Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for monitoring file activity

A file and current file technology, applied in the field of data security, can solve problems such as easy to be forced to end, easy to miss file activity monitoring, etc., to achieve the effect of reducing memory waste, accurate monitoring results, and sound management system

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Numerous DLP (Data Leak Protection) products also display 18 martial arts in file protection, but they are all based on the monitoring of the application layer, which is easy to be forced to end, and it is easy to miss the monitoring of file activities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring file activity
  • Method and system for monitoring file activity
  • Method and system for monitoring file activity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0030] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0031] figure 1 A flow chart of a method for monitoring file activities in the present invention is shown.

[0032] Such as figure 1 As shown, the first aspect of the present invention proposes a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a kind of monitoring method and system of file activity, monitor file NtSetInformation operation, according to the subtype of current file NtSetInformation operation, transfer the full path name of the file object of current file NtSetInformation operation to PreSetInfoOperCallback completion function; According to PreSetInfoOperCallback completion function The file activity type is judged by the message parameters and the full path name of the file object; finally, the judged file activity type and file information are reported to the monitoring software of the application layer. The present invention monitors file activity based on the callback function in the IRP request, and determines the type of file activity, and then reports the type of file activity and file information to the monitoring software of the application layer, so that managers can trace the operation of related files by viewing the monitoring software Records further restrict the user's arbitrariness in file operations and improve the management system for file operations.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and system for monitoring file activities. Background technique [0002] In the information society, ensuring data security has become the consensus of people. Whether it is an individual, an enterprise, or a government, more and more investments are being made in data security. As one of the data carriers, the files on the computer are undoubtedly an important protection object for data security. Numerous DLP (Data Leak Protection) products have also used eighteen skills in file protection, but they are all based on application layer monitoring, which is easy to be forced to end, and it is easy to miss the monitoring of file activities. Contents of the invention [0003] In order to solve the above problems, it is necessary to provide a method and system for monitoring file activities, so as to monitor file activities such as cutting, deleting, and renaming. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/16
CPCG06F21/552G06F21/16
Inventor 宋志成韩金池郭鹏玉马盼盼
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products