CN117951702A - Security scanning processing method, equipment and storage medium - Google Patents

Security scanning processing method, equipment and storage medium Download PDF

Info

Publication number
CN117951702A
CN117951702A CN202410123242.3A CN202410123242A CN117951702A CN 117951702 A CN117951702 A CN 117951702A CN 202410123242 A CN202410123242 A CN 202410123242A CN 117951702 A CN117951702 A CN 117951702A
Authority
CN
China
Prior art keywords
scanning
information
migrated
scanned
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410123242.3A
Other languages
Chinese (zh)
Inventor
蔡森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202410123242.3A priority Critical patent/CN117951702A/en
Publication of CN117951702A publication Critical patent/CN117951702A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a security scanning processing method, security scanning processing equipment and a storage medium. The method comprises the following steps: acquiring a migration scanning task sent by the built-in equipment through NFC or ultrasonic communication technology, wherein the migration scanning task comprises the following steps: information to be migrated and scanned and a scanning strategy; and according to the migration scanning task, adopting a scanning strategy to perform corresponding scanning treatment on the information to be migrated and scanned, obtaining a scanning result, and sending the scanning result to the built-in equipment. According to the method, the CPU load of the built-in equipment is shared by using the external scanning equipment, so that the CPU occupancy rate of the built-in equipment is reduced, and the office efficiency is improved.

Description

Security scanning processing method, equipment and storage medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method, an apparatus, and a storage medium for secure scanning processing.
Background
In the current office environment of a bank, in order to ensure data security, a bank generally uses file scanning software to monitor files on an office computer in real time. The file scanning software can timely discover and process malicious files or viruses through real-time scanning, detection and protection, and protect the safety of banking systems and data.
Currently, a general office computer typically has a Central Processing Unit (CPU) built therein for processing various tasks, including running document scanning software for real-time scanning, detection and protection. However, since the real-time monitoring of the file scanning software requires a large amount of computing resources, the CPU of the office computer is occupied for a long time, so that the office computer runs slowly and has a prolonged response time, and other normal business processes are affected, thereby reducing the efficiency of the business processes.
Based on this, in the prior art, there is a problem that the CPU occupancy rate of the office computer is high, resulting in a decrease in service processing efficiency.
Disclosure of Invention
The application provides a safe scanning processing method, equipment and a storage medium, which are used for solving the technical problem of service processing efficiency reduction caused by high CPU occupancy rate of an office computer.
In a first aspect, the present application provides a security scan processing method, including:
Acquiring a migration scanning task sent by the built-in equipment through NFC or ultrasonic communication technology, wherein the migration scanning task comprises the following steps: information to be migrated and scanned and a scanning strategy;
And according to the migration scanning task, adopting a scanning strategy to perform corresponding scanning treatment on the information to be migrated and scanned, obtaining a scanning result, and sending the scanning result to the built-in equipment.
Optionally, when the scanning policy is a virus scanning policy, the method adopts the scanning policy to perform corresponding scanning processing on the information to be migrated and scanned according to the migration scanning task, including:
And according to the task to be migrated, adopting a virus scanning strategy to perform virus scanning treatment on the information to be migrated.
Optionally, when the scanning policy is a sensitive scanning policy, the method adopts the scanning policy to perform corresponding scanning processing on the information to be migrated and scanned according to the migration scanning task, including:
According to the task to be migrated, a sensitive scanning strategy is adopted, a sensitive data word library is inquired, and sensitive data in the information to be migrated is compared;
The characters of the sensitive data word library are stored in a constant mode and in a variable mode respectively; the storage in a constant manner means that characters are stored in a specific character manner; storing in a variable manner refers to storing in a regular expression manner of a preset rule.
Optionally, in the method above, after performing the corresponding scanning processing on the information to be migrated and scanned, the method further includes:
Generating a corresponding MD5 value for each piece of data in the information to be migrated and scanned;
the scan result is sent to the built-in device, including:
and carrying the MD5 value corresponding to each data in the information to be migrated and scanned in a scanning result, and sending the scanning result to the built-in equipment, so that the built-in equipment records the MD5 value corresponding to each data in the information to be migrated and scanned, and modifying the scanning state corresponding to the MD5 value to be scanned.
In a second aspect, the present application provides another security scan processing method, including:
acquiring a scanning task, wherein the scanning task comprises information to be scanned and a scanning strategy;
according to the scanning task, taking the information to be scanned as the information to be migrated and scanned so as to generate the information to be migrated and scanned and the scanning strategy carried by the information to be migrated and scanned;
The method comprises the steps of sending a scanning task to be migrated to external scanning equipment through NFC or ultrasonic communication technology, enabling the external scanning equipment to conduct corresponding scanning treatment on information to be migrated according to the migration scanning task by adopting a scanning strategy, obtaining a scanning result, and sending the scanning result to internal equipment.
Optionally, the method as above further comprises:
According to the scanning task, analyzing the information to be scanned and the scanning strategy to evaluate the scanning type corresponding to the scanning task;
the information to be scanned is used as the information to be migrated to generate a task to be migrated carrying the information to be migrated and the scanning strategy, comprising the following steps:
when the scanning type belongs to the migration scanning type, the information to be scanned is used as the information to be migrated scanning so as to generate a task to be migrated scanning carrying the information to be migrated scanning and the scanning strategy.
Optionally, the method as above further comprises:
Receiving a scanning result carrying MD5 values corresponding to each data in the information to be migrated and scanned;
Recording MD5 values corresponding to each data in the information to be migrated and scanned according to the scanning result, and modifying the corresponding scanning state into a scanned state;
And after the data to be modified in the modification request is subjected to corresponding modification processing according to the received modification request, updating the MD5 value corresponding to the data to be modified and the corresponding scanning state of the MD5 value.
Optionally, the method as above further comprises:
Determining whether the data to be scanned in the information to be scanned records a corresponding MD5 value or whether the scanning state of the corresponding MD5 value is scanned;
the information to be scanned is taken as the information to be migrated and scanned, which comprises the following steps:
And when the data to be scanned is determined to have no corresponding MD5 value recorded or the scanning state of the corresponding MD5 value recorded is an unscanned state, classifying the data to be scanned into the scanning information to be migrated.
In a third aspect, the present application proposes an electronic device comprising: a processor, a memory communicatively coupled to the processor;
The memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method as in the present application.
In a fourth aspect, the application provides a computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out a method as described herein.
The application provides a safe scanning processing method, equipment and a storage medium, wherein the method acquires a migration scanning task sent by built-in equipment through NFC or ultrasonic communication technology, and the migration scanning task comprises the following steps: information to be migrated and scanned and a scanning strategy; and according to the migration scanning task, adopting a scanning strategy to perform corresponding scanning treatment on the information to be migrated and scanned, obtaining a scanning result, and sending the scanning result to the built-in equipment. Compared with the prior art, the method and the device have the advantages that the scanning task is processed only through the built-in Central Processing Unit (CPU) of the office equipment, so that the CPU occupancy rate is high, and the service processing efficiency is affected.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a diagram of a system architecture on which the security scan processing method of the present application is based;
Fig. 2 is a schematic flow chart of a security scanning processing method according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a security scanning processing method according to an embodiment of the present application;
fig. 4 is a schematic flow chart of a security scanning processing method according to an embodiment of the present application;
fig. 5 is a schematic flow chart of a security scanning processing method according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a security scanning processing method according to an embodiment of the present application;
fig. 7 is a schematic flow chart of a security scanning processing method according to an embodiment of the present application;
fig. 8 is a flow chart of a security scanning processing method according to an embodiment of the present application;
Fig. 9 is a schematic structural diagram of an external scanning device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a built-in device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
In the prior art, in order to ensure the data security of the current office environment of a bank, the bank generally uses file scanning software to monitor files on office equipment in real time, so as to prevent and treat malicious files or viruses.
However, since a CPU is generally equipped in the office equipment of the bank, and the real-time monitoring of the file by the file scanning software needs to occupy a large amount of computing resources, the occupancy rate of the CPU is high, and the high occupancy rate of the CPU can cause the office equipment to run slowly, so that the response time is prolonged, and the office efficiency is reduced.
Based on this, in the prior art, the document scanning task is only carried out by the CPU of the office equipment of the bank, so that the occupancy rate of the CPU is increased, and the office efficiency is reduced.
In order to solve the above problems, the application concept of the present application is: by adding the CPU, the workload of the CPU in the office equipment is shared, so that the occupancy rate of the CPU in the office equipment is reduced.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
FIG. 1 is a diagram of a system architecture based on which the security scan processing method of the present application is based, as shown in FIG. 1, the system includes: an external scanning device 11 and an internal device 12; the external scanning device 11 is connected with the internal device 12 through an NFC or ultrasonic communication technology, and specifically is configured to connect with the internal device 12 through the NFC or ultrasonic communication technology, obtain a migration scanning task sent by the internal device, perform corresponding scanning processing on information to be migrated in the migration scanning task according to a scanning policy in the migration scanning task, obtain a scanning result, and send the scanning result to the internal device 12; the built-in device 12 is used for acquiring a scanning task and generating a scanning task to be migrated, wherein the scanning task to be migrated carries information of scanning to be migrated and a scanning strategy.
Fig. 2 is a flow chart of a security scanning processing method according to an embodiment of the present application, as shown in fig. 2, where an execution body of the method is the external scanning device, the method may include:
s201, acquiring a migration scanning task sent by the built-in equipment through NFC or ultrasonic communication technology, wherein the migration scanning task comprises: information of scanning to be migrated and a scanning strategy.
In this embodiment, the external scanning device may implement non-contact point-to-point data transmission between devices through Near Field Communication (NFC), that is, a short-range high-frequency radio technology. Therefore, the migration scanning task sent by the built-in equipment is acquired by using NFC, so that the hardware cost of the equipment can be reduced; in addition, the NFC has lower power consumption, and can effectively save resources and cost; the NFC uses an encryption and authentication mechanism, so that the safety and the integrity of data are ensured; the NFC is short in use distance, is suitable for a banking office environment, and is high in data transmission rate due to the fact that short-distance transmission is used, and the risks of data theft and interference are reduced.
In addition, the external scanning equipment can realize data transmission and communication between the equipment through an ultrasonic communication technology, namely through ultrasonic signals. The ultrasonic communication technology has the advantages of strong interference resistance, long transmission distance and data transmission speed, so that data can be effectively prevented from being tampered or intercepted maliciously.
In this embodiment, for example, if the external scanning device is closer to the internal device, the migration scanning task sent by the internal device may be acquired by NFC. If the distance between the external scanning device and the internal device is far, the migration scanning task sent by the internal device can be obtained by adopting an ultrasonic communication technology.
In addition, for another example, if the migration scan task sent by the internal device is obtained by using the ultrasonic communication technology, the ultrasonic communication module in the external scan device may include: the system comprises an ultrasonic transmitter and an ultrasonic receiver, wherein the ultrasonic receiver decodes an ultrasonic signal after receiving the ultrasonic signal to obtain the content of a migration scanning task, and transmits the content of the migration scanning task to a CPU of external scanning equipment through a data bus.
S202, according to the migration scanning task, adopting a scanning strategy to perform corresponding scanning treatment on the information to be migrated and scanned, obtaining a scanning result, and sending the scanning result to the built-in equipment.
In this embodiment, the scanning strategy may include, for example, but is not limited to: virus scanning strategy, and sensitive scanning strategy. The virus scanning policy may refer to a policy for detecting whether the information to be migrated and scanned includes a computer virus. The sensitive scanning policy may refer to a policy of detecting whether sensitive data is included in information to be migrated scanned.
In this embodiment, a migration scan task sent by a built-in device is obtained by using an NFC or ultrasonic communication technology, where the migration scan task includes: information of scanning to be migrated and a scanning strategy. And according to the migration scanning task, adopting a scanning strategy to perform corresponding scanning treatment on the information to be migrated and scanned, obtaining a scanning result, and sending the scanning result to the built-in equipment. The migration scanning task is transferred to the external scanning equipment for processing, so that the workload of the internal equipment is reduced, the occupancy rate of the CPU of the internal equipment is reduced, the CPU of the internal equipment can process other tasks, and the office efficiency of the equipment is improved. Meanwhile, the external scanning device acquires the migration scanning task sent by the internal device through NFC or ultrasonic communication technology, so that the safety of data transmission is improved.
Fig. 3 is a flow chart of a security scanning processing method according to a second embodiment of the present application, and on the basis of the embodiment shown in fig. 1, as shown in fig. 3, a specific implementation manner of the step S202 is as follows:
s301, determining whether a scanning strategy is a virus scanning strategy or a sensitive scanning strategy; when it is determined that the scanning policy is a virus scanning policy, step S302 is performed; when it is determined that the scanning policy is a sensitive scanning policy, step S303 is performed.
S302, according to the task to be migrated, adopting a virus scanning strategy to perform virus scanning treatment on the information to be migrated. And (5) ending.
In this embodiment, the virus may refer to a computer virus, which is a malicious computer program, and when the external scanning device obtains a task to be migrated, a virus scanning strategy is adopted to compare information to be migrated and a feature code in a virus library, so as to determine whether the information to be migrated contains the computer virus; if the information to be migrated and scanned is the same as the feature codes in the virus library, the information to be migrated and scanned is characterized as containing computer viruses; if the information to be migrated and scanned is different from the feature codes in the virus library, the information to be migrated and scanned is characterized as not containing computer viruses.
S303, according to the scanning task to be migrated, a sensitive scanning strategy is adopted, a sensitive data word library is queried, and sensitive data in the information to be migrated is compared.
The characters of the sensitive data word library are stored in a constant mode and in a variable mode respectively; the storage in a constant manner means that characters are stored in a specific character manner; storing in a variable manner refers to storing in a regular expression manner of a preset rule.
In this embodiment, the format of the information with the migration scan includes, for example, but is not limited to, one or more of the following: after the external scanning terminal obtains the information to be migrated and scanned, the external scanning terminal performs text word segmentation on the information to be migrated and scanned through an artificial intelligent word segmentation method, and then performs query and comparison on the segmented words and a sensitive data word stock, wherein the characters of the sensitive data word stock are stored in a constant mode, and the method comprises the following steps of (but not limited to: customer name, bank card number; storing in a variable manner includes, but is not limited to, one or more of the following: the number string accords with the rule of the identification card number and the number string accords with the mobile phone number.
In the embodiment, the virus scanning treatment is adopted for the scanning strategy which is the virus scanning strategy, the query of the sensitive data word library is adopted for the scanning strategy which is the sensitive scanning strategy, and the comparison treatment is carried out on the sensitive data in the information to be migrated and scanned, so that different scanning requirements are accurately met, and the flexibility and expansibility of the scanning of the data are improved.
Fig. 4 is a flow chart of a security scanning processing method according to a third embodiment of the present application, and on the basis of the embodiments shown in fig. 2 to 3, as shown in fig. 4, the method may further include:
S401, generating a corresponding MD5 value for each piece of data in the information to be migrated and scanned.
In this embodiment, the MD5 (MESSAGE DIGEST, information summary Algorithm 5) value corresponding to each data in the information to be migrated and scanned is a widely used cryptographic hash function, which is used to ensure that the transmission of the information to be migrated and scanned between the external scanning device and the internal device is completely consistent, and for each data in the information to be migrated and scanned, the MD5 value corresponding to the data is unique, and if the data is modified, the corresponding MD5 value also changes, and accordingly, when the MD5 value changes, the corresponding data needs to be rescanned.
S402, carrying the MD5 value corresponding to each data in the information to be migrated and scanned in a scanning result, and sending the MD5 value to the built-in equipment, so that the built-in equipment records the MD5 value corresponding to each data in the information to be migrated and scanned, and modifying the corresponding scanning state into a scanned state.
In this embodiment, the built-in device records the MD5 value corresponding to each data in the information to be migrated and modifies the corresponding scanning state to the scanned state, and when the information to be migrated needs to be scanned again, the scanned state can be skipped and the corresponding data of the MD5 value is recorded, so that the repetitive operation of the external scanning device is reduced and the scanning efficiency of the external scanning device is improved.
In this embodiment, in order to ensure stable operation of the external scanning device and reduce occupation of resources of the internal device, the external scanning device is powered by an independent power supply, where the independent power supply may refer to a rechargeable battery or other power supply devices; in addition, when the CPU occupancy rate of the external scanning device reaches a preset occupancy rate threshold, the current other idle external scanning devices can be used for executing the scanning task, so that the scanning efficiency is further improved.
Fig. 5 is a flow chart of a security scanning processing method according to a fourth embodiment of the present application, as shown in fig. 5, where an execution body of the method is the built-in device shown in fig. 1, and the method may include:
S501, acquiring a scanning task, wherein the scanning task comprises information to be scanned and a scanning strategy.
In this embodiment, the built-in device obtains a scan task, where the scan task refers to whether to perform security scan processing on information in the built-in device, and writes the information that needs to perform security scan processing into the scan task as information to be scanned, and generates a corresponding scan policy.
S502, taking the information to be scanned as the information to be migrated and scanned according to the scanning task, so as to generate the task to be migrated carrying the information to be migrated and the scanning strategy.
In this embodiment, the scanning policy includes a virus scanning policy and a sensitive scanning policy; and responding to the scanning instructions aiming at different information to be migrated and scanned, and selecting different scanning strategies to meet different scanning requirements.
S503, transmitting the scanning task to be migrated to the external scanning device through NFC or ultrasonic communication technology, so that the external scanning device can correspondingly scan the information to be migrated according to the migration scanning task by adopting a scanning strategy, acquiring a scanning result and transmitting the scanning result to the internal device.
In this embodiment, for example, if the to-be-migrated scan task is sent to the external scan device by an ultrasonic communication technology, the internal device is connected to the corresponding ultrasonic communication module by the internal software, and the ultrasonic communication module includes: the device comprises an ultrasonic transmitter and an ultrasonic receiver, wherein the ultrasonic transmitter is used for transmitting a scanning task to be migrated to the external scanning device, so that the external scanning device adopts a scanning strategy according to the scanning task to be migrated, performs corresponding scanning treatment on information to be migrated to obtain a scanning result, and transmits the scanning result to the ultrasonic receiver in the internal device, and the ultrasonic receiver is used for decoding the scanning result and transmitting the scanning result to a CPU of the internal device through a data bus of the internal device.
In this embodiment, the built-in device acquires a scan task, where the scan task includes information to be scanned and a scan policy; according to the scanning task, taking the information to be scanned as the information to be migrated and scanned so as to generate the information to be migrated and scanned and the scanning strategy carried by the information to be migrated and scanned; the method comprises the steps of sending a scanning task to be migrated to external scanning equipment through NFC or ultrasonic communication technology, enabling the external scanning equipment to conduct corresponding scanning treatment on information to be migrated according to the migration scanning task by adopting a scanning strategy, obtaining a scanning result, and sending the scanning result to internal equipment. When the built-in equipment acquires the scanning task, the data which does not need to be scanned any more are screened out, so that the workload is reduced, the CPU load of the external scanning equipment is reduced, and the built-in equipment transmits the scanning task to the external scanning equipment, so that the CPU load of the built-in equipment is effectively lightened, and the office efficiency is improved.
Fig. 6 is a flow chart of a security scanning processing method according to a fifth embodiment of the present application, where, on the basis of the embodiment shown in fig. 5, as shown in fig. 6, the method further includes:
S601, analyzing the information to be scanned and the scanning strategy according to the scanning task so as to evaluate the scanning type corresponding to the scanning task.
In this embodiment, if the number of information to be scanned and the number of scanning strategies exceeds a preset threshold number, the scanning type corresponding to the scanning task is a large-scale scanning type, and if the occupancy rate of the information to be scanned and the scanning strategies to the CPU is higher than a preset occupancy rate threshold, the scanning type corresponding to the scanning task is a high-load scanning type; if the scanning type is neither a large-scale scanning type nor a high-load scanning type, the scanning type corresponding to the scanning task is a common scanning type, and the large-scale scanning type and the high-load scanning type are taken as migration scanning types.
In addition, correspondingly, a specific implementation manner of step S502 is:
S602, according to the scanning task, when the scanning type belongs to the migration scanning type, taking the information to be scanned as the information to be migrated, so as to generate the scanning task to be migrated carrying the information to be migrated and the scanning strategy.
In this embodiment, since the CPU occupancy rate of the migration scan type to the built-in device is high, the information to be scanned, which is the migration scan type, is used as the information to be migrated, and the task to be migrated, which carries the information to be migrated and the scan policy, is generated; for the information to be scanned of the common scanning type, the scanning task is directly executed in the built-in equipment.
In this embodiment, by classifying the scan types corresponding to the scan tasks, the internal scan device and the external scan device may perform the scan tasks together according to different situations, thereby improving scan efficiency.
Fig. 7 is a flow chart of a security scanning processing method according to a sixth embodiment of the present application, where, on the basis of the embodiments shown in fig. 5 to 6, as shown in fig. 7, the method further includes:
s701, receiving a scanning result of the MD5 value corresponding to each piece of data in the information carrying the scanning to be migrated.
In this embodiment, for each data in the information to be migrated and scanned, the corresponding MD5 value is unique, and if the data is modified, the corresponding MD5 value will also change, so as to ensure the consistency of data transmission.
For example, for a scanning result of an MD5 value corresponding to each data in the information to be migrated and scanned, if the MD5 value is a null value, the data is characterized as not being scanned, and the data is required to be scanned and written into a scanning task; if the MD5 value is not null, it is necessary to determine whether the MD5 value has changed, and if the MD5 value changes, it is necessary to perform the scanning again.
S702, recording MD5 values corresponding to each data in the information to be migrated and scanned according to the scanning result, and modifying the corresponding scanning state to be the scanned state.
In this embodiment, the initial MD5 value of the information to be migrated and scanned is defaulted to be null, the initial corresponding scanning state defaults to be an unscanned state, after the scanning result is obtained, the MD5 value corresponding to each data in the information to be migrated and scanned is recorded according to the scanning result, the corresponding scanning state is modified to be a scanned state, and the MD5 value corresponding to each data in the information to be migrated and scanned is modified to be the data in the scanned state, so that the data does not need to be rewritten to a scanning task and sent to an external scanning device, thereby reducing the workload of the external scanning device and further realizing the improvement of the service processing efficiency.
S703, after the data to be modified in the modification request is modified correspondingly according to the received modification request, updating the MD5 value corresponding to the data to be modified and the corresponding scanning state thereof.
In this embodiment, for example, if the data to be modified in the modification request is modified accordingly according to the received modification request, the MD5 value corresponding to the data to be modified is updated to a new MD5 value, and when the MD5 value corresponding to the data to be modified changes, the corresponding scanning state is updated to an unscanned state, and the MD5 value changes, and the corresponding scanning state is updated to the unscanned state data, and the data is resent to the external scanning device for security scanning, so that the security of the data can be monitored in real time.
Fig. 8 is a flow chart of a security scanning processing method according to a seventh embodiment of the present application, where, on the basis of the embodiment shown in fig. 7, as shown in fig. 8, the method further includes:
s801, determining whether the data to be scanned in the information to be scanned records the corresponding MD5 value or whether the scanning state of the corresponding MD5 value is scanned.
In this embodiment, if the data to be scanned in the information to be scanned has recorded the corresponding MD5 value, or the scanning state of the corresponding MD5 value is recorded as the scanned state, the information to be scanned is characterized to be scanned and not modified, and the scanning is not needed again.
S802, when the data to be scanned is determined to have no corresponding MD5 value recorded or the scanning state of the corresponding MD5 value recorded is an unscanned state, the data to be scanned is classified into the scanning information to be migrated.
In this embodiment, if the data to be scanned does not record the corresponding MD5 value, or if the scanning state of the corresponding MD5 value is the non-scanning state, the data to be scanned is characterized that the information to be scanned is not scanned or is scanned, but is modified after scanning, and therefore, the data to be scanned needs to be classified into the information to be migrated, so that the information to be scanned performs the corresponding scanning task.
Fig. 9 is a schematic structural diagram of an external scanning device according to an embodiment of the present application, as shown in fig. 9, the external scanning device 90 includes: an acquisition module 901 and a processing module 902. Wherein:
The acquiring module 901 is configured to acquire, by using NFC or an ultrasonic communication technology, a migration scan task sent by a built-in device, where the migration scan task includes: information of scanning to be migrated and a scanning strategy.
And the processing module 902 is configured to perform corresponding scanning processing on the information to be migrated and scanned by adopting a scanning strategy according to the migration scanning task, obtain a scanning result, and send the scanning result to the built-in device.
In an embodiment of the present application, the processing module 902 may be further specifically configured to:
And according to the task to be migrated, adopting a virus scanning strategy to perform virus scanning treatment on the information to be migrated.
In an embodiment of the present application, the processing module 902 may be further specifically configured to:
According to the task to be migrated, a sensitive scanning strategy is adopted, a sensitive data word library is inquired, and sensitive data in the information to be migrated is compared;
The characters of the sensitive data word library are stored in a constant mode and in a variable mode respectively; the storage in a constant manner means that characters are stored in a specific character manner; storing in a variable manner refers to storing in a regular expression manner of a preset rule.
In an embodiment of the present application, the processing module 902 may be further specifically configured to:
Generating a corresponding MD5 value for each piece of data in the information to be migrated and scanned;
the scan result is sent to the built-in device, including:
and carrying the MD5 value corresponding to each data in the information to be migrated and scanned in a scanning result, and sending the scanning result to the built-in equipment, so that the built-in equipment records the MD5 value corresponding to each data in the information to be migrated and scanned, and modifying the scanning state corresponding to the MD5 value to be scanned.
Fig. 10 is a schematic structural diagram of an internal device according to an embodiment of the present application, and as shown in fig. 10, the internal device 10 includes: an acquisition module 101, a generation module 102 and a transmission module 103. Wherein:
the acquisition module 101 is configured to acquire a scanning task, where the scanning task includes information to be scanned and a scanning policy;
The generating module 102 is configured to take the information to be scanned as information to be migrated and scanned according to the scanning task, so as to generate a scanning task to be migrated carrying the information to be migrated and scanned and a scanning policy;
the sending module 103 is configured to send the task to be migrated to the external scanning device through NFC or an ultrasonic communication technology, so that the external scanning device performs corresponding scanning processing on the information to be migrated according to the task to be migrated by adopting a scanning policy, obtains a scanning result, and sends the scanning result to the internal device.
In the embodiment of the present application, the obtaining module 101 may be further specifically configured to:
Receiving a scanning result carrying MD5 values corresponding to each data in the information to be migrated and scanned;
Recording MD5 values corresponding to each data in the information to be migrated and scanned according to the scanning result, and modifying the corresponding scanning state into a scanned state;
And after the data to be modified in the modification request is subjected to corresponding modification processing according to the received modification request, updating the MD5 value corresponding to the data to be modified and the corresponding scanning state of the MD5 value.
In an embodiment of the present application, the generating module 102 may be further specifically configured to:
According to the scanning task, analyzing the information to be scanned and the scanning strategy to evaluate the scanning type corresponding to the scanning task;
the information to be scanned is used as the information to be migrated to generate a task to be migrated carrying the information to be migrated and the scanning strategy, comprising the following steps:
when the scanning type belongs to the migration scanning type, the information to be scanned is used as the information to be migrated scanning so as to generate a task to be migrated scanning carrying the information to be migrated scanning and the scanning strategy.
In an embodiment of the present application, the generating module 102 may be further specifically configured to:
Determining whether the data to be scanned in the information to be scanned records a corresponding MD5 value or whether the scanning state of the corresponding MD5 value is scanned;
the information to be scanned is taken as the information to be migrated and scanned, which comprises the following steps:
And when the data to be scanned is determined to have no corresponding MD5 value recorded or the scanning state of the corresponding MD5 value recorded is an unscanned state, classifying the data to be scanned into the scanning information to be migrated.
Fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 11, the electronic device 11 includes:
the electronic device 11 may include one or more processing cores 'processors 111, one or more computer-readable storage media's memory 112, communication components 113, and the like. The processor 111, the memory 112, and the communication section 113 are connected via a bus 114.
In a specific implementation, at least one processor 111 executes computer-executable instructions stored in memory 112, causing at least one processor 111 to perform a secure scan processing method as described above.
The specific implementation process of the processor 111 may refer to the above-mentioned method embodiment, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
In the embodiment shown in fig. 11, it should be understood that the Processor may be a central processing unit (english: central Processing Unit, abbreviated as CPU), other general purpose processors, digital signal Processor (english: DIGITAL SIGNAL Processor, abbreviated as DSP), application-specific integrated Circuit (english: application SPECIFIC INTEGRATED Circuit, abbreviated as ASIC), and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
The Memory may include high-speed Memory (Random Access Memory, RAM) or may further include Non-volatile Memory (NVM), such as at least one disk Memory.
The bus may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (PERIPHERAL COMPONENT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, the buses in the drawings of the present application are not limited to only one bus or to one type of bus.
In some embodiments, a computer program product is also presented, comprising a computer program or instructions which, when executed by a processor, implement the steps of any of the above-described security scan processing methods.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.

Claims (10)

1. A method for secure scan processing, which is applied to an external scan device, the method comprising:
acquiring a migration scanning task sent by the built-in equipment through NFC or ultrasonic communication technology, wherein the migration scanning task comprises the following steps: information to be migrated and scanned and a scanning strategy;
and according to the migration scanning task, adopting the scanning strategy to perform corresponding scanning treatment on the information to be migrated and scanned, obtaining a scanning result, and sending the scanning result to the built-in equipment.
2. The method of claim 1, wherein when the scanning policy is a virus scanning policy, the performing, according to the migration scanning task, corresponding scanning processing on the information to be migrated and scanned by using the scanning policy includes:
And according to the task to be migrated, adopting the virus scanning strategy to perform virus scanning treatment on the information to be migrated.
3. The method of claim 1, wherein when the scanning policy is a sensitive scanning policy, the performing, according to the migration scanning task, corresponding scanning processing on the information to be migrated and scanned by using the scanning policy includes:
inquiring a sensitive data word stock according to the scanning task to be migrated and adopting the sensitive scanning strategy to compare sensitive data in the information to be migrated and scanned;
The characters of the sensitive data word library are stored in a constant mode and in a variable mode respectively; the storage in a constant manner means that characters are stored in a specific character manner; the variable mode storage means that the variable mode storage is performed in a regular expression mode of a preset rule.
4. A method according to any one of claims 1 to 3, characterized in that, after the corresponding scanning of the information to be migrated, the method further comprises:
Generating a corresponding MD5 value for each piece of data in the information to be migrated and scanned;
said sending said scan result to said built-in device comprises:
And carrying the MD5 value corresponding to each data in the information to be migrated and scanned in a scanning result, and sending the scanning result to the built-in equipment so that the built-in equipment records the MD5 value corresponding to each data in the information to be migrated and scanned, and modifying the corresponding scanning state into a scanned state.
5. A security scan processing method, applied to a built-in device, comprising:
acquiring a scanning task, wherein the scanning task comprises information to be scanned and a scanning strategy;
according to the scanning task, the information to be scanned is used as information to be migrated and scanned, so that a scanning task to be migrated carrying the information to be migrated and scanned and the scanning strategy is generated;
And sending the to-be-migrated scanning task to external scanning equipment through NFC or ultrasonic communication technology so that the external scanning equipment can perform corresponding scanning treatment on the to-be-migrated scanning information by adopting the scanning strategy according to the migration scanning task, acquiring a scanning result and sending the scanning result to the internal equipment.
6. The method as recited in claim 5, further comprising:
analyzing the information to be scanned and the scanning strategy according to the scanning task to evaluate the scanning type corresponding to the scanning task;
the step of taking the information to be scanned as information to be migrated to generate a task to be migrated carrying the information to be migrated and the scanning strategy, comprising:
And when the scanning type belongs to the migration scanning type, taking the information to be scanned as the information to be migrated scanning so as to generate a task to be migrated scanning carrying the information to be migrated scanning and the scanning strategy.
7. The method according to claim 5 or 6, further comprising:
Receiving a scanning result carrying MD5 values corresponding to each data in the information to be migrated and scanned;
Recording an MD5 value corresponding to each data in the information to be migrated and scanned according to the scanning result, and modifying the corresponding scanning state into a scanned state;
And after the data to be modified in the modification request is subjected to corresponding modification processing according to the received modification request, updating the MD5 value corresponding to the data to be modified and the corresponding scanning state of the MD5 value.
8. The method as recited in claim 7, further comprising:
Determining whether the data to be scanned in the information to be scanned records a corresponding MD5 value or whether the scanning state of the corresponding MD5 value is scanned;
the step of taking the information to be scanned as the information to be migrated and scanned includes:
And when the data to be scanned is determined to have no corresponding MD5 value recorded or the scanning state of the corresponding MD5 value recorded is an unscanned state, classifying the data to be scanned into the scanning information to be migrated.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
The memory stores computer-executable instructions;
The processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1-4 or to implement the method of any one of claims 5-8.
10. A computer readable storage medium having stored therein computer executable instructions for implementing the method of any of claims 1-4 or the method of any of claims 5-8 when executed by a processor.
CN202410123242.3A 2024-01-29 2024-01-29 Security scanning processing method, equipment and storage medium Pending CN117951702A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410123242.3A CN117951702A (en) 2024-01-29 2024-01-29 Security scanning processing method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410123242.3A CN117951702A (en) 2024-01-29 2024-01-29 Security scanning processing method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117951702A true CN117951702A (en) 2024-04-30

Family

ID=90803311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410123242.3A Pending CN117951702A (en) 2024-01-29 2024-01-29 Security scanning processing method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117951702A (en)

Similar Documents

Publication Publication Date Title
CN108810006B (en) Resource access method, device, equipment and storage medium
US10122693B2 (en) Protocol based key management
EP3376360A1 (en) Data storage device
CN116303290B (en) Office document detection method, device, equipment and medium
CN113114707B (en) Rule filtering method for power chip Ethernet controller
US20220291944A1 (en) Information processing device, anomaly detection method, and computer-readable recording medium
CN107819768B (en) Method for server to actively disconnect illegal long connection, terminal equipment and storage medium
CN115840938A (en) File monitoring method and device
US20120330498A1 (en) Secure data store for vehicle networks
CN112653668B (en) Data interaction method and device, computer equipment and storage medium
CN116305129B (en) Document detection method, device, equipment and medium based on VSTO
CN109522683A (en) Software source tracing method, system, computer equipment and storage medium
CN105791552A (en) Short message processing method, short message processing device and mobile terminal
US11874752B1 (en) Methods and systems for facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations
CN117951702A (en) Security scanning processing method, equipment and storage medium
CN110674499A (en) Method, device and storage medium for identifying computer threat
CN116028917A (en) Authority detection method and device, storage medium and electronic equipment
CN111625846B (en) System state recording method of mobile terminal equipment
CN106339301A (en) Method for acquiring operation log of TPM (Trusted Platform Module)
CN111177765A (en) Financial big data processing method, storage medium and system
CN112559469A (en) Data synchronization method and device
CN111291379A (en) Android-based vehicle-mounted system application detection method and device and electronic equipment
CN110941835B (en) Data processing method and electronic equipment
CN116305291B (en) Office document secure storage method, device, equipment and medium
CN115038089B (en) Multi-terminal data monitoring and collecting method based on information extraction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination