CN109033313A - A kind of method and terminal device for realizing scan full hard disk function using USN - Google Patents

A kind of method and terminal device for realizing scan full hard disk function using USN Download PDF

Info

Publication number
CN109033313A
CN109033313A CN201810786552.8A CN201810786552A CN109033313A CN 109033313 A CN109033313 A CN 109033313A CN 201810786552 A CN201810786552 A CN 201810786552A CN 109033313 A CN109033313 A CN 109033313A
Authority
CN
China
Prior art keywords
file
scanning
hard disk
scan
full hard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810786552.8A
Other languages
Chinese (zh)
Other versions
CN109033313B (en
Inventor
龚剑
孙加光
喻波
王志海
魏效征
安鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201810786552.8A priority Critical patent/CN109033313B/en
Publication of CN109033313A publication Critical patent/CN109033313A/en
Application granted granted Critical
Publication of CN109033313B publication Critical patent/CN109033313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of methods and terminal device that scan full hard disk function is realized using USN, this method comprises: scan full hard disk system receives the trigger action being scanned to file system;Scanning log corresponding to a preceding scan operation is obtained from log system;According to file scan starting point, document analysis reduction is successively taken out, the relevant information of the file and the file after parsing reduction are sent to policy system;The policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains scanning result, and update the scanning log;If the scanning result is hit, hit results are sent to the scan full hard disk system.The method and terminal device apply renewal sequence USN and policing rule to realize scan full hard disk, improve the safety and flexibility of scan full hard disk.

Description

A kind of method and terminal device for realizing scan full hard disk function using USN
Technical field
The disclosure belongs to computer field, specifically, being a kind of method and end for realizing scan full hard disk function using USN End equipment.
Background technique
In computer application, it is often necessary to be swept to the file in the storage system being made of disk or hard disk Retouch, the most common scanning mode is scan full hard disk, traditional scan full hard disk by enumerating the file in storage system to be scanned, For example first from the root of storage system file is enumerated, and another one sends subsequent scanning engine to after enumerating, and one A or multiple scanning engines obtain a scanning result after scanning file.But this scanning mode more wasteful time, and And consumption system resource.In order to overcome the shortcomings of scan full hard disk, patent WO2017084557A1 proposes a kind of for killing disease The file scanning method of poison, this method realize incremental scan killing disease using the rest position for being incremented by log recording previous scan Poison, to reduce the sweep time of traditional scan full hard disk.
At the same time, the scan full hard disk of either traditional scan full hard disk or incremental manner, what the prior art provided sweeps Usually virus scanning engine is retouched, a scanning result based on existing virus base can only be provided to user, do not accounted for very Multiple enterprises user compares the scanning paid close attention to sensitive information, that is, the strategy scanned can not customize according to the demand of user;Also, In order to guarantee the accuracy of scanning result, it may require that terminal provides the function of online mostly, and this requires to compare to sensitive data High user can also have potential security risk.
In addition, if new file operation, such as addition, deletion or modification file operation occur for the file after scanning When, existing scan full hard disk can not know whether these operations occur after scanning, therefore can omit and do again to these files The operation of secondary scanning also brings along data safety risk.
Summary of the invention
In view of the above-mentioned problems in the prior art is solved, the disclosure is designed to provide a kind of application USN realization The method and terminal device of scan full hard disk function.
Present disclose provides a kind of methods for realizing scan full hard disk using renewal sequence USN, for the file to terminal It is scanned, it is characterised in that the terminal disposition has scan full hard disk system and policy system, executes following step:
Step 1: the scan full hard disk system receives the trigger action being scanned to the file system;
Step 2: the scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
Step 3: the position that single pass ends before the scan full hard disk system is found according to the scanning log, judgement Whether the position is that the last one file of the file system then goes to step 4 if YES;If NO, then with described The position of next file of position goes to step 5 as file scan starting point;
Step 4: check in the log of the USN whether the record of scanning in need, if it is, with USN update The document location of record is file scan starting point, if it is not, then the scanning is fully completed, goes to step 1;
Step 5: scan full hard disk system is taken out a document analysis according to the file scan starting point and is restored, the phase of the file File after closing information and parsing reduction is sent to policy system;
Step 6: the policy system is scanned the file after the relevant information and the parsing reduction of the file, Scanning result is obtained, and updates the scanning log;
Step 7: whether the scanning result is hit, if it is, hit results are sent to the scan full hard disk system System, and go to step 2;If it is not, then going to step 2.
The policy system in the method that the disclosure provides can be configured to the scanning strategy to sensitive information, then can protect Leakage of data (leakage).
In addition, the method that the disclosure provides can be avoided the case where updating file " escape " scanning, and such as: work as scanning After a complete file, the file updates again, at this point, this, which updates file, to be scanned again, thus " escape " Scanning will bring security risk when the content of update belongs to invalid information to system, and the technical side that the disclosure provides Case due to also needing to check the information in USN log, even if by a file it is scanned after updating, but this The information of update can be recorded in USN log, even if therefore update file original document it is scanned after, but as long as it occurs It updates, can also be scanned again, is i.e. realization incremental sweep, to effectively avoid above-mentioned security risk.
Based on the above technical solution, further, the scan full hard disk system receives the policy system and returns As a result, storing the result of the scanning into the log system.
Based on the above technical solution, further, described to update the scanning log and include:
The position of Current Scan file is added in the record of the scanning log.
Based on the above technical solution, further, the file is swept in the scan full hard disk system reception Before the trigger action retouched, further includes:
Step 1.1: user opens scan full hard disk function, All Files of the scan full hard disk system to terminal document system Concordance list is established, the result cache of the index is into the subscriber data file of scan full hard disk system.
Based on the above technical solution, further, the position includes the index of File Index Table.
Based on the above technical solution, further, relevant information and institute of the policy system to the file Before file after stating parsing reduction is scanned, comprising:
Step 6.1: policy system described in administrator or user setting configures the period of scanning.
Based on the above technical solution, further, when the time meeting the period of the configuration scanning, triggering Scan full hard disk system is scanned the file information;Or take manual mode triggering scan full hard disk system to the file Information is scanned.
Based on the above technical solution, further, the relevant information of the file includes at least following a kind of: (1) storage location, (2) name, (3) author, (4) size, (5) type.
Based on the above technical solution, further, relevant information and institute of the policy system to the file It includes: scanning for the file-related information that file after stating parsing reduction, which is scanned, or also for the parsing The file content of file after original is scanned.
Based on the above technical solution, further, the policy system comprises at least one of the following policing rule, And file is scanned with the policing rule:
(1) search strategy, the search strategy include the list or Data Identification of a series of personnel, equipment or catalogue Symbol, the text after relevant information or the parsing reduction to the file for meeting the list or the data identifier Part is scanned;
(2) white list strategy, the white list strategy include the list or data of a series of personnel, equipment or catalogue Identifier, the relevant information or described to the file for the scanning for meeting the list or the data identifier File after parsing reduction, from scanning.
Based on the above technical solution, further, some common sensitive contents are preset in the policy system Data identifier, the data identifier includes: ID card information, business license information, and/or bank's card number, and is provided Positive keyword, reversed keyword, fuzzy keyword and regular expression rule, in order to configuration strategy rule.
Based on the above technical solution, further, it when the scan full hard disk system receives hit results, executes Comprise at least one of the following special operation:
(1) pop-up is reminded at the terminal;(2) it sends and reminds mail.
Based on the above technical solution, further, check in the log of the USN whether the text of scanning in need Part, comprising:
Check whether corresponding file is scanned by ongoing scanning process in the record in the USN, such as Fruit is, then described to record corresponding file and do not need to scan, and records corresponding file if it is not, then described and needs to scan.
When new file operation occurs for the file after scanning, such as: addition is deleted and is modified, and can be given in USN log With record, modification time and modification content are such as recorded, at this point, can judge to set out by the modification time and modification content Whether the file after raw new operation is scanned, if be not scanned, subsequent incremental sweep is needed, to prevent from scanning File occurs to update and lack and scan brought data risk again afterwards.
Based on the above technical solution, further, the trigger action includes following any:
(1) with the trigger action of parameter, the parameter is for modifying a preceding scan operation described in the step 2 Scan log;
(2) printenv trigger action does not modify the scanning log of a preceding scan operation described in the step 2;
Wherein, the scanning log of a preceding scan operation described in the modification step 2 refers to that modification is described previous The position of secondary scanning cut-off.
By two kinds of forms of trigger action, the flexibility of trigger action is improved.It is described when trigger action has parameter Parameter is the file index by administrator or user setting, the scanning log of a preceding scan operation described in amendment step 2, Realize customize scanning, such as: when need since first of file system or the file of some designated position to it When file later scans one by one, the position of this file is specified by the way that the parameter is arranged, realizes the file scan of customization.
On the other hand, the disclosure additionally provides a kind of terminal device that scan full hard disk is realized using USN, it is characterised in that packet Include: processor, memory, the processor execute the program on the reservoir and realize that above-mentioned application USN realizes scan full hard disk The method of function.
Compared with prior art, the disclosure is at least had the advantages that
To obtain following at least one technical effects:
(1) NTFS (the New Technology due to the technical solution of the disclosure since Windows operating system is utilized File System, New Technology File System) file system USN (Update Service Number Journal or Change Journal, renewal sequence number) interface, quickly the All Files resume inside disk to be scanned is indexed, and utilizes The characteristic of USN can know the change of file system in time, to realize the function of a more efficiently incremental sweep;
(2) technical solution of the disclosure can own control due to the provision of a policy system, system manager Terminal issues a group policy, and terminal user cannot stop such strategy, while also provide customized for terminal user Some policing rules for sensitive information to scanning engine, scanning engine can be according to one user file system of strategy generating Map, sensitive document is filed, thus formed be directed to each user file system sensitive information map;
(3) data identifier of the technical solution of the disclosure due to also having preset some common sensitive contents, such as body Part card information, business license information, bank's card number etc., and provide positive keyword, reversed keyword, fuzzy keyword and Regular expression rule, facilitates administrator or user configuration sensitive information policing rule;
(4) scanning result not only can be prompted to user by the technical solution of the disclosure, can also be to the sensitivity scanned The more user of information sends to system manager or relevant administrative staff and reminds mail, improves safety;
(5) technical solution of the disclosure can be used as scan full hard disk engine, provide some interfaces used for other application, than If the USB flash disk in terminal D LP system manages function, printing control function etc., the scanning demand of entire terminal D LP can be serviced.
Detailed description of the invention
Fig. 1 is the flow diagram for realizing the method for scan full hard disk function described in the disclosure using USN.
Fig. 2 is the schematically structural schematic diagram for realizing the terminal of scan full hard disk function described in the disclosure using USN.
The disclosure is further described below.But following examples is intended merely to facilitate the technology for understanding the disclosure Scheme, cited simple example do not represent or limit the scope of protection of the claims of the disclosure, the protection model of the disclosure It encloses and is subject to claims.
Specific embodiment
Further illustrate the technical solution of the disclosure below with reference to the accompanying drawings and specific embodiments.
For the disclosure is better described, be easy to understand the technical solution of the disclosure, the disclosure it is typical but non-limiting Embodiment is as follows: it is necessary to be noted that embodiment listed by present disclosure specification is merely to describe the problem conveniently And the illustrative embodiment provided, it must not be not understood as the disclosure uniquely correct embodiment, must not be more not understood as To the restricted explanation of disclosure protection scope.
As shown in Figure 1, for one specific embodiment of method for realizing scan full hard disk function described in the disclosure using USN Flow diagram, its step are as follows:
It is scanned for the file to terminal, it is characterised in that the terminal disposition has scan full hard disk system and strategy system System executes following step:
S1: the scan full hard disk system receives the trigger action being scanned to the file system;
S2: the scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
S3: the position that single pass ends before the scan full hard disk system is found according to the scanning log judges institute Whether it is that the last one file of the file system then turns S4 if YES that rheme is set;If NO, then S5 is executed, with institute Sweep starting point of the position for next file that rheme is set as file, then turns S7;
S4: check in the log of the USN whether the file of scanning in need, if not, showing the file system All Files all scan through, and turn S1, wait new scanning trigger command;If it is, executing S6, is updated and remembered with the USN The document location of record is file scan starting point, then turns S7;
S7: scan full hard disk system is taken out a document analysis according to the file scan starting point and is restored, the correlation of the file File after information and parsing reduction is sent to policy system;
S8: the policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains To scanning result, and update the scanning log;
S9: whether the scanning result is hit, if it is, executing S10, hit results is sent to and described are swept totally System is retouched, S2 is then turned;If it is not, then going to step 2.
As more preferably embodiment, the policy system can be configured to the scanning strategy to sensitive information, then can protect number According to divulge a secret (leakage).
The present embodiment can be avoided the case where updating file " escape " scanning, such as: it is described after scanning through a file File updates again, at this point, this, which updates file, to be scanned again, so that " escape " scan operation, works as update Content when belonging to invalid information, security risk will be brought to system, and the present embodiment is due to also needing to check in USN log Information, therefore, though by a file it is scanned after updating, but information of this update can be recorded in USN days In will, even if therefore update file original document it is scanned after, but as long as it is updated, can also be scanned again, i.e., It realizes incremental sweep, effectively avoids above-mentioned security risk.
As more preferably embodiment, the policy system comprises at least one of the following policing rule, and with the strategy rule Then be scanned to file: (1) search strategy rule, the search strategy includes a series of name of personnel, equipment or catalogue Single, the file after relevant information or the parsing reduction to the file for meeting the list is scanned;(2) white List policing rule, the white list strategy include a series of list of personnel, equipment or catalogue, to meeting the list File after the relevant information of the file of the scanning or the parsing reduction, from scanning.Pass through different strategies Rule realizes different scanning modes, to meet the scanning application demand of different user.
As more preferably embodiment, the data identifier of some common sensitive contents, institute are preset in the policy system Stating data identifier includes: ID card information, business license information, and/or bank's card number, and provides positive keyword, reversed Keyword, fuzzy keyword and regular expression rule, in order to configuration strategy rule.
As more preferably embodiment, in the log for checking the USN whether the file of scanning in need, comprising: inspection Whether scanned by ongoing scanning process corresponding file in the record in the USN is looked into, if it is, described It records corresponding file not needing to scan, records corresponding file if it is not, then described and need to scan.
When new file operation occurs for the file after scanning, such as: addition is deleted and is modified, and can be given in USN log With record, modification time and modification content are such as recorded, at this point, can judge to set out by the modification time and modification content Whether the file after raw new operation is scanned, if be not scanned, subsequent incremental sweep is needed, to prevent from scanning File occurs to update and lack and scan brought data risk again afterwards.
As more preferably embodiment, the trigger action includes following any: (1) with the trigger action of parameter, institute Parameter is stated for modifying the scanning log of a preceding scan operation described in the step 2;(2) printenv trigger action, i.e., not Modify the scanning log of a preceding scan operation described in the step 2;Wherein, previous described in the modification step 2 The Sao Miao log of secondary scan operation refers to the position for modifying the preceding single pass cut-off.Such as: after the completion of scan full hard disk, scanning What is recorded in log is the position of the last one file of file system, that is, shows that scan full hard disk has been completed, and there is no The new operation of any file is crossed, i.e., file record also not new in USN log, at this point, when user wishes to do again once entirely When sweeping is retouched, if when using printenv trigger action, scan full hard disk operation can not execute that (scan full hard disk system can recognize It has been fully completed, has been returned directly to etc. in the state of trigger action to be received for scan full hard disk);Therefore, it is necessary to use to have The trigger action of parameter reassigns the initial position of scanning file, i.e., preceding in the parameter amendment step 2 by setting once to sweep The scan full hard disk again of customization is realized in the scanning log for retouching operation.
The present embodiment passes through two kinds of forms of trigger action, improves the flexibility of trigger action.When trigger action has ginseng When number, the parameter is the file index by administrator or user setting, a preceding scan operation described in amendment step 2 Log is scanned, realizes the scanning of customization, such as: when needing the file from first of file system or some designated position When starting to scan the file after it one by one, the position of this file is specified by the way that the parameter is arranged, realizes customization File scan.
As another aspect of the disclosure, the disclosure also provides a kind of terminal that scan full hard disk function is realized using USN. Fig. 2 is the hardware structural diagram for illustrating the terminal device according to the embodiment of the present disclosure.Terminal device can come in a variety of manners Implement, the terminal device in the disclosure can include but is not limited to such as mobile phone, smart phone, laptop, number Radio receiver, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), navigation device, The mobile terminal device of vehicle-mounted terminal equipment, vehicle-mounted display terminal, vehicle electronics rearview mirror etc. and such as number TV, desk-top meter The fixed terminal equipment of calculation machine etc..As shown in Fig. 2, terminal device 1100 may include processor 1120, input unit 1130, Memory 1140, output unit 1150, etc..Fig. 2 shows the terminal devices with various assemblies, it should be understood that It is not required for implementing all components shown.More or fewer components can alternatively be implemented.
Wherein, for controller 1120 for executing method disclosed in the disclosure, input unit 1130 can be defeated according to user The order entered generates key input data with the various operations of controlling terminal equipment, and output unit 1150 is provided output signal.It deposits Reservoir 1140 can store the software program etc. of the processing and control operation that are executed by processor 1120, or can be temporarily Store oneself data through exporting or will export.Memory 1140 may include the storage medium of at least one type.Moreover, eventually End equipment 1100 can cooperate with the network storage device for the store function for executing memory 1140 by network connection.Processor The overall operation of 1120 usual controlling terminal equipment.
The Applicant declares that the disclosure illustrates the detailed construction feature of the disclosure through the foregoing embodiment, but the disclosure is simultaneously It is not limited to above-mentioned detailed construction feature, that is, does not mean that the disclosure must rely on above-mentioned detailed construction feature and could implement.Institute Belong to those skilled in the art it will be clearly understood that any improvement to the disclosure, to the equivalence replacement of component selected by the disclosure And increase, selection of concrete mode of accessory etc., it all falls within the protection scope and the open scope of the disclosure.
The preferred embodiment of the disclosure is described in detail above, still, during the disclosure is not limited to the above embodiment Detail a variety of simple variants can be carried out to the technical solution of the disclosure in the range of the technology design of the disclosure, this A little simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (12)

1. a kind of method for realizing scan full hard disk using renewal sequence USN, is scanned, feature for the file to terminal It is, the terminal disposition has scan full hard disk system and policy system, execute following step:
Step 1: the scan full hard disk system receives the trigger action being scanned to file system;
Step 2: the scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
Step 3: the position that single pass ends before the scan full hard disk system is found according to the scanning log, described in judgement Whether position is that the last one file of the file system then goes to step 4 if YES;If NO, then with the position Next file position as file scan starting point, go to step 5;
Step 4: check in the log of the USN whether the record of scanning in need, if it is, with the USN more new record Document location be file scan starting point, if it is not, then it is described scanning be fully completed, go to step 1;
Step 5: scan full hard disk system is taken out a document analysis according to the file scan starting point and is restored, the related letter of the file File after breath and parsing reduction is sent to policy system;
Step 6: the policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains Scanning result, and update the scanning log;
Step 7: whether the scanning result is hit, if it is, hit results are sent to the scan full hard disk system, and Go to step 2;If it is not, then going to step 2.
2. the method as described in claim 1, which is characterized in that the scan full hard disk system receives what the policy system returned As a result, storing the result of the scanning into the log system.
3. the method as described in claim 1, which is characterized in that described to update the scanning log and include:
The index of the File Index Table of Current Scan file is added in the record of the scanning log.
4. the method as described in claim 1, which is characterized in that the scan full hard disk system reception is scanned the file Trigger action before, further includes:
Step 1.1: user opens scan full hard disk function, and the scan full hard disk system establishes the All Files of terminal document system Concordance list, the result cache of the index is into the subscriber data file of scan full hard disk system.
5. the method as described in claim 1, which is characterized in that the policy system is to the relevant information of the file and described Before file after parsing reduction is scanned, comprising:
Step 6.1: policy system described in administrator or user setting configures the period of scanning;
When the time meeting the period of the configuration scanning, triggering scan full hard disk system is scanned the file information; Or manual mode triggering scan full hard disk system is taken to be scanned the file information.
6. the method as described in claim 1, which is characterized in that the policy system is to the relevant information of the file and described It includes: scanning for the file-related information that file after parsing reduction, which is scanned, or for parsing reduction The file content of file afterwards is scanned.
7. the method as described in claim 1, which is characterized in that the policy system comprises at least one of the following policing rule, And file is scanned with the policing rule:
(1) search strategy rule, the search strategy rule includes the list or data of a series of personnel, equipment or catalogue Identifier, after relevant information or the parsing to the file for meeting the list or the data identifier restore File, be scanned;
(2) white list policing rule, the white list policing rule includes a series of list of personnel, equipment or catalogue, right Meet the relevant information or parsing reduction of the file of the scanning of the list or the data identifier File afterwards, from scanning.
8. the method for claim 7, which is characterized in that preset some common sensitive contents in the policy system Data identifier, the data identifier includes: ID card information, business license information, and/or bank's card number, and is provided just To keyword, reversed keyword, fuzzy keyword and regular expression rule, in order to configuration strategy rule.
9. the method as described in claim 1, which is characterized in that check in the log of the USN whether the text of scanning in need Part, comprising:
Check whether corresponding file is scanned by ongoing scanning process in the record in the USN, if so, It is then described to record corresponding file and do not need to scan, it records corresponding file if it is not, then described and needs to scan.
10. the method as described in claim 1, which is characterized in that the trigger action includes following any:
(1) with the trigger action of parameter, the parameter is for modifying the scanning of a preceding scan operation described in the step 2 Log;
(2) printenv trigger action does not modify the scanning log of a preceding scan operation described in the step 2;
Wherein, the scanning log of a preceding scan operation described in the modification step 2 refers to once sweeps before modification is described Retouch the position of cut-off.
11. a kind of terminal device for realizing scan full hard disk using USN, which is characterized in that the terminal device is deployed with to be swept totally Retouch system and policy system;
The scan full hard disk system receives the trigger action being scanned to file system;
The scan full hard disk system obtains scanning log corresponding to a preceding scan operation from log system;
The position of single pass cut-off is the file system before the scan full hard disk system is found according to the scanning log The last one file, check in the log of the USN whether the record of scanning in need, if it is, with USN update The document location of record is file scan starting point, if it is not, then the scanning is fully completed;
The position of single pass cut-off is not the file system before the scan full hard disk system is found according to the scanning log The last one file of system, then using the position of next file of the position as file scan starting point, according to the file Sweep starting point takes out document analysis reduction, and the relevant information of the file and the file after parsing reduction are sent to tactful system System;
The policy system is scanned the file after the relevant information and the parsing reduction of the file, obtains scanning knot Fruit, and the scanning log is updated, if the scanning result is hit, hit results are sent to the scan full hard disk system System.
12. a kind of terminal device for realizing scan full hard disk using USN characterized by comprising processor, memory, the place Reason device executes the program on the reservoir and realizes such as the described in any item methods of claim 1-10.
CN201810786552.8A 2018-07-17 2018-07-17 Method and terminal equipment for realizing full-disk scanning function by using USN Active CN109033313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810786552.8A CN109033313B (en) 2018-07-17 2018-07-17 Method and terminal equipment for realizing full-disk scanning function by using USN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810786552.8A CN109033313B (en) 2018-07-17 2018-07-17 Method and terminal equipment for realizing full-disk scanning function by using USN

Publications (2)

Publication Number Publication Date
CN109033313A true CN109033313A (en) 2018-12-18
CN109033313B CN109033313B (en) 2020-09-25

Family

ID=64643055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810786552.8A Active CN109033313B (en) 2018-07-17 2018-07-17 Method and terminal equipment for realizing full-disk scanning function by using USN

Country Status (1)

Country Link
CN (1) CN109033313B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309683A (en) * 2020-02-07 2020-06-19 北京明朝万达科技股份有限公司 Method and device for scanning full disk data
CN112528330A (en) * 2020-12-14 2021-03-19 建信金融科技有限责任公司 Log scanning method, device and equipment
CN112783850A (en) * 2021-02-09 2021-05-11 珠海豹趣科技有限公司 File enumeration method and device based on USN log, electronic equipment and storage medium
WO2021217652A1 (en) * 2020-04-30 2021-11-04 西门子股份公司 Method and apparatus for controlling mobile storage device, and computer-readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105389509A (en) * 2015-11-16 2016-03-09 北京奇虎科技有限公司 Document scanning method and apparatus
US9465937B1 (en) * 2008-05-30 2016-10-11 Symantec Corporation Methods and systems for securely managing file-attribute information for files in a file system
CN106446707A (en) * 2016-08-31 2017-02-22 北京明朝万达科技股份有限公司 Dynamic data leakage prevention system and method
CN108009430A (en) * 2017-12-22 2018-05-08 北京明朝万达科技股份有限公司 A kind of sensitive data fast scanning method and device
CN108052833A (en) * 2017-12-11 2018-05-18 北京明朝万达科技股份有限公司 A kind of executable file anti-data-leakage scan method, system and gateway

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9465937B1 (en) * 2008-05-30 2016-10-11 Symantec Corporation Methods and systems for securely managing file-attribute information for files in a file system
CN105389509A (en) * 2015-11-16 2016-03-09 北京奇虎科技有限公司 Document scanning method and apparatus
CN106446707A (en) * 2016-08-31 2017-02-22 北京明朝万达科技股份有限公司 Dynamic data leakage prevention system and method
CN108052833A (en) * 2017-12-11 2018-05-18 北京明朝万达科技股份有限公司 A kind of executable file anti-data-leakage scan method, system and gateway
CN108009430A (en) * 2017-12-22 2018-05-08 北京明朝万达科技股份有限公司 A kind of sensitive data fast scanning method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李锁雷等: "《公安内网敏感信息监测系统技术研究》", 《警察技术》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309683A (en) * 2020-02-07 2020-06-19 北京明朝万达科技股份有限公司 Method and device for scanning full disk data
CN111309683B (en) * 2020-02-07 2023-04-14 北京明朝万达科技股份有限公司 Method and device for scanning full disk data
WO2021217652A1 (en) * 2020-04-30 2021-11-04 西门子股份公司 Method and apparatus for controlling mobile storage device, and computer-readable medium
US11880459B2 (en) 2020-04-30 2024-01-23 Siemens Aktiengesellschaft Method and apparatus for controlling mobile storage device, and computer-readable medium
CN112528330A (en) * 2020-12-14 2021-03-19 建信金融科技有限责任公司 Log scanning method, device and equipment
CN112783850A (en) * 2021-02-09 2021-05-11 珠海豹趣科技有限公司 File enumeration method and device based on USN log, electronic equipment and storage medium
CN112783850B (en) * 2021-02-09 2023-09-22 珠海豹趣科技有限公司 File enumeration method and device based on USN (universal serial bus) log, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109033313B (en) 2020-09-25

Similar Documents

Publication Publication Date Title
CN109033313A (en) A kind of method and terminal device for realizing scan full hard disk function using USN
AU2012216564B2 (en) Methods and Systems for Increasing the Security of Electronic Messages
US7640404B2 (en) File system write filtering for selectively permitting or preventing data from being written to write-protected storage
US20190097807A1 (en) Network access control based on distributed ledger
CN103559231B (en) A kind of file system quota management method, apparatus and system
CN107329741A (en) A kind of software distribution upgrade method and device based on fingerprint recognition
CN107871251A (en) A kind of input VAT managing bill system and method
US20190073271A1 (en) Device backup and wipe
KR20070039067A (en) Information service system, information server, portable terminal, information service control program and portable terminal control program
CN107169726A (en) The method and apparatus that a kind of Quick Response Code work attendance is checked card
CN106503551A (en) A kind of for the processing method and system of extorting software
CN110020382A (en) Intelligent input method, user equipment, storage medium and the device of information
CN107832448A (en) Database operation method, device and equipment
US8503001B2 (en) Approach for updating usage information on printing devices
CN107885859A (en) A kind of method, apparatus and computer-readable recording medium of file number quota
KR100840844B1 (en) System and its method for searching private information stored in user's terminal
US7778660B2 (en) Mobile communications terminal, information transmitting system and information receiving method
CN107704548A (en) A kind of storage medium and storage method of object data, device and equipment
CN112069222A (en) Enterprise policy query system based on big data
CN106993026A (en) A kind of ftp server increases file detection method for down loading and device newly
CA2804465C (en) Methods and systems for increasing the security of electronic messages
KR100550792B1 (en) Program executing contorol device and method for controlling program execution
Ungureanu et al. A policy-based access control mechanism for the corporate web
CN115168684B (en) Financial archive management method and system
CN109086206A (en) A kind of software detection systems and method, electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant