CN105550593A - Cloud disk file monitoring method and device based on local area network - Google Patents

Cloud disk file monitoring method and device based on local area network Download PDF

Info

Publication number
CN105550593A
CN105550593A CN201510921132.2A CN201510921132A CN105550593A CN 105550593 A CN105550593 A CN 105550593A CN 201510921132 A CN201510921132 A CN 201510921132A CN 105550593 A CN105550593 A CN 105550593A
Authority
CN
China
Prior art keywords
cloud dish
file
cloud
down operation
uploading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510921132.2A
Other languages
Chinese (zh)
Inventor
吉艳敏
江爱军
张聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Beijing Qianxin Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510921132.2A priority Critical patent/CN105550593A/en
Publication of CN105550593A publication Critical patent/CN105550593A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a cloud disk file monitoring method and device based on a local area network. The method specifically comprises following steps: when monitoring an uploading or downloading operation to a cloud disk file, obtaining a cloud disk file control strategy corresponding to a user terminal, wherein the cloud disk file control strategy is provided by a control terminal in the local area network; and when the cloud disk file control strategy corresponding to the user terminal is forbidding, intercepting the uploading or downloading operation to the cloud disk file. According to the embodiment of the invention, the user terminal is prevented from uploading or downloading the cloud disk file randomly so as to avoid conditions of causing file leakage or threatening the enterprise network security; and the enterprise network security is improved.

Description

A kind of cloud dish file monitor method and apparatus based on LAN (Local Area Network)
Technical field
The present invention relates to local area network technology field, particularly relate to a kind of cloud dish file monitor method and apparatus based on LAN (Local Area Network).
Background technology
Along with the fast development of infotech, increasing user is by cloud disk storage data, wherein, cloud dish is a kind of internet storage tool, also be the product of internet cloud, the service such as storage, reading, download that cloud dish provides information by internet for enterprises and individuals, has the feature of safety and stability, mass memory.
For the LAN (Local Area Network) such as enterprise network, synergetic office work can be realized by cloud dish, utilize comprehensive storage of cloud dish, management and control, movement, share and the power of cooperation, business events flow path is optimized, efficiency of operation is improved.
But cloud dish also brings the problem of information security easily providing simultaneously.Such as inner in enterprise network, usually the vital document of enterprise is stored in cloud dish server, these vital documents can be downloaded by the personnel that enterprises has permission, once these vital documents are downloaded and after leaking, probably bring huge economic loss to enterprise; In addition, enterprise personnel also can to the upload file of cloud dish, if carry rogue program in the file uploaded, rogue program not only can attack the server of enterprise, server is collapsed, causes loss of data, also can threaten the safety of enterprise network.
Summary of the invention
In view of the above problems, the present invention is proposed to provide a kind of a kind of cloud dish file monitor method and apparatus based on LAN (Local Area Network) overcoming the problems referred to above or solve the problem at least in part.
According to one aspect of the present invention, provide a kind of cloud dish file monitor method based on LAN (Local Area Network), comprising:
Monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network);
When cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
Alternatively, described method also comprises:
When the cloud dish document control strategy that described user terminal is corresponding is permission, allow to continue uploading or down operation for cloud dish file described in execution.
Alternatively, described method also comprises:
Perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
The operation information of described record is uploaded to described control terminal.
Alternatively, uploading or down operation for cloud dish file is monitored as follows:
Monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Monitoring browser uploading or down operation for cloud dish file.
Alternatively, described monitoring cloud dish client uploading or the step of down operation for cloud dish file, comprising:
The process identification (PID) of the process run and the first cloud disc identifier of prestoring are mated;
When described process identification (PID) and the first cloud disc identifier coupling, determine that described process is process corresponding to cloud dish client;
Monitor process the uploading or down operation for cloud dish file that described cloud dish client is corresponding.
Alternatively, described monitoring browser uploading or the step of down operation for cloud dish file, comprising:
Resolve the URL(uniform resource locator) in described browser, obtain keyword message;
Described keyword message and the second cloud disc identifier prestored are mated;
When described keyword message and the second cloud disc identifier coupling, determine that described browser current web page is cloud dish operation web page;
Monitor uploading or down operation for cloud dish file in described browser current web page.
Alternatively, described method also comprises:
Before performing the described upload operation for cloud dish file, security sweep is carried out to described cloud dish file;
When being determined by described security sweep to carry rogue program in described cloud dish file, tackle described upload operation.
Alternatively, described method also comprises:
Whether before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
When detecting that described cloud dish file is preset protected file, tackle described down operation.
According to a further aspect in the invention, provide a kind of cloud dish document monitoring device based on LAN (Local Area Network), comprising:
Operation monitoring module, for monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network); And
Operation intercepting module, for when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
Alternatively, described device also comprises:
Operation permission module, when being permission for the cloud dish document control strategy corresponding at described user terminal, allows to continue uploading or down operation for cloud dish file described in execution.
Alternatively, described device also comprises:
Operation note module, for perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
Transmission module on record, for being uploaded to described control terminal by the operation information of described record.
Alternatively, described operation monitoring module comprises: monitoring submodule, for monitoring uploading or down operation for cloud dish file;
Described monitoring submodule, comprising:
First monitoring means, for monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Second monitoring means, for monitoring browser uploading or down operation for cloud dish file.
Alternatively, described first monitoring means, comprising:
First coupling subelement, for mating the process identification (PID) of the process run and the first cloud disc identifier of prestoring;
First determines subelement, for when described process identification (PID) and the first cloud disc identifier coupling, determines that described process is process corresponding to cloud dish client;
First monitoring subelement, for monitoring process uploading or down operation for cloud dish file corresponding to described cloud dish client.
Alternatively, described second monitoring means, comprising:
Resolving subelement, for resolving the URL(uniform resource locator) in described browser, obtaining keyword message;
Second coupling subelement, for mating described keyword message and the second cloud disc identifier prestored;
Second determines subelement, for when described keyword message and the second cloud disc identifier mate, determines that described browser current web page is cloud dish operation web page;
Second monitoring subelement, for monitoring uploading or down operation for cloud dish file in described browser current web page.
Alternatively, it is characterized in that, described device also comprises:
Scan module, for before performing the described upload operation for cloud dish file, carries out security sweep to described cloud dish file;
Uploading blocking module, for when being determined by described security sweep to carry rogue program in described cloud dish file, tackling described upload operation.
Alternatively, described device also comprises:
File detection module, whether for before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
Downloading blocking module, for when detecting that described cloud dish file is preset protected file, tackling described down operation.
According to a kind of cloud dish file monitor method and apparatus based on LAN (Local Area Network) that the embodiment of the present invention provides, can monitor the operation behavior of the upload and download of cloud dish file, monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding, when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception; The cloud dish document control strategy that can provide according to control terminal due to the embodiment of the present invention to perform in user terminal cloud dish file upload or down operation controls, wherein, by arranging cloud dish document control strategy corresponding to user terminal for forbidding, uploading or down operation for cloud dish file in this user terminal can be tackled, therefore can prevent from user terminal from arbitrarily uploading or downloading cloud dish file cause file to reveal or threaten the situation of intranet safety to occur, to improve the security of enterprise network.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading the detailed description of hereafter Alternate embodiments, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of Alternate embodiments, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network);
Fig. 2 shows a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network);
Fig. 3 shows a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network);
Fig. 4 shows a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network); And
Fig. 5 shows a kind of according to an embodiment of the invention structured flowchart of the cloud dish document monitoring device based on LAN (Local Area Network).
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
With reference to Fig. 1, show a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network), specifically can comprise the steps:
Step 101, monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy can be provided by the control terminal in described LAN (Local Area Network);
Step 102, when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
The embodiment of the present invention can be applied in the LAN (Local Area Network) such as enterprise network, government's net, campus network; In above-mentioned LAN (Local Area Network), user terminal refers to the terminal device that can be performed the file operation of cloud dish by cloud dish client or browser; Described control terminal can be used for providing control strategy, such as, can arrange and forbid/allow which user terminal uploads or download cloud dish file etc., to prevent the invasion of file leakage or rogue program in LAN (Local Area Network).
In a particular application, the present invention is not limited for the concrete mode formulating cloud dish document control strategy.Such as, corresponding cloud dish document control strategy can be formulated according to the correlativity of all departments' job specification in enterprise and cloud dish file, such as, cloud dish document control strategy corresponding to the user terminal of research and development department can be set for allowing, and cloud dish document control strategy corresponding to the user terminal arranging administrative department is for forbidding.In actual applications, research staff due to enterprise needs to be grasped the core technology of enterprise, and carry out R&D work, therefore the user terminal uploads allowing research and development department or the cloud dish file downloaded in enterprise, and the user terminal of research and development department cannot connect outer net usually, thus can provide in the work for research staff easily on basis, prevent the vital document of enterprise from leaking and the invasion of malicious file.User terminal due to administrative department needs to be connected with outer net usually, and the staff of administrative department does not need the core technology file of accessing enterprise, therefore, cloud dish document control strategy corresponding to the user terminal of administrative department can be set for forbidding, to be leaked by outer net to prevent the vital document of enterprise and rogue program inner by outer net invasion enterprise network.
Again such as, security sweep result from user terminal each in LAN (Local Area Network) can also be periodically collected by control terminal, by analyzing the security sweep result of each user terminal, determine the level of security of each user terminal, for the user terminal that level of security is higher, corresponding cloud dish document control strategy can be set for allowing, and corresponding cloud dish document control strategy is arranged for forbidding for the user terminal that level of security is lower.By periodically collecting the security sweep result from user terminal each in LAN (Local Area Network), when the level of security of user terminal changes, can upgrade accordingly cloud dish document control strategy.
Be appreciated that the mode of above-mentioned formulation cloud dish document control strategy is only as application example of the present invention, in actual applications, those skilled in the art can formulate cloud dish document control strategy according to actual needs flexibly.
Wherein, can be communicated between above-mentioned user terminal and above-mentioned control terminal by standard agreement or proprietary protocol, wherein, proprietary protocol has closure and the high advantage of security; Be appreciated that the embodiment of the present invention is not limited for the concrete communication mode between user terminal and control terminal.
In actual applications, the user of control terminal can be the advanced level user that network manager etc. has certain network security knowledge, therefore, the user of control terminal can according to the current safety demand of LAN (Local Area Network) and actual conditions, formulate corresponding cloud dish document control strategy neatly, to improve the security of enterprise network.
In embodiments of the present invention, can monitoring modular be provided with on the subscriber terminal, in monitor user ' terminal, whether have uploading or down operation cloud dish file.Monitor user terminal has perform for cloud dish file upload or down operation time, then can read the cloud dish document control strategy that described user terminal is corresponding from the control terminal in described LAN (Local Area Network); According to the described user terminal arranged in described control terminal to cloud dish document control strategy, perform corresponding control operation.Particularly, when cloud dish document control strategy corresponding to described user terminal is for forbidding, tackles described user terminal and performing uploading or down operation for cloud dish file.
Be appreciated that, the present invention is not limited for the obtain manner of above-mentioned cloud dish document control strategy, such as, can by cloud dish document control policy store at control terminal, user terminal passes through cloud dish document control strategy corresponding to local area network access control terminal online query, or control terminal by above-mentioned cloud dish document control policy distribution to user terminal, can be inquired about in this locality to make user terminal.
In a kind of embodiment of the present invention, said method can also comprise:
When the cloud dish document control strategy that described user terminal is corresponding is permission, allow to continue uploading or down operation for cloud dish file described in execution.
In a kind of application example of the present invention, control terminal can be that each user terminal formulates corresponding cloud dish document control strategy, and is issued to corresponding user terminal by intranet.Wherein, cloud dish document control strategy can be represented by a mapping table, the terminal iidentification of user terminal and the mapping relations of corresponding cloud dish document control strategy can be comprised in this mapping table, with reference to table 1, show the concrete signal of mapping table corresponding to a kind of cloud dish document control strategy of the present invention.
Table 1
Terminal iidentification Upload cloud dish file Download cloud dish file
00-01-02-03-04-05 Allow Forbid
00-01-02-03-04-06 Forbid Allow
00-01-02-03-04-07 Forbid Forbid
00-01-02-03-04-08 Allow Allow
In table 1 above, MAC (MediaAccessControl, the media interviews control) address of what terminal iidentification adopted is user terminal, be appreciated that, in actual applications, the present invention is not limited for terminal iidentification, such as, can also adopt the IP address etc. of user terminal.
In a particular application, the described user terminal of interception perform for cloud dish file upload or after down operation, can also in display interface display reminding information, to inform that the current terminal device of user is forbidden performing uploading or down operation cloud dish file.
In actual applications, can access cloud dish file by two kinds of modes, a kind of is that cloud dish client by installing in user terminal conducts interviews, particularly, user inputs after username and password logs in cloud dish client, can perform corresponding operation to cloud dish file; Another kind is conducted interviews by the browser in user terminal, particularly, open the login page of cloud dish in a browser, input after username and password logs in login page, cloud dish operation pages can be entered corresponding operation is performed to cloud dish file.Therefore, the embodiment of the present invention is monitored for this two kinds of access modes operation to cloud dish file.
In a kind of embodiment of the present invention, uploading or down operation for cloud dish file can be monitored as follows:
Monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Monitoring browser uploading or down operation for cloud dish file.
In another kind of embodiment of the present invention, described monitoring cloud dish client uploading or the step of down operation for cloud dish file, specifically can comprise following sub-step:
Sub-step S11, the process identification (PID) of the process run and the first cloud disc identifier of prestoring to be mated;
Sub-step S12, when described process identification (PID) and the first cloud disc identifier coupling, determine that described process is process corresponding to cloud dish client;
Sub-step S13, monitor process uploading or down operation for cloud dish file corresponding to described cloud dish client.
In embodiments of the present invention, can prestore the first cloud disc identifier, this first cloud disc identifier can comprise the information such as the title of at present conventional cloud dish client or digital signature, can be used for identifying different cloud dish clients.Such as, the first cloud disc identifier prestored comprises: Baidu's cloud dish, 360 cloud dishes etc.
In a particular application, the process that user terminal runs has a lot, the process identification (PID) of these processes and the first cloud disc identifier prestored can be mated.Such as, in the process that user terminal runs, exist and the first cloud disc identifier " 360 cloud dish " process identification (PID) of mating, then can determine that this process is processes corresponding to 360 cloud dish clients, then can monitor this process uploading or down operation for cloud dish file.
In embodiments of the present invention, can be monitored the event (such as upload or download) for the file operation of cloud dish in user terminal by a background process.Particularly, this observation process can be accomplished in several ways.Such as, can the broadcast that sends of monitoring users terminal operating system, by the filtration to system broadcast message, know that cloud dish file is by the event operated.Also namely, background process can to each broadcast system message judge, if type of message be cloud dish file by the event operated, then can therefrom extract by the information such as filename, suffix name of the cloud dish file operated.
Or, also can utilize API (ApplicationProgrammingInterface, the application programming interface) Hook Function of user terminal operations system, cloud dish file is monitored by the event operated.In embodiments of the present invention, background process is utilized to provide Hook Function, and by the call function deflector guide subfunction (usually being realized by Modification growth function entry address) of system execute file operation originally, such Hook Function just can obtain by the information such as filename, suffix name of the cloud dish file operated, and completes file by the monitoring of Action Events.
Be appreciated that, uploading of cloud dish file or down operation is detected only as a kind of application example of the present invention by above-mentioned two kinds of modes, in actual applications, the present invention for cloud dish file upload or the monitoring mode of down operation is not limited, both can monitor in application layer, also can monitor at driving layer.
In a kind of embodiment of the present invention, described monitoring browser uploading or the step of down operation for cloud dish file, specifically can comprise following sub-step:
Sub-step S21, the URL(uniform resource locator) of resolving in described browser, obtain keyword message;
Sub-step S22, described keyword message and the second cloud disc identifier of prestoring to be mated;
Sub-step S23, described keyword message and the second cloud disc identifier coupling time, determine that described browser current web page is cloud dish operation web page;
Sub-step S24, monitor uploading or down operation for cloud dish file in described browser current web page.
Wherein, the second cloud disc identifier is for identifying the keyword message in different cloud dish URL (UniformResourceLocator, URL(uniform resource locator)).In a kind of application example of the present invention, the the second cloud disc identifier prestored comprises: pan.baidu, yunpan.360, weiyun, represent Baidu's cloud dish respectively, 360 cloud dish and thin clouds, uniform resource position mark URL in browser, assumed is: http://pan.baidu.com/#list/path=%2F, by resolving this URL, keyword message pan.baidu can be obtained, this keyword message and the second cloud disc identifier prestored are mated, " pan.baidu " that can obtain in the second cloud disc identifier of this keyword message and storage matches, then can determine that browser current web page is cloud dish operation web page.
Uploading or down operation for cloud dish file in following monitoring current web page.Such as, monitor the HTTP (HyperTextTransferProtocol for file download operation, HTML (Hypertext Markup Language)) request, URL information corresponding to this HTTP request is: http://www.weiyun.com/disk/aa.pdf, by resolving this URL, known current request downloads the file that name is called aa.pdf.
Be appreciated that, above-mentioned HTTP agreement is only as a kind of application example of the present invention, and in actual applications, the present invention is not limited for the host-host protocol uploading or download cloud dish file, such as can also adopt FTP (FileTransferProtocol, file transfer protocol (FTP)) etc.
To sum up, the embodiment of the present invention can be monitored the operation behavior of the upload and download of cloud dish file, monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding, when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.The cloud dish document control strategy that the embodiment of the present invention can provide according to control terminal to perform in user terminal cloud dish file upload or down operation controls, by arranging cloud dish document control strategy corresponding to user terminal for forbidding, uploading or down operation for cloud dish file in this user terminal can be tackled, thus can prevent from user terminal from arbitrarily uploading or download cloud dish file causing file to reveal or threatening the situation of intranet safety to occur, to improve the security of enterprise network.
With reference to Fig. 2, show a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network), specifically can comprise the steps:
Step 201, monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network);
Step 202, when cloud dish document control strategy corresponding to described user terminal is for allowing, allow to continue to perform described uploading or down operation for cloud dish file;
Step 203, perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
Step 204, the operation information of described record is uploaded to described control terminal.
With reference to table 2, show the concrete signal of a kind of operation note of the present invention.
Table 2
Terminal iidentification File identification Behavior identifies
00-01-02-03-04-05 aa.doc Download
00-01-02-03-04-06 bb.doc Upload
00-01-02-03-04-07 cc.pdf Upload
00-01-02-03-04-08 aa.doc Download
The embodiment of the present invention described for cloud dish file upload or down operation implementation in, the operation information that record is corresponding, and the control terminal this operation information is uploaded in LAN (Local Area Network), with the operation note making the keeper of LAN (Local Area Network) can be inquired about cloud dish file by control terminal, upload or behavior that down operation is corresponding mark owing to can comprise in this operation note, upload described in execution or the terminal iidentification of user terminal of down operation, and the file identification of described cloud dish file, therefore, can learn certain vital document of enterprises is by which platform user terminal downloads by operation note, or, certain file carrying rogue program is by which platform user terminal uploads, thus this user terminal can be navigated to according to the terminal iidentification of user terminal, to carry out management and control to this user terminal, such as can disconnect this user terminal network connect with prevent vital document from leaking or rogue program continue spread, thus can find early and stop the event of loss or security threat may be brought to occur to enterprise.
Further, more reasonably cloud dish document control strategy can also be formulated according to this operation note.Particularly, control terminal can according to the operation note from each user terminal in LAN (Local Area Network) received, behavioural analysis is carried out to each user terminal, when finding that user terminal exists suspicious actions, such as, learnt the vital document of each development project in certain user terminal recent frequent downloads enterprise by operation note, then by cloud dish document control policy update corresponding for this user terminal for forbidding, leak to prevent vital document.
With reference to Fig. 3, show a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network), specifically can comprise the steps:
Step 301, monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network);
Step 302, when cloud dish document control strategy corresponding to described user terminal is for allowing, allow to continue to perform described uploading or down operation for cloud dish file;
Step 303, before performing the described upload operation for cloud dish file, security sweep is carried out to described cloud dish file;
In a particular application, described security sweep can carry out security sweep by the black and white lists that pre-sets and checking and killing virus engine, is appreciated that the present invention is not limited for the concrete mode of security sweep.
Step 304, when being determined by described security sweep to carry rogue program in described cloud dish file, tackle described upload operation.
Wherein, rogue program refers to one section of program of writing with attack intension, specifically can comprise: trapdoor, logic bomb, Trojan Horse, worm, bacterium, virus etc.
Pass through the embodiment of the present invention, can before performing the upload operation for cloud dish file, security sweep is carried out to cloud dish file, when being determined by described security sweep to carry rogue program in described cloud dish file, tackle described upload operation, thus the situation that can prevent rogue program from invading enterprise network occurs, to improve the security of enterprise network.
With reference to Fig. 4, show a kind of according to an embodiment of the invention flow chart of steps of the cloud dish file monitor method based on LAN (Local Area Network), specifically can comprise the steps:
Step 401, monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network);
Step 402, when cloud dish document control strategy corresponding to described user terminal is for allowing, allow to continue to perform described uploading or down operation for cloud dish file;
Step 403, whether before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
Step 404, when detecting that described cloud dish file is preset protected file, tackle described down operation.
In embodiments of the present invention; described preset protected file is specifically as follows the classified papers, core technology document etc. of enterprises; in actual applications; which file those skilled in the art can pre-set belongs to preset protected file, and the present invention is not limited for the concrete form of preset protected file.
Pass through the embodiment of the present invention; before performing the down operation for cloud dish file, described cloud dish file can be detected, when detecting that described cloud dish file is preset protected file; tackle described down operation, thus can prevent the vital document in enterprise from leaking.
With reference to Fig. 5, show a kind of according to an embodiment of the invention structured flowchart of the cloud dish document monitoring device based on LAN (Local Area Network), specifically can comprise as lower module:
Operation monitoring module 501, for monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network); And
Operation intercepting module 502, for when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
In a kind of embodiment of the present invention, described device can also comprise:
Operation permission module, when being permission for the cloud dish document control strategy corresponding at described user terminal, allows to continue uploading or down operation for cloud dish file described in execution.
In another kind of embodiment of the present invention, described device can also comprise:
Operation note module, for perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
Transmission module on record, for being uploaded to described control terminal by the operation information of described record.
In another embodiment of the present invention, described operation monitoring module specifically can comprise: monitoring submodule, for monitoring uploading or down operation for cloud dish file;
Described monitoring submodule, specifically can comprise:
First monitoring means, for monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Second monitoring means, for monitoring browser uploading or down operation for cloud dish file.
In another embodiment of the present invention, described first monitoring means, specifically can comprise:
First coupling subelement, for mating the process identification (PID) of the process run and the first cloud disc identifier of prestoring;
First determines subelement, for when described process identification (PID) and the first cloud disc identifier coupling, determines that described process is process corresponding to cloud dish client;
First monitoring subelement, for monitoring process uploading or down operation for cloud dish file corresponding to described cloud dish client.
In another embodiment of the present invention, described second monitoring means, specifically can comprise:
Resolving subelement, for resolving the URL(uniform resource locator) in described browser, obtaining keyword message;
Second coupling subelement, for mating described keyword message and the second cloud disc identifier prestored;
Second determines subelement, for when described keyword message and the second cloud disc identifier mate, determines that described browser current web page is cloud dish operation web page;
Second monitoring subelement, for monitoring uploading or down operation for cloud dish file in described browser current web page.
In another embodiment of the present invention, described device can also comprise:
Scan module, for before performing the described upload operation for cloud dish file, carries out security sweep to described cloud dish file;
Uploading blocking module, for when being determined by described security sweep to carry rogue program in described cloud dish file, tackling described upload operation.
In another embodiment of the present invention, described device can also comprise:
File detection module, whether for before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
Downloading blocking module, for when detecting that described cloud dish file is preset protected file, tackling described down operation.
For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the equipment in embodiment and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can use with arbitrary array mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions based on the some or all parts in the cloud dish file monitor method and apparatus of LAN (Local Area Network) that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the embodiment of the present invention.The present invention can also be embodied as part or all equipment for performing method as described herein or device program (such as, computer program and computer program).Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from Internet platform and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.
The invention discloses A1, a kind of cloud dish file monitor method based on LAN (Local Area Network), comprising:
Monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network);
When cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
A2, method as described in claim A1, it is characterized in that, described method also comprises:
When the cloud dish document control strategy that described user terminal is corresponding is permission, allow to continue uploading or down operation for cloud dish file described in execution.
A3, method as described in claim A2, it is characterized in that, described method also comprises:
Perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
The operation information of described record is uploaded to described control terminal.
A4, method as described in claim A1, is characterized in that, monitor uploading or down operation for cloud dish file as follows:
Monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Monitoring browser uploading or down operation for cloud dish file.
A5, method as described in claim A4, is characterized in that, described monitoring cloud dish client uploading or the step of down operation for cloud dish file, comprising:
The process identification (PID) of the process run and the first cloud disc identifier of prestoring are mated;
When described process identification (PID) and the first cloud disc identifier coupling, determine that described process is process corresponding to cloud dish client;
Monitor process the uploading or down operation for cloud dish file that described cloud dish client is corresponding.
A6, method as described in claim A4, is characterized in that, described monitoring browser uploading or the step of down operation for cloud dish file, comprising:
Resolve the URL(uniform resource locator) in described browser, obtain keyword message;
Described keyword message and the second cloud disc identifier prestored are mated;
When described keyword message and the second cloud disc identifier coupling, determine that described browser current web page is cloud dish operation web page;
Monitor uploading or down operation for cloud dish file in described browser current web page.
A7, either method as described in claim A1 to A6, it is characterized in that, described method also comprises:
Before performing the described upload operation for cloud dish file, security sweep is carried out to described cloud dish file;
When being determined by described security sweep to carry rogue program in described cloud dish file, tackle described upload operation.
A8, either method as described in claim A1 to A6, it is characterized in that, described method also comprises:
Whether before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
When detecting that described cloud dish file is preset protected file, tackle described down operation.
The invention discloses B9, a kind of cloud dish document monitoring device based on LAN (Local Area Network), comprising:
Operation monitoring module, for monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network); And
Operation intercepting module, for when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
B10, device as described in claim B9, it is characterized in that, described device also comprises:
Operation permission module, when being permission for the cloud dish document control strategy corresponding at described user terminal, allows to continue uploading or down operation for cloud dish file described in execution.
B11, device as described in claim B10, it is characterized in that, described device also comprises:
Operation note module, for perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
Transmission module on record, for being uploaded to described control terminal by the operation information of described record.
B12, device as described in claim B9, it is characterized in that, described operation monitoring module comprises: monitoring submodule, for monitoring uploading or down operation for cloud dish file;
Described monitoring submodule, comprising:
First monitoring means, for monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Second monitoring means, for monitoring browser uploading or down operation for cloud dish file.
B13, device as described in claim B12, it is characterized in that, described first monitoring means, comprising:
First coupling subelement, for mating the process identification (PID) of the process run and the first cloud disc identifier of prestoring;
First determines subelement, for when described process identification (PID) and the first cloud disc identifier coupling, determines that described process is process corresponding to cloud dish client;
First monitoring subelement, for monitoring process uploading or down operation for cloud dish file corresponding to described cloud dish client.
B14, device as described in claim B12, it is characterized in that, described second monitoring means, comprising:
Resolving subelement, for resolving the URL(uniform resource locator) in described browser, obtaining keyword message;
Second coupling subelement, for mating described keyword message and the second cloud disc identifier prestored;
Second determines subelement, for when described keyword message and the second cloud disc identifier mate, determines that described browser current web page is cloud dish operation web page;
Second monitoring subelement, for monitoring uploading or down operation for cloud dish file in described browser current web page.
B15, arbitrary device as described in claim B9 to B14, it is characterized in that, described device also comprises:
Scan module, for before performing the described upload operation for cloud dish file, carries out security sweep to described cloud dish file;
Uploading blocking module, for when being determined by described security sweep to carry rogue program in described cloud dish file, tackling described upload operation.
B16, arbitrary device as described in claim B9 to B14, it is characterized in that, described device also comprises:
File detection module, whether for before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
Downloading blocking module, for when detecting that described cloud dish file is preset protected file, tackling described down operation.

Claims (10)

1., based on a cloud dish file monitor method for LAN (Local Area Network), comprising:
Monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network);
When cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
2. the method for claim 1, is characterized in that, described method also comprises:
When the cloud dish document control strategy that described user terminal is corresponding is permission, allow to continue uploading or down operation for cloud dish file described in execution.
3. method as claimed in claim 2, it is characterized in that, described method also comprises:
Perform described for cloud dish file upload or down operation process in, the operation information that record is corresponding; Wherein, described operation information comprises at least one in following information: upload or behavior that down operation is corresponding mark, perform described in upload or the terminal iidentification of user terminal of down operation and the file identification of described cloud dish file;
The operation information of described record is uploaded to described control terminal.
4. the method for claim 1, is characterized in that, monitors uploading or down operation for cloud dish file as follows:
Monitoring cloud dish client uploading or down operation for cloud dish file; Or,
Monitoring browser uploading or down operation for cloud dish file.
5. method as claimed in claim 4, is characterized in that, described monitoring cloud dish client uploading or the step of down operation for cloud dish file, comprising:
The process identification (PID) of the process run and the first cloud disc identifier of prestoring are mated;
When described process identification (PID) and the first cloud disc identifier coupling, determine that described process is process corresponding to cloud dish client;
Monitor process the uploading or down operation for cloud dish file that described cloud dish client is corresponding.
6. method as claimed in claim 4, is characterized in that, described monitoring browser uploading or the step of down operation for cloud dish file, comprising:
Resolve the URL(uniform resource locator) in described browser, obtain keyword message;
Described keyword message and the second cloud disc identifier prestored are mated;
When described keyword message and the second cloud disc identifier coupling, determine that described browser current web page is cloud dish operation web page;
Monitor uploading or down operation for cloud dish file in described browser current web page.
7. the either method as described in claim 1 to 6, is characterized in that, described method also comprises:
Before performing the described upload operation for cloud dish file, security sweep is carried out to described cloud dish file;
When being determined by described security sweep to carry rogue program in described cloud dish file, tackle described upload operation.
8. the either method as described in claim 1 to 6, is characterized in that, described method also comprises:
Whether before performing the described down operation for cloud dish file, detecting described cloud dish file is preset protected file;
When detecting that described cloud dish file is preset protected file, tackle described down operation.
9., based on a cloud dish document monitoring device for LAN (Local Area Network), comprising:
Operation monitoring module, for monitor for cloud dish file upload or down operation time, obtain the cloud dish document control strategy that place user terminal is corresponding; Wherein, described cloud dish document control strategy is provided by the control terminal in described LAN (Local Area Network); And
Operation intercepting module, for when cloud dish document control strategy corresponding to described user terminal is for forbidding, described the uploading or down operation for cloud dish file of interception.
10. device as claimed in claim 9, it is characterized in that, described device also comprises:
Operation permission module, when being permission for the cloud dish document control strategy corresponding at described user terminal, allows to continue uploading or down operation for cloud dish file described in execution.
CN201510921132.2A 2015-12-11 2015-12-11 Cloud disk file monitoring method and device based on local area network Pending CN105550593A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510921132.2A CN105550593A (en) 2015-12-11 2015-12-11 Cloud disk file monitoring method and device based on local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510921132.2A CN105550593A (en) 2015-12-11 2015-12-11 Cloud disk file monitoring method and device based on local area network

Publications (1)

Publication Number Publication Date
CN105550593A true CN105550593A (en) 2016-05-04

Family

ID=55829780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510921132.2A Pending CN105550593A (en) 2015-12-11 2015-12-11 Cloud disk file monitoring method and device based on local area network

Country Status (1)

Country Link
CN (1) CN105550593A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302536A (en) * 2017-06-29 2017-10-27 郑州云海信息技术有限公司 Method for managing security, device, medium and the storage control of cloud computing platform
CN107592319A (en) * 2017-09-29 2018-01-16 郑州云海信息技术有限公司 A kind of document down loading method and device
CN108076056A (en) * 2017-12-12 2018-05-25 北京小米移动软件有限公司 Cloud server login method and device
CN108512824A (en) * 2018-01-20 2018-09-07 福建省数字福建云计算运营有限公司 The management method and mobile terminal of a kind of family high in the clouds file
CN110933076A (en) * 2019-11-28 2020-03-27 广州市百果园信息技术有限公司 Client uploading monitoring method, device, equipment and computer storage medium
CN111104690A (en) * 2019-11-22 2020-05-05 北京三快在线科技有限公司 Document monitoring method and device, server and storage medium
CN113055412A (en) * 2019-12-26 2021-06-29 奇安信科技集团股份有限公司 Sample collection method, apparatus, system, computer device and readable storage medium
CN114189552A (en) * 2021-10-29 2022-03-15 济南浪潮数据技术有限公司 Data reporting method and system
CN115150189A (en) * 2022-07-28 2022-10-04 深圳市瑞云科技有限公司 Method for automatically intercepting outgoing files based on enterprise private cloud disk
CN117290890A (en) * 2023-11-24 2023-12-26 浙江口碑网络技术有限公司 Security risk management and control method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102299834A (en) * 2011-09-07 2011-12-28 中国联合网络通信集团有限公司 Data sharing method, equipment and system for local area network
CN102622537A (en) * 2011-01-31 2012-08-01 中兴通讯股份有限公司 Method and device for processing virus file
US20120255026A1 (en) * 2011-04-02 2012-10-04 Jim Baca Method and device for managing digital usage rights of documents
CN102868738A (en) * 2012-08-30 2013-01-09 福建富士通信息软件有限公司 Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy
CN103297441A (en) * 2013-06-25 2013-09-11 福建伊时代信息科技股份有限公司 Access control method and device
CN103326999A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 File safety management system based on cloud service
CN104320409A (en) * 2014-11-10 2015-01-28 成都卫士通信息产业股份有限公司 Method for controlling access to cloud disk on basis of Hook technology
CN104751077A (en) * 2015-04-21 2015-07-01 沈文策 Access control method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622537A (en) * 2011-01-31 2012-08-01 中兴通讯股份有限公司 Method and device for processing virus file
US20120255026A1 (en) * 2011-04-02 2012-10-04 Jim Baca Method and device for managing digital usage rights of documents
CN102299834A (en) * 2011-09-07 2011-12-28 中国联合网络通信集团有限公司 Data sharing method, equipment and system for local area network
CN102868738A (en) * 2012-08-30 2013-01-09 福建富士通信息软件有限公司 Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy
CN103326999A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 File safety management system based on cloud service
CN103297441A (en) * 2013-06-25 2013-09-11 福建伊时代信息科技股份有限公司 Access control method and device
CN104320409A (en) * 2014-11-10 2015-01-28 成都卫士通信息产业股份有限公司 Method for controlling access to cloud disk on basis of Hook technology
CN104751077A (en) * 2015-04-21 2015-07-01 沈文策 Access control method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨爱梅 等: "《大学计算机基础 Windows 7与Office 2010环境》", 31 October 2014, 清华大学出版社 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302536A (en) * 2017-06-29 2017-10-27 郑州云海信息技术有限公司 Method for managing security, device, medium and the storage control of cloud computing platform
CN107592319A (en) * 2017-09-29 2018-01-16 郑州云海信息技术有限公司 A kind of document down loading method and device
CN108076056A (en) * 2017-12-12 2018-05-25 北京小米移动软件有限公司 Cloud server login method and device
CN108512824B (en) * 2018-01-20 2020-10-16 福建省数字福建云计算运营有限公司 Management method of home cloud files and mobile terminal
CN108512824A (en) * 2018-01-20 2018-09-07 福建省数字福建云计算运营有限公司 The management method and mobile terminal of a kind of family high in the clouds file
CN111104690A (en) * 2019-11-22 2020-05-05 北京三快在线科技有限公司 Document monitoring method and device, server and storage medium
CN111104690B (en) * 2019-11-22 2022-03-18 北京三快在线科技有限公司 Document monitoring method and device, server and storage medium
CN110933076A (en) * 2019-11-28 2020-03-27 广州市百果园信息技术有限公司 Client uploading monitoring method, device, equipment and computer storage medium
CN113055412A (en) * 2019-12-26 2021-06-29 奇安信科技集团股份有限公司 Sample collection method, apparatus, system, computer device and readable storage medium
CN113055412B (en) * 2019-12-26 2023-04-25 奇安信科技集团股份有限公司 Sample collection method, apparatus, system, computer device, and readable storage medium
CN114189552A (en) * 2021-10-29 2022-03-15 济南浪潮数据技术有限公司 Data reporting method and system
CN115150189A (en) * 2022-07-28 2022-10-04 深圳市瑞云科技有限公司 Method for automatically intercepting outgoing files based on enterprise private cloud disk
CN115150189B (en) * 2022-07-28 2023-11-07 深圳市瑞云科技有限公司 Method for automatically intercepting file outgoing based on enterprise private cloud disk
CN117290890A (en) * 2023-11-24 2023-12-26 浙江口碑网络技术有限公司 Security risk management and control method and device, electronic equipment and storage medium
CN117290890B (en) * 2023-11-24 2024-05-10 浙江口碑网络技术有限公司 Security risk management and control method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105550593A (en) Cloud disk file monitoring method and device based on local area network
US11588828B2 (en) Systems and methods for automated retrieval, processing, and distribution of cyber-threat information
JP6522707B2 (en) Method and apparatus for coping with malware
US8839419B2 (en) Distributive security investigation
RU2444056C1 (en) System and method of speeding up problem solving by accumulating statistical information
US8707441B1 (en) Techniques for identifying optimized malicious search engine results
US20110072514A1 (en) Scan Engine Manager with Updates
US20140201836A1 (en) Automated Internet Threat Detection and Mitigation System and Associated Methods
US20080244691A1 (en) Dynamic threat vector update
US20130167236A1 (en) Method and system for automatically generating virus descriptions
CN103023905B (en) A kind of equipment, method and system for detection of malicious link
US20100180221A1 (en) Configuration Creation for Deployment and Monitoring
US20170214718A1 (en) Intelligent security context aware elastic storage
CN104243214B (en) A kind of method, apparatus and system of data processing
US10659335B1 (en) Contextual analyses of network traffic
CA3102306A1 (en) Mitigation of external exposure of energy delivery systems
CN103036896B (en) Method and system for testing malicious links
Bhardwaj et al. ISF: Security analysis and assessment of smart home IoT-based firmware
Skopik et al. Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
RU2481633C2 (en) System and method for automatic investigation of safety incidents
KR101169014B1 (en) System for detecting landing, hopping and distribution sites of malicious code
CN104539611B (en) Share the method for file management, Apparatus and system
Teeraratchakarn et al. Automated monitoring and behavior analysis for proactive security operations
Aldea et al. Software vulnerabilities integrated management system
CN105630433A (en) Printing control method and device based on local area network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160504

RJ01 Rejection of invention patent application after publication