CN107392060A - A kind of hard disk, duplicator safety detection method, system - Google Patents
A kind of hard disk, duplicator safety detection method, system Download PDFInfo
- Publication number
- CN107392060A CN107392060A CN201710531246.5A CN201710531246A CN107392060A CN 107392060 A CN107392060 A CN 107392060A CN 201710531246 A CN201710531246 A CN 201710531246A CN 107392060 A CN107392060 A CN 107392060A
- Authority
- CN
- China
- Prior art keywords
- duplicator
- checked
- keyword
- inspection
- hard disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/3331—Query processing
- G06F16/334—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The invention discloses hard disk, duplicator safety detection method, system.Hard disk secure inspection method includes:Key word library is loaded, the command parameter containing key word library is sent to identification module;Picture file to be checked is loaded, obtains and picture file to be checked is identified by identification module, obtained text;Keyword in key word library, is checked text, determines the keyword included in text;, being capable of the comprehensively picture to the storage in duplicator hard disk and journal file progress safety inspection, and screened to the file comprising security information, and be highlighted in detail by using duplicator safety check system and method;The duplicator hard disk of a variety of privately owned storage formats can be effectively cracked, and the picture in hard disk and journal file are accurately identified and checked, it is ensured that duplicator storage-medium information safety, prevents duplicator from storing classified information leakage security burner hidden danger.
Description
Technical field
The present invention relates to duplicator technical field of safety protection, more particularly to a kind of hard disk, duplicator safety detection method,
System.
Background technology
For information security carrier, it can generally be divided into entity file and e-file, the main body of entity file
Existing form is paper document.And the generation of paper document is mainly produced by printing, copying operation, how to be fought each other from source
Print, copying operation carry out effective management and control, or even turn into security work person to the security reliability requirement of Photocopier device in itself and close
One of emphasis of note.The production domesticization of realizing duplicator it is autonomous it is controllable before, how to ensure the digital duplicating machine of main flow on the market
Safe handling, also just become to information security management work important prerequisite with realize ensure one of.
Earliest duplicator was produced in 18th century in the world, and it is the predecessor of digital duplicating machine today.Duplicator passes through
Development these years, it is significantly improved in its function, it is more and more welcomed by the people.However, if duplicator management is not
In place, it is likely to result in serious divulge a secret.The especially duplicator of secret unit, more to strengthen the management to duplicator.One
As for, duplicator mainly has some following hidden danger of divulging a secret:
Mass memory, which easily causes, divulges a secret.Magnanimity hard disk is housed in digital duplicating machine, can be all multiple when duplicator works
Storage is into hard disk after the material electronicses of print.200KB spaces are occupied after per page file electronization, 100GB hard disk can be deposited
Store up 500,000 page files.If duplicator handles 100 page files daily, whole hard-copy files in 13 years can be then stored in hard disk.
Not in place easily cause of physical protection is divulged a secret.Due to the hard disk in duplicator can not as mobile hard disk without
When lock cipher counter, so the place to place of duplicator must be safe and reliable, it is ensured that unrelated person must not random contact copying machine
And hard disk.
Not in place easily cause of maintenance, repair is divulged a secret.Digital duplicating machine digitized degree is higher, general during maintenance, repair
After-sale service personnel are needed to carry out accident analysis after being connected with special portable formula computer, if the prison to maintenance, repair personnel
Superintend and direct not tight, maintenance, repair personnel either intentionally or unintentionally replicate to the classified information stored in a hard disk, easily cause to let out
It is close;If duplicator need to be taken away from the scene to maintenance, repair, hard disk is not removed before taking away, it is out of control to will result in carrier of divulging a secret.
Progress network connection, which easily causes, divulges a secret.Many digital duplicating machines are all configured with network interface, can pass through network card
Connected with computer network, hold a concurrent post the work of printer.A part for the concerning security matters duplicator, in fact network of network is connected into, it is right
For hacker, it is exactly another concerning security matters data bank.
In terms of current data safety and data concerning security matters checking tool are concentrated mainly on computer information security inspection, these instrument mesh
Preceding Technical comparing is ripe, and species also compares more.Current most hard disk checking tools are mainly for FAT, NTFS, EXT file
System design, do not possess audit function for other file system.For duplicator storage hard disk, conventional checking tool is not
Competent it can check work.Because duplicator hard disk is present, special file system type, hard-disc storage form be underground, picture format
The factor such as underground so that the censorship instrument of main flow does not possess reading to duplicator hard disc data, decryption, solution at present
The functions such as analysis, conversion.
The content of the invention
Therefore, the invention provides a kind of hard disk, duplicator safety detection method, system, for solving in hard disk
When the information of storage carries out safety inspection, because duplicator hard disk species is more, storage file type is special, form is underground, often
The problems such as rule system and method can not realize the safety inspection offline to hard disk.
To reach above-mentioned purpose, the technical proposal of the invention is realized in this way:
A kind of hard disk secure inspection method, including:
Key word library is loaded, the command parameter containing key word library is sent to identification module;
Picture file to be checked is loaded, obtains and picture file to be checked is identified by identification module, obtained text;
Keyword in key word library, is checked text, determines the keyword included in text.
Further, key word library is loaded, the command parameter containing key word library is sent to identification module, specific bag
Include:
Key word library includes:Predefined keyword and customized keyword;
Command parameter containing key word library is sent to identification module, identification module is used to check text to be checked
Middle keyword.
Further, picture file to be checked is loaded, obtains and picture file to be checked is identified by identification module, obtain
Text, specifically include:
Load file and/or picture file to be discriminated, by the OCR identification technologies of identification module, by file to be discriminated and/
Or the information in picture is converted to text information, and it is stored in predefined text;
Wherein, identification module includes predefined language library, and language library includes multilingual.
Further, the keyword in key word library, is checked text, obtains including in text
Keyword, specifically include:
Keyword in key word library, the word in text is matched;
If including the keyword in key word library in text, marked in text, and store to be checked
Picture file is to predefined storage address;
If not including the keyword in key word library in text, do not mark, terminate to be checked in text
Look into the inspection of picture file.
A kind of duplicator safety detection method, including:
Duplicator inspection system is logged in, duplicating machine information to be checked is set;
According to key word library, keyword in picture file to be checked in duplicator is checked, outgoing inspection result;
Picture file of the display comprising keyword and corresponding keyword content.
Further, duplicator inspection system is logged in, duplicating machine information to be checked is set, specifically included:
Duplicator inspection system is logged in by E-token dynamic password card;
Duplicating machine information to be checked is set, and duplicator information includes:Brand, the model of duplicator, the letter of duplicator hard disk
Breath, and/or the IP address of duplicator.
Further, according to key word library, keyword in picture file to be checked in duplicator is checked, output inspection
Come to an end fruit, specifically includes:
According to key word library, start the inspection to keyword in duplicator, outgoing inspection result;Wherein, in key word library
Keyword include:Predefined keyword and customized keyword;
According to outgoing inspection result, publicly-owned and/or privately owned form picture file, journal file are extracted, and store and treat
Check picture file to predefined storage address.
Further, duplicator safety detection method includes:On line inspection and offline inspection,
On line inspection is directly to be connected safety check system with duplicator to be checked, according to duplicator brand, model, IP
Address carries out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to duplicator brand, model, is answered
Print machine hard disk information is checked offline.
A kind of duplicator safety check system, safety check system include:
Key word library 1, set and preserve the keyword for being related to security information;
Extraction module 2, crack and extract duplicator and/or the privately owned or public formatted file of duplicator hard disk and/or
Picture;
Optical character identification module 3, the information identification in file and/or picture to be checked that extraction module 2 is extracted
And be converted to word and/or character;
Comparison check module 4, the word being converted to after being identified by optical character identification module 3 and/or character and pass
The keyword set in key character library 1 is contrasted;
Preserving module 5, according to the inspection result of comparison check module 4, preserve the file and/or picture for including keyword.
Further, key word library 1 includes:Keyword setup module 11, security classification setup module 12,
Keyword setup module 11 is used to adding or deleting keyword;
Security classification setup module 12 is used for the security classification for setting corresponding keyword.
Further, extraction module 2 includes:Check setup module 21;
Check that setup module 21 is used for brand, model, the IP address for setting duplicator and/or duplicator hard disk to be checked.
Further, optical character identification module 3 includes OCR identification modules.
Further, the contrast matching effect of comparison check module 4 can artificially be set.
Safety check system can be used in On line inspection and offline inspection;
On line inspection is directly to be connected safety check system with duplicator to be checked, according to duplicator brand, model, IP
Address carries out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to duplicator brand, model, is answered
Print machine hard disk information is checked offline.
The advantages of the present invention:, can be comprehensive right in detail using duplicator safety check system and method
The picture and journal file of storage in duplicator hard disk carry out safety inspection, and the file comprising security information is sieved
Choosing, and be highlighted;Can effectively crack the duplicator hard disk of a variety of privately owned storage formats, and to the picture in hard disk and
Journal file is accurately identified and checked, it is ensured that duplicator storage-medium information safety, prevents duplicator storage classified information from divulging a secret
Potential safety hazard.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet for hard disk secure inspection method that the embodiment of the present application provides,
Fig. 2 is a kind of schematic flow sheet for duplicator safety detection method that the embodiment of the present application provides,
Fig. 3 is a kind of duplicator safety check system structural representation that the embodiment of the present application provides.
Reference:
1- key word libraries, 11- keyword setup modules,
12- security classification setup modules, 2- extraction modules,
21- inspection setup modules, 22- brand setup modules,
23- model setup modules, 24- addresses setup module,
25- sequence number setup modules, 3- optical character identification modules,
4- comparison check modules, 5- preserving modules,
6- login modules.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with the accompanying drawings with specific embodiment pair
The present invention is described in detail.
The embodiment of the present application provides a kind of hard disk secure inspection method, is provided as shown in Figure 1 for the embodiment of the present application
A kind of schematic flow sheet of hard disk secure inspection method, specifically may comprise steps of:
S102, key word library is loaded, the command parameter containing key word library is sent to identification module;
Key word library includes:Predefined keyword and customized keyword;For example, predefined keyword includes:
Non- secret, internal, secret, secret, top-secret, customized keyword can be set according to the actual requirements, such as related
Technical parameter, project name, key nouns etc..
Command parameter containing key word library is sent to identification module, identification module is used to check text to be checked
Middle keyword;For example, the command parameter containing key word library is sent into predefined LanxumOCRengine, system is carried
The picture file of taking-up carries out OCR identifications, by the word recognized with checking that the keyword in keyword knowledge base is hit
Matching, the picture being hit are stored under the file of corresponding matched rule, and foreground Main form shows the picture being hit.Its
In, LanxumOCRengine is obtained by Tesseract and Leptonica reconstruct encapsulation.Identification that can be rapidly and efficiently is closed
Key word, and LanxumOCRengine recognition capability is strong, can meet user's request.
S104, picture file to be checked is loaded, obtain and picture file to be checked is identified by identification module, obtained text
File;
Load file and/or picture file to be discriminated, by the OCR identification technologies of identification module, by file to be discriminated and/
Or the information in picture is converted to text information, and it is stored in predefined text;
Wherein, identification module includes predefined language library, and language library includes multilingual, specifically, can adopt
With the language library for including 60 multilinguals, most of language can be effectively identified, meet user's request.
S106, the keyword in key word library, is checked text, determines the pass included in text
Key word;Keyword in key word library, the word in text is matched;
If including the keyword in key word library in text, marked in text, and store to be checked
Picture file is to predefined storage address;
If not including the keyword in key word library in text, do not mark, terminate to be checked in text
Look into the inspection of picture file.
Based on same inventive concept, the present embodiment provides a kind of duplicator safety detection method, if Fig. 2 is that the application is real
A kind of schematic flow sheet of copy safety detection method of example offer is applied, idiographic flow may comprise steps of:
S202, duplicator inspection system is logged in, duplicating machine information to be checked is set;
Duplicator inspection system is logged in by E-token dynamic password card;For example, by the token string code number at the dynamic token back side and
Dynamic password login system on front screen.
Duplicating machine information to be checked is set, and duplicator information includes:Brand, the model of duplicator, the letter of duplicator hard disk
Breath, and/or the IP address of duplicator;Further, in addition to create task include task names, scrutineer.
S204, according to key word library, keyword in picture file to be checked in duplicator is checked, outgoing inspection knot
Fruit;
According to key word library, start the inspection to keyword in duplicator, outgoing inspection result;Wherein, in key word library
Keyword include:Predefined keyword and customized keyword;
According to outgoing inspection result, publicly-owned and/or privately owned form picture file, journal file are extracted, and store and treat
Check picture file to predefined storage address.
S206, picture file of the display comprising keyword and corresponding keyword content;When duplicator inspection system be
During ray examination, can with real-time display duplicator safety inspection result, and will check comprising keyword message picture file and
Corresponding keyword content real-time display is on a display screen.
Further, duplicator safety detection method includes:On line inspection and offline inspection,
On line inspection is directly to be connected safety check system with duplicator to be checked, according to duplicator brand, model, IP
Address carries out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to duplicator brand, model, is answered
Print machine hard disk information is checked offline.
The duplicator safety detection method both can be used for On line inspection, can be also used for checking offline, On line inspection
It is that safety check system is directly connected and checked with duplicator to be checked, On line inspection can be carried out in real time, and inspection personnel can
With by checking that terminal directly monitors inspection situation in real time;Offline check is by safety check system and duplicator hard disk to be checked
Connect and check, because offline check is directly to be connected with hard disk, the inspection method is simpler compared to online, and inspection system is opened
The hair cycle is short, and development cost is low.
Based on same inventive concept, the embodiment of the present application provides a kind of duplicator safety check system, and Fig. 3 is this reality
A kind of duplicator safety check system structural representation of example offer is applied, specific system architecture is as follows:
Key word library 1, set and preserve the keyword for being related to security information;Further, the key word library 1 includes:
Keyword setup module 11, security classification setup module 12, keyword setup module 11 is used to adding or deleting keyword, crucial
Word is configured as the basis to duplicator safety inspection by user according to the actual demand of oneself;Security classification is set
Module 12 is used for the security classification for setting corresponding keyword, the convenient management to keyword, and the classification to inspection result.
Extraction module 2, extraction module 2 includes cracking the program of extraction duplicator and/or duplicator hard disk, for cracking
And extract privately owned or the public formatted file and/or picture of duplicator and/or duplicator hard disk;Wherein, it is described privately owned to refer to
Non-universal file and/or picture format, it is publicly-owned to refer to general file and/or picture format.Among extraction module 2, comprising
The cracking programs of various different model duplicators and/or duplicator hard disk, when user needs to carry out safety inspection to duplicator
When, user is configured by the duplicating machine information checked needs, and extraction module 2 can extract according to the setting of user selection
Corresponding cracking programs in the extraction module 2 of the duplicator.
Optical character identification module 3, the information identification in file and/or picture to be checked that extraction module 2 is extracted
And word and/or character are converted to, further, optical character identification module 3 includes OCR identification modules, by graphic form
Text message is converted to the word and/or character that computer can identify.
Comparison check module 4, the word being converted to after being identified by optical character identification module 3 and/or character and pass
The keyword set in key character library 1 is contrasted, and the contrast matching effect of comparison check module 4 can artificially be set;Tool
Body refers to that the matching effect of contrast could be arranged to match completely, it can also be provided that recognizing comprising some or some keyword
To include security information.
Preserving module 5, according to the inspection result of comparison check module 4, the file and/or picture for including keyword are preserved,
The relevant information of the picture and/or file is also preserved simultaneously, is specifically included the date of the duplicating of this document and/or picture, is duplicated
Personnel, the quantity etc. duplicated.
Further, extraction module 2 includes:Check setup module 21;Check that setup module 21 is to be checked multiple for setting
The brand of print machine and/or duplicator hard disk, model, IP address or sequence number, so also including what brand was set in extraction module 2
22nd, the module 25 of model is set module 23, the module 24 that address is set and the setting of duplicator hard disk information.
In order to ensure the safety of inspection operation, the present embodiment system also includes login module 6 and is used to input execution operator
The information of member;
Safety check system can be used in On line inspection and offline inspection, safety check system and key word library 1, extraction mould
Block 2, optical character identification module 3, comparison check module 4, preserving module 5 connect with the synchronous signal of login module 6.Pacify when by this
, it is necessary to which the inspection system is directly attached with duplicator when total inspection system is applied to On line inspection, such safety inspection
System can detects the state of duplicator in real time, and finds classified information in time, prevents classified information from leaking;Pacify when by this
, it is necessary to the inspection system is directly connected with the hard disk of duplicator, due to duplicator when total inspection system is applied to check offline
In hard disk be not conventional hard disc of computer, can not direct read/write, it is therefore desirable to change inspection system and duplicator hard disk is carried out
Reading could be given after cracking, therefore every kind of duplicator and duplicator hard disk crack, and are required for special extraction module 2;It is and hard
The species of disk will be less than the model of duplicator, so in the exploitation of the system checked offline, can reduce person works
Amount, lift development efficiency.
The token string number refers to that each dynamic password module has unique token string number to encode, and dynamic password mould
The dynamic password of real-time display and token string number and one-to-one relation on block.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and this
Art personnel can design alternative embodiment without departing from the scope of the appended claims.In claim
In, any reference symbol between bracket should not be configured to limitations on claims.Word " comprising " is not excluded for depositing
In element or step not listed in the claims.Word "a" or "an" before element do not exclude the presence of it is multiple this
The element of sample.The use of word first, second, and third does not indicate that any order.These words can be construed to title.
Claims (14)
1. a kind of hard disk secure inspection method, it is characterised in that methods described includes:
Key word library is loaded, the command parameter containing the key word library is sent to identification module;
Picture file to be checked is loaded, obtains and the picture file to be checked, obtained text is identified by the identification module
File;
According to the keyword in the key word library, the text is checked, determines to include in the text
Keyword.
2. hard disk secure inspection method as claimed in claim 1, it is characterised in that the loading key word library, will contain described
The command parameter of key word library is sent to identification module, specifically includes:
The key word library includes:Predefined keyword and customized keyword;
Command parameter containing the key word library is sent to identification module, the identification module is used to check text to be checked
Keyword in file.
3. hard disk secure inspection method as claimed in claim 1, it is characterised in that the loading picture file to be checked, obtain
The picture file to be checked is identified by the identification module, obtained text, specifically included:
File and/or picture file to be discriminated are loaded, by the OCR identification technologies of the identification module, by the text to be discriminated
Information in part and/or picture is converted to text information, and is stored in predefined text;
Wherein, the identification module includes predefined language library, and the language library includes multilingual.
4. hard disk secure inspection method as claimed in claim 1, it is characterised in that the key in the key word library
Word, the text is checked, obtain the keyword included in the text, specifically include:
According to the keyword in the key word library, the word in the text is matched;
If including the keyword in the key word library in the text, marked in the text, and deposit
The picture file to be checked is stored up to predefined storage address;
If not including the keyword in the key word library in the text, do not mark, tie in the text
Inspection of the beam to the picture file to be checked.
5. a kind of duplicator safety detection method, it is characterised in that methods described includes:
Duplicator inspection system is logged in, duplicating machine information to be checked is set;
According to key word library, keyword in picture file to be checked in the duplicator is checked, outgoing inspection result;
Picture file of the display comprising keyword and corresponding keyword content.
6. duplicator safety detection method as claimed in claim 5, it is characterised in that the login duplicator inspection system, if
Duplicating machine information to be checked is put, is specifically included:
Duplicator inspection system is logged in by E-token dynamic password card;
Duplicating machine information to be checked is set, and the duplicator information includes:Brand, the model of duplicator, the letter of duplicator hard disk
Breath, and/or the IP address of duplicator.
7. duplicator safety detection method as claimed in claim 5, it is characterised in that it is described according to key word library, to described multiple
Keyword is checked in picture file to be checked in print machine, outgoing inspection result, is specifically included:
According to key word library, start the inspection to keyword in the duplicator, outgoing inspection result;Wherein, the keyword
Keyword in storehouse includes:Predefined keyword and customized keyword;
According to the outgoing inspection result, publicly-owned and/or privately owned form picture file, journal file are extracted, and store institute
Picture file to be checked is stated to predefined storage address.
8. the duplicator safety detection method according to any one of claim 5-7 claim, it is characterised in that duplicate
Machine safety detection method includes:On line inspection and offline inspection,
The On line inspection is directly to be connected safety check system with duplicator to be checked, according to the duplicator brand, type
Number, IP address carry out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to the duplicator brand, type
Number, duplicator hard disk information checked offline.
9. a kind of duplicator safety check system, it is characterised in that the safety check system includes:
Key word library (1), sets and preserves the keyword for being related to security information;
Extraction module (2), crack and extract duplicator and/or privately owned or the public formatted file and/or figure of duplicator hard disk
Piece;
Optical character identification module (3), the information in file and/or picture to be checked that the extraction module (2) is extracted
Identify and be converted to word and/or character;
Comparison check module (4), the word and/or character being converted to after being identified by the optical character identification module (3)
Keyword with being set in the key word library (1) is contrasted;
Preserving module (5), according to the inspection result of the comparison check module (4), preserve the file and/or figure for including keyword
Piece.
10. duplicator safety check system according to claim 9, it is characterised in that the key word library (1) includes:
Keyword setup module (11), security classification setup module (12),
The keyword setup module (11) is used to adding or deleting keyword;
The security classification setup module (12) is used for the security classification for setting corresponding keyword.
11. duplicator safety check system according to claim 9, it is characterised in that the extraction module (2) includes:Inspection
Look into setup module (21);
The brand, model, IP that setup module (21) is checked for setting duplicator and/or duplicator hard disk to be checked
Location.
12. duplicator safety check system according to claim 9, it is characterised in that the optical character identification module (3)
Including OCR identification modules.
13. duplicator safety check system according to claim 9, it is characterised in that pair of the comparison check module (4)
Can artificially it be set than matching effect.
14. duplicator safety check system according to claim 9, it is characterised in that the safety check system can be used
In On line inspection and offline inspection;
The On line inspection is directly to be connected safety check system with duplicator to be checked, according to the duplicator brand, type
Number, IP address carry out On line inspection;
Offline check is to be connected safety check system with duplicator hard disk to be checked, according to the duplicator brand, type
Number, duplicator hard disk information checked offline.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710531246.5A CN107392060A (en) | 2017-07-03 | 2017-07-03 | A kind of hard disk, duplicator safety detection method, system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710531246.5A CN107392060A (en) | 2017-07-03 | 2017-07-03 | A kind of hard disk, duplicator safety detection method, system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107392060A true CN107392060A (en) | 2017-11-24 |
Family
ID=60334757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710531246.5A Pending CN107392060A (en) | 2017-07-03 | 2017-07-03 | A kind of hard disk, duplicator safety detection method, system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392060A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109542792A (en) * | 2018-11-28 | 2019-03-29 | 努比亚技术有限公司 | A kind of bitmap processing method, equipment and computer readable storage medium |
CN116226885A (en) * | 2023-03-07 | 2023-06-06 | 达思凯瑞技术(北京)有限公司 | Copying machine security check evidence obtaining system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103336923A (en) * | 2013-03-06 | 2013-10-02 | 西安电子科技大学 | Print monitoring system and method for universal printer |
CN104392167A (en) * | 2014-10-27 | 2015-03-04 | 东莞宇龙通信科技有限公司 | Method and device for privacy information detection warning and terminal |
CN105117462A (en) * | 2015-08-24 | 2015-12-02 | 北京锐安科技有限公司 | Sensitive word checking method and device |
CN106682868A (en) * | 2015-11-10 | 2017-05-17 | 北京计算机技术及应用研究所 | Online data extracting device and method for office automation equipment storage component |
-
2017
- 2017-07-03 CN CN201710531246.5A patent/CN107392060A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103336923A (en) * | 2013-03-06 | 2013-10-02 | 西安电子科技大学 | Print monitoring system and method for universal printer |
CN104392167A (en) * | 2014-10-27 | 2015-03-04 | 东莞宇龙通信科技有限公司 | Method and device for privacy information detection warning and terminal |
CN105117462A (en) * | 2015-08-24 | 2015-12-02 | 北京锐安科技有限公司 | Sensitive word checking method and device |
CN106682868A (en) * | 2015-11-10 | 2017-05-17 | 北京计算机技术及应用研究所 | Online data extracting device and method for office automation equipment storage component |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109542792A (en) * | 2018-11-28 | 2019-03-29 | 努比亚技术有限公司 | A kind of bitmap processing method, equipment and computer readable storage medium |
CN109542792B (en) * | 2018-11-28 | 2024-01-16 | 努比亚技术有限公司 | Bitmap processing method, bitmap processing equipment and computer readable storage medium |
CN116226885A (en) * | 2023-03-07 | 2023-06-06 | 达思凯瑞技术(北京)有限公司 | Copying machine security check evidence obtaining system and method |
CN116226885B (en) * | 2023-03-07 | 2024-01-23 | 达思凯瑞技术(北京)有限公司 | Copying machine security check evidence obtaining system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060005017A1 (en) | Method and apparatus for recognition and real time encryption of sensitive terms in documents | |
CN1193295C (en) | Distributed data archive device and system | |
CN104915808A (en) | Implementation method and system of electronic seal | |
US20200082111A1 (en) | Security Application for Data Security Formatting, Tagging and Control | |
CN103150517A (en) | Secure secret electronic file storage and archiving method and method for checking matching of user permission and file open permission | |
US11295027B2 (en) | System and method for protecting electronic documents containing confidential information from unauthorized access | |
CN108038777A (en) | A kind of accounting system | |
CN107451459A (en) | The method and apparatus verified using picture validation code | |
CN207115412U (en) | A kind of duplicator safety check system | |
CN107392060A (en) | A kind of hard disk, duplicator safety detection method, system | |
KR20150027567A (en) | Integrated document management system | |
CN102609542A (en) | X-ray digital image feature database for detecting power equipment | |
Jones et al. | The 2016 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE | |
Didriksen | Forensic analysis of OOXML documents | |
Faerber | Book Versus Byte: The Prospects and Desirability of a Paperless Society | |
Forstrom | Managing electronic records in manuscript collections: A case study from the Beinecke Rare Book and Manuscript Library | |
CN105519037A (en) | Data processing apparatus, data processing method and program | |
Moore | The role of computer forensics in criminal investigations | |
CN113032744A (en) | Digital watermark all-in-one system | |
CN112907227A (en) | Software design data file management system | |
CN109558379A (en) | A kind of data checking method and device | |
US11941625B2 (en) | Systems and methods for real-time classification and verification of data using hierarchal state machines | |
CN112528330B (en) | Log scanning method, device and equipment | |
CN116719778B (en) | Technology for generating virtual partition to complete four-way information theme by OFD file on OA system | |
Funge-Smith et al. | Investigation and Analysis of Information Remaining on Used HDDs in Thailand |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171124 |