CN103366106A - Client-side safety monitoring method for remote data recovery system - Google Patents
Client-side safety monitoring method for remote data recovery system Download PDFInfo
- Publication number
- CN103366106A CN103366106A CN2013102500799A CN201310250079A CN103366106A CN 103366106 A CN103366106 A CN 103366106A CN 2013102500799 A CN2013102500799 A CN 2013102500799A CN 201310250079 A CN201310250079 A CN 201310250079A CN 103366106 A CN103366106 A CN 103366106A
- Authority
- CN
- China
- Prior art keywords
- client
- recovery system
- server
- teledata
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000011084 recovery Methods 0.000 title claims abstract description 34
- 238000012544 monitoring process Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012217 deletion Methods 0.000 abstract 1
- 230000037430 deletion Effects 0.000 abstract 1
- 230000008034 disappearance Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Closed-Circuit Television Systems (AREA)
Abstract
A client-side safety monitoring method for a remote data recovery system belongs to the technical field of computer data security and solves the problem of deletion of important data caused by lack of safety verification link of a client side in the existing remote data recovery system. According to the method, a client-side server firstly verifies the safety of permission of a login user through a fingerprint log-in identification module, a camera is used to conduct real-time monitoring on the state of the client-side server and the operation process of the login user after the login user passes the safety verification, the monitoring data are transmitted to a server-side server of the remote data recovery system, the server-side server controls the client-side server according to the received monitoring data, as a result, the safety of the client side of the data recovery system is monitored. The client-side safety monitoring method for the remote data recovery system is used for monitoring the client side of the remote data recovery system.
Description
Technical field
The present invention relates to teledata recovery system client secure method for supervising, belong to the Computer Data Security technical field.
Background technology
In current so informationalized society, the routine office work of government agencies at all levels, enterprises and institutions has be unable to do without the application of computer system, depositing a large amount of significant datas in the computer system in all kinds of storage mediums, these data all belong to the critical asset of enterprise, and are closely bound up with the development of enterprise.Increasing enterprise is based on the electronic remote data recovery system of enterprise self Intranet, well uses electronic data that the built internal network of enterprise and enterprises build up and recovers mechanism and solve electronic data and recover problem.How the recovery of described electronic data because the disappearance of data recovery system client secure checking link often can cause the leakage of significant data, therefore, guarantees the safety of teledata recovery system client, and the protection corporate secret has become a major issue.
Summary of the invention
The present invention is in order to solve existing teledata recovery system because client secure is verified the disappearance of link, to cause the problem of significant data leakage, a kind of teledata recovery system client secure method for supervising being provided.
Teledata recovery system client secure method for supervising of the present invention, it realizes that based on the service end of teledata recovery system it may further comprise the steps:
Step 1: client-server logs in identification module by fingerprint lander's authority is carried out safety verification, after the lander passes through safety verification, and execution in step two;
Step 2: adopt camera that client-server state and lander's operating process are monitored constantly, and with the service end server of monitoring data transmission to the teledata recovery system, this service end server is controlled client-server according to the monitor data that receives, and realizes thus the security monitoring of data recovery system client.
The working method of described camera is by the service end Servers installed of teledata recovery system.
The method that adopts camera that client-server state and lander's operating process are monitored constantly in the described step 2 is the method for complete monitoring or the method for regularly taking pictures.
Advantage of the present invention: the inventive method is carried out safety verification by the identity to the client lander, and client-server state and lander's operating process are carried out Real Time Monitoring, guarantee the security of client work, satisfied the security requirements of computer data.
Description of drawings
Fig. 1 is the process flow diagram of teledata recovery system client secure method for supervising of the present invention.
Embodiment
Embodiment one: below in conjunction with Fig. 1 present embodiment is described, the described teledata recovery system of present embodiment client secure method for supervising, it realizes that based on the service end of teledata recovery system it may further comprise the steps:
Step 1: client-server logs in identification module by fingerprint lander's authority is carried out safety verification, after the lander passes through safety verification, and execution in step two;
Step 2: adopt camera that client-server state and lander's operating process are monitored constantly, and with the service end server of monitoring data transmission to the teledata recovery system, this service end server is controlled client-server according to the monitor data that receives, and realizes thus the security monitoring of data recovery system client.
Present embodiment comprises carries out safety verification and the client operation process is carried out the step of Real Time Monitoring client lander identity, lander's identity is carried out safety verification adopt fingerprint to log in recognition technology, comes safety verification user authority.The data information transfer that camera is monitored is constantly controlled client-server by the service end server to the service end server of teledata recovery system, guarantees the safe handling of data.
In the present embodiment, the lander is by behind the safety verification, and client can start, and enters program, and start camera and monitor, and log.Then the lander can take data away by storage medium.
Embodiment two: present embodiment is described further embodiment one, and the working method of the described camera of present embodiment is by the service end Servers installed of teledata recovery system.
The described camera of present embodiment can be equipped with high-definition camera.
Embodiment three: present embodiment is described further embodiment one or two, and the method that adopts camera that client-server state and lander's operating process are monitored constantly in the described step 2 of present embodiment is the method for complete monitoring or the method for regularly taking pictures.
The method that present embodiment is taken pictures by complete monitoring or timing realizes the monitoring management to client state and operating process.
Telesecurity authentication in the inventive method can according to authorizing fingerprint, account and password to form whole authenticating security system, guarantee legitimacy and the confidentiality of client login.To the monitoring of client, ensure legitimacy and the confidentiality of client operation by configurable camera.
Claims (3)
1. teledata recovery system client secure method for supervising, it is realized based on the service end of teledata recovery system, it is characterized in that it may further comprise the steps:
Step 1: client-server logs in identification module by fingerprint lander's authority is carried out safety verification, after the lander passes through safety verification, and execution in step two;
Step 2: adopt camera that client-server state and lander's operating process are monitored constantly, and with the service end server of monitoring data transmission to the teledata recovery system, this service end server is controlled client-server according to the monitor data that receives, and realizes thus the security monitoring of data recovery system client.
2. teledata recovery system client secure method for supervising according to claim 1 is characterized in that, the working method of described camera is by the service end Servers installed of teledata recovery system.
3. teledata recovery system client secure method for supervising according to claim 1 and 2, it is characterized in that the method that adopts camera that client-server state and lander's operating process are monitored constantly in the described step 2 is the method for complete monitoring or the method for regularly taking pictures.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102500799A CN103366106A (en) | 2013-06-21 | 2013-06-21 | Client-side safety monitoring method for remote data recovery system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102500799A CN103366106A (en) | 2013-06-21 | 2013-06-21 | Client-side safety monitoring method for remote data recovery system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103366106A true CN103366106A (en) | 2013-10-23 |
Family
ID=49367431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013102500799A Pending CN103366106A (en) | 2013-06-21 | 2013-06-21 | Client-side safety monitoring method for remote data recovery system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103366106A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107302520A (en) * | 2017-05-15 | 2017-10-27 | 北京明朝万达科技股份有限公司 | A kind of dynamic anti-leak of data and method for early warning and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060010338A1 (en) * | 2000-07-28 | 2006-01-12 | International Business Machines Corporation | Cascading failover of a data management application for shared disk file systems in loosely coupled node clusters |
US20080016148A1 (en) * | 2006-07-12 | 2008-01-17 | Arsenal Digital Solutions Usa, Inc. | Systems, methods and computer program products for performing remote data storage for client devices |
CN101825877A (en) * | 2009-11-19 | 2010-09-08 | 四维-约翰逊实业股份有限公司 | Safety control system and work flow of armor cash carrier |
CN102014152A (en) * | 2010-10-18 | 2011-04-13 | 浪潮(北京)电子信息产业有限公司 | Long-distance duplicating system and method |
CN102480521A (en) * | 2010-11-28 | 2012-05-30 | 上海浦东软件园信息技术股份有限公司 | Web application safety comprehensive defense guarantee system |
-
2013
- 2013-06-21 CN CN2013102500799A patent/CN103366106A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060010338A1 (en) * | 2000-07-28 | 2006-01-12 | International Business Machines Corporation | Cascading failover of a data management application for shared disk file systems in loosely coupled node clusters |
US20080016148A1 (en) * | 2006-07-12 | 2008-01-17 | Arsenal Digital Solutions Usa, Inc. | Systems, methods and computer program products for performing remote data storage for client devices |
CN101825877A (en) * | 2009-11-19 | 2010-09-08 | 四维-约翰逊实业股份有限公司 | Safety control system and work flow of armor cash carrier |
CN102014152A (en) * | 2010-10-18 | 2011-04-13 | 浪潮(北京)电子信息产业有限公司 | Long-distance duplicating system and method |
CN102480521A (en) * | 2010-11-28 | 2012-05-30 | 上海浦东软件园信息技术股份有限公司 | Web application safety comprehensive defense guarantee system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107302520A (en) * | 2017-05-15 | 2017-10-27 | 北京明朝万达科技股份有限公司 | A kind of dynamic anti-leak of data and method for early warning and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102223374B (en) | Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence | |
US20150244778A1 (en) | Assembling of Isolated Remote Data | |
CN111767583A (en) | Blockchain-based enterprise internal information security assurance method and system | |
CN106330919A (en) | An operation and maintenance security audit method and system | |
CN105550562A (en) | Iris recognition based identity authentication information management system and method | |
CN109379360B (en) | Auditing method, electronic device and computer-readable storage medium | |
CN103607393A (en) | Data safety protection method based on data partitioning | |
CN103942478A (en) | Method and device for identity verification and authority management | |
CN102737192B (en) | A kind of trusted program operation file backup method stored based on cloud | |
CN108965294A (en) | A kind of user name and cipher protection system | |
CN108989118A (en) | A kind of privately owned block chain deployment tool of enterprise-level based on GO language | |
CN110740140A (en) | network information security supervision system based on cloud platform | |
CN108599932A (en) | A kind of identity identifying method for electric system | |
CN114095228A (en) | IoT data security access method, system, device and storage medium based on blockchain and edge computing | |
CN104270347A (en) | Safety control method, device and system | |
CN102739404A (en) | Method and system for managing password | |
CN204680024U (en) | Computer security based on dynamic human face recognition technology is taken precautions against and early warning system | |
CN104821879B (en) | A kind of encryption method in electric power system data transfer | |
CN104978302B (en) | A kind of intelligent and safe USB interface control method based on TCM chips | |
CN103366106A (en) | Client-side safety monitoring method for remote data recovery system | |
CN105608344A (en) | Application program safety management system and method | |
CN104580997A (en) | Video monitoring management system | |
CN112968774A (en) | Method, device storage medium and equipment for encrypting and decrypting configuration file | |
CN113468596B (en) | Multi-element identity authentication method and system for outsourcing calculation of power grid data | |
CN106817385A (en) | Cloud terminal network access system based on high speed reliable hardware module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131023 |
|
WD01 | Invention patent application deemed withdrawn after publication |