CN108920305B - USB device access risk detection method and device based on distributed accounting - Google Patents

USB device access risk detection method and device based on distributed accounting Download PDF

Info

Publication number
CN108920305B
CN108920305B CN201810637094.1A CN201810637094A CN108920305B CN 108920305 B CN108920305 B CN 108920305B CN 201810637094 A CN201810637094 A CN 201810637094A CN 108920305 B CN108920305 B CN 108920305B
Authority
CN
China
Prior art keywords
usb
equipment
information
usb equipment
distributed accounting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810637094.1A
Other languages
Chinese (zh)
Other versions
CN108920305A (en
Inventor
张�林
崔岗
春增军
谭胜盛
张百舸
李光达
荆俊强
颜振宇
潘毓航
方勇
卜哲
魏亮
谢玮
许子先
廖璇
崔涛
孔令飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China General Nuclear Power Corp
China Nuclear Power Engineering Co Ltd
CGN Power Co Ltd
China Academy of Information and Communications Technology CAICT
Original Assignee
China General Nuclear Power Corp
China Nuclear Power Engineering Co Ltd
CGN Power Co Ltd
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China General Nuclear Power Corp, China Nuclear Power Engineering Co Ltd, CGN Power Co Ltd, China Academy of Information and Communications Technology CAICT filed Critical China General Nuclear Power Corp
Priority to CN201810637094.1A priority Critical patent/CN108920305B/en
Publication of CN108920305A publication Critical patent/CN108920305A/en
Application granted granted Critical
Publication of CN108920305B publication Critical patent/CN108920305B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Abstract

The invention discloses a USB device access risk detection method based on distributed accounting, which comprises the following steps: when the USB equipment is accessed, identifying the record information accessed by the USB equipment; storing the recorded information to the local and synchronously storing the recorded information to a different place; according to the record information and the equipment authorization table, carrying out risk detection on the accessed USB equipment; the device authorization table is pre-stored locally and synchronously stored in a different place. The invention also discloses a USB device access risk detection device based on distributed accounting. The invention can manage data in a decentralized storage mode, effectively guarantee the data tamper resistance and provide disaster-proof backup reliability.

Description

USB device access risk detection method and device based on distributed accounting
Technical Field
The invention relates to the technical field of nuclear power and electric power, in particular to a USB device access risk detection method and device based on distributed accounting.
Background
In a power system, a transformer substation in the nuclear power industry and a power plant thereof, due to the requirements of functions such as system upgrading, service data transmission and the like in a service system, a USB device needs to be used for access, and often an attacker serves as an attacking medium to attack and destroy the system through the USB device. In an actual network attack, after a hacker invades through the access USB device, the hacker often tampers or deletes the access log of the related USB device, and erases the invasion and damage trace, so that the attack entry cannot be accurately analyzed.
In addition, it is difficult to perform centralized management and association analysis in a simple centralized manner for different devices of a service system and different recording formats of access logs for USB devices in different systems.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a method and a device for detecting the access risk of the USB equipment based on distributed accounting, which can manage data in a decentralized storage mode, effectively ensure the data to be tamper-proof and provide disaster-proof backup reliability.
The technical scheme provided by the invention for the technical problem is as follows:
in one aspect, the invention provides a method for detecting USB device access risk based on distributed accounting, which comprises the following steps:
when the USB equipment is accessed, identifying the record information accessed by the USB equipment;
storing the recorded information to the local and synchronously storing the recorded information to a different place;
according to the record information and the equipment authorization table, carrying out risk detection on the accessed USB equipment; the device authorization table is pre-stored locally and synchronously stored in a different place.
Further, the recording information includes identification information of the USB device;
the performing risk detection on the accessed USB device according to the record information and the device authorization table specifically includes:
inquiring the equipment authorization table according to the identification information of the USB equipment, and detecting whether the USB equipment is authorized; and if the access risk of the USB equipment is authorized, judging that the access risk of the USB equipment is low, and if the access risk of the USB equipment is not authorized, judging that the access risk of the USB equipment is high.
Further, after the risk detection is performed on the accessed USB device, the method further includes:
and storing the authorization detection result of the USB equipment to the local and synchronously storing the authorization detection result to a different place.
Further, after the risk detection is performed on the accessed USB device, the method further includes:
and outputting the record information of the unauthorized USB equipment to a user interface, and sending an early warning picture or an acoustic signal.
Further, the method further comprises:
detecting locally stored recording information and an equipment authorization table in real time;
and if the recorded information stored locally or the equipment authorization table is detected to be tampered, acquiring corresponding information from a different place, and covering the locally tampered information.
On the other hand, the invention provides a USB device access risk detection device based on distributed accounting, which comprises a USB device access detection recording module, a local distributed accounting storage module, a USB device access analysis module and a distributed accounting data synchronization module:
the USB equipment access detection recording module is used for identifying the record information accessed by the USB equipment when the USB equipment is accessed, and sending the record information of the USB equipment to the local distributed accounting storage module;
the local distributed accounting storage module is used for storing the record information of the USB equipment, a preset equipment authorization table and the information synchronized by the distributed accounting data synchronization module from different places;
the USB equipment access analysis module is used for calling the recording information and the equipment authorization table from the local distributed accounting storage module and carrying out risk detection on the accessed USB equipment;
the distributed accounting data synchronization module is used for synchronizing the information stored in the local distributed accounting storage module to different places for storage and synchronizing the information stored in the different places to the local distributed accounting storage module for storage.
Further, the recording information includes identification information of the USB device;
the USB equipment access analysis module is specifically used for inquiring the equipment authorization table according to the identification information of the USB equipment and detecting whether the USB equipment is authorized; and if the access risk of the USB equipment is authorized, judging that the access risk of the USB equipment is low, and if the access risk of the USB equipment is not authorized, judging that the access risk of the USB equipment is high.
Further, the USB device access analysis module is further configured to send an authorization detection result of the USB device to the local distributed accounting storage module;
the local distributed accounting storage module is also used for storing the authorization detection result of the USB equipment and synchronously storing the authorization detection result to different places through the distributed accounting data synchronization module.
Further, the device also comprises an early warning module;
the USB equipment access analysis module is also used for sending the record information of unauthorized USB equipment to the early warning module;
the early warning module is used for outputting the record information of the unauthorized USB equipment to a user interface and sending out an early warning picture or an acoustic signal.
Further, the distributed accounting data synchronization module is also used for detecting the recorded information and the equipment authorization table stored in each place in real time; and if the recorded information or the equipment authorization table is tampered, acquiring corresponding information from other places, and covering the tampered information.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
when the USB device is accessed, the record information accessed by the USB device is stored locally and synchronized to a different place, and then the record information of the USB device is detected according to the device authorization table stored locally and the different place, the access risk of the USB device is judged, and hackers are effectively prevented from tampering or deleting the relevant USB device access data in an operating system after accessing the USB device to invade, and removing invasion and damage traces, so that accurate analysis can not be performed on an attack entrance.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a USB device access risk detection method based on distributed accounting according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a USB device access risk detection apparatus based on distributed accounting according to a second embodiment of the present invention.
Detailed Description
In order to solve the technical problems that accurate analysis cannot be performed on an attack entry and the like caused by the fact that a hacker can access data by accessing a USB device and erase invasion and damage traces by tampering or deleting related USB device access data after invading the USB device in the prior art, the invention aims to provide a USB device access risk detection method based on distributed accounting, which has the core idea that: when the USB equipment is accessed, the record information accessed by the USB equipment is stored locally and synchronized to different places, and then the record information of the USB equipment is detected according to the equipment authorization table stored locally and different places, and the access risk of the USB equipment is judged. According to the method and the device, risk detection can be performed on USB device access based on decentralized and distributed accounting, data tampering can be effectively guaranteed, and disaster-prevention backup reliability is provided.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Example one
The embodiment of the invention provides a USB device access risk detection method based on distributed accounting, and referring to FIG. 1, the method comprises the following steps:
s1, when the USB device is accessed, identifying the record information accessed by the USB device;
s2, storing the recorded information locally and synchronously to different places;
s3, according to the record information and the device authorization table, carrying out risk detection on the accessed USB device; the device authorization table is pre-stored locally and synchronously stored in a different place.
It should be noted that, when a power system, a transformer substation in the nuclear power industry, and a service system in a power plant thereof are connected to a USB device due to requirements of functions such as system upgrade, service data transmission, and the like, record information accessed by the USB device is identified, where the record information is generally an access log of the USB device, that is, includes identification information, access time, and the like of the USB device, and the identification information is generally a hardware serial number of the USB device. After the record information of the USB device is identified, the record information of the USB device is stored locally and synchronized to a different place for storage, where the storage in each place may be that the record information of the USB device is stored in a plurality of computers in the same lan, or that the record information of the USB device is stored in different storage areas of one computer.
In addition, an operator sets an equipment authorization table in advance, the equipment authorization table is stored locally and synchronized to a different place for storage, and the storage mode of the equipment authorization table at each place is the same as that of the recorded information, and detailed description is omitted here.
Specifically, in step S3, the performing risk detection on the accessed USB device according to the record information and the device authorization table specifically includes:
inquiring the equipment authorization table according to the identification information of the USB equipment, and detecting whether the USB equipment is authorized; and if the access risk of the USB equipment is authorized, judging that the access risk of the USB equipment is low, and if the access risk of the USB equipment is not authorized, judging that the access risk of the USB equipment is high.
It should be noted that, the device authorization table records identification information of authorized USB devices, and compares the identification information of the USB devices with the device authorization table, if the identification information of the USB devices is located on the device authorization table, it indicates that the USB devices are authorized devices, and determines that the access risk of the USB devices is low; if the identification information of the USB equipment is not on the equipment authorization table, the USB equipment is indicated to be unauthorized equipment, and the USB equipment is judged to have high access risk. In the embodiment, the identification information of the USB device is compared with the identification information of the authorized device in the device authorization table by using a comparison algorithm, so that accurate and efficient data analysis and comparison are realized.
In the embodiment, the USB device access data based on decentralized and distributed accounting is analyzed and compared, where decentralized is a phenomenon or structure and must occur or exist in a system with many nodes or in a group with many individuals, influences between nodes form a non-linear causal relationship through a network, and distributed accounting is to store data in a plurality of independent machine devices in a decentralized manner. In the embodiment, local and remote nodes are used as nodes to respectively store and analyze the USB equipment access data, so that the problem of risk control caused by the fact that the USB equipment needs to be accessed due to the requirements of functions such as system upgrading, service data transmission and the like of a service system is solved.
Further, after the risk detection is performed on the accessed USB device, the method further includes:
and storing the authorization detection result of the USB equipment to the local and synchronously storing the authorization detection result to a different place.
It should be noted that, in the present embodiment, a communication protocol is used to implement data synchronization, so as to ensure integrity, confidentiality and availability of data transmission.
Further, after the risk detection is performed on the accessed USB device, the method further includes:
and outputting the record information of the unauthorized USB equipment to a user interface, and sending an early warning picture or an acoustic signal.
It should be noted that after the risk detection is performed on the accessed USB device, if the USB device is found to be an authorized device, the authorization result is identified in the record information of the USB device, and is sent to the local for storage, and is synchronized to a different place for storage; if the USB device is found to be unauthorized, the unauthorized result is output to a user interface, an early warning picture or an acoustic signal is sent out, and the unauthorized result is identified in the recording information of the USB device, sent to the local for storage and synchronized to a different place for storage.
Further, the method further comprises:
detecting locally stored recording information and an equipment authorization table in real time;
and if the recorded information stored locally or the equipment authorization table is detected to be tampered, acquiring corresponding information from a different place, and covering the locally tampered information.
It should be noted that the locally stored information is synchronized to different places in real time for storage, and the locally stored information is also synchronized to the local places in real time for storage. In addition, the information corresponding to each place is detected in real time, for example, the device authorization table of each place is detected, and if the device authorization table of a certain place is found to be different from the device authorization tables stored in other places, the device authorization table of the place is falsified, and the device authorization table of the other places needs to be covered.
The invention is mainly based on Windows operating system platform, utilizes mature and stable third-party program development kit to construct the functions of detection, identification, record storage and data comparison of the USB devices, adopts object-oriented method and multi-process technology, and realizes the communication among the processes by sharing memory.
According to the embodiment of the invention, through analyzing and early warning the access risk of the USB equipment, a hacker can be prevented from tampering or deleting the related USB equipment access data in the operating system after the hacker invades the USB equipment through access, and erasing invasion and damage traces, so that the attack entrance can not be accurately analyzed. The embodiment provides USB access risk detection based on decentralized and distributed accounting, which can meet the requirements of a service system on the access data analysis and early warning of USB equipment in the aspects of tamper resistance and decentralized, and finally enables the access of the USB equipment to have searchable records and controllable equipment access so as to achieve the final goal of being safe, known and controllable.
Example two
The embodiment of the invention provides a USB equipment access risk detection device based on distributed accounting, which can realize all the processes of the USB equipment access risk detection method based on distributed accounting, and is shown in figure 2, wherein the device comprises a USB equipment access detection recording module 1, a local distributed accounting storage module 2, a USB equipment access analysis module 3 and a distributed accounting data synchronization module 4:
the USB equipment access detection recording module 1 is used for identifying the record information accessed by the USB equipment when the USB equipment is accessed, and sending the record information of the USB equipment to the local distributed accounting storage module 2;
the local distributed accounting storage module 2 is used for storing the record information of the USB equipment, a preset equipment authorization table and the information synchronized from different places by the distributed accounting data synchronization module 4;
the USB equipment access analysis module 3 is used for calling the record information and the equipment authorization table from the local distributed accounting storage module 2 and carrying out risk detection on the accessed USB equipment;
the distributed accounting data synchronization module 4 is used for synchronizing the information stored in the local distributed accounting storage module 2 to different places for storage, and synchronizing the information stored in the different places to the local distributed accounting storage module 2 for storage.
Further, the recording information includes identification information of the USB device;
the USB device access analysis module 3 is specifically configured to query the device authorization table according to the identification information of the USB device, and detect whether the USB device is authorized; and if the access risk of the USB equipment is authorized, judging that the access risk of the USB equipment is low, and if the access risk of the USB equipment is not authorized, judging that the access risk of the USB equipment is high.
Further, the USB device access analysis module 3 is further configured to send an authorization detection result of the USB device to the local distributed accounting storage module;
the local distributed accounting storage module 2 is further configured to store an authorization detection result of the USB device, and to store the authorization detection result to a different place through the distributed accounting data synchronization module 4.
Further, as shown in fig. 2, the device further includes an early warning module 5;
the USB equipment access analysis module 3 is also used for sending the record information of unauthorized USB equipment to the early warning module 5;
the early warning module 5 is used for outputting the record information of the unauthorized USB equipment to a user interface and sending out an early warning picture or an acoustic signal.
Further, the distributed accounting data synchronization module 4 is further configured to detect recording information and an equipment authorization table stored in each region in real time; and if the recorded information or the equipment authorization table is tampered, acquiring corresponding information from other places, and covering the tampered information.
The USB equipment access detection recording module is installed in the monitored service system, and when a USB equipment is accessed, the USB equipment access detection recording module identifies the identification information (generally a hardware serial number) of the USB equipment and sends the recording information accessed by the USB equipment to the local distributed accounting storage module for storage.
The local distributed accounting storage module is respectively connected with the USB equipment access detection recording module, the USB equipment access analysis module and the distributed accounting data synchronization module, the local distributed accounting storage module stores the USB equipment access recording information transmitted by the USB equipment access detection recording module, and the authorized detection result transmitted by the USB equipment access analysis module and the authorized equipment and unauthorized equipment recording information transmitted by the distributed accounting data synchronization module.
The USB equipment access analysis module is connected with the local distributed accounting storage module, the recording information of the USB equipment and the equipment authorization table are compared in real time by calling the equipment authorization table in the local distributed accounting storage module, if the USB equipment is found to be identified as unauthorized equipment, the result is sent to the early warning module, and the recording information is sent to the local distributed accounting storage module for storage; if the found equipment is identified as authorized equipment, the recorded information is only required to be sent to the local distributed accounting storage module for storage.
The distributed accounting data synchronization module is connected with the local distributed accounting storage modules and is used for synchronizing the recording information of authorized equipment and unauthorized equipment in each local distributed accounting storage module and providing the disaster prevention backup function of the recording information.
The early warning module is connected with the USB equipment access analysis module, and outputs a result to a user interface and sends out an early warning picture or an acoustic signal after receiving the recording information sent by the USB equipment access analysis module.
According to the embodiment of the invention, through analyzing and early warning the access risk of the USB equipment, a hacker can be prevented from tampering or deleting the related USB equipment access data in the operating system after the hacker invades the USB equipment through access, and erasing invasion and damage traces, so that the attack entrance can not be accurately analyzed. The embodiment provides USB access risk detection based on decentralized and distributed accounting, which can meet the requirements of a service system on the access data analysis and early warning of USB equipment in the aspects of tamper resistance and decentralized, and finally enables the access of the USB equipment to have searchable records and controllable equipment access so as to achieve the final goal of being safe, known and controllable.
In summary, the present invention provides a method and an apparatus for detecting USB device access risk based on distributed accounting, which have the following advantages: the invention is based on USB equipment access risk detection using decentralized and distributed accounting technologies, under the premise of effectively ensuring data tamper resistance and providing disaster-proof backup reliability, authorized and unauthorized USB equipment are marked and distributed and synchronized, and when the USB equipment is accessed, the USB equipment is audited, and unauthorized equipment is found and early-warning is carried out.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. A USB device access risk detection method based on distributed accounting is characterized by comprising the following steps:
when the USB equipment is accessed, identifying the record information accessed by the USB equipment;
storing the recorded information to the local and synchronously storing the recorded information to a different place;
according to the record information and the equipment authorization table, carrying out risk detection on the accessed USB equipment; the device authorization table is pre-stored locally and synchronously stored in different places;
detecting locally stored recording information and an equipment authorization table in real time;
if the recorded information stored locally or the equipment authorization table is detected to be tampered, acquiring corresponding information from a different place, and covering the locally tampered information;
the information stored locally is synchronized to different places in real time for storage, the information stored in different places is also synchronized to the local in real time for storage, and when the corresponding information of each place is detected in real time, if the equipment authorization table of a certain place is different from the equipment authorization tables stored in other places, the equipment authorization table of the other places is covered.
2. The distributed accounting-based USB device access risk detection method according to claim 1, wherein the recorded information comprises identification information of the USB device;
the performing risk detection on the accessed USB device according to the record information and the device authorization table specifically includes:
inquiring the equipment authorization table according to the identification information of the USB equipment, and detecting whether the USB equipment is authorized; and if the access risk of the USB equipment is authorized, judging that the access risk of the USB equipment is low, and if the access risk of the USB equipment is not authorized, judging that the access risk of the USB equipment is high.
3. The distributed accounting-based USB device access risk detection method as claimed in claim 2, further comprising after the risk detection of the accessed USB device:
and storing the authorization detection result of the USB equipment to the local and synchronously storing the authorization detection result to a different place.
4. The distributed accounting-based USB device access risk detection method as claimed in claim 2, further comprising after the risk detection of the accessed USB device:
and outputting the record information of the unauthorized USB equipment to a user interface, and sending an early warning picture or an acoustic signal.
5. The utility model provides a USB equipment access risk detection device based on distributed account keeping which characterized in that, includes that USB equipment inserts detects record module, local distributed account keeping storage module, USB equipment access analysis module and distributed account keeping data synchronization module:
the USB equipment access detection recording module is used for identifying the record information accessed by the USB equipment when the USB equipment is accessed, and sending the record information of the USB equipment to the local distributed accounting storage module;
the local distributed accounting storage module is used for storing the record information of the USB equipment, a preset equipment authorization table and the information synchronized by the distributed accounting data synchronization module from different places;
the USB equipment access analysis module is used for calling the recording information and the equipment authorization table from the local distributed accounting storage module and carrying out risk detection on the accessed USB equipment;
the distributed accounting data synchronization module is used for synchronizing the information stored by the local distributed accounting storage module to different places for storage and synchronizing the information stored by the different places to the local distributed accounting storage module for storage;
the distributed accounting data synchronization module is also used for detecting the recorded information and the equipment authorization table stored in each place in real time; and if the recorded information or the equipment authorization table is tampered, acquiring corresponding information from other places, and covering the tampered information.
6. The distributed accounting-based USB device access risk detection apparatus of claim 5, wherein the record information comprises identification information of the USB device;
the USB equipment access analysis module is specifically used for inquiring the equipment authorization table according to the identification information of the USB equipment and detecting whether the USB equipment is authorized; and if the access risk of the USB equipment is authorized, judging that the access risk of the USB equipment is low, and if the access risk of the USB equipment is not authorized, judging that the access risk of the USB equipment is high.
7. The distributed accounting-based USB device access risk detection apparatus of claim 6, wherein the USB device access analysis module is further configured to send an authorization detection result of the USB device to the local distributed accounting storage module;
the local distributed accounting storage module is also used for storing the authorization detection result of the USB equipment and synchronously storing the authorization detection result to different places through the distributed accounting data synchronization module.
8. The distributed accounting-based USB device access risk detection apparatus of claim 6, wherein the apparatus further comprises an early warning module;
the USB equipment access analysis module is also used for sending the record information of unauthorized USB equipment to the early warning module;
the early warning module is used for outputting the record information of the unauthorized USB equipment to a user interface and sending out an early warning picture or an acoustic signal.
CN201810637094.1A 2018-06-20 2018-06-20 USB device access risk detection method and device based on distributed accounting Active CN108920305B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810637094.1A CN108920305B (en) 2018-06-20 2018-06-20 USB device access risk detection method and device based on distributed accounting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810637094.1A CN108920305B (en) 2018-06-20 2018-06-20 USB device access risk detection method and device based on distributed accounting

Publications (2)

Publication Number Publication Date
CN108920305A CN108920305A (en) 2018-11-30
CN108920305B true CN108920305B (en) 2021-11-30

Family

ID=64421047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810637094.1A Active CN108920305B (en) 2018-06-20 2018-06-20 USB device access risk detection method and device based on distributed accounting

Country Status (1)

Country Link
CN (1) CN108920305B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111007783A (en) * 2019-12-28 2020-04-14 广东电科院能源技术有限责任公司 Safety management and control system and method
CN111597544A (en) * 2020-05-18 2020-08-28 贵州电网有限责任公司 Intermediary physical isolation method and system applied to USB interface

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling
CN104850802A (en) * 2015-05-12 2015-08-19 浪潮电子信息产业股份有限公司 Method for monitoring file change and enabling data not to be tampered under linux
CN106874794A (en) * 2016-12-08 2017-06-20 环球智达科技(北京)有限公司 A kind of file tamper resistant systems

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100694161B1 (en) * 2006-02-10 2007-03-12 삼성전자주식회사 Method of managing distributed contents and apparatus therefor
US8938805B1 (en) * 2012-09-24 2015-01-20 Emc Corporation Detection of tampering with software installed on a processing device
CN103413083B (en) * 2013-08-15 2016-08-10 水利部水利信息中心 Unit security protection system
CN103632080B (en) * 2013-11-06 2016-08-17 国家电网公司 A kind of mobile data applications method for security protection based on USBKey
CN106960166A (en) * 2017-03-14 2017-07-18 清华大学 A kind of smart jack management system and its method based on distributed general ledger technology
CN107786565A (en) * 2017-11-02 2018-03-09 江苏物联网研究发展中心 A kind of distributed real-time intrusion detection method and detecting system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling
CN104850802A (en) * 2015-05-12 2015-08-19 浪潮电子信息产业股份有限公司 Method for monitoring file change and enabling data not to be tampered under linux
CN106874794A (en) * 2016-12-08 2017-06-20 环球智达科技(北京)有限公司 A kind of file tamper resistant systems

Also Published As

Publication number Publication date
CN108920305A (en) 2018-11-30

Similar Documents

Publication Publication Date Title
CN101751535B (en) Data loss protection through application data access classification
CN102999716B (en) virtual machine monitoring system and method
CN107977823A (en) Accident treating method and apparatus
CN102208983B (en) Identity recognition management system and method focused on households in social security housing
CN108920305B (en) USB device access risk detection method and device based on distributed accounting
CN105759247B (en) Radar integrated recorder and radar data recording method
CN110535895A (en) A kind of machine room monitoring system based on technology of Internet of things
CN106603489A (en) Network security management and control apparatus for transformer substation
CN210294523U (en) Data recording device for radar detection system
CN106022156A (en) Method, device, and black box for recording data in coal mine safety monitoring system
CN114036480B (en) Security access control method and system for private application and readable storage medium
CN116049797A (en) Intelligent storage system based on data classification system
CN112380525A (en) Method and device for managing remote access of wave recorder
CN111090855A (en) Intrusion detection method and device based on Linux host
CN110866017A (en) Tax handling operation mark leaving system for visual retrieval and implementation method thereof
CN117077227B (en) Abnormality monitoring method and system based on USB level signal
CN215897739U (en) Terminal for remote substation to transfer recording file
CN109767515A (en) Fire-fighting equipment safety inspection management method
CN211791555U (en) Portable electric power special network tester
CN102298675A (en) Method and system for sending alarm signal by mobile storage device
CN115473711A (en) Data security privacy protection device and protection method based on cloud security service
CN117787919A (en) Operation and maintenance monitoring management system for data information of power equipment
CN116226858A (en) Network security test evaluation system and method
CN113079178A (en) Method, device, equipment and storage medium for identifying illegal external connection of terminal
CN115623038A (en) Smart city network supervision method and system based on Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant