Check patentability & draft patents in minutes with Patsnap Eureka AI!

A kind of ghost file security checking method and device

A confidential inspection and file technology, applied in computer security devices, internal/peripheral computer component protection, digital data protection, etc., can solve data insecurity and other issues

Active Publication Date: 2020-03-31
北京鼎普科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above inspection method will leave traces of the GHOST file on the hard disk, that is to say, extract the content of the GHOST file to the hard disk for storage. Security, which is inconsistent with the purpose of confidentiality inspection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of ghost file security checking method and device
  • A kind of ghost file security checking method and device
  • A kind of ghost file security checking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0044] figure 1 It is a block diagram of the GHOST file security check method provided by the embodiment of the present invention, such as figure 1 As shown, the steps include:

[0045] Step S101: During the security check of the GHOST file in the computer, a virtual disk is set in the memory of the computer.

[0046] Step S102: Open the GHOST file, read the content of the GHOST file, and write the content of the GHOST file into the virtual disk.

[0047] Step S103: Perform a security check on the content of the GHOST file that has been written into the virtual disk, and unmount the virtual disk after completing the security check.

[0048] In this emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a GHOST file security inspection method and device, relating to the field of computer and information security. The method includes: during the security inspection of the GHOST file in the computer, setting a virtual disk in the memory of the computer; Open the GHOST file, extract the content of the GHOST file, and write the content of the GHOST file into the virtual disk; the content of the GHOST file written into the virtual disk is checked for security, and After completing the privacy check, unmount the virtual disk in question. In the embodiment of the present invention, the traceless inspection of the GHOST file is realized by writing the content of the GHOST file into the virtual disk set in the internal memory.

Description

technical field [0001] The invention relates to the field of computer and information security, in particular to a GHOST file security checking method and device. Background technique [0002] The GHOST file is produced by Symantec. It is widely used in various government agencies, schools, enterprises, hospitals and banks because it can realize the backup and restoration of various hard disk partition formats such as FAT16, FAT32, NTFS, OS2, EXT2, EXT3 and so on. middle. [0003] Such files also exist widely in general computer systems. Therefore, for the information security inspection system of the host, it is necessary to analyze and extract the content of the GHOST file, so as to check whether there is sensitive information in the GHOST file. [0004] The GHOST file cannot be opened and viewed directly. The purpose of the security check is to find out whether the GHOST file contains confidential information. Therefore, the first step of the security check is to open th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/80G06F21/60G06F21/62
CPCG06F21/602G06F21/6227G06F21/80G06F2221/2141
Inventor 于晴王振伟徐富豪
Owner 北京鼎普科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More