CN106650481A - Method and device for guaranteeing public computer information - Google Patents

Method and device for guaranteeing public computer information Download PDF

Info

Publication number
CN106650481A
CN106650481A CN201510740077.7A CN201510740077A CN106650481A CN 106650481 A CN106650481 A CN 106650481A CN 201510740077 A CN201510740077 A CN 201510740077A CN 106650481 A CN106650481 A CN 106650481A
Authority
CN
China
Prior art keywords
public computer
vestige
user
user operation
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510740077.7A
Other languages
Chinese (zh)
Inventor
李智勇
陈翼
张晓玉
景晓军
沈智杰
唐新民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SURFILTER NETWORK TECHNOLOGY Co Ltd
Original Assignee
SURFILTER NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SURFILTER NETWORK TECHNOLOGY Co Ltd filed Critical SURFILTER NETWORK TECHNOLOGY Co Ltd
Priority to CN201510740077.7A priority Critical patent/CN106650481A/en
Publication of CN106650481A publication Critical patent/CN106650481A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and device for guaranteeing public computer information. The method includes the steps that user operating tracks after login of a public computer are recorded; the public computer is logged out, and the user operating tracks are eliminated. The method and device have the advantages that personal operating information of users on the public computer is more efficiently and more thoroughly protected, and after a next user logs in a system, the operating tracks of the previous user cannot be seen.

Description

A kind of method and device of public computer Information Assurance
Technical field
The present invention relates to field of information security technology, more particularly, it relates to a kind of public computer information is protected The method and device of barrier.
Background technology
General public PC (personal computer, computer), all with corresponding certification access machine System.Each user logs in public PC by oneself user's voucher, and the information of generally each user is can not phase Mutually transmit, and vestige is used because PC operating systems can record some, the catalogue such as opened, operation Program, URL (Uniform Resource Locator) website of access etc..These information will not used Person nullifies after logging in and removes.
Problem for leaving personal operation information on public PC, relatively common way is in each user System is restarted after logging in, but this method can not remove bottom removes all of use vestige of user, and It is inefficient;Another common method is every time to be reduced the system of PC after user log off, But this method can substantially reduce the use value of public PC.
The content of the invention
The technical problem to be solved in the present invention is to leave individual for being directed in prior art on public PC A kind of defect that not enough thorough and use value is reduced when operation information is purged to it, there is provided public calculating The method and device that machine information is ensured.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of method of public computer Information Assurance is constructed, including:
Record logs in the user operation vestige after public computer;
The public computer is nullified, and removes the user operation vestige.
In method of the present invention, also include:
Detect whether to log in the public computer;
Detect whether to nullify the public computer.
It is described to detect whether that the step of logging in the public computer includes in method of the present invention:
User is input into log-on message to log in the public computer in login interface;
Log in detection module and determine that user has logged in the public computer.
In method of the present invention, the record logs in the user operation vestige after public computer Step includes:
Record the user operation vestige;
Follow the trail of the catalogue of the program and opening run because of the operation vestige;
Obtain the data and the routing information of the catalogue opened of run program generation.
In method of the present invention, it is described removing the user operation vestige the step of include:
Remove recorded user operation vestige;
Delete the data and the routing information of the catalogue opened of run program generation.
On the other hand, there is provided a kind of device of public computer Information Assurance, including:
Logging modle, for record the user operation vestige after public computer is logged in;
Module is removed, for nullifying the public computer, and the user operation vestige is removed.
In device of the present invention, also include:
Detection module is logged in, for detecting whether logging in the public computer;
Detection module is nullified, for detecting whether nullifying the public computer.
In device of the present invention, the login detection module includes:
Input submodule, for log-on message to be input into login interface to log in the public computer;
Determination sub-module, for determining that user has logged in the public computer.
In device of the present invention, the logging modle includes:
Vestige record sub module, for recording the user operation vestige;
Submodule is followed the trail of, for following the trail of the catalogue of the program and opening run because of the operation vestige;
Acquisition submodule, for obtaining the data of run program generation and the path letter of the catalogue opened Breath.
In device of the present invention, the removing module includes:
Vestige removes submodule, for removing recorded user operation vestige;
Submodule is deleted, for deleting the data of run program generation and the path letter of the catalogue opened Breath.
A kind of method and device of public computer Information Assurance disclosed above has the advantages that:More Plus personal operation information that is efficient, more thoroughly protecting user on public computer, step on next user After recording system, the operation vestige of a user is can't see.
Description of the drawings
A kind of method flow diagram of public computer Information Assurance that Fig. 1 is provided for one embodiment of the invention;
A kind of method flow diagram of public computer Information Assurance that Fig. 2 is provided for another embodiment of the present invention;
A kind of device block diagram of public computer Information Assurance that Fig. 3 is provided for the present invention.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, below in conjunction with accompanying drawing and reality Example is applied, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only To explain the present invention, it is not intended to limit the present invention.
The present invention provides a kind of method and device of public computer Information Assurance, it is intended that solving public The leakage-preventing problem of personal information on common PC, the present invention increases the removing vestige action after user log off, protects The information security of card user.
Referring to Fig. 1, a kind of method of public computer Information Assurance that Fig. 1 is provided for one embodiment of the invention Flow chart, the method for the embodiment public computer Information Assurance is comprised the following steps:
S101, record log in the user operation vestige after public computer;For example, by public meter Corresponding processing routine is arranged or installed in calculation machine, after the User logs in public computer, records the use Family operates.
S102, the cancellation public computer, and remove the user operation vestige.For example, it is same logical Above-mentioned processing routine is crossed, after the user log off public computer, understands user during logging in the public affairs The user operation vestige for staying in computer altogether.
Referring to Fig. 2, a kind of side of public computer Information Assurance that Fig. 2 is provided for another embodiment of the present invention Method flow chart, the method for the public computer Information Assurance of the embodiment is comprised the following steps:
S201, detect whether to log in the public computer;Step S201 includes following sub-step:
S2011, user are input into log-on message to log in the public computer in login interface;Above-mentioned Using corresponding log-on message is input into access system, generally to add user cipher public to log in this for user name Computer.
S2012, login detection module determine that user has logged in the public computer.Above-mentioned log-on message is recognized After card passes through, this then determines that user has logged in public computer using access system.
S202, record log in the user operation vestige after public computer;Step S202 includes following Sub-step:
S2021, record the user operation vestige;For example, after User logs in, can open corresponding program, File or the URL of access etc..
S2022, the catalogue for following the trail of the program and opening run because of the operation vestige;For example, IE is opened When (Internet Explorer), the web page address of access can be produced, some webpages also need to log-on message Carry out further operation etc., then what is now followed the trail of is the internet option in IE, deletion " is browsed (Cookie refers to some websites to distinguish user identity, entering for historical record " and corresponding Cookie files The data that row session is tracked and is stored on user local terminal);When opening corresponding player, can produce Raw corresponding broadcasting records, and what is now followed the trail of is the playlist of the player, can arrange and refer to accordingly Pin points to the file directory address for storing the playlist.
S2023, the data and the routing information of the catalogue opened that obtain run program generation.For example, After the data source of operation vestige is obtained by way of above-mentioned tracking, under the storage of above-mentioned application access system Come.
S203, detect whether to nullify the public computer;During user log off public computer, Ke Yitong Cross public computer system itself to be unregistered, then notify this apply access system, it is also possible to by Using corresponding log off option is arranged in access system, so as to nullify public computer, appliance computer is nullified Afterwards, can detect that using access system.
After S204, the cancellation public computer, the user operation vestige is removed.Step S204 Including following sub-step:
The recorded user operation vestige of S2041, removing;For example, above-mentioned application access system obtains corresponding Data source after, under corresponding catalogue delete user operation vestige, the operation vestige of IE is in Internet In option, " browsing history " and corresponding Cookie files, the broadcasting mesh of player are deleted The data source of record deletes the file under this document folder under corresponding file, then.Additionally, further relating to The temporary file that some such as locally downloading files, the webpage opened are produced, this applies access system Can also be cleared up accordingly.
S2042, the data and the routing information of the catalogue opened of deleting run program generation.For example, Delete pointer information of above-mentioned those files of sensing etc..
To sum up, following procedure function is set in terminal access system:
1st, the operation after user logs in is recorded.
2nd, automatic clear operation vestige after user log off is logged in.
3rd, user logs in public PC by terminal access system.
4th, user is operated on public PC, and operating process is recorded by program.
5th, user completes operation, and cancellation is logged in.
6th, program automatically deletes user operation vestige,
Therefore the advantage of this terminal access system is, after next user's login system, the behaviour of a user is can't see Make vestige, protect the personal information of public PC user, directly realize above-mentioned work(in certification access system Can, it is not necessary to be further added by other systems.
Referring to Fig. 3, a kind of block diagram of device 100 of public computer Information Assurance that Fig. 3 is provided for the present invention, The device 100 be above-mentioned application access system, by the device 100 to complete the application in technical side Case, the device of the public computer Information Assurance includes:
Logging modle 1, for record the user operation vestige after public computer is logged in;
Module 2 is removed, for nullifying the public computer, and the user operation vestige is removed.
Detection module 3 is logged in, for detecting whether logging in the public computer;
Detection module 4 is nullified, for detecting whether nullifying the public computer.
Preferably, the login detection module 3 includes:
Input submodule, for log-on message to be input into login interface to log in the public computer;
Determination sub-module, for determining that user has logged in the public computer.
Preferably, the logging modle 1 includes:
Vestige record sub module, for recording the user operation vestige;
Submodule is followed the trail of, for following the trail of the catalogue of the program and opening run because of the operation vestige;
Acquisition submodule, for obtaining the data of run program generation and the path letter of the catalogue opened Breath.
Preferably, the removing module 2 includes:
Vestige removes submodule, for removing recorded user operation vestige;
Submodule is deleted, for deleting the data of run program generation and the path letter of the catalogue opened Breath.
Embodiments of the invention are described above in conjunction with accompanying drawing, but be the invention is not limited in above-mentioned Specific embodiment, above-mentioned specific embodiment be only it is schematic, rather than restricted, this The those of ordinary skill in field is being protected under the enlightenment of the present invention without departing from present inventive concept and claim Under the ambit of shield, many forms can be also made, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of method of public computer Information Assurance, it is characterised in that include:
Record logs in the user operation vestige after public computer;
The public computer is nullified, and removes the user operation vestige.
2. method according to claim 1, it is characterised in that also include:
Detect whether to log in the public computer;
Detect whether to nullify the public computer.
3. method according to claim 2, it is characterised in that described to detect whether to log in the public affairs Altogether the step of computer includes:
User is input into log-on message to log in the public computer in login interface;
Log in detection module and determine that user has logged in the public computer.
4. method according to claim 1, it is characterised in that the record logs in public computer The step of user operation vestige afterwards, includes:
Record the user operation vestige;
Follow the trail of the catalogue of the program and opening run because of the operation vestige;
Obtain the data and the routing information of the catalogue opened of run program generation.
5. method according to claim 4, it is characterised in that the removing user operation trace The step of mark, includes:
Remove recorded user operation vestige;
Delete the data and the routing information of the catalogue opened of run program generation.
6. a kind of device of public computer Information Assurance, it is characterised in that include:
Logging modle, for record the user operation vestige after public computer is logged in;
Module is removed, for nullifying the public computer, and the user operation vestige is removed.
7. device according to claim 6, it is characterised in that also include:
Detection module is logged in, for detecting whether logging in the public computer;
Detection module is nullified, for detecting whether nullifying the public computer.
8. device according to claim 7, it is characterised in that the login detection module includes:
Input submodule, for log-on message to be input into login interface to log in the public computer;
Determination sub-module, for determining that user has logged in the public computer.
9. device according to claim 6, it is characterised in that the logging modle includes:
Vestige record sub module, for recording the user operation vestige;
Submodule is followed the trail of, for following the trail of the catalogue of the program and opening run because of the operation vestige;
Acquisition submodule, for obtaining the data of run program generation and the path letter of the catalogue opened Breath.
10. device according to claim 9, it is characterised in that the removing module includes:
Vestige removes submodule, for removing recorded user operation vestige;
Submodule is deleted, for deleting the data of run program generation and the path letter of the catalogue opened Breath.
CN201510740077.7A 2015-11-03 2015-11-03 Method and device for guaranteeing public computer information Pending CN106650481A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510740077.7A CN106650481A (en) 2015-11-03 2015-11-03 Method and device for guaranteeing public computer information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510740077.7A CN106650481A (en) 2015-11-03 2015-11-03 Method and device for guaranteeing public computer information

Publications (1)

Publication Number Publication Date
CN106650481A true CN106650481A (en) 2017-05-10

Family

ID=58850998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510740077.7A Pending CN106650481A (en) 2015-11-03 2015-11-03 Method and device for guaranteeing public computer information

Country Status (1)

Country Link
CN (1) CN106650481A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103412901A (en) * 2013-07-26 2013-11-27 北京奇虎科技有限公司 Method and device for clearing historical records
CN103577240A (en) * 2012-07-25 2014-02-12 腾讯科技(深圳)有限公司 Automatic system cleaning method and device and memory medium
CN103955459A (en) * 2013-10-10 2014-07-30 北京奇虎科技有限公司 Method and device for loading webpage and browser
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577240A (en) * 2012-07-25 2014-02-12 腾讯科技(深圳)有限公司 Automatic system cleaning method and device and memory medium
CN103412901A (en) * 2013-07-26 2013-11-27 北京奇虎科技有限公司 Method and device for clearing historical records
CN103955459A (en) * 2013-10-10 2014-07-30 北京奇虎科技有限公司 Method and device for loading webpage and browser
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program

Similar Documents

Publication Publication Date Title
US9509714B2 (en) Web page and web browser protection against malicious injections
US9712560B2 (en) Web page and web browser protection against malicious injections
Acar et al. The web never forgets: Persistent tracking mechanisms in the wild
Grier et al. Secure web browsing with the OP web browser
FaizKhademi et al. FPGuard: Detection and prevention of browser fingerprinting
CN103297394B (en) Website security detection method and device
Jonker et al. Fingerprint surface-based detection of web bot detectors
Rahman et al. A new web forensic framework for bot crime investigation
Tayal et al. Active monitoring & postmortem forensic analysis of network threats: A survey
CN104199962A (en) Trusted webpage forensics system and trusted webpage forensics method based on three-layer trusted webpage forensic model
Lamprakis et al. Unsupervised detection of APT C&C channels using web request graphs
Rasool et al. A review of web browser forensic analysis tools and techniques
Li et al. Mash-IF: Practical information-flow control within client-side mashups
CN104657359B (en) A kind of method that web page contents and style are recorded by network address
Franken et al. Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
Prasanthi et al. Cyber forensic science to diagnose digital crimes-a study
Pletinckx et al. Out of Sight, Out of Mind: Detecting Orphaned Web Pages at Internet-Scale
Krumnow et al. How gullible are web measurement tools? a case study analysing and strengthening OpenWPM's reliability
JP6623128B2 (en) Log analysis system, log analysis method, and log analysis device
Patil et al. Web browser analysis for detecting user activities
McKenna Detection and classification of Web robots with honeypots
CN106650481A (en) Method and device for guaranteeing public computer information
CN103118024B (en) Prevent the system and method that webpage is followed the tracks of
Takata et al. Fine-grained analysis of compromised websites with redirection graphs and javascript traces
Al Fahdi et al. Towards an automated forensic examiner (AFE) based upon criminal profiling & artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510