CN115664859B - Data security analysis method, device, equipment and medium based on cloud printing scene - Google Patents

Data security analysis method, device, equipment and medium based on cloud printing scene Download PDF

Info

Publication number
CN115664859B
CN115664859B CN202211672349.0A CN202211672349A CN115664859B CN 115664859 B CN115664859 B CN 115664859B CN 202211672349 A CN202211672349 A CN 202211672349A CN 115664859 B CN115664859 B CN 115664859B
Authority
CN
China
Prior art keywords
data
security
printing
cloud
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211672349.0A
Other languages
Chinese (zh)
Other versions
CN115664859A (en
Inventor
吴小平
吴茂林
陈维江
张明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lianke Network Technology Co ltd
Original Assignee
Shenzhen Lianke Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lianke Network Technology Co ltd filed Critical Shenzhen Lianke Network Technology Co ltd
Priority to CN202211672349.0A priority Critical patent/CN115664859B/en
Publication of CN115664859A publication Critical patent/CN115664859A/en
Application granted granted Critical
Publication of CN115664859B publication Critical patent/CN115664859B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to the field of cloud security, and discloses a data security analysis method and device based on a cloud printing scene, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving user login information in a cloud printing scene, configuring user address data, inquiring data to be printed, performing data transcoding processing on the data to be printed, and constructing a data interaction path; the transcoding data are transmitted to a cloud printing server, data safety verification is carried out on the transcoding data, and printing control data of the transcoding data are constructed when the verification is successful; configuring a safety isolation channel, identifying safety control data and non-safety control data, and performing data blocking on the non-safety control data to obtain a non-safety data blocking result; transmitting the safety control data to a cloud printing controller, performing non-safety matching on the safety control data to obtain a non-safety matching result, and configuring the non-safety level; and determining a data security analysis result in a cloud printing scene. The invention can improve the safety protection of cloud printing.

Description

Data security analysis method, device, equipment and medium based on cloud printing scene
Technical Field
The invention relates to the field of cloud security, in particular to a data security analysis method and device based on a cloud printing scene, electronic equipment and a storage medium.
Background
Data security analysis based on a cloud printing scene refers to a process of checking, analyzing and confirming security risks such as vulnerability and data leakage in cloud printing service, so as to protect security of user printing data.
At present, the cloud printing mainly adopts a data encryption technology to ensure the reliable delivery of a printing job to the cloud printer, but the method does not relate to the aspect of examining whether the printing content violates rules; some cloud printing systems need to upload a printed document to a foreign cloud server through the Internet, and besides the open architecture using public cloud is vulnerable, the cloud printing systems also have a great privacy problem; other cloud printing tracks the execution of a print job through a logging system, but is not concerned with unauthorized access to the print data. Therefore, the security analysis on the connection aspect among all printing nodes in a whole set of flow under the cloud printing scene is insufficient, so that the security protection under the cloud printing scene is insufficient.
Disclosure of Invention
In order to solve the above problems, the invention provides a data security analysis method, device, electronic device and storage medium based on a cloud printing scene, which can increase security analysis on the connection aspect between all printing nodes in a whole set of processes in the cloud printing scene and improve security protection in the cloud printing scene.
In a first aspect, the present invention provides a data security analysis method based on a cloud print scenario, including:
receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, performing data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interaction path of the transcoded data according to the user address data;
according to the data interaction path, the transcoded data are transmitted to a cloud printing server under the cloud printing scene, data security verification is conducted on the transcoded data in the cloud printing server, and when the data security verification of the transcoded data is successful, printing control data of the transcoded data are constructed;
configuring a safety isolation channel of the printing control data, identifying safety control data and non-safety control data in the printing control data according to the safety isolation channel, and performing data blocking on the non-safety control data to obtain a non-safety data blocking result of the data to be printed;
according to the security isolation channel, the security control data are transmitted to a cloud printing controller in the cloud printing scene, the security control data are subjected to non-security matching in the cloud printing controller to obtain a non-security matching result, and the non-security level of the non-security matching result is configured;
and determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
In a possible implementation manner of the first aspect, the configuring, according to the user login information, user address data of the cloud print scenario includes:
configuring an address switching channel of the cloud printing scene according to the user login information;
inquiring a user address corresponding to the user login information according to the address switching channel;
and configuring user address data of the cloud printing scene according to the user address.
In a possible implementation manner of the first aspect, the transcoding the data to be printed to obtain transcoded data includes:
identifying the data type of the data to be printed, and constructing a data transcoding condition of the data to be printed according to the data type;
inquiring data attributes corresponding to the data types, and configuring the data transcoding direction of the data to be printed according to the data attributes;
identifying the data transcoding form of the data to be printed according to the data transcoding direction and the data transcoding condition;
and determining the transcoding data of the data to be printed according to the data transcoding form.
In a possible implementation manner of the first aspect, the constructing a data interaction path of the transcoded data according to the user address data includes:
configuring message broadcasting of the transcoding data according to the user address data;
determining response address data of the user address data according to the message broadcast;
and configuring a data interaction path of the transcoding data according to the response address data and the user address data.
In a possible implementation manner of the first aspect, the performing, in the cloud print server, a data security check on the transcoded data includes:
extracting printing parameters in the transcoded data;
identifying a parameter category for the printing parameter;
inquiring a printing rule of the transcoded data according to the parameter type;
safely matching the transcoding data with the printing rule;
when the safety matching of the transcoded data and the printing rule is successful, determining that the data safety verification of the transcoded data is successful;
and when the safety matching of the transcoded data and the printing rule fails, determining that the data safety verification of the transcoded data fails.
In a possible implementation manner of the first aspect, the performing data blocking on the non-secure control data to obtain a non-secure data blocking result of the data to be printed includes:
removing the non-safety data to obtain removed data;
calculating the removal amount of the removal data by using the following formula:
Figure DEST_PATH_IMAGE001
wherein B represents the removal number, H represents the frequency of calculating the removal number, B represents the number of bits bit,
Figure 418691DEST_PATH_IMAGE002
indicating a number of channels blocking the non-secure data;
and determining the non-secure data blocking result of the data to be printed according to the removal data and the removal quantity.
In a possible implementation manner of the first aspect, the performing, in the cloud print controller, an insecure matching on the secure control data to obtain an insecure matching result includes:
performing word segmentation processing on the safety control data to obtain word segmentation control data;
checking whether sensitive participles exist in the participle control data by utilizing a dictionary tree algorithm;
when no sensitive word segmentation exists in the safety control data, determining that the non-safety matching result is matching failure;
when sensitive participles exist in the safety control data, carrying out sensitive classification processing on the sensitive participles to obtain sensitive categories of the sensitive participles;
and determining the non-safety matching result as successful matching according to the sensitive category.
In a second aspect, the present invention provides a data security analysis apparatus based on a cloud print scenario, where the apparatus includes:
the interactive path construction module is used for receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, carrying out data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interactive path of the transcoded data according to the user address data;
the control data construction module is used for transmitting the transcoded data to a cloud printing server under the cloud printing scene according to the data interaction path, carrying out data security verification on the transcoded data in the cloud printing server, and constructing printing control data of the transcoded data when the data security verification on the transcoded data is successful;
the control data blocking module is used for configuring a security isolation channel of the printing control data, identifying security control data and non-security control data in the printing control data according to the security isolation channel, and performing data blocking on the non-security control data to obtain a non-security data blocking result of the data to be printed;
the security level configuration module is used for transmitting the security control data to a cloud printing controller under the cloud printing scene according to the security isolation channel, performing non-security matching on the security control data in the cloud printing controller to obtain a non-security matching result, and configuring the non-security level of the non-security matching result;
and the analysis result determining module is used for determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
In a third aspect, the present invention provides an electronic device comprising:
at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the method for data security analysis in a cloud-based printing scenario as defined in any one of the above first aspects.
In a fourth aspect, the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method for data security analysis based on a cloud printing scenario as described in any one of the first aspects.
Compared with the prior art, the technical principle and the beneficial effects of the scheme are as follows:
the embodiment of the invention firstly receives user login information in a cloud printing scene to timely respond to a printing request of a user and convert a printing system in a dormant state into a printing system in a safety protection state, and further, the embodiment of the invention configures user address data in the cloud printing scene according to the user login information to be used for taking the user address data as an identifier of a file to be printed received by a subsequent printer, further, the embodiment of the invention inquires data to be printed in the cloud printing scene to be used for applying the data to be printed to an actual printing scene, carries out data safety analysis of cloud printing according to the printing condition in each process in an application process, ensures the relevance between each data safety analysis link, and further carries out data transcoding treatment on the data to be printed, further, the embodiment of the present invention transmits the transcoded data to a cloud print server under the cloud printing scene according to the data interaction path, so as to perform security check and analysis on the user and the print content thereof in the cloud print server, thereby ensuring protection of the original data stored in the server, and further, the embodiment of the present invention ensures protection of the original data stored in the server by, in the cloud print server, the method comprises the steps of carrying out data security check on the transcoded data to check whether the transcoded data carries risks or not to ensure data security analysis on data to be printed uploaded by a user, further, configuring a security isolation channel of the print control data to be used for randomly transmitting and reducing data between a server and a printer to be transmitted in a designated channel by using the security isolation channel, diagnosing the data with risks by using the channel, and reducing the risk of network attack on the printer and the server, further, identifying security control data and non-security control data in the print control data by using the security isolation channel to carry out security analysis on the print control data, identifying the risk data in the print control data and ensuring the data security of the printer, further, carrying out data blocking on the non-security control data to be used for blocking the data with risks, increasing refinement of a process in data security protection, further, verifying whether the print control data is matched with a cloud control server by using a cloud controller according to security isolation channel, and verifying whether the print control data is matched with a cloud controller in a cloud control environment, and further verifying whether the print control data is matched with the security control data by using the cloud controller, the method and the device for processing the data safety protection in the cloud printing scene have the advantages that the risk of the content in the printing data is checked, the safety protection comprehensiveness is improved, furthermore, the non-safety grade of the non-safety matching result is configured to be used for determining the danger degree of the data received by the current cloud printing controller, and corresponding data safety protection is conducted according to network risks in different grades. Therefore, the data security analysis method, the data security analysis device, the electronic device and the storage medium based on the cloud printing scene provided by the embodiment of the invention can increase security analysis on the connection among all printing nodes in a whole set of processes in the cloud printing scene, and improve security protection in the cloud printing scene.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a data security analysis method based on a cloud print scenario according to an embodiment of the present invention;
fig. 2 is a schematic flowchart illustrating a step of the data security analysis method based on a cloud print scenario in the embodiment of the present invention, which is provided in fig. 1;
fig. 3 is a schematic flowchart illustrating another step of the data security analysis method based on a cloud print scenario in the embodiment of the present invention, which is provided in fig. 1;
fig. 4 is a schematic block diagram of a data security analysis apparatus based on a cloud print scenario according to an embodiment of the present invention;
fig. 5 is a schematic view of an internal structure of an electronic device for implementing a data security analysis method based on a cloud print scenario according to an embodiment of the present invention.
Detailed Description
It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are given by way of illustration only.
The embodiment of the invention provides a data security analysis method based on a cloud printing scene, and an execution subject of the data security analysis method based on the cloud printing scene comprises but is not limited to at least one of electronic equipment such as a server and a terminal which can be configured to execute the method provided by the embodiment of the invention. In other words, the data security analysis method in the cloud-based printing scenario may be executed by software or hardware installed in the terminal device or the server device, and the software may be a blockchain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and artificial intelligence platform, and the like.
Fig. 1 is a schematic flow chart of a data security analysis method based on a cloud print scene according to an embodiment of the present invention. The data security analysis method based on the cloud printing scene described in fig. 1 includes:
the method includes the steps of S1, receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, carrying out data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interaction path of the transcoded data according to the user address data.
The embodiment of the invention is used for responding the printing request of the user in time by receiving the user login information in the cloud printing scene, and converting the printing system in the dormant state into the printing system in the safety protection state. The cloud printing scene refers to a scene where a user logs in the cloud printing system to apply for printing, wherein the scene comprises a user side, a server side and a printer side for controlling printing. The user login information refers to authentication information input by a user logging in the cloud printing system.
Further, the embodiment of the present invention configures the user address data of the cloud printing scenario according to the user login information, so that the user address data is used as an identifier of a file to be printed received by a subsequent printer. The user address data refers to data such as an IP address and an MAC address when a user logs in the cloud printing system.
In an embodiment of the present invention, referring to fig. 1, the configuring, according to the user login information, user address data of the cloud print scenario includes:
s201, configuring an address switching channel of the cloud printing scene according to the user login information;
s202, inquiring a user address corresponding to the user login information according to the address switching channel;
s203, configuring user address data of the cloud printing scene according to the user address.
Optionally, the address forwarding channel configuring the cloud printing scenario may be implemented by httpservletrequest.
Further, the data to be printed in the cloud printing scene is inquired to be used for applying the data to be printed to the actual printing scene, the data security analysis of the cloud printing is carried out according to the printing condition of each flow in the application process, and the relevance between each data security analysis link is guaranteed. The data to be printed refers to content that a user needs to print, such as a word document, an excel file, a copy and the like.
In an embodiment of the present invention, referring to fig. 3, the querying for data to be printed in the cloud print scene includes:
s301, inquiring a file uploading interface in the cloud printing scene;
s302, configuring a file query address in the cloud printing scene according to the file uploading interface;
s303, inquiring the data to be printed in the cloud printing scene in the user side in the cloud printing scene according to the file inquiry address.
The file uploading interface refers to an interface for uploading a file to be printed on a user side by a user, for example, icons and menu options in a graphical user interface, and can be realized through a script language. Optionally, the configuring of the file query address in the cloud printing scene according to the file upload interface is realized by querying a storage address of a file to be printed by querying the file upload interface.
Further, the embodiment of the present invention performs data transcoding processing on the data to be printed, so as to perform encryption processing on the data to be printed, thereby increasing data security protection on the data to be printed.
In an embodiment of the present invention, the performing data transcoding processing on the data to be printed to obtain transcoded data includes: identifying the data type of the data to be printed, and constructing a data transcoding condition of the data to be printed according to the data type; inquiring data attributes corresponding to the data types, and configuring the data transcoding direction of the data to be printed according to the data attributes; identifying the data transcoding form of the data to be printed according to the data transcoding direction and the data transcoding condition; and determining the transcoding data of the data to be printed according to the data transcoding form.
The data type refers to the type of an image file, the type of a source text file, the type of a table file and the like. The data transcoding condition refers to rules which need to be followed when the data to be printed is transcoded and comprises font embedding setting, PDF file opening password setting, security password setting, document change impermissible setting, text and graphic selection impermissible setting and the like, wherein the font embedding setting refers to embedding outline data of fonts used in a source Word file into the PDF file, and the PDF file opening password setting and the security password setting refer to security password setting. The data attribute refers to an attribute of a file suffix name under the data type, such as two attributes of docx and doc under the text file type, and attributes of BMP, GIF, TIFF, WMF, EMF, JPG, JPEG, and the like under the image file type. The data transcoding form is a form after the data to be printed is transcoded, for example, the data to be transcoded is an image file with BMP attribute, and the corresponding data transcoding condition is that only embedding of fonts of TrueType and Type1 types is limited when contour data of fonts used in a source Word file is embedded in a PDF file, when the fonts cannot be embedded, blank characters are used for substitution, the data with CGM format as a target conversion format of the image file with BMP attribute is queried, and the form conversion is performed on the data to be printed according to the above contents.
Furthermore, in the embodiment of the present invention, a data interaction path of the transcoded data is constructed according to the user address data, so as to transmit the transcoded data from the user side to the server side by using the data interaction path, thereby implementing secure transmission of data. The data interaction path refers to a channel for interaction between a user side and a server side in the cloud printing scene.
In an embodiment of the present invention, the constructing a data interaction path of the transcoded data according to the user address data includes: configuring message broadcasting of the transcoding data according to the user address data; determining response address data of the user address data according to the message broadcast; and configuring a data interaction path of the transcoding data according to the response address data and the user address data.
Wherein the message broadcast is used for sending a broadcast message informing a nearby server that can receive the transcoded data to respond. The response address data refers to the IP address data of the server receiving the transcoded data. Alternatively, the data interaction path may be implemented by a network communication protocol.
S2, the transcoded data are transmitted to a cloud printing server under the cloud printing scene according to the data interaction path, data security verification is conducted on the transcoded data in the cloud printing server, and when the data security verification of the transcoded data is successful, printing control data of the transcoded data are constructed.
According to the data interaction path, the transcoding data are transmitted to the cloud print server in the cloud print scene so as to be used for carrying out safety inspection and analysis on the user and the print content of the user in the cloud print server, and protection of original data stored in the server is guaranteed.
In an embodiment of the present invention, the transmitting the transcoded data to the cloud print server in the cloud print scenario according to the data interaction path includes: dividing an input data queue of the transcoded data; and transmitting the input data queue to a cloud printing server under the cloud printing scene through the data interaction path.
Further, in the cloud print server, data security check is performed on the transcoded data to check whether the transcoded data carries risks, so that data security analysis of data to be printed uploaded by a user is guaranteed.
In an embodiment of the present invention, the performing, in the cloud print server, data security verification on the transcoded data includes: extracting printing parameters in the transcoded data; identifying a parameter category for the printing parameter; inquiring a printing rule of the transcoded data according to the parameter type; safely matching the transcoding data with the printing rule; when the safety matching of the transcoded data and the printing rule is successful, determining that the data safety verification of the transcoded data is successful; and when the safety matching of the transcoded data and the printing rule fails, determining that the data safety verification of the transcoded data fails.
The printing parameters refer to parameters obtained by statistics of the transcoded data, such as the vocabulary of the transcoded data, the length of a website in the transcoded data, and the like.
When the data security verification of the transcoded data is successful, the data to be printed uploaded by the user is free of risks, and the data printing of the next step can be carried out. Further, the embodiment of the present invention constructs the print control data of the transcoded data, so as to control a printer to print out a corresponding file by using the print control data. The print control data includes a file to be printed and a control signal for controlling the printer to print.
In an embodiment of the present invention, the constructing the print control data of the transcoded data includes: constructing a printing control protocol of the transcoding data; and performing data combination on the printing control protocol and the transcoding data to obtain the printing control data.
The printing control protocol refers to network protocols such as TCP/IP, netBEUI, IPX/SPX and the like.
S3, configuring a safety isolation channel of the printing control data, identifying safety control data and non-safety control data in the printing control data according to the safety isolation channel, and performing data blocking on the non-safety control data to obtain a non-safety data blocking result of the data to be printed.
The embodiment of the invention is used for reducing the random data transmission between the server and the printer into the data transmission in the appointed channel by configuring the security isolation channel of the printing control data, and diagnosing the data with risks by utilizing the channel, thereby reducing the risk of network attack of the printer and the server.
In an embodiment of the present invention, the configuring the security isolation channel of the print control data includes: extracting a driving network card corresponding to the printing control data; inquiring driving data corresponding to the printing control data in the driving network card; configuring a security isolation rule of the driving data; and determining a security isolation channel of the printing control data according to the security isolation rule.
The driving data refers to the type corresponding to the printing control data, such as an IP address range, a local port range, a remote port range, a protocol type used by the Internet, a flow direction of a network data frame, an access right, port rates of a limited flow and an unlimited flow, a repetition rate, a fragment rate, an error rate, and the like. The security isolation rule refers to a rule for which classes of driving data are isolated, for example, a rule for setting isolation for repeated data.
Further, according to the embodiment of the invention, the safety control data and the non-safety control data in the printing control data are identified according to the safety isolation channel, so that the printing control data are subjected to safety analysis, the risk data in the printing control data are identified, and the data safety of the printer is ensured. Wherein the security control data refers to data authorized to be accessed by the cloud print controller. The non-secure control data refers to data that is not authorized to be accessed by the cloud print controller.
In an embodiment of the present invention, the identifying, according to the security isolation channel, security control data and non-security control data in the print control data includes: acquiring a safety isolation rule in the safety isolation channel, and performing rule matching on the printing control data and the safety isolation rule; when the printing control data is successfully matched with the rules of the safety isolation rules, taking the printing control data as the non-safety control data; and when the rule matching of the printing control data and the safety isolation rule fails, taking the printing control data as the safety control data.
Further, the embodiment of the invention performs data blocking on the non-safety control data to block the data with risks, thereby increasing the refinement of the process in the data safety protection.
In an embodiment of the present invention, the performing data blocking on the insecure control data to obtain an insecure data blocking result of the data to be printed includes: removing the non-secure data to obtain removed data; calculating the removal amount of the removal data by using the following formula:
Figure DEST_PATH_IMAGE003
wherein B represents the removal number, H represents the frequency of calculating the removal number, B represents the number of bits bit,
Figure 469692DEST_PATH_IMAGE002
indicating a number of channels blocking the non-secure data;
and determining the non-secure data blocking result of the data to be printed according to the removal data and the removal quantity.
And S4, transmitting the safety control data to a cloud printing controller under the cloud printing scene according to the safety isolation channel, performing non-safety matching on the safety control data in the cloud printing controller to obtain a non-safety matching result, and configuring the non-safety level of the non-safety matching result.
According to the embodiment of the invention, the safety control data are transmitted to the cloud printing controller in the cloud printing scene according to the safety isolation channel, so that the safety control data are used for awakening the cloud printing controller to print data, and meanwhile, the safety of the data can be detected in the process of printing the data by the printer. The cloud printing controller is a controller comprising an embedded system for performing security verification on received data and a printer for printing the received data.
In an embodiment of the present invention, the transmitting the security control data to the cloud print controller in the cloud print scene according to the security isolation channel is implemented by using a communication transmission protocol in the security isolation channel.
Further, according to the embodiment of the invention, the non-secure matching is performed on the security control data in the cloud printing controller, so as to check whether the content of the file printed by the user is legal, ensure that the printing data is qualified to the standard verification, and check the risk of the content in the printing data, thereby improving the safety protection comprehensiveness.
In an embodiment of the present invention, the performing, in the cloud print controller, an insecure matching on the secure control data to obtain an insecure matching result includes: performing word segmentation processing on the safety control data to obtain word segmentation control data; checking whether sensitive participles exist in the participle control data by utilizing a dictionary tree algorithm; when no sensitive participle exists in the safety control data, determining that the non-safety matching result is matching failure; when sensitive participles exist in the safety control data, carrying out sensitive classification processing on the sensitive participles to obtain sensitive categories of the sensitive participles; and determining the non-safety matching result as successful matching according to the sensitive category.
The dictionary tree algorithm is also called a word search tree and a Trie tree, is a tree structure, is a variation of a hash tree, is typically applied to statistics, sequencing and storage of a large number of character strings (but not limited to the character strings), and has the advantages that the common prefix of the character strings is utilized to reduce the query time and reduce meaningless character string comparison to the maximum extent. The sensitive category refers to the category of the field related to the sensitive participle, and comprises a related yellow category, an improper statement category and the like.
Further, the embodiment of the present invention configures the non-security level of the non-security matching result to determine the risk level of the data received by the current cloud print controller, and performs corresponding data security protection according to network risks of different levels. The non-security level refers to the risk level of the content to be printed by the cloud print controller, and includes 1 to 5 levels, for example, if the printing of the illegal statement needs to be prohibited, the highest level 5 level may be set, and if the illegal statement needs to be covered, the lowest level 1 level may be set, and if some dangerous websites which may attack the print controller exist, the highest level 5 level may be set.
In an embodiment of the present invention, the configuring the non-security level of the non-security matching result includes: inquiring the sensitive category in the non-safety matching result, and analyzing the category effect corresponding to the sensitive category in the non-safety matching result; determining the non-safety degree of the non-safety matching result according to the category effect; and configuring the non-safety level of the non-safety matching result according to the non-safety degree.
The category effect refers to a risk effect corresponding to the sensitive category, for example, the effect of some web addresses is that a printer system is attacked by a network so as to steal printed materials. The non-safety degree refers to a risk degree corresponding to the risk effect, and if the risk effect indicates that the printer system is under network attack, the risk degree is the highest non-safety degree, which indicates that the data safety of the printer is greatly threatened.
And S5, determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
According to the embodiment of the invention, the data security analysis result in the cloud printing scene is determined according to the non-security level and the non-security data blocking result, so that whether the data in the cloud printing scene is secure or not is determined according to specific non-security data, and the subsequent data security protection in the cloud printing scene is ensured.
In an embodiment of the present invention, the determining, according to the non-security level and the non-security data blocking result, a data security analysis result in the cloud printing scenario includes: determining a data security level under the cloud printing scene according to the non-security level; configuring a data blocking threshold of the non-secure data blocking result; determining a data blocking effect under the cloud printing scene according to the non-secure data blocking result and the data blocking threshold; and determining a data security analysis result in the cloud printing scene according to the data security level and the data blocking effect.
The data blocking threshold is a threshold of blocking amount of the non-secure data, and may be set to 80% or may be set according to an actual situation.
Optionally, the data blocking effect under the cloud printing scene is determined according to the non-secure data blocking result and the data blocking threshold, by comparing the non-secure data blocking result with the data blocking threshold, if the data amount of the non-secure data blocking result is greater than or equal to the data blocking threshold, which indicates that the blocking amount of the system to the non-secure data is large, the data blocking effect is a high risk for the file to be printed, and the file to be printed needs to be further audited; and if the data quantity of the non-safety data blocking result is smaller than the data blocking threshold, the data blocking effect is that the data security analysis of the file subjected to the non-safety data blocking is passed, and the next printing operation can be performed.
It can be seen that, in the embodiments of the present invention, first, user login information in a cloud printing scenario is received, so as to respond to a printing request of a user in time, and convert a printing system in a dormant state into a printing system in a security protection state, further, according to the user login information, the embodiments of the present invention configure user address data in the cloud printing scenario, so as to use the user address data as an identifier of a file to be printed received by a subsequent printer, further, according to the embodiments of the present invention, by querying data to be printed in the cloud printing scenario, so as to apply the data to be printed to an actual printing scenario, and according to a printing status in each process in an application process, perform data security analysis of cloud printing, so as to ensure relevance between each data security analysis link, further, the embodiment of the invention performs data transcoding processing on the data to be printed so as to encrypt the data to be printed and increase the data security protection on the data to be printed, further, the embodiment of the invention constructs a data interaction path of the transcoded data according to the user address data so as to transmit the transcoded data from a user end to a server end by using the data interaction path, so as to realize the secure transmission of the data, further, the embodiment of the invention transmits the transcoded data to a cloud printing server under the cloud printing scene according to the data interaction path so as to perform security inspection and analysis on the user and the printing content thereof in the cloud printing server, so as to ensure the protection of the original data stored in the server, and further, the embodiment of the invention ensures the protection of the original data stored in the server by using the cloud printing server, the method comprises the steps of carrying out data security check on the transcoded data to check whether the transcoded data carries risks or not to ensure data security analysis on data to be printed uploaded by a user, further, configuring a security isolation channel of the print control data to be used for randomly transmitting and reducing data between a server and a printer to be transmitted in a designated channel by using the security isolation channel, diagnosing the data with risks by using the channel, and reducing the risk of network attack on the printer and the server, further, identifying security control data and non-security control data in the print control data by using the security isolation channel to carry out security analysis on the print control data, identifying the risk data in the print control data and ensuring the data security of the printer, further, carrying out data blocking on the non-security control data to be used for blocking the data with risks, increasing refinement of a process in data security protection, further, verifying whether the print control data is matched with a cloud control server by using a cloud controller according to security isolation channel, and verifying whether the print control data is matched with a cloud controller in a cloud control environment, and further verifying whether the print control data is matched with the security control data by using the cloud controller, the method and the device for processing the data safety protection in the cloud printing scene check the risk of the content in the printing data, and improve the comprehensiveness of the safety protection, further, the embodiment of the invention configures the non-safety grade of the non-safety matching result to be used for determining the risk degree of the data received by the current cloud printing controller, and corresponding data safety protection is performed according to network risks of different grades, and further, the embodiment of the invention determines the data safety analysis result in the cloud printing scene according to the non-safety grade and the non-safety data blocking result to be used for determining whether the data in the cloud printing scene are safe according to specific non-safety data, and guaranteeing the subsequent data safety protection in the cloud printing scene. Therefore, the data security analysis method based on the cloud printing scene provided by the embodiment of the invention can increase security analysis on the connection among all printing nodes in a whole set of processes in the cloud printing scene, and improve security protection in the cloud printing scene.
Fig. 4 is a functional block diagram of a data security analysis device based on a cloud print scenario according to the present invention.
The data security analysis device 400 based on the cloud printing scene can be installed in an electronic device. According to the realized functions, the data security analysis device in the cloud printing scene may include an interaction path construction module 401, a control data construction module 402, a control data blocking module 403, a security level configuration module 404, and an analysis result determination module 405. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the embodiment of the present invention, the functions of the modules/units are as follows:
the interaction path construction module 401 is configured to receive user login information in a cloud printing scene, configure user address data of the cloud printing scene according to the user login information, query data to be printed in the cloud printing scene, perform data transcoding processing on the data to be printed to obtain transcoded data, and construct a data interaction path of the transcoded data according to the user address data;
the control data construction module 402 is configured to transmit the transcoded data to a cloud print server in the cloud print scene according to the data interaction path, perform data security verification on the transcoded data in the cloud print server, and construct print control data of the transcoded data when the data security verification on the transcoded data is successful;
the control data blocking module 403 is configured to configure a security isolation channel for the print control data, identify, according to the security isolation channel, security control data and non-security control data in the print control data, and perform data blocking on the non-security control data to obtain a non-security data blocking result of the data to be printed;
the security level configuration module 404 is configured to transmit the security control data to a cloud print controller in the cloud print scene according to the security isolation channel, perform non-security matching on the security control data in the cloud print controller to obtain a non-security matching result, and configure a non-security level of the non-security matching result;
the analysis result determining module 405 is configured to determine a data security analysis result in the cloud printing scenario according to the non-security level and the non-security data blocking result.
In detail, when the modules in the data security analysis apparatus 400 based on the cloud print scene in the embodiment of the present invention are used, the same technical means as the data security analysis method based on the cloud print scene described in fig. 1 to fig. 3 are adopted, and the same technical effects can be produced, which is not described herein again.
Fig. 5 is a schematic structural diagram of an electronic device for implementing a data security analysis method in a cloud-based printing scenario according to the present invention.
The electronic device may include a processor 50, a memory 51, a communication bus 52, and a communication interface 53, and may further include a computer program stored in the memory 51 and executable on the processor 50, such as a data security analysis program in a cloud-based printing scenario.
In some embodiments, the processor 50 may be composed of an integrated circuit, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same function or different functions, and includes one or more Central Processing Units (CPUs), a microprocessor, a digital Processing chip, a graphics processor, a combination of various control chips, and the like. The processor 50 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device by running or executing programs or modules stored in the memory 51 (for example, executing a data security analysis program in a cloud-based printing scenario, etc.), and calling data stored in the memory 51.
The memory 51 includes at least one type of readable storage medium including flash memory, removable hard disks, multimedia cards, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 51 may in some embodiments be an internal storage unit of the electronic device, for example a removable hard disk of the electronic device. The memory 51 may also be an external storage device of the electronic device in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the electronic device. Further, the memory 51 may also include both an internal storage unit and an external storage device of the electronic device. The memory 51 may be used to store not only application software installed in the electronic device and various types of data, such as codes of a database configuration connection program, but also temporarily store data that has been output or will be output.
The communication bus 52 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 51 and at least one processor 50 or the like.
The communication interface 53 is used for communication between the electronic device 5 and other devices, and includes a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which are typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device and for displaying a visualized user interface.
Fig. 5 shows only an electronic device having components, and those skilled in the art will appreciate that the structure shown in fig. 5 does not constitute a limitation of the electronic device, and may include fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 50 through a power management device, so that functions of charge management, discharge management, power consumption management and the like are realized through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
It is to be understood that the embodiments described are for illustrative purposes only and that the scope of the claimed invention is not limited to this configuration.
The database configuration connection program stored in the memory 51 of the electronic device is a combination of computer programs, and when running in the processor 50, can realize:
receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, carrying out data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interaction path of the transcoded data according to the user address data;
according to the data interaction path, the transcoded data are transmitted to a cloud printing server under the cloud printing scene, data security verification is conducted on the transcoded data in the cloud printing server, and when the data security verification of the transcoded data is successful, printing control data of the transcoded data are constructed;
configuring a safety isolation channel of the printing control data, identifying safety control data and non-safety control data in the printing control data according to the safety isolation channel, and performing data blocking on the non-safety control data to obtain a non-safety data blocking result of the data to be printed;
according to the security isolation channel, transmitting the security control data to a cloud printing controller under the cloud printing scene, performing non-security matching on the security control data in the cloud printing controller to obtain a non-security matching result, and configuring a non-security level of the non-security matching result;
and determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
Specifically, the processor 50 may refer to the description of the relevant steps in the embodiment corresponding to fig. 1 for a specific implementation method of the computer program, which is not described herein again.
Further, the electronic device integrated module/unit, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a non-volatile computer-readable storage medium. The storage medium may be volatile or nonvolatile. For example, the computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM).
The present invention also provides a storage medium, which is readable and stores a computer program that, when executed by a processor of an electronic device, can implement:
receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, carrying out data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interaction path of the transcoded data according to the user address data;
according to the data interaction path, the transcoded data are transmitted to a cloud printing server under the cloud printing scene, data security verification is conducted on the transcoded data in the cloud printing server, and when the data security verification on the transcoded data is successful, printing control data of the transcoded data are constructed;
configuring a security isolation channel of the printing control data, identifying security control data and non-security control data in the printing control data according to the security isolation channel, and performing data blocking on the non-security control data to obtain a non-security data blocking result of the data to be printed;
according to the security isolation channel, transmitting the security control data to a cloud printing controller under the cloud printing scene, performing non-security matching on the security control data in the cloud printing controller to obtain a non-security matching result, and configuring a non-security level of the non-security matching result;
and determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. A data security analysis method based on a cloud printing scene is characterized by comprising the following steps:
receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, carrying out data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interaction path of the transcoded data according to the user address data;
according to the data interaction path, the transcoded data are transmitted to a cloud printing server under the cloud printing scene, data security verification is conducted on the transcoded data in the cloud printing server, and when the data security verification of the transcoded data is successful, printing control data of the transcoded data are constructed;
the data security check of the transcoded data in the cloud print server comprises: extracting printing parameters in the transcoded data;
identifying a parameter category for the printing parameter;
inquiring a printing rule of the transcoded data according to the parameter category;
safely matching the transcoding data with the printing rule;
when the safety matching of the transcoded data and the printing rule is successful, determining that the data safety verification of the transcoded data is successful;
when the safety matching of the transcoded data and the printing rule fails, determining that the data safety verification of the transcoded data fails;
configuring a security isolation channel of the printing control data, identifying security control data and non-security control data in the printing control data according to the security isolation channel, and performing data blocking on the non-security control data to obtain a non-security data blocking result of the data to be printed;
the configuring of the secure isolated channel of the print control data comprises: extracting a driving network card corresponding to the printing control data; inquiring driving data corresponding to the printing control data in the driving network card; configuring a security isolation rule of the driving data; according to the safety isolation rule, a safety isolation channel of the printing control data is determined;
according to the security isolation channel, transmitting the security control data to a cloud printing controller under the cloud printing scene, performing non-security matching on the security control data in the cloud printing controller to obtain a non-security matching result, and configuring a non-security level of the non-security matching result;
in the cloud print controller, performing non-secure matching on the secure control data to obtain a non-secure matching result, including:
performing word segmentation processing on the safety control data to obtain word segmentation control data;
checking whether sensitive participles exist in the participle control data by utilizing a dictionary tree algorithm;
when no sensitive participle exists in the safety control data, determining that the non-safety matching result is matching failure;
when sensitive participles exist in the safety control data, carrying out sensitive classification processing on the sensitive participles to obtain sensitive categories of the sensitive participles;
according to the sensitive category, determining that the non-safe matching result is successful in matching;
and determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
2. The method of claim 1, wherein configuring user address data of the cloud print scenario according to the user login information comprises:
configuring an address switching channel of the cloud printing scene according to the user login information;
inquiring a user address corresponding to the user login information according to the address switching channel;
and configuring user address data of the cloud printing scene according to the user address.
3. The method according to claim 1, wherein the transcoding the data to be printed to obtain transcoded data comprises:
identifying the data type of the data to be printed, and constructing a data transcoding condition of the data to be printed according to the data type;
inquiring data attributes corresponding to the data types, and configuring the data transcoding direction of the data to be printed according to the data attributes;
identifying the data transcoding form of the data to be printed according to the data transcoding direction and the data transcoding condition;
and determining the transcoding data of the data to be printed according to the data transcoding form.
4. The method of claim 1, wherein the constructing a data interaction path of the transcoded data according to the user address data comprises:
configuring message broadcasting of the transcoding data according to the user address data;
determining response address data of the user address data according to the message broadcast;
and configuring a data interaction path of the transcoding data according to the response address data and the user address data.
5. The method according to claim 1, wherein the data blocking of the non-secure control data to obtain a non-secure data blocking result of the data to be printed comprises:
removing the non-secure data to obtain removed data;
calculating the removal amount of the removal data by using the following formula:
Figure QLYQS_1
wherein B represents the removal amount, H represents the frequency of calculating the removal amount, B represents the number of bits bit, and p represents the number of channels blocking the non-secure data;
and determining the non-secure data blocking result of the data to be printed according to the removal data and the removal quantity.
6. A data security analysis method and device based on a cloud printing scene is characterized by comprising the following steps:
the interactive path construction module is used for receiving user login information in a cloud printing scene, configuring user address data of the cloud printing scene according to the user login information, inquiring data to be printed in the cloud printing scene, carrying out data transcoding processing on the data to be printed to obtain transcoded data, and constructing a data interactive path of the transcoded data according to the user address data;
the control data construction module is used for transmitting the transcoded data to a cloud printing server under the cloud printing scene according to the data interaction path, carrying out data security verification on the transcoded data in the cloud printing server, and constructing printing control data of the transcoded data when the data security verification on the transcoded data is successful;
the data security check of the transcoded data in the cloud print server comprises: extracting printing parameters in the transcoded data;
identifying a parameter category for the printing parameter;
inquiring a printing rule of the transcoded data according to the parameter type;
safely matching the transcoding data with the printing rule;
when the safety matching of the transcoded data and the printing rule is successful, determining that the data safety verification of the transcoded data is successful;
when the safety matching of the transcoded data and the printing rule fails, determining that the data safety verification of the transcoded data fails;
the control data blocking module is used for configuring a security isolation channel of the printing control data, identifying security control data and non-security control data in the printing control data according to the security isolation channel, and performing data blocking on the non-security control data to obtain a non-security data blocking result of the data to be printed;
the security level configuration module is used for transmitting the security control data to a cloud printing controller under the cloud printing scene according to the security isolation channel, performing non-security matching on the security control data in the cloud printing controller to obtain a non-security matching result, and configuring the non-security level of the non-security matching result;
in the cloud print controller, performing non-secure matching on the secure control data to obtain a non-secure matching result, including:
performing word segmentation processing on the safety control data to obtain word segmentation control data;
checking whether sensitive participles exist in the participle control data by utilizing a dictionary tree algorithm;
when no sensitive word segmentation exists in the safety control data, determining that the non-safety matching result is matching failure;
when sensitive participles exist in the safety control data, carrying out sensitive classification processing on the sensitive participles to obtain sensitive categories of the sensitive participles;
according to the sensitive category, determining that the non-safe matching result is successful in matching;
and the analysis result determining module is used for determining a data security analysis result in the cloud printing scene according to the non-security level and the non-security data blocking result.
7. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the method of data security analysis in a cloud-based printing scenario of any of claims 1 to 5.
8. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the method for data security analysis according to any one of claims 1 to 5 in a cloud-based printing scenario.
CN202211672349.0A 2022-12-26 2022-12-26 Data security analysis method, device, equipment and medium based on cloud printing scene Active CN115664859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211672349.0A CN115664859B (en) 2022-12-26 2022-12-26 Data security analysis method, device, equipment and medium based on cloud printing scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211672349.0A CN115664859B (en) 2022-12-26 2022-12-26 Data security analysis method, device, equipment and medium based on cloud printing scene

Publications (2)

Publication Number Publication Date
CN115664859A CN115664859A (en) 2023-01-31
CN115664859B true CN115664859B (en) 2023-03-21

Family

ID=85023305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211672349.0A Active CN115664859B (en) 2022-12-26 2022-12-26 Data security analysis method, device, equipment and medium based on cloud printing scene

Country Status (1)

Country Link
CN (1) CN115664859B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117609888B (en) * 2024-01-24 2024-03-29 南京功夫豆信息科技有限公司 Security risk evaluation method for cloud printing data transmission

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9152360B1 (en) * 2014-10-02 2015-10-06 Xerox Corporation Method and system for secure branch printing
WO2022233206A1 (en) * 2021-05-07 2022-11-10 苏州奇流信息科技有限公司 Sample database system, method for training and checking printing parameter, and computer

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395615B (en) * 2017-08-11 2020-10-09 杭州迪普科技股份有限公司 Method and device for printer safety protection
CN109032540A (en) * 2018-08-01 2018-12-18 珠海奔图电子有限公司 Method of printing, unit and computer readable storage medium
US20210297546A1 (en) * 2020-03-17 2021-09-23 Capital One Services, Llc Data security scanner for detecting confidential data
CN111708498A (en) * 2020-04-26 2020-09-25 西安交大捷普网络科技有限公司 Method and device for monitoring document printing
CN114826789B (en) * 2022-06-29 2022-09-16 北京辰光融信技术有限公司 Printing control method and system for ensuring data safe transmission
CN114866195A (en) * 2022-07-07 2022-08-05 深圳市江元科技(集团)有限公司 Method for controlling thermal printer by using android system
CN115310059A (en) * 2022-07-29 2022-11-08 北京天空卫士网络安全技术有限公司 Data security processing method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9152360B1 (en) * 2014-10-02 2015-10-06 Xerox Corporation Method and system for secure branch printing
WO2022233206A1 (en) * 2021-05-07 2022-11-10 苏州奇流信息科技有限公司 Sample database system, method for training and checking printing parameter, and computer

Also Published As

Publication number Publication date
CN115664859A (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN108804925B (en) Method and system for detecting malicious code
KR101005927B1 (en) Method for detecting a web application attack
CN110119620B (en) System and method for training machine learning model for detecting malicious containers
US11671448B2 (en) Phishing detection using uniform resource locators
CN112468520B (en) Data detection method, device and equipment and readable storage medium
US11381598B2 (en) Phishing detection using certificates associated with uniform resource locators
CN109543454A (en) A kind of anti-crawler method and relevant device
JP2010516007A (en) Method and apparatus for detecting computer fraud
CN101183458B (en) Picture validation code generating method and device
US11775749B1 (en) Content masking attacks against information-based services and defenses thereto
US8490861B1 (en) Systems and methods for providing security information about quick response codes
CN115664859B (en) Data security analysis method, device, equipment and medium based on cloud printing scene
CN104899499A (en) Internet image search based Web verification code generation method
US20210203693A1 (en) Phishing detection based on modeling of web page content
US20190294803A1 (en) Evaluation device, security product evaluation method, and computer readable medium
CN113704781A (en) File secure transmission method and device, electronic equipment and computer storage medium
CN112789615A (en) Determining security risks in binary software code based on extracted and accessed network addresses
JP2018041442A (en) System and method for detecting web page abnormal element
KR20190020963A (en) Protecting personal information leakage interception system
CN113810375A (en) Webshell detection method, device and equipment and readable storage medium
US20150074154A1 (en) Method of secure storing of content objects, and system and apparatus thereof
Hajiali et al. Preventing phishing attacks using text and image watermarking
JP2012088803A (en) Malignant web code determination system, malignant web code determination method, and program for malignant web code determination
CN110890979A (en) Automatic deploying method, device, equipment and medium for fortress machine
CN115695043A (en) Vulnerability scanning attack detection method, model training method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant