CN116860483A - Data pruning method and device, computer equipment and storage medium - Google Patents

Data pruning method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN116860483A
CN116860483A CN202310896822.1A CN202310896822A CN116860483A CN 116860483 A CN116860483 A CN 116860483A CN 202310896822 A CN202310896822 A CN 202310896822A CN 116860483 A CN116860483 A CN 116860483A
Authority
CN
China
Prior art keywords
target
content
clip
data
clip content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310896822.1A
Other languages
Chinese (zh)
Inventor
马超
陈保文
吴佳欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hexin Technology Suzhou Co ltd
Hexin Technology Co ltd
Original Assignee
Hexin Technology Suzhou Co ltd
Hexin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hexin Technology Suzhou Co ltd, Hexin Technology Co ltd filed Critical Hexin Technology Suzhou Co ltd
Priority to CN202310896822.1A priority Critical patent/CN116860483A/en
Publication of CN116860483A publication Critical patent/CN116860483A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/544Remote
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to the field of data transmission, and discloses a data pruning method, a device, computer equipment and a storage medium, which are applied to a proxy terminal, wherein the method comprises the following steps: receiving a data clip request sent by a user; determining a storage location of the target clip content and a target device based on the data clip request; extracting target clip content based on the storage position, judging whether the target clip content accords with a configuration strategy of a filter program, and deploying the filter program in the proxy terminal; if the target clip content accords with the configuration strategy, the target clip content is pasted to the target equipment, the proxy terminal receives the data clip request, extracts the target clip content and determines the target equipment, judges the target clip content based on a filter program of the proxy terminal, filters the target clip content, omits the step of saving the transmitted content into a document or a compressed file by a user, does not need to remotely transmit through a file transmission protocol, and greatly improves the data transmission efficiency.

Description

Data pruning method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of data transmission technologies, and in particular, to a data pruning method, a data pruning device, a computer device, and a storage medium.
Background
With the rapid development of mobile communication technology, the IC design platform is continuously expanded, the roles of cloud technology service providers are gradually highlighted, and the problems of remote access information safety, resource scheduling and distribution, human resource distribution, administrative resource scheduling and management and the like bring greater pressure and challenges to operation and maintenance work. There are corresponding resource requirements for both research and development designers and non-research and development designers. Therefore, how to perform remote data transmission becomes a key issue.
In the prior art, data such as characters or pictures transmitted by a user are typically saved as a document or compressed file and uploaded to a remote server via FTP (File Transfer Protocol ) and SFTP (Secure File Transfer Protocol, secure file transfer protocol). The user needs to process the characters or the pictures, and the data transmission efficiency is low.
Disclosure of Invention
In view of the above, the present application provides a data pruning method, device, computer device and storage medium, so as to solve the problem of low data transmission efficiency in the prior art.
In a first aspect, the present application provides a data pruning method, applied to a proxy terminal, where the method includes:
receiving a data clip request sent by a user;
determining a storage position of target clip content and target equipment based on the data clip request;
extracting the target clip content based on the storage position, and judging whether the target clip content accords with a configuration strategy of a filter program, wherein the filter program is deployed on the proxy terminal;
and if the target clip content accords with the configuration strategy, pasting the target clip content to the target device.
The application encrypts and transmits through the proxy terminal, receives the data clipping request, determines the storage position of the target clipping content based on the data clipping request, extracts the target clipping content, determines the content which the user wants to paste, determines the target equipment, determines the equipment for pasting the target clipping content, judges the target clipping content based on the filter program of the proxy terminal, filters the target clipping content, pastes the content conforming to the configuration strategy to the target equipment, thereby omitting the step that the user stores the transmitted content into a document or a compressed file, and does not need to remotely transmit through a file transmission protocol, but directly pastes the target clipping content conforming to the configuration strategy to the target equipment through the proxy terminal.
In an alternative embodiment, the receiving the data clip request sent by the user includes:
and receiving a data clip request sent by a user through remote control software of the terminal equipment.
The application realizes the remote acquisition of the data clip request of the user by acquiring the request sent by the remote control software of the user on the terminal equipment.
In an alternative embodiment, before determining whether the target clip content meets the configuration policy of the filter, the method further comprises:
acquiring a first filtering specification and a second filtering specification, wherein the first filtering specification comprises a character specification length and a sensitive field corresponding to character clippings, and the second filtering specification comprises a picture size specification, an occupied space specification and a resolution specification corresponding to picture clippings;
and configuring a configuration policy of the filter program based on the first filter specification and the second filter specification.
The configuration strategy of the agent terminal filter program is configured by the acquired first filter specification and second filter specification, so that the target clip content is conveniently filtered based on the first filter specification and the second filter specification, and the target clip content is automatically filtered.
In an alternative embodiment, the determining whether the target clip content meets the configuration policy of the filter includes:
judging the type of the target clip content as characters or pictures;
if the target clippings are characters, the target clippings do not contain sensitive fields and accord with the character standard length, and the target clippings are determined to accord with the configuration strategy of the filter program;
if the target clip content is a picture and the target clip content accords with the picture size specification, the occupied space specification and the resolution specification, determining that the target clip content accords with the configuration strategy of the filter program.
The application judges the types of the target clippings so as to respectively judge the character clippings and the picture clippings, thereby respectively judging whether the clippings of each type meet the configuration strategy.
In an alternative embodiment, the method further comprises:
if the target clip content is a character, the target clip content does not contain a sensitive field and does not accord with the character standard length, and the content accord with the character standard length is pasted to the target equipment.
The application pastes part of the target clippings which do not contain the sensitive fields to the target equipment so as to paste only the contents which accord with the length of the character specification, thereby realizing the paste of the contents which accord with the character specification.
In an alternative embodiment, the method further comprises:
if the target clippings content is characters and contains sensitive fields, refusing to paste the target clippings content to the target equipment;
and if the target clip content is a picture, the target clip content does not accord with at least one of the picture size specification, the occupied space specification and the resolution specification, and the target clip content is refused to be pasted to the target equipment.
The application refuses to paste the target clippings containing the sensitive fields to the target equipment so as to avoid copying the content with the sensitive fields, thereby automatically shielding the sensitive fields, reducing the data quantity and improving the data transmission efficiency; determining the picture clip content which does not accord with at least one of the picture size specification, the occupied space specification and the resolution specification as not accord with the configuration strategy, and avoiding pasting the pictures which do not accord with the configuration strategy so as to realize automatic filtering of the picture clip content.
In an alternative embodiment, the configuration policy for configuring the filter based on the first filter specification and the second filter specification includes:
adding a sensitive field corresponding to character clippings to a configuration strategy of the filter program, and marking the sensitive field as refusal to paste;
and adding a picture size specification, an occupied space specification and a resolution specification corresponding to the picture clip content to a configuration strategy of the filter program, and marking the pictures which do not accord with the picture size specification, the occupied space specification and the resolution specification as refused to be pasted.
The application carries out reject pasting mark on the content which is not allowed to be pasted by configuring the configuration strategy of the filter program so as to avoid pasting the content which is not in accordance with the configuration strategy to the target equipment.
In a second aspect, the present application provides a data clipping device applied to a proxy terminal, the device comprising:
the receiving module is used for receiving a data clip request sent by a user;
the determining module is used for determining the storage position of the target clip content and the target equipment based on the data clip request;
the judging module is used for extracting the target clip content based on the storage position and judging whether the target clip content accords with a configuration strategy of a filter program, wherein the filter program is deployed at the proxy terminal;
and the pasting module is used for pasting the target clippings to the target equipment if the target clippings accord with the configuration strategy.
In a third aspect, the present application provides a computer device comprising: the data pruning method comprises the steps of storing computer instructions in a memory, and executing the computer instructions by the processor, wherein the memory and the processor are in communication connection, and the processor executes the data pruning method according to the first aspect or any corresponding implementation mode.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon computer instructions for causing a computer to perform the data pruning method of the first aspect or any of its corresponding embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present application, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow diagram of a data pruning method according to an embodiment of the present application;
FIG. 2 is a flow chart of another data pruning method according to an embodiment of the present application;
FIG. 3 is a flow chart of yet another data pruning method according to an embodiment of the present application;
fig. 4 is a schematic diagram of copying content from a terminal device to a server according to an embodiment of the present application;
fig. 5 is a schematic diagram of copying content from a server to a terminal device according to an embodiment of the present application;
FIG. 6 is a block diagram of a data clipping device according to an embodiment of the application;
fig. 7 is a schematic diagram of a hardware structure of a computer device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
At present, in the process of data remote transmission, research and development personnel have special resource requirements for IC research and development design besides common office resource requirements, and in addition, third-party outsourcers, software tool manufacturers and external test clients all have different and independent resource requirements. In the related art, FTP protocol and SFTP protocol are generally used to transfer data to a remote server. When the user only needs to transmit the character file or the picture file, the data uploaded to the remote server needs to be saved into a document or a compressed file, the processing flow is relatively troublesome, and inconvenience is brought to the user.
In accordance with an embodiment of the present application, a data pruning method embodiment is provided, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and that, although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order other than that shown or described herein.
In this embodiment, a data pruning method is provided, which is applied to a proxy terminal, and a user using a terminal device logs in remote control software, and can connect to a server through encrypted transmission of the proxy terminal, where all the transmissions adopt encrypted transmission, and fig. 1 is a flowchart of the data pruning method according to an embodiment of the present application, as shown in fig. 1, and the flowchart includes the following steps:
step S101, receiving a data clip request sent by a user.
In the embodiment of the application, the proxy terminal is a remote control host proxy terminal, a user logs in the terminal equipment, inputs a data clip request, sends the data clip request to the proxy terminal, and the proxy terminal receives the data clip request sent by the user.
Step S102, based on the data clip request, a storage location of the target clip content and the target device are determined.
In the embodiment of the application, the data clip request contains target clip content, such as characters or pictures. The data clip request also contains the storage location of the target clip content, such as which folder stored on which storage disk, or which paragraph the target clip content is the entire article, or which window the target clip content is in. The data clip request also includes a target device, where the target device is a terminal device or a server.
Step S103, extracting target clippings based on the storage position, and judging whether the target clippings accord with the configuration strategy of the filter program or not, wherein the filter program is deployed in the proxy terminal.
In the embodiment of the application, the target clip content is extracted based on the storage position of the target clip content, and the target clip content can be a character of a certain window, a document of a certain folder, or a certain paragraph of a certain document. The agent terminal is deployed with a filter program, the filter program can control the filter program C1 for audit, and the configuration strategy of the filter program comprises specifications of which contents can be pasted to the target device and which contents cannot be pasted to the target device.
Step S104, if the target clip content accords with the configuration strategy, the target clip content is pasted to the target device.
In the embodiment of the application, if the target clip content accords with the configuration policy, the target clip content is allowed to be pasted to the target device, and the target clip content can be copied from the terminal device to the server or from the server to the terminal device.
According to the data clipping method, the proxy terminal is used for encrypting and transmitting, the data clipping request is received, the storage position of the target clipping content is determined based on the data clipping request, the target clipping content is extracted, the content which the user wants to paste is determined, the target device is determined, the target clipping content pasting device is determined, the target clipping content is judged based on the filtering program of the proxy terminal, the target clipping content is filtered, the content which accords with the configuration strategy is pasted to the target device, the step that the user stores the transmitted content into a document or a compressed file is omitted, the remote transmission is not needed, the target clipping content which accords with the configuration strategy is directly pasted to the target device through the proxy terminal, and therefore the data transmission efficiency is greatly improved.
In this embodiment, a data pruning method is provided and applied to a proxy terminal, and fig. 2 is a flowchart of the data pruning method according to an embodiment of the present application, as shown in fig. 2, where the flowchart includes the following steps:
step S201, receiving a data clip request sent by a user.
Please refer to step S101 in the embodiment shown in fig. 1 in detail, which is not described herein.
Specifically, the step S201 includes:
in step S2011, a data clip request sent by a user through remote control software of a terminal device is received.
In the embodiment of the application, the terminal equipment is deployed with remote control software, and a user sends a data clip request to the proxy terminal through the remote control software when logging in the terminal equipment. The data clip request of the user is remotely acquired by acquiring a request sent by remote control software of the user on the terminal equipment.
Step S202, determining a storage position of target clip content and target equipment based on the data clip request.
Please refer to step S102 in the embodiment shown in fig. 1 in detail, which is not described herein.
Step S203, a first filtering specification and a second filtering specification are acquired. The first filtering specification comprises a character specification length and a sensitive field corresponding to the character clippings, and the second filtering specification comprises a picture size specification, an occupied space specification and a resolution specification corresponding to the picture clippings.
Step S204, configuring a configuration policy of the filter program based on the first filter specification and the second filter specification.
In the embodiment of the application, the configuration strategy of the filter program is configured based on the first filter specification and the second filter specification, and the proxy terminal deploys the filter program so that the proxy terminal automatically starts the filter program.
When the target clip content is a character, the character clip content corresponds to a first filter specification that includes a character specification length and a sensitive field. For example, the character specification length may be preset to 256 fields, i.e., 128 chinese. The sensitive fields may be "CPU", "WeChat", etc. The character specification length and the sensitive field may also be set according to the actual application scenario, which is only used herein as an example and not as a limitation.
When the target clip content is a picture, the picture clip content corresponds to a second filtering specification, and the second filtering specification comprises a picture size specification, an occupied space specification and a resolution specification. For example, it may be preset that the picture occupies a space of not more than 300KB, the resolution is not lower than 300dpi, and the size should be 800 (pixels) by 800 (pixels). The picture size specification, the occupied space specification and the resolution specification can also be set according to practical application scenes, and are only examples and are not limiting.
Wherein configuring the configuration policy of the filter based on the first filter specification and the second filter specification comprises:
adding a sensitive field corresponding to the character clippings to a configuration strategy of the filter program, and marking the sensitive field as refused to paste;
adding a picture size specification, an occupied space specification and a resolution specification corresponding to the picture clip content to a configuration strategy of a filter program, and marking pictures which do not accord with the picture size specification, the occupied space specification and the resolution specification as refused to be pasted.
In the embodiment of the application, a C1 audit control filter program is configured, a sensitive field is added to a C1 audit control filter program database, and refusal is marked; adding a suffix of the size of the picture specification to a C1 audit control filter program database, and if the picture exceeds an allowable range or the suffix name mismatch rule is absolutely passed; all permit or reject operations will be recorded to the C1 audit control filter database for ease of later duties.
It should be noted that, the configuration policy pasted to the local terminal device by the remote server and the configuration policy pasted to the remote server by the local terminal device are both the above configuration procedures.
Step S205, extracting target clip content based on the storage position, and judging whether the target clip content accords with the configuration strategy of the filter program, wherein the filter program is deployed on the proxy terminal.
Please refer to step S103 in the embodiment shown in fig. 1 in detail, which is not described herein.
In step S206, if the target clip content meets the configuration policy, the target clip content is pasted to the target device.
Please refer to step S104 in the embodiment shown in fig. 1 in detail, which is not described herein.
According to the data clipping method, the configuration strategy of the agent terminal filter program is configured through the acquired first filter specification and second filter specification, so that the target clipping content is filtered based on the first filter specification and the second filter specification, and the target clipping content is automatically filtered.
In this embodiment, a data pruning method is provided and applied to a proxy terminal, and fig. 3 is a flowchart of the data pruning method according to an embodiment of the present application, as shown in fig. 3, where the flowchart further includes the following steps:
step S301, a data clip request sent by a user is received.
Please refer to step S101 in the embodiment shown in fig. 1 in detail, which is not described herein.
Step S302, determining a storage location of the target clip content and the target device based on the data clip request.
Please refer to step S102 in the embodiment shown in fig. 1 in detail, which is not described herein.
Step S303, extracting target clip content based on the storage location, and judging whether the target clip content accords with the configuration strategy of the filter program.
Please refer to step S103 in the embodiment shown in fig. 1 in detail, which is not described herein.
Specifically, the step S303 includes:
in step S3031, the type of the target clip content is determined to be a character or a picture.
In step S3032, if the target clip content is a character, the target clip content does not include a sensitive field and meets the character specification length, it is determined that the target clip content meets the configuration policy of the filter.
Step S3033, if the target clip content is a picture and the target clip content accords with the picture size specification, the occupied space specification and the resolution specification, determining that the target clip content accords with the configuration strategy of the filter program.
In the embodiment of the application, the type of the target clip content is judged, characters can be recognized through OCR (optical character recognition ), and the judgment can be also carried out through an automatic recognition function of a server.
When the target clip content is a character, the target clip content does not have a sensitive field, and the character length accords with the character standard length, the target clip content can be pasted to the target device, namely, the target clip content is determined to accord with the configuration strategy of the filter program.
When the target clip content is a picture, the target clip content accords with the picture size specification, the occupied space specification and the resolution specification, and then the target clip content can be pasted to target equipment, namely, the target clip content is determined to accord with the configuration strategy of the filter program.
And judging the types of the target clippings so as to respectively judge the character clippings and the picture clippings, thereby respectively judging whether the clippings of each type meet the configuration strategy.
In step S304, if the target clip content is a character, the target clip content does not include a sensitive field and does not conform to the character specification length, and then the content conforming to the character specification length is pasted to the target device.
In the embodiment of the application, if the target clip content is a character, no sensitive field which is not allowed to be pasted is in the target clip content, but the character specification length is not met, namely the character specification length is exceeded. And pasting part of the content which accords with the character specification length to the target equipment, and refusing to paste the content which exceeds the character specification length to the target equipment.
In step S305, if the target clip content is a character and the target clip content includes a sensitive field, the target clip content is refused to be pasted to the target device.
In the embodiment of the application, if the target clippings are characters but contain sensitive fields, the target clippings are directly refused to be pasted so as to filter the sensitive fields.
In step S306, if the target clip content is a picture, the target clip content does not conform to at least one of the picture size specification, the occupied space specification and the resolution specification, and the target clip content is refused to be pasted to the target device.
In the embodiment of the application, if the target clip content is a picture, the picture does not conform to at least one of a picture size specification, an occupied space specification and a resolution specification, and does not conform to a configuration strategy. And setting a specification for the suffix name of the picture, and if the suffix name of the picture does not accord with the configuration strategy, still refusing to paste the picture to the target equipment.
According to the data clipping method provided by the embodiment, whether the character clipping content or the picture clipping content accords with the configuration strategy is judged, so that automatic filtering of the target clipping content is realized.
It should be noted that, as shown in fig. 4, when the target clip content of the terminal device U1 is allowed to be copied to the server S1, first, the user of the terminal device U1 sends a data clip request by logging in the remote control software E1 configured with the filter program C1, and the filter program C1 in the proxy terminal N1 determines the target clip content to determine whether the target clip content meets the configuration policy. If the configuration policy is met, the target clip content is allowed to be pasted to the server S1, and all the content pasted to the server S1 is recorded in the C1 database.
As shown in fig. 5, when the copying of the target clip content of the server S1 to the terminal device U1 is allowed, first, the user of the terminal device U1 sends a data clip request by logging in the remote control software E1 configured with the filter program C1, and copies the target clip content from the server S1 to the terminal device U1. The filter program C1 in the proxy terminal N1 determines the target clip content to determine whether the target clip content meets the configuration policy. If the configuration policy is met, the target clip content is allowed to be pasted to the terminal device U1, and all the content pasted to the terminal device U1 is recorded in the C1 database.
The contents of fig. 4 and 5 are combined:
taking a method for uploading and downloading clipboard data from a remote server by automatic audit filtration as an example, the specific application of the data clipboard method is as follows:
the application realizes that the user is remotely connected to the confidentiality working environment through the terminal equipment;
1. deploying a remote connection control host, and deploying remote connection control software E1; deploying an N1 remote connection proxy end and deploying remote control proxy software; the U1 user using the terminal device can connect to the server S1 by logging in the remote control software E1 and jumping through the N1 proxy.
a) Configuring a policy on the E1 remote connection control host to control the connection of the user U1 to the server S1, and configuring U1 to allow or prevent clipboard text characters or picture data from entering into the server S1;
b) Configuring a strategy on the E1 remote connection control host, thereby controlling the connection of the user U1 to the server S1, and configuring permission or prevention of the U1 from the server S1, obtaining text characters or picture data in a clipboard, sticking a local terminal, and obtaining remote server data by the U1;
c) Configuring a strategy on an E1 remote connection control host, thereby controlling a user U1 to be connected to a server S1, and configuring a length allowing the U1 to copy text characters from a local terminal to the server S1, and refusing to copy characters beyond the range to enter the server S1 if the length of the copied file characters exceeds the allowable length of the strategy;
d) Configuring a strategy on an E1 remote connection control host, thereby controlling a user U1 to be connected to a server S1, configuring a permission U1, acquiring the length of text characters of a clipboard from the server S1 to local terminal equipment, and refusing to copy the characters beyond the range to the local terminal if the length of the characters of the copied file exceeds the permission length of the strategy;
2. n1 is remotely connected with the proxy end, an audit control filter program C1 is deployed, and an audit control filter program C1 keyword on N1 is added for E1 configuration, so that E1 is automatically started, and the audit control filter program C1 on N1 is provided;
1. c1 audit control filter program is configured, sensitive fields are added to a C1 audit control filter program database, and refusal is marked; adding a suffix of the size of the picture specification to a C1 audit control filter program database, and if the picture exceeds an allowable range or the suffix name mismatch rule is absolutely passed; all permit or reject operations are recorded to a C1 audit control filter program database, so that the follow-up is convenient;
a) The U1 uses the local terminal equipment to connect to the server S1 through the E1 configured with the C1, the U1 copies the clip content from the local terminal equipment and must obey the policies of the E1 and the C1, if the C1 discovers that the U1 clip board content contains sensitive fields or directly refuses to pass beyond the picture specification, the method accords with the audit specification and allows to be pasted to the server S1, and all text picture data pasted to the server S1 are recorded in a C1 database;
b) U1 uses the local terminal equipment, E1 with configuration C1 connects to server S1, U1 copies and pastes the data content to the local terminal equipment from server S1 must obey E1, C1 tactics, if C1 monitor U1 copy clipboard text field from server S1, content contain sensitive field or surpass picture stipulation reject directly, accord with audit norm allow paste to U1 local terminal equipment, and all text picture data that paste to server S1 will be recorded to C1 database;
a) The repeated work of the operation and maintenance department is reduced;
b) The FTP tool used by a user due to copying and pasting text files is reduced;
c) The working efficiency of the user is improved;
d) Providing an operation and maintenance audit function;
e) And is convenient for following responsibility.
The embodiment also provides a data clipping device, which is used for implementing the above embodiment and the preferred implementation manner, and the description is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
The embodiment provides a data clipping device, which is applied to a proxy terminal, as shown in fig. 6, and includes:
the receiving module 601 is configured to receive a data clip request sent by a user.
A determining module 602, configured to determine, based on the data clip request, a storage location of the target clip content and the target device.
The judging module 603 is configured to extract the target clip content based on the storage location, and judge whether the target clip content meets the configuration policy of the filter program, where the filter program is deployed on the proxy terminal.
And the pasting module 604 is configured to paste the target clip content to the target device if the target clip content meets the configuration policy.
In some alternative embodiments, the receiving module 601 includes:
a receiving subunit, configured to receive a data clip request sent by a user through remote control software of the terminal device,
in some alternative embodiments, the apparatus further comprises:
the obtaining unit 605 is configured to obtain a first filtering specification and a second filtering specification, where the first filtering specification includes a character specification length and a sensitive field corresponding to the character clippings, and the second filtering specification includes a picture size specification, an occupied space specification and a resolution specification corresponding to the picture clippings.
A configuration unit 606 for configuring a configuration policy of the filter program based on the first filter specification and the second filter specification.
In some alternative embodiments, the determining module 603 includes:
and the judging unit is used for judging the type of the target clip content as characters or pictures.
The first determining unit is configured to determine that the target clip content meets a configuration policy of the filter if the target clip content is a character, the target clip content does not include a sensitive field, and the target clip content meets a character specification length.
And the second determining unit is used for determining that the target clip content accords with the configuration strategy of the filter program if the target clip content is a picture and the target clip content accords with the picture size specification, the occupied space specification and the resolution specification.
In some alternative embodiments, the apparatus further comprises:
and a pasting module 607, configured to paste the content that meets the character specification length to the target device if the target clip content is a character and the target clip content does not include a sensitive field and does not meet the character specification length.
In some alternative embodiments, the apparatus further comprises:
the first reject pasting module 608 is configured to reject pasting the target clip content to the target device if the target clip content is a character and the target clip content includes a sensitive field.
In some alternative embodiments, the apparatus further comprises:
the first reject pasting module 609 is configured to reject pasting the target clip content to the target device if the target clip content is a picture and the target clip content does not meet at least one of a picture size specification, an occupied space specification, and a resolution specification.
Further functional descriptions of the above respective modules and units are the same as those of the above corresponding embodiments, and are not repeated here.
The data pruning apparatus in this embodiment is presented in the form of functional units, herein referred to as ASIC (Application Specific Integrated Circuit ) circuits, processors and memories executing one or more software or fixed programs, and/or other devices that can provide the above described functionality.
The embodiment of the application also provides computer equipment, which is provided with the data clipping device shown in the figure 6.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a computer device according to an alternative embodiment of the present application, as shown in fig. 7, the computer device includes: one or more processors 10, memory 20, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are communicatively coupled to each other using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions executing within the computer device, including instructions stored in or on memory to display graphical information of the GUI on an external input/output device, such as a display device coupled to the interface. In some alternative embodiments, multiple processors and/or multiple buses may be used, if desired, along with multiple memories and multiple memories. Also, multiple computer devices may be connected, each providing a portion of the necessary operations (e.g., as a server array, a set of blade servers, or a multiprocessor system). It should be noted that all transmissions are encrypted transmissions, and one processor 10 is illustrated in fig. 7.
The processor 10 may be a central processor, a network processor, or a combination thereof. The processor 10 may further include a hardware chip, among others. The hardware chip may be an application specific integrated circuit, a programmable logic device, or a combination thereof. The programmable logic device may be a complex programmable logic device, a field programmable gate array, a general-purpose array logic, or any combination thereof.
Wherein the memory 20 stores instructions executable by the at least one processor 10 to cause the at least one processor 10 to perform a method for implementing the embodiments described above.
The memory 20 may include a storage program area that may store an operating system, at least one application program required for functions, and a storage data area; the storage data area may store data created according to the use of the computer device, etc. In addition, the memory 20 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage device. In some alternative embodiments, memory 20 may optionally include memory located remotely from processor 10, which may be connected to the computer device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Memory 20 may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as flash memory, hard disk, or solid state disk; the memory 20 may also comprise a combination of the above types of memories.
The computer device further comprises input means 30 and output means 40. The processor 10, memory 20, input device 30, and output device 40 may be connected by a bus or other means, for example in fig. 7.
The input means 30 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the computer device, such as a touch screen or the like. The output means 40 may comprise a display device or the like.
The embodiments of the present application also provide a computer readable storage medium, and the method according to the embodiments of the present application described above may be implemented in hardware, firmware, or as a computer code which may be recorded on a storage medium, or as original stored in a remote storage medium or a non-transitory machine readable storage medium downloaded through a network and to be stored in a local storage medium, so that the method described herein may be stored on such software process on a storage medium using a general purpose computer, a special purpose processor, or programmable or special purpose hardware. The storage medium can be a magnetic disk, an optical disk, a read-only memory, a random access memory, a flash memory, a hard disk, a solid state disk or the like; further, the storage medium may also comprise a combination of memories of the kind described above. It will be appreciated that a computer, processor, microprocessor controller or programmable hardware includes a storage element that can store or receive software or computer code that, when accessed and executed by the computer, processor or hardware, implements the methods illustrated by the above embodiments. All transmissions are encrypted transmissions.
Although embodiments of the present application have been described in connection with the accompanying drawings, various modifications and variations may be made by those skilled in the art without departing from the spirit and scope of the application, and such modifications and variations fall within the scope of the application as defined by the appended claims.

Claims (10)

1. A data pruning method, which is applied to a proxy terminal, the method comprising:
receiving a data clip request sent by a user;
determining a storage position of target clip content and target equipment based on the data clip request;
extracting the target clip content based on the storage position, and judging whether the target clip content accords with a configuration strategy of a filter program, wherein the filter program is deployed on the proxy terminal;
and if the target clip content accords with the configuration strategy, pasting the target clip content to the target device.
2. The method of claim 1, wherein receiving the data clip request sent by the user comprises:
and receiving a data clip request sent by a user through remote control software of the terminal equipment.
3. The method of claim 1, wherein prior to determining whether the target clip content complies with a configuration policy of a filter, the method further comprises:
acquiring a first filtering specification and a second filtering specification, wherein the first filtering specification comprises a character specification length and a sensitive field corresponding to character clippings, and the second filtering specification comprises a picture size specification, an occupied space specification and a resolution specification corresponding to picture clippings;
and configuring a configuration policy of the filter program based on the first filter specification and the second filter specification.
4. The method of claim 3, wherein the determining whether the target clip content complies with a configuration policy of a filter comprises:
judging the type of the target clip content as characters or pictures;
if the target clippings are characters, the target clippings do not contain sensitive fields and accord with the character standard length, and the target clippings are determined to accord with the configuration strategy of the filter program;
if the target clip content is a picture and the target clip content accords with the picture size specification, the occupied space specification and the resolution specification, determining that the target clip content accords with the configuration strategy of the filter program.
5. The method according to claim 4, wherein the method further comprises:
if the target clip content is a character, the target clip content does not contain a sensitive field and does not accord with the character standard length, and the content accord with the character standard length is pasted to the target equipment.
6. The method according to claim 4, wherein the method further comprises:
if the target clippings content is characters and contains sensitive fields, refusing to paste the target clippings content to the target equipment;
and if the target clip content is a picture, the target clip content does not accord with at least one of the picture size specification, the occupied space specification and the resolution specification, and the target clip content is refused to be pasted to the target equipment.
7. The method of claim 3, wherein the configuring a configuration policy for configuring a filter based on the first filter specification and the second filter specification comprises:
adding a sensitive field corresponding to character clippings to a configuration strategy of the filter program, and marking the sensitive field as refusal to paste;
and adding a picture size specification, an occupied space specification and a resolution specification corresponding to the picture clip content to a configuration strategy of the filter program, and marking the pictures which do not accord with the picture size specification, the occupied space specification and the resolution specification as refused to be pasted.
8. A data pruning device, characterized by being applied to a proxy terminal, the device comprising:
the receiving module is used for receiving a data clip request sent by a user;
the determining module is used for determining the storage position of the target clip content and the target equipment based on the data clip request;
the judging module is used for extracting the target clip content based on the storage position and judging whether the target clip content accords with a configuration strategy of a filter program, wherein the filter program is deployed at the proxy terminal;
and the pasting module is used for pasting the target clippings to the target equipment if the target clippings accord with the configuration strategy.
9. A computer device, comprising:
a memory and a processor, the memory and the processor being communicatively coupled to each other, the memory having stored therein computer instructions, the processor executing the computer instructions to perform the data pruning method of any one of claims 1-7.
10. A computer-readable storage medium having stored thereon computer instructions for causing a computer to perform the data pruning method of any one of claims 1-7.
CN202310896822.1A 2023-07-20 2023-07-20 Data pruning method and device, computer equipment and storage medium Pending CN116860483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310896822.1A CN116860483A (en) 2023-07-20 2023-07-20 Data pruning method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310896822.1A CN116860483A (en) 2023-07-20 2023-07-20 Data pruning method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116860483A true CN116860483A (en) 2023-10-10

Family

ID=88230353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310896822.1A Pending CN116860483A (en) 2023-07-20 2023-07-20 Data pruning method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116860483A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172081A (en) * 2017-06-28 2017-09-15 北京明朝万达科技股份有限公司 A kind of method and apparatus of data check
KR20190051646A (en) * 2017-11-07 2019-05-15 주식회사 틸론 Method for adding limitation on clipboard copy function under virtual desktop infra and virtualization system adotting the same
CN113656198A (en) * 2021-08-17 2021-11-16 北京百度网讯科技有限公司 Copying and pasting method and device from client to cloud mobile phone
CN113722124A (en) * 2021-09-03 2021-11-30 北京百度网讯科技有限公司 Content processing method, device, equipment and storage medium of cloud mobile phone
CN115080955A (en) * 2022-05-27 2022-09-20 网易(杭州)网络有限公司 Target data filtering method and device, electronic equipment and storage medium
CN115396421A (en) * 2022-07-12 2022-11-25 天冕信息技术(深圳)有限公司 Data transmission and filtering method and device, electronic equipment and storage medium
CN115599565A (en) * 2021-07-09 2023-01-13 荣耀终端有限公司(Cn) Method and device for sending clipboard data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172081A (en) * 2017-06-28 2017-09-15 北京明朝万达科技股份有限公司 A kind of method and apparatus of data check
KR20190051646A (en) * 2017-11-07 2019-05-15 주식회사 틸론 Method for adding limitation on clipboard copy function under virtual desktop infra and virtualization system adotting the same
CN115599565A (en) * 2021-07-09 2023-01-13 荣耀终端有限公司(Cn) Method and device for sending clipboard data
CN113656198A (en) * 2021-08-17 2021-11-16 北京百度网讯科技有限公司 Copying and pasting method and device from client to cloud mobile phone
CN113722124A (en) * 2021-09-03 2021-11-30 北京百度网讯科技有限公司 Content processing method, device, equipment and storage medium of cloud mobile phone
CN115080955A (en) * 2022-05-27 2022-09-20 网易(杭州)网络有限公司 Target data filtering method and device, electronic equipment and storage medium
CN115396421A (en) * 2022-07-12 2022-11-25 天冕信息技术(深圳)有限公司 Data transmission and filtering method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20130198211A1 (en) Information processing apparatus, information processing system, and data conversion method
US8661502B2 (en) Determining a sensitivity label of document information in real time
CN111741017B (en) Data transmission method between internal network and external network and related equipment
US20140351900A1 (en) Local proxy system and method
CN108446247B (en) Data interaction method and terminal
US20110061110A1 (en) Viewing Content Under Enterprise Digital Rights Management without a Client Side Access Component
CN111078140A (en) Nuclear power station file uploading management method and device, terminal equipment and medium
CN103685707B (en) A kind of document transmission method, system and equipment
CN105531977A (en) Mobile device connection control for synchronization and remote data access
US8479299B1 (en) Strategically reducing the accuracy of geotags in digital photographs
CN114925644A (en) Method for verifying logic system design in edge system and edge system
US8922828B2 (en) Determining scan priority of documents
CN115396421A (en) Data transmission and filtering method and device, electronic equipment and storage medium
EP3018590A1 (en) Document processing method and system in wireless communications device
CN103425501A (en) Application installation method, client, server side and system
US9432448B2 (en) Load dispersion system, control method for load dispersion system, and storage medium
CN116860483A (en) Data pruning method and device, computer equipment and storage medium
JP2007026357A (en) Information processing server, information processing system and program
CN114979125B (en) Method, device, terminal and storage medium for rapidly uploading files to network disk
US8417667B1 (en) Running commands on files using filename extensions to overload operations
US9280673B2 (en) Selectively allowing execution of a control command associated with a page description language in an image forming apparatus
US20160261674A1 (en) Providing a html file by picture transport protocol
JP2011118626A (en) Information processing system, file management server, control method, and program
US10063588B2 (en) Device and method for transferring files from a portable storage device
CN103353822A (en) Method and device for acquiring file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination