Unlock instant, AI-driven research and patent intelligence for your innovation.

A file copy monitoring method and system

A file copy and file technology, applied in the field of data security, can solve the problems of being easily terminated by force, unable to realize the copy process, unable to further monitor file copy activities, etc., to achieve the effect of improving the management system and simplifying the monitoring steps.

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Numerous DLP (Data Leak Protection) products also display 18 skills in file protection, but they are all based on the monitoring of the application layer, which is easy to be forced to end, and cannot realize the copying process mapped to the local network disk; in addition , the monitoring based on the application layer can only monitor the activities of a single folder, and cannot further monitor the copying activities of files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file copy monitoring method and system
  • A file copy monitoring method and system
  • A file copy monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0068] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0069] figure 1 A flow chart of a file copy monitoring method of the present invention is shown.

[0070] Such as figure 1 As shown, the first aspect of the present invention proposes a kind of fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file copy monitoring method and system. First start the file copy monitoring; then monitor the file opening operation and file creation operation, and create a stream context for the file object of the opening operation and the file object of the creation operation respectively; monitor the file reading operation, read information according to the file, and combine the reading The stream context of the operated file object determines whether the end of the file is read, and if so, saves the read record to the read file list readList; monitors the file write operation, and judges whether there is a read file based on the file write information and combined with the read file list. Get the record, if it exists, save the copy record to the file copy record linked list copyList; monitor the file closing operation, if it is write closed, then judge the file object of the read operation and the write operation in the file copy record linked list copyList Whether the file object is in the monitoring list of the application layer, if it exists, the corresponding copy record is reported to the monitoring software of the application layer, and the copy record is cleared in the file copy record linked list copyList at the same time.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a file copy monitoring method and system. Background technique [0002] In the information society, ensuring data security has become the consensus of people. Whether it is an individual, an enterprise, or a government, more and more investments are being made in data security. As one of the data carriers, the files on the computer are undoubtedly an important protection object for data security. Numerous DLP (Data Leak Protection) products also display 18 skills in file protection, but they are all based on the monitoring of the application layer, which is easy to be forced to end, and cannot realize the copying process mapped to the local network disk; in addition , monitoring based on the application layer can only monitor the activities of a single folder, and cannot further monitor the copying activities of files. Contents of the invention [0003] In order to sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/16
CPCG06F21/552G06F21/16
Inventor 宋志成韩金池郭鹏玉马盼盼廖正赟
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH