Check patentability & draft patents in minutes with Patsnap Eureka AI!

File copy monitoring method and system

A file copy and file technology, applied in the field of data security, can solve the problems of being easily terminated by force, unable to realize the copy process, unable to further monitor file copy activities, etc., to achieve the effect of improving the management system

Active Publication Date: 2020-12-04
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Numerous DLP (Data Leak Protection) products also display 18 skills in file protection, but they are all based on the monitoring of the application layer, which is easy to be forced to end, and cannot realize the copying process mapped to the local network disk; in addition , the monitoring based on the application layer can only monitor the activities of a single folder, and cannot further monitor the copying activities of files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File copy monitoring method and system
  • File copy monitoring method and system
  • File copy monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to understand the above objects, features and advantages of the present invention more clearly, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments of the present application and the features in the embodiments may be combined with each other in the case of no conflict.

[0068] Many specific details are set forth in the following description to facilitate a full understanding of the present invention. However, the present invention can also be implemented in other ways different from those described herein. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. Example limitations.

[0069] figure 1 A flow chart of a file copy monitoring method of the present invention is shown.

[0070] like figure 1 As shown, a first aspect of the present invention provides a method for monitori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file copying monitoring method and system. The method comprises the steps of firstly, starting file copying monitoring; then monitoring a file opening operation and a file creating operation, and respectively creating a stream context for a file object of the opening operation and a file object of the creating operation; monitoring a file reading operation, judging whetherthe end of the file is read or not according to file reading information and the flow context of a file object of the reading operation, and if so, storing a reading record into a reading file linkedlist read List; monitoring file writing operation, judging whether a reading record exists or not by combining the reading file linked list according to file writing information, and if the reading record exists, storing the copying record into a file copying record linked list copyList; monitoring file closing operation, if yes, judging whether a file object of reading operation and a file object of writing operation in the file copy record linked list copyList are in a monitoring list of an application layer or not, and if yes, reporting a corresponding copy record to monitoring software ofthe application layer; and meanwhile, clearing the copy record in the file copy record linked list copyList.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and system for monitoring file copy. Background technique [0002] In the information society, ensuring data security has become a consensus. Whether it is individuals, enterprises, or governments, more and more investments are made in data security. As one of the data carriers, the file on the computer is undoubtedly an important protection object for data security. Numerous DLP (Data Leak Protection) products also perform eighteen martial arts in file protection, but they are all monitoring based on the application layer, which is easy to be forced to end, and cannot realize the copy process mapped to the local network disk; in addition , the monitoring based on the application layer can only monitor the activities of a single folder, and cannot further monitor the copying activities of files. SUMMARY OF THE INVENTION [0003] In order to solve the above pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/16
CPCG06F21/552G06F21/16
Inventor 宋志成韩金池郭鹏玉马盼盼廖正赟
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More