CN105550593A - Cloud disk file monitoring method and device based on local area network - Google Patents
Cloud disk file monitoring method and device based on local area network Download PDFInfo
- Publication number
- CN105550593A CN105550593A CN201510921132.2A CN201510921132A CN105550593A CN 105550593 A CN105550593 A CN 105550593A CN 201510921132 A CN201510921132 A CN 201510921132A CN 105550593 A CN105550593 A CN 105550593A
- Authority
- CN
- China
- Prior art keywords
- cloud disk
- disk file
- upload
- file
- user terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本发明实施例提供了一种基于局域网的云盘文件监控方法和装置,其中的方法具体包括:在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。本发明实施例能够防止用户终端随意上传或者下载云盘文件造成文件泄露或者威胁企业网安全的情况发生,以提高企业网的安全性。
The embodiment of the present invention provides a cloud disk file monitoring method and device based on a local area network, wherein the method specifically includes: when an upload or download operation for a cloud disk file is monitored, obtaining the cloud disk file control strategy corresponding to the user terminal where it is located ; Wherein, the cloud disk file control strategy is provided by the control terminal in the local area network; when the cloud disk file control strategy corresponding to the user terminal is prohibited, intercept the upload or download operation for the cloud disk file. The embodiments of the present invention can prevent user terminals from randomly uploading or downloading cloud disk files to cause file leakage or threaten the security of the enterprise network, so as to improve the security of the enterprise network.
Description
技术领域technical field
本发明涉及局域网技术领域,特别是涉及一种基于局域网的云盘文件监控方法和装置。The present invention relates to the field of local area network technology, in particular to a cloud disk file monitoring method and device based on a local area network.
背景技术Background technique
随着信息技术的迅猛发展,越来越多的用户通过云盘存储数据,其中,云盘是一种互联网存储工具,也是互联网云技术的产物,云盘通过互联网为企业和个人提供信息的储存、读取、下载等服务,具有安全稳定、海量存储的特点。With the rapid development of information technology, more and more users store data through cloud disks. Among them, cloud disks are an Internet storage tool and a product of Internet cloud technology. Cloud disks provide information storage for enterprises and individuals through the Internet. , reading, downloading and other services, with the characteristics of security, stability and mass storage.
对于企业网等局域网而言,可以通过云盘实现协同办公,利用云盘的全面存储、管控、移动、共享和协作的强大功能,使得企业业务流程得到优化、运营效率得到提高。For local area networks such as enterprise networks, collaborative office can be realized through cloud disks, and the powerful functions of comprehensive storage, control, movement, sharing and collaboration of cloud disks can be used to optimize business processes and improve operational efficiency.
然而,云盘在提供便利的同时也带来了信息安全的问题。例如在企业网内部,云盘服务器中通常存储有企业的重要文件,这些重要文件可以被企业内部有权限的人员进行下载,一旦这些重要文件被下载并且外泄后,很有可能给企业带来巨大的经济损失;此外,企业人员也可以向云盘上传文件,如果上传的文件中携带有恶意程序,恶意程序不仅会攻击企业的服务器,使得服务器崩溃,造成数据丢失,还会威胁企业网的安全。However, while cloud disks provide convenience, they also bring about information security issues. For example, within the enterprise network, the cloud disk server usually stores important files of the enterprise. These important files can be downloaded by authorized personnel within the enterprise. Once these important files are downloaded and leaked, it is likely to bring serious Huge economic losses; in addition, enterprise personnel can also upload files to the cloud disk. If the uploaded files carry malicious programs, the malicious programs will not only attack the enterprise server, cause the server to crash, cause data loss, but also threaten the security of the enterprise network. Safety.
发明内容Contents of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的一种基于局域网的云盘文件监控方法和装置。In view of the above problems, the present invention is proposed to provide a local area network-based cloud disk file monitoring method and device that overcomes the above problems or at least partially solves the above problems.
依据本发明的一个方面,提供了一种基于局域网的云盘文件监控方法,包括:According to an aspect of the present invention, a kind of cloud disk file monitoring method based on local area network is provided, comprising:
在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;When monitoring the upload or download operation for the cloud disk file, obtain the cloud disk file control strategy corresponding to the user terminal where it is located; wherein, the cloud disk file control strategy is provided by the control terminal in the local area network;
在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。When the cloud disk file control policy corresponding to the user terminal is forbidden, intercept the upload or download operation for the cloud disk file.
可选地,所述方法还包括:Optionally, the method also includes:
在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作。When the cloud disk file control policy corresponding to the user terminal is allowed, the upload or download operation for the cloud disk file is allowed to continue.
可选地,所述方法还包括:Optionally, the method also includes:
在执行所述针对云盘文件的上传或者下载操作的过程中,记录对应的操作信息;其中,所述操作信息包括如下信息中的至少一种:上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识;In the process of performing the upload or download operation for the cloud disk file, record the corresponding operation information; wherein, the operation information includes at least one of the following information: the behavior identifier corresponding to the upload or download operation, the execution of the The terminal identification of the user terminal for uploading or downloading operations, and the file identification of the cloud disk file;
将所述记录的操作信息上传至所述控制终端。uploading the recorded operation information to the control terminal.
可选地,通过如下步骤监测针对云盘文件的上传或者下载操作:Optionally, monitor upload or download operations for cloud disk files through the following steps:
监测云盘客户端针对云盘文件的上传或者下载操作;或者,Monitor cloud disk client upload or download operations for cloud disk files; or,
监测浏览器针对云盘文件的上传或者下载操作。Monitor browser upload or download operations for cloud disk files.
可选地,所述监测云盘客户端针对云盘文件的上传或者下载操作的步骤,包括:Optionally, the step of monitoring the upload or download operation of the cloud disk file by the cloud disk client includes:
对运行的进程的进程标识和预存的第一云盘标识进行匹配;Matching the process ID of the running process with the pre-stored first cloud disk ID;
在所述进程标识和第一云盘标识匹配时,确定所述进程为云盘客户端对应的进程;When the process identifier matches the first cloud disk identifier, it is determined that the process is a process corresponding to the cloud disk client;
监测所述云盘客户端对应的进程针对云盘文件的上传或者下载操作。Monitoring the process corresponding to the cloud disk client is aimed at uploading or downloading operations of cloud disk files.
可选地,所述监测浏览器针对云盘文件的上传或者下载操作的步骤,包括:Optionally, the steps of the monitoring browser for uploading or downloading operations of cloud disk files include:
解析所述浏览器中的统一资源定位符,得到关键字信息;Analyzing the Uniform Resource Locator in the browser to obtain keyword information;
对所述关键字信息和预存的第二云盘标识进行匹配;Matching the keyword information with the pre-stored second cloud disk identifier;
在所述关键字信息和第二云盘标识匹配时,确定所述浏览器当前网页为云盘操作网页;When the keyword information matches the second cloud disk identifier, it is determined that the current webpage of the browser is a cloud disk operation webpage;
监测所述浏览器当前网页中针对云盘文件的上传或者下载操作。Monitoring the uploading or downloading operation of the cloud disk file in the current webpage of the browser.
可选地,所述方法还包括:Optionally, the method also includes:
在执行所述针对云盘文件的上传操作之前,对所述云盘文件进行安全扫描;Before performing the upload operation for the cloud disk file, perform a security scan on the cloud disk file;
在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作。When it is determined through the security scan that the cloud disk file carries a malicious program, the upload operation is intercepted.
可选地,所述方法还包括:Optionally, the method also includes:
在执行所述针对云盘文件的下载操作之前,检测所述云盘文件是否为预置保护文件;Before performing the download operation for the cloud disk file, detect whether the cloud disk file is a preset protection file;
在检测到所述云盘文件为预置保护文件时,拦截所述下载操作。When detecting that the cloud disk file is a preset protected file, intercept the download operation.
根据本发明的另一方面,提供了一种基于局域网的云盘文件监控装置,包括:According to another aspect of the present invention, a kind of cloud disk file monitoring device based on local area network is provided, comprising:
操作监测模块,用于在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;及The operation monitoring module is used to obtain the cloud disk file control strategy corresponding to the user terminal where the user terminal is located when monitoring the upload or download operation for the cloud disk file; wherein, the cloud disk file control strategy is set by the control terminal in the local area network provide; and
操作拦截模块,用于在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。An operation interception module, configured to intercept the upload or download operation for the cloud disk file when the cloud disk file control policy corresponding to the user terminal is prohibited.
可选地,所述装置还包括:Optionally, the device also includes:
操作允许模块,用于在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作。The operation permission module is configured to allow the upload or download operation for the cloud disk file to continue to be performed when the cloud disk file control policy corresponding to the user terminal is allowed.
可选地,所述装置还包括:Optionally, the device also includes:
操作记录模块,用于在执行所述针对云盘文件的上传或者下载操作的过程中,记录对应的操作信息;其中,所述操作信息包括如下信息中的至少一种:上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识;An operation recording module, configured to record corresponding operation information during the process of performing the upload or download operation for the cloud disk file; wherein, the operation information includes at least one of the following information: upload or download operation corresponding Behavior identification, the terminal identification of the user terminal performing the upload or download operation, and the file identification of the cloud disk file;
记录上传模块,用于将所述记录的操作信息上传至所述控制终端。A record uploading module, configured to upload the recorded operation information to the control terminal.
可选地,所述操作监测模块包括:监测子模块,用于监测针对云盘文件的上传或者下载操作;Optionally, the operation monitoring module includes: a monitoring submodule for monitoring upload or download operations for cloud disk files;
所述监测子模块,包括:The monitoring submodule includes:
第一监测单元,用于监测云盘客户端针对云盘文件的上传或者下载操作;或者,The first monitoring unit is used to monitor the upload or download operation of the cloud disk client for the cloud disk file; or,
第二监测单元,用于监测浏览器针对云盘文件的上传或者下载操作。The second monitoring unit is used to monitor the uploading or downloading operation of the browser on the cloud disk file.
可选地,所述第一监测单元,包括:Optionally, the first monitoring unit includes:
第一匹配子单元,用于对运行的进程的进程标识和预存的第一云盘标识进行匹配;The first matching subunit is used to match the process ID of the running process with the pre-stored first cloud disk ID;
第一确定子单元,用于在所述进程标识和第一云盘标识匹配时,确定所述进程为云盘客户端对应的进程;The first determining subunit is configured to determine that the process is a process corresponding to the cloud disk client when the process identifier matches the first cloud disk identifier;
第一监测子单元,用于监测所述云盘客户端对应的进程针对云盘文件的上传或者下载操作。The first monitoring subunit is configured to monitor the upload or download operation of the cloud disk file by the process corresponding to the cloud disk client.
可选地,所述第二监测单元,包括:Optionally, the second monitoring unit includes:
解析子单元,用于解析所述浏览器中的统一资源定位符,得到关键字信息;The parsing subunit is used to parse the Uniform Resource Locator in the browser to obtain keyword information;
第二匹配子单元,用于对所述关键字信息和预存的第二云盘标识进行匹配;The second matching subunit is used to match the keyword information with the pre-stored second cloud disk identifier;
第二确定子单元,用于在所述关键字信息和第二云盘标识匹配时,确定所述浏览器当前网页为云盘操作网页;The second determining subunit is used to determine that the current webpage of the browser is a cloud disk operation webpage when the keyword information matches the second cloud disk identifier;
第二监测子单元,用于监测所述浏览器当前网页中针对云盘文件的上传或者下载操作。The second monitoring subunit is used to monitor the upload or download operation of the cloud disk file in the current webpage of the browser.
可选地,其特征在于,所述装置还包括:Optionally, it is characterized in that the device also includes:
扫描模块,用于在执行所述针对云盘文件的上传操作之前,对所述云盘文件进行安全扫描;A scanning module, configured to perform a security scan on the cloud disk file before performing the upload operation for the cloud disk file;
上传拦截模块,用于在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作。The upload interception module is configured to intercept the upload operation when it is determined through the security scan that malicious programs are carried in the cloud disk file.
可选地,所述装置还包括:Optionally, the device also includes:
文件检测模块,用于在执行所述针对云盘文件的下载操作之前,检测所述云盘文件是否为预置保护文件;A file detection module, configured to detect whether the cloud disk file is a preset protected file before performing the download operation for the cloud disk file;
下载拦截模块,用于在检测到所述云盘文件为预置保护文件时,拦截所述下载操作。The download interception module is configured to intercept the download operation when detecting that the cloud disk file is a preset protected file.
根据本发明实施例提供的一种基于局域网的云盘文件监控方法和装置,可以对云盘文件的上传和下载的操作行为进行监测,在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略,在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作;由于本发明实施例可以按照控制终端提供的云盘文件控制策略对用户终端中执行云盘文件的上传或者下载操作进行控制,其中,通过设置用户终端对应的云盘文件控制策略为禁止,可以拦截该用户终端中针对云盘文件的上传或者下载操作,因此可以防止用户终端随意上传或者下载云盘文件造成文件泄露或者威胁企业网安全的情况发生,以提高企业网的安全性。According to a cloud disk file monitoring method and device based on a local area network provided by an embodiment of the present invention, the operation behavior of uploading and downloading cloud disk files can be monitored, and when an upload or download operation for a cloud disk file is detected, obtain The cloud disk file control strategy corresponding to the user terminal where the user terminal is corresponding to the cloud disk file control strategy is prohibited, intercepting the upload or download operation for the cloud disk file; because the embodiment of the present invention can provide according to the control terminal The cloud disk file control policy of the user terminal controls the upload or download operation of the cloud disk file in the user terminal, wherein, by setting the cloud disk file control policy corresponding to the user terminal to prohibit, the upload of the cloud disk file in the user terminal can be blocked Or download operations, so it can prevent user terminals from uploading or downloading cloud disk files at will, causing file leakage or threatening the security of the enterprise network, so as to improve the security of the enterprise network.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.
附图说明Description of drawings
通过阅读下文可选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出可选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the alternative embodiments. The drawings are only for purposes of illustrating alternative embodiments and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same components. In the attached picture:
图1示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图;Fig. 1 shows a flow chart of the steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention;
图2示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图;Fig. 2 shows a flow chart of the steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention;
图3示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图;Fig. 3 shows a flow chart of the steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention;
图4示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图;以及Fig. 4 shows a flow chart of steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention; and
图5示出了根据本发明一个实施例的一种基于局域网的云盘文件监控装置的结构框图。Fig. 5 shows a structural block diagram of a cloud disk file monitoring device based on a local area network according to an embodiment of the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.
参照图1,示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图,具体可以包括如下步骤:Referring to Fig. 1, it shows a flow chart of steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention, which may specifically include the following steps:
步骤101、在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略可以为所述局域网中的控制终端所提供;Step 101. Obtain the cloud disk file control policy corresponding to the user terminal where the cloud disk file is uploaded or downloaded when monitoring; wherein, the cloud disk file control policy may be provided by the control terminal in the local area network;
步骤102、在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。Step 102, when the cloud disk file control strategy corresponding to the user terminal is forbidden, intercept the upload or download operation for the cloud disk file.
本发明实施例可以应用于企业网、政府网、校园网等局域网中;在上述局域网中,用户终端指可以通过云盘客户端或者浏览器执行云盘文件操作的终端设备;所述控制终端可用于提供控制策略,例如可以设置禁止/允许哪些用户终端上传或者下载云盘文件等,以防止局域网内文件泄露或者恶意程序的入侵。Embodiments of the present invention can be applied to local area networks such as enterprise networks, government networks, and campus networks; in the above-mentioned local area networks, user terminals refer to terminal devices that can perform cloud disk file operations through cloud disk clients or browsers; the control terminal can be used To provide control strategies, for example, you can set which user terminals are prohibited/allowed to upload or download cloud disk files, etc., to prevent file leakage or malicious program intrusion in the LAN.
在具体应用中,本发明对于制定云盘文件控制策略的具体方式不加以限制。例如,可以根据企业内各部门工作性质和云盘文件的相关性制定对应的云盘文件控制策略,比如,可以设置研发部门的用户终端对应的云盘文件控制策略为允许,而设置行政部门的用户终端对应的云盘文件控制策略为禁止。在实际应用中,由于企业的研发人员需要掌握企业的核心技术,并且进行研发工作,因此允许研发部门的用户终端上传或者下载企业内的云盘文件,并且通常研发部门的用户终端无法连接外网,从而可以在为研发人员的工作提供便利的基础上,防止企业的重要文件外泄以及恶意文件的入侵。由于行政部门的用户终端通常需要与外网连接,且行政部门的工作人员不需要访问企业的核心技术文件,因此,可以设置行政部门的用户终端对应的云盘文件控制策略为禁止,以防止企业的重要文件通过外网外泄以及恶意程序通过外网入侵企业网内部。In a specific application, the present invention does not limit the specific manner of formulating the cloud disk file control strategy. For example, corresponding cloud disk file control policies can be formulated according to the nature of work of various departments in the enterprise and the relevance of cloud disk files. The cloud disk file control policy corresponding to the user terminal is prohibited. In practical applications, since the R&D personnel of the enterprise need to master the core technology of the enterprise and carry out R&D work, the user terminals of the R&D department are allowed to upload or download cloud disk files in the enterprise, and usually the user terminals of the R&D department cannot connect to the external network , so that on the basis of providing convenience for the work of R&D personnel, it can prevent the leakage of important files of the enterprise and the intrusion of malicious files. Since the user terminals of the administrative department usually need to be connected to the external network, and the staff of the administrative department do not need to access the core technical files of the enterprise, the cloud disk file control policy corresponding to the user terminal of the administrative department can be set to prohibit to prevent the enterprise from Important files are leaked through the external network and malicious programs invade the enterprise network through the external network.
再例如,还可以通过控制终端周期性地收集来自局域网内各用户终端的安全扫描结果,通过对各用户终端的安全扫描结果进行分析,确定各用户终端的安全级别,对于安全级别较高的用户终端可以设置对应的云盘文件控制策略为允许,而对于安全级别较低的用户终端设置对应的云盘文件控制策略为禁止。通过周期性的收集来自局域网内各用户终端的安全扫描结果,在用户终端的安全级别发生变化时,可以对云盘文件控制策略进行相应的更新。For another example, the security scan results from each user terminal in the local area network can also be periodically collected through the control terminal, and the security level of each user terminal can be determined by analyzing the security scan results of each user terminal. For users with higher security levels The terminal can set the corresponding cloud disk file control policy to allow, and set the corresponding cloud disk file control policy to prohibit for a user terminal with a lower security level. By periodically collecting the security scanning results from each user terminal in the local area network, when the security level of the user terminal changes, the cloud disk file control policy can be updated accordingly.
可以理解,上述制定云盘文件控制策略的方式仅作为本发明的应用示例,在实际应用中,本领域技术人员可以根据实际需要灵活制定云盘文件控制策略。It can be understood that the above method of formulating a cloud disk file control strategy is only an application example of the present invention, and in practical applications, those skilled in the art can flexibly formulate a cloud disk file control strategy according to actual needs.
其中,上述用户终端和上述控制终端之间可以通过标准协议或者私有协议进行通信,其中,私有协议具有封闭性和安全性高的优点;可以理解,本发明实施例对于用户终端和控制终端之间的具体通信方式不加以限制。Wherein, the above-mentioned user terminal and the above-mentioned control terminal can communicate through a standard protocol or a private protocol, wherein the private protocol has the advantages of closure and high security; The specific communication method is not limited.
在实际应用中,控制终端的用户可以是网络管理员等具有一定的网络安全知识的高级用户,因此,控制终端的用户可以根据局域网的当前安全需求和实际情况,灵活地制定相应的云盘文件控制策略,以提高企业网的安全性。In practical applications, the user of the control terminal can be an advanced user such as a network administrator with certain knowledge of network security. Therefore, the user of the control terminal can flexibly formulate corresponding cloud disk files according to the current security requirements and actual conditions of the LAN Control policies to improve the security of the enterprise network.
在本发明实施例中,在用户终端上可以设置有监测模块,用于监测用户终端上是否有对云盘文件的上传或者下载操作。在监测到用户终端上有执行针对云盘文件的上传或者下载操作时,则可以从所述局域网内的控制终端读取所述用户终端对应的云盘文件控制策略;根据所述控制终端中设置的所述用户终端对用的云盘文件控制策略,执行对应的控制操作。具体地,在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述用户终端执行针对云盘文件的上传或者下载操作。In the embodiment of the present invention, a monitoring module may be provided on the user terminal to monitor whether there is an upload or download operation on the cloud disk file on the user terminal. When it is detected that there is an upload or download operation for the cloud disk file on the user terminal, the cloud disk file control strategy corresponding to the user terminal can be read from the control terminal in the local area network; according to the settings in the control terminal The user terminal executes a corresponding control operation for the cloud disk file control strategy used. Specifically, when the cloud disk file control policy corresponding to the user terminal is forbidden, intercept the user terminal from performing an upload or download operation on the cloud disk file.
可以理解,本发明对于上述云盘文件控制策略的获取方式不加以限制,例如,可以将云盘文件控制策略存储在控制终端,用户终端通过局域网访问控制终端在线查询对应的云盘文件控制策略,或者,控制终端可以将上述云盘文件控制策略下发至用户终端,以使用户终端可以在本地进行查询。It can be understood that the present invention does not limit the acquisition method of the above-mentioned cloud disk file control strategy. For example, the cloud disk file control strategy can be stored in the control terminal, and the user terminal can query the corresponding cloud disk file control strategy online through the local area network access control terminal. Alternatively, the control terminal may issue the above-mentioned cloud disk file control policy to the user terminal, so that the user terminal can query locally.
在本发明的一种可选实施例中,上述方法还可以包括:In an optional embodiment of the present invention, the above method may also include:
在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作。When the cloud disk file control policy corresponding to the user terminal is allowed, the upload or download operation for the cloud disk file is allowed to continue.
在本发明的一种应用示例中,控制终端可以为每个用户终端制定对应的云盘文件控制策略,并通过企业局域网下发到对应的用户终端。其中,云盘文件控制策略可以通过一张映射表来表示,在该映射表中可以包括用户终端的终端标识以及对应云盘文件控制策略的映射关系,参照表1,示出了本发明的一种云盘文件控制策略对应的映射表的具体示意。In an application example of the present invention, the control terminal can formulate a corresponding cloud disk file control policy for each user terminal, and issue it to the corresponding user terminal through the enterprise local area network. Among them, the cloud disk file control strategy can be represented by a mapping table, which can include the terminal identifier of the user terminal and the mapping relationship corresponding to the cloud disk file control strategy. Referring to Table 1, it shows a The specific illustration of the mapping table corresponding to the cloud disk file control strategy.
表1Table 1
在上述表1中,终端标识采用的是用户终端的MAC(MediaAccessControl,媒体访问控制)地址,可以理解,在实际应用中,本发明对于终端标识不加以限制,例如还可以采用用户终端的IP地址等。In the above Table 1, the terminal identification uses the MAC (MediaAccessControl, Media Access Control) address of the user terminal. It can be understood that in practical applications, the present invention does not limit the terminal identification, for example, the IP address of the user terminal can also be used Wait.
在具体应用中,在拦截所述用户终端执行针对云盘文件的上传或者下载操作之后,还可以在显示界面显示提示信息,以告知用户当前的终端设备禁止执行对云盘文件的上传或者下载操作。In a specific application, after the user terminal is intercepted to perform an upload or download operation on a cloud disk file, a prompt message may also be displayed on the display interface to inform the user that the current terminal device is prohibited from performing an upload or download operation on the cloud disk file .
在实际应用中,可以通过两种方式访问云盘文件,一种是通过用户终端中安装的云盘客户端进行访问,具体地,用户在云盘客户端中输入用户名和密码进行登陆后,即可对云盘文件执行相应的操作;另一种是通过用户终端中的浏览器进行访问,具体地,在浏览器中打开云盘的登录页面,在登陆页面中输入用户名和密码进行登陆后,即可进入云盘操作页面对云盘文件执行相应的操作。因此,本发明实施例针对这两种访问方式对云盘文件的操作进行监测。In practical applications, there are two ways to access cloud disk files. One is to access through the cloud disk client installed in the user terminal. Specifically, after the user enters the user name and password in the cloud disk client to log in, the You can perform corresponding operations on cloud disk files; the other is to access through the browser in the user terminal. Specifically, open the login page of the cloud disk in the browser, and enter the user name and password on the login page to log in. You can enter the cloud disk operation page to perform corresponding operations on cloud disk files. Therefore, the embodiment of the present invention monitors the operation of the cloud disk file for these two access methods.
在本发明的一种可选实施例中,可以通过如下步骤监测针对云盘文件的上传或者下载操作:In an optional embodiment of the present invention, the upload or download operation for cloud disk files can be monitored through the following steps:
监测云盘客户端针对云盘文件的上传或者下载操作;或者,Monitor cloud disk client upload or download operations for cloud disk files; or,
监测浏览器针对云盘文件的上传或者下载操作。Monitor browser upload or download operations for cloud disk files.
在本发明的另一种可选实施例中,所述监测云盘客户端针对云盘文件的上传或者下载操作的步骤,具体可以包括如下子步骤:In another optional embodiment of the present invention, the step of monitoring the upload or download operation of the cloud disk file by the cloud disk client may specifically include the following sub-steps:
子步骤S11、对运行的进程的进程标识和预存的第一云盘标识进行匹配;Sub-step S11, matching the process ID of the running process with the pre-stored first cloud disk ID;
子步骤S12、在所述进程标识和第一云盘标识匹配时,确定所述进程为云盘客户端对应的进程;Sub-step S12, when the process identifier matches the first cloud disk identifier, determine that the process is a process corresponding to the cloud disk client;
子步骤S13、监测所述云盘客户端对应的进程针对云盘文件的上传或者下载操作。Sub-step S13, monitoring the uploading or downloading operation of the cloud disk file by the process corresponding to the cloud disk client.
在本发明实施例中,可以预先存储第一云盘标识,该第一云盘标识可以包括目前常用的云盘客户端的名称或者数字签名等信息,可用于标识不同的云盘客户端。例如,预先存储的第一云盘标识包括:百度云盘、360云盘等。In the embodiment of the present invention, the first cloud disk identifier may be stored in advance, and the first cloud disk identifier may include information such as names or digital signatures of currently commonly used cloud disk clients, and may be used to identify different cloud disk clients. For example, the pre-stored first cloud disk identifier includes: Baidu cloud disk, 360 cloud disk, etc.
在具体应用中,用户终端运行的进程有很多,可以将这些进程的进程标识和预存的第一云盘标识进行匹配。例如,在用户终端运行的进程中,存在和第一云盘标识“360云盘”匹配的进程标识,则可以确定该进程为360云盘客户端对应的进程,然后即可监测该进程针对云盘文件的上传或者下载操作。In a specific application, there are many processes running on the user terminal, and the process IDs of these processes can be matched with the pre-stored first cloud disk ID. For example, if there is a process identifier matching the first cloud disk identifier "360 cloud disk" in the process running on the user terminal, it can be determined that the process is the process corresponding to the 360 cloud disk client, and then the process can be monitored for cloud Disk file upload or download operation.
在本发明实施例中,可以通过一个后台进程对用户终端中针对云盘文件操作的事件(例如上传或者下载)进行监测。具体地,可以通过多种方式实现该监测过程。例如,可以监听用户终端操作系统发出的广播消息,通过对系统广播消息的过滤,获知云盘文件被操作的事件。也即,后台进程可以对每一个广播的系统消息进行判断,如果消息类型为云盘文件被操作的事件,则可以从中提取出被操作的云盘文件的文件名、后缀名等信息。In the embodiment of the present invention, events (such as uploading or downloading) of cloud disk files in the user terminal can be monitored through a background process. Specifically, the monitoring process can be realized in various ways. For example, it is possible to listen to the broadcast messages sent by the operating system of the user terminal, and to know the event that the cloud disk file is operated by filtering the system broadcast messages. That is, the background process can judge each broadcasted system message, and if the message type is an event that a cloud disk file is operated, information such as the file name and suffix name of the operated cloud disk file can be extracted therefrom.
或者,也可以利用用户终端操作系统的API(ApplicationProgrammingInterface,应用程序编程接口)钩子函数,对云盘文件被操作的事件进行监听。在本发明实施例中,利用后台进程提供钩子函数,并将系统原本执行文件操作的调用函数转向钩子函数(通常通过修改函数入口地址实现),这样钩子函数就能够获得被操作的云盘文件的文件名、后缀名等信息,完成对文件被操作事件的监听。Alternatively, an API (Application Programming Interface, Application Programming Interface) hook function of the operating system of the user terminal may also be used to monitor the event that the cloud disk file is operated. In the embodiment of the present invention, the background process is used to provide the hook function, and the call function that the system originally performs the file operation is transferred to the hook function (usually realized by modifying the function entry address), so that the hook function can obtain the address of the operated cloud disk file File name, suffix name and other information to complete the monitoring of file operation events.
可以理解,通过上述两种方式检测云盘文件的上传或者下载操作仅作为本发明的一种应用示例,在实际应用中,本发明对于云盘文件的上传或者下载操作的监测方式不加以限制,既可以在应用层监测,也可以在驱动层进行监测。It can be understood that the detection of uploading or downloading operations of cloud disk files through the above two methods is only used as an application example of the present invention. In practical applications, the present invention does not limit the monitoring method of uploading or downloading operations of cloud disk files. It can be monitored both at the application layer and at the driver layer.
在本发明的一种可选实施例中,所述监测浏览器针对云盘文件的上传或者下载操作的步骤,具体可以包括如下子步骤:In an optional embodiment of the present invention, the step of monitoring the browser's upload or download operation of the cloud disk file may specifically include the following sub-steps:
子步骤S21、解析所述浏览器中的统一资源定位符,得到关键字信息;Sub-step S21, analyzing the URL in the browser to obtain keyword information;
子步骤S22、对所述关键字信息和预存的第二云盘标识进行匹配;Sub-step S22, matching the keyword information with the pre-stored second cloud disk identifier;
子步骤S23、在所述关键字信息和第二云盘标识匹配时,确定所述浏览器当前网页为云盘操作网页;Sub-step S23, when the keyword information matches the second cloud disk identifier, determine that the current webpage of the browser is a cloud disk operation webpage;
子步骤S24、监测所述浏览器当前网页中针对云盘文件的上传或者下载操作。Sub-step S24, monitoring the upload or download operation of the cloud disk file in the current webpage of the browser.
其中,第二云盘标识用于标识不同云盘URL(UniformResourceLocator,统一资源定位符)中的关键字信息。在本发明的一种应用示例中,预先存储的第二云盘标识包括:pan.baidu、yunpan.360、weiyun,分别表示百度云盘、360云盘和微云,假设浏览器中的统一资源定位符URL为:http://pan.baidu.com/#list/path=%2F,通过解析该URL,可以得到关键字信息pan.baidu,将该关键字信息和预先存储的第二云盘标识进行匹配,可以得到该关键字信息和存储的第二云盘标识中的“pan.baidu”相匹配,则可以确定浏览器当前网页为云盘操作网页。Wherein, the second cloud disk identifier is used to identify keyword information in different cloud disk URLs (UniformResourceLocator, Uniform Resource Locator). In an application example of the present invention, the pre-stored second cloud disk identifiers include: pan.baidu, yunpan.360, and weiyun, respectively representing Baidu cloud disk, 360 cloud disk and Weiyun, assuming a unified resource in the browser The locator URL is: http://pan.baidu.com/#list/path=%2F, by analyzing the URL, you can get the keyword information pan.baidu, and combine the keyword information with the pre-stored second cloud disk ID matching, it can be obtained that the keyword information matches the stored second cloud disk ID "pan.baidu", then it can be determined that the browser's current webpage is a cloud disk operation webpage.
接下来监测当前网页中针对云盘文件的上传或者下载操作。例如,监测到针对文件下载操作的HTTP(HyperTextTransferProtocol,超文本传输协议)请求,该HTTP请求对应的URL信息为:http://www.weiyun.com/disk/aa.pdf,通过对该URL进行解析,可知当前请求下载名称为aa.pdf的文件。Next, monitor the upload or download operations for cloud disk files on the current web page. For example, an HTTP (HyperTextTransferProtocol, hypertext transfer protocol) request for a file download operation is detected, and the URL information corresponding to the HTTP request is: http://www.weiyun.com/disk/aa.pdf, by performing a Analysis shows that the current request is to download a file named aa.pdf.
可以理解,上述HTTP协议仅作为本发明的一种应用示例,在实际应用中,本发明对于上传或者下载云盘文件的传输协议不加以限制,例如还可以采用FTP(FileTransferProtocol,文件传输协议)等。It can be understood that the above-mentioned HTTP protocol is only used as an application example of the present invention. In practical applications, the present invention does not limit the transmission protocol for uploading or downloading cloud disk files. For example, FTP (FileTransferProtocol, file transfer protocol) can also be used. .
综上,本发明实施例可以对云盘文件的上传和下载的操作行为进行监测,在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略,在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。本发明实施例可以按照控制终端提供的云盘文件控制策略对用户终端中执行云盘文件的上传或者下载操作进行控制,通过设置用户终端对应的云盘文件控制策略为禁止,可以拦截该用户终端中针对云盘文件的上传或者下载操作,从而可以防止用户终端随意上传或者下载云盘文件造成文件泄露或者威胁企业网安全的情况发生,以提高企业网的安全性。To sum up, the embodiment of the present invention can monitor the operation behavior of uploading and downloading cloud disk files, and when an upload or download operation for cloud disk files is detected, obtain the cloud disk file control strategy corresponding to the user terminal where the user terminal is located. When the cloud disk file control strategy corresponding to the user terminal is prohibited, intercept the upload or download operation for the cloud disk file. The embodiment of the present invention can control the uploading or downloading operation of the cloud disk file in the user terminal according to the cloud disk file control strategy provided by the control terminal, and the user terminal can be intercepted by setting the cloud disk file control strategy corresponding to the user terminal to prohibit The uploading or downloading operation of cloud disk files can prevent user terminals from uploading or downloading cloud disk files arbitrarily, causing file leakage or threatening the security of the enterprise network, so as to improve the security of the enterprise network.
参照图2,示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图,具体可以包括如下步骤:Referring to Fig. 2, it shows a flow chart of steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention, which may specifically include the following steps:
步骤201、在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;Step 201. Obtain the cloud disk file control policy corresponding to the user terminal where the cloud disk file is uploaded or downloaded when monitoring; wherein, the cloud disk file control policy is provided by the control terminal in the local area network;
步骤202、在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作;Step 202, when the cloud disk file control policy corresponding to the user terminal is allowed, allow the upload or download operation for the cloud disk file to continue;
步骤203、在执行所述针对云盘文件的上传或者下载操作的过程中,记录对应的操作信息;其中,所述操作信息包括如下信息中的至少一种:上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识;Step 203, during the process of performing the upload or download operation for the cloud disk file, record the corresponding operation information; wherein, the operation information includes at least one of the following information: the behavior identifier corresponding to the upload or download operation, The terminal identifier of the user terminal performing the upload or download operation, and the file identifier of the cloud disk file;
步骤204、将所述记录的操作信息上传至所述控制终端。Step 204, uploading the recorded operation information to the control terminal.
参照表2,示出了本发明的一种操作记录的具体示意。Referring to Table 2, it shows a specific illustration of an operation record of the present invention.
表2Table 2
本发明实施例在所述针对云盘文件的上传或者下载操作的执行过程中,记录对应的操作信息,并将该操作信息上传至局域网内的控制终端,以使局域网的管理员可以通过控制终端查询云盘文件的操作记录,由于该操作记录中可以包括上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识,因此,通过操作记录可以得知企业内部的某个重要文件被哪台用户终端下载了,或者,某个携带有恶意程序的文件被哪台用户终端上传了,从而可以根据用户终端的终端标识定位到该用户终端,以对该用户终端进行管控,例如可以断开该用户终端的网络连接以防止重要文件外泄或者恶意程序的继续蔓延,从而可以及早发现并阻止可能会给企业带来损失或者安全威胁的事件发生。In the embodiment of the present invention, during the execution process of uploading or downloading operations for cloud disk files, the corresponding operation information is recorded, and the operation information is uploaded to the control terminal in the local area network, so that the administrator of the local area network can pass through the control terminal. Query the operation record of the cloud disk file, because the operation record may include the behavior identifier corresponding to the upload or download operation, the terminal identifier of the user terminal performing the upload or download operation, and the file identifier of the cloud disk file, therefore, Through the operation records, we can know which user terminal downloaded an important file in the enterprise, or which user terminal uploaded a file carrying a malicious program, so that we can locate the user terminal according to the terminal ID of the user terminal. User terminal to manage and control the user terminal, for example, disconnect the network connection of the user terminal to prevent leakage of important files or further spread of malicious programs, so as to detect and prevent losses or security threats to the enterprise in an early stage event occurs.
进一步地,还可以根据该操作记录制定更加合理的云盘文件控制策略。具体地,控制终端可以根据接收到的来自局域网内的各用户终端的操作记录,对各用户终端进行行为分析,在发现用户终端存在可疑行为时,例如,通过操作记录得知某台用户终端近期频繁下载企业内各研发项目的重要文件,则将该用户终端对应的云盘文件控制策略更新为禁止,以防止重要文件外泄。Furthermore, a more reasonable cloud disk file control strategy can also be formulated according to the operation record. Specifically, the control terminal can analyze the behavior of each user terminal according to the received operation records from the user terminals in the local area network. If important files of various R&D projects in the enterprise are frequently downloaded, the cloud disk file control policy corresponding to the user terminal is updated to prohibit to prevent leakage of important files.
参照图3,示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图,具体可以包括如下步骤:Referring to FIG. 3 , it shows a flow chart of steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention, which may specifically include the following steps:
步骤301、在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;Step 301. Obtain the cloud disk file control strategy corresponding to the user terminal where the cloud disk file is uploaded or downloaded when monitoring; wherein, the cloud disk file control strategy is provided by the control terminal in the local area network;
步骤302、在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作;Step 302, when the cloud disk file control policy corresponding to the user terminal is allowed, allow the upload or download operation for the cloud disk file to continue;
步骤303、在执行所述针对云盘文件的上传操作之前,对所述云盘文件进行安全扫描;Step 303, performing a security scan on the cloud disk file before performing the upload operation for the cloud disk file;
在具体应用中,所述安全扫描可以通过预先设置的黑白名单以及病毒查杀引擎进行安全扫描,可以理解,本发明对于安全扫描的具体方式不加以限制。In a specific application, the security scan can be performed through a pre-set black and white list and a virus detection and killing engine. It can be understood that the present invention does not limit the specific manner of the security scan.
步骤304、在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作。Step 304, when it is determined through the security scan that the cloud disk file carries a malicious program, intercept the upload operation.
其中,恶意程序是指带有攻击意图所编写的一段程序,具体可以包括:陷门、逻辑炸弹、特洛伊木马、蠕虫、细菌、病毒等。Wherein, a malicious program refers to a program written with an attack intention, and may specifically include: trapdoors, logic bombs, Trojan horses, worms, bacteria, viruses, and the like.
通过本发明实施例,可以在执行针对云盘文件的上传操作之前,对云盘文件进行安全扫描,在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作,从而可以防止恶意程序入侵企业网的情况发生,以提高企业网的安全性。Through the embodiment of the present invention, it is possible to perform a security scan on the cloud disk file before performing an upload operation on the cloud disk file, and when it is determined through the security scan that the cloud disk file carries a malicious program, the upload operation is intercepted , so as to prevent malicious programs from invading the enterprise network, so as to improve the security of the enterprise network.
参照图4,示出了根据本发明一个实施例的一种基于局域网的云盘文件监控方法的步骤流程图,具体可以包括如下步骤:Referring to FIG. 4 , it shows a flow chart of steps of a cloud disk file monitoring method based on a local area network according to an embodiment of the present invention, which may specifically include the following steps:
步骤401、在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;Step 401, when an upload or download operation for a cloud disk file is detected, obtain a cloud disk file control strategy corresponding to the user terminal where it is located; wherein, the cloud disk file control strategy is provided by the control terminal in the local area network;
步骤402、在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作;Step 402, when the cloud disk file control policy corresponding to the user terminal is allowed, allow the upload or download operation for the cloud disk file to continue;
步骤403、在执行所述针对云盘文件的下载操作之前,检测所述云盘文件是否为预置保护文件;Step 403, before performing the download operation for the cloud disk file, detecting whether the cloud disk file is a preset protected file;
步骤404、在检测到所述云盘文件为预置保护文件时,拦截所述下载操作。Step 404, when it is detected that the cloud disk file is a preset protected file, intercept the download operation.
在本发明实施例中,所述预置保护文件具体可以为企业内部的机密文件、核心技术文档等,在实际应用中,本领域技术人员可以预先设置哪些文件属于预置保护文件,本发明对于预置保护文件的具体形式不加以限制。In the embodiment of the present invention, the preset protection files may specifically be confidential files within the enterprise, core technical documents, etc. In practical applications, those skilled in the art can pre-set which files belong to the preset protection files. The specific form of the preset protection file is not limited.
通过本发明实施例,可以在执行针对云盘文件的下载操作之前,对所述云盘文件进行检测,在检测到所述云盘文件为预置保护文件时,拦截所述下载操作,从而可以防止企业内的重要文件外泄。Through the embodiment of the present invention, the cloud disk file can be detected before the download operation for the cloud disk file is executed, and when the cloud disk file is detected as a preset protected file, the download operation can be intercepted, so that Prevent important documents in the enterprise from being leaked.
参照图5,示出了根据本发明一个实施例的一种基于局域网的云盘文件监控装置的结构框图,具体可以包括如下模块:Referring to FIG. 5 , it shows a structural block diagram of a cloud disk file monitoring device based on a local area network according to an embodiment of the present invention, which may specifically include the following modules:
操作监测模块501,用于在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;及The operation monitoring module 501 is used to obtain the cloud disk file control strategy corresponding to the user terminal where the user terminal is located when monitoring the upload or download operation for the cloud disk file; wherein, the cloud disk file control strategy is the control terminal in the local area network provided; and
操作拦截模块502,用于在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。The operation interception module 502 is configured to intercept the upload or download operation for the cloud disk file when the cloud disk file control policy corresponding to the user terminal is prohibited.
在本发明的一种可选实施例中,所述装置还可以包括:In an optional embodiment of the present invention, the device may also include:
操作允许模块,用于在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作。The operation permission module is configured to allow the upload or download operation for the cloud disk file to continue to be performed when the cloud disk file control policy corresponding to the user terminal is allowed.
在本发明的另一种可选实施例中,所述装置还可以包括:In another optional embodiment of the present invention, the device may also include:
操作记录模块,用于在执行所述针对云盘文件的上传或者下载操作的过程中,记录对应的操作信息;其中,所述操作信息包括如下信息中的至少一种:上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识;An operation recording module, configured to record corresponding operation information during the process of performing the upload or download operation for the cloud disk file; wherein, the operation information includes at least one of the following information: upload or download operation corresponding Behavior identification, the terminal identification of the user terminal performing the upload or download operation, and the file identification of the cloud disk file;
记录上传模块,用于将所述记录的操作信息上传至所述控制终端。A record uploading module, configured to upload the recorded operation information to the control terminal.
在本发明的又一种可选实施例中,所述操作监测模块具体可以包括:监测子模块,用于监测针对云盘文件的上传或者下载操作;In yet another optional embodiment of the present invention, the operation monitoring module may specifically include: a monitoring submodule, configured to monitor upload or download operations for cloud disk files;
所述监测子模块,具体可以包括:The monitoring submodule may specifically include:
第一监测单元,用于监测云盘客户端针对云盘文件的上传或者下载操作;或者,The first monitoring unit is used to monitor the upload or download operation of the cloud disk client for the cloud disk file; or,
第二监测单元,用于监测浏览器针对云盘文件的上传或者下载操作。The second monitoring unit is used to monitor the uploading or downloading operation of the browser on the cloud disk file.
在本发明的再一种可选实施例中,所述第一监测单元,具体可以包括:In another optional embodiment of the present invention, the first monitoring unit may specifically include:
第一匹配子单元,用于对运行的进程的进程标识和预存的第一云盘标识进行匹配;The first matching subunit is used to match the process ID of the running process with the pre-stored first cloud disk ID;
第一确定子单元,用于在所述进程标识和第一云盘标识匹配时,确定所述进程为云盘客户端对应的进程;The first determining subunit is configured to determine that the process is a process corresponding to the cloud disk client when the process identifier matches the first cloud disk identifier;
第一监测子单元,用于监测所述云盘客户端对应的进程针对云盘文件的上传或者下载操作。The first monitoring subunit is configured to monitor the upload or download operation of the cloud disk file by the process corresponding to the cloud disk client.
在本发明的再一种可选实施例中,所述第二监测单元,具体可以包括:In yet another optional embodiment of the present invention, the second monitoring unit may specifically include:
解析子单元,用于解析所述浏览器中的统一资源定位符,得到关键字信息;The parsing subunit is used to parse the Uniform Resource Locator in the browser to obtain keyword information;
第二匹配子单元,用于对所述关键字信息和预存的第二云盘标识进行匹配;The second matching subunit is used to match the keyword information with the pre-stored second cloud disk identifier;
第二确定子单元,用于在所述关键字信息和第二云盘标识匹配时,确定所述浏览器当前网页为云盘操作网页;The second determining subunit is used to determine that the current webpage of the browser is a cloud disk operation webpage when the keyword information matches the second cloud disk identifier;
第二监测子单元,用于监测所述浏览器当前网页中针对云盘文件的上传或者下载操作。The second monitoring subunit is used to monitor the upload or download operation of the cloud disk file in the current webpage of the browser.
在本发明的再一种可选实施例中,所述装置还可以包括:In another optional embodiment of the present invention, the device may also include:
扫描模块,用于在执行所述针对云盘文件的上传操作之前,对所述云盘文件进行安全扫描;A scanning module, configured to perform a security scan on the cloud disk file before performing the upload operation for the cloud disk file;
上传拦截模块,用于在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作。The upload interception module is configured to intercept the upload operation when it is determined through the security scan that malicious programs are carried in the cloud disk file.
在本发明的再一种可选实施例中,所述装置还可以包括:In another optional embodiment of the present invention, the device may also include:
文件检测模块,用于在执行所述针对云盘文件的下载操作之前,检测所述云盘文件是否为预置保护文件;A file detection module, configured to detect whether the cloud disk file is a preset protected file before performing the download operation for the cloud disk file;
下载拦截模块,用于在检测到所述云盘文件为预置保护文件时,拦截所述下载操作。The download interception module is configured to intercept the download operation when detecting that the cloud disk file is a preset protected file.
对于装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。As for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiment.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline this disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the invention are sometimes grouped together in a single embodiment, figure, or its description. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any method or method so disclosed may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments described herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的基于局域网的云盘文件监控方法和装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网平台上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It should be understood by those skilled in the art that a microprocessor or a digital signal processor (DSP) can be used in practice to realize some or all of the components in the cloud disk file monitoring method and device based on the local area network according to the embodiment of the present invention Or full functionality. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet platform, or provided on a carrier signal, or provided in any other form.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包括”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names.
本发明公开了A1、一种基于局域网的云盘文件监控方法,包括:The invention discloses A1, a cloud disk file monitoring method based on a local area network, comprising:
在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;When monitoring the upload or download operation for the cloud disk file, obtain the cloud disk file control strategy corresponding to the user terminal where it is located; wherein, the cloud disk file control strategy is provided by the control terminal in the local area network;
在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。When the cloud disk file control policy corresponding to the user terminal is forbidden, intercept the upload or download operation for the cloud disk file.
A2、如权利要求A1所述的方法,其特征在于,所述方法还包括:A2. The method according to claim A1, further comprising:
在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作。When the cloud disk file control policy corresponding to the user terminal is allowed, the upload or download operation for the cloud disk file is allowed to continue.
A3、如权利要求A2所述的方法,其特征在于,所述方法还包括:A3, the method as claimed in claim A2, is characterized in that, described method also comprises:
在执行所述针对云盘文件的上传或者下载操作的过程中,记录对应的操作信息;其中,所述操作信息包括如下信息中的至少一种:上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识;In the process of performing the upload or download operation for the cloud disk file, record the corresponding operation information; wherein, the operation information includes at least one of the following information: the behavior identifier corresponding to the upload or download operation, the execution of the The terminal identification of the user terminal for uploading or downloading operations, and the file identification of the cloud disk file;
将所述记录的操作信息上传至所述控制终端。uploading the recorded operation information to the control terminal.
A4、如权利要求A1所述的方法,其特征在于,通过如下步骤监测针对云盘文件的上传或者下载操作:A4, the method as claimed in claim A1, is characterized in that, the uploading or downloading operation for cloud disk file is monitored through the following steps:
监测云盘客户端针对云盘文件的上传或者下载操作;或者,Monitor cloud disk client upload or download operations for cloud disk files; or,
监测浏览器针对云盘文件的上传或者下载操作。Monitor browser upload or download operations for cloud disk files.
A5、如权利要求A4所述的方法,其特征在于,所述监测云盘客户端针对云盘文件的上传或者下载操作的步骤,包括:A5. The method according to claim A4, wherein the step of monitoring the upload or download operation of the cloud disk file by the cloud disk client includes:
对运行的进程的进程标识和预存的第一云盘标识进行匹配;Matching the process ID of the running process with the pre-stored first cloud disk ID;
在所述进程标识和第一云盘标识匹配时,确定所述进程为云盘客户端对应的进程;When the process identifier matches the first cloud disk identifier, it is determined that the process is a process corresponding to the cloud disk client;
监测所述云盘客户端对应的进程针对云盘文件的上传或者下载操作。Monitoring the process corresponding to the cloud disk client is aimed at uploading or downloading operations of cloud disk files.
A6、如权利要求A4所述的方法,其特征在于,所述监测浏览器针对云盘文件的上传或者下载操作的步骤,包括:A6, the method as claimed in claim A4, is characterized in that, the step of described monitoring browser uploading or downloading operation for cloud disk file, comprises:
解析所述浏览器中的统一资源定位符,得到关键字信息;Analyzing the Uniform Resource Locator in the browser to obtain keyword information;
对所述关键字信息和预存的第二云盘标识进行匹配;Matching the keyword information with the pre-stored second cloud disk identifier;
在所述关键字信息和第二云盘标识匹配时,确定所述浏览器当前网页为云盘操作网页;When the keyword information matches the second cloud disk identifier, it is determined that the current webpage of the browser is a cloud disk operation webpage;
监测所述浏览器当前网页中针对云盘文件的上传或者下载操作。Monitoring the upload or download operation of the cloud disk file in the current webpage of the browser.
A7、如权利要求A1至A6所述的任一方法,其特征在于,所述方法还包括:A7. The method according to any one of claims A1 to A6, further comprising:
在执行所述针对云盘文件的上传操作之前,对所述云盘文件进行安全扫描;Before performing the upload operation for the cloud disk file, perform a security scan on the cloud disk file;
在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作。When it is determined through the security scan that the cloud disk file carries a malicious program, the upload operation is intercepted.
A8、如权利要求A1至A6所述的任一方法,其特征在于,所述方法还包括:A8. The method according to any one of claims A1 to A6, further comprising:
在执行所述针对云盘文件的下载操作之前,检测所述云盘文件是否为预置保护文件;Before performing the download operation for the cloud disk file, detect whether the cloud disk file is a preset protection file;
在检测到所述云盘文件为预置保护文件时,拦截所述下载操作。When detecting that the cloud disk file is a preset protected file, intercept the download operation.
本发明公开了B9、一种基于局域网的云盘文件监控装置,包括:The invention discloses B9, a cloud disk file monitoring device based on a local area network, comprising:
操作监测模块,用于在监测到针对云盘文件的上传或者下载操作时,获取所在用户终端对应的云盘文件控制策略;其中,所述云盘文件控制策略为所述局域网中的控制终端所提供;及The operation monitoring module is used to obtain the cloud disk file control strategy corresponding to the user terminal where the user terminal is located when monitoring the upload or download operation for the cloud disk file; wherein, the cloud disk file control strategy is set by the control terminal in the local area network provide; and
操作拦截模块,用于在所述用户终端对应的云盘文件控制策略为禁止时,拦截所述针对云盘文件的上传或者下载操作。An operation interception module, configured to intercept the upload or download operation for the cloud disk file when the cloud disk file control policy corresponding to the user terminal is prohibited.
B10、如权利要求B9所述的装置,其特征在于,所述装置还包括:B10, the device as claimed in claim B9, is characterized in that, described device also comprises:
操作允许模块,用于在所述用户终端对应的云盘文件控制策略为允许时,允许继续执行所述针对云盘文件的上传或者下载操作。The operation permission module is configured to allow the upload or download operation for the cloud disk file to continue to be performed when the cloud disk file control policy corresponding to the user terminal is allowed.
B11、如权利要求B10所述的装置,其特征在于,所述装置还包括:B11, the device as claimed in claim B10, is characterized in that, described device also comprises:
操作记录模块,用于在执行所述针对云盘文件的上传或者下载操作的过程中,记录对应的操作信息;其中,所述操作信息包括如下信息中的至少一种:上传或者下载操作对应的行为标识、执行所述上传或者下载操作的用户终端的终端标识、以及所述云盘文件的文件标识;An operation recording module, configured to record corresponding operation information during the upload or download operation for the cloud disk file; wherein, the operation information includes at least one of the following information: upload or download operation corresponding Behavior identification, the terminal identification of the user terminal performing the upload or download operation, and the file identification of the cloud disk file;
记录上传模块,用于将所述记录的操作信息上传至所述控制终端。A record uploading module, configured to upload the recorded operation information to the control terminal.
B12、如权利要求B9所述的装置,其特征在于,所述操作监测模块包括:监测子模块,用于监测针对云盘文件的上传或者下载操作;B12. The device according to claim B9, wherein the operation monitoring module comprises: a monitoring submodule for monitoring upload or download operations for cloud disk files;
所述监测子模块,包括:The monitoring submodule includes:
第一监测单元,用于监测云盘客户端针对云盘文件的上传或者下载操作;或者,The first monitoring unit is used to monitor the upload or download operation of the cloud disk client for the cloud disk file; or,
第二监测单元,用于监测浏览器针对云盘文件的上传或者下载操作。The second monitoring unit is used to monitor the uploading or downloading operation of the browser on the cloud disk file.
B13、如权利要求B12所述的装置,其特征在于,所述第一监测单元,包括:B13. The device according to claim B12, wherein the first monitoring unit comprises:
第一匹配子单元,用于对运行的进程的进程标识和预存的第一云盘标识进行匹配;The first matching subunit is used to match the process ID of the running process with the pre-stored first cloud disk ID;
第一确定子单元,用于在所述进程标识和第一云盘标识匹配时,确定所述进程为云盘客户端对应的进程;The first determining subunit is configured to determine that the process is a process corresponding to the cloud disk client when the process identifier matches the first cloud disk identifier;
第一监测子单元,用于监测所述云盘客户端对应的进程针对云盘文件的上传或者下载操作。The first monitoring subunit is configured to monitor the upload or download operation of the cloud disk file by the process corresponding to the cloud disk client.
B14、如权利要求B12所述的装置,其特征在于,所述第二监测单元,包括:B14. The device according to claim B12, wherein the second monitoring unit comprises:
解析子单元,用于解析所述浏览器中的统一资源定位符,得到关键字信息;The parsing subunit is used to parse the Uniform Resource Locator in the browser to obtain keyword information;
第二匹配子单元,用于对所述关键字信息和预存的第二云盘标识进行匹配;The second matching subunit is used to match the keyword information with the pre-stored second cloud disk identifier;
第二确定子单元,用于在所述关键字信息和第二云盘标识匹配时,确定所述浏览器当前网页为云盘操作网页;The second determining subunit is used to determine that the current webpage of the browser is a cloud disk operation webpage when the keyword information matches the second cloud disk identifier;
第二监测子单元,用于监测所述浏览器当前网页中针对云盘文件的上传或者下载操作。The second monitoring subunit is used to monitor the upload or download operation of the cloud disk file in the current webpage of the browser.
B15、如权利要求B9至B14所述的任一装置,其特征在于,所述装置还包括:B15. The device according to any one of claims B9 to B14, wherein the device further comprises:
扫描模块,用于在执行所述针对云盘文件的上传操作之前,对所述云盘文件进行安全扫描;A scanning module, configured to perform a security scan on the cloud disk file before performing the upload operation for the cloud disk file;
上传拦截模块,用于在通过所述安全扫描确定所述云盘文件中携带有恶意程序时,拦截所述上传操作。The upload interception module is configured to intercept the upload operation when it is determined through the security scan that malicious programs are carried in the cloud disk file.
B16、如权利要求B9至B14所述的任一装置,其特征在于,所述装置还包括:B16. Any device as claimed in claims B9 to B14, wherein said device further comprises:
文件检测模块,用于在执行所述针对云盘文件的下载操作之前,检测所述云盘文件是否为预置保护文件;A file detection module, configured to detect whether the cloud disk file is a preset protected file before performing the download operation for the cloud disk file;
下载拦截模块,用于在检测到所述云盘文件为预置保护文件时,拦截所述下载操作。The download interception module is configured to intercept the download operation when detecting that the cloud disk file is a preset protected file.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510921132.2A CN105550593A (en) | 2015-12-11 | 2015-12-11 | Cloud disk file monitoring method and device based on local area network |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510921132.2A CN105550593A (en) | 2015-12-11 | 2015-12-11 | Cloud disk file monitoring method and device based on local area network |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN105550593A true CN105550593A (en) | 2016-05-04 |
Family
ID=55829780
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510921132.2A Pending CN105550593A (en) | 2015-12-11 | 2015-12-11 | Cloud disk file monitoring method and device based on local area network |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN105550593A (en) |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107302536A (en) * | 2017-06-29 | 2017-10-27 | 郑州云海信息技术有限公司 | Method for managing security, device, medium and the storage control of cloud computing platform |
| CN107592319A (en) * | 2017-09-29 | 2018-01-16 | 郑州云海信息技术有限公司 | A kind of document down loading method and device |
| CN108076056A (en) * | 2017-12-12 | 2018-05-25 | 北京小米移动软件有限公司 | Cloud server login method and device |
| CN108512824A (en) * | 2018-01-20 | 2018-09-07 | 福建省数字福建云计算运营有限公司 | The management method and mobile terminal of a kind of family high in the clouds file |
| CN110933076A (en) * | 2019-11-28 | 2020-03-27 | 广州市百果园信息技术有限公司 | Client uploading monitoring method, device, equipment and computer storage medium |
| CN111104690A (en) * | 2019-11-22 | 2020-05-05 | 北京三快在线科技有限公司 | Document monitoring method and device, server and storage medium |
| CN113055412A (en) * | 2019-12-26 | 2021-06-29 | 奇安信科技集团股份有限公司 | Sample collection method, apparatus, system, computer device and readable storage medium |
| CN114189552A (en) * | 2021-10-29 | 2022-03-15 | 济南浪潮数据技术有限公司 | Data reporting method and system |
| CN114254378A (en) * | 2021-08-19 | 2022-03-29 | 厦门天锐科技股份有限公司 | File uploading and downloading control system and method based on Windows |
| CN115150189A (en) * | 2022-07-28 | 2022-10-04 | 深圳市瑞云科技有限公司 | Method for automatically intercepting outgoing files based on enterprise private cloud disk |
| CN117290890A (en) * | 2023-11-24 | 2023-12-26 | 浙江口碑网络技术有限公司 | A security risk management and control method, device, electronic equipment and storage medium |
| CN118074985A (en) * | 2024-02-27 | 2024-05-24 | 北京雪诺科技有限公司 | Browser file control method, system, device and readable storage medium |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102299834A (en) * | 2011-09-07 | 2011-12-28 | 中国联合网络通信集团有限公司 | Data sharing method, equipment and system for local area network |
| CN102622537A (en) * | 2011-01-31 | 2012-08-01 | 中兴通讯股份有限公司 | Method and device for processing virus file |
| US20120255026A1 (en) * | 2011-04-02 | 2012-10-04 | Jim Baca | Method and device for managing digital usage rights of documents |
| CN102868738A (en) * | 2012-08-30 | 2013-01-09 | 福建富士通信息软件有限公司 | Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy |
| CN103297441A (en) * | 2013-06-25 | 2013-09-11 | 福建伊时代信息科技股份有限公司 | Access control method and device |
| CN103326999A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | File safety management system based on cloud service |
| CN104320409A (en) * | 2014-11-10 | 2015-01-28 | 成都卫士通信息产业股份有限公司 | Method for controlling access to cloud disk on basis of Hook technology |
| CN104751077A (en) * | 2015-04-21 | 2015-07-01 | 沈文策 | Access control method and device |
-
2015
- 2015-12-11 CN CN201510921132.2A patent/CN105550593A/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102622537A (en) * | 2011-01-31 | 2012-08-01 | 中兴通讯股份有限公司 | Method and device for processing virus file |
| US20120255026A1 (en) * | 2011-04-02 | 2012-10-04 | Jim Baca | Method and device for managing digital usage rights of documents |
| CN102299834A (en) * | 2011-09-07 | 2011-12-28 | 中国联合网络通信集团有限公司 | Data sharing method, equipment and system for local area network |
| CN102868738A (en) * | 2012-08-30 | 2013-01-09 | 福建富士通信息软件有限公司 | Hyper text transfer protocol (HTTP)/hypertext transfer protocol secure (HTTPS) behavior management and control auditing method based on Web proxy |
| CN103326999A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | File safety management system based on cloud service |
| CN103297441A (en) * | 2013-06-25 | 2013-09-11 | 福建伊时代信息科技股份有限公司 | Access control method and device |
| CN104320409A (en) * | 2014-11-10 | 2015-01-28 | 成都卫士通信息产业股份有限公司 | Method for controlling access to cloud disk on basis of Hook technology |
| CN104751077A (en) * | 2015-04-21 | 2015-07-01 | 沈文策 | Access control method and device |
Non-Patent Citations (1)
| Title |
|---|
| 杨爱梅 等: "《大学计算机基础 Windows 7与Office 2010环境》", 31 October 2014, 清华大学出版社 * |
Cited By (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107302536A (en) * | 2017-06-29 | 2017-10-27 | 郑州云海信息技术有限公司 | Method for managing security, device, medium and the storage control of cloud computing platform |
| CN107592319A (en) * | 2017-09-29 | 2018-01-16 | 郑州云海信息技术有限公司 | A kind of document down loading method and device |
| CN108076056A (en) * | 2017-12-12 | 2018-05-25 | 北京小米移动软件有限公司 | Cloud server login method and device |
| CN108512824A (en) * | 2018-01-20 | 2018-09-07 | 福建省数字福建云计算运营有限公司 | The management method and mobile terminal of a kind of family high in the clouds file |
| CN108512824B (en) * | 2018-01-20 | 2020-10-16 | 福建省数字福建云计算运营有限公司 | Management method of home cloud files and mobile terminal |
| CN111104690B (en) * | 2019-11-22 | 2022-03-18 | 北京三快在线科技有限公司 | Document monitoring method and device, server and storage medium |
| CN111104690A (en) * | 2019-11-22 | 2020-05-05 | 北京三快在线科技有限公司 | Document monitoring method and device, server and storage medium |
| CN110933076A (en) * | 2019-11-28 | 2020-03-27 | 广州市百果园信息技术有限公司 | Client uploading monitoring method, device, equipment and computer storage medium |
| CN113055412B (en) * | 2019-12-26 | 2023-04-25 | 奇安信科技集团股份有限公司 | Sample collection method, apparatus, system, computer device, and readable storage medium |
| CN113055412A (en) * | 2019-12-26 | 2021-06-29 | 奇安信科技集团股份有限公司 | Sample collection method, apparatus, system, computer device and readable storage medium |
| CN114254378A (en) * | 2021-08-19 | 2022-03-29 | 厦门天锐科技股份有限公司 | File uploading and downloading control system and method based on Windows |
| CN114189552A (en) * | 2021-10-29 | 2022-03-15 | 济南浪潮数据技术有限公司 | Data reporting method and system |
| CN114189552B (en) * | 2021-10-29 | 2024-09-03 | 济南浪潮数据技术有限公司 | Data reporting method and system |
| CN115150189A (en) * | 2022-07-28 | 2022-10-04 | 深圳市瑞云科技有限公司 | Method for automatically intercepting outgoing files based on enterprise private cloud disk |
| CN115150189B (en) * | 2022-07-28 | 2023-11-07 | 深圳市瑞云科技有限公司 | Method for automatically intercepting file outgoing based on enterprise private cloud disk |
| CN117290890A (en) * | 2023-11-24 | 2023-12-26 | 浙江口碑网络技术有限公司 | A security risk management and control method, device, electronic equipment and storage medium |
| CN117290890B (en) * | 2023-11-24 | 2024-05-10 | 浙江口碑网络技术有限公司 | A security risk management method, device, electronic device and storage medium |
| CN118074985A (en) * | 2024-02-27 | 2024-05-24 | 北京雪诺科技有限公司 | Browser file control method, system, device and readable storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230208860A1 (en) | Process-specific network access control based on traffic monitoring | |
| CN105550593A (en) | Cloud disk file monitoring method and device based on local area network | |
| JP6526895B2 (en) | Automatic mitigation of electronic message based security threats | |
| US10212134B2 (en) | Centralized management and enforcement of online privacy policies | |
| US9356950B2 (en) | Evaluating URLS for malicious content | |
| US9762543B2 (en) | Using DNS communications to filter domain names | |
| US8375120B2 (en) | Domain name system security network | |
| US20220086173A1 (en) | Improving incident classification and enrichment by leveraging context from multiple security agents | |
| US9917864B2 (en) | Security policy deployment and enforcement system for the detection and control of polymorphic and targeted malware | |
| JP6553524B2 (en) | System and method for utilizing a dedicated computer security service | |
| US20250202931A1 (en) | Preventing phishing attacks using cloud-based documents | |
| US9270690B2 (en) | Network protection system and method | |
| US20150326587A1 (en) | Distributed system for bot detection | |
| US20230336579A1 (en) | System and method for evaluating risk of a vulnerability | |
| US20090248696A1 (en) | Method and system for detecting restricted content associated with retrieved content | |
| US20080229419A1 (en) | Automated identification of firewall malware scanner deficiencies | |
| JP2016503936A (en) | System and method for identifying and reporting application and file vulnerabilities | |
| CN102868694B (en) | Detection method, device and system for controlling client access to network | |
| Serketzis et al. | Actionable threat intelligence for digital forensics readiness | |
| Sagala | Automatic SNORT IDS rule generation based on honeypot log | |
| JP5980968B2 (en) | Information processing apparatus, information processing method, and program | |
| US12445484B2 (en) | Inline ransomware detection via server message block (SMB) traffic | |
| US9275226B1 (en) | Systems and methods for detecting selective malware attacks | |
| US20250126140A1 (en) | Malicious enumeration attack detection | |
| CN105630433A (en) | Printing control method and device based on local area network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160504 |