CN107301351A - A kind of method and apparatus scanned with removing network access record - Google Patents
A kind of method and apparatus scanned with removing network access record Download PDFInfo
- Publication number
- CN107301351A CN107301351A CN201710481610.1A CN201710481610A CN107301351A CN 107301351 A CN107301351 A CN 107301351A CN 201710481610 A CN201710481610 A CN 201710481610A CN 107301351 A CN107301351 A CN 107301351A
- Authority
- CN
- China
- Prior art keywords
- network access
- access record
- sector data
- computer
- disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
- H04L67/5682—Policies or rules for updating, deleting or replacing the stored data
Landscapes
- Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method scanned with removing network access record, including:Scanning disk simultaneously reads sector data;The sector data is matched and screened using keyword, network access record is obtained;Compare the eap-message digest of the network access record and the corresponding sector data;When the eap-message digest is consistent, cover type removes the corresponding sector data.The method of scanning and removing network access record proposed by the present invention can be scanned completely normally uses browser with removing all-network access record and not interfering with user.
Description
Technical field
The present invention relates to technical field of network security, more specifically, particularly relating to a kind of scanning with removing network access note
The method and apparatus of record.
Background technology
In the prior art, traditional computer network access record check, is inquired about and is obtained for browser record
Take;Remove, be to do deletion action for browser history record.However, technology Query Browser record may be made simultaneously
Into the phenomenon such as failure, browser positive closing, browser record purge during browser execution be not thorough, record purge effect is influenceed
With the Consumer's Experience of browser.Can be failed for scanning and removing in the prior art network access record in browser execution,
Browser positive closing, the halfway problem of record purge, not yet there is effective solution at present.
The content of the invention
In view of this, the purpose of the embodiment of the present invention be to propose it is a kind of scan with remove the method for network access record with
Device, can be for different user or different types of scanning input with removing network access record, and scanning is with removing institute completely
There is network access to record and do not interfere with user and normally use browser.
Based on above-mentioned purpose, the one side of the embodiment of the present invention provides a kind of side scanned with removing network access record
Method, applied to terminal, comprises the following steps:
Scanning disk simultaneously reads sector data;
Sector data is matched and screened using keyword, network access record is obtained;
Compare the eap-message digest of network access record and corresponding sector data;
When eap-message digest is consistent, cover type removes corresponding sector data.
In some embodiments, scan disk and read sector data and be:Reading disk design parameter, wherein disk have
Body parameter includes at least one of:Cylinder number, every cylinder track number, every magnetic track sector number, every sector byte number, disk are always fanned
Area's number;It is successively read the data in magnetic disk of fixed size.
In some embodiments, sector data is matched and screened using keyword, obtain network access record
Including:
Matching is searched in sector data according to keyword, and extracts the sector data generation PRELIMINARY RESULTS collection of matching;
The information format recorded according to network access is concentrated in PRELIMINARY RESULTS and carries out screening and filtering, generation be stored with one or
The final result collection of a plurality of network access record.
In some embodiments, keyword includes at least one of:“http://”、“https://”、
“Cookie:”、“Host:”、“@http:”、“@https:”、“@ftp:”;Information format includes at least one of:It is corresponding
Website URL addresses, access time, sector data address section, informative abstract verification.
In some embodiments, the eap-message digest of comparison network access record and corresponding sector data is:Count respectively
The eap-message digest of each network access record and corresponding sector data is calculated, and whether contrast the two consistent.
In some embodiments, the corresponding sector data of cover type removing is:Disk where to corresponding sector data
Address space all backfills " 0 " or " 1 ".
The another aspect of the embodiment of the present invention, additionally provides a kind of device scanned with removing network access record, uses
The above method.
The another aspect of the embodiment of the present invention, additionally provides a kind of computer equipment, including memory, at least one processing
Device and storage on a memory and the computer program that can run on a processor, are performed above-mentioned during computing device program
Method.
The another aspect of the embodiment of the present invention, additionally provides a kind of computer-readable recording medium, described computer-readable
Storage medium is stored with computer program, and the computer program performs above-mentioned method when being executed by processor.
The another aspect of the embodiment of the present invention, additionally provides a kind of computer program product, the computer program product
Including the calculation procedure being stored on computer-readable recording medium, the calculation procedure includes instruction, when the instruction is counted
When calculation machine is performed, the computer is set to perform the above method.
The present invention has following advantageous effects:Scanning provided in an embodiment of the present invention is with removing network access record
Method and apparatus, is remembered by scanning disk and reading sector data, matching is carried out using keyword and screen acquisition network access
Record, compare eap-message digest, cover type removes the technical scheme of corresponding sector data when eap-message digest is consistent, can sweep completely
Retouch and access record with removing all-network, do not removed by browser that network access record is influenceed and not interfere with user normal
Use browser.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
The scanning and the flow of one embodiment of the method for removing network access record that Fig. 1 provides for the present invention are illustrated
Figure;
The scanning and the flow of second embodiment of the method for removing network access record that Fig. 2 provides for the present invention are illustrated
Figure;
The one of the computer equipment for performing method of the scanning with removing network access record that Fig. 3 provides for the present invention
The hardware architecture diagram of individual embodiment.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with specific embodiment, and reference
Accompanying drawing, the embodiment of the present invention is further described.
It should be noted that all statements for using " first " and " second " are for differentiation two in the embodiment of the present invention
The entity of individual same names non-equal or the parameter of non-equal, it is seen that " first " and " second " only for statement convenience, no
It is interpreted as the restriction to the embodiment of the present invention, subsequent embodiment no longer illustrates one by one to this.
Based on above-mentioned purpose, the embodiment of the present invention the on one side, it is proposed that one kind can for different user or not
The user of same type is scanned one embodiment of the method with removing network access record.Fig. 1 is illustrated that the present invention
The schematic flow sheet of one embodiment of method of the scanning of offer with removing network access record.
Method of the scanning with removing network access record, alternatively, applied to terminal, comprises the following steps:
Step S101, scans disk and reads sector data;
Step S103, is matched and is screened to sector data using keyword, obtains network access record;
Step S105, compares the eap-message digest of network access record and corresponding sector data;
Step S107, when eap-message digest is consistent, cover type removes corresponding sector data.
In some embodiments, scan disk and read sector data and be:Reading disk design parameter, wherein disk have
Body parameter includes at least one of:Cylinder number, every cylinder track number, every magnetic track sector number, every sector byte number, disk are always fanned
Area's number;It is successively read the data in magnetic disk of fixed size.
Wherein, alternatively, disk can be hard disk;Fixed size can be the fixed physical structure determination according to hard disk
, it is several in the several sectors or a cylinder such as one sector of each reading or in several continuous sectors or a magnetic track
Sector etc..
In some embodiments, sector data is matched and screened using keyword, obtain network access record
Including:
Matching is searched in sector data according to keyword, and extracts the sector data generation PRELIMINARY RESULTS collection of matching;
The information format recorded according to network access is concentrated in PRELIMINARY RESULTS and carries out screening and filtering, generation be stored with one or
The final result collection of a plurality of network access record.
Wherein, alternatively, behavior of the generation of PRELIMINARY RESULTS collection and final result collection with reading sector data is unrelated, changes speech
It, can be that sector data of every reading just generates a PRELIMINARY RESULTS collection or have read all sector datas
PRELIMINARY RESULTS collection is generated, final result collection is as the same relative to sector data, and final result collection is as the same relative to PRELIMINARY RESULTS collection.
In some embodiments, keyword includes at least one of:“http://”、“https://”、
“Cookie:”、“Host:”、“@http:”、“@https:”、“@ftp:”;Information format includes at least one of:It is corresponding
Website URL addresses, access time, sector data address section, informative abstract verification.
Wherein, alternatively, keyword is the high frequency word during network access is recorded, it is meant that the sector number of keyword occur
The information related to network access record is potentially included in;Information format then further extracts network access record information, and
Eliminate can not read and non-network and access record information.Recover data from low layer by this way not removed by browser
Historical record influences.
In some embodiments, the eap-message digest of comparison network access record and corresponding sector data is:Count respectively
The eap-message digest of each network access record and corresponding sector data is calculated, and whether contrast the two consistent.
Wherein, alternatively, the eap-message digest of network access record can be calculated in step S103, can also be in step S105
Calculate.Eap-message digest preferably uses MD5 calculating.
In some embodiments, the corresponding sector data of cover type removing is:Disk where to corresponding sector data
Address space all backfills " 0 " or " 1 ".
Wherein, alternatively, vestige of the data on disk can be thoroughly eliminated using the method for local low lattice, and can not
Recover.Local low lattice will not also fail because of being taken by browser process.
From above-described embodiment as can be seen that scanning provided in an embodiment of the present invention is with removing the method that network access is recorded,
By scan disk and read sector data, using keyword carry out matching with screen acquisition network access record, compare message
Summary, when eap-message digest is consistent, cover type removes the technical scheme of corresponding sector data, can scan completely with removing institute
Have network access record, not by browser remove network access record influenceed and do not interfere with user normally use browser.
The embodiment of the present invention also proposed one kind can be scanned for different user or different types of user with clearly
Except second embodiment of the method that network access is recorded.Fig. 2 is illustrated that the scanning of the invention provided with removing network access
The schematic flow sheet of second embodiment of the method for record.
As shown in Fig. 2 in method of the described scanning with removing network access record, disk network access registered depth is swept
Retouch including:
Reading disk design parameter, including cylinder number, per cylinder track number, per magnetic track sector number, per sector byte number, magnetic
The total sector number of disk;
It is successively read the data in magnetic disk of fixed size;
The data read are subjected to keyword and search matching, while generating PRELIMINARY RESULTS collection;
Result set is subjected to screening and filtering generation target data, including URL address informations, surf time, correspondence magnetic
Disk address is interval, the information such as MD5 verifications;
Final data are collected to result set.
As shown in Fig. 2 in method of the described scanning with removing network access record, disk network access record purge bag
Include:
According to scan come result set, removed one by one;
First calculate the current MD5 check values in sector to be erased;
Current check value is compared with result set MD5;
Compare and successfully carry out erasing operation, otherwise carry out next record purge.
From above-described embodiment as can be seen that scanning provided in an embodiment of the present invention is with removing the method that network access is recorded,
By scan disk and read sector data, using keyword carry out matching with screen acquisition network access record, compare message
Summary, when eap-message digest is consistent, cover type removes the technical scheme of corresponding sector data, can scan completely with removing institute
Have network access record, not by browser remove network access record influenceed and do not interfere with user normally use browser.
It is important to note that each in each embodiment of method of the above-mentioned scanning with removing network access record
Step can be intersected, replaces, increases, deleted, therefore, and these rational permutation and combination become alternatively in scanning with removing net
The method that network accesses record be should also be as belonging to protection scope of the present invention, and protection scope of the present invention should not be confined to institute
State on embodiment.
Based on above-mentioned purpose, second aspect of the embodiment of the present invention, it is proposed that one kind can be for different user or not
The user of same type is scanned one embodiment of the device with removing network access record.The scanning is with removing network
The device for accessing record has used method of the above-mentioned scanning with removing network access record.
From above-described embodiment as can be seen that scanning provided in an embodiment of the present invention is with removing the device that network access is recorded,
By scan disk and read sector data, using keyword carry out matching with screen acquisition network access record, compare message
Summary, when eap-message digest is consistent, cover type removes the technical scheme of corresponding sector data, can scan completely with removing institute
Have network access record, not by browser remove network access record influenceed and do not interfere with user normally use browser.
It is important to note that the embodiment of device of the above-mentioned scanning with removing network access record employs described sweep
The embodiment of the method with removing network access record is retouched to illustrate the course of work of each module, those skilled in the art's energy
Enough it is readily conceivable that by these module applications into other embodiment of the scanning with removing the method that network access is recorded.
Certainly, each step in the embodiment of the method due to the scanning with removing network access record can be intersected, replaced
Change, increase, delete, therefore, these rational permutation and combination become device alternatively in the scanning with removing network access record
It should also be as belonging to protection scope of the present invention, and protection scope of the present invention should not be confined on the embodiment.
Based on above-mentioned purpose, the 3rd aspect of the embodiment of the present invention, it is proposed that one kind performs the scanning with removing net
Network accesses one embodiment of the computer equipment of the method for record.
The computer equipment for performing the method that the scanning is recorded with removing network access includes memory, at least one
Individual processor and storage on a memory and the computer program that can run on a processor, are performed during computing device program
Any one above-mentioned method.
As shown in figure 3, being the execution computer for scanning the method with removing network access record that the present invention is provided
The hardware architecture diagram of one embodiment of equipment.
By taking computer equipment as shown in Figure 3 as an example, include a processor 301 and one in the computer equipment
Memory 302, and can also include:Input unit 303 and output device 304.
Processor 301, memory 302, input unit 303 and output device 304 can pass through bus or other modes
In connection, Fig. 3 exemplified by being connected by bus.
Memory 302 is as a kind of non-volatile computer readable storage medium storing program for executing, available for storage non-volatile software journey
The scanning in sequence, non-volatile computer executable program and module, such as the embodiment of the present application is with removing network access
Corresponding programmed instruction/the module of method of record.Processor 301 is by running storage in the memory 302 non-volatile soft
Part program, instruction and module, so that various function application and the data processing of execute server, that is, realize that the above method is real
Apply method of the scanning of example with removing network access record.
Memory 302 can include storing program area and storage data field, wherein, storing program area can store operation system
Application program required for system, at least one function;Storage data field can store what is recorded according to scanning with removing network access
Device uses created data etc..In addition, memory 302 can include high-speed random access memory, it can also include
Nonvolatile memory, for example, at least one disk memory, flush memory device or other non-volatile solid state memory parts.
In certain embodiments, memory 302 is optional including the memory remotely located relative to processor 301, these long-range storages
Device can pass through network connection to local module.The example of above-mentioned network includes but is not limited to internet, intranet, local
Net, mobile radio communication and combinations thereof.
Input unit 303 can receive the numeral or character information of input, and produce with scanning with removing network access note
The key signals input that the user of the device of record is set and function control is relevant.Output device 304 may include that display screen etc. is shown
Equipment.
One or more of scannings programmed instruction/module corresponding with the method for removing network access record is stored in
In the memory 302, when being performed by the processor 301, the scanning and removing in above-mentioned any means embodiment are performed
The method of network access record.
It is described to perform the scanning and any one embodiment of the computer equipment of the method for removing network access record,
The identical or similar effect of corresponding foregoing any means embodiment can be reached.
Based on above-mentioned purpose, the 4th aspect of the embodiment of the present invention, it is proposed that a kind of computer-readable recording medium, institute
Stating computer-readable recording medium storage has computer executable instructions, and the computer executable instructions can perform above-mentioned any side
Scanning in method embodiment is with removing the method for network access record and realizing the scanning in above-mentioned any device/system embodiment
Device/system with removing network access record.The embodiment of the computer-readable recording medium, can reach and correspond to therewith
The foregoing any means effect identical or similar with device/system embodiment.
Based on above-mentioned purpose, the 5th aspect of the embodiment of the present invention, it is proposed that a kind of computer program product, the calculating
Machine program product includes the calculation procedure being stored on computer-readable recording medium, and the computer program includes instruction, when this
When instruction is computer-executed, the computer is set to perform the scanning in above-mentioned any means embodiment with removing network access record
Method and realize in above-mentioned any device/system embodiment scanning with remove network access record device/system.It is described
The embodiment of computer program product, can reach corresponding foregoing any means it is identical with device/system embodiment or
The similar effect of person.
Finally it should be noted that one of ordinary skill in the art will appreciate that realizing the whole in above-described embodiment method
Or part flow, related hardware can be instructed to complete by computer program, described program can be stored in a computer
In read/write memory medium, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, it is described
Storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory
(Random Access Memory, RAM) etc..The embodiment of the computer program, can reach corresponding foregoing
The identical or similar effect of embodiment of the method for anticipating.
In addition, typically, it can be various electric terminal equipments, example that the embodiment of the present invention, which discloses described device, equipment etc.,
Such as mobile phone, personal digital assistant (PDA), tablet personal computer (PAD), intelligent television or large-scale terminal device, are such as serviced
Device etc., therefore protection domain disclosed in the embodiment of the present invention should not limit as certain certain types of device, equipment.It is of the invention real
It can be applied to above-mentioned any with the combining form of electronic hardware, computer software or both to apply example and disclose described client
In a kind of electric terminal equipment.
In addition, disclosed method is also implemented as the computer program performed by CPU according to embodiments of the present invention, should
Computer program can be stored in a computer-readable storage medium.When the computer program is performed by CPU, the present invention is performed
The above-mentioned functions limited in method disclosed in embodiment.
In addition, above method step and system unit can also utilize controller and cause controller real for storing
The computer-readable recording medium of the computer program of existing above-mentioned steps or Elementary Function is realized.
In addition, it should be appreciated that computer-readable recording medium (for example, memory) as described herein can be volatile
Property memory or nonvolatile memory, or both volatile memory and nonvolatile memory can be included.It is used as example
Son and it is nonrestrictive, nonvolatile memory can include read-only storage (ROM), programming ROM (PROM), electrically programmable
ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory can include arbitrary access
Memory (RAM), the RAM can serve as external cache.Nonrestrictive as an example, RAM can be with more
The form of kind is obtained, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM
(DDR SDRAM), enhancing SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and directly Rambus RAM (DRRAM).
The storage device of disclosed aspect is intended to the memory of including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, the various illustrative logical blocks with reference to described by disclosure herein, mould
Block, circuit and algorithm steps may be implemented as the combination of electronic hardware, computer software or both.It is hard in order to clearly demonstrate
This interchangeability of part and software, the function with regard to various exemplary components, square, module, circuit and step it is entered
General description is gone.This function is implemented as software and is also implemented as hardware depending on concrete application and application
Design constraint to whole system.Those skilled in the art can in a variety of ways realize described for every kind of concrete application
Function, but this realize that decision should not be interpreted as causing a departure from scope of disclosure of the embodiment of the present invention.
Various illustrative logical blocks, module and circuit with reference to described by disclosure herein, which can be utilized, to be designed to
The following part of function described here is performed to realize or perform:General processor, digital signal processor (DSP), special collection
Into circuit (ASIC), field programmable gate array (FPGA) or other PLDs, discrete gate or transistor logic, divide
Any combinations of vertical nextport hardware component NextPort or these parts.General processor can be microprocessor, but alternatively, processing
Device can be any conventional processors, controller, microcontroller or state machine.Processor can also be implemented as computing device
Combination, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessors combination DSP and/or any
Other this configurations.
The step of method with reference to described by disclosure herein or algorithm, can be directly contained in hardware, be held by processor
In capable software module or in combination of the two.Software module may reside within RAM memory, flash memory, ROM storages
Device, eprom memory, eeprom memory, register, hard disk, removable disk, CD-ROM or known in the art it is any its
In the storage medium of its form.Exemplary storage medium is coupled to processor so that processor can be from the storage medium
Middle reading information writes information to the storage medium.In an alternative, the storage medium can be with processor collection
Into together.Processor and storage medium may reside within ASIC.ASIC may reside within user terminal.In a replacement
In scheme, processor and storage medium can be resident in the user terminal as discrete assembly.
In one or more exemplary designs, the function can be real in hardware, software, firmware or its any combination
It is existing.If realized in software, the function can be stored in as one or more instructions or code computer-readable
Transmitted on medium or by computer-readable medium.Computer-readable medium includes computer-readable storage medium and communication media,
The communication media includes helping to be sent to computer program into any medium of another position from a position.Storage medium
It can be any usable medium that can be accessed by a general purpose or special purpose computer.It is nonrestrictive as an example, the computer
Computer-readable recording medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage equipment or other magnetic
Property storage device, or can be used for carrying or storage form for instruct or data structure needed for program code and can
Any other medium accessed by universal or special computer or universal or special processor.In addition, any connection can
It is properly termed as computer-readable medium.If for example, using coaxial cable, optical fiber cable, twisted-pair feeder, digital subscriber line
(DSL) or such as infrared ray, radio and microwave wireless technology come from website, server or other remote sources send software,
Then the wireless technology of above-mentioned coaxial cable, optical fiber cable, twisted-pair feeder, DSL or such as infrared ray, radio and microwave is included in
The definition of medium.As used herein, disk and CD include compact disk (CD), laser disk, CD, digital versatile disc
(DVD), floppy disk, Blu-ray disc, wherein disk generally magnetically reproduce data, and CD utilizes laser optics ground reproduce data.On
The combination for stating content should also be as being included in the range of computer-readable medium.
Above is exemplary embodiment disclosed by the invention, it should be noted that in the sheet limited without departing substantially from claim
On the premise of inventive embodiments scope of disclosure, it may be many modifications and change.According to open embodiment described herein
The function of claim to a method, step and/or action be not required to perform with any particular order.Although in addition, the present invention is implemented
Element disclosed in can be described or required in individual form, but be odd number unless explicitly limited, it is understood that be multiple.
It should be appreciated that it is used in the present context, unless context clearly supports exception, singulative " one
It is individual " (" a ", " an ", " the ") be intended to also include plural form.It is to be further understood that "and/or" used herein is
Referring to includes any of one or more than one project listed in association and is possible to combine.
The embodiments of the present invention disclose that embodiment sequence number is for illustration only, and the quality of embodiment is not represented.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware
To complete, the hardware of correlation can also be instructed to complete by program, described program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
Those of ordinary skills in the art should understand that:The discussion of any of the above embodiment is exemplary only, not
It is intended to imply that scope of disclosure of the embodiment of the present invention (including claim) is limited to these examples;In the think of of the embodiment of the present invention
It under road, can also be combined, and exist as described above between the technical characteristic in above example or non-be the same as Example
Many other changes of the different aspect of the embodiment of the present invention, for simplicity, they are provided not in details.Therefore, it is all at this
Within the spirit and principle of inventive embodiments, any omission, modification, equivalent substitution, improvement for being made etc. should be included in this hair
Within the protection domain of bright embodiment.
Claims (10)
1. a kind of method scanned with removing network access record, it is characterised in that applied to terminal, comprise the following steps:
Scanning disk simultaneously reads sector data;
The sector data is matched and screened using keyword, network access record is obtained;
Compare the eap-message digest of the network access record and the corresponding sector data;
When the eap-message digest is consistent, cover type removes the corresponding sector data.
2. according to the method described in claim 1, it is characterised in that scanning disk simultaneously reads the sector data and is:Read magnetic
Disk design parameter, wherein the disk design parameter includes at least one of:Cylinder number, every cylinder track number, the fan per magnetic track
Area's number, every sector byte number, the total sector number of disk;It is successively read the data in magnetic disk of fixed size.
3. according to the method described in claim 1, it is characterised in that the sector data is matched using the keyword
With screening, obtaining the network access record includes:
Matching is searched in the sector data according to the keyword, and extracts the sector data generation PRELIMINARY RESULTS of matching
Collection;
The information format recorded according to the network access is concentrated in the PRELIMINARY RESULTS and carries out screening and filtering, and generation is stored with one
The final result collection of bar or a plurality of network access record.
4. method according to claim 3, it is characterised in that the keyword includes at least one of:
“http://”、“https://”、“Cookie:”、“Host:”、“@http:”、“@https:”、“@ftp:”;Described information lattice
Formula includes at least one of:Corresponding website URL addresses, access time, sector data address section, informative abstract verification.
5. method according to claim 3, it is characterised in that compare the network access record and the corresponding sector
The eap-message digest of data is:The message of each network access record and the corresponding sector data is calculated respectively
Summary, and whether contrast the two consistent.
6. according to the method described in claim 1, it is characterised in that cover type removes the corresponding sector data and is:To right
The all backfills " 0 " or " 1 " of disk address space where the sector data answered.
7. a kind of device scanned with removing network access record, it is characterised in that using such as claim 1-6 any one institute
The method stated.
8. a kind of computer equipment, including memory, at least one processor and it is stored on the memory and can be in institute
State the computer program run on processor, it is characterised in that such as claim is performed during the computing device described program
Method described in 1-6 any one.
9. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, its feature exists
In perform claim requires the method described in 1-6 any one when the computer program is executed by processor.
10. a kind of computer program product, it is characterised in that the computer program product includes being stored in computer-readable deposit
Calculation procedure on storage media, the calculation procedure includes instruction, when the instruction is computer-executed, makes the computer
Perform claim requires the method described in 1-6 any one.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710481610.1A CN107301351A (en) | 2017-06-22 | 2017-06-22 | A kind of method and apparatus scanned with removing network access record |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710481610.1A CN107301351A (en) | 2017-06-22 | 2017-06-22 | A kind of method and apparatus scanned with removing network access record |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107301351A true CN107301351A (en) | 2017-10-27 |
Family
ID=60136439
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710481610.1A Pending CN107301351A (en) | 2017-06-22 | 2017-06-22 | A kind of method and apparatus scanned with removing network access record |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107301351A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109711205A (en) * | 2018-12-04 | 2019-05-03 | 北京北信源信息安全技术有限公司 | A kind of USB storage device usage record sweep-out method and device |
| CN110008759A (en) * | 2019-03-29 | 2019-07-12 | 北京中安兴坤科技有限公司 | Erasing of information method and device for storage medium |
| CN110321082A (en) * | 2019-07-09 | 2019-10-11 | 上海悦易网络信息技术有限公司 | Data clearing method and equipment for computer |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1900935A (en) * | 2005-07-14 | 2007-01-24 | 国际商业机器公司 | Method and system for accessing sector data |
| CN102609531A (en) * | 2012-02-14 | 2012-07-25 | 北京鼎普科技股份有限公司 | Method for pegging files according to keywords |
| CN103761310A (en) * | 2014-01-23 | 2014-04-30 | 贝壳网际(北京)安全技术有限公司 | Method and device for processing webpage access records and browser |
| CN104699688A (en) * | 2013-12-04 | 2015-06-10 | 杭州鹰湾科技有限公司 | File searching method and electronic device |
| CN105302868A (en) * | 2015-09-29 | 2016-02-03 | 北京金山安全软件有限公司 | network access record cleaning method and device |
| CN105446980A (en) * | 2014-06-27 | 2016-03-30 | 北京金山安全软件有限公司 | Method and device for identifying picture junk files |
| WO2016070529A1 (en) * | 2014-11-07 | 2016-05-12 | 中兴通讯股份有限公司 | Method and device for achieving duplicated data deletion |
| US20160295416A1 (en) * | 2015-04-02 | 2016-10-06 | Qualcomm Incorporated | Method and apparatus for performing a message integrity check |
-
2017
- 2017-06-22 CN CN201710481610.1A patent/CN107301351A/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1900935A (en) * | 2005-07-14 | 2007-01-24 | 国际商业机器公司 | Method and system for accessing sector data |
| CN102609531A (en) * | 2012-02-14 | 2012-07-25 | 北京鼎普科技股份有限公司 | Method for pegging files according to keywords |
| CN104699688A (en) * | 2013-12-04 | 2015-06-10 | 杭州鹰湾科技有限公司 | File searching method and electronic device |
| CN103761310A (en) * | 2014-01-23 | 2014-04-30 | 贝壳网际(北京)安全技术有限公司 | Method and device for processing webpage access records and browser |
| CN105446980A (en) * | 2014-06-27 | 2016-03-30 | 北京金山安全软件有限公司 | Method and device for identifying picture junk files |
| WO2016070529A1 (en) * | 2014-11-07 | 2016-05-12 | 中兴通讯股份有限公司 | Method and device for achieving duplicated data deletion |
| US20160295416A1 (en) * | 2015-04-02 | 2016-10-06 | Qualcomm Incorporated | Method and apparatus for performing a message integrity check |
| CN105302868A (en) * | 2015-09-29 | 2016-02-03 | 北京金山安全软件有限公司 | network access record cleaning method and device |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109711205A (en) * | 2018-12-04 | 2019-05-03 | 北京北信源信息安全技术有限公司 | A kind of USB storage device usage record sweep-out method and device |
| CN110008759A (en) * | 2019-03-29 | 2019-07-12 | 北京中安兴坤科技有限公司 | Erasing of information method and device for storage medium |
| CN110321082A (en) * | 2019-07-09 | 2019-10-11 | 上海悦易网络信息技术有限公司 | Data clearing method and equipment for computer |
| CN110321082B (en) * | 2019-07-09 | 2023-05-30 | 上海万物新生环保科技集团有限公司 | Data clearing method and device for computer |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8230166B2 (en) | Apparatus and method for processing data of flash memory | |
| CN107291615A (en) | A kind of WEB front-end log-output method and device | |
| US20190370189A1 (en) | Off-chip memory address scrambling apparatus and method for system on chip | |
| CN109726664B (en) | Intelligent dial recommendation method, system, equipment and storage medium | |
| CN107301351A (en) | A kind of method and apparatus scanned with removing network access record | |
| CN107391478A (en) | A kind of online document edit methods and device | |
| CN108573172B (en) | Data checking and storing method and device | |
| CN109086451A (en) | A kind of picture storage and retrieval method and apparatus | |
| CN107330028A (en) | Expansion application methods and system of a kind of Apache NiFi in terms of source data input database | |
| CN114036529A (en) | Vulnerability scanning method and device and computer equipment | |
| CN107729375B (en) | Log data sorting method and device | |
| CN111125018B (en) | File exception tracing method, device, equipment and storage medium | |
| RU2479022C1 (en) | Method of protecting computer equipment from leakage of information through compromising emanation channel and noise pickup | |
| CN109165619A (en) | A kind of processing method of image, device and electronic equipment | |
| CN114595066B (en) | Processing method and device for reserved memory, electronic equipment and medium | |
| US20110107056A1 (en) | Method for determining data correlation and a data processing method for a memory | |
| KR20050076156A (en) | Data recovery device and method thereof | |
| CN114519690B (en) | Image processing method and device, image detection method and system, and storage medium | |
| JP6103958B2 (en) | Semiconductor memory device | |
| CN107273523A (en) | A kind of network access record purge method and device | |
| CN107341203A (en) | The access control and optimiged index method and apparatus of a kind of distributed search engine | |
| CN117631952B (en) | Coding method, device and electronic device | |
| Ahn et al. | IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances | |
| CN110222052A (en) | Block chain data processing method, device, computer equipment and storage medium | |
| US9798733B1 (en) | Reducing file space through the degradation of file content |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171027 |