CN103914665A - Method and device for protecting movable storage device data security - Google Patents

Method and device for protecting movable storage device data security Download PDF

Info

Publication number
CN103914665A
CN103914665A CN201210592689.2A CN201210592689A CN103914665A CN 103914665 A CN103914665 A CN 103914665A CN 201210592689 A CN201210592689 A CN 201210592689A CN 103914665 A CN103914665 A CN 103914665A
Authority
CN
China
Prior art keywords
storage device
movable storage
information data
described movable
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210592689.2A
Other languages
Chinese (zh)
Inventor
王清奎
林凉
钟源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201210592689.2A priority Critical patent/CN103914665A/en
Publication of CN103914665A publication Critical patent/CN103914665A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

An embodiment of the invention provides a method for protecting movable storage device data security. The method comprises the steps of starting a filtering mechanism, recognizing a movable storage device and setting data information in the movable storage device to be invisible to upper applications of an operation system; starting a file analysis mechanism, and recognizing information data formats which are meaningful to the system, and determining whether the information data formats are secure files through corresponding analysis recognition methods; opening the obtained secure files to the upper applications of the operation system. By means of the method and the device, loads of the operation system cannot be increased too much, the system security is guaranteed, and safety monitoring and controlling of movable storage device data is achieved.

Description

A kind of method and apparatus of protecting movable storage device data security
Technical field
The present invention relates to the field such as mobile storage, data security, particularly a kind of method and apparatus of the data security of protecting movable storage device.
Background technology
Movable storage device has been applied in various fields widely, and also very abundant of the type of its equipment, brings greatly easily simultaneously in the work of giving and life, has also brought great potential safety hazard.
On the one hand, a station terminal only need to possess driving and the relevant configuration of movable storage device, even some mobile device not demand motive or such driving be integrated in terminal operating system, just can carry out read/write operation to movable storage device.This has just increased movable storage device greatly by the chance of virus or wooden horse infection, on the other hand, for some specific career field, more and more bulky complex of related computer network system, for viral propagation provides channel extremely easily, increase the difficulty of data security protection, and this type of work region, often the file in movable storage device is had to specific requirement, do not need all files in operating equipment, such as P2 card conventional in newspapering, P2 Ka Ji Panasonic movable storage device, full name is the multimedia plug-in unit of PANASONIC specialty, to utilize electric crystal storer to replace magnetic recording image, image can be recorded on flash memory to be similar to the form of data, be recorded in exactly together with much information in the middle of the video that is called as metadata, nearly all there is use in each news media.P2 is stuck in newspapering field, is only used for recording image file, and its file layout is specific.
Although each computation machine security service provider and movable storage device supplier have taked some means to protect the data security of movable storage device, effect is unsatisfactory, movable storage device data security is carried out to prevention and control and be still a difficult problem.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of method and apparatus of protecting movable storage device data security, in order to protect the data security of movable storage device.
For solving the problems of the technologies described above, technical scheme provided by the invention is: a kind of method of protecting movable storage device data security, it is characterized in that, and comprise the following steps:
Movable storage device is carried out to legitimate verification, judge whether described movable storage device is trusted device;
In the time judging that described movable storage device is trusted device, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data;
By open to the upper layer application of operating system the information data that is judged as secure file.
And a kind of device of protecting movable storage device data security, it is characterized in that, comprise with lower module:
Device authentication module, for movable storage device is carried out to legitimate verification, judges whether described movable storage device is trusted device;
Information data authentication module, for in the time that described device authentication module judges that described movable storage device is trusted device, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data;
The open module of information data, for opening the information data that is judged as secure file to the upper layer application of operating system.
Because the present invention is towards the application of movable storage device, by the data message in movable storage device being filtered in driving stage aspect, and carry out fail-safe analysis for particular file format, only reach safety, significant content is and dedicates operating system upper layer application object to, thereby safeguards system safety.The present invention can too much not increase operating system load, has ensured security of system simultaneously, has reached the object of movable storage device data security prevention and control.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
The treatment scheme schematic diagram of a kind of method of protecting movable storage device data security that Fig. 1 provides for the embodiment of the present invention one.
The treatment scheme schematic diagram of the method for the data security of the multiple movable storage device of protection that Fig. 2 provides for the embodiment of the present invention two.
Embodiment
For ease of the understanding to the embodiment of the present invention, be further explained explanation below in conjunction with accompanying drawing and as an example of specific embodiment example, and each embodiment does not form limitation of the invention.
Embodiment 1
As shown in Figure 1, the present embodiment provides the method for P2 card data security prevention and control in newspapering field picture editor work, to the driver of carry, comprises local device and other peripheral hardwares, in the time of initial start-up, can be considered new equipment, also can be set to as required trusted devices.Below only to the method core, the method that monitors the data security of the protection movable storage device after new movable storage device access elaborates.
Step 101, starts strobe utility.This strobe utility is realized by the computer program that drives level, initiatively checks that movable storage device data message are wherein set to invisible to the upper layer application of operating system.Upper layer application cannot " be seen " these files, also just can not trigger its virus that may carry or wooden horse because of these files of operation, can also prevent the active attack of the dangerous program pin such as virus or wooden horse to data file in terminal.
Step 102, carries out facility information authentication determination to movable storage device, and whether judgment device can carry out legitimate verification, for the equipment that can not carry out legitimate verification, enters step 104 startup file analysis mechanisms; For the equipment that can carry out legitimate verification, enter step 103 and carry out equipment validity checking, the result enters step 104 startup file analysis mechanisms while being trusted devices, and the result prompts for distrust equipment while being distrust equipment.The concrete grammar that carries out facility information authentication is: obtain the type coding that shows this storage device type, obtained type coding and default device type the encoding list are compared, determine whether this memory device is the equipment that can carry out legitimate verification after comparison.Take P2 card as example, after comparison type coding, determine that this memory device is P2 card, P2 jig has the coding of indicating its unique identity---and P2 card apparatus ID is the equipment that can carry out legitimate verification.
Step 103, the equipment that can carry out legitimate verification is carried out to legitimate verification, obtain the identity coding of equipment, this identity coding is used for showing unique identity of described movable storage device, itself and default trusted devices identity coding list are compared, if have this identity coding in default trusted devices identity coding list for trusted devices, otherwise be distrust equipment, shielding file access the user prompting that gives the alarm.In the time that described movable storage device does not show the identity coding of unique identity of described movable storage device, giving tacit consent to described movable storage device is trusted device, carries out the proof procedure of the form of follow-up information data; Or giving tacit consent to described movable storage device is distrust equipment, the information data in shielding movable storage device.Take P2 card as example, obtain and indicate P2 card apparatus ID, itself and default trust P2 card ID list are compared, in trusted devices list, there is this ID, this P2 card is trusted devices, otherwise is distrust equipment, shielding file access the user prompting that gives the alarm.Carry out legitimate verification for the movable storage device that has unique identity coding, can further ensure storage device data safety.
Step 104, startup file analysis mechanisms, first identify the significant information data format of system, secondly adopt corresponding analysis and recognition methods according to these information data formats, concrete: carry out killing if common information data format directly calls antivirus software, the information data after killing is judged as to secure file; If particular file format adopts particular analysis method, such as can be according to the defined declaration of this specific format file, adopt header check and/or integrity checking analytical approach described information data to be carried out to the analysis verification of file security, be that qualified information data is judged as secure file by the result, finally, to analyzing the open secure file of secure file execution step 105 obtaining, the apocrypha that analysis is obtained arranges mark and waits for that user further processes.Take P2 card as example, according to the specific requirement of picture editor's work, system need to operate the image data information in this card, specifically saves as AVI, BMP, MXF and tetra-kinds of forms of XML in storer, and only having the file of these four kinds of forms is significant data message for system.For the file of these four kinds of forms, corresponding analysis and recognition methods are set, further whether identification is secure file, recognition methods because of file layout different, wherein if the file of XML, BMP and AVI form is more common form, do not need particular analysis method, can directly call antivirus software and carry out general killing.MXF formatted file is the particular file format that professional domain is used, can be according to the defined declaration of this formatted file, and provide the analytical approach such as header check, integrity checking to carry out the analysis verification of file security.After analysis, suspicious file is arranged to mark, wait for that user further processes.
Step 105, open secure file.Confirm as safe file to operating system upper layer application operational label for carrying out, and make security certificate prompting.
Embodiment 2
The present embodiment provides in the operating system of embodiment 1, accesses the method for multiple movable storage device.As shown in Figure 2, the demonstration of facility information authentication result, the movable storage device of new access has P2 card, blue light equipment and other mobile devices, and wherein the method for the protection movable storage device data security of P2 card is identical with embodiment 1; Because blue light equipment and other movable storage devices are the equipment that can not carry out legitimate verification; therefore there is no this step of legitimate verification in the method for the data security of their protection movable storage device; but direct startup file analysis mechanisms, the embodiment of analysis mechanisms is identical with the startup file analysis mechanisms in embodiment 1.After analysis completes, suspicious file is arranged to mark, wait for that user further processes; Confirm as safe file to operating system upper layer application operational label for carrying out, and make security certificate prompting.
Embodiment 3
Protect a device for movable storage device data security, comprise with lower module:
Facility information authentication module, for described movable storage device is carried out to facility information authentication, judges whether described movable storage device can carry out legitimate verification; When judging that described movable storage device is can not carry out the equipment of legitimate verification time, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data.Facility information authentication module has the type coding that shows this storage device type for obtaining; Obtained type coding and default device type the encoding list are compared, after comparison, determine whether this memory device is the equipment that can carry out legitimate verification.
Device authentication module, for movable storage device is carried out to legitimate verification, judges whether described movable storage device is trusted device.Obtain the identity coding of movable storage device, this identity coding is used for showing unique identity of movable storage device; The identity coding of movable storage device and default trusted devices identity coding list are compared; If comprise the identity coding that shows movable storage device in default trusted devices identity coding list, judge that movable storage device is trusted device; Otherwise movable storage device is distrust equipment.In addition, device authentication module, when not showing the identity coding of unique identity of described movable storage device when movable storage device, giving tacit consent to movable storage device is trusted device, carries out the proof procedure of the form of follow-up information data; Or acquiescence movable storage device is distrust equipment, the information data in shielding movable storage device.
Information data authentication module, for in the time that described device authentication module judges that described movable storage device is trusted device, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data; Adopt corresponding analysis recognition method specifically to refer to: the information data of common form directly to be called to antivirus software and carry out killing, information data after killing is judged as to secure file: to the information data of specific format according to the defined declaration of described specific format, adopting header check and/or integrity checking analytical approach described information data to be carried out to the analysis verification of file security, is that qualified information data is judged as secure file by the result.
The open module of information data, for opening the information data that is judged as secure file to the upper layer application of operating system.The open module of information data, also, for before movable storage device being carried out to legitimate verification in described device authentication module, the data message in described movable storage device is set to invisible to the upper layer application of operating system.By the information data that is judged as secure file to operating system upper layer application operational label for carrying out, and make security certificate prompting.
The above; only for preferably embodiment of the present invention, but protection scope of the present invention is not limited to this, is anyly familiar with in technical scope that those skilled in the art disclose in the present invention; the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (16)

1. a method of protecting movable storage device data security, is characterized in that, comprises the following steps:
Movable storage device is carried out to legitimate verification, judge whether described movable storage device is trusted device;
In the time judging that described movable storage device is trusted device, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data;
By open to the upper layer application of operating system the information data that is judged as secure file.
2. a kind of method of protecting movable storage device data security according to claim 1, is characterized in that, described movable storage device is carried out to legitimate verification before, also comprise:
Described movable storage device is carried out to facility information authentication, judge whether described movable storage device can carry out legitimate verification;
When judging that described movable storage device is can not carry out the equipment of legitimate verification time, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data.
3. a kind of method of protecting movable storage device data security according to claim 2, is characterized in that, described movable storage device is carried out to facility information authentication, judges that whether described movable storage device can carry out legitimate verification, comprising:
Obtain the type coding that shows this storage device type;
Obtained type coding and default device type the encoding list are compared, after comparison, determine whether this memory device is the equipment that can carry out legitimate verification.
4. a kind of method of protecting movable storage device data security according to claim 1, is characterized in that, described movable storage device is carried out to legitimate verification before, also comprise:
Data message in described movable storage device is set to invisible to the upper layer application of operating system.
5. a kind of method of protecting movable storage device data security according to claim 1, is characterized in that, described carries out legitimate verification to movable storage device, judges that whether described movable storage device is trusted device, comprising:
Obtain the identity coding of described movable storage device, this identity coding is used for showing unique identity of described movable storage device;
The identity coding of described movable storage device and default trusted devices identity coding list are compared;
If comprise the identity coding that shows described movable storage device in default trusted devices identity coding list, judge that described movable storage device is trusted device; Otherwise described movable storage device is distrust equipment.
6. want a kind of method of protecting movable storage device data security described in 5 according to right, it is characterized in that, described carries out legitimate verification to movable storage device, judges that whether described movable storage device is trusted device, comprising:
In the time that described movable storage device does not show the identity coding of unique identity of described movable storage device, giving tacit consent to described movable storage device is trusted device, carries out the proof procedure of the form of follow-up information data; Or giving tacit consent to described movable storage device is distrust equipment, shields the information data in described movable storage device.
7. according to a kind of method of protecting movable storage device data security described in claim 1 to 6 any one; it is characterized in that; the described form according to described information data adopts corresponding analysis recognition method to judge that whether described information data is secure file, comprising:
The information data of common form is directly called to antivirus software and carry out killing, the information data after killing is judged as to secure file;
To the information data of specific format according to the defined declaration of described specific format, adopting header check and/or integrity checking analytical approach described information data to be carried out to the analysis verification of file security, is that qualified information data is judged as secure file by the result.
8. a kind of method of protecting movable storage device data security according to claim 1, is characterized in that, the described information data by being judged as secure file is open to the upper layer application of operating system, comprising:
By the information data that is judged as secure file to operating system upper layer application operational label for carrying out, and make security certificate prompting.
9. a device of protecting movable storage device data security, is characterized in that, comprises with lower module:
Device authentication module, for movable storage device is carried out to legitimate verification, judges whether described movable storage device is trusted device;
Information data authentication module, for in the time that described device authentication module judges that described movable storage device is trusted device, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data;
The open module of information data, for opening the information data that is judged as secure file to the upper layer application of operating system.
10. a kind of device of protecting movable storage device data security according to claim 9, is characterized in that, described a kind of device of protecting movable storage device data security, also comprises:
Facility information authentication module, for described movable storage device is carried out to facility information authentication, judges whether described movable storage device can carry out legitimate verification;
When judging that described movable storage device is can not carry out the equipment of legitimate verification time, identify the form of the information data in described movable storage device, adopt corresponding analysis recognition method to judge whether described information data is secure file according to the form of described information data.
11. a kind of devices of protecting movable storage device data security according to claim 10, is characterized in that, described facility information authentication module has the type coding that shows this storage device type for obtaining; Obtained type coding and default device type the encoding list are compared, after comparison, determine whether this memory device is the equipment that can carry out legitimate verification.
12. a kind of devices of protecting movable storage device data security according to claim 9, is characterized in that:
The open module of described information data, also, for before movable storage device being carried out to legitimate verification in described device authentication module, the data message in described movable storage device is set to invisible to the upper layer application of operating system.
13. a kind of devices of protecting movable storage device data security according to claim 9, is characterized in that:
Described device authentication module, specifically for obtaining the identity coding of described movable storage device, this identity coding is used for showing unique identity of described movable storage device;
The identity coding of described movable storage device and default trusted devices identity coding list are compared;
If comprise the identity coding that shows described movable storage device in default trusted devices identity coding list, judge that described movable storage device is trusted device; Otherwise described movable storage device is distrust equipment.
14. want a kind of device of protecting movable storage device data security described in 13 according to right, it is characterized in that:
Described device authentication module, when not showing the identity coding of unique identity of described movable storage device when described movable storage device, giving tacit consent to described movable storage device is trusted device, carries out the proof procedure of the form of follow-up information data; Or giving tacit consent to described movable storage device is distrust equipment, shields the information data in described movable storage device.
15. according to a kind of device of protecting movable storage device data security described in claim 9 to 14 any one, it is characterized in that;
Described information data authentication module, carries out killing specifically for the information data of common form is directly called to antivirus software, and the information data after killing is judged as to secure file:
To the information data of specific format according to the defined declaration of described specific format, adopting header check and/or integrity checking analytical approach described information data to be carried out to the analysis verification of file security, is that qualified information data is judged as secure file by the result.
16. a kind of devices of protecting movable storage device data security according to claim 9, is characterized in that:
The open module of described information data, specifically for by the information data that is judged as secure file to operating system upper layer application operational label for carrying out, and make security certificate and point out.
CN201210592689.2A 2012-12-30 2012-12-30 Method and device for protecting movable storage device data security Pending CN103914665A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210592689.2A CN103914665A (en) 2012-12-30 2012-12-30 Method and device for protecting movable storage device data security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210592689.2A CN103914665A (en) 2012-12-30 2012-12-30 Method and device for protecting movable storage device data security

Publications (1)

Publication Number Publication Date
CN103914665A true CN103914665A (en) 2014-07-09

Family

ID=51040337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210592689.2A Pending CN103914665A (en) 2012-12-30 2012-12-30 Method and device for protecting movable storage device data security

Country Status (1)

Country Link
CN (1) CN103914665A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372537A (en) * 2016-08-31 2017-02-01 宇龙计算机通信科技(深圳)有限公司 Document protection method and device and terminal equipment
CN107463832A (en) * 2016-10-09 2017-12-12 哈尔滨广播电视台 A kind of move media safety certification killing system
CN108345804A (en) * 2018-03-22 2018-07-31 北京可信华泰信息技术有限公司 A kind of storage method in trusted computation environment and device
CN108875373A (en) * 2017-12-29 2018-11-23 北京安天网络安全技术有限公司 Mobile memory medium file management-control method, device, system and electronic equipment
CN112351421A (en) * 2020-09-14 2021-02-09 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693374A (en) * 2011-09-23 2012-09-26 新奥特(北京)视频技术有限公司 File analysis method, user equipment, server and system for data security monitoring and controlling
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling
CN102737176A (en) * 2011-09-23 2012-10-17 新奥特(北京)视频技术有限公司 Data security prevention and control file analysis method and device
CN102737174A (en) * 2011-09-23 2012-10-17 新奥特(北京)视频技术有限公司 Method and system for verifying data validity in data security prevention and control
CN102760211A (en) * 2011-04-26 2012-10-31 新奥特(北京)视频技术有限公司 Mobile storage device data safety prevention and control method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760211A (en) * 2011-04-26 2012-10-31 新奥特(北京)视频技术有限公司 Mobile storage device data safety prevention and control method
CN102693374A (en) * 2011-09-23 2012-09-26 新奥特(北京)视频技术有限公司 File analysis method, user equipment, server and system for data security monitoring and controlling
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling
CN102737176A (en) * 2011-09-23 2012-10-17 新奥特(北京)视频技术有限公司 Data security prevention and control file analysis method and device
CN102737174A (en) * 2011-09-23 2012-10-17 新奥特(北京)视频技术有限公司 Method and system for verifying data validity in data security prevention and control

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372537A (en) * 2016-08-31 2017-02-01 宇龙计算机通信科技(深圳)有限公司 Document protection method and device and terminal equipment
CN106372537B (en) * 2016-08-31 2019-08-30 宇龙计算机通信科技(深圳)有限公司 A kind of document protection method, apparatus and terminal device
CN107463832A (en) * 2016-10-09 2017-12-12 哈尔滨广播电视台 A kind of move media safety certification killing system
CN108875373A (en) * 2017-12-29 2018-11-23 北京安天网络安全技术有限公司 Mobile memory medium file management-control method, device, system and electronic equipment
CN108875373B (en) * 2017-12-29 2021-04-20 北京安天网络安全技术有限公司 Mobile storage medium file control method, device and system and electronic equipment
CN108345804A (en) * 2018-03-22 2018-07-31 北京可信华泰信息技术有限公司 A kind of storage method in trusted computation environment and device
CN108345804B (en) * 2018-03-22 2021-01-08 北京可信华泰信息技术有限公司 Storage method and device in trusted computing environment
CN112351421A (en) * 2020-09-14 2021-02-09 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission
CN112351421B (en) * 2020-09-14 2024-02-06 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission

Similar Documents

Publication Publication Date Title
CN103914665A (en) Method and device for protecting movable storage device data security
CN105493470A (en) Dynamic application security verification
CN103581187B (en) Method and system for controlling access rights
CN110933103B (en) Anti-crawler method, device, equipment and medium
CN107301343B (en) Safety data processing method and device and electronic equipment
US20160197950A1 (en) Detection system and method for statically detecting applications
CN102244659A (en) Execution method and apparatus of security policy script and security policy system
CN104915599A (en) Application program monitoring method and terminal
CN110855642B (en) Application vulnerability detection method and device, electronic equipment and storage medium
CN102867143A (en) Quick filtering method for malicious application programs
US20150193280A1 (en) Method and device for monitoring api function scheduling in mobile terminal
CN103473512B (en) A kind of mobile memory medium management method and device
CN114662071A (en) Data access control method and device, storage medium and electronic equipment
CN111181771A (en) Security changing abnormity positioning method and device based on fort machine and electronic equipment
CN103745368A (en) Method for realizing two-dimension code safe shopping on shopping platform
CN102693374A (en) File analysis method, user equipment, server and system for data security monitoring and controlling
WO2021024476A1 (en) Software analysis device, software analysis method, and computer-readable medium
CN110968860A (en) Security verification method for application account, computer equipment and computer-readable storage medium
CN102737175A (en) Equipment access method and user equipment and device in data security protection and control
CN108810002A (en) The more CA application systems and method of safety chip
CN115296874A (en) Computer network security system, method, medium, equipment and terminal
CN102760211B (en) A kind of method of movable storage device data security
CN104102887B (en) A kind of operating system security login authentication implementation method
EP3007092B1 (en) Mobile device-based authentication method and authentication apparatus
CN113285945A (en) Communication security monitoring method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140709