Nothing Special   »   [go: up one dir, main page]

CN102622551A - File safety protection method - Google Patents

File safety protection method Download PDF

Info

Publication number
CN102622551A
CN102622551A CN2012101039654A CN201210103965A CN102622551A CN 102622551 A CN102622551 A CN 102622551A CN 2012101039654 A CN2012101039654 A CN 2012101039654A CN 201210103965 A CN201210103965 A CN 201210103965A CN 102622551 A CN102622551 A CN 102622551A
Authority
CN
China
Prior art keywords
file
security means
defence
document security
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101039654A
Other languages
Chinese (zh)
Inventor
耿振民
刘旭峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Original Assignee
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN2012101039654A priority Critical patent/CN102622551A/en
Publication of CN102622551A publication Critical patent/CN102622551A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a file safety protection method comprising the steps of: opening a file while utilizing a file safety discrimination technology and extracting a file safety protection technology while storing a file so as to guarantee the opening and application safety of the file. The file safety protection method disclosed by the invention performs system scanning and application program scanning while opening the file to prevent the injection of illegal programs or unknown plug-in units; and meanwhile, the file protection technology contained in the method extracts file characteristic values while storing the file and compares the file characteristic value with a preset confidence level or a non-confidence level, necessary protection measures are taken once the file characteristic value is lower than the standard so as to effectively protect the safety of core files in enterprises.

Description

A kind of document security means of defence
Technical field
The invention belongs to the computer information safety technique field, relate in particular to a kind of document security means of defence.
Background technology
The fast development of Along with computer technology, the infotech develop rapidly, information-based all had development at full speed in all trades and professions.For enterprises and institutions, electronic document has become the lifeblood of company.At this stage, enterprises and institutions generally comprise following these technology for the safeguard procedures of these electronic documents: 1) adopting redundancy technique, is main with file server or professional backup of memory, and file is collected; 2) adopt encryption technology, the illegal propagation of in-company file is given cut off, prevent divulging a secret of interior employee; 3) adopt the control of authority technology, prevent having a mind to or being not intended to the operation to file, the destruction that causes file of unauthorized user.More than these three kinds typical technology, all be that to be based upon file be complete, correct, and how guarantee that file is complete, information is significant, and file is safe, these all do not provide good method to go to differentiate.
Summary of the invention
The present invention provides a kind of document security means of defence, verifies comparison when being employed in File Open and preserving, and guarantees file safety in use, thereby can favorable protection be provided to integrality, the security of file.
To achieve these goals, the present invention adopts following technical scheme:
A kind of document security means of defence, wherein, said method does, when File Open, can use file security examination technology and can the extraction document safety protection technique when file is preserved, thus the safety of assurance file when opening and use.
Said file security examination technology is used for the residing system features of file is scanned and collects, and the characteristic for application program scans simultaneously.
Particularly, said system features comprises malicious plugins is opened, whether had to the characteristic of virus base, fire wall whether, whether malice link or illegal end is arranged.
Particularly, said application features comprises whether whether independent operating, application program inside comprise malice or illegal program or dynamic base etc., whether have that other programs or plug-in unit inject, information and other relevant informations of correlation circumstance when program is opened application program.、
Related file characteristic value was screened when said file security guard technology was used for file preserved, and prevented that file from comprising invalid information when preserving.
Particularly, said file characteristic value comprises file essential characteristic, file cache, whether comprises malicious code or illegal grand and whether have other programs to attempt to quote or inject file.
Further; Customized adopted comparing result confidence level of system or untrusted degree; And can but scanning result and credible acceptance that presets or non-acceptance be compared; And can take different safeguard procedures according to comparing result, said system comparison process is suitable for pattern and is divided into two kinds, is respectively credible acceptance and unacceptable degree.
Particularly, the standard of said credible acceptance gives the user corresponding authority for promptly thinking credible when the file scan result acquires a certain degree with contrast confidence level index; Outside confidence level, promptly think to be unacceptable value, will remind or forbid that automatically the user uses or operate associated documents or program.
Particularly; The standard of said unacceptable degree just thinks insincere for having only when the file scan result can not the reliability index acquires a certain degree with contrast; To remind or forbid that automatically the user uses or operate associated documents or program this moment; And promptly thinking outside the untrusted zone is acceptable value, gives user-dependent authority.
The present invention provides a kind of document security means of defence, when document is opened, carries out system scan and application scan, prevents the injection of illegal program or not clear plug-in unit; The document guard technology that this method comprised simultaneously can pass through the extraction document eigenwert when document storing; And through comparing with confidence level that presets or untrusted degree; To take the necessary protection measure to it in case be lower than standard, thereby protect the safety of the core document of enterprises effectively.
Description of drawings
Fig. 1 is the schematic flow sheet that opens file in the document security means of defence provided by the invention;
Fig. 2 is a close file schematic flow sheet in the document security means of defence provided by the invention.
Embodiment
Specify the present invention below in conjunction with accompanying drawing, it explains principle of the present invention as the part of this instructions through embodiment, other aspects of the present invention, and characteristic and advantage thereof will become very clear through this detailed description.
Like Fig. 1, shown in 2, a kind of document security means of defence, wherein, said method does, when File Open, can use file security examination technology and can the extraction document safety protection technique when file is preserved, thus the safety of assurance file when opening and use.
Said file security examination technology is used for the residing system features of file is scanned and collects, and the characteristic for application program scans simultaneously.
Particularly, said system features comprises malicious plugins is opened, whether had to the characteristic of virus base, fire wall whether, whether malice link or illegal end is arranged.
Particularly, said application features comprises whether whether independent operating, application program inside comprise malice or illegal program or dynamic base etc., whether have that other programs or plug-in unit inject, information and other relevant informations of correlation circumstance when program is opened application program.、
Related file characteristic value was screened when said file security guard technology was used for file preserved, and prevented that file from comprising invalid information when preserving.
Particularly, said file characteristic value comprises file essential characteristic, file cache, whether comprises malicious code or illegal grand and whether have other programs to attempt to quote or inject file.
Further; Customized adopted comparing result confidence level of system or untrusted degree; And can but scanning result and credible acceptance that presets or non-acceptance be compared; And can take different safeguard procedures according to comparing result, said system comparison process is suitable for pattern and is divided into two kinds, is respectively credible acceptance and unacceptable degree.
Particularly, the standard of said credible acceptance gives the user corresponding authority for promptly thinking credible when the file scan result acquires a certain degree with contrast confidence level index; Outside confidence level, promptly think to be unacceptable value, will remind or forbid that automatically the user uses or operate associated documents or program.
Particularly; The standard of said unacceptable degree just thinks insincere for having only when the file scan result can not the reliability index acquires a certain degree with contrast; To remind or forbid that automatically the user uses or operate associated documents or program this moment; And promptly thinking outside the untrusted zone is acceptable value, gives user-dependent authority.
Invention comprises following two parts:
The workflow of said method is following:
One, when File Open, basic flow process is following: open file; Gathering system information; Collect fileinfo; The condition that presets of contrast is opened, warning or close file; Start fence operation; The normal file that uses.
Two, when closing of a file, basic flow process is following: acquisition program information; Collect fileinfo;
The condition that contrast is preset; Close, report to the police or do not allow close file; Start fence operation; Close file.
The present invention provides a kind of document security means of defence, when document is opened, carries out system scan and application scan, prevents the injection of illegal program or not clear plug-in unit; The document guard technology that this method comprised simultaneously can pass through the extraction document eigenwert when document storing; And through comparing with confidence level that presets or untrusted degree; To take the necessary protection measure to it in case be lower than standard, thereby protect the safety of the core document of enterprises effectively.
The above disclosed the preferred embodiments of the present invention that are merely can not limit the present invention's interest field certainly with this, so according to the equivalent variations that claim of the present invention is done, still belong to the scope that the present invention is contained.

Claims (9)

1. a document security means of defence is characterized in that, said method does, when File Open, can use file security examination technology and can the extraction document safety protection technique when file is preserved, thus the safety of assurance file when opening and use.
2. a kind of document security means of defence as claimed in claim 1 is characterized in that, said file security examination technology is used for the residing system features of file is scanned and collects, and the characteristic for application program scans simultaneously.
3. according to claim 1 or claim 2 a kind of document security means of defence is characterized in that, said system features comprises malicious plugins is opened, whether had to the characteristic of virus base, fire wall whether, whether malice link or illegal end are arranged.
4. according to claim 1 or claim 2 a kind of document security means of defence; It is characterized in that said application features comprises whether whether independent operating, application program inside comprise malice or illegal program or dynamic base etc., whether have that other programs or plug-in unit inject, information and other relevant informations of correlation circumstance when program is opened application program.
5. a kind of document security means of defence as claimed in claim 1 is characterized in that, related file characteristic value was screened when said file security guard technology was used for file preserved, and prevents that file from comprising invalid information when preserving.
6. like claim 1 or 5 described a kind of document security means of defences, it is characterized in that said file characteristic value comprises file essential characteristic, file cache, whether comprise malicious code or illegal grand and whether have other programs to attempt to quote or inject file.
7. a kind of document security means of defence as claimed in claim 1; It is characterized in that; Customized adopted comparing result confidence level of system or untrusted degree, but and can scanning result and the credible acceptance that presets or non-acceptance be compared, and can take different safeguard procedures according to comparing result; Said system comparison process is suitable for pattern and is divided into two kinds, is respectively credible acceptance and unacceptable degree.
8. like claim 1 or 7 described a kind of document security means of defences, it is characterized in that the standard of said credible acceptance gives the user corresponding authority for promptly thinking credible when the file scan result acquires a certain degree with contrast confidence level index; Outside confidence level, promptly think to be unacceptable value, will remind or forbid that automatically the user uses or operate associated documents or program.
9. like claim 1 or 7 described a kind of document security means of defences; It is characterized in that; The standard of said unacceptable degree just thinks insincere for having only when the file scan result can not the reliability index acquires a certain degree with contrast; To remind or forbid that automatically the user uses or operate associated documents or program this moment, and promptly thinking outside the untrusted zone is acceptable value, gives user-dependent authority.
CN2012101039654A 2012-04-11 2012-04-11 File safety protection method Pending CN102622551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101039654A CN102622551A (en) 2012-04-11 2012-04-11 File safety protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101039654A CN102622551A (en) 2012-04-11 2012-04-11 File safety protection method

Publications (1)

Publication Number Publication Date
CN102622551A true CN102622551A (en) 2012-08-01

Family

ID=46562466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101039654A Pending CN102622551A (en) 2012-04-11 2012-04-11 File safety protection method

Country Status (1)

Country Link
CN (1) CN102622551A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942293A (en) * 2014-04-11 2014-07-23 立德高科(北京)数码科技有限责任公司 Self-destroying protection method based on malicious invasion of file system and device thereof
CN105550597A (en) * 2015-12-24 2016-05-04 北京奇虎科技有限公司 Information scanning based terminal management method and apparatus
CN105635139A (en) * 2015-12-31 2016-06-01 深圳市安之天信息技术有限公司 Anti-overflow-attack document security operation and analysis method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1352426A (en) * 2001-11-26 2002-06-05 北京实达铭泰计算机应用技术开发有限公司 Computer virus prevention method
CN1770051A (en) * 2004-11-04 2006-05-10 华为技术有限公司 File safety detection method
US20090150419A1 (en) * 2007-12-10 2009-06-11 Won Ho Kim Apparatus and method for removing malicious code inserted into file
CN101615230A (en) * 2009-08-07 2009-12-30 浪潮电子信息产业股份有限公司 The method of a kind of file credible execution and credible protection
US7681237B1 (en) * 2004-05-13 2010-03-16 Symantec Corporation Semi-synchronous scanning of modified files in real time
CN101866407A (en) * 2010-06-18 2010-10-20 北京九合创胜网络科技有限公司 Method and device for realizing security of operating system platform
CN101969425A (en) * 2009-07-28 2011-02-09 新奥特(北京)视频技术有限公司 Method for simulating to open and execute file

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1352426A (en) * 2001-11-26 2002-06-05 北京实达铭泰计算机应用技术开发有限公司 Computer virus prevention method
US7681237B1 (en) * 2004-05-13 2010-03-16 Symantec Corporation Semi-synchronous scanning of modified files in real time
CN1770051A (en) * 2004-11-04 2006-05-10 华为技术有限公司 File safety detection method
US20090150419A1 (en) * 2007-12-10 2009-06-11 Won Ho Kim Apparatus and method for removing malicious code inserted into file
CN101969425A (en) * 2009-07-28 2011-02-09 新奥特(北京)视频技术有限公司 Method for simulating to open and execute file
CN101615230A (en) * 2009-08-07 2009-12-30 浪潮电子信息产业股份有限公司 The method of a kind of file credible execution and credible protection
CN101866407A (en) * 2010-06-18 2010-10-20 北京九合创胜网络科技有限公司 Method and device for realizing security of operating system platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
张立红: "电子文件保护中的几个关键性问题", 《兰台世界》, 31 October 2008 (2008-10-31) *
王虹等: "浅谈提高涉密文件安全防护能力的有效措施", 《信息与电脑》, 31 January 2011 (2011-01-31) *
胡中庭: "操作系统启动可信、文件系统可信和应用可信", 《硕士学位论文全文数据库》, 31 May 2007 (2007-05-31) *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942293A (en) * 2014-04-11 2014-07-23 立德高科(北京)数码科技有限责任公司 Self-destroying protection method based on malicious invasion of file system and device thereof
CN105550597A (en) * 2015-12-24 2016-05-04 北京奇虎科技有限公司 Information scanning based terminal management method and apparatus
CN105635139A (en) * 2015-12-31 2016-06-01 深圳市安之天信息技术有限公司 Anti-overflow-attack document security operation and analysis method and system
CN105635139B (en) * 2015-12-31 2019-04-05 深圳市安之天信息技术有限公司 A kind of method and system of the document security operation and analysis of anti-spilled attack

Similar Documents

Publication Publication Date Title
CN105205358B (en) The method and detection method that a kind of identification Android APP are reinforced
KR102047782B1 (en) Method and apparatus for recognizing cyber threats using correlational analytics
Likarish et al. Obfuscated malicious javascript detection using classification techniques
CN103839002A (en) Website source code malicious link injection monitoring method and device
CN103810428B (en) Method and device for detecting macro virus
KR101663013B1 (en) Apparatus and method for detecting code injection attack
WO2014048257A1 (en) Security protection system and method
KR20140092884A (en) Security box
CN107277046B (en) Anti-coercion password control method and device based on face recognition
CN103619014B (en) The method and system for preventing application data from revealing
CN112671700B (en) Enterprise economic management information security system
CN101667232A (en) Terminal credible security system and method based on credible computing
CN105930728B (en) A kind of application checking method and device
Liu et al. PSDEM: a feasible de-obfuscation method for malicious PowerShell detection
CN112257007B (en) Enterprise financial information management system
CN102622551A (en) File safety protection method
CN116561809B (en) Destroying method for identifying security medium based on point cloud
CN110677415A (en) Network information safety protection system
JP5326063B1 (en) Malicious shellcode detection apparatus and method using debug events
Hu et al. Research on Android ransomware protection technology
Asiri et al. Investigating usable indicators against cyber-attacks in industrial control systems
CN107844700A (en) A kind of method and system of intelligent protection operating system user account
CN111581636A (en) Network security monitoring equipment
CN109495482A (en) A kind of network data information safe transmission method
CN112887288B (en) Internet-based E-commerce platform intrusion detection front-end computer scanning system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120801