CN107392060A - A kind of hard disk, duplicator safety detection method, system - Google Patents

A kind of hard disk, duplicator safety detection method, system Download PDF

Info

Publication number
CN107392060A
CN107392060A CN201710531246.5A CN201710531246A CN107392060A CN 107392060 A CN107392060 A CN 107392060A CN 201710531246 A CN201710531246 A CN 201710531246A CN 107392060 A CN107392060 A CN 107392060A
Authority
CN
China
Prior art keywords
duplicator
checked
keyword
inspection
hard disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710531246.5A
Other languages
Chinese (zh)
Inventor
张旭光
刘金波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LANXUM COMPUTER TECHNOLOGY Co Ltd
Original Assignee
BEIJING LANXUM COMPUTER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LANXUM COMPUTER TECHNOLOGY Co Ltd filed Critical BEIJING LANXUM COMPUTER TECHNOLOGY Co Ltd
Priority to CN201710531246.5A priority Critical patent/CN107392060A/en
Publication of CN107392060A publication Critical patent/CN107392060A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses hard disk, duplicator safety detection method, system.Hard disk secure inspection method includes:Key word library is loaded, the command parameter containing key word library is sent to identification module;Picture file to be checked is loaded, obtains and picture file to be checked is identified by identification module, obtained text;Keyword in key word library, is checked text, determines the keyword included in text;, being capable of the comprehensively picture to the storage in duplicator hard disk and journal file progress safety inspection, and screened to the file comprising security information, and be highlighted in detail by using duplicator safety check system and method;The duplicator hard disk of a variety of privately owned storage formats can be effectively cracked, and the picture in hard disk and journal file are accurately identified and checked, it is ensured that duplicator storage-medium information safety, prevents duplicator from storing classified information leakage security burner hidden danger.

Description

A kind of hard disk, duplicator safety detection method, system
Technical field
The present invention relates to duplicator technical field of safety protection, more particularly to a kind of hard disk, duplicator safety detection method, System.
Background technology
For information security carrier, it can generally be divided into entity file and e-file, the main body of entity file Existing form is paper document.And the generation of paper document is mainly produced by printing, copying operation, how to be fought each other from source Print, copying operation carry out effective management and control, or even turn into security work person to the security reliability requirement of Photocopier device in itself and close One of emphasis of note.The production domesticization of realizing duplicator it is autonomous it is controllable before, how to ensure the digital duplicating machine of main flow on the market Safe handling, also just become to information security management work important prerequisite with realize ensure one of.
Earliest duplicator was produced in 18th century in the world, and it is the predecessor of digital duplicating machine today.Duplicator passes through Development these years, it is significantly improved in its function, it is more and more welcomed by the people.However, if duplicator management is not In place, it is likely to result in serious divulge a secret.The especially duplicator of secret unit, more to strengthen the management to duplicator.One As for, duplicator mainly has some following hidden danger of divulging a secret:
Mass memory, which easily causes, divulges a secret.Magnanimity hard disk is housed in digital duplicating machine, can be all multiple when duplicator works Storage is into hard disk after the material electronicses of print.200KB spaces are occupied after per page file electronization, 100GB hard disk can be deposited Store up 500,000 page files.If duplicator handles 100 page files daily, whole hard-copy files in 13 years can be then stored in hard disk.
Not in place easily cause of physical protection is divulged a secret.Due to the hard disk in duplicator can not as mobile hard disk without When lock cipher counter, so the place to place of duplicator must be safe and reliable, it is ensured that unrelated person must not random contact copying machine And hard disk.
Not in place easily cause of maintenance, repair is divulged a secret.Digital duplicating machine digitized degree is higher, general during maintenance, repair After-sale service personnel are needed to carry out accident analysis after being connected with special portable formula computer, if the prison to maintenance, repair personnel Superintend and direct not tight, maintenance, repair personnel either intentionally or unintentionally replicate to the classified information stored in a hard disk, easily cause to let out It is close;If duplicator need to be taken away from the scene to maintenance, repair, hard disk is not removed before taking away, it is out of control to will result in carrier of divulging a secret.
Progress network connection, which easily causes, divulges a secret.Many digital duplicating machines are all configured with network interface, can pass through network card Connected with computer network, hold a concurrent post the work of printer.A part for the concerning security matters duplicator, in fact network of network is connected into, it is right For hacker, it is exactly another concerning security matters data bank.
In terms of current data safety and data concerning security matters checking tool are concentrated mainly on computer information security inspection, these instrument mesh Preceding Technical comparing is ripe, and species also compares more.Current most hard disk checking tools are mainly for FAT, NTFS, EXT file System design, do not possess audit function for other file system.For duplicator storage hard disk, conventional checking tool is not Competent it can check work.Because duplicator hard disk is present, special file system type, hard-disc storage form be underground, picture format The factor such as underground so that the censorship instrument of main flow does not possess reading to duplicator hard disc data, decryption, solution at present The functions such as analysis, conversion.
The content of the invention
Therefore, the invention provides a kind of hard disk, duplicator safety detection method, system, for solving in hard disk When the information of storage carries out safety inspection, because duplicator hard disk species is more, storage file type is special, form is underground, often The problems such as rule system and method can not realize the safety inspection offline to hard disk.
To reach above-mentioned purpose, the technical proposal of the invention is realized in this way:
A kind of hard disk secure inspection method, including:
Key word library is loaded, the command parameter containing key word library is sent to identification module;
Picture file to be checked is loaded, obtains and picture file to be checked is identified by identification module, obtained text;
Keyword in key word library, is checked text, determines the keyword included in text.
Further, key word library is loaded, the command parameter containing key word library is sent to identification module, specific bag Include:
Key word library includes:Predefined keyword and customized keyword;
Command parameter containing key word library is sent to identification module, identification module is used to check text to be checked Middle keyword.
Further, picture file to be checked is loaded, obtains and picture file to be checked is identified by identification module, obtain Text, specifically include:
Load file and/or picture file to be discriminated, by the OCR identification technologies of identification module, by file to be discriminated and/ Or the information in picture is converted to text information, and it is stored in predefined text;
Wherein, identification module includes predefined language library, and language library includes multilingual.
Further, the keyword in key word library, is checked text, obtains including in text Keyword, specifically include:
Keyword in key word library, the word in text is matched;
If including the keyword in key word library in text, marked in text, and store to be checked Picture file is to predefined storage address;
If not including the keyword in key word library in text, do not mark, terminate to be checked in text Look into the inspection of picture file.
A kind of duplicator safety detection method, including:
Duplicator inspection system is logged in, duplicating machine information to be checked is set;
According to key word library, keyword in picture file to be checked in duplicator is checked, outgoing inspection result;
Picture file of the display comprising keyword and corresponding keyword content.
Further, duplicator inspection system is logged in, duplicating machine information to be checked is set, specifically included:
Duplicator inspection system is logged in by E-token dynamic password card;
Duplicating machine information to be checked is set, and duplicator information includes:Brand, the model of duplicator, the letter of duplicator hard disk Breath, and/or the IP address of duplicator.
Further, according to key word library, keyword in picture file to be checked in duplicator is checked, output inspection Come to an end fruit, specifically includes:
According to key word library, start the inspection to keyword in duplicator, outgoing inspection result;Wherein, in key word library Keyword include:Predefined keyword and customized keyword;
According to outgoing inspection result, publicly-owned and/or privately owned form picture file, journal file are extracted, and store and treat Check picture file to predefined storage address.
Further, duplicator safety detection method includes:On line inspection and offline inspection,
On line inspection is directly to be connected safety check system with duplicator to be checked, according to duplicator brand, model, IP Address carries out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to duplicator brand, model, is answered Print machine hard disk information is checked offline.
A kind of duplicator safety check system, safety check system include:
Key word library 1, set and preserve the keyword for being related to security information;
Extraction module 2, crack and extract duplicator and/or the privately owned or public formatted file of duplicator hard disk and/or Picture;
Optical character identification module 3, the information identification in file and/or picture to be checked that extraction module 2 is extracted And be converted to word and/or character;
Comparison check module 4, the word being converted to after being identified by optical character identification module 3 and/or character and pass The keyword set in key character library 1 is contrasted;
Preserving module 5, according to the inspection result of comparison check module 4, preserve the file and/or picture for including keyword.
Further, key word library 1 includes:Keyword setup module 11, security classification setup module 12,
Keyword setup module 11 is used to adding or deleting keyword;
Security classification setup module 12 is used for the security classification for setting corresponding keyword.
Further, extraction module 2 includes:Check setup module 21;
Check that setup module 21 is used for brand, model, the IP address for setting duplicator and/or duplicator hard disk to be checked.
Further, optical character identification module 3 includes OCR identification modules.
Further, the contrast matching effect of comparison check module 4 can artificially be set.
Safety check system can be used in On line inspection and offline inspection;
On line inspection is directly to be connected safety check system with duplicator to be checked, according to duplicator brand, model, IP Address carries out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to duplicator brand, model, is answered Print machine hard disk information is checked offline.
The advantages of the present invention:, can be comprehensive right in detail using duplicator safety check system and method The picture and journal file of storage in duplicator hard disk carry out safety inspection, and the file comprising security information is sieved Choosing, and be highlighted;Can effectively crack the duplicator hard disk of a variety of privately owned storage formats, and to the picture in hard disk and Journal file is accurately identified and checked, it is ensured that duplicator storage-medium information safety, prevents duplicator storage classified information from divulging a secret Potential safety hazard.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet for hard disk secure inspection method that the embodiment of the present application provides,
Fig. 2 is a kind of schematic flow sheet for duplicator safety detection method that the embodiment of the present application provides,
Fig. 3 is a kind of duplicator safety check system structural representation that the embodiment of the present application provides.
Reference:
1- key word libraries, 11- keyword setup modules,
12- security classification setup modules, 2- extraction modules,
21- inspection setup modules, 22- brand setup modules,
23- model setup modules, 24- addresses setup module,
25- sequence number setup modules, 3- optical character identification modules,
4- comparison check modules, 5- preserving modules,
6- login modules.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with the accompanying drawings with specific embodiment pair The present invention is described in detail.
The embodiment of the present application provides a kind of hard disk secure inspection method, is provided as shown in Figure 1 for the embodiment of the present application A kind of schematic flow sheet of hard disk secure inspection method, specifically may comprise steps of:
S102, key word library is loaded, the command parameter containing key word library is sent to identification module;
Key word library includes:Predefined keyword and customized keyword;For example, predefined keyword includes: Non- secret, internal, secret, secret, top-secret, customized keyword can be set according to the actual requirements, such as related Technical parameter, project name, key nouns etc..
Command parameter containing key word library is sent to identification module, identification module is used to check text to be checked Middle keyword;For example, the command parameter containing key word library is sent into predefined LanxumOCRengine, system is carried The picture file of taking-up carries out OCR identifications, by the word recognized with checking that the keyword in keyword knowledge base is hit Matching, the picture being hit are stored under the file of corresponding matched rule, and foreground Main form shows the picture being hit.Its In, LanxumOCRengine is obtained by Tesseract and Leptonica reconstruct encapsulation.Identification that can be rapidly and efficiently is closed Key word, and LanxumOCRengine recognition capability is strong, can meet user's request.
S104, picture file to be checked is loaded, obtain and picture file to be checked is identified by identification module, obtained text File;
Load file and/or picture file to be discriminated, by the OCR identification technologies of identification module, by file to be discriminated and/ Or the information in picture is converted to text information, and it is stored in predefined text;
Wherein, identification module includes predefined language library, and language library includes multilingual, specifically, can adopt With the language library for including 60 multilinguals, most of language can be effectively identified, meet user's request.
S106, the keyword in key word library, is checked text, determines the pass included in text Key word;Keyword in key word library, the word in text is matched;
If including the keyword in key word library in text, marked in text, and store to be checked Picture file is to predefined storage address;
If not including the keyword in key word library in text, do not mark, terminate to be checked in text Look into the inspection of picture file.
Based on same inventive concept, the present embodiment provides a kind of duplicator safety detection method, if Fig. 2 is that the application is real A kind of schematic flow sheet of copy safety detection method of example offer is applied, idiographic flow may comprise steps of:
S202, duplicator inspection system is logged in, duplicating machine information to be checked is set;
Duplicator inspection system is logged in by E-token dynamic password card;For example, by the token string code number at the dynamic token back side and Dynamic password login system on front screen.
Duplicating machine information to be checked is set, and duplicator information includes:Brand, the model of duplicator, the letter of duplicator hard disk Breath, and/or the IP address of duplicator;Further, in addition to create task include task names, scrutineer.
S204, according to key word library, keyword in picture file to be checked in duplicator is checked, outgoing inspection knot Fruit;
According to key word library, start the inspection to keyword in duplicator, outgoing inspection result;Wherein, in key word library Keyword include:Predefined keyword and customized keyword;
According to outgoing inspection result, publicly-owned and/or privately owned form picture file, journal file are extracted, and store and treat Check picture file to predefined storage address.
S206, picture file of the display comprising keyword and corresponding keyword content;When duplicator inspection system be During ray examination, can with real-time display duplicator safety inspection result, and will check comprising keyword message picture file and Corresponding keyword content real-time display is on a display screen.
Further, duplicator safety detection method includes:On line inspection and offline inspection,
On line inspection is directly to be connected safety check system with duplicator to be checked, according to duplicator brand, model, IP Address carries out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to duplicator brand, model, is answered Print machine hard disk information is checked offline.
The duplicator safety detection method both can be used for On line inspection, can be also used for checking offline, On line inspection It is that safety check system is directly connected and checked with duplicator to be checked, On line inspection can be carried out in real time, and inspection personnel can With by checking that terminal directly monitors inspection situation in real time;Offline check is by safety check system and duplicator hard disk to be checked Connect and check, because offline check is directly to be connected with hard disk, the inspection method is simpler compared to online, and inspection system is opened The hair cycle is short, and development cost is low.
Based on same inventive concept, the embodiment of the present application provides a kind of duplicator safety check system, and Fig. 3 is this reality A kind of duplicator safety check system structural representation of example offer is applied, specific system architecture is as follows:
Key word library 1, set and preserve the keyword for being related to security information;Further, the key word library 1 includes: Keyword setup module 11, security classification setup module 12, keyword setup module 11 is used to adding or deleting keyword, crucial Word is configured as the basis to duplicator safety inspection by user according to the actual demand of oneself;Security classification is set Module 12 is used for the security classification for setting corresponding keyword, the convenient management to keyword, and the classification to inspection result.
Extraction module 2, extraction module 2 includes cracking the program of extraction duplicator and/or duplicator hard disk, for cracking And extract privately owned or the public formatted file and/or picture of duplicator and/or duplicator hard disk;Wherein, it is described privately owned to refer to Non-universal file and/or picture format, it is publicly-owned to refer to general file and/or picture format.Among extraction module 2, comprising The cracking programs of various different model duplicators and/or duplicator hard disk, when user needs to carry out safety inspection to duplicator When, user is configured by the duplicating machine information checked needs, and extraction module 2 can extract according to the setting of user selection Corresponding cracking programs in the extraction module 2 of the duplicator.
Optical character identification module 3, the information identification in file and/or picture to be checked that extraction module 2 is extracted And word and/or character are converted to, further, optical character identification module 3 includes OCR identification modules, by graphic form Text message is converted to the word and/or character that computer can identify.
Comparison check module 4, the word being converted to after being identified by optical character identification module 3 and/or character and pass The keyword set in key character library 1 is contrasted, and the contrast matching effect of comparison check module 4 can artificially be set;Tool Body refers to that the matching effect of contrast could be arranged to match completely, it can also be provided that recognizing comprising some or some keyword To include security information.
Preserving module 5, according to the inspection result of comparison check module 4, the file and/or picture for including keyword are preserved, The relevant information of the picture and/or file is also preserved simultaneously, is specifically included the date of the duplicating of this document and/or picture, is duplicated Personnel, the quantity etc. duplicated.
Further, extraction module 2 includes:Check setup module 21;Check that setup module 21 is to be checked multiple for setting The brand of print machine and/or duplicator hard disk, model, IP address or sequence number, so also including what brand was set in extraction module 2 22nd, the module 25 of model is set module 23, the module 24 that address is set and the setting of duplicator hard disk information.
In order to ensure the safety of inspection operation, the present embodiment system also includes login module 6 and is used to input execution operator The information of member;
Safety check system can be used in On line inspection and offline inspection, safety check system and key word library 1, extraction mould Block 2, optical character identification module 3, comparison check module 4, preserving module 5 connect with the synchronous signal of login module 6.Pacify when by this , it is necessary to which the inspection system is directly attached with duplicator when total inspection system is applied to On line inspection, such safety inspection System can detects the state of duplicator in real time, and finds classified information in time, prevents classified information from leaking;Pacify when by this , it is necessary to the inspection system is directly connected with the hard disk of duplicator, due to duplicator when total inspection system is applied to check offline In hard disk be not conventional hard disc of computer, can not direct read/write, it is therefore desirable to change inspection system and duplicator hard disk is carried out Reading could be given after cracking, therefore every kind of duplicator and duplicator hard disk crack, and are required for special extraction module 2;It is and hard The species of disk will be less than the model of duplicator, so in the exploitation of the system checked offline, can reduce person works Amount, lift development efficiency.
The token string number refers to that each dynamic password module has unique token string number to encode, and dynamic password mould The dynamic password of real-time display and token string number and one-to-one relation on block.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and this Art personnel can design alternative embodiment without departing from the scope of the appended claims.In claim In, any reference symbol between bracket should not be configured to limitations on claims.Word " comprising " is not excluded for depositing In element or step not listed in the claims.Word "a" or "an" before element do not exclude the presence of it is multiple this The element of sample.The use of word first, second, and third does not indicate that any order.These words can be construed to title.

Claims (14)

1. a kind of hard disk secure inspection method, it is characterised in that methods described includes:
Key word library is loaded, the command parameter containing the key word library is sent to identification module;
Picture file to be checked is loaded, obtains and the picture file to be checked, obtained text is identified by the identification module File;
According to the keyword in the key word library, the text is checked, determines to include in the text Keyword.
2. hard disk secure inspection method as claimed in claim 1, it is characterised in that the loading key word library, will contain described The command parameter of key word library is sent to identification module, specifically includes:
The key word library includes:Predefined keyword and customized keyword;
Command parameter containing the key word library is sent to identification module, the identification module is used to check text to be checked Keyword in file.
3. hard disk secure inspection method as claimed in claim 1, it is characterised in that the loading picture file to be checked, obtain The picture file to be checked is identified by the identification module, obtained text, specifically included:
File and/or picture file to be discriminated are loaded, by the OCR identification technologies of the identification module, by the text to be discriminated Information in part and/or picture is converted to text information, and is stored in predefined text;
Wherein, the identification module includes predefined language library, and the language library includes multilingual.
4. hard disk secure inspection method as claimed in claim 1, it is characterised in that the key in the key word library Word, the text is checked, obtain the keyword included in the text, specifically include:
According to the keyword in the key word library, the word in the text is matched;
If including the keyword in the key word library in the text, marked in the text, and deposit The picture file to be checked is stored up to predefined storage address;
If not including the keyword in the key word library in the text, do not mark, tie in the text Inspection of the beam to the picture file to be checked.
5. a kind of duplicator safety detection method, it is characterised in that methods described includes:
Duplicator inspection system is logged in, duplicating machine information to be checked is set;
According to key word library, keyword in picture file to be checked in the duplicator is checked, outgoing inspection result;
Picture file of the display comprising keyword and corresponding keyword content.
6. duplicator safety detection method as claimed in claim 5, it is characterised in that the login duplicator inspection system, if Duplicating machine information to be checked is put, is specifically included:
Duplicator inspection system is logged in by E-token dynamic password card;
Duplicating machine information to be checked is set, and the duplicator information includes:Brand, the model of duplicator, the letter of duplicator hard disk Breath, and/or the IP address of duplicator.
7. duplicator safety detection method as claimed in claim 5, it is characterised in that it is described according to key word library, to described multiple Keyword is checked in picture file to be checked in print machine, outgoing inspection result, is specifically included:
According to key word library, start the inspection to keyword in the duplicator, outgoing inspection result;Wherein, the keyword Keyword in storehouse includes:Predefined keyword and customized keyword;
According to the outgoing inspection result, publicly-owned and/or privately owned form picture file, journal file are extracted, and store institute Picture file to be checked is stated to predefined storage address.
8. the duplicator safety detection method according to any one of claim 5-7 claim, it is characterised in that duplicate Machine safety detection method includes:On line inspection and offline inspection,
The On line inspection is directly to be connected safety check system with duplicator to be checked, according to the duplicator brand, type Number, IP address carry out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to the duplicator brand, type Number, duplicator hard disk information checked offline.
9. a kind of duplicator safety check system, it is characterised in that the safety check system includes:
Key word library (1), sets and preserves the keyword for being related to security information;
Extraction module (2), crack and extract duplicator and/or privately owned or the public formatted file and/or figure of duplicator hard disk Piece;
Optical character identification module (3), the information in file and/or picture to be checked that the extraction module (2) is extracted Identify and be converted to word and/or character;
Comparison check module (4), the word and/or character being converted to after being identified by the optical character identification module (3) Keyword with being set in the key word library (1) is contrasted;
Preserving module (5), according to the inspection result of the comparison check module (4), preserve the file and/or figure for including keyword Piece.
10. duplicator safety check system according to claim 9, it is characterised in that the key word library (1) includes: Keyword setup module (11), security classification setup module (12),
The keyword setup module (11) is used to adding or deleting keyword;
The security classification setup module (12) is used for the security classification for setting corresponding keyword.
11. duplicator safety check system according to claim 9, it is characterised in that the extraction module (2) includes:Inspection Look into setup module (21);
The brand, model, IP that setup module (21) is checked for setting duplicator and/or duplicator hard disk to be checked Location.
12. duplicator safety check system according to claim 9, it is characterised in that the optical character identification module (3) Including OCR identification modules.
13. duplicator safety check system according to claim 9, it is characterised in that pair of the comparison check module (4) Can artificially it be set than matching effect.
14. duplicator safety check system according to claim 9, it is characterised in that the safety check system can be used In On line inspection and offline inspection;
The On line inspection is directly to be connected safety check system with duplicator to be checked, according to the duplicator brand, type Number, IP address carry out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to the duplicator brand, type Number, duplicator hard disk information checked offline.
CN201710531246.5A 2017-07-03 2017-07-03 A kind of hard disk, duplicator safety detection method, system Pending CN107392060A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710531246.5A CN107392060A (en) 2017-07-03 2017-07-03 A kind of hard disk, duplicator safety detection method, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710531246.5A CN107392060A (en) 2017-07-03 2017-07-03 A kind of hard disk, duplicator safety detection method, system

