Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operating record tracing system and method based on cloud computing

An operation recording and tracking system technology, applied in the field of information security, can solve problems that are difficult to find, and achieve the effect of raising vigilance and avoiding illegal use

Inactive Publication Date: 2010-08-18
潘燕辉 +1
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if it is controlled as a broiler, it is difficult to detect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating record tracing system and method based on cloud computing
  • Operating record tracing system and method based on cloud computing
  • Operating record tracing system and method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] figure 1 Shown is a schematic diagram of the overall structure of the multi-user collaborative operation record tracking system, including: at least one server and several clients. Multiple servers can be set up as required, and each client is connected to at least one server through the network; The system can include one or more servers, and one client can connect to one or more servers.

[0037] The client is used to track and obtain the operation records of at least one process run by the client and the process information of the process running on the client. The information can include but not limited to the information of the user to which the process belongs, the company to which the process belongs, etc., and the operation records of multiple processes can be tracked as needed; then the hash value of the process is calculated, and the server receives data from a large number of For the above hash value and process information of the client, on the server side,...

Embodiment 2

[0043] On the basis of Embodiment 1, in order to improve the human-computer interaction function, the client also includes an opinion-seeking module 10, which is connected to the tracking module 11, and is used to consult the client user's opinion on whether the tracking module 11 starts tracking, If the affirmative answer of the client is obtained, the tracking module 11 will immediately start tracking. For example, before starting the tracking process B.EXE, the user will be asked whether to start tracking the process. If the user selects an affirmative answer, the tracking module 11 will begin to track the process B.EXE traces, which can avoid unnecessary tracing and recording of some routine processes.

Embodiment 3

[0045] On the basis of Embodiment 1, in order to further complement and perfect the function of the system, the sharing module can further include an operation record search unit 221, a percentage calculation unit 222, a report information generation unit 223 and a download unit 224; the operation record search unit 221 is used to In the classification storage module 21, search for the operation record and the information of the process with the same hash value, generate a search result, for example, use the hash value as a search condition, search in the classification storage module 21, and search for the hash value The operation records of the same process, and the recorded user quantity and user information generate search results; the percentage calculation unit 222 is used to generate the operation record percentage according to the above search results; the report information generation unit 223 is used to generate the operation record percentage according to the operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-user cooperated operating record tracing system and a method, and the system comprises at least one server end and a plurality of client ends which are all connected with at least one server end by network; the client ends are used for obtaining the operating record and the process information of at least one process which is run at the client ends, calculating hash values of processes and uploading the hash values and corresponding operating record and process information to the server end; the server end is used for classifying and storing the corresponding operating record and process information according to the hash values and for generating report information which is downloaded to the client ends, and the report information includes the operating record which is traced at other client ends by the processes; and as long as ulterior operations are operated on any process file at some client end in the network, the action can be discovered by other users in the network, thus enhancing the alertness for the user when using the software so as to avoid becoming a fryer or being illegally used by others.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a system and method for recording and tracking multi-user collaborative operations based on cloud computing. Background technique [0002] Nowadays, with the improvement of informatization and the continuous introduction of various applicable technologies, it is more convenient for users to carry out various activities related to digital information, and it is undeniable that users are more closely related to informatization and digitization . Along with this, however, digital information crimes such as attacks (especially via the Internet) on personal computers, servers, or other computerized devices occur frequently. Obviously, the current underground digital economy has become increasingly industrialized and large-scale, and its corresponding criminal activities are becoming more and more hidden, and the attack methods of malware have been greatly developed. For e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L12/26H04L12/24H04L29/06G06F21/552
Inventor 潘燕辉周勇兵
Owner 潘燕辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products