CN106330884A - Safety management method for realizing alarming, locking and data destruction - Google Patents

Safety management method for realizing alarming, locking and data destruction Download PDF

Info

Publication number
CN106330884A
CN106330884A CN201610689785.7A CN201610689785A CN106330884A CN 106330884 A CN106330884 A CN 106330884A CN 201610689785 A CN201610689785 A CN 201610689785A CN 106330884 A CN106330884 A CN 106330884A
Authority
CN
China
Prior art keywords
module
configuration file
policy
policy enforcement
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610689785.7A
Other languages
Chinese (zh)
Inventor
张雁鹏
金长新
刘强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Group Co Ltd
Original Assignee
Inspur Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Group Co Ltd filed Critical Inspur Group Co Ltd
Priority to CN201610689785.7A priority Critical patent/CN106330884A/en
Publication of CN106330884A publication Critical patent/CN106330884A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention provides a safety management method for realizing alarming, locking and data destruction, and relates to the field of data safety management. The safety management method is composed of a strategy configuration file and a strategy execution module. The strategy execution module s divided into a passive execution module and an active execution module. The integrated PAM architecture in the domestic Linux operating system is adopted, thereby being convenient to transplant, expand and configure. Mainly for a user login operation, the strategy execution module is called according to the strategy configuration file to carry out different response actions. The safety of a computer system is greatly improved, and the complexity of computer safety management is greatly reduced.

Description

A kind of method for managing security realizing reporting to the police, lock fixed sum data is destroyed
Technical field
The present invention relates to data safety management technology, particularly relate to a kind of safety management realizing and reporting to the police, lock fixed sum data is destroyed Method.
Background technology
At present in the application scenarios with safe and secret requirement, domestic server, desk computer and notebook etc. produce Would generally integrated data safety management function, the such as software and hardware of restriction movable storage device use in product;Emergency next Key pin ruins data;What anti-violence was disassembled tears the functions such as machine data destroying open.
But from current application analysis, limit movable storage device and use, be more to manage artificially and add up, soft Hardware capability is only capable of accomplishing limiting and preventing data leak, and once safeguard procedures are broken, and does not has destruction data etc. higher Level security measure.One key pin ruins data, is only applicable in emergency circumstances, and needs manual operation, and the restrictive condition that comes into force is more, Therefore limitation is bigger.What anti-violence was disassembled tears machine data destroying function open, as the term suggests, it is only prevented from being torn open by violent means Solve computer and directly obtain a kind of preventive means of storage device therein, be merely capable of the feelings that the sensor when tearing machine open is triggered Activate under condition, auto-destruct data.
The most multiple method is all existing frequently-used data method for protecting.But as it has been described above, the most only Incipient fault for data security under specific condition can be responded, situation complicated and changeable during routine use can not be met.
Summary of the invention
In order to solve above technical problem, the present invention proposes a kind of bursting tube realizing and reporting to the police, lock fixed sum data is destroyed Reason method.
This method make use of PAM framework the most integrated in existing home-make Linux operating system, by writing strategy configuration File, policy enforcement module, it is possible to the logging request for different modes processes.Such as, normal graphical interfaces login, word Symbol mode entry, SSH Telnet etc., be all managed by different policy configuration file, can coordinate and need for client Seek the disparate modules of exploitation, reach user's entry stage and perform the purpose of difference management operation.Any of the above side is compensate for this Some defects in actually used stage in method.This method introduces active operation mechanism in policy enforcement module simultaneously, it is allowed to Triggering specified requirements when user logs in and notify manager, manager remotely controls the operation that this computer performs to specify.Coordinate Above frequently-used data function of safety protection and software and hardware management means, it is possible to significantly improve the safety of computer system, and show Write the complexity reducing computer security management.
The present invention is made up of policy configuration file and policy enforcement module.Policy enforcement module is divided into again and passively performs module With actively perform module.
Present invention utilizes PAM framework the most integrated in home-make Linux operating system, it is simple to transplant, extend and configure. Mainly for user login operation, perform module according to policy configuration file regulative strategy, make different response actions.
Policy configuration file:
The login mode of each use PAM authentication mechanism, all can be equipped with a policy configuration file.When user logs in, PAM Meeting query configuration file, according to the condition specified in configuration file, calls the action that different policy enforcement module completes to specify.
Policy enforcement module:
1) passive policy enforcement module:
According to customer demand and platform hardware designs, in data destroying module, the GPIO that operation CPU controls, destroys to hard disk Circuit sends destroys signal, then hard disc data can be destroyed;In mail alarm module, can be to the manager's postal pre-set Part address sends given content, when policy configuration file condition meets, current event is sent to manager;Alarm module is then It is operable to GPIO, drives sound light alarming circuit to report to the police.Also dependent on hardware designs and safe and secret requirement, straight-forward network Connection, GPS module, the first-class function of shooting, and coordinate mail alarm module etc. to realize dynamic tracing.
2) proactive mechanisms execution module:
Proactive mechanisms performs module the most in a dormant state, is activated when policy configuration file condition meets, and uses In receiving the instruction that equipment manager remotely sends, and the operation can specified according to instruction execution.
Above policy enforcement module, is system level program assembly, and user cannot directly revise or destroy.Simultaneously because plan The slightly restriction of configuration file, even if policy enforcement module is destroyed, user also cannot normally complete login authentication.Cannot be carried out appointing What operation.
Simultaneously as directly utilized existing PAM framework in system, it is not only register system or the system integration Service, the application program of all use PAM authentication mechanisms also is able to include in above after writing suitable policy configuration file In described various security policy manager.
Can effectively prevent the private data caused by the illegal log into thr computer of number of ways from leaking.And the method Can extend for all application programs based on PAM authentication mechanism.Greatly improve the easy of safe and secret management function By property and practicality, significantly reduce the difficulty of system-level safe and secret management work simultaneously.
Detailed description of the invention
Below present disclosure is carried out more detailed elaboration:
The present invention is made up of policy configuration file and policy enforcement module.Policy enforcement module is divided into again passive execution module and master Dynamic execution module.
Present invention utilizes PAM framework the most integrated in home-make Linux operating system, it is simple to transplant, extend and configure. Mainly for user login operation, perform module according to policy configuration file regulative strategy, make different response actions.
Policy configuration file:
The login mode of each use PAM authentication mechanism, all can be equipped with a policy configuration file.Such as system graphical interfaces is stepped on Record, character pattern (command mode) logs in, or FTP service, Telnet Telnet or SSH Telnet, all has the most not Same configuration file.When user logs in, PAM meeting query configuration file, according to the condition specified in configuration file, calls not Same policy enforcement module completes the action specified.(such as in graphical interfaces login process, input 5 passwords continuously by mistake, then may be used To lock this account 5 minutes.Wherein code error number of times and locking the number of minutes all can be defined by configuration file.Above Being only for example, Current standards PAM framework is only capable of whether verifying account allows to log in, lock account, account password process and locking Interactive function, does not possess and invents described security function herein.)
Policy enforcement module:
1, passive policy enforcement module:
According to customer demand and platform hardware designs, in data destroying module, the GPIO that operation CPU controls, destroys to hard disk Circuit sends destroys signal, then hard disc data can be destroyed;In mail alarm module, can be to the manager's postal pre-set Part address sends given content, when policy configuration file condition meets, current event (is inputed by mistake password continuously or uses illegal The information such as user name) it is sent to manager;Alarm module is then operable to GPIO, drives sound light alarming circuit to report to the police.Also Can be according to hardware designs and safe and secret requirement, straight-forward network connection, GPS module, the first-class function of shooting, and coordinate mail to report to the police Modules etc. realize dynamic tracing.
2, proactive mechanisms execution module:
Proactive mechanisms performs module the most in a dormant state, is activated when policy configuration file condition meets, and uses In receiving the instruction that equipment manager remotely sends, and (sensitive data, startup can be deleted according to the operation that instruction performs to specify Report to the police or start tracking etc.).
Present invention Xu, according to different platform hardware, writes the policy enforcement module needing to operate hardware, only performs software behaviour Make policy enforcement module then can in different platform directly transplanting.When implementing configuration, need to compile according to actually used situation Write policy configuration file, log in channel for different users, trigger condition is set, after meeting condition, can automatically call correspondence Policy enforcement module perform operation, it is not necessary to more manual interventions, also cannot be intervened by local user.

Claims (3)

1. one kind realizes the method for managing security reported to the police, lock fixed sum data is destroyed, it is characterised in that
Mainly being made up of policy configuration file and policy enforcement module, policy enforcement module is divided into again passive execution module and active Perform module;
Utilize PAM framework the most integrated in home-make Linux operating system, it is simple to transplant, extend and configure;Mainly for user Register, performs module according to policy configuration file regulative strategy, makes different response actions.
Method the most according to claim 1, it is characterised in that
Policy configuration file:
The login mode of each use PAM authentication mechanism, all can be equipped with a policy configuration file;When user logs in, PAM Meeting query configuration file, according to the condition specified in configuration file, calls the action that different policy enforcement module completes to specify.
Method the most according to claim 2, it is characterised in that
Wherein
Policy enforcement module:
1) passive policy enforcement module:
According to customer demand and platform hardware designs, in data destroying module, the GPIO that operation CPU controls, destroys to hard disk Circuit sends destroys signal, then hard disc data can be destroyed;In mail alarm module, can be to the manager's postal pre-set Part address sends given content, when policy configuration file condition meets, current event is sent to manager;Alarm module is then It is operable to GPIO, drives sound light alarming circuit to report to the police;Also dependent on hardware designs and safe and secret requirement, straight-forward network Connection, GPS module, camera function, and coordinate mail alarm module to realize dynamic tracing;
2) proactive mