CN116483290B - Remote monitoring system and method for data storage device - Google Patents
Remote monitoring system and method for data storage device Download PDFInfo
- Publication number
- CN116483290B CN116483290B CN202310752679.9A CN202310752679A CN116483290B CN 116483290 B CN116483290 B CN 116483290B CN 202310752679 A CN202310752679 A CN 202310752679A CN 116483290 B CN116483290 B CN 116483290B
- Authority
- CN
- China
- Prior art keywords
- data
- report
- storage device
- module
- analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013500 data storage Methods 0.000 title claims abstract description 86
- 238000012544 monitoring process Methods 0.000 title claims abstract description 83
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000002159 abnormal effect Effects 0.000 claims abstract description 81
- 238000012545 processing Methods 0.000 claims abstract description 57
- 238000004458 analytical method Methods 0.000 claims abstract description 42
- 238000007405 data analysis Methods 0.000 claims abstract description 29
- 238000004891 communication Methods 0.000 claims abstract description 10
- 238000001514 detection method Methods 0.000 claims description 43
- 238000004140 cleaning Methods 0.000 claims description 20
- 238000006243 chemical reaction Methods 0.000 claims description 12
- 241000700605 Viruses Species 0.000 claims description 10
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims description 10
- 238000012216 screening Methods 0.000 claims description 10
- 238000003860 storage Methods 0.000 claims description 10
- 230000002776 aggregation Effects 0.000 claims description 8
- 238000004220 aggregation Methods 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 238000011084 recovery Methods 0.000 claims description 7
- 238000012217 deletion Methods 0.000 claims description 5
- 230000037430 deletion Effects 0.000 claims description 5
- 230000002194 synthesizing effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 9
- 230000006378 damage Effects 0.000 description 5
- 238000013481 data capture Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 230000002547 anomalous effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 150000003839 salts Chemical class 0.000 description 1
- 238000012916 structural analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3037—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a memory, e.g. virtual memory, cache
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Mathematical Physics (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a remote monitoring system and a method for a data storage device, and relates to the technical field of data monitoring. The system comprises a data grabbing module, a data analysis module, a remote monitoring module and a data processing module, wherein the data grabbing module is sequentially in communication connection and is used for grabbing stored data in a data storage device, the data analysis module is used for analyzing the stored data to obtain analysis data comprising normal data and abnormal data, the remote monitoring module is used for detecting and analyzing the abnormal data, performing remote monitoring and outputting a monitoring result report, and the data processing module is used for performing data processing operation on the abnormal data and the normal data according to the monitoring result report. According to the invention, the authority data in the stored data are remotely controlled by acquiring the stored data in the data storage device, analyzing and remotely monitoring the stored data, so that the authority control of the data storage device is realized; and performing data processing on abnormal data existing in the analysis data, thereby ensuring the safety and completeness of the data in the data storage device and maintaining the balance of the data storage quantity.
Description
Technical Field
The invention belongs to the technical field of data monitoring, and particularly relates to a remote monitoring system and a method for a data storage device.
Background
Data storage devices are devices or media for storing data, and commonly used data storage devices include hard disks, solid state disks, U-discs, memory cards, optical discs, magnetic tapes, and the like. These devices are capable of storing various types of data such as files, pictures, video, audio, etc. Different types of data storage devices have respective advantages and disadvantages, and a user can select an appropriate data storage device according to actual needs.
An IC card is one of data storage devices, and is a smart card with a chip. The IC card is an integrated circuit card, also called a chip card, and electronic components such as a microprocessor, a memory and the like are embedded in the chip of the IC card, so that the functions of data storage, encryption authentication, information processing and the like can be realized. Compared with the traditional magnetic stripe card and bar code card, the IC card has the advantages of high safety, strong flexibility, large capacity, long service life and the like, and is widely applied to various fields such as finance, traffic, entrance guard, identity recognition, health management and the like. IC cards are classified into two types, contact type and noncontact type. The contact type IC card is required to be inserted into the card reader for reading and writing, and the non-contact type IC card is communicated with the card reader through a wireless radio frequency technology, so that the card reader has higher use convenience.
Because of the functions and features of the above-described IC card, control of the authority of the IC card is an important research direction. At present, the authority control of the IC card is generally realized by adopting a mode based on a password or an encryption algorithm, the authority control of the IC card cannot be remotely performed, the data loss or modification cannot be prevented while the protection of stored data is ensured, and the data cannot be always maintained on a relatively stable and balanced storage amount.
Disclosure of Invention
The invention aims to provide a remote monitoring system and a remote monitoring method for a data storage device, which realize the remote control of the authority of the data storage device by carrying out remote monitoring on the data storage device, thereby ensuring the safety and integrity of data in the data storage device and maintaining the balance of data storage quantity.
The aim of the invention can be achieved by the following technical scheme:
in a first aspect, an embodiment of the present application provides a remote monitoring system of a data storage device, including a data capturing module, a data analyzing module, a remote monitoring module, and a data processing module that are sequentially connected in communication;
the data grabbing module is used for grabbing stored data of the data storage device and sending the stored data to the data analysis module;
the data analysis module is used for analyzing the stored data and obtaining analysis data; wherein the analysis data comprises normal data and abnormal data; the normal data are sent to the data processing module, and the abnormal data are sent to the remote monitoring module;
the remote monitoring module is used for detecting and analyzing the abnormal data and performing remote monitoring, outputting a monitoring result report and sending the monitoring result report to the data processing module;
the data processing module is used for carrying out data processing operation on the abnormal data according to the monitoring result report; the data processing operation is also carried out on the normal data;
the remote monitoring module comprises a data detection unit, a data analysis unit, a mark tracking unit and a permission control unit which are sequentially connected in a communication mode;
the data detection unit is used for detecting the abnormal data, generating a detection result and sending the detection result to the data analysis unit;
the data analysis unit is used for analyzing the detection result and classifying the detection result to obtain first-class data, second-class data and analysis result;
the mark tracking unit is used for marking the first type of data and tracking the first type of data in real time to acquire a tracking report;
and the permission control unit is used for responding to the second class data and performing permission control on the second class data to acquire a permission report.
Preferably, the data storage device includes an IC card including one main control sector and a plurality of data authority sectors.
Preferably, the data capture module comprises a data collector and a request receiver; the data acquisition device is used for actively capturing the stored data; the request receiver is configured to receive a data request from the data storage device; wherein the stored data includes rights data, and the data request includes an access request and a rights request.
Preferably, in the data parsing module, the parsing the stored data includes structure parsing, format parsing, content parsing, authority parsing and request parsing.
Preferably, the monitoring result report includes the detection result, the analysis result, the tracking report, and the authority report.
Preferably, the first type of data includes virus data, trojan horse data, missing data, repeated data, passively modified data and passively deleted data; the second type of data includes rights request data, rights operation data, and rights record data.
Preferably, the data processing module comprises a data scanning unit, a data cleaning unit, a data encryption unit and a data decryption unit which are sequentially in communication connection;
the data scanning unit is used for scanning the normal data and acquiring a first scanning report; the method is also used for scanning the abnormal data to obtain a second scanning report;
the first scanning report is sent to the data encryption unit, and the second scanning report is sent to the data cleaning unit;
the data cleaning unit is used for cleaning the abnormal data according to the second scanning report;
the data encryption unit is used for encrypting the normal data according to the first scanning report and encrypting the monitoring result;
the data decryption unit is used for verifying and decrypting the data encrypted in the data encryption unit.
Preferably, the data processing operations include data conversion, data cleansing, data restoration, data alignment, data screening, data recovery, data protection, and data aggregation.
Preferably, the plurality of data authority sectors store authority data, and the master control sector stores basic information of the IC card and encryption passwords of the plurality of data authority sectors.
In a second aspect, an embodiment of the present application provides a remote monitoring method for a data storage device, including the following steps:
s1, capturing storage data in a data storage device;
s2, analyzing the stored data to obtain analysis data; wherein the analysis data comprises normal data and abnormal data;
s3, detecting the abnormal data to generate a detection result;
s4, analyzing the detection result and classifying the detection result to obtain first-class data, second-class data and analysis result;
s5, marking the first type of data and tracking the first type of data in real time to acquire a tracking report;
s6, responding to the second class data and performing authority control on the second class data to acquire an authority report;
s7, synthesizing the detection result, the analysis result, the tracking report and the authority report to generate a monitoring result report;
s8, carrying out data processing operation on the abnormal data according to the monitoring result report; performing data processing operation on the normal data;
the first type of data comprises virus data, trojan horse data, missing data, repeated data, passive modification data and passive deletion data; the second class of data comprises rights request data, rights operation data and rights record data;
the data processing operations include data conversion, data cleansing, data restoration, data alignment, data screening, data recovery, data protection, and data aggregation.
The beneficial effects of the invention are as follows:
(1) According to the invention, the stored data in the data storage device is acquired, then analyzed and remotely monitored, and the authority data in the stored data is remotely controlled, so that the remote control of the authority of the data storage device is realized; and performing data processing operation on abnormal data existing in the analysis data, thereby ensuring the safety and completeness of the data in the data storage device and maintaining the balance of the data storage quantity.
(2) The invention captures the stored data through the data capture module, analyzes and judges the stored data by utilizing the data analysis module, and obtains normal data and abnormal data in the analyzed data; abnormal data in the stored data are screened out through preliminary data analysis, and the safety of the data in the data storage device is preliminarily ensured.
(3) According to the invention, the abnormal data is detected and analyzed through the remote monitoring module, and then the abnormal data is remotely monitored according to the detection and analysis result, so that the abnormal data is further tracked and monitored, and the safety problem of the data storage device caused by the abnormal data is avoided.
(4) The remote monitoring module responds to the data related to the authority through the authority control unit, and performs authority control on the authority data, so that some authority requests are responded under the condition of safety detection and analysis, and the safety and timeliness of the authority requests are ensured.
(5) The invention carries out data processing operation on the abnormal data and the normal data through the data processing module, and generates a first scanning report by scanning the normal data, thereby encrypting the abnormal data and the normal data by utilizing the data encryption unit, and further ensuring the safety of the normal data; and a second scanning report is generated by scanning abnormal data, and the data cleaning unit is used for cleaning the data, so that unsafe virus Trojan data and repeated missing data in the data are cleaned, the storage capacity of the data storage device is always kept balanced, and the safety and the integrity of the data are ensured.
Drawings
For a better understanding and implementation, the technical solutions of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a remote monitoring system of a data storage device according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a remote monitoring module according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a data processing module according to an embodiment of the present disclosure;
fig. 4 is a flowchart of steps of a remote monitoring method of a data storage device according to an embodiment of the present application.
Detailed Description
For further explanation of the technical means and effects adopted by the present invention for achieving the intended purpose, exemplary embodiments will be described in detail herein, examples of which are shown in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of methods and systems that are consistent with aspects of the present application, as detailed in the accompanying claims.
The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the present application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to any or all possible combinations including one or more of the associated listed items.
The following detailed description of specific embodiments, features and effects according to the present invention is provided with reference to the accompanying drawings and preferred embodiments.
Example 1
Referring to fig. 1 and fig. 2, an embodiment of the present application provides a remote monitoring system of a data storage device, which includes a data capturing module, a data analyzing module, a remote monitoring module and a data processing module that are sequentially connected in a communication manner;
the data grabbing module is used for grabbing stored data of the data storage device and sending the stored data to the data analysis module;
the data analysis module is used for analyzing the stored data and obtaining analysis data; wherein the analysis data comprises normal data and abnormal data; the normal data are sent to the data processing module, and the abnormal data are sent to the remote monitoring module;
the remote monitoring module is used for detecting and analyzing the abnormal data and performing remote monitoring, outputting a monitoring result report and sending the monitoring result report to the data processing module;
the data processing module is used for carrying out data processing operation on the abnormal data according to the monitoring result report; the data processing operation is also carried out on the normal data;
the remote monitoring module comprises a data detection unit, a data analysis unit, a mark tracking unit and a permission control unit which are sequentially connected in a communication mode;
the data detection unit is used for detecting the abnormal data, generating a detection result and sending the detection result to the data analysis unit;
the data analysis unit is used for analyzing the detection result and classifying the detection result to obtain first-class data, second-class data and analysis result;
the mark tracking unit is used for marking the first type of data and tracking the first type of data in real time to acquire a tracking report;
and the permission control unit is used for responding to the second class data and performing permission control on the second class data to acquire a permission report.
Specifically, the data grabbing module grabs and stores data from the data storage device and then sends the data to the data analysis module for analysis; the data analysis module analyzes the data after receiving the stored data, acquires normal data and abnormal data, sends the normal data to the data processing module, and sends the abnormal data to the remote monitoring module; the remote monitoring module is used for carrying out remote monitoring on the abnormal data after receiving the abnormal data, comprehensively outputting a monitoring result report and then sending the monitoring result report to the data processing module; and finally, the data processing module performs data processing operation on the received monitoring result report and the normal data.
In this embodiment of the present application, the normal data refers to data that can normally run in a data storage device and a system, and these data do not have the problems of missing, duplication, and the like, and do not cause damage to the data storage device and the system, so that the data that satisfies the above conditions is the normal data. It should be noted that the normal data represented in the present application is not limited to the above examples. By anomalous data in this application is meant data that can be detrimental to data storage devices and systems, and that is missing and duplicated, as well as causing operational problems and anomalies in the systems and devices.
In the embodiment of the application, the data detection unit in the remote monitoring module detects abnormal data and sends the generated detection result to the data analysis unit; the data analysis unit analyzes and classifies the detection result into first class data and second class data and generates an analysis result; the first type of data is tracked in real time by the tag tracking unit, and a tracking report is generated; and the permission control unit responds to the second type of data and performs permission control on the second type of data so as to acquire a permission report.
In one embodiment provided herein, the monitoring result report includes a detection result, an analysis result, a tracking report, and a permission report. And the result and report generated by each unit in the remote monitoring module are combined to generate the monitoring result report.
In one embodiment provided in the present application, the first type of data includes virus data, trojan horse data, missing data, duplicate data, passive modification data, and passive deletion data; the second type of data includes rights request data, rights operation data, and rights record data.
Specifically, in the embodiment of the present application, the first type of data is system/device destruction type data, where virus data and Trojan horse data can cause great harm to the system or the data storage device, the missing data and the repeated data are data that can affect the normal operation of the system or the data storage device, the passive modified data and the passive deleted data are data that are passively processed for various reasons in the operation process of the system or the data storage device, and are not data that are actively processed by an operator, and the operation of the system or the data storage device is also affected by the passive modified data and the passive deleted data.
The permission request data in the second type of data is a request of application permission sent by a user or other personnel; the right operation data is data generated after the system or the data storage device performs right operation; rights record data is data of various rights classes recorded by a system or a data storage device.
It should be noted that, the second type of data is mainly rights type data, and the rights type data is mainly represented as rights request or rights operation, and although the rights request or rights operation does not harm the data storage device, the data storage device or the system is abnormal, so the meaning of the abnormal data in the present application is satisfied.
In one embodiment provided herein, the data storage device includes an IC card that includes a master sector and a plurality of data authority sectors.
In particular, a data storage device refers to a device or medium for storing and preserving data, common data storage devices include: hard disk, solid state disk, USB flash disk, mobile hard disk, CD, cloud storage and other devices. The data storage device in the embodiment of the application is an IC card including one main control sector and a plurality of data authority sectors.
The IC card is a new IC card which takes one sector of the IC card as a main control sector and the other sectors as data sectors and realizes the safe copy prevention of the data sectors by utilizing a unique password and algorithm mechanism. The IC card adopts a mode of combining a main control sector with a plurality of data sectors, and is different from the traditional 16-sector IC card which supports 15x 256=3840 authority identifiers at most, wherein the IC card comprises n+1 sectors, one of the sectors is the main control sector, and the other n sectors are the data sectors (n is a positive integer). The n data sectors support n×256=256 n rights identifications, which can be applied to rights management of ultra-large items. Note that, in the present application, the number of data sectors of the IC card is n, and because the IC card is different from the conventional 16-sector IC card, the value of n in the present application may be selected to be n >16. Storing authority data in the main control sector, and encrypting information of the data storage sector; the password of the data sector is stored in the master sector by secondary encryption, and the encrypted key is the private key of the device. The passwords of each sector are inconsistent, and the encryption factors comprise: the random password, the IC card number, the fixed key/salt, the equipment private key, the sector number and the like are safer than the one-card-one-encryption mode of the traditional IC card. It should be noted that the IC card in the present application may be used in an access control system to enhance the security of the IC card.
Further, the plurality of data authority sectors store authority data, and the master control sector stores basic information of the IC card and encryption passwords of the plurality of data authority sectors.
Specifically, the basic information of the IC card includes card information, encryption setting information, access passwords of data sectors, and the like. The card information comprises card number, card state, card validity period and other information; the encryption setting information includes an encryption manner, version information, a confusion manner of data, and the like.
It should be noted that, as one of the data storage devices of the present application, the authority control of the IC card may be implemented through the above-mentioned system module, and the above-mentioned IC card may be applied to the door control field. Such as: the user performs door opening operation in a district provided with an access control system, a certain gate in the district needs to be opened, the user can send out a door opening permission request, at the moment, the system can acquire the door opening permission request through an IC card, and further a series of operations and operations of the modules of the system are performed to realize the door opening operation; the system can also be used for mobile terminals or client terminals, such as mobile phones, computers and the like, and the mobile terminals such as the mobile phones and the like can monitor the service condition of the IC card at the moment and can remotely operate the permission request to realize the door opening request of a user. Namely: the user sends the permission request through the IC card, and the client side obtains the permission request through the system and remotely controls the IC card.
In one embodiment provided herein, the data grabbing module includes a data collector and a request receiver; the data acquisition device is used for actively capturing the stored data; the request receiver is configured to receive a data request from the data storage device; wherein the stored data includes rights data, and the data request includes an access request and a rights request. It should be noted that the data collector is only one type of the data capturing device provided in the embodiment of the present application, and the request receiver is also only one type of the data request receiving device provided in the present application, and the data capturing device and the data request receiving device of the present application are not limited to the two types of devices described in the foregoing examples. In the present embodiment, the stored data includes, but is not limited to, rights data, and the data request includes, but is not limited to, an access request and a rights request.
In one embodiment provided in the present application, in the data parsing module, the parsing the stored data includes structure parsing, format parsing, content parsing, rights parsing, and request parsing.
Specifically, in the data analysis module, the stored data needs to be analyzed to obtain detailed data information of the stored data. Wherein, regarding structural analysis: because data is typically stored in a certain structure, such as a binary code stream, a file system, etc., it is necessary to know the file structure or binary structure of the data when parsing the data; regarding format parsing: different formats exist for different types of data, such as text, pictures, audio, video, etc., so the format needs to be determined before the data is parsed; regarding content parsing: the method is characterized in that various forms of data such as text, images, audio and video are converted into structured data which can be understood and processed by a system so as to be convenient for automatic processing and analysis; the authority analysis and request analysis are to analyze the authority of data, so that the system is convenient to respond and process the request.
As shown in fig. 3, in one embodiment provided in the present application, the data processing module includes a data scanning unit, a data cleaning unit, a data encryption unit, and a data decryption unit that are sequentially connected in communication;
the data scanning unit is used for scanning the normal data and acquiring a first scanning report; the method is also used for scanning the abnormal data to obtain a second scanning report;
the first scanning report is sent to the data encryption unit, and the second scanning report is sent to the data cleaning unit;
the data cleaning unit is used for cleaning the abnormal data according to the second scanning report;
the data encryption unit is used for encrypting the normal data according to the first scanning report and encrypting the monitoring result;
the data decryption unit is used for verifying and decrypting the data encrypted in the data encryption unit.
Specifically, in the data processing module, the data scanning unit scans normal data to generate a first scanning report, scans abnormal data to generate a second scanning report, sends the first scanning report to the data encryption unit, and sends the second scanning report to the data cleaning unit; the data encryption unit encrypts normal data according to the received first scanning report, and the data cleaning unit cleans abnormal data according to the received second scanning report; the data decryption unit verifies the data encrypted in the data encryption unit, and the data decryption unit can decrypt the data after verification.
Further, the data processing operations include data conversion, data cleansing, data restoration, data alignment, data screening, data recovery, data protection, and data aggregation. It should be noted that the data processing operations include, but are not limited to, those listed above.
Specifically, with respect to data conversion, which refers to a process of converting data from one form or format to another, data conversion may include type conversion, code conversion, format conversion, unit conversion, and the like; the data cleaning refers to a process of cleaning data in a deleting, replacing, repairing and other modes, and aims to remove noise, missing values, abnormal values and the like in the data, ensure the quality of the data and establish a good foundation for subsequent analysis; the data restoration refers to restoring data to data before an abnormality occurs; the data comparison means that the data before and after the occurrence of the abnormality are compared, the abnormal part is found out, and then the data reduction and other operations are carried out; regarding data screening, which refers to a process of screening and filtering data according to certain conditions, common data screening methods include screening according to a time range, according to a numerical range, according to keywords, and the like; the data recovery means that if the data in the data storage device (equipment) is lost, deleted or damaged, the data needs to be recovered; regarding data protection, the protection of abnormal data is performed to prevent the abnormal data from causing greater harm to a system or a data storage device; with respect to data aggregation, it is meant a process of combining multiple data sets into one larger data set, and the data set formed by data aggregation may enable abnormal data to be centrally processed, and may be performed in various ways, such as summation, averaging, thresholding, and the like.
In summary, the invention analyzes and remotely monitors the stored data in the data storage device by acquiring the stored data, and remotely controls the authority data in the stored data, thereby realizing the remote control of the authority of the data storage device; and performing data processing operation on abnormal data existing in the analysis data, thereby ensuring the safety and completeness of the data in the data storage device and maintaining the balance of the data storage quantity.
The invention captures the stored data through the data capture module, analyzes and judges the stored data by utilizing the data analysis module, and obtains normal data and abnormal data in the analyzed data; abnormal data in the stored data are screened out through preliminary data analysis, and the safety of the data in the data storage device is preliminarily ensured.
According to the invention, the abnormal data is detected and analyzed through the remote monitoring module, and then the abnormal data is remotely monitored according to the detection and analysis result, so that the abnormal data is further tracked and monitored, and the safety problem of the data storage device caused by the abnormal data is avoided.
The remote monitoring module responds to the data related to the authority through the authority control unit, and performs authority control on the authority data, so that some authority requests are responded under the condition of safety detection and analysis, and the safety and timeliness of the authority requests are ensured.
The invention carries out data processing operation on the abnormal data and the normal data through the data processing module, and generates a first scanning report by scanning the normal data, thereby encrypting the abnormal data and the normal data by utilizing the data encryption unit, and further ensuring the safety of the normal data; and a second scanning report is generated by scanning abnormal data, and the data cleaning unit is used for cleaning the data, so that unsafe virus Trojan data and repeated missing data in the data are cleaned, the storage capacity of the data storage device is always kept balanced, and the safety and the integrity of the data are ensured.
Example 2
Referring to fig. 4, an embodiment of the present application provides a remote monitoring method of a data storage device, including the following steps:
s1, capturing storage data in a data storage device;
s2, analyzing the stored data to obtain analysis data; wherein the analysis data comprises normal data and abnormal data;
s3, detecting the abnormal data to generate a detection result;
s4, analyzing the detection result and classifying the detection result to obtain first-class data, second-class data and analysis result;
s5, marking the first type of data and tracking the first type of data in real time to acquire a tracking report;
s6, responding to the second class data and performing authority control on the second class data to acquire an authority report;
s7, synthesizing the detection result, the analysis result, the tracking report and the authority report to generate a monitoring result report;
s8, carrying out data processing operation on the abnormal data according to the monitoring result report; performing data processing operation on the normal data;
the first type of data comprises virus data, trojan horse data, missing data, repeated data, passive modification data and passive deletion data; the second class of data comprises rights request data, rights operation data and rights record data;
the data processing operations include data conversion, data cleansing, data restoration, data alignment, data screening, data recovery, data protection, and data aggregation.
Specifically, firstly, capturing storage data from a data storage device, then carrying out data analysis on the storage data to obtain normal data and abnormal data, carrying out data processing on the normal data, and carrying out remote monitoring on the abnormal data; then, the abnormal data is remotely monitored and then a monitoring result report is comprehensively output; and finally, carrying out data processing operation on the abnormal data according to the monitoring result report, and carrying out data processing operation on the normal data. The abnormal data can be detected, analyzed and classified, marked and tracked and authority controlled in the process of remote monitoring. And the monitoring result report is comprehensively generated by the detection result, the analysis result, the tracking report and the permission report.
According to the invention, the stored data in the data storage device is acquired, then analyzed and remotely monitored, and the authority data in the stored data is remotely controlled, so that the remote control of the authority of the data storage device is realized; and performing data processing operation on abnormal data existing in the analysis data, thereby ensuring the safety and completeness of the data in the data storage device and maintaining the balance of the data storage quantity.
The method comprises the steps of capturing stored data, analyzing and judging the stored data, and obtaining normal data and abnormal data in the analyzed data; abnormal data in the stored data are screened out through preliminary data analysis, and the safety of the data in the data storage device is preliminarily ensured.
According to the invention, the abnormal data is detected and analyzed, and then is remotely monitored according to the detection and analysis result, so that the abnormal data is further tracked and monitored, and the safety problem of the data storage device caused by the abnormal data is avoided.
The invention also responds to the data related to the authority, and performs the authority control on the authority data, so that some authority requests are responded under the condition of safety detection and analysis, and the safety and timeliness of the authority requests are ensured.
According to the invention, the abnormal data and the normal data are subjected to data processing operation, the first scanning report is generated by scanning the normal data, and the first scanning report is encrypted, so that the safety of the normal data is ensured; and a second scanning report is generated by scanning abnormal data, and data is cleaned, so that unsafe virus Trojan data and repeated missing data are cleaned, the storage capacity of the data storage device is always balanced, and the safety and the integrity of the data are ensured.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the system is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Those of ordinary skill in the art will appreciate that the elements and method steps of the examples described in connection with the embodiments disclosed herein can be implemented as electronic hardware, or as a combination of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The present invention is not limited to the above embodiments, but is capable of modification and variation in detail, and other modifications and variations can be made by those skilled in the art without departing from the scope of the present invention.
Claims (6)
1. A remote monitoring system for a data storage device, characterized by: the system comprises a data grabbing module, a data analysis module, a remote monitoring module and a data processing module which are sequentially connected in a communication way;
the data grabbing module is used for grabbing stored data of the data storage device and sending the stored data to the data analysis module;
the data analysis module is used for analyzing the stored data and obtaining analysis data; wherein the analysis data comprises normal data and abnormal data; the normal data are sent to the data processing module, and the abnormal data are sent to the remote monitoring module;
the remote monitoring module is used for detecting and analyzing the abnormal data and performing remote monitoring, outputting a monitoring result report and sending the monitoring result report to the data processing module;
the data processing module is used for carrying out data processing operation on the abnormal data according to the monitoring result report; the data processing operation is also carried out on the normal data;
the remote monitoring module comprises a data detection unit, a data analysis unit, a mark tracking unit and a permission control unit which are sequentially connected in a communication mode;
the data detection unit is used for detecting the abnormal data, generating a detection result and sending the detection result to the data analysis unit;
the data analysis unit is used for analyzing the detection result and classifying the detection result to obtain first-class data, second-class data and analysis result;
the mark tracking unit is used for marking the first type of data and tracking the first type of data in real time to acquire a tracking report;
the right control unit is used for responding to the second class data and carrying out right control on the second class data to acquire a right report;
the first type of data comprises virus data, trojan horse data, missing data, repeated data, passive modification data and passive deletion data; the second class data comprises authority request data, authority operation data and authority record data;
the data storage device comprises an IC card, wherein the IC card comprises a main control sector and n data authority sectors; wherein n is a positive integer and n >16;
n data authority sectors store authority data and support n×256=256 n authority identifications; a main control sector stores basic information of the IC card and encryption codes of n data authority sectors;
in the data parsing module, the parsing of the stored data includes structure parsing, format parsing, content parsing, authority parsing and request parsing.
2. A remote monitoring system for a data storage device according to claim 1, wherein: the data grabbing module comprises a data collector and a request receiver; the data acquisition device is used for actively capturing the stored data; the request receiver is configured to receive a data request from the data storage device; wherein the stored data includes rights data, and the data request includes an access request and a rights request.
3. A remote monitoring system for a data storage device according to claim 1, wherein: the monitoring result report comprises a detection result, an analysis result, a tracking report and a permission report.
4. A remote monitoring system for a data storage device according to claim 1, wherein: the data processing module comprises a data scanning unit, a data cleaning unit, a data encryption unit and a data decryption unit which are sequentially connected in a communication mode;
the data scanning unit is used for scanning the normal data and acquiring a first scanning report; the method is also used for scanning the abnormal data to obtain a second scanning report;
the first scanning report is sent to the data encryption unit, and the second scanning report is sent to the data cleaning unit;
the data cleaning unit is used for cleaning the abnormal data according to the second scanning report;
the data encryption unit is used for encrypting the normal data according to the first scanning report and encrypting the monitoring result;
the data decryption unit is used for verifying and decrypting the data encrypted in the data encryption unit.
5. The remote monitoring system of a data storage device of claim 4, wherein: the data processing operations include data conversion, data cleansing, data restoration, data alignment, data screening, data recovery, data protection, and data aggregation.
6. A method for remote monitoring of a data storage device, applied to a remote monitoring system of a data storage device according to any one of claims 1 to 5, characterized in that: the method comprises the following steps:
s1, capturing storage data in a data storage device;
s2, analyzing the stored data to obtain analysis data; wherein the analysis data comprises normal data and abnormal data;
s3, detecting the abnormal data to generate a detection result;
s4, analyzing the detection result and classifying the detection result to obtain first-class data, second-class data and analysis result;
s5, marking the first type of data and tracking the first type of data in real time to acquire a tracking report;
s6, responding to the second class data and performing authority control on the second class data to acquire an authority report;
s7, synthesizing a detection result, an analysis result, a tracking report and a permission report to generate a monitoring result report;
s8, carrying out data processing operation on the abnormal data according to the monitoring result report; performing data processing operation on the normal data;
the first type of data comprises virus data, trojan horse data, missing data, repeated data, passive modification data and passive deletion data; the second class of data comprises rights request data, rights operation data and rights record data;
the data processing operations include data conversion, data cleansing, data restoration, data alignment, data screening, data recovery, data protection, and data aggregation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310752679.9A CN116483290B (en) | 2023-06-26 | 2023-06-26 | Remote monitoring system and method for data storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310752679.9A CN116483290B (en) | 2023-06-26 | 2023-06-26 | Remote monitoring system and method for data storage device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116483290A CN116483290A (en) | 2023-07-25 |
CN116483290B true CN116483290B (en) | 2024-02-09 |
Family
ID=87218099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310752679.9A Active CN116483290B (en) | 2023-06-26 | 2023-06-26 | Remote monitoring system and method for data storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116483290B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008007308A (en) * | 2006-06-30 | 2008-01-17 | Hitachi Building Systems Co Ltd | Operation report system used when earthquake occurs |
CN111462349A (en) * | 2020-05-13 | 2020-07-28 | 深圳市浩海智科科技有限公司 | IC card terminal of registering of intelligence temperature sensing |
CN115733762A (en) * | 2022-11-14 | 2023-03-03 | 深圳市乔安科技有限公司 | Monitoring system with big data analysis capability |
CN116186632A (en) * | 2023-02-02 | 2023-05-30 | 深圳市拓普瑞电子有限公司 | Remote monitoring test control management method, system and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004326478A (en) * | 2003-04-25 | 2004-11-18 | Hitachi Ltd | Storage device system and management program |
US10908960B2 (en) * | 2019-04-16 | 2021-02-02 | Alibaba Group Holding Limited | Resource allocation based on comprehensive I/O monitoring in a distributed storage system |
-
2023
- 2023-06-26 CN CN202310752679.9A patent/CN116483290B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008007308A (en) * | 2006-06-30 | 2008-01-17 | Hitachi Building Systems Co Ltd | Operation report system used when earthquake occurs |
CN111462349A (en) * | 2020-05-13 | 2020-07-28 | 深圳市浩海智科科技有限公司 | IC card terminal of registering of intelligence temperature sensing |
CN115733762A (en) * | 2022-11-14 | 2023-03-03 | 深圳市乔安科技有限公司 | Monitoring system with big data analysis capability |
CN116186632A (en) * | 2023-02-02 | 2023-05-30 | 深圳市拓普瑞电子有限公司 | Remote monitoring test control management method, system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116483290A (en) | 2023-07-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Azadegan et al. | Novel anti-forensics approaches for smart phones | |
CN112333166B (en) | Attack mode automatic identification system based on Internet of things | |
CN112487383A (en) | Computer system for ensuring information safety and control method thereof | |
CN109063476A (en) | A kind of computer system to ensure information security | |
CN106534171B (en) | Security authentication method, device and terminal | |
CN103345601A (en) | Identity recording and verification system based on radio frequency | |
CN103413088A (en) | Computer document operational safety audit system | |
CN105335642A (en) | Processing method and processing system of pictures | |
CN101997832A (en) | Safety monitoring device and method for supporting safety monitoring | |
CN116760740A (en) | Intelligent embedded monitoring system in Internet of things equipment | |
CN117521091A (en) | Access control method and system of security policy matrix based on data classification and grading | |
CN108390857B (en) | Method and device for exporting file from high-sensitivity network to low-sensitivity network | |
CN112417473A (en) | Big data security management system | |
CN118074979A (en) | Block chain-based safety monitoring system | |
CN103368736B (en) | Business information encryption, decryption method and device | |
CN115982681A (en) | Computer network identity verification system | |
CN110826094A (en) | Information leakage monitoring method and device | |
CN116483290B (en) | Remote monitoring system and method for data storage device | |
CN213122985U (en) | PIS authentication system | |
CN112287346A (en) | IRP analysis-based encrypted Lesso software real-time monitoring system and method | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN112671719A (en) | Network security isolation method and device based on data stripping and construction method thereof | |
CN116738450A (en) | Method and device for long-term safe lossless storage and restoration of digital resources | |
CN115906158A (en) | Privacy protection system based on data classification and classification | |
Bhushan et al. | An overview on handling anti forensic issues in android devices using forensic automator tool |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |