Summary of the invention
Based on this, be necessary to determine at general equipment safety management method whether equipment is the equipment of oneself trusting, and can't fundamentally guarantee the problem of device security, and the credible management-control method of a kind of IO equipment and system thereof are provided, guarantee the safety management of equipment and the safe transmission of data.
The credible management-control method of a kind of IO equipment comprises step:
Detect the IO port, when described IO port open, allow to insert USB device;
Judge whether described USB device is device registration, if device registration is then identified described USB device, if unregistered equipment is then forbidden described USB device operation;
According to the current operation system environment of described IO equipment, the described USB device of identification is encrypted;
The described USB device that deciphering has been encrypted obtains credible USB flash disk.
Therein among embodiment, described detection IO port is when described IO port open, allowing to insert USB device is specially: detect described IO port, when the driver loading of driver in the described IO port is finished, open described IO port, allow to insert described USB device.
Therein among embodiment, describedly judge whether described USB device is device registration, if device registration is then identified described USB device, comprise step if unregistered equipment is then forbidden described USB device operation:
Judge whether described USB device is device registration, if device registration then starts described USB device, if the unregistered equipment described USB device of online registration then, and forbid described USB device operation;
Judge whether the described USB device of online registration succeeds in registration, if the online registration success then starts described USB device, and the log-on message of described USB device is write in the white list of described IO equipment, if described USB device operation is then forbidden in the online registration failure.
Therein among embodiment, before the described USB device of described online registration also in steps:
Detect described USB device and whether accept online registration, when described USB device is not accepted online registration, forbid described USB device startup and withdraw from operation.
Therein among embodiment, describedly judge whether described USB device is device registration, if device registration then starts described USB device, specifically comprise step if unregistered equipment is then forbidden described USB device operation:
Monitor described IO device core process response;
When monitoring event that described USB device inserts when taking place, response events, and event information is sent to user's space handle;
Obtain described event information, forbid described USB device operation;
According to described event information, check the log-on message whether described USB device is arranged in the white list of described IO equipment, then start described USB device if having, then do not forbid described USB device operation if having.6, the credible management-control method of IO equipment according to claim 1 and 2 is characterized in that, the described USB device that described deciphering has been encrypted obtains credible USB flash disk and specifically comprises step:
Judge whether described IO equipment has the TCM chip, if having and judge that then can described TCM chip normally start, can normally start and then continue following operation if described IO equipment has described TCM chip and described TCM chip, otherwise non-decrypting and withdraw from operation;
Check the algorithm in the kernel of described IO equipment, if there is the algorithm of encrypting described USB device in the kernel of described IO equipment, then proceed following operation, otherwise non-decrypting and withdraw from operation;
Check current operation system, if current operation system is the operating system of encrypting described USB device, then proceed following operation, otherwise non-decrypting and withdraw from operation;
Obtain the key in the described TCM chip, judge whether described key is correct, if correctly then decipher described described USB device of having encrypted, obtain described credible USB flash disk, then non-decrypting and withdraw from operation as if incorrect.
The credible managing and control system of a kind of IO equipment comprises:
The IO port detecting module for detection of the IO port, when described IO port open, allows to insert USB device;
USB device registration judge module is used for judging whether described USB device is device registration, if device registration is then identified described USB device, if unregistered equipment is then forbidden described USB device operation;
Encrypting module is used for the current operation system environment according to described IO equipment, and the described USB device of identification is encrypted;
Deciphering module is used for deciphering the described USB device of having encrypted and obtains credible USB flash disk.
Therein among embodiment, institute's USB device registration is judged and is specifically comprised:
The registration judging unit is used for judging whether described USB device is device registration, if device registration then starts described USB device, if the unregistered equipment described USB device of online registration then, and forbid that described USB device operates;
Judging unit succeeds in registration, be used for judging whether the described USB device of online registration succeeds in registration, if the online registration success then starts described USB device, and the log-on message of described USB device is write in the white list of described IO equipment, if described USB device operation is then forbidden in the online registration failure.
Among embodiment, described registration judging unit comprises therein:
Whether the online registration confirmation unit accepts online registration for detection of described USB device, when described USB device is not accepted online registration, forbids described USB device startup and withdraws from operation.
Among embodiment, described USB device registration judge module specifically comprises therein:
The process monitoring unit is used for the described IO device core process response of monitoring;
Response unit is used for when monitoring the event generation that described USB device inserts, response events, and event information is sent to user's space handle;
Information acquisition unit is used for obtaining described event information, forbids described USB device operation;
Inspection unit is used for according to described event information, checks in the white list of described IO equipment whether the log-on message of described USB device is arranged, and then starts described USB device if having, and does not then forbid described USB device operation if having.
Among embodiment, described deciphering module specifically comprises therein:
IO Equipment Inspection unit, be used for judging whether described IO equipment has the TCM chip, if have and judge that then can described TCM chip normally start, can normally start and then continue following operation if described IO equipment has described TCM chip and described TCM chip, otherwise non-decrypting and withdraw from operation;
The algorithm detecting unit be used for to check the algorithm of the kernel of described IO equipment, if there is the algorithm of encrypting described USB device in the kernel of described IO equipment, then proceeds following operation, otherwise non-decrypting and withdraw from operation;
The operating system detecting unit be used for to check current operation system, if current operation system is the operating system of encrypting described USB device, then proceeds following operation, otherwise non-decrypting and withdraw from operation;
Key acquiring unit is used for obtaining the key of described TCM chip, judges whether described key is correct, if correctly then decipher described described USB device of having encrypted, obtains described credible USB flash disk, and is then non-decrypting and withdraw from operation as if incorrect.
The credible management-control method of IO equipment of the present invention, judge at first whether the IO port is opened, have only when the IO port open, IO equipment just allows USB device to insert, IO equipment judges whether the USB device that inserts is device registration afterwards, if the USB device that inserts in IO equipment registration just start and identify this USB device, if registering, the USB device that inserts just do not forbid this USB device in IO equipment, IO equipment can be encrypted USB device according to the current operation system environment after USB device started, popular is exactly that USB device is set " format " according to the kernel of IO equipment, elimination may be stored in the virus in the USB device, wooden horse etc., data deciphering when last IO equipment is encrypted USB device according to kernel obtains credible USB flash disk, credible USB flash disk and IO equipment carry out data interaction, guarantee the safety management of IO equipment and USB device and the safe transmission of data.
Embodiment
As shown in Figure 1, the credible management-control method of a kind of IO equipment comprises step:
S100: detect the IO port, when described IO port open, allow to insert USB device.
For the control of IO port, can solve the protection to IO equipment, the keeper has the right the port on the IO equipment is opened and quiescing, prevents that mobile device plugs at IO equipment arbitrarily.IO equipment is forbidden the USB device operation when the IO port shutdown, and when the IO port open, IO equipment just can allow USB device to continue operation.Specifically, when the IO port driver drives and pci bus drives when separating, the IO port shutdown is when the IO port driver drives and pci bus driving when binding the IO port open.
S200: judge whether described USB device is device registration, if device registration is then identified described USB device, if unregistered equipment is then forbidden described USB device operation.
Judge whether the USB device that inserts is registered devices on IO equipment, and only the equipment of registering at this machine could be identified at this machine, and the equipment that is not registered will be forbidden being arrived by the IO recognition of devices.If the USB device that inserts is that unregistered equipment I O equipment will be forbidden its operation, is that device registration IO equipment will be identified this equipment if insert USB device, and proceeds operation.
S300: according to the current operation system environment of described IO equipment, the described USB device of identification is encrypted.
S400: the described USB device that deciphering has been encrypted obtains credible USB flash disk.
The u dish hardware that credible u dish is a kind of encrypted mistake has only the u dish hardware that support can be encrypted to make credible u dish by software, does not support encrypted u dish hardware not to be encrypted by software.By the All Files that in credible u dish, writes, all will be encrypted to ciphertext automatically, before not deciphering, even other people can get access to the file of credible u dish the inside by the means of violence, owing to encrypt by some complicated algorithm, also be difficult to file is reverted to expressly.Have only the operating system by formulating, and believable computing machine, credible u dish could be deciphered.The mentality of designing of making credible u dish is: the dm-crypt kernel module utilizes the password application programming interface of kernel to realize transparent encryption, because there is unrivaled superiority in the dm-crypt system, its speed is faster, ease for use is stronger, characteristics such as widely applicable are so it is undisputed to select it to encrypt by kernel.
The mentality of designing of deciphering u dish is: be to realize in kernel by dm-crypt, whether it at first detects this IO equipment is the credible calculating that the tcm chip is arranged, only be that trusted computer could be deciphered credible u dish, whether detect then is operating system when making credible u dish, have only the operating system of having specified to decipher and open credible u dish, whether the cryptographic algorithm that detects this equipment then exists in kernel, algoritic module exists then will be deciphered this credible u and coil successfully, but the deciphering of this moment is not to be the real physics usb equipment of deciphering, but above this characteristic of device-mapper of supporting of linux kernel 2.6 versions, add the method for a kind of universal flexible that virtual level provides at actual physical usb equipment, realize mirror image, encrypt, deciphering waits to be handled, and advantage is the usb equipment of having deciphered.
The credible management-control method of IO equipment of the present invention, judge at first whether the IO port is opened, have only when the IO port open, IO equipment just allows USB device to insert, IO equipment judges whether the USB device that inserts is device registration afterwards, if the USB device that inserts in IO equipment registration just start and identify this USB device, if registering, the USB device that inserts just do not forbid this USB device in IO equipment, IO equipment can be encrypted USB device according to the current operation system environment after USB device started, popular is exactly that USB device is set " format " according to the kernel of IO equipment, elimination may be stored in the virus in the USB device, wooden horse etc., data deciphering when last IO equipment is encrypted USB device according to kernel obtains credible USB flash disk, credible USB flash disk and IO equipment carry out data interaction, guarantee the safety management of IO equipment and USB device and the safe transmission of data.
Therein among embodiment, described detection IO port is when described IO port open, allowing to insert USB device is specially: detect described IO port, when the driver loading of driver in the described IO port is finished, open described IO port, allow to insert described USB device.
In existing technology, control closing of IO port and forbid it being feasible by the method for physics, for example in BIOS, arrange.In the present embodiment by the more convenient faster purpose that reaches the IO port controlling of the method for software, specifically be to say to be exactly that driver by driver in the described IO port loads with deletion and realizes respectively, when the deletion of the driver of driver, allow the IO port blocking, when the driver drives program loads, allow the IO port open.
As shown in Figure 2, described step S200 comprises step:
S220: judge whether described USB device is device registration, if device registration then starts described USB device, if the unregistered equipment described USB device of online registration then, and forbid described USB device operation.
Judge whether the USB device that inserts is registered devices on IO equipment, and only the equipment of registering at this machine could be identified at this machine, and the equipment that is not registered will be forbidden being arrived by the IO recognition of devices.If the USB device that inserts is that unregistered equipment I O equipment will be forbidden its operation, is that device registration IO equipment will be identified this equipment if insert USB device, and proceeds operation.
S240: judge whether the described USB device of online registration succeeds in registration, if the online registration success then starts described USB device, and the log-on message of described USB device write in the white list of described IO equipment, if described USB device operation is then forbidden in the online registration failure.
If the equipment that inserts is unregistered USB device, IO equipment is after forbidding its operation, also can carry out online registration to it, offer an opportunity and allow the USB device that inserts register, IO equipment will be written to the log-on message of this USB device in the white list of IO equipment if the USB device that inserts succeeds in registration, this USB device as device registration identification, if the not successful IO equipment of online registration will be forbidden the USB device operation that inserts, and is withdrawed from whole operation.
In the present embodiment, IO equipment is for the new USB device that inserts provides the chance of an online registration, conveniently be the USB device online registration of IO equipment management personnel demand in IO equipment, be conducive to the flexible Application of the credible management-control method of IO equipment of the present invention.
Therein among embodiment, before the described USB device of described online registration also in steps:
Detect described USB device and whether accept online registration, when described USB device is not accepted online registration, forbid described USB device startup and withdraw from operation.
As shown in Figure 3, among embodiment, described step S200 specifically comprises step therein:
S320: monitor described IO device core process response, in real time to corresponding monitoring the in the IO device core.
S340: when monitoring event that described USB device inserts when taking place, response events, and event information is sent to user's space handle.As having monitored USB device when inserting, as run into mouse, during equipment such as usb such as u dish grade, will obtain a response events, obtained event after IO equipment this event is sent to user's space, give the user and carry out processing and identification.
S360: obtain event information, forbid described USB device operation.The event information that the IO device analysis is obtained is simultaneously because the USB device of also failing to judge access device registration whether will be forbidden the USB device operation in order to ensure safety.
S380: according to described event information, check the log-on message whether described USB device is arranged in the white list of described IO equipment, then start described USB device if having, then do not forbid described USB device operation if having.Whether there is the log-on message of the USB device of access in the IO equipment inspection white list, just starts the USB device that inserts if having, if there be not to keep forbidding and withdraw from operation the USB device that inserts.
As shown in Figure 4, among embodiment, described step S400 specifically comprises step therein:
S420: judge whether described IO equipment has the TCM chip, judge that then can described TCM chip normally start if having, can normally start and then continue following operation if described IO equipment has described TCM chip and described TCM chip, otherwise non-decrypting and withdraw from operation.
Check at first whether this IO facility environment is the trusted computer that the tcm chip is arranged, detect the TCM chip afterwards again and can normally and open.If not then not deciphering credible u dish, only be that trusted computer and TCM wherein can normally start just and can carry out next step decryption oprerations.
S440: check the algorithm in the kernel of described IO equipment, if there is the algorithm of encrypting described USB device in the kernel of described IO equipment, then proceed following operation, otherwise non-decrypting and withdraw from operation.Employed algorithm will exist in the USB device when encrypting described USB device, will check whether there is this algoritic module in the kernel when the deciphering USB device, has only existence and correctly just can carry out next step decryption oprerations.
S460: check current operation system, if current operation system is the operating system of encrypting described USB device, then proceed following operation, otherwise non-decrypting and withdraw from operation.Check it whether is operating system when encrypting described USB device, have only current operating system not change and be operating system when encrypting described USB device, just can carry out next step operation.
S480: obtain the key in the described TCM chip, judge whether described key is correct, if correctly then decipher described described USB device of having encrypted, obtain described credible USB flash disk, then non-decrypting and withdraw from operation as if incorrect.Obtain key, key is placed among the nv of tcm or in the file, when the key that reads is not distorted, can normally decipher credible u dish.
Coil used cryptographic algorithm with respect to u in the existing technology and also do not support the close algorithm sms4 of state; the credible management-control method of IO equipment of the present invention can be supported under the prerequisite of the close algorithm sms4 of state at kernel; selection is called the close algorithm sms4 of state and is encrypted the u dish; because credible calculating TCM chip is supported the close algorithm sms4 of state, the expansion in later stage can also be carried out operating with the protection that reaches hardware by the hardware encipher of TCM chip.Along with people are more and more higher to the understanding of safety, for on the trusted computer that the TCM chip is arranged, can also specify distinctive value in the TCM chip, value such as nv that can unique definite TCM chip is encrypted the u dish as key, only on the computing machine of the chip that TCM is arranged, could decipher this u dish, reach the credible of u dish with this.
As shown in Figure 5, the credible managing and control system of a kind of IO equipment comprises:
IO port detecting module 100 for detection of the IO port, when described IO port open, allows to insert USB device.
For the control of IO port, can solve the protection to IO equipment, the keeper has the right the port on the IO equipment is opened and quiescing, prevents that mobile device plugs at IO equipment arbitrarily.IO equipment is forbidden the USB device operation when the IO port shutdown, and when the IO port open, IO equipment just can allow USB device to continue operation.Specifically, when the IO port driver drives and pci bus drives when separating, the IO port shutdown is when the IO port driver drives and pci bus driving when binding the IO port open.
USB device registration judge module 200 is used for judging whether described USB device is device registration, if device registration is then identified described USB device, if unregistered equipment is then forbidden described USB device operation.
Judge whether the USB device that inserts is registered devices on IO equipment, and only the equipment of registering at this machine could be identified at this machine, and the equipment that is not registered will be forbidden being arrived by the IO recognition of devices.If the USB device that inserts is that unregistered equipment I O equipment will be forbidden its operation, is that device registration IO equipment will be identified this equipment if insert USB device, and proceeds operation.
Encrypting module 300 is used for the current operation system environment according to described IO equipment, and the described USB device of identification is encrypted.
Deciphering module 400 is used for deciphering the described USB device of having encrypted and obtains credible USB flash disk.
The u dish hardware that credible u dish is a kind of encrypted mistake has only the u dish hardware that support can be encrypted to make credible u dish by software, does not support encrypted u dish hardware not to be encrypted by software.By the All Files that in credible u dish, writes, all will be encrypted to ciphertext automatically, before not deciphering, even other people can get access to the file of credible u dish the inside by the means of violence, owing to encrypt by some complicated algorithm, also be difficult to file is reverted to expressly.Have only the operating system by formulating, and believable computing machine, credible u dish could be deciphered.The mentality of designing of making credible u dish is: the dm-crypt kernel module utilizes the password application programming interface of kernel to realize transparent encryption, because there is unrivaled superiority in the dm-crypt system, its speed is faster, ease for use is stronger, characteristics such as widely applicable are so it is undisputed to select it to encrypt by kernel.
The mentality of designing of deciphering u dish is: be to realize in kernel by dm-crypt, whether it at first detects this IO equipment is the credible calculating that the tcm chip is arranged, only be that trusted computer could be deciphered credible u dish, whether detect then is operating system when making credible u dish, have only the operating system of having specified to decipher and open credible u dish, whether the cryptographic algorithm that detects this equipment then exists in kernel, algoritic module exists then will be deciphered this credible u and coil successfully, but the deciphering of this moment is not to be the real physics usb equipment of deciphering, but above this characteristic of device-mapper of supporting of linux kernel 2.6 versions, add the method for a kind of universal flexible that virtual level provides at actual physical usb equipment, realize mirror image, encrypt, deciphering waits to be handled, and advantage is the usb equipment of having deciphered.
The credible managing and control system of IO equipment of the present invention, the IO port detecting module judges whether the IO port is opened, have only when the IO port open, IO equipment just allows USB device to insert, USB device registration judge module judges whether the USB device that inserts is device registration, if the USB device that inserts in IO equipment registration just start and identify this USB device, if registering, the USB device that inserts just do not forbid this USB device in IO equipment, encrypting module is encrypted USB device according to the current operation system environment, popular is exactly that USB device is set " format " according to the kernel of IO equipment, elimination may be stored in the virus in the USB device, wooden horse etc., data deciphering when last deciphering module is encrypted USB device according to kernel obtains credible USB flash disk, credible USB flash disk and IO equipment carry out data interaction, guarantee the safety management of IO equipment and USB device and the safe transmission of data.
As shown in Figure 6, among embodiment, USB device registration judge module 200 comprises therein:
Registration judging unit 220 is used for judging whether described USB device is device registration, if device registration then starts described USB device, if the unregistered equipment described USB device of online registration then, and forbid that described USB device operates;
Judging unit 240 succeeds in registration, be used for judging whether the described USB device of online registration succeeds in registration, if the online registration success then starts described USB device, and the log-on message of described USB device is write in the white list of described IO equipment, if described USB device operation is then forbidden in the online registration failure.
Among embodiment, described registration judging unit 220 comprises therein: the online registration confirmation unit, whether accept online registration for detection of described USB device, and when described USB device is not accepted online registration, forbid that described USB device starts and withdraws from operation.
As shown in Figure 7, among embodiment, USB device registration judge module 200 specifically comprises therein:
Process monitoring unit 720 is used for the described IO device core process response of monitoring;
Response unit 740 is used for when monitoring the event generation that described USB device inserts, response events, and event information is sent to user's space handle;
Information acquisition unit 760 is used for obtaining described event information, forbids described USB device operation;
Inspection unit 780 is used for according to described event information, checks in the white list of described IO equipment whether the log-on message of described USB device is arranged, and then starts described USB device if having, and does not then forbid described USB device operation if having.
As shown in Figure 8, among embodiment, deciphering module 400 specifically comprises therein:
IO Equipment Inspection unit 420, be used for judging whether described IO equipment has the TCM chip, if have and judge that then can described TCM chip normally start, can normally start and then continue following operation if described IO equipment has described TCM chip and described TCM chip, otherwise non-decrypting and withdraw from operation;
Algorithm detecting unit 440 be used for to check the algorithm of the kernel of described IO equipment, if there is the algorithm of encrypting described USB device in the kernel of described IO equipment, then proceeds following operation, otherwise non-decrypting and withdraw from operation;
Operating system detecting unit 460 be used for to check current operation system, if current operation system is the operating system of encrypting described USB device, then proceeds following operation, otherwise non-decrypting and withdraw from operation;
Key acquiring unit 480 is used for obtaining the key of described TCM chip, judges whether described key is correct, if correctly then decipher described described USB device of having encrypted, obtains described credible USB flash disk, and is then non-decrypting and withdraw from operation as if incorrect.
The above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.