File theft sensing method and system

A file and folder technology, applied in the transmission system, electrical components, etc., can solve the problems of increasing network traffic, increasing router tracking equipment overhead, high implementation and operation costs, etc., to achieve convenient deployment, low-cost perception and tracking, and improve efficiency Effect

Active Publication Date: 2021-01-05
INST OF INFORMATION ENG CAS
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

In this new technology called compound sensor (CS), two different types of attacks are possible - one caused by malware and another caused by other threat agents like hackers. However these methods have limitations due to their ability to identify unusual behavior patterns based solely upon certain features from observed files. To overcome those issues, researchers developed various techniques to monitor specific areas within networks while preventing intrusion attempts through advanced encryption technologies. These systems use signature comparisons between known normal activities and unknown ones to determine when they may contain harmful material. They then compare them against stored profiles containing signatures indicating potential future damage. If any changes detected exceed predetermined thresholds, alert messages were sent accordingly. Overall, CSM provides technical benefits over current approaches but offers more flexibility than previous solutions.

Problems solved by technology

Technological Problem: Current Data Leak Detection Systems (LDS), particularly those used during government-related events like terrorist acts, have limitations due to lack of effective defenses against sensitive private documents being hacked overseas. These systems rely heavily upon external authorities setting up protective mechanisms based solely at the beginning of each phase of the lifecycle. Additionally, there may still exist hidden dangers where individuals hide themselves without any signs about them beforehand.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File theft sensing method and system
  • File theft sensing method and system
  • File theft sensing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and easy to understand, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples instruction of.

[0042] In the present invention, a set of perception and tracking system for document theft is designed by adopting the strategy of active marking and tracking, which can effectively solve the above-mentioned existing problems.

[0043] Such as figure 1 As shown in Fig. 1 , a schematic diagram of the overall composition of the file theft perception and tracking system is physically composed of multiple perception file generation clients embedded in the target host system and a comprehensively controlled anomaly perception and tracking master server.

[0044] Such as fig

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file theft sensing method and system. The file theft sensing method comprises the following steps of: 1) putting a folder configuration file desktop.ini into each same-levelor superior folder for storing set sensitive data files; 2) writing a network position used for acquiring a folder icon of a folder where the configuration file is located into each configuration file, wherein a description format of the network position meets a Windows UNC format; 3) making each folder into a file package; 4) deploying a name server as a sensing server on a public network; 5) when the file package is accessed on a host, initiating a domain name resolution request to the sensing server by means of the configuration file; (6) acquiring an IP address of a host which initiates access and a user name and a folder number identifier of a logged-in system according to the request by means of the sensing server; and 7) judging whether a theft or secret divulging event occurs according to extracted information and a predetermined access rule by means of the sensing server.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products