Off-disk file traceability method, device, terminal and storage medium
A file and off-disk technology, applied in file systems, file system types, computer security devices, etc., can solve the problems of unable to achieve traceability of file leakage, unable to indicate the information of the file transfer process, etc., to achieve the effect of traceability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] figure 1 The flow chart of the off-disk file traceability method provided by Embodiment 1 of the present invention, this embodiment is applicable to the situation of traceability of the operation and transfer of files downloaded from the network disk, the method can be executed by the off-disk file traceability device, off-disk file The disk file traceability device can be realized by software, and can be integrated in the terminal that downloads the off-disk file and operates the off-disk file, specifically including the following steps:
[0032] Step 110, when receiving the running operation request of the off-disk file, detect whether the log recording process of the off-disk file is running normally, the off-disk file log is generated by the network disk when the off-disk file is downloaded, and is encapsulated in the off-disk file , and implant the corresponding off-disk file log recording process when the off-disk file download is completed.
[0033] In this embo...
Embodiment 2
[0045] figure 2 It is a schematic flowchart of the off-disk file tracing method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments. In this embodiment, when the running operation is editing, the off-disk file log running in the off-disk file operation sandbox is written into the running Operation information, the specific optimization is: generate a new version of the running log, and write the running operation information in the new version of the log.
[0046] Correspondingly, the off-disk file traceability method provided in this embodiment specifically includes:
[0047] Step 210, when receiving the running operation request of the off-disk file, detect whether the log recording process of the off-disk file is running normally, the off-disk file log is generated by the network disk when the off-disk file is downloaded, and is encapsulated in the off-disk file , and implant the corresponding of...
Embodiment 3
[0055] image 3 It is a schematic flowchart of the off-disk file tracing method provided by Embodiment 3 of the present invention. This embodiment is optimized based on the above embodiments. In this embodiment, the off-disk file is specifically optimized as: off-disk encrypted file, and the off-disk encrypted file includes: off-disk file, off-disk file log and sandbox Correspondingly, after receiving the operation request of the off-disk file, before detecting whether the logging process of the off-disk file is running normally, the following steps are added: according to the operation request of the off-disk encrypted file, the off-disk Encrypted files are decrypted; an off-disk file logging process is generated during the decryption process.
[0056] Correspondingly, the off-disk file traceability method provided in this embodiment specifically includes:
[0057] Step 310: When receiving the operation request of the off-disk encrypted file, decrypt the off-disk encrypted ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


