File security protection method and device

A security protection and file technology, applied in the field of information security, can solve problems such as file information leakage, and achieve the effect of ensuring security

Pending Publication Date: 2021-10-26
XIAN WANXIANG ELECTRONICS TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a file security protection method and device to at least solve the technical problem of file information leakage caused by users taking screenshots of shared files in cloud office scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security protection method and device
  • File security protection method and device
  • File security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] In the cloud office system, based on VGTP (image lossless transmission protocol), it mainly includes zero terminal (built-in VGTP-R terminal, referred to as R terminal) and cloud server (built-in VGTP-S terminal, referred to as S terminal). Among them, the R terminal is used to receive the virtual desktop image from the cloud, and at the same time reversely transmit the local mouse and keyboard information to the cloud, and the cloud injects it into the virtual desktop corresponding to the current R terminal. Generated by the VM / PM allocated by the terminal; the S terminal is an image acquisition and encoding module running in the cloud virtual operating system, and is also responsible for the injection function of user input data. The cloud server is generally based on the IAAS (Infrastructure as a Service, infrastructure as a service) architecture, which is a server with a strong virtual host function, which can provide multiple VM / PM management functions through the h...

Embodiment 2

[0045] According to the embodiment of the present application, there is also provided a file security protection device for implementing the above-mentioned file security protection method, each module in the file security protection device corresponds to the implementation steps of the file security protection method in Embodiment 1 one by one . Specifically, as image 3 As shown, the device includes a detection module 30, a first control module 32 and a second control module 34, wherein:

[0046] The detection module 30 is configured to detect the operation information of the zero terminal.

[0047] Specifically, the main body of the file security protection device is usually a target server, which can be a virtual machine or a physical machine running on a cloud server, and a detection module is installed inside it to detect user operation information uploaded by the zero terminal, so as to determine Whether the current user is reading the shared file, so as to set the co...

Embodiment 3

[0063] According to an embodiment of the present application, a non-volatile storage medium is also provided, the non-volatile storage medium includes a stored program, wherein, when the program is running, the device where the non-volatile storage medium is located is controlled to perform the above-mentioned file security protection method.

[0064] Optionally, when the program is running, the device where the non-volatile storage medium is located is controlled to perform the following steps: the target server detects the operation information of the zero terminal; when the operation information indicates that the zero terminal starts to read the shared file, the target server controls the clipboard Enable and execute the temporary clipboard permission for the zero terminal, where the temporary clipboard permission is used to prevent the zero terminal from pasting the target file type; when the operation information indicates that the zero terminal stops reading the shared f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file security protection method and device. The method comprises the steps that a target server detects operation information of a zero terminal; when the operation information indicates that the zero terminal starts to read the shared file, the target server controls a clipboard to be started and executes a temporary clipboard permission for the zero terminal, and the temporary clipboard permission is used for preventing the zero terminal from conducting pasting operation on a file of the target file type; and when the operation information indicates that the zero terminal stops reading the shared file, the target server controls the clipboard to close the clipboard permission for the zero terminal. The technical problem that file information is leaked due to the fact that a user carries out screenshot storage on a shared file in a cloud office scene is solved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular, to a file security protection method and device. Background technique [0002] In cloud office scenarios, users can usually log in to the corresponding VM / PM (Virtual Machine / Physical Machine, virtual machine / physical machine) by entering the user name and password in the zero terminal, and then perform the required office work in the VM / PM. operate. In many units, in order to carry out unified security management of shared files, some public or confidential files are usually stored in shared folders or on shared file servers. Different types of users have different access rights to different files. Most Users can only view files, but not modify them. In many scenarios, in order to ensure that the information is not leaked, it is set that the file cannot be copied, but even so, the security of the information cannot be effectively guaranteed. For example, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F16/176G06F9/54
CPCG06F21/6209G06F21/602G06F16/176G06F9/543G06F2221/2141
Inventor 龙科
Owner XIAN WANXIANG ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products