Publications (1)

Publication Number Publication Date
CN107392060A true CN107392060A (en) 2017-11-24

Family

ID=60334757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710531246.5A Pending CN107392060A (en) 2017-07-03 2017-07-03 A kind of hard disk, duplicator safety detection method, system

Country Status (1)

Country Link
CN (1) CN107392060A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542792A (en) * 2018-11-28 2019-03-29 努比亚技术有限公司 A kind of bitmap processing method, equipment and computer readable storage medium
CN116226885A (en) * 2023-03-07 2023-06-06 达思凯瑞技术(北京)有限公司 Copying machine security check evidence obtaining system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103336923A (en) * 2013-03-06 2013-10-02 西安电子科技大学 Print monitoring system and method for universal printer
CN104392167A (en) * 2014-10-27 2015-03-04 东莞宇龙通信科技有限公司 Method and device for privacy information detection warning and terminal
CN105117462A (en) * 2015-08-24 2015-12-02 北京锐安科技有限公司 Sensitive word checking method and device
CN106682868A (en) * 2015-11-10 2017-05-17 北京计算机技术及应用研究所 Online data extracting device and method for office automation equipment storage component

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103336923A (en) * 2013-03-06 2013-10-02 西安电子科技大学 Print monitoring system and method for universal printer
CN104392167A (en) * 2014-10-27 2015-03-04 东莞宇龙通信科技有限公司 Method and device for privacy information detection warning and terminal
CN105117462A (en) * 2015-08-24 2015-12-02 北京锐安科技有限公司 Sensitive word checking method and device
CN106682868A (en) * 2015-11-10 2017-05-17 北京计算机技术及应用研究所 Online data extracting device and method for office automation equipment storage component

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542792A (en) * 2018-11-28 2019-03-29 努比亚技术有限公司 A kind of bitmap processing method, equipment and computer readable storage medium
CN109542792B (en) * 2018-11-28 2024-01-16 努比亚技术有限公司 Bitmap processing method, bitmap processing equipment and computer readable storage medium
CN116226885A (en) * 2023-03-07 2023-06-06 达思凯瑞技术(北京)有限公司 Copying machine security check evidence obtaining system and method
CN116226885B (en) * 2023-03-07 2024-01-23 达思凯瑞技术(北京)有限公司 Copying machine security check evidence obtaining system and method

Similar Documents

Publication Publication Date Title
US20060005017A1 (en) Method and apparatus for recognition and real time encryption of sensitive terms in documents
CN1193295C (en) Distributed data archive device and system
CN104915808A (en) Implementation method and system of electronic seal
US20200082111A1 (en) Security Application for Data Security Formatting, Tagging and Control
CN103150517A (en) Secure secret electronic file storage and archiving method and method for checking matching of user permission and file open permission
US11295027B2 (en) System and method for protecting electronic documents containing confidential information from unauthorized access
CN108038777A (en) A kind of accounting system
CN107451459A (en) The method and apparatus verified using picture validation code
CN207115412U (en) A kind of duplicator safety check system
CN107392060A (en) A kind of hard disk, duplicator safety detection method, system
KR20150027567A (en) Integrated document management system
CN102609542A (en) X-ray digital image feature database for detecting power equipment
Jones et al. The 2016 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE
Didriksen Forensic analysis of OOXML documents
Faerber Book Versus Byte: The Prospects and Desirability of a Paperless Society
Forstrom Managing electronic records in manuscript collections: A case study from the Beinecke Rare Book and Manuscript Library
CN105519037A (en) Data processing apparatus, data processing method and program
Moore The role of computer forensics in criminal investigations
CN113032744A (en) Digital watermark all-in-one system
CN112907227A (en) Software design data file management system
CN109558379A (en) A kind of data checking method and device
US11941625B2 (en) Systems and methods for real-time classification and verification of data using hierarchal state machines
CN112528330B (en) Log scanning method, device and equipment
CN116719778B (en) Technology for generating virtual partition to complete four-way information theme by OFD file on OA system
Funge-Smith et al. Investigation and Analysis of Information Remaining on Used HDDs in Thailand

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124