Check patentability & draft patents in minutes with Patsnap Eureka AI!

GHOST file security check method and apparatus

A security inspection and document technology, applied in computer security devices, internal/peripheral computer component protection, digital data protection, etc., can solve problems such as data insecurity

Active Publication Date: 2017-05-03
北京鼎普科技股份有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above inspection method will leave traces of the GHOST file on the hard disk, that is to say, extract the content of the GHOST file to the hard disk for storage. Security, which is inconsistent with the purpose of confidentiality inspection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GHOST file security check method and apparatus
  • GHOST file security check method and apparatus
  • GHOST file security check method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0044] figure 1 It is a block diagram of the GHOST file security check method provided by the embodiment of the present invention, such as figure 1 As shown, the steps include:

[0045] Step S101: During the security check of the GHOST file in the computer, a virtual disk is set in the memory of the computer.

[0046] Step S102: Open the GHOST file, read the content of the GHOST file, and write the content of the GHOST file into the virtual disk.

[0047] Step S103: Perform a security check on the content of the GHOST file that has been written into the virtual disk, and unmount the virtual disk after completing the security check.

[0048] In this emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a GHOST file security check method and apparatus, and relates to the field of computers and information security. The method comprises the steps of setting a virtual disk in a memory of a computer during security check of a GHOST file in the computer; opening the GHOST file through a tool, extracting contents of the GHOST file, and writing the contents of the GHOST file in the virtual disk; performing security check on the contents of the GHOST file written in the virtual disk, and after the security check is finished, uninstalling the virtual disk. According to the method and the apparatus provided by embodiments of the invention, the contents of the GHOST file are written in the virtual disk arranged in the memory, so that traceless check of the GHOST file is realized.

Description

technical field [0001] The invention relates to the field of computer and information security, in particular to a GHOST file security checking method and device. Background technique [0002] The GHOST file is produced by Symantec. It is widely used in various government agencies, schools, enterprises, hospitals and banks because it can realize the backup and restoration of various hard disk partition formats such as FAT16, FAT32, NTFS, OS2, EXT2, EXT3 and so on. middle. [0003] Such files also exist widely in general computer systems. Therefore, for the information security inspection system of the host, it is necessary to analyze and extract the content of the GHOST file, so as to check whether there is sensitive information in the GHOST file. [0004] The GHOST file cannot be opened and viewed directly. The purpose of the security check is to find out whether the GHOST file contains confidential information. Therefore, the first step of the security check is to open th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80G06F21/60G06F21/62
CPCG06F21/602G06F21/6227G06F21/80G06F2221/2141
Inventor 于晴王振伟徐富豪
Owner 北京鼎普科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More