CN104933356A - Program self-protection and data leakage preventing method of Linux system - Google Patents

Program self-protection and data leakage preventing method of Linux system Download PDF

Info

Publication number
CN104933356A
CN104933356A CN201510294673.7A CN201510294673A CN104933356A CN 104933356 A CN104933356 A CN 104933356A CN 201510294673 A CN201510294673 A CN 201510294673A CN 104933356 A CN104933356 A CN 104933356A
Authority
CN
China
Prior art keywords
data
protection
linux system
program
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510294673.7A
Other languages
Chinese (zh)
Inventor
万海山
朱广传
陈丹伟
任勋益
苗功勋
朱启超
魏东晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd
Original Assignee
SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd filed Critical SHANDONG ZHONGFU INFORMATION INDUSTRY Co Ltd
Priority to CN201510294673.7A priority Critical patent/CN104933356A/en
Publication of CN104933356A publication Critical patent/CN104933356A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/032Protect output to user by software means

Abstract

The invention provides a technical scheme of a program self-protection and data leakage preventing method of a Linux system. According to the method in the scheme, self files are hidden, system files and catalogues are locked so as to be prevented from being deleted, renamed and emptied, and outward data transmission is stopped. Not only the self security of the program is effectively protected to protect the program against the infringement, but also the data leakage in the Linux system can be prevented to protect the data security of a user.

Description

The program self-protection of Linux system and anti-leaking data method
Technical field
What the present invention relates to is the protection of a kind of security procedure teaching display stand for Linux system and anti-data leak method.
Background technology
In the prior art; known technology is that Linux system is widely used; the confidentiality of its data also more and more receives publicity; but it is very few for the data security software of linux system at present; effectively can not protect the security needs of Linux system user, this is the weak point existing for prior art.
Summary of the invention
Object of the present invention is exactly for the deficiency existing for prior art; and the technical scheme of a kind of program self-protection of Linux system and anti-data leak method is provided; the method of the program; can not only the safety of effective defence program self; avoid being encroached on; but also the data leak in Linux system can be stoped, protect the data security of user.
This programme is achieved by the following technical measures: the program self-protection of Linux system and anti-data leak method, is characterized in that comprising the steps:
1) start Linux system and perform guard process;
2) Division identification is carried out to file, if program own files, then enter step 3), if system file, then enter step 4);
3) file and catalogue are hidden;
4) file and catalogue are locked, prevent deletion, rename and empty;
5) stop the operation of data output routine, prevent data from exporting.
In described step 1), the operation of user space processes reception strategy and parameter configuration after system starts, and be forwarded to system kernel, if need to perform anti-leak strategy, then enter step 2), otherwise normal executive system process.
Described prevention data output routine operate to find insertion equipment time, obtain the information of the equipment that inserts about this when operating system nucleus runs, and revise these information, the operational scheme of influential system kernel, the information of insertion equipment cannot be completed and the corresponding coupling driven, thus the disable function of finishing equipment.Described insertion equipment is that usb inserts equipment or 1394 interfaces insert equipment.
Operating to of described prevention data output routine realizes controlling to network data, by all data packet discardings, realizes the forbidding to network.
Described prevention data output routine operate in insertion system kernel, what stop respective data transfer program calls operation.Described data distributing program comprises printer or bluetooth or Infrared Transmission or parallel port data are transmitted or serial data transmission.
In described step 6), when system kernel finds unlawful practice, violation information is sent to user space processes, and this information is recorded in daily record by user space processes, and is saved in daily record, and user space processes shows the information of daily record.
The beneficial effect of this programme can be learnt according to describing of such scheme, owing to starting Linux system in this scenario, perform guard process, guard process can be distinguished file, then, hide program own files, so just shield to program self, the program of avoiding is tampered; Can also lock system file, avoid system file deleted, revise or empty; Equipment or 1394 interfaces insertion equipment are inserted for usb, when inserted, Linux system can obtain its type, size, batch etc. information, this method can revise these information, and then the operational scheme of influential system kernel, these information inserting equipment cannot be mated with corresponding driving, thus realize the forbidding to these equipment; Realize controlling to network data, by all data packet discardings, realize the forbidding to network; Stop the routine call of printer, parallel port, serial ports etc. to run, avoid and export outwards transmission, reach the object of anti-leak; The policing action that user space processes accepts and parameter configuration, comprise the anti-leak of whether carrying out data, parameter configuration comprises which equipment of needs is carried out giving vent to leakage, as equipment such as printer, serial ports, parallel port, usb.As can be seen here, compared with prior art, have outstanding substantive distinguishing features and significant progress, its beneficial effect implemented also is apparent in the present invention.
Embodiment
For the technical characterstic of this programme can be clearly demonstrated, below by an embodiment, this programme is set forth.
The program self-protection of the Linux system of this programme and anti-data leak method, is characterized in that comprising the steps:
1) start Linux system and perform guard process; The operation of user space processes reception strategy and parameter configuration, and be forwarded to system kernel, if need to perform anti-leak strategy, then enter step 2), otherwise normal executive system process.
2) Division identification is carried out to file, if program own files, then enter step 3), if system file, then enter step 4);
3) file and catalogue are hidden;
4) file and catalogue are locked, prevent deletion, rename and empty;
5) stop the operation of data output routine, prevent data from exporting, when system kernel finds unlawful practice, violation information is sent to user space processes, this information is recorded in daily record by user space processes, and is saved in daily record, and user space processes shows the information of daily record.
Described prevention data output routine operate to find insertion equipment time, obtain the information of the equipment that inserts about this when operating system nucleus runs, and revise these information, the operational scheme of influential system kernel, the information of insertion equipment cannot be completed and the corresponding coupling driven, thus the disable function of finishing equipment.Described insertion equipment is that usb inserts equipment or 1394 interfaces insert equipment.
Operating to of described prevention data output routine realizes controlling to network data, by all data packet discardings, realizes the forbidding to network.
Described prevention data output routine operate in insertion system kernel, what stop respective data transfer program calls operation.Described data distributing program comprises printer or bluetooth or Infrared Transmission or parallel port data are transmitted or serial data transmission.
The present invention is not limited in above-mentioned embodiment, the change that those of ordinary skill in the art make in essential scope of the present invention, remodeling, interpolation or replacement, also should belong to protection scope of the present invention.

Claims (8)

  1. The program self-protection of 1.linux system and anti-data leak method, is characterized in that comprising the steps:
    1) start Linux system and perform guard process;
    2) Division identification is carried out to file, if program own files, then enter step 3), if system file, then enter step 4);
    3) file and catalogue are hidden;
    4) file and catalogue are locked, prevent deletion, rename and empty;
    5) stop the operation of data output routine, prevent data from exporting.
  2. 2. the program self-protection of Linux system according to claim 1 and anti-data leak method, it is characterized in that: in described step 1), the operation of user space processes reception strategy and parameter configuration after system starts, and be forwarded to system kernel, if need to perform anti-leak strategy, then enter step 2), otherwise normal executive system process.
  3. 3. the program self-protection of Linux system according to claim 1 and anti-data leak method, it is characterized in that: described prevention data output routine operate to find insertion equipment time, obtain the information of the equipment that inserts about this when operating system nucleus runs, and revise these information, the operational scheme of influential system kernel, the information of insertion equipment cannot be completed and the corresponding coupling driven, thus the disable function of finishing equipment.
  4. 4. the program self-protection of Linux system according to claim 3 and anti-data leak method, is characterized in that: described insertion equipment is that usb inserts equipment or 1394 interfaces insert equipment.
  5. 5. the program self-protection of Linux system according to claim 1 and anti-data leak method, is characterized in that: operating to of described prevention data output routine realizes controlling to network data, by all data packet discardings, realizes the forbidding to network.
  6. 6. the program self-protection of Linux system according to claim 1 and anti-data leak method, is characterized in that: described prevention data output routine operate in insertion system kernel, what stop respective data transfer program calls operation.
  7. 7. the program self-protection of Linux system according to claim 6 and anti-data leak method, is characterized in that: described data distributing program comprises printer or bluetooth or Infrared Transmission or the transmission of parallel port data or serial data transmission.
  8. 8. the program self-protection of Linux system according to claim 1 and anti-data leak method, it is characterized in that: in described step 5), when system kernel finds unlawful practice, violation information is sent to user space processes, this information is recorded in daily record by user space processes, and being saved in daily record, user space processes shows the information of daily record.
CN201510294673.7A 2015-06-02 2015-06-02 Program self-protection and data leakage preventing method of Linux system Pending CN104933356A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510294673.7A CN104933356A (en) 2015-06-02 2015-06-02 Program self-protection and data leakage preventing method of Linux system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510294673.7A CN104933356A (en) 2015-06-02 2015-06-02 Program self-protection and data leakage preventing method of Linux system

Publications (1)

Publication Number Publication Date
CN104933356A true CN104933356A (en) 2015-09-23

Family

ID=54120519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510294673.7A Pending CN104933356A (en) 2015-06-02 2015-06-02 Program self-protection and data leakage preventing method of Linux system

Country Status (1)

Country Link
CN (1) CN104933356A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901313A (en) * 2010-06-10 2010-12-01 中科方德软件有限公司 Linux file protection system and method
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103778081A (en) * 2014-02-11 2014-05-07 成都卫士通信息安全技术有限公司 USB peripheral access control method
US8756687B1 (en) * 2012-05-25 2014-06-17 Kip Cr P1 Lp System, method and computer program product for tamper protection in a data storage system
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN104641377A (en) * 2012-10-19 2015-05-20 迈克菲股份有限公司 Data loss prevention for mobile computing devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901313A (en) * 2010-06-10 2010-12-01 中科方德软件有限公司 Linux file protection system and method
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
US8756687B1 (en) * 2012-05-25 2014-06-17 Kip Cr P1 Lp System, method and computer program product for tamper protection in a data storage system
CN104641377A (en) * 2012-10-19 2015-05-20 迈克菲股份有限公司 Data loss prevention for mobile computing devices
CN103778081A (en) * 2014-02-11 2014-05-07 成都卫士通信息安全技术有限公司 USB peripheral access control method
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ROBERT LOVE: "《Linux内核设计与实现》", 30 June 2011, 机械工业出版社 *
于莉莉等: "《网络信息安全》", 31 March 2011, 哈尔滨工程大学出版社 *

Similar Documents

Publication Publication Date Title
CN101404056B (en) Software protection method, apparatus and equipment
CN101833621B (en) Terminal safety audit method and system
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN102855446A (en) Resource management system and corresponding method
CN113346997B (en) Method and device for communication of Internet of things equipment, Internet of things equipment and server
CN101655814A (en) Method for authenticating smart battery and terminal
CN113536362B (en) Quantum key management method and system based on security chip carrier
CN104573549A (en) Credible method and system for protecting confidentiality of database
CN103268435A (en) Intranet license generation method and system, and intranet license protection method and system
CN104537295A (en) Computer system and method for managing computer user right
CN101593252A (en) Control method and system that a kind of computing machine conducts interviews to USB device
CN103970540A (en) Method and device for safely calling key function
CN104376270A (en) File protection method and system
CN104933356A (en) Program self-protection and data leakage preventing method of Linux system
CN109391689A (en) A kind of method and device that micro services application programming interface is called
CN103207976A (en) Mobile storage file leakage-preventing method and confidential U-disk based on same
CN104503869B (en) Data processing method and data processing system
CN104270754A (en) SIM authentication method and device
CN104182667A (en) Screen lock based data protection method and device
US9122504B2 (en) Apparatus and method for encryption in virtualized environment using auxiliary medium
CN103605923A (en) USB (universal serial bus) Key equipment identifier
WO2020112206A2 (en) Secure calling convention system and methods
CN202085191U (en) Data safe storage and transmission system
CN106952659B (en) CD multistage imprinting encryption method based on XTS encryption mode
KR101606090B1 (en) Apparatus and method for protecting network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Xinluo Avenue high tech Zone of Ji'nan City, Shandong province 250101 No. 1166 orsus Building 2 building 15-16 layer

Applicant after: Shandong Zhongfu Information Industry Co., Ltd.

Address before: Xinluo Avenue high tech Zone of Ji'nan City, Shandong province 250101 No. 1166 orsus Building 2 building 15-16 layer

Applicant before: Shandong Zhongfu Information Industry Co., Ltd.

COR Change of bibliographic data
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150923