment;
Signature identification is judged submodule, is used for judging whether described movable equipment has signature identification; If, then call signature identification and extract submodule, if not, then call the signature identification calculating sub module;
Signature identification extracts submodule, is used for extracting signature identification from described movable equipment;
The signature identification calculating sub module is used for according to described hardware attributes information calculations signature identification, and described signature identification is write in the movable equipment;
Unique identification marking calculating sub module is used for according to the hardware attributes information of described movable equipment and unique identification marking that signature identification calculates described movable equipment.
Alternatively, described device also comprises:
Write the failure information sending module, be positioned at client, if when being used for that described signature identification write the operation failure of movable equipment, the information of said write operation failure is sent to the security control server;
The refusal access module is positioned at the security control server, is used for the information according to the said write operation failure, refuses the access of described movable equipment.
Alternatively, described security control server presets the time interval that movable equipment allows access, and described device also comprises:
The time interval judge module is positioned at the security control server, is used for judging whether described movable equipment accesses in the time interval of described permission access; If, then allow access module in the allocating time interval, if not, then refuse access module in the allocating time interval;
Allowing access module in the time interval, be positioned at the security control server, is to access in the time interval of described permission access if be used for described movable equipment, then allows the access of described movable equipment;
The refusal access module is positioned at the security control server in the time interval, is not to access in the time interval of described permission access if be used for described movable equipment, then refuses the access of described movable equipment.
Alternatively, described hardware attributes information comprises the movable equipment sign, and/or, manufacturer's information of movable equipment, and/or, the space size of movable equipment.
Alternatively, described signature identification calculating sub module comprises:
The first character string assembled unit be used for described movable equipment sign, and the hardware attributes information combination is the first character string;
The second computing unit is used for adopting Message Digest 5 MD5 to calculate the signature identification of described movable equipment according to described the first character string;
The signature identification writing unit is used for the signature identification of described movable equipment is write described movable equipment.
Alternatively, described unique identification marking calculating sub module comprises:
The second character string assembled unit be used for the signature identification with described movable equipment, and the hardware attributes information combination is the second character string;
The second computing unit is used for adopting Message Digest 5 MD5 to calculate unique identification marking of described movable equipment according to described the second character string.
Alternatively, the access of described movable equipment is monitored by the default driving in the client.
Alternatively, described access comprises readable access, the access that can write and the non-readable access of writing.
Whether method and device according to a kind of access for monitoring movable equipment of the present invention can exist unique identification marking of movable equipment to judge whether to allow the access of movable equipment by the tabulation of presetting legal movable equipment information at the security control server; the write operation of monitoring movable equipment when movable equipment allows access; solved thus the problem of divulging a secret of the movable equipment that enterprise often can run into; source and the whereabouts of the data of can accurately following the trail of have been obtained; prevent by virus infections; improve the fail safe that movable equipment uses; guarantee the network information, the especially beneficial effect of the safety of inner-mesh network information.
Above-mentioned explanation only is the general introduction of technical solution of the present invention, for can clearer understanding technological means of the present invention, and can be implemented according to the content of specification, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of drawings
By reading hereinafter detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing only is used for the purpose of preferred implementation is shown, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts with identical reference symbol.In the accompanying drawings:
Fig. 1 shows a kind of according to an embodiment of the invention flow chart of steps of embodiment of the method for the access for monitoring movable equipment;
Fig. 2 shows the structured flowchart of a kind of according to an embodiment of the invention device embodiment of the access for monitoring movable equipment.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in the accompanying drawing, yet should be appreciated that and to realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order to understand the disclosure more thoroughly that these embodiment are provided, and can with the scope of the present disclosure complete convey to those skilled in the art.
One of core idea of the embodiment of the invention is, preset the unique identification marking that whether has movable equipment in the tabulation of legal movable equipment information by the security control server and judge whether to allow the access of movable equipment, the write operation of monitoring movable equipment when movable equipment allows access, can accurately follow the trail of thus source and the whereabouts of data, improve the fail safe that movable equipment uses, guarantee the network information, the especially safety of inner-mesh network information.
With reference to Fig. 1, show the flow chart of steps of the embodiment of the method for a kind of access for monitoring movable equipment of the present invention, specifically can may further comprise the steps:
Step 101, the tabulation of in the security control server, presetting legal movable equipment information; Described security control server is used for controlling the safety of coupled client, comprises unique identification marking of the movable equipment that allows access in the tabulation of described legal movable equipment information;
With at the PC that privately owned cloud client has been installed (Personal Computer, PC) upward using the present invention is example, the PC that privately owned cloud client has been installed can monitor file, prevent by virus infections, can carry out alternately with corresponding security control server simultaneously, some information of local computing are sent to the security control server.PC can also monitor whether new equipment access is arranged, the type of access device, whether movable equipment etc.
Need to prove that in the embodiment of the invention, described security control server and client form master control and controlled relation, described security control server is for the safety of controlling coupled client, for example, and the server in the local area network (LAN) and client.
In specific implementation, need in the security control server, preset the tabulation of legal movable equipment information, the unique identification marking that comprises the movable equipment that allows access in the tabulation of described legal movable equipment information, be used for contrast judge whether consistent with unique identification marking of the movable equipment that accesses, whether legal with this access of judging movable equipment.
Step 102, when client control when the access of movable equipment is arranged, calculate unique identification marking of described movable equipment;
In a preferred embodiment of the present invention, the access of described movable equipment can be monitored by the default driving in the client.
By default the driving is installed in client, utilize this driving needle that all write operations of movable equipment are monitored.When driving monitors the access of movable equipment, with the application layer of throwing on the relevant information.Whether application layer sends information inquiry to the security control server and can access after getting access to information.
In a kind of preferred exemplary of the embodiment of the invention because privately owned cloud client resides, so the access that can monitor movable equipment by Message function WM_DEVICECHANGE with withdraw from, also can monitor with driving.Preferably, if the security control server lookup is overtime, also can eject this movable equipment, avoid taking resource.In a preferred embodiment of the present invention, described step 102 can comprise following substep:
Substep S11 obtains the hardware attributes information of described movable equipment;
Substep S12 judges whether have signature identification in the described movable equipment; If, then carry out substep S13, if not, then carry out substep S14;
Substep S13 is if then extract signature identification from described movable equipment;
Substep S14 if not, writes in the movable equipment then according to described hardware attributes information calculations signature identification, and with described signature identification;
Substep S15 is according to the hardware attributes information of described movable equipment and unique identification marking that signature identification calculates described movable equipment.
When movable equipment is linked into the PC that privately owned cloud client has been installed, get access to hardware attributes information and the signature identification of the movable equipment of access client, wherein, described hardware attributes information can comprise the intrinsic hardware attributes of movable equipment, and, the hardware attributes of the follow-up adding of movable equipment.The signature identification of movable equipment is according to the hardware attributes information calculations gained of movable equipment, described signature identification can be done further mark to movable equipment on the hardware attributes information of movable equipment, and unique identification marking is to calculate gained according to the hardware attributes information of movable equipment and signature identification, even the hardware attributes information of movable equipment is identical, also not necessarily allow this movable equipment access, to guarantee the network information, the especially safety of corporate intranet information.
In a preferred embodiment of the present invention, described hardware attributes information can comprise the movable equipment sign, and/or, manufacturer's information of movable equipment, and/or, the space size of movable equipment.
In a preferred embodiment of the present invention, the step of described substep S14 can comprise following substep:
Substep S21, with described movable equipment sign, and the hardware attributes information combination is the first character string;
Substep S22 adopts Message Digest 5 MD5 to calculate the signature identification of described movable equipment according to described the first character string;
Substep S23 writes the signature identification of described movable equipment in the described movable equipment.
In specific implementation, when client control after movable equipment access is arranged, obtain sign, the movable equipment of this movable equipment manufacturer's information, movable equipment space size and be combined into one group of character string, then adopt the MD5 algorithm to calculate the signature identification of this movable equipment according to this.Be well known that MD5 (Message Digest Algorithm, Message Digest Algorithm 5) is the widely used a kind of hash function of computer safety field, it is another fixed-length value with data operation, and Information Compression is become a kind of secret form.
For example, movable equipment be designated 5001, manufacturer's information of movable equipment is the patriot, the space size of movable equipment is 1000000K, can be combined into one group of character string is: 5001 patriots 1000000, the signature identification that adopts the MD5 algorithm can calculate unique movable equipment of 32 this character string is: B64D19F84EEEF997453CDD25738C082C, the signature identification that then will calculate gained writes in this movable equipment.
In a preferred embodiment of the present invention, described step 102 can also comprise following substep:
If when described signature identification is write operation failure in the movable equipment, the information of said write operation failure is sent to the security control server;
Described security control server is refused the access of described movable equipment according to the information of said write operation failure.
Preferably, write the movable equipment operation failure if will calculate the signature identification of gained, can the information of write operation failure be sent to the security control server by client, the security control server can be refused the access of this movable equipment according to the information of operation failure, further the assurance network information, the especially safety of inner-mesh network information.
In a preferred embodiment of the present invention, the step of described substep S15 can comprise following substep:
Substep S31, with the signature identification of described movable equipment, and the hardware attributes information combination is the second character string;
Substep S32 adopts Message Digest 5 MD5 to calculate unique identification marking of described movable equipment according to described the second character string.
For example, movable equipment be designated 5001, manufacturer's information of movable equipment is the patriot, the space size of movable equipment is 1000000K, the signature identification of movable equipment is B64D19F84EEEF997453CDD25738C082C, can be combined into one group of character string is: B64D19F84EEEF997453CDD25738C082C 5001 patriots 1000000, the unique identification marking that adopts the MD5 algorithm can calculate 32 movable equipment this character string is: 45B51AE3C3445170E39801CA9ACD564D.
Certainly, in actual applications, be not limited to the MD5 algorithm, those skilled in the art can also select other suitable algorithm to generate signature identification and unique identification marking of movable equipment take the MD5 algorithm as principle, and the present invention is not restricted this.
Step 103 sends to the security control server with described unique identification marking, judges by the security control server whether described unique identification marking is present in the tabulation of described legal movable equipment information; If then execution in step 104, if not, then execution in step 105;
Step 104 allows the access of described movable equipment;
Step 105 is refused the access of described movable equipment.
Utilize the movable equipment of the incidence relation management access client between client and the security control server in the embodiment of the invention.If unique identification marking of the movable equipment of access client is present in the tabulation of legal movable equipment information in the security control server, the access that then represents this movable equipment is legal, and then the security control server allows the access of described movable equipment.If unique identification marking of the movable equipment of access client is not present in the tabulation of security control server legitimacy movable equipment information, the access that then represents this movable equipment is illegal, and the security control server is refused the access of described movable equipment.
In a preferred embodiment of the present invention, can also preset the time interval that movable equipment allows access in the described security control server, in this case, described method can also comprise the steps:
Judge whether described movable equipment accesses in the time interval of described permission access;
If described movable equipment is to access in the time interval of described permission access, then the security control server allows the access of described movable equipment;
If described movable equipment is not to access in the time interval of described permission access, then the security control server is refused the access of described movable equipment.
By the time interval that allows access is set for the movable equipment that allows access, so that this movable equipment is only can and move in the client access in the time interval that allows access, outside the time interval that allows access, then refuse the access of this movable equipment, further guarantee the network information with this, especially the safety of inner-mesh network information.In practice, can also the identification title be set for the movable equipment that allows access, make things convenient for keeper's identification and follow-up management.
In specific implementation, to allow the movable equipment of access be the access that read right is arranged but can arrange, but the access of write permission is arranged, but or the access of non-readable write permission is arranged, described movable equipment moves in client according to its corresponding authority.
Step 106 when allowing the access of described movable equipment, is monitored the write operation of described movable equipment;
Step 107, the information that said write is operated is sent to the security control server.
Preferably, after movable equipment allows access normally to use, the write operation of this movable equipment of security control server monitoring, and each situation that is written to movable equipment issued the security control server.The operation that writes comprises that file is saved in movable equipment and is saved in the operation of local disk from movable equipment, as long as to source path or destination path be movable equipment all carry out recording and sending to the security control server, can accurately follow the trail of like this source and the whereabouts of data, prevent by virus infections, improved the fail safe that movable equipment uses.
After the associative operation of movable equipment in client finished, in the time of need to withdrawing from this movable equipment, can unload by SetupDiDestroyDeviceInfoList, destroy the movable equipment information aggregate, and discharge related internal memory, eject movable equipment at ring3 (CPU Least Privilege rank), also can unload with driving in addition.
Need to prove, for embodiment of the method, for simple description, so it all is expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not subjected to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in the specification all belongs to preferred embodiment, and related action and module might not be that the present invention is necessary.
With reference to Fig. 2, show the structured flowchart of the device embodiment of a kind of access for monitoring movable equipment of the present invention, specifically can comprise such as lower module:
Preset legitimate list module 201, be positioned at the security control server, be used for controlling the safety of coupled client, comprise unique identification marking of the movable equipment that allows access in the tabulation of described legal movable equipment information;
Unique identification marking computing module 202 is positioned at client, is used for calculating unique identification marking of described movable equipment when the access that monitors movable equipment;
In a preferred embodiment of the present invention, the access of described movable equipment can be monitored by the default driving in the client.
In a preferred embodiment of the present invention, described unique identification marking computing module 202 can comprise following submodule:
Hardware attributes acquisition of information submodule is for the hardware attributes information of obtaining described movable equipment;
Signature identification is judged submodule, is used for judging whether described movable equipment has signature identification; If, then call signature identification and extract submodule, if not, then call the signature identification calculating sub module;
Signature identification extracts submodule, is used for extracting signature identification from described movable equipment;
The signature identification calculating sub module is used for according to described hardware attributes information calculations signature identification, and described signature identification is write in the movable equipment;
Unique identification marking calculating sub module is used for according to the hardware attributes information of described movable equipment and unique identification marking that signature identification calculates described movable equipment.
In a preferred embodiment of the present invention, described device can also comprise such as lower module:
Write the failure information sending module, be positioned at client, if when being used for that described signature identification write the operation failure of movable equipment, the information of said write operation failure is sent to the security control server;
The refusal access module is positioned at the security control server, is used for the information according to the said write operation failure, refuses the access of described movable equipment.
In a preferred embodiment of the present invention, described security control server presets the time interval that movable equipment allows access, and described device can also comprise such as lower module:
The time interval judge module is positioned at the security control server, is used for judging whether described movable equipment accesses in the time interval of described permission access; If, then allow access module in the allocating time interval, if not, then refuse access module in the allocating time interval;
Allowing access module in the time interval, be positioned at the security control server, is to access in the time interval of described permission access if be used for described movable equipment, then allows the access of described movable equipment;
The refusal access module is positioned at the security control server in the time interval, is not to access in the time interval of described permission access if be used for described movable equipment, then refuses the access of described movable equipment.
In a preferred embodiment of the present invention, described hardware attributes information can comprise the movable equipment sign, and/or, manufacturer's information of movable equipment, and/or, the space size of movable equipment.
In a preferred embodiment of the present invention, described signature identification calculating sub module can comprise such as lower unit:
The first character string assembled unit be used for described movable equipment sign, and the hardware attributes information combination is the first character string;
The second computing unit is used for adopting Message Digest 5 MD5 to calculate the signature identification of described movable equipment according to described the first character string;
The signature identification writing unit is used for the signature identification of described movable equipment is write described movable equipment.
In a preferred embodiment of the present invention, described unique identification marking calculating sub module can comprise such as lower unit:
The second character string assembled unit be used for the signature identification with described movable equipment, and the hardware attributes information combination is the second character string;
The second computing unit is used for adopting Message Digest 5 MD5 to calculate unique identification marking of described movable equipment according to described the second character string.
Unique identification marking sending module 203 is positioned at client, is used for described unique identification marking is sent to the security control server;
Unique identification marking judge module 204 is positioned at the security control server, is used for judging whether described unique identification marking is present in the tabulation of described legal movable equipment information, if, then call clearance module 205, if not, then call refusal module 206;
Clearance module 205 is used for allowing the access of described movable equipment;
Refusal module 206 is used for refusing the access of described movable equipment.
In a preferred embodiment of the present invention, described access can comprise readable access, the access that can write and the non-readable access of writing.
Access monitoring module 207 is positioned at client, is used for monitoring the write operation of described movable equipment when allowing the access of described movable equipment;
Writing information sending module 208 is positioned at client, is used for the information of said write operation is sent to the security control server.
For the device embodiment of Fig. 2 because itself and the embodiment of the method basic simlarity of Fig. 1, so describe fairly simple, relevant part gets final product referring to the part explanation of embodiment of the method.
Intrinsic not relevant with any certain computer, virtual system or miscellaneous equipment with demonstration at this algorithm that provides.Various general-purpose systems also can be with using based on the teaching at this.According to top description, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.Should be understood that and to utilize various programming languages to realize content of the present invention described here, and the top description that language-specific is done is in order to disclose preferred forms of the present invention.
In the specification that provides herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can be put into practice in the situation of these details not having.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the description to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes in the above.Yet the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires the more feature of feature clearly put down in writing than institute in each claim.Or rather, as following claims reflected, inventive aspect was to be less than all features of the disclosed single embodiment in front.Therefore, follow claims of embodiment and incorporate clearly thus this embodiment into, wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can adaptively change and they are arranged in one or more equipment different from this embodiment the module in the equipment among the embodiment.Can be combined into a module or unit or assembly to the module among the embodiment or unit or assembly, and can be divided into a plurality of submodules or subelement or sub-component to them in addition.In such feature and/or process or unit at least some are mutually repelling, and can adopt any combination to disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and so all processes or the unit of disclosed any method or equipment make up.Unless in addition clearly statement, disclosed each feature can be by providing identical, being equal to or the alternative features of similar purpose replaces in this specification (comprising claim, summary and the accompanying drawing followed).
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included among other embodiment, the combination of the feature of different embodiment means and is within the scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with compound mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, perhaps realizes with the software module of moving at one or more processor, and perhaps the combination with them realizes.It will be understood by those of skill in the art that and to use in practice microprocessor or digital signal processor (DSP) to realize according to some of the device of a kind of access for the monitoring movable equipment of the embodiment of the invention or all some or repertoire of parts.The present invention can also be embodied as be used to part or all equipment or the device program (for example, computer program and computer program) of carrying out method as described herein.Such realization program of the present invention can be stored on the computer-readable medium, perhaps can have the form of one or more signal.Such signal can be downloaded from internet website and obtain, and perhaps provides at carrier signal, perhaps provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation of the scope that does not break away from claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed in element or step in the claim.Being positioned at word " " before the element or " one " does not get rid of and has a plurality of such elements.The present invention can realize by means of the hardware that includes some different elements and by means of the computer of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to come imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title with these word explanations.

Claims (16)

1. method that is used for the access of monitoring movable equipment comprises:
In the security control server, preset the tabulation of legal movable equipment information; Described security control server is used for controlling the safety of coupled client, comprises unique identification marking of the movable equipment that allows access in the tabulation of described legal movable equipment information;
When client control when the access of movable equipment is arranged, calculate unique identification marking of described movable equipment;
Described unique identification marking is sent to the security control server, judge by the security control server whether described unique identification marking is present in the tabulation of described legal movable equipment information, if then allow the access of described movable equipment; If not, then refuse the access of described movable equipment;
When allowing the access of described movable equipment, monitor the write operation of described movable equipment;
The information of said write operation is sent to the security control server.
2. the method for claim 1, described when client control when the access of movable equipment is arranged, the step of calculating unique identification marking of described movable equipment comprises:
Obtain the hardware attributes information of described movable equipment;
Judge and whether have signature identification in the described movable equipment;
If then from described movable equipment, extract signature identification;
If not, write in the movable equipment then according to described hardware attributes information calculations signature identification, and with described signature identification;
According to the hardware attributes information of described movable equipment and unique identification marking that signature identification calculates described movable equipment.
3. method as claimed in claim 1 or 2 also comprises:
If when described signature identification is write operation failure in the movable equipment, the information of said write operation failure is sent to the security control server;
Described security control server is refused the access of described movable equipment according to the information of said write operation failure.
4. method as claimed in claim 1 or 2, described security control server preset the time interval that movable equipment allows access, and described method also comprises:
Judge whether described movable equipment accesses in the time interval of described permission access;
If described movable equipment is to access in the time interval of described permission access, then the security control server allows the access of described movable equipment;
If described movable equipment is not to access in the time interval of described permission access, then the security control server is refused the access of described movable equipment.
5. method as claimed in claim 2, described hardware attributes information comprise the movable equipment sign, and/or, manufacturer's information of movable equipment, and/or, the space size of movable equipment.
6. such as claim 2 or 5 described methods, described according to hardware attributes information calculations signature identification, and the step that described signature identification is write in the movable equipment comprises:
With described movable equipment sign, and the hardware attributes information combination is the first character string;
Adopt Message Digest 5 MD5 to calculate the signature identification of described movable equipment according to described the first character string;
The signature identification of described movable equipment is write in the described movable equipment.
7. such as claim 2 or 5 described methods, comprise according to the hardware attributes information of described movable equipment and the step of unique identification marking that signature identification calculates described movable equipment:
With the signature identification of described movable equipment, and the hardware attributes information combination is the second character string;
Adopt Message Digest 5 MD5 to calculate unique identification marking of described movable equipment according to described the second character string.
8. the method for claim 1, the access of described movable equipment is monitored by the default driving in the client.
9. the method for claim 1, described access comprises readable access, the access that can write and the non-readable access of writing.
10. device that is used for the access of monitoring movable equipment comprises:
Preset the legitimate list module, be positioned at the security control server, be used for controlling the safety of coupled client, comprise unique identification marking of the movable equipment that allows access in the tabulation of described legal movable equipment information;
Unique identification marking computing module is positioned at client, is used for calculating unique identification marking of described movable equipment when the access that monitors movable equipment;
Unique identification marking sending module is positioned at client, is used for described unique identification marking is sent to the security control server;
Unique identification marking judge module is positioned at the security control server, is used for judging whether described unique identification marking is present in the tabulation of described legal movable equipment information, if, then call the clearance module, if not, then call the refusal module;
The clearance module is used for allowing the access of described movable equipment;
The refusal module is used for refusing the access of described movable equipment;
The access monitoring module is positioned at client, is used for monitoring the write operation of described movable equipment when allowing the access of described movable equipment;
The writing information sending module is positioned at client, is used for the information of said write operation is sent to the security control server.
11. device as claimed in claim 10, described unique identification marking computing module comprises:
Hardware attributes acquisition of information submodule is for the hardware attributes information of obtaining described movable equipment;
Signature identification is judged submodule, is used for judging whether described movable equipment has signature identification; If, then call signature identification and extract submodule, if not, then call the signature identification calculating sub module;
Signature identification extracts submodule, is used for extracting signature identification from described movable equipment;
The signature identification calculating sub module is used for according to described hardware attributes information calculations signature identification, and described signature identification is write in the movable equipment;
Unique identification marking calculating sub module is used for according to the hardware attributes information of described movable equipment and unique identification marking that signature identification calculates described movable equipment.
12. such as claim 10 or 11 described devices, also comprise:
Write the failure information sending module, be positioned at client, if when being used for that described signature identification write the operation failure of movable equipment, the information of said write operation failure is sent to the security control server;
The refusal access module is positioned at the security control server, is used for the information according to the said write operation failure, refuses the access of described movable equipment.
13. such as claim 10 or 11 described devices, described security control server presets the time interval that movable equipment allows access, described device also comprises:
The time interval judge module is positioned at the security control server, is used for judging whether described movable equipment accesses in the time interval of described permission access; If, then allow access module in the allocating time interval, if not, then refuse access module in the allocating time interval;
Allowing access module in the time interval, be positioned at the security control server, is to access in the time interval of described permission access if be used for described movable equipment, then allows the access of described movable equipment;
The refusal access module is positioned at the security control server in the time interval, is not to access in the time interval of described permission access if be used for described movable equipment, then refuses the access of described movable equipment.
14. device as claimed in claim 11, described hardware attributes information comprise the movable equipment sign, and/or, manufacturer's information of movable equipment, and/or, the space size of movable equipment.
15. such as claim 11 or 14 described devices, described signature identification calculating sub module comprises:
The first character string assembled unit be used for described movable equipment sign, and the hardware attributes information combination is the first character string;
The second computing unit is used for adopting Message Digest 5 MD5 to calculate the signature identification of described movable equipment according to described the first character string;
The signature identification writing unit is used for the signature identification of described movable equipment is write described movable equipment.
16. such as claim 11 or 14 described devices, described unique identification marking calculating sub module comprises:
The second character string assembled unit be used for the signature identification with described movable equipment, and the hardware attributes information combination is the second character string;
The second computing unit is used for adopting Message Digest 5 MD5 to calculate unique identification marking of described movable equipment according to described the second character string.
CN201210520782.2A 2012-12-06 2012-12-06 Be used for the method and apparatus of the access of monitoring movable equipment Active CN103023651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210520782.2A CN103023651B (en) 2012-12-06 2012-12-06 Be used for the method and apparatus of the access of monitoring movable equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210520782.2A CN103023651B (en) 2012-12-06 2012-12-06 Be used for the method and apparatus of the access of monitoring movable equipment

Publications (2)

Publication Number Publication Date
CN103023651A true CN103023651A (en) 2013-04-03
CN103023651B CN103023651B (en) 2016-05-11

Family

ID=47971813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210520782.2A Active CN103023651B (en) 2012-12-06 2012-12-06 Be used for the method and apparatus of the access of monitoring movable equipment

Country Status (1)

Country Link
CN (1) CN103023651B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866787A (en) * 2014-02-25 2015-08-26 中国银联股份有限公司 Mobile equipment based on data interface recognition
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN109032520A (en) * 2018-07-24 2018-12-18 郑州云海信息技术有限公司 A kind of control method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050086514A1 (en) * 2003-10-02 2005-04-21 Samsung Electronics Co., Ltd Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)
CN101188731A (en) * 2006-11-24 2008-05-28 松下电器产业株式会社 Audio-video output apparatus, authentication processing method, and audio-video processing system
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050086514A1 (en) * 2003-10-02 2005-04-21 Samsung Electronics Co., Ltd Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)
CN101188731A (en) * 2006-11-24 2008-05-28 松下电器产业株式会社 Audio-video output apparatus, authentication processing method, and audio-video processing system
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866787A (en) * 2014-02-25 2015-08-26 中国银联股份有限公司 Mobile equipment based on data interface recognition
CN104866787B (en) * 2014-02-25 2018-10-23 中国银联股份有限公司 Mobile device based on data-interface identification
CN105005722A (en) * 2015-06-26 2015-10-28 北京北信源软件股份有限公司 Access control method and apparatus for mobile storage device
CN109032520A (en) * 2018-07-24 2018-12-18 郑州云海信息技术有限公司 A kind of control method and device

Also Published As

Publication number Publication date
CN103023651B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
US11611586B2 (en) Systems and methods for detecting a suspicious process in an operating system environment using a file honeypots
US10079835B1 (en) Systems and methods for data loss prevention of unidentifiable and unsupported object types
US10685111B2 (en) File-modifying malware detection
US10154066B1 (en) Context-aware compromise assessment
US9177145B2 (en) Modified file tracking on virtual machines
US9652597B2 (en) Systems and methods for detecting information leakage by an organizational insider
US20190034648A1 (en) Managing access to documents with a file monitor
US9405904B1 (en) Systems and methods for providing security for synchronized files
US9323930B1 (en) Systems and methods for reporting security vulnerabilities
US20190220593A1 (en) Systems and methods for tracking and recording events in a network of computing systems
CN101667232B (en) Terminal credible security system and method based on credible computing
KR20120050742A (en) Apparatus and method for managing digital rights through hooking process of kernel native api
US9432369B2 (en) Secure data containers
US9639713B2 (en) Secure endpoint file export in a business environment
CN106339629A (en) Application management method and device
CN105204973A (en) Abnormal behavior monitoring and analysis system and method based on virtual machine technology under cloud platform
CN110807205B (en) File security protection method and device
US9519780B1 (en) Systems and methods for identifying malware
Lian et al. Tdrb: An efficient tamper-proof detection middleware for relational database based on blockchain technology
CN103051608B (en) A kind of method and apparatus of movable equipment access monitoring
CN103023651A (en) Method and device for monitoring access of mobile device
Johnson Barriers to the use of intrusion detection systems in safety-critical applications
US10169584B1 (en) Systems and methods for identifying non-malicious files on computing devices within organizations
US9430674B2 (en) Secure data access
CN103488949A (en) Electronic document security system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20161228

Address after: 100015 Chaoyang District Road, Jiuxianqiao, No. 10, building No. 3, floor 15, floor 17, 1701-26,

Patentee after: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee after: QAX Technology Group Inc.

Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Patentee before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.