MX367589B - Método y dispositivo para monitorear un archivo en la partición del sistema. - Google Patents

Método y dispositivo para monitorear un archivo en la partición del sistema.

Info

Publication number
MX367589B
MX367589B MX2016003678A MX2016003678A MX367589B MX 367589 B MX367589 B MX 367589B MX 2016003678 A MX2016003678 A MX 2016003678A MX 2016003678 A MX2016003678 A MX 2016003678A MX 367589 B MX367589 B MX 367589B
Authority
MX
Mexico
Prior art keywords
system partition
files
target system
input event
monitoring
Prior art date
Application number
MX2016003678A
Other languages
English (en)
Other versions
MX2016003678A (es
Inventor
Wang Le
Zhu Ruixian
Li Minghao
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Publication of MX2016003678A publication Critical patent/MX2016003678A/es
Publication of MX367589B publication Critical patent/MX367589B/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1433Saving, restoring, recovering or retrying at system level during software upgrading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3433Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment for load management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3013Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is an embedded system, i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices, printers, automotive or aircraft systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • G06F11/3072Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data

Abstract

Se proporcionan en la descripción un método y dispositivo para monitorear un archivo en una partición del sistema. El método se aplica en una terminal móvil, e incluye: iniciar un servicio de monitoreo; crear un hilo de escucha en el servicio de monitoreo para escuchar un evento de entrada con respecto a una partición del sistema objetivo, el evento de entrada es una manipulación de un archivo en la partición del sistema objetivo; y registrar el evento de entrada en un archivo de registro cuando el evento de entrada con respecto a la partición del sistema objetivo se ha escuchado en el hilo de escucha. En la descripción, al crear un hilo de escucha para escuchar un archivo en una partición del sistema objetivo, y entonces registrar cualquier evento de entrada sucedida en el archivo en la partición del sistema objetivo, es capaz de saber qué tipo de manipulación se ha hecho en el archivo en la partición del sistema objetivo por otro software.
MX2016003678A 2015-11-13 2015-12-28 Método y dispositivo para monitorear un archivo en la partición del sistema. MX367589B (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510780666.8A CN105389507B (zh) 2015-11-13 2015-11-13 监控系统分区文件的方法及装置
PCT/CN2015/099251 WO2017080076A1 (zh) 2015-11-13 2015-12-28 监控系统分区文件的方法及装置

Publications (2)

Publication Number Publication Date
MX2016003678A MX2016003678A (es) 2018-06-22
MX367589B true MX367589B (es) 2019-08-28

Family

ID=55421783

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2016003678A MX367589B (es) 2015-11-13 2015-12-28 Método y dispositivo para monitorear un archivo en la partición del sistema.

Country Status (7)

Country Link
US (1) US20170139944A1 (es)
EP (1) EP3168747B1 (es)
JP (1) JP6420916B2 (es)
CN (1) CN105389507B (es)
MX (1) MX367589B (es)
RU (1) RU2639898C2 (es)
WO (1) WO2017080076A1 (es)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105868278B (zh) * 2016-03-22 2019-07-05 青岛海信移动通信技术股份有限公司 一种融合通信中的表情包的管理方法和装置
CN107634968A (zh) * 2017-10-19 2018-01-26 杭州安恒信息技术有限公司 基于Rsync的篡改恢复方法及系统
CN109002547B (zh) * 2018-07-30 2023-09-01 努比亚技术有限公司 日志文件存储方法、移动终端及计算机可读存储介质
CN109408473A (zh) * 2018-10-30 2019-03-01 深圳市理奥网络技术有限公司 一种防止文件误删的方法、装置、设备以及存储介质
CN110457192A (zh) * 2019-07-24 2019-11-15 北京小米移动软件有限公司 一种文件监控方法及装置、终端、存储介质
CN112306668A (zh) * 2019-07-31 2021-02-02 腾讯科技(深圳)有限公司 对象回收事件监听方法、装置和计算机可读存储介质
CN112015593B (zh) * 2020-08-27 2022-06-07 北京浪潮数据技术有限公司 Kubernetes集群的容灾备份方法及相关组件
CN113176978B (zh) * 2021-04-30 2023-07-21 平安壹钱包电子商务有限公司 基于日志文件的监控方法、系统、设备及可读存储介质
CN113553090B (zh) * 2021-07-26 2023-07-25 网易(杭州)网络有限公司 客户端应用程序的更新控制方法及装置
CN117742783A (zh) * 2024-02-19 2024-03-22 成都九洲电子信息系统股份有限公司 用于软件系统的日志数据跨语言自动记录方法

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10283241A (ja) * 1997-04-08 1998-10-23 Meidensha Corp 監視システムのメンテナンス方式
EP1194850A1 (en) * 1999-06-30 2002-04-10 Microsoft Corporation System and method for protecting shared system files
JP4733323B2 (ja) * 2001-09-17 2011-07-27 株式会社アール・アイ データ一括保護システム
JP4766826B2 (ja) * 2003-06-19 2011-09-07 アルパイン株式会社 データの復元装置および方法
JP4064914B2 (ja) * 2003-12-02 2008-03-19 インターナショナル・ビジネス・マシーンズ・コーポレーション 情報処理装置、サーバ装置、情報処理装置のための方法、サーバ装置のための方法および装置実行可能なプログラム
JP2007280096A (ja) * 2006-04-07 2007-10-25 Hitachi Ltd ログ保全方法、プログラムおよびシステム
JP2009205673A (ja) * 2008-02-01 2009-09-10 Canon Electronics Inc 記憶装置、情報処理装置、端末装置およびコンピュータプログラム
US7472420B1 (en) * 2008-04-23 2008-12-30 Kaspersky Lab, Zao Method and system for detection of previously unknown malware components
US20100070776A1 (en) * 2008-09-17 2010-03-18 Shankar Raman Logging system events
JP5396314B2 (ja) * 2010-03-10 2014-01-22 株式会社日立製作所 不正操作検知システム及び不正操作検知方法
US20120167218A1 (en) * 2010-12-23 2012-06-28 Rajesh Poornachandran Signature-independent, system behavior-based malware detection
RU2468427C1 (ru) * 2011-07-21 2012-11-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ защиты компьютерной системы от активности вредоносных объектов
EP2584484B1 (en) * 2011-10-17 2016-03-30 Kaspersky Lab, ZAO System and method for protecting a computer system from the activity of malicious objects
CN102968486B (zh) * 2012-11-26 2016-09-07 国电南瑞科技股份有限公司 一种基于变化日志的高可靠文件同步方法
US9298916B2 (en) * 2012-12-10 2016-03-29 Lookout, Inc. Method and apparatus for enhanced file system monitoring on mobile communications devices
CN103902893A (zh) * 2012-12-24 2014-07-02 珠海市君天电子科技有限公司 一种监控Android程序行为的方法及系统
WO2014102523A2 (en) * 2012-12-31 2014-07-03 British Telecommunications Public Limited Company Processing device and method of operation thereof
CN103198255B (zh) * 2013-04-03 2015-06-24 武汉大学 一种Android软件敏感行为监控与拦截方法及系统
CN103268448B (zh) * 2013-05-24 2016-04-20 北京网秦天下科技有限公司 动态检测移动应用的安全性的方法和系统
CN103530559A (zh) * 2013-09-27 2014-01-22 北京理工大学 一种Android系统的完整性保护系统
CN103679028A (zh) * 2013-12-06 2014-03-26 深圳酷派技术有限公司 软件行为监控方法和终端
CN104915220B (zh) * 2014-03-13 2019-08-16 中国移动通信集团安徽有限公司 一种客户端应用程序的升级方法和系统、客户端
RU148692U1 (ru) * 2014-07-22 2014-12-10 Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "ВОЕННАЯ АКАДЕМИЯ СВЯЗИ имени Маршала Советского Союза С.М. Буденного" Министерства обороны Российской Федерации Система мониторинга событий компьютерной безопасности
CN104217174A (zh) * 2014-09-05 2014-12-17 四川长虹电器股份有限公司 分布式文件安全存储系统及其存储方法
CN104504326A (zh) * 2014-12-05 2015-04-08 深圳天珑无线科技有限公司 一种检查系统文件完整性的方法
CN204740592U (zh) * 2015-07-21 2015-11-04 常州轻工职业技术学院 一种计算机数据监控系统

Also Published As

Publication number Publication date
US20170139944A1 (en) 2017-05-18
EP3168747B1 (en) 2018-06-06
JP2018506809A (ja) 2018-03-08
JP6420916B2 (ja) 2018-11-07
EP3168747A1 (en) 2017-05-17
CN105389507B (zh) 2018-12-25
RU2016109933A (ru) 2017-10-04
RU2639898C2 (ru) 2017-12-25
WO2017080076A1 (zh) 2017-05-18
CN105389507A (zh) 2016-03-09
MX2016003678A (es) 2018-06-22

Similar Documents

Publication Publication Date Title
MX2016003678A (es) Metodo y dispositivo para monitorear un archivo en la particion del sistema.
MX2015015143A (es) Metodo y dispositivo para borrar una escena inteligente.
MX364764B (es) Sistema y método para priorización y análisis de fallas.
SG11201805326RA (en) Locker operating method, and information sending method, apparatus and system
MX2016005066A (es) Metodo y dispositivo de alarma.
MX2016005072A (es) Metodo y dispositivo para proporcionar informacion para encontrar objetos.
MX2018004074A (es) Sistemas y metodos para el ajuste de dispositivos.
MX359948B (es) Metodo y aparato para procesar video de vigilancia.
MX2015009172A (es) Sistemas y metodos para identificar y reportar vulnerabilidades de aplicaciones y archivos.
EP3258409A4 (en) Device for detecting terminal infected by malware, system for detecting terminal infected by malware, method for detecting terminal infected by malware, and program for detecting terminal infected by malware
NZ621204A (en) System including operation device and information storing apparatus, method performed by the system, and the information storing apparatus
EP4246530A3 (en) Event detection using a variable threshold
GB2550006A (en) Establishing presence by identifying audio sample and position
EP2975388A4 (en) Blood condition analyzing device, blood condition analyzing system, blood condition analyzing method, and blood condition analyzing program for realizing method on computer
GB2549614A (en) Auditing of web-based video
PH12018500868A1 (en) Method, system, and device for process triggering
CA2855772C (en) System and method of performing continuous backup of a data file on a computing device
MX2015008811A (es) Metodo y dispositivo de monitoreo por video.
EP3598334A4 (en) METHOD FOR LOG MANAGEMENT, DEVICE FOR LOG MANAGEMENT, METHOD AND COMPUTER PROGRAM
MX2016010481A (es) Metodo y dispositivo para el control de equipo.
MX354030B (es) Método y dispositivo para enviar un mensaje.
IN2015CH04425A (es)
IN2014MU00315A (es)
PH12019500762B1 (en) Method and apparatus for implementing accessibility function in applications
EP3130136A4 (en) A system, device, method, software application and data signal for monitoring an interaction

Legal Events

Date Code Title Description
FG Grant or registration