CN109033313A - A kind of method and terminal device for realizing scan full hard disk function using USN - Google Patents
A kind of method and terminal device for realizing scan full hard disk function using USN Download PDFInfo
- Publication number
- CN109033313A CN109033313A CN201810786552.8A CN201810786552A CN109033313A CN 109033313 A CN109033313 A CN 109033313A CN 201810786552 A CN201810786552 A CN 201810786552A CN 109033313 A CN109033313 A CN 109033313A
- Authority
- CN
- China
- Prior art keywords
- file
- scanning
- hard disk
- scan
- full hard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a kind of methods and terminal device that scan full hard disk function is realized using USN, this method comprises: scan full hard disk system receives the trigger action being scanned to file system;Scanning log corresponding to a preceding scan operation is obtained from log system;According to file scan starting point, document analysis reduction is successively taken out, the relevant information of the file and the file after parsing reduction are sent to policy system;The policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains scanning result, and update the scanning log;If the scanning result is hit, hit results are sent to the scan full hard disk system.The method and terminal device apply renewal sequence USN and policing rule to realize scan full hard disk, improve the safety and flexibility of scan full hard disk.
Description
Technical field
The disclosure belongs to computer field, specifically, being a kind of method and end for realizing scan full hard disk function using USN
End equipment.
Background technique
In computer application, it is often necessary to be swept to the file in the storage system being made of disk or hard disk
Retouch, the most common scanning mode is scan full hard disk, traditional scan full hard disk by enumerating the file in storage system to be scanned,
For example first from the root of storage system file is enumerated, and another one sends subsequent scanning engine to after enumerating, and one
A or multiple scanning engines obtain a scanning result after scanning file.But this scanning mode more wasteful time, and
And consumption system resource.In order to overcome the shortcomings of scan full hard disk, patent WO2017084557A1 proposes a kind of for killing disease
The file scanning method of poison, this method realize incremental scan killing disease using the rest position for being incremented by log recording previous scan
Poison, to reduce the sweep time of traditional scan full hard disk.
At the same time, the scan full hard disk of either traditional scan full hard disk or incremental manner, what the prior art provided sweeps
Usually virus scanning engine is retouched, a scanning result based on existing virus base can only be provided to user, do not accounted for very
Multiple enterprises user compares the scanning paid close attention to sensitive information, that is, the strategy scanned can not customize according to the demand of user;Also,
In order to guarantee the accuracy of scanning result, it may require that terminal provides the function of online mostly, and this requires to compare to sensitive data
High user can also have potential security risk.
In addition, if new file operation, such as addition, deletion or modification file operation occur for the file after scanning
When, existing scan full hard disk can not know whether these operations occur after scanning, therefore can omit and do again to these files
The operation of secondary scanning also brings along data safety risk.
Summary of the invention
In view of the above-mentioned problems in the prior art is solved, the disclosure is designed to provide a kind of application USN realization
The method and terminal device of scan full hard disk function.
Present disclose provides a kind of methods for realizing scan full hard disk using renewal sequence USN, for the file to terminal
It is scanned, it is characterised in that the terminal disposition has scan full hard disk system and policy system, executes following step:
Step 1: the scan full hard disk system receives the trigger action being scanned to the file system;
Step 2: the scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
Step 3: the position that single pass ends before the scan full hard disk system is found according to the scanning log, judgement
Whether the position is that the last one file of the file system then goes to step 4 if YES;If NO, then with described
The position of next file of position goes to step 5 as file scan starting point;
Step 4: check in the log of the USN whether the record of scanning in need, if it is, with USN update
The document location of record is file scan starting point, if it is not, then the scanning is fully completed, goes to step 1;
Step 5: scan full hard disk system is taken out a document analysis according to the file scan starting point and is restored, the phase of the file
File after closing information and parsing reduction is sent to policy system;
Step 6: the policy system is scanned the file after the relevant information and the parsing reduction of the file,
Scanning result is obtained, and updates the scanning log;
Step 7: whether the scanning result is hit, if it is, hit results are sent to the scan full hard disk system
System, and go to step 2;If it is not, then going to step 2.
The policy system in the method that the disclosure provides can be configured to the scanning strategy to sensitive information, then can protect
Leakage of data (leakage).
In addition, the method that the disclosure provides can be avoided the case where updating file " escape " scanning, and such as: work as scanning
After a complete file, the file updates again, at this point, this, which updates file, to be scanned again, thus " escape "
Scanning will bring security risk when the content of update belongs to invalid information to system, and the technical side that the disclosure provides
Case due to also needing to check the information in USN log, even if by a file it is scanned after updating, but this
The information of update can be recorded in USN log, even if therefore update file original document it is scanned after, but as long as it occurs
It updates, can also be scanned again, is i.e. realization incremental sweep, to effectively avoid above-mentioned security risk.
Based on the above technical solution, further, the scan full hard disk system receives the policy system and returns
As a result, storing the result of the scanning into the log system.
Based on the above technical solution, further, described to update the scanning log and include:
The position of Current Scan file is added in the record of the scanning log.
Based on the above technical solution, further, the file is swept in the scan full hard disk system reception
Before the trigger action retouched, further includes:
Step 1.1: user opens scan full hard disk function, All Files of the scan full hard disk system to terminal document system
Concordance list is established, the result cache of the index is into the subscriber data file of scan full hard disk system.
Based on the above technical solution, further, the position includes the index of File Index Table.
Based on the above technical solution, further, relevant information and institute of the policy system to the file
Before file after stating parsing reduction is scanned, comprising:
Step 6.1: policy system described in administrator or user setting configures the period of scanning.
Based on the above technical solution, further, when the time meeting the period of the configuration scanning, triggering
Scan full hard disk system is scanned the file information;Or take manual mode triggering scan full hard disk system to the file
Information is scanned.
Based on the above technical solution, further, the relevant information of the file includes at least following a kind of:
(1) storage location, (2) name, (3) author, (4) size, (5) type.
Based on the above technical solution, further, relevant information and institute of the policy system to the file
It includes: scanning for the file-related information that file after stating parsing reduction, which is scanned, or also for the parsing
The file content of file after original is scanned.
Based on the above technical solution, further, the policy system comprises at least one of the following policing rule,
And file is scanned with the policing rule:
(1) search strategy, the search strategy include the list or Data Identification of a series of personnel, equipment or catalogue
Symbol, the text after relevant information or the parsing reduction to the file for meeting the list or the data identifier
Part is scanned;
(2) white list strategy, the white list strategy include the list or data of a series of personnel, equipment or catalogue
Identifier, the relevant information or described to the file for the scanning for meeting the list or the data identifier
File after parsing reduction, from scanning.
Based on the above technical solution, further, some common sensitive contents are preset in the policy system
Data identifier, the data identifier includes: ID card information, business license information, and/or bank's card number, and is provided
Positive keyword, reversed keyword, fuzzy keyword and regular expression rule, in order to configuration strategy rule.
Based on the above technical solution, further, it when the scan full hard disk system receives hit results, executes
Comprise at least one of the following special operation:
(1) pop-up is reminded at the terminal;(2) it sends and reminds mail.
Based on the above technical solution, further, check in the log of the USN whether the text of scanning in need
Part, comprising:
Check whether corresponding file is scanned by ongoing scanning process in the record in the USN, such as
Fruit is, then described to record corresponding file and do not need to scan, and records corresponding file if it is not, then described and needs to scan.
When new file operation occurs for the file after scanning, such as: addition is deleted and is modified, and can be given in USN log
With record, modification time and modification content are such as recorded, at this point, can judge to set out by the modification time and modification content
Whether the file after raw new operation is scanned, if be not scanned, subsequent incremental sweep is needed, to prevent from scanning
File occurs to update and lack and scan brought data risk again afterwards.
Based on the above technical solution, further, the trigger action includes following any:
(1) with the trigger action of parameter, the parameter is for modifying a preceding scan operation described in the step 2
Scan log;
(2) printenv trigger action does not modify the scanning log of a preceding scan operation described in the step 2;
Wherein, the scanning log of a preceding scan operation described in the modification step 2 refers to that modification is described previous
The position of secondary scanning cut-off.
By two kinds of forms of trigger action, the flexibility of trigger action is improved.It is described when trigger action has parameter
Parameter is the file index by administrator or user setting, the scanning log of a preceding scan operation described in amendment step 2,
Realize customize scanning, such as: when need since first of file system or the file of some designated position to it
When file later scans one by one, the position of this file is specified by the way that the parameter is arranged, realizes the file scan of customization.
On the other hand, the disclosure additionally provides a kind of terminal device that scan full hard disk is realized using USN, it is characterised in that packet
Include: processor, memory, the processor execute the program on the reservoir and realize that above-mentioned application USN realizes scan full hard disk
The method of function.
Compared with prior art, the disclosure is at least had the advantages that
To obtain following at least one technical effects:
(1) NTFS (the New Technology due to the technical solution of the disclosure since Windows operating system is utilized
File System, New Technology File System) file system USN (Update Service Number Journal or
Change Journal, renewal sequence number) interface, quickly the All Files resume inside disk to be scanned is indexed, and utilizes
The characteristic of USN can know the change of file system in time, to realize the function of a more efficiently incremental sweep;
(2) technical solution of the disclosure can own control due to the provision of a policy system, system manager
Terminal issues a group policy, and terminal user cannot stop such strategy, while also provide customized for terminal user
Some policing rules for sensitive information to scanning engine, scanning engine can be according to one user file system of strategy generating
Map, sensitive document is filed, thus formed be directed to each user file system sensitive information map;
(3) data identifier of the technical solution of the disclosure due to also having preset some common sensitive contents, such as body
Part card information, business license information, bank's card number etc., and provide positive keyword, reversed keyword, fuzzy keyword and
Regular expression rule, facilitates administrator or user configuration sensitive information policing rule;
(4) scanning result not only can be prompted to user by the technical solution of the disclosure, can also be to the sensitivity scanned
The more user of information sends to system manager or relevant administrative staff and reminds mail, improves safety;
(5) technical solution of the disclosure can be used as scan full hard disk engine, provide some interfaces used for other application, than
If the USB flash disk in terminal D LP system manages function, printing control function etc., the scanning demand of entire terminal D LP can be serviced.
Detailed description of the invention
Fig. 1 is the flow diagram for realizing the method for scan full hard disk function described in the disclosure using USN.
Fig. 2 is the schematically structural schematic diagram for realizing the terminal of scan full hard disk function described in the disclosure using USN.
The disclosure is further described below.But following examples is intended merely to facilitate the technology for understanding the disclosure
Scheme, cited simple example do not represent or limit the scope of protection of the claims of the disclosure, the protection model of the disclosure
It encloses and is subject to claims.
Specific embodiment
Further illustrate the technical solution of the disclosure below with reference to the accompanying drawings and specific embodiments.
For the disclosure is better described, be easy to understand the technical solution of the disclosure, the disclosure it is typical but non-limiting
Embodiment is as follows: it is necessary to be noted that embodiment listed by present disclosure specification is merely to describe the problem conveniently
And the illustrative embodiment provided, it must not be not understood as the disclosure uniquely correct embodiment, must not be more not understood as
To the restricted explanation of disclosure protection scope.
As shown in Figure 1, for one specific embodiment of method for realizing scan full hard disk function described in the disclosure using USN
Flow diagram, its step are as follows:
It is scanned for the file to terminal, it is characterised in that the terminal disposition has scan full hard disk system and strategy system
System executes following step:
S1: the scan full hard disk system receives the trigger action being scanned to the file system;
S2: the scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
S3: the position that single pass ends before the scan full hard disk system is found according to the scanning log judges institute
Whether it is that the last one file of the file system then turns S4 if YES that rheme is set;If NO, then S5 is executed, with institute
Sweep starting point of the position for next file that rheme is set as file, then turns S7;
S4: check in the log of the USN whether the file of scanning in need, if not, showing the file system
All Files all scan through, and turn S1, wait new scanning trigger command;If it is, executing S6, is updated and remembered with the USN
The document location of record is file scan starting point, then turns S7;
S7: scan full hard disk system is taken out a document analysis according to the file scan starting point and is restored, the correlation of the file
File after information and parsing reduction is sent to policy system;
S8: the policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains
To scanning result, and update the scanning log;
S9: whether the scanning result is hit, if it is, executing S10, hit results is sent to and described are swept totally
System is retouched, S2 is then turned;If it is not, then going to step 2.
As more preferably embodiment, the policy system can be configured to the scanning strategy to sensitive information, then can protect number
According to divulge a secret (leakage).
The present embodiment can be avoided the case where updating file " escape " scanning, such as: it is described after scanning through a file
File updates again, at this point, this, which updates file, to be scanned again, so that " escape " scan operation, works as update
Content when belonging to invalid information, security risk will be brought to system, and the present embodiment is due to also needing to check in USN log
Information, therefore, though by a file it is scanned after updating, but information of this update can be recorded in USN days
In will, even if therefore update file original document it is scanned after, but as long as it is updated, can also be scanned again, i.e.,
It realizes incremental sweep, effectively avoids above-mentioned security risk.
As more preferably embodiment, the policy system comprises at least one of the following policing rule, and with the strategy rule
Then be scanned to file: (1) search strategy rule, the search strategy includes a series of name of personnel, equipment or catalogue
Single, the file after relevant information or the parsing reduction to the file for meeting the list is scanned;(2) white
List policing rule, the white list strategy include a series of list of personnel, equipment or catalogue, to meeting the list
File after the relevant information of the file of the scanning or the parsing reduction, from scanning.Pass through different strategies
Rule realizes different scanning modes, to meet the scanning application demand of different user.
As more preferably embodiment, the data identifier of some common sensitive contents, institute are preset in the policy system
Stating data identifier includes: ID card information, business license information, and/or bank's card number, and provides positive keyword, reversed
Keyword, fuzzy keyword and regular expression rule, in order to configuration strategy rule.
As more preferably embodiment, in the log for checking the USN whether the file of scanning in need, comprising: inspection
Whether scanned by ongoing scanning process corresponding file in the record in the USN is looked into, if it is, described
It records corresponding file not needing to scan, records corresponding file if it is not, then described and need to scan.
When new file operation occurs for the file after scanning, such as: addition is deleted and is modified, and can be given in USN log
With record, modification time and modification content are such as recorded, at this point, can judge to set out by the modification time and modification content
Whether the file after raw new operation is scanned, if be not scanned, subsequent incremental sweep is needed, to prevent from scanning
File occurs to update and lack and scan brought data risk again afterwards.
As more preferably embodiment, the trigger action includes following any: (1) with the trigger action of parameter, institute
Parameter is stated for modifying the scanning log of a preceding scan operation described in the step 2;(2) printenv trigger action, i.e., not
Modify the scanning log of a preceding scan operation described in the step 2;Wherein, previous described in the modification step 2
The Sao Miao log of secondary scan operation refers to the position for modifying the preceding single pass cut-off.Such as: after the completion of scan full hard disk, scanning
What is recorded in log is the position of the last one file of file system, that is, shows that scan full hard disk has been completed, and there is no
The new operation of any file is crossed, i.e., file record also not new in USN log, at this point, when user wishes to do again once entirely
When sweeping is retouched, if when using printenv trigger action, scan full hard disk operation can not execute that (scan full hard disk system can recognize
It has been fully completed, has been returned directly to etc. in the state of trigger action to be received for scan full hard disk);Therefore, it is necessary to use to have
The trigger action of parameter reassigns the initial position of scanning file, i.e., preceding in the parameter amendment step 2 by setting once to sweep
The scan full hard disk again of customization is realized in the scanning log for retouching operation.
The present embodiment passes through two kinds of forms of trigger action, improves the flexibility of trigger action.When trigger action has ginseng
When number, the parameter is the file index by administrator or user setting, a preceding scan operation described in amendment step 2
Log is scanned, realizes the scanning of customization, such as: when needing the file from first of file system or some designated position
When starting to scan the file after it one by one, the position of this file is specified by the way that the parameter is arranged, realizes customization
File scan.
As another aspect of the disclosure, the disclosure also provides a kind of terminal that scan full hard disk function is realized using USN.
Fig. 2 is the hardware structural diagram for illustrating the terminal device according to the embodiment of the present disclosure.Terminal device can come in a variety of manners
Implement, the terminal device in the disclosure can include but is not limited to such as mobile phone, smart phone, laptop, number
Radio receiver, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), navigation device,
The mobile terminal device of vehicle-mounted terminal equipment, vehicle-mounted display terminal, vehicle electronics rearview mirror etc. and such as number TV, desk-top meter
The fixed terminal equipment of calculation machine etc..As shown in Fig. 2, terminal device 1100 may include processor 1120, input unit 1130,
Memory 1140, output unit 1150, etc..Fig. 2 shows the terminal devices with various assemblies, it should be understood that
It is not required for implementing all components shown.More or fewer components can alternatively be implemented.
Wherein, for controller 1120 for executing method disclosed in the disclosure, input unit 1130 can be defeated according to user
The order entered generates key input data with the various operations of controlling terminal equipment, and output unit 1150 is provided output signal.It deposits
Reservoir 1140 can store the software program etc. of the processing and control operation that are executed by processor 1120, or can be temporarily
Store oneself data through exporting or will export.Memory 1140 may include the storage medium of at least one type.Moreover, eventually
End equipment 1100 can cooperate with the network storage device for the store function for executing memory 1140 by network connection.Processor
The overall operation of 1120 usual controlling terminal equipment.
The Applicant declares that the disclosure illustrates the detailed construction feature of the disclosure through the foregoing embodiment, but the disclosure is simultaneously
It is not limited to above-mentioned detailed construction feature, that is, does not mean that the disclosure must rely on above-mentioned detailed construction feature and could implement.Institute
Belong to those skilled in the art it will be clearly understood that any improvement to the disclosure, to the equivalence replacement of component selected by the disclosure
And increase, selection of concrete mode of accessory etc., it all falls within the protection scope and the open scope of the disclosure.
The preferred embodiment of the disclosure is described in detail above, still, during the disclosure is not limited to the above embodiment
Detail a variety of simple variants can be carried out to the technical solution of the disclosure in the range of the technology design of the disclosure, this
A little simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance
In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can
No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally
Disclosed thought equally should be considered as disclosure disclosure of that.
Claims (12)
1. a kind of method for realizing scan full hard disk using renewal sequence USN, is scanned, feature for the file to terminal
It is, the terminal disposition has scan full hard disk system and policy system, execute following step:
Step 1: the scan full hard disk system receives the trigger action being scanned to file system;
Step 2: the scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
Step 3: the position that single pass ends before the scan full hard disk system is found according to the scanning log, described in judgement
Whether position is that the last one file of the file system then goes to step 4 if YES;If NO, then with the position
Next file position as file scan starting point, go to step 5;
Step 4: check in the log of the USN whether the record of scanning in need, if it is, with the USN more new record
Document location be file scan starting point, if it is not, then it is described scanning be fully completed, go to step 1;
Step 5: scan full hard disk system is taken out a document analysis according to the file scan starting point and is restored, the related letter of the file
File after breath and parsing reduction is sent to policy system;
Step 6: the policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains
Scanning result, and update the scanning log;
Step 7: whether the scanning result is hit, if it is, hit results are sent to the scan full hard disk system, and
Go to step 2;If it is not, then going to step 2.
2. the method as described in claim 1, which is characterized in that the scan full hard disk system receives what the policy system returned
As a result, storing the result of the scanning into the log system.
3. the method as described in claim 1, which is characterized in that described to update the scanning log and include:
The index of the File Index Table of Current Scan file is added in the record of the scanning log.
4. the method as described in claim 1, which is characterized in that the scan full hard disk system reception is scanned the file
Trigger action before, further includes:
Step 1.1: user opens scan full hard disk function, and the scan full hard disk system establishes the All Files of terminal document system
Concordance list, the result cache of the index is into the subscriber data file of scan full hard disk system.
5. the method as described in claim 1, which is characterized in that the policy system is to the relevant information of the file and described
Before file after parsing reduction is scanned, comprising:
Step 6.1: policy system described in administrator or user setting configures the period of scanning;
When the time meeting the period of the configuration scanning, triggering scan full hard disk system is scanned the file information;
Or manual mode triggering scan full hard disk system is taken to be scanned the file information.
6. the method as described in claim 1, which is characterized in that the policy system is to the relevant information of the file and described
It includes: scanning for the file-related information that file after parsing reduction, which is scanned, or for parsing reduction
The file content of file afterwards is scanned.
7. the method as described in claim 1, which is characterized in that the policy system comprises at least one of the following policing rule,
And file is scanned with the policing rule:
(1) search strategy rule, the search strategy rule includes the list or data of a series of personnel, equipment or catalogue
Identifier, after relevant information or the parsing to the file for meeting the list or the data identifier restore
File, be scanned;
(2) white list policing rule, the white list policing rule includes a series of list of personnel, equipment or catalogue, right
Meet the relevant information or parsing reduction of the file of the scanning of the list or the data identifier
File afterwards, from scanning.
8. the method for claim 7, which is characterized in that preset some common sensitive contents in the policy system
Data identifier, the data identifier includes: ID card information, business license information, and/or bank's card number, and is provided just
To keyword, reversed keyword, fuzzy keyword and regular expression rule, in order to configuration strategy rule.
9. the method as described in claim 1, which is characterized in that check in the log of the USN whether the text of scanning in need
Part, comprising:
Check whether corresponding file is scanned by ongoing scanning process in the record in the USN, if so,
It is then described to record corresponding file and do not need to scan, it records corresponding file if it is not, then described and needs to scan.
10. the method as described in claim 1, which is characterized in that the trigger action includes following any:
(1) with the trigger action of parameter, the parameter is for modifying the scanning of a preceding scan operation described in the step 2
Log;
(2) printenv trigger action does not modify the scanning log of a preceding scan operation described in the step 2;
Wherein, the scanning log of a preceding scan operation described in the modification step 2 refers to once sweeps before modification is described
Retouch the position of cut-off.
11. a kind of terminal device for realizing scan full hard disk using USN, which is characterized in that the terminal device is deployed with to be swept totally
Retouch system and policy system;
The scan full hard disk system receives the trigger action being scanned to file system;
The scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
The position of single pass cut-off is the file system before the scan full hard disk system is found according to the scanning log
The last one file, check in the log of the USN whether the record of scanning in need, if it is, with USN update
The document location of record is file scan starting point, if it is not, then the scanning is fully completed;
The position of single pass cut-off is not the file system before the scan full hard disk system is found according to the scanning log
The last one file of system, then using the position of next file of the position as file scan starting point, according to the file
Sweep starting point takes out document analysis reduction, and the relevant information of the file and the file after parsing reduction are sent to tactful system
System;
The policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains scanning knot
Fruit, and the scanning log is updated, if the scanning result is hit, hit results are sent to the scan full hard disk system
System.
12. a kind of terminal device for realizing scan full hard disk using USN characterized by comprising processor, memory, the place
Reason device executes the program on the reservoir and realizes such as the described in any item methods of claim 1-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810786552.8A CN109033313B (en) | 2018-07-17 | 2018-07-17 | Method and terminal equipment for realizing full-disk scanning function by using USN |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810786552.8A CN109033313B (en) | 2018-07-17 | 2018-07-17 | Method and terminal equipment for realizing full-disk scanning function by using USN |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109033313A true CN109033313A (en) | 2018-12-18 |
CN109033313B CN109033313B (en) | 2020-09-25 |
Family
ID=64643055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810786552.8A Active CN109033313B (en) | 2018-07-17 | 2018-07-17 | Method and terminal equipment for realizing full-disk scanning function by using USN |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033313B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309683A (en) * | 2020-02-07 | 2020-06-19 | 北京明朝万达科技股份有限公司 | Method and device for scanning full disk data |
CN112528330A (en) * | 2020-12-14 | 2021-03-19 | 建信金融科技有限责任公司 | Log scanning method, device and equipment |
CN112783850A (en) * | 2021-02-09 | 2021-05-11 | 珠海豹趣科技有限公司 | File enumeration method and device based on USN log, electronic equipment and storage medium |
WO2021217652A1 (en) * | 2020-04-30 | 2021-11-04 | 西门子股份公司 | Method and apparatus for controlling mobile storage device, and computer-readable medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105389509A (en) * | 2015-11-16 | 2016-03-09 | 北京奇虎科技有限公司 | Document scanning method and apparatus |
US9465937B1 (en) * | 2008-05-30 | 2016-10-11 | Symantec Corporation | Methods and systems for securely managing file-attribute information for files in a file system |
CN106446707A (en) * | 2016-08-31 | 2017-02-22 | 北京明朝万达科技股份有限公司 | Dynamic data leakage prevention system and method |
CN108009430A (en) * | 2017-12-22 | 2018-05-08 | 北京明朝万达科技股份有限公司 | A kind of sensitive data fast scanning method and device |
CN108052833A (en) * | 2017-12-11 | 2018-05-18 | 北京明朝万达科技股份有限公司 | A kind of executable file anti-data-leakage scan method, system and gateway |
-
2018
- 2018-07-17 CN CN201810786552.8A patent/CN109033313B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9465937B1 (en) * | 2008-05-30 | 2016-10-11 | Symantec Corporation | Methods and systems for securely managing file-attribute information for files in a file system |
CN105389509A (en) * | 2015-11-16 | 2016-03-09 | 北京奇虎科技有限公司 | Document scanning method and apparatus |
CN106446707A (en) * | 2016-08-31 | 2017-02-22 | 北京明朝万达科技股份有限公司 | Dynamic data leakage prevention system and method |
CN108052833A (en) * | 2017-12-11 | 2018-05-18 | 北京明朝万达科技股份有限公司 | A kind of executable file anti-data-leakage scan method, system and gateway |
CN108009430A (en) * | 2017-12-22 | 2018-05-08 | 北京明朝万达科技股份有限公司 | A kind of sensitive data fast scanning method and device |
Non-Patent Citations (1)
Title |
---|
李锁雷等: "《公安内网敏感信息监测系统技术研究》", 《警察技术》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309683A (en) * | 2020-02-07 | 2020-06-19 | 北京明朝万达科技股份有限公司 | Method and device for scanning full disk data |
CN111309683B (en) * | 2020-02-07 | 2023-04-14 | 北京明朝万达科技股份有限公司 | Method and device for scanning full disk data |
WO2021217652A1 (en) * | 2020-04-30 | 2021-11-04 | 西门子股份公司 | Method and apparatus for controlling mobile storage device, and computer-readable medium |
US11880459B2 (en) | 2020-04-30 | 2024-01-23 | Siemens Aktiengesellschaft | Method and apparatus for controlling mobile storage device, and computer-readable medium |
CN112528330A (en) * | 2020-12-14 | 2021-03-19 | 建信金融科技有限责任公司 | Log scanning method, device and equipment |
CN112783850A (en) * | 2021-02-09 | 2021-05-11 | 珠海豹趣科技有限公司 | File enumeration method and device based on USN log, electronic equipment and storage medium |
CN112783850B (en) * | 2021-02-09 | 2023-09-22 | 珠海豹趣科技有限公司 | File enumeration method and device based on USN (universal serial bus) log, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109033313B (en) | 2020-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109033313A (en) | A kind of method and terminal device for realizing scan full hard disk function using USN | |
AU2012216564B2 (en) | Methods and Systems for Increasing the Security of Electronic Messages | |
US7640404B2 (en) | File system write filtering for selectively permitting or preventing data from being written to write-protected storage | |
US20190097807A1 (en) | Network access control based on distributed ledger | |
CN103559231B (en) | A kind of file system quota management method, apparatus and system | |
CN107329741A (en) | A kind of software distribution upgrade method and device based on fingerprint recognition | |
CN107871251A (en) | A kind of input VAT managing bill system and method | |
US20190073271A1 (en) | Device backup and wipe | |
KR20070039067A (en) | Information service system, information server, portable terminal, information service control program and portable terminal control program | |
CN107169726A (en) | The method and apparatus that a kind of Quick Response Code work attendance is checked card | |
CN106503551A (en) | A kind of for the processing method and system of extorting software | |
CN110020382A (en) | Intelligent input method, user equipment, storage medium and the device of information | |
CN107832448A (en) | Database operation method, device and equipment | |
US8503001B2 (en) | Approach for updating usage information on printing devices | |
CN107885859A (en) | A kind of method, apparatus and computer-readable recording medium of file number quota | |
KR100840844B1 (en) | System and its method for searching private information stored in user's terminal | |
US7778660B2 (en) | Mobile communications terminal, information transmitting system and information receiving method | |
CN107704548A (en) | A kind of storage medium and storage method of object data, device and equipment | |
CN112069222A (en) | Enterprise policy query system based on big data | |
CN106993026A (en) | A kind of ftp server increases file detection method for down loading and device newly | |
CA2804465C (en) | Methods and systems for increasing the security of electronic messages | |
KR100550792B1 (en) | Program executing contorol device and method for controlling program execution | |
Ungureanu et al. | A policy-based access control mechanism for the corporate web | |
CN115168684B (en) | Financial archive management method and system | |
CN109086206A (en) | A kind of software detection systems and method, electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |