CN106971120A - A kind of method, device and computing device for realizing file protection - Google Patents

A kind of method, device and computing device for realizing file protection Download PDF

Info

Publication number
CN106971120A
CN106971120A CN201710184527.8A CN201710184527A CN106971120A CN 106971120 A CN106971120 A CN 106971120A CN 201710184527 A CN201710184527 A CN 201710184527A CN 106971120 A CN106971120 A CN 106971120A
Authority
CN
China
Prior art keywords
file
document
protected
user
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710184527.8A
Other languages
Chinese (zh)
Other versions
CN106971120B (en
Inventor
潘剑锋
李宜檑
秦光远
邹贵强
刘健锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710184527.8A priority Critical patent/CN106971120B/en
Publication of CN106971120A publication Critical patent/CN106971120A/en
Priority to PCT/CN2017/119503 priority patent/WO2018171283A1/en
Application granted granted Critical
Publication of CN106971120B publication Critical patent/CN106971120B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of method, device and computing device for realizing file protection.Methods described includes:It is determined that needing document to be protected;Judgement needs whether document to be protected is changed, if so, then being backed up to this document, obtains backup file;Backup file is saved in ad-hoc location.The technical program can effectively realize the protection to file, solve the problem of file is illegally modified, and Consumer's Experience is enhanced while safeguarding user's number one.

Description

A kind of method, device and computing device for realizing file protection
Technical field
The present invention relates to field of computer technology, and in particular to a kind of method, device and calculating for realizing file protection is set It is standby.
Background technology
With popularization of the computer technology in social life and work, substantial amounts of file is stored in various terminals and set In standby, such as mobile phone, pad, desktop computer, wherein being no lack of some important files.But, some criminals can adopt File is carried out into illegal modifications etc. with various methods intrusion private terminal equipment to operate, and requires that user gives certain report Reward, just by amended file access pattern, is illegally speculated with this, if user lets matters drift, can cause certain economy Loss, can also connive the generation again of the behavior;If user ignores, these files changed, particularly Important file, it is impossible to return to original state or directly result in loss, then can bring one to the life or work of user Fixed influence and loss, reduces Consumer's Experience.So, the protection of file how is effectively carried out, prevents file to be illegally modified into In order to it is most important the problem of.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the corresponding device of method for realizing file protection, the computing device of problem.
According to one aspect of the present invention there is provided a kind of method for realizing file protection, this method includes:
It is determined that needing document to be protected;
Judgement needs whether document to be protected is changed, if so, then being backed up to this document, obtains backup file;
Backup file is saved in ad-hoc location.
Alternatively, the determination needs document to be protected to include following one or more:
The file of specified one or more types is needed by default to protect file;
The instruction of the user of reception, determines to need document to be protected according to the instruction of user;
The file stored in scanning the machine, shows user to enter for it type information of Miscellaneous Documents stored in the machine Row selection, the corresponding file of type that user is selected is defined as needing document to be protected;
User is showed to be selected for it type information of pregnable Miscellaneous Documents, the type that user is selected Corresponding file is defined as needing document to be protected.
Alternatively, the judgement needs whether document to be protected is changed, if so, then carrying out backup to this document includes:
Content if necessary to the file of protection is changed, and when being saved of modification, and this document is backed up.
Alternatively, it is described backup file is saved in ad-hoc location to include:
The backup file is encrypted, obtains encrypting file;
The index of backup file is used as using the combination of the filename, original path and original size of the backup file;
By the index of the backup file, file is corresponding is saved in ad-hoc location with encryption.
Alternatively, the filename of corresponding backup file is used as using the MD5 values of the content for needing document to be protected.
Alternatively, this method further comprises:According to the size of the disk remaining space of local each disk, selection disk is remained A maximum disk of complementary space, a newly-built file on the disk;
It is described backup file is saved in ad-hoc location to include:Backup file is saved in the newly-built file.
Alternatively, this method further comprises:
Record and the file modification of the process for needing document to be protected to modify is operated;
When the file modification operation of the process meets the one or more in following condition, alarm is carried out:
The quantity of documents changed in the given time exceedes threshold value;
Modification ratio to the content of a file exceedes threshold value;
The quantity for the same type file changed exceedes threshold value;
Modification data volume to same type file exceedes threshold value.
Alternatively, the progress alarm includes:Pop-up prompting is carried out, and " permission ", " prevention " and " rollback " is provided Three option of operation;
When user selects " permission " option of operation, any processing is not carried out to the process;
When user selects " prevention " option of operation, force to stop the process;
When user selects " rollback " option of operation, according to the file modification operation recorded and backup file, rollback institute The modification operation of process is stated, by state of the file access pattern to before being changed by the process.
Alternatively, this method further comprises:
When it is described need document to be protected to be opened when, judge whether with system default TO need text to be protected Part;If it is not, then carrying out alarm.
According to another aspect of the present invention there is provided a kind of device for realizing file protection, the device includes:
Document determining unit, being adapted to determine that needs document to be protected;
File backup unit, suitable for judging to need whether document to be protected is changed, if then being backed up to this document, Obtain backup file;
File storing unit, suitable for backup file is saved in into ad-hoc location.
Alternatively, the document determining unit is suitable to determine to need document to be protected in following one or more modes:
The file of specified one or more types is needed by default to protect file;
The instruction of the user of reception, determines to need document to be protected according to the instruction of user;
The file stored in scanning the machine, shows user to enter for it type information of Miscellaneous Documents stored in the machine Row selection, the corresponding file of type that user is selected is defined as needing document to be protected;
User is showed to be selected for it type information of pregnable Miscellaneous Documents, the type that user is selected Corresponding file is defined as needing document to be protected.
Alternatively, the file backup unit, suitable for when needing the content of document to be protected to be changed, and modification is protected When depositing, this document is backed up.
Alternatively, the file storing unit, suitable for the backup file is encrypted, obtains encrypting file; The index of backup file is used as using the combination of the filename, original path and original size of the backup file;And will be described File is corresponding is saved in ad-hoc location with encryption for the index of backup file.
Alternatively, the file storing unit, suitable for using the MD5 values of the content for needing document to be protected as corresponding Backup file filename.
Alternatively, the file storing unit, is further adapted for the size of the disk remaining space according to local each disk, A disk for selecting disk remaining space maximum, a newly-built file on the disk;And be saved in backup file In the newly-built file.
Alternatively, the device further comprises:
Alert process unit, the file modification suitable for recording the process modified to file is operated, when the text of the process When part modification operation meets the one or more in following condition, alarm is carried out:
The quantity of documents changed in the given time exceedes threshold value;
Modification ratio to the content of a file exceedes threshold value;
The quantity for the same type file changed exceedes threshold value;
Modification data volume to same type file exceedes threshold value.
Alternatively, the progress alarm includes:Pop-up prompting is carried out, and " permission ", " prevention " and " rollback " is provided Three option of operation;
The alert process unit, is further adapted for, when user selects " permission " option of operation, not entering the process Any processing of row;When user selects " prevention " option of operation, force to stop the process;When user's selection " rollback " operation choosing Xiang Shi, according to the file modification operation recorded and backup file, the modification operation of process described in rollback, by file access pattern to quilt State before process modification.
Alternatively, the alert process unit, suitable for when it is described need document to be protected to be opened when, judge whether to be System the default Tool, which opens this, needs document to be protected;If it is not, then carrying out alarm.
According to another aspect of the present invention there is provided a kind of computing device, the computing device includes foregoing real The device of existing file protection.
Technique according to the invention scheme, to realizing the guarantor to file by way of needing document to be protected to back up Shield, particularly, when needing document to be protected to be changed, is backed up to this document, and backup file is protected Ad-hoc location is stored to, timely file is tampered, the file having been tampered with can also be recovered by backing up file.It can be seen that, this skill Art scheme can effectively realize the protection to file, solve the problem of file is illegally modified, and safeguard user's number one While enhance Consumer's Experience.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of schematic flow sheet of method for realizing file protection according to an embodiment of the invention;
Fig. 2 shows a kind of structural representation of device for realizing file protection according to an embodiment of the invention;
Fig. 3 shows a kind of structural representation of device for realizing file protection in accordance with another embodiment of the present invention;
Fig. 4 shows a kind of structural representation of computing device according to an embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 shows a kind of schematic flow sheet of method for realizing file protection according to an embodiment of the invention.Such as Shown in Fig. 1, this method includes:
Step S110, it is determined that needing document to be protected.
The file for needing document to be protected to be acquiescence or one or more user-defined type, also may be used Be one or more files that user selectes or some easily by files of illegal modifications.It is right in the present embodiment Document to be protected is needed not do specific restriction, the file that the file of acquiescence, user specify can be used as need text to be protected Part;Or the file or folder that only user selects according to itself.
Step S120, judgement needs whether document to be protected is changed, if so, then being backed up to this document, obtains standby Part file.
After needing document to be protected to determine, monitor and judge that these need whether document to be protected is changed, once prison These files are measured to be changed, in order to prevent be non-user carry out illegal modifications, will will by modification the need for protect File backed up, to obtain backup file.
Step S130, ad-hoc location is saved in by backup file.
After backup file is obtained, the position specified is stored to, so that user can incite somebody to action according to the backup file of preservation The file protected the need for being changed is recovered, and file content is lost caused by preventing the illegal modifications of non-user.Should Ad-hoc location can be the position that the position of system default or user specify.
It can be seen that, user can also be by backing up file to being recovered by the file protected the need for modification, effective reality The protection of existing file, solves the problem of file is illegally modified, Consumer's Experience is enhanced while safeguarding user's number one.
In one embodiment of the invention, the determination in step S110 needs the file protected to pass through following one kind Or various ways:
(1) file of specified one or more types is needed by default to protect file.For example, designated pictures are literary These file configurations in terminal device, as document to be protected is needed, are that acquiescence needs document to be protected by part, text.
(2) instruction of the user received, determines to need document to be protected according to the instruction of user.User can be for example provided Self defined interface, by the instruction of the user of the User Defined interface, being determined according to the instruction of user need to be to be protected File.Except the default document in (1), user can need document to be protected with self-defined, with according to the self-defined of user It is determined that document to be protected is needed, for example, video, audio etc..In addition user can also specify one or more files, this Or the file in multiple files is to need document to be protected, no matter which kind of file type is.
(3) file stored in scanning the machine, shows user to supply the type information of the Miscellaneous Documents stored in the machine It is selected, and the corresponding file of the type that user is selected is defined as needing document to be protected.User selects for convenience, in advance The first type of file stored in scanning the machine, and show user, user is in the type for having understood the file in the machine Afterwards, carrying out selection according to self-demand needs file type to be protected, improves Consumer's Experience.In another embodiment, can also The All Files stored in the machine is listed, so that user's selection specific file is protected.
(4) show user to be selected for it type information of pregnable Miscellaneous Documents, user is selected The corresponding file of type is defined as needing document to be protected.In order to further facilitate user to select, user's exhibition only can also be given Show the type for being easier file under fire, so that user selects.For example the Documents Comparison of document class is easily tampered with Attack, therefore show user to be chosen for user the type information (such as word, PDF) of this class file.
It should be noted that the file protected the need in the present embodiment can be any one above-mentioned or Above-mentioned any combination.
When the present invention realizes that being utilized in file to the protection of file is changed, file is backed up and stores standby The mode of part file.In one embodiment of the invention, the judgement in step S120 needs whether document to be protected is changed, It may be accomplished by if so, then carrying out backup to this document:Content if necessary to the file of protection is changed, and institute When stating modification and being saved, this document is backed up.When non-user is to needing file modification to be protected, it is typically To needing document to be protected to carry out the modification of content, so, the present embodiment, which is mainly monitored, needs whether document to be protected is changed And modification is preserved, if it is then just being backed up to this document, that is, is backed up when writing, file is prevented because being illegally modified And lose.That is, the operation of so-called modification file here, refers to the operation for completing file modification and being preserved. Here judgement can mainly need document to be protected under edit pattern to needing document to be protected whether to be changed by this Open, the operation preserved after the modification for carrying out content, or this needs document to be protected to be opened under edit pattern, enters When being closed after the modification of row content, when being prompted " whether needing to preserve ", the instruction of "Yes" have received.That is when need After document to be protected is changed and the instruction of preservation is triggered, just this document is backed up.
If those skilled in the art is it should be appreciated that the file only opening under edit pattern, or in edit pattern It is lower to open and changed, as long as not preserving the modification, it would not be backed up.More further, backup herein is not backed up Amended file, but the original before backup modification, can so recover the file changed in subsequent process.
In order to prevent backup file to be also illegally modified, in one embodiment of the invention, in step S130 will be standby Part file, which is saved in ad-hoc location, to be included:Backup file is encrypted, obtains encrypting file;To back up the file of file The index combined as backup file of name, original path and original size;The index of backup file is corresponding with encryption file It is saved in ad-hoc location.Backup file, which is encrypted, to be carried out by the AES being pre-configured with, and obtained simultaneously The index of the backup file, so that user can be by index, the information in index finds the file changed, and profit Original is returned to original state with backup file.
Specifically, above-mentioned AES can be MD5 (Message-Digest Algorithm 5) AES, will The content of original carries out MD5 calculating, and then the MD5 values of the content only to need document to be protected are used as corresponding backup file Filename, the filename of so backup file is no suffix.For example, after word document is backed up, backup file Filename be a MD5 value, there is no the suffix of " .doc ".
Add specifically, above-mentioned AES can be sha (Secure Hash Algorithm, SHA) Close algorithm.For example, sha-1 AESs, sha-1 computations are carried out by the content of original, it is then only to be protected to need The sha-1 values of the content of file are used as the filename of corresponding backup file, the so text of backup file similar with md5 encryption Part name is no suffix.
Or, using des encryption algorithm or RSA cryptographic algorithms, in the present embodiment, AES does not do specific limit Fixed, this programme can provide multiple encryption algorithms instrument, and user can voluntarily be selected according to self-demand.
In one embodiment of the invention, the method shown in Fig. 1 further comprises:Remained according to the disk of local each disk The size of complementary space, a maximum disk of selection disk remaining space, a newly-built file on the disk.
So, backup file be saved in ad-hoc location included in step S130:Backup file is saved in newly-built In file, the memory space of the machine thus can be reasonably utilized, ensures the enough feelings in locally stored space to greatest extent File backup is carried out under condition.If it is pointed out that during backup file is saved in into file, finding file When the remaining space of place disk is not enough, user disk insufficient space can be pointed out.Certainly, can also be by while prompting Backup file is saved on the disk reselected, or is not preserved backup file and directly refused the guarantor of the modification of absolute file Deposit, so can also ensure that file is not illegally modified to the full extent.
The technical scheme is that when needing document to be protected to be changed, it is standby to needing document to be protected to carry out Part, to reach the effect of file protection.Under normal circumstances, it is typically all to the operation for needing document to be protected to carry out illegal modifications Corresponding process is performed by illegal program, to needing document to be protected to carry out the deletion or modification of large area, in order to enter one Step determines that to the modification for needing document to be protected to carry out be illegal modifications, in one embodiment of the invention, the side shown in Fig. 1 Method further comprises:
The file modification operation for the process modified to file is recorded, when there is program to modify file, to this File is backed up, and which operation and which kind of operation that the program is carried out to file are all recorded.When the process When file modification operation meets the one or more in following condition, alarm is carried out:
(1) quantity of documents changed when the process more than the first preset value, and modification data volume with total number of files according to amount Ratio when reaching the second preset value, carry out alarm.In the case that only above-mentioned two condition is satisfied by, just determine to needing The modification that document to be protected is carried out is illegal modifications.For example, the first preset value is 50%, the second preset value is 80%, one In the individual shorter time, the number to the text document in the machine has been over locally stored total text document number 50%, and the number of words of the modification carried out to each text document alreadys exceed the 80% of this article this document total number of word, then Determine that the program is revised as illegal modifications, it is necessary to carry out alarm to local user, is arranged accordingly so as to take Apply, protect the file of the machine.If the number to the text document in the machine is locally stored total text document number 10%, and the number of words of the modification carried out to each text document only accounts for the 20% of this article this document total number of word, then just really The modification of the fixed program is not illegal modifications.
(2) quantity of documents changed in the given time exceedes threshold value.For example, predetermined threshold value is 50%, in 1h time Interior, the quantity to the text document in the machine has been over the 50% of locally stored total text document quantity, with regard to being reported Alert prompting.The preset time can customize, and not be limited herein.
(3) the modification ratio to the content of a file exceedes threshold value.Here it can be judged by number of words, for example, Predetermined threshold value is 80%, and the number of words of the modification carried out to each text document alreadys exceed this article this document total number of word 80%, with regard to carrying out alarm.
(4) quantity for the same type file changed exceedes threshold value.For example, the quantity of the modification to same type file More than the 50% of the total quantity of the same file type, with regard to carrying out alarm.
(5) the modification data volume to same type file exceedes threshold value.For example, the data of the modification to same type file (such as number of words) exceedes the total amount of data (such as total number of word of same kind All Files) of the same file type 50% is measured, With regard to carrying out alarm.
It should be noted that when judging whether the file modification operation of the process meets condition, above-mentioned appoint can be used One condition of meaning, can also use any combination of above-mentioned condition.In another embodiment, it can also judge in the following manner It is illegal modifications to the modification for needing document to be protected to carry out:When needing document to be protected to be changed, judge whether with system The default Tool, which changes this, needs document to be protected, if it is not, then may determine that the modification is illegal modifications.
Specifically, above-mentioned carry out alarm includes:Pop-up prompting is carried out, informs that user has file to be changed, and carry For " permission ", " prevention " and " rollback " three option of operation.The different processing strategy of each option of operation correspondence:
A, when user selects " permissions " option of operation, not to any processing of process progress.
B, when user select " preventions " option of operation when, pressure stopping process, prevent the process from being appointed again in the machine What operation.
C, when user select " rollback " option of operation when, according to recorded file modification operation and backup file, rollback The modification operation of process, by state of the file access pattern to before being changed by the process.Because when file is changed, having stored Backup file, and the file modification operation of the process has been have recorded, when user's selection " rollback " operation, it is possible to utilize standby Part file, the operation of the rollback process recovers to the file changed.
Under normal circumstances, local user can all be opened when opening file using the default Tool of system, or user The default Tool specified is opened.Non-user may use the instrument of oneself to carry out when carrying out the illegal modifications of file The opening operation of file, so, in one embodiment of the invention, the method shown in Fig. 1 further comprises:When need protection File when being opened, judge whether that this needs document to be protected with system default TO;Carried if it is not, then carrying out alarm Show.
For example, the file in opened file folder " my document ", system default instrument is microsoft office Word, but when open this document folder in file when be not microsoft office word, with regard to being alarmed Prompting.Likewise, alarm here is also using progress pop-up prompting, and provide " permission ", " prevention " and " rollback " three Option of operation, specific corresponding to it is tactful as described above.
Fig. 2 shows a kind of structural representation of device for realizing file protection according to an embodiment of the invention.Such as Shown in Fig. 2, this realizes that the device 200 of file protection includes:
Document determining unit 210, being adapted to determine that needs document to be protected.
The file for needing document to be protected to be acquiescence or one or more user-defined type, also may be used Be one or more files that user selectes or some easily by files of illegal modifications.It is right in the present embodiment Document to be protected is needed not do specific restriction, the file that the file of acquiescence, user specify can be used as need text to be protected Part;Or the file or folder that only user selects according to itself.
File backup unit 220, suitable for judging to need whether document to be protected is changed, if then being carried out to this document standby Part, obtain backup file.
After needing document to be protected to determine, monitor and judge that these need whether document to be protected is changed, once prison These files are measured to be changed, in order to prevent be non-user carry out illegal modifications, will will by modification the need for protect File backed up, to obtain backup file.
File storing unit 230, suitable for backup file is saved in into ad-hoc location.
After backup file is obtained, the position specified is stored to, so that user can incite somebody to action according to the backup file of preservation The file protected the need for being changed is recovered, and file content is lost caused by preventing the illegal modifications of non-user.Should Ad-hoc location can be the position that the position of system default or user specify.
It can be seen that, user can also be by backing up file to being recovered by the file protected the need for modification, effective reality The protection of existing file, solves the problem of file is illegally modified, Consumer's Experience is enhanced while safeguarding user's number one.
In one embodiment of the invention, document determining unit 210 is suitable to determine in following one or more modes Need document to be protected:
(1) file of specified one or more types is needed by default to protect file.For example, designated pictures are literary These file configurations in terminal device, as document to be protected is needed, are that acquiescence needs document to be protected by part, text.
(2) instruction of the user received, determines to need document to be protected according to the instruction of user.User can be for example provided Self defined interface, by the instruction of the user of the User Defined interface, being determined according to the instruction of user need to be to be protected File.Except the default document in (1), user can need document to be protected with self-defined, with according to the self-defined of user It is determined that document to be protected is needed, for example, video, audio etc..In addition user can also specify one or more files, this Or the file in multiple files is to need document to be protected, no matter which kind of file type is.
(3) file stored in scanning the machine, shows user to supply the type information of the Miscellaneous Documents stored in the machine It is selected, and the corresponding file of the type that user is selected is defined as needing document to be protected.User selects for convenience, in advance The first type of file stored in scanning the machine, and show user, user is in the type for having understood the file in the machine Afterwards, carrying out selection according to self-demand needs file type to be protected, improves Consumer's Experience.In another embodiment, can also The All Files stored in the machine is listed, so that user's selection specific file is protected.
(4) show user to be selected for it type information of pregnable Miscellaneous Documents, user is selected The corresponding file of type is defined as needing document to be protected.In order to further facilitate user to select, user's exhibition only can also be given Show the type for being easier file under fire, so that user selects.For example the Documents Comparison of document class is easily tampered with Attack, therefore show user to be chosen for user the type information (such as word, PDF) of this class file.
It should be noted that the file protected the need in the present embodiment can be any one above-mentioned or Above-mentioned any combination.
When the present invention realizes that being utilized in file to the protection of file is changed, file is backed up and stores standby The mode of part file.In one embodiment of the invention, file backup unit 220, suitable for the file if necessary to protection Content is changed, and the modification is backed up to this document when being saved.When non-user is to needing document to be protected to repair It is typically the modification to needing document to be protected to carry out content when changing, so, the present embodiment is mainly monitored need to be to be protected Whether file is changed and is preserved, then just this document is backed up, that is, is backed up when writing, and prevents file because of illegal modifications Lose.
That is, the operation of so-called modification file here, refers to the operation for completing file modification and being preserved. Here judgement can mainly need document to be protected under edit pattern to needing document to be protected whether to be changed by this Open, the operation preserved after the modification for carrying out content, or this needs document to be protected to be opened under edit pattern, enters When being closed after the modification of row content, when being prompted " whether needing to preserve ", the instruction of "Yes" have received.That is when need After document to be protected is changed and the instruction of preservation is triggered, just this document is backed up.
If those skilled in the art is it should be appreciated that the file only opening under edit pattern, or in edit pattern It is lower to open and changed, as long as not preserving the modification, it would not be backed up.More further, backup herein is not backed up Amended file, but the original before backup modification, can so recover the file changed in subsequent process.
In order to prevent backup file to be also illegally modified, in one embodiment of the invention, file storing unit 230, Suitable for backup file is encrypted, obtain encrypting file;To back up the filename, original path and original size of file Combination as backup file index;And file is corresponding is saved in ad-hoc location with encryption by the index of backup file.It is right Backup file, which is encrypted, to be carried out by the AES being pre-configured with, while the index of the backup file is obtained, So that user can be by index, the information in index finds the file changed, and utilization backs up file by original Return to original state.
Specifically, above-mentioned AES can be MD5 (Message-Digest Algorithm 5) AES, will The data of original carry out MD5 calculating, then file storing unit 230, suitable for the MD5 values work for the content for needing document to be protected For the filename of corresponding backup file, the filename of so backup file is no suffix.For example, word document is carried out After backup, the filename of backup file is a MD5 value, does not have the suffix of " .doc ".
Specifically, above-mentioned AES can be sha (Secure Hash Algorithm, secure hash) encryption calculations Method.For example, sha-1 AESs, the content of original is subjected to sha-1 computations, then only to need document to be protected The sha-1 values of content be used as the filename of corresponding backup file, the so filename of backup file similar with md5 encryption It is no suffix.
Or, using des encryption algorithm or RSA cryptographic algorithms, in the present embodiment, AES does not do specific limit Fixed, this programme can provide multiple encryption algorithms instrument, and user can voluntarily be selected according to self-demand.
In one embodiment of the invention, file storing unit 230, are further adapted for the disk according to local each disk The size of remaining space, a maximum disk of selection disk remaining space, a newly-built file on the disk;And will Backup file is saved in newly-built file, thus can reasonably be utilized the memory space of the machine, be ensured to greatest extent File backup is carried out in the case that locally stored space is enough.If it is pointed out that backup file is being saved in into file During folder, when the remaining space of disk is not enough where finding file, user disk insufficient space can be pointed out.Certainly, While prompting, backup file can also be saved on the disk reselected, or do not preserve backup file and direct The preservation of the modification of absolute file is refused, so can also ensure that file is not illegally modified to the full extent.
Fig. 3 shows a kind of structural representation of device for realizing file protection in accordance with another embodiment of the present invention. As shown in figure 3, this realizes that the device 300 of file protection includes:Document determining unit 310, file backup unit 320, file are protected Memory cell 330 and alert process unit 340.Wherein, document determining unit 310, file backup unit 320, file storing unit 330 have corresponding identical work(with the document determining unit 210 shown in Fig. 2, file backup unit 220, file storing unit 230 Can, identical part will not be repeated here.
The technical scheme is that when needing document to be protected to be changed, it is standby to needing document to be protected to carry out Part, to reach the effect of file protection.Under normal circumstances, it is typically all to the operation for needing document to be protected to carry out illegal modifications Corresponding process is performed by illegal program, to needing document to be protected to carry out the deletion or modification of large area, in order to enter one Step determines that, to needing the modification that document to be protected is carried out to be illegal modifications, alert process unit 340 is carried out suitable for recording to file The file modification operation of the process of modification, when there is program to modify file, is backed up to this document, and by the program Which operation and which kind of operation carried out to file is all recorded.When the file modification operation of the process meets following condition In one or more when, carry out alarm:
(1) quantity of documents changed when the process more than the first preset value, and modification data volume with total number of files according to amount Ratio when reaching the second preset value, carry out alarm.In the case that only above-mentioned two condition is satisfied by, just determine to needing The modification that document to be protected is carried out is illegal modifications.For example, the first preset value is 50%, the second preset value is 80%, one In the individual shorter time, the number to the text document in the machine has been over locally stored total text document number 50%, and the number of words of the modification carried out to each text document alreadys exceed the 80% of this article this document total number of word, then Determine that the program is revised as illegal modifications, it is necessary to carry out alarm to local user, is arranged accordingly so as to take Apply, protect the file of the machine.If the number to the text document in the machine is locally stored total text document number 10%, and the number of words of the modification carried out to each text document only accounts for the 20% of this article this document total number of word, then just really The modification of the fixed program is not illegal modifications.
(2) quantity of documents changed in the given time exceedes threshold value.For example, predetermined threshold value is 50%, in 1h time Interior, the quantity to the text document in the machine has been over the 50% of locally stored total text document quantity, with regard to being reported Alert prompting.The preset time can customize, and not be limited herein.
(3) the modification ratio to the content of a file exceedes threshold value.Here it can be judged by number of words, for example, Predetermined threshold value is 80%, and the number of words of the modification carried out to each text document alreadys exceed this article this document total number of word 80%, with regard to carrying out alarm.
(4) quantity for the same type file changed exceedes threshold value.For example, the quantity of the modification to same type file More than the 50% of the total quantity of the same file type, with regard to carrying out alarm.
(5) the modification data volume to same type file exceedes threshold value.For example, the data of the modification to same type file (such as number of words) exceedes the total amount of data (such as total number of word of same kind All Files) of the same file type 50% is measured, With regard to carrying out alarm.
It should be noted that when judging whether the file modification operation of the process meets condition, above-mentioned appoint can be used One condition of meaning, can also use any combination of above-mentioned condition.In another embodiment, it can also judge in the following manner It is illegal modifications to the modification for needing document to be protected to carry out:When needing document to be protected to be changed, judge whether with system The default Tool, which changes this, needs document to be protected, if it is not, then may determine that the modification is illegal modifications.
Specifically, above-mentioned carry out alarm includes:Pop-up prompting is carried out, informs that user has file to be changed, And " permission ", " prevention " and " rollback " three option of operation, the different processing strategy of each option of operation correspondence are provided.
Alert process unit 340, is further adapted for, when user selects " permission " option of operation, not carrying out process any Processing;When user selects " prevention " option of operation, stopping process being forced, prevents the process from carrying out any behaviour again in the machine Make;When user selects " rollback " option of operation, according to the file modification operation recorded and backup file, rollback process is repaiied Change operation, by state of the file access pattern to before being changed by the process.Because when file is changed, having stored backup text Part, and the file modification operation of the process has been have recorded, when user's selection " rollback " operation, it is possible to utilize backup text Part, the operation of the rollback process recovers to the file changed.
Under normal circumstances, local user can all be opened when opening file using the default Tool of system, or user The default Tool specified is opened.Non-user may use the instrument of oneself to carry out when carrying out the illegal modifications of file The opening operation of file, so, in one embodiment of the invention, alert process unit 340 needs text to be protected suitable for working as When part is opened, judge whether that this needs document to be protected with system default TO;If it is not, then carrying out alarm. For example, the file in opened file folder " my document ", system default instrument is microsoft office word, but work as Open this document folder in file when be not microsoft office word, just progress alarm.Equally , alarm here provides " permission ", " prevention " and " rollback " three option of operation also using carrying out pop-up prompting, Specific corresponding to it is tactful as described above.
Fig. 4 shows a kind of structural representation of computing device according to an embodiment of the invention.As shown in figure 4, should Computing device 400 includes the device 410 for realizing file protection as shown in Figure 2 or Figure 3.
It should be noted that shown in each embodiment and Fig. 1 of computing device shown in device, Fig. 4 shown in Fig. 2 and Fig. 3 Each embodiment correspondence of method is identical, has been described in detail, will not be repeated here above.
In summary, technique according to the invention scheme, to being realized by way of needing document to be protected to back up Protection to file, particularly, when needing document to be protected to be changed, is backed up to this document, and handle Backup file is saved in ad-hoc location, and timely file is tampered, and can also recover the text having been tampered with by backing up file Part.It can be seen that, the technical program can effectively realize the protection to file, solve the problem of file is illegally modified, and safeguard Consumer's Experience is enhanced while user's number one.
It should be noted that:
Algorithm and display be not inherently related to any certain computer, virtual bench or miscellaneous equipment provided herein. Various fexible units can also be used together with based on teaching in this.As described above, construct required by this kind of device Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can or similar purpose identical, equivalent by offer alternative features come generation Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of be the same as Example does not mean in of the invention Within the scope of and form different embodiments.For example, in the following claims, times of embodiment claimed One of meaning mode can be used in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) realize the according to embodiments of the present invention device and meter of realizing file protection Calculate some or all functions of some or all parts in equipment.The present invention is also implemented as being used to perform institute here The some or all equipment or program of device of the method for description are (for example, computer program and computer program production Product).Such program for realizing the present invention can be stored on a computer-readable medium, or can have one or more The form of signal.Such signal can be downloaded from internet website and obtained, and either be provided or on carrier signal to appoint What other forms is provided.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention discloses A1, a kind of method for realizing file protection, including:
It is determined that needing document to be protected;
Judgement needs whether document to be protected is changed, if so, then being backed up to this document, obtains backup file;
Backup file is saved in ad-hoc location.
A2, the method as described in A1, wherein, the determination needs document to be protected to include following one or more:
The file of specified one or more types is needed by default to protect file;
The instruction of the user of reception, determines to need document to be protected according to the instruction of user;
The file stored in scanning the machine, shows user to enter for it type information of Miscellaneous Documents stored in the machine Row selection, the corresponding file of type that user is selected is defined as needing document to be protected;
User is showed to be selected for it type information of pregnable Miscellaneous Documents, the type that user is selected Corresponding file is defined as needing document to be protected.
A3, the method as described in A1, wherein, the judgement needs whether document to be protected is changed, if so, then to this article Part, which carries out backup, to be included:
The content of file if necessary to protection is changed, and the result of modification is when being saved, and this document is backed up.
A4, the method as described in A1, wherein, it is described backup file is saved in ad-hoc location to include:
The backup file is encrypted, obtains encrypting file;
The index of backup file is used as using the combination of the filename, original path and original size of the backup file;
By the index of the backup file, file is corresponding is saved in ad-hoc location with encryption.
A5, the method as described in A4, wherein,
The filename of corresponding backup file is used as using the MD5 values of the content for needing document to be protected.
A6, the method as described in A1, wherein,
This method further comprises:According to the size of the disk remaining space of local each disk, disk remaining space is selected A maximum disk, a newly-built file on the disk;
It is described backup file is saved in ad-hoc location to include:Backup file is saved in the newly-built file.
A7, the method as any one of A 1-A6, wherein, this method further comprises:
Record and the file modification of the process for needing document to be protected to modify is operated;
When the file modification operation of the process meets the one or more in following condition, alarm is carried out:
The quantity of documents changed in the given time exceedes threshold value;
Modification ratio to the content of a file exceedes threshold value;
The quantity for the same type file changed exceedes threshold value;
Modification data volume to same type file exceedes threshold value.
A8, the method as described in A7, wherein,
The progress alarm includes:Pop-up prompting is carried out, and " permission ", " prevention " and " rollback " three operations are provided Option;
When user selects " permission " option of operation, any processing is not carried out to the process;
When user selects " prevention " option of operation, force to stop the process;
When user selects " rollback " option of operation, according to the file modification operation recorded and backup file, rollback institute The modification operation of process is stated, by state of the file access pattern to before being changed by the process.
A9, the method as any one of A1-A6, wherein, this method further comprises:
When it is described need document to be protected to be opened when, judge whether with system default TO need text to be protected Part;If it is not, then carrying out alarm.
The invention also discloses B10, a kind of device for realizing file protection, wherein, the device includes:
Document determining unit, being adapted to determine that needs document to be protected;
File backup unit, suitable for judging to need whether document to be protected is changed, if then being backed up to this document, Obtain backup file;
File storing unit, suitable for backup file is saved in into ad-hoc location.
B11, the device as described in B10, wherein, the document determining unit is suitable to true in following one or more modes Surely document to be protected is needed:
The file of specified one or more types is needed by default to protect file;
The instruction of the user of reception, determines to need document to be protected according to the instruction of user;
The file stored in scanning the machine, shows user to enter for it type information of Miscellaneous Documents stored in the machine Row selection, the corresponding file of type that user is selected is defined as needing document to be protected;
User is showed to be selected for it type information of pregnable Miscellaneous Documents, the type that user is selected Corresponding file is defined as needing document to be protected.
B12, the device as described in B10, wherein,
The file backup unit, needs the content of document to be protected to be changed suitable for working as, and when being saved of modification, right This document is backed up.
B13, the device as described in B10, wherein,
The file storing unit, suitable for the backup file is encrypted, obtains encrypting file;With described standby The combination of the filename of part file, original path and original size as backup file index;And by the backup file Index file is corresponding is saved in ad-hoc location with encryption.
B14, the device as described in B13, wherein,
The file storing unit, suitable for being used as corresponding backup using the MD5 values of the content for needing document to be protected The filename of file.
B15, the device as described in B10, wherein,
The file storing unit, is further adapted for the size of the disk remaining space according to local each disk, selects magnetic A maximum disk of disk remaining space, a newly-built file on the disk;And be saved in backup file described new In the file built.
B16, the device as any one of B10-B15, wherein, the device further comprises:
Alert process unit, the file modification suitable for recording the process modified to file is operated, when the text of the process When part modification operation meets the one or more in following condition, alarm is carried out:
The quantity of documents changed in the given time exceedes threshold value;
Modification ratio to the content of a file exceedes threshold value;
The quantity for the same type file changed exceedes threshold value;
Modification data volume to same type file exceedes threshold value.
B17, the device as described in B16, wherein,
The progress alarm includes:Pop-up prompting is carried out, and " permission ", " prevention " and " rollback " three operations are provided Option;
The alert process unit, is further adapted for, when user selects " permission " option of operation, not entering the process Any processing of row;When user selects " prevention " option of operation, force to stop the process;When user's selection " rollback " operation choosing Xiang Shi, according to the file modification operation recorded and backup file, the modification operation of process described in rollback, by file access pattern to quilt State before process modification.
B18, the device as any one of B10-B15, wherein,
The alert process unit, suitable for when it is described need document to be protected to be opened when, judge whether with system default TO this need document to be protected;If it is not, then carrying out alarm.
The invention also discloses C19, a kind of computing device, wherein, the computing device is included such as any one of B10-B18 institutes That states realizes the device of file protection.

Claims (10)

1. a kind of method for realizing file protection, including:
It is determined that needing document to be protected;
Judgement needs whether document to be protected is changed, if so, then being backed up to this document, obtains backup file;
Backup file is saved in ad-hoc location.
2. the method for claim 1, wherein the determination needs document to be protected to include following one or more:
The file of specified one or more types is needed by default to protect file;
The instruction of the user of reception, determines to need document to be protected according to the instruction of user;
The file stored in scanning the machine, shows user to be selected for it type information of Miscellaneous Documents stored in the machine Select, the corresponding file of the type that user is selected is defined as needing document to be protected;
User is showed to be selected for it type information of pregnable Miscellaneous Documents, the type correspondence that user is selected File be defined as needing document to be protected.
3. the method for claim 1, wherein the judgement needs whether document to be protected is changed, if so, then to this File, which carries out backup, to be included:
The content of file if necessary to protection is changed, and the result of modification is when being saved, and this document is backed up.
4. the method for claim 1, wherein described be saved in ad-hoc location by backup file and include:
The backup file is encrypted, obtains encrypting file;
The index of backup file is used as using the combination of the filename, original path and original size of the backup file;
By the index of the backup file, file is corresponding is saved in ad-hoc location with encryption.
5. method as claimed in claim 4, wherein,
The filename of corresponding backup file is used as using the MD5 values of the content for needing document to be protected.
6. a kind of device for realizing file protection, wherein, the device includes:
Document determining unit, being adapted to determine that needs document to be protected;
File backup unit, suitable for judging to need whether document to be protected is changed, if then being backed up to this document, is obtained Backup file;
File storing unit, suitable for backup file is saved in into ad-hoc location.
7. device as claimed in claim 6, wherein, the document determining unit is suitable to true in following one or more modes Surely document to be protected is needed:
The file of specified one or more types is needed by default to protect file;
The instruction of the user of reception, determines to need document to be protected according to the instruction of user;
The file stored in scanning the machine, shows user to be selected for it type information of Miscellaneous Documents stored in the machine Select, the corresponding file of the type that user is selected is defined as needing document to be protected;
User is showed to be selected for it type information of pregnable Miscellaneous Documents, the type correspondence that user is selected File be defined as needing document to be protected.
8. device as claimed in claim 6, wherein,
The file backup unit, needs the content of document to be protected to be changed suitable for working as, and when being saved of modification, to this article Part is backed up.
9. device as claimed in claim 6, wherein,
The file storing unit, suitable for the backup file is encrypted, obtains encrypting file;With the backup text The combination of the filename of part, original path and original size as backup file index;And by the rope of the backup file Draw with encryption that file is corresponding is saved in ad-hoc location.
10. a kind of computing device, wherein, the computing device includes realizing as any one of claim 6-9, and file is protected The device of shield.
CN201710184527.8A 2017-03-24 2017-03-24 Method and device for realizing file protection and computing equipment Active CN106971120B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710184527.8A CN106971120B (en) 2017-03-24 2017-03-24 Method and device for realizing file protection and computing equipment
PCT/CN2017/119503 WO2018171283A1 (en) 2017-03-24 2017-12-28 Method and apparatus for realizing file protection, and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710184527.8A CN106971120B (en) 2017-03-24 2017-03-24 Method and device for realizing file protection and computing equipment

Publications (2)

Publication Number Publication Date
CN106971120A true CN106971120A (en) 2017-07-21
CN106971120B CN106971120B (en) 2020-11-03

Family

ID=59330094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710184527.8A Active CN106971120B (en) 2017-03-24 2017-03-24 Method and device for realizing file protection and computing equipment

Country Status (1)

Country Link
CN (1) CN106971120B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108459927A (en) * 2018-02-28 2018-08-28 北京奇艺世纪科技有限公司 A kind of data back up method, device and server
WO2018171283A1 (en) * 2017-03-24 2018-09-27 北京奇虎科技有限公司 Method and apparatus for realizing file protection, and computing device
CN108805817A (en) * 2018-02-28 2018-11-13 山峰 Computer log based on image procossing records system
CN109491972A (en) * 2018-02-28 2019-03-19 尚宇新 A kind of computer log record quick recovery system and method based on image
CN110674530A (en) * 2019-09-29 2020-01-10 北京神州绿盟信息安全科技股份有限公司 File access control method, equipment and device based on user mode
CN110941852A (en) * 2019-11-15 2020-03-31 珠海豹趣科技有限公司 File encryption and decryption method and device and electronic equipment
CN111639338A (en) * 2020-05-11 2020-09-08 珠海豹趣科技有限公司 Document backup method and related equipment
CN115586990A (en) * 2022-10-09 2023-01-10 上海橙诚呈信息技术服务有限公司 Intelligent data multiple backup system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105528263A (en) * 2015-12-10 2016-04-27 北京金山安全管理***技术有限公司 Method and device for repairing document
CN105760759A (en) * 2015-12-08 2016-07-13 哈尔滨安天科技股份有限公司 Method and system for protecting documents based on process monitoring
CN106446718A (en) * 2016-09-13 2017-02-22 郑州云海信息技术有限公司 File protection method and system based on event-driven mechanism

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105760759A (en) * 2015-12-08 2016-07-13 哈尔滨安天科技股份有限公司 Method and system for protecting documents based on process monitoring
CN105528263A (en) * 2015-12-10 2016-04-27 北京金山安全管理***技术有限公司 Method and device for repairing document
CN106446718A (en) * 2016-09-13 2017-02-22 郑州云海信息技术有限公司 File protection method and system based on event-driven mechanism

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018171283A1 (en) * 2017-03-24 2018-09-27 北京奇虎科技有限公司 Method and apparatus for realizing file protection, and computing device
CN108459927A (en) * 2018-02-28 2018-08-28 北京奇艺世纪科技有限公司 A kind of data back up method, device and server
CN108805817A (en) * 2018-02-28 2018-11-13 山峰 Computer log based on image procossing records system
CN109491972A (en) * 2018-02-28 2019-03-19 尚宇新 A kind of computer log record quick recovery system and method based on image
CN109491972B (en) * 2018-02-28 2021-12-10 浙江久道信息科技有限公司 Image-based computer log record rapid recovery system and method
CN110674530A (en) * 2019-09-29 2020-01-10 北京神州绿盟信息安全科技股份有限公司 File access control method, equipment and device based on user mode
CN110674530B (en) * 2019-09-29 2021-06-18 绿盟科技集团股份有限公司 File access control method, equipment and device based on user mode
CN110941852A (en) * 2019-11-15 2020-03-31 珠海豹趣科技有限公司 File encryption and decryption method and device and electronic equipment
CN111639338A (en) * 2020-05-11 2020-09-08 珠海豹趣科技有限公司 Document backup method and related equipment
CN115586990A (en) * 2022-10-09 2023-01-10 上海橙诚呈信息技术服务有限公司 Intelligent data multiple backup system

Also Published As

Publication number Publication date
CN106971120B (en) 2020-11-03

Similar Documents

Publication Publication Date Title
CN106971120A (en) A kind of method, device and computing device for realizing file protection
US9852289B1 (en) Systems and methods for protecting files from malicious encryption attempts
JP6789308B2 (en) Systems and methods for generating tripwire files
EP3374922B1 (en) Systems and methods for protecting backed-up data from ransomware attacks
CN104484599B (en) A kind of behavior treating method and apparatus based on application program
US9246948B2 (en) Systems and methods for providing targeted data loss prevention on unmanaged computing devices
EP2671185B1 (en) Resumable private browsing session
JP6703616B2 (en) System and method for detecting security threats
US9405904B1 (en) Systems and methods for providing security for synchronized files
CN106980797A (en) A kind of method, device and computing device for realizing file protection
CN107735807A (en) It is revoked the intelligence deletion of data
CN104067286B (en) The detection of invalid trustship key
Tetmeyer et al. Security threats and mitigating risk for USB devices
CN107358114A (en) A kind of method and terminal for preventing user data loss
KR102037656B1 (en) Data files protection
CN110188555A (en) A kind of hard disk data protection method, system and associated component
US9659182B1 (en) Systems and methods for protecting data files
CN109688145A (en) The guard method of privacy information and device
CN105303074A (en) Method for protecting security of Web application
CN104091119A (en) Mobile terminal as well as protection method and protection system of data in mobile terminal
EP3210337B1 (en) Enabling classification and irm in software applications
KR101859823B1 (en) Ransomware prevention technique using key backup
CN108229203A (en) Document protection method and device in a kind of terminal
CN107967430B (en) A kind of document protection method, equipment and system
Grant et al. Identifying file interaction patterns in ransomware behaviour

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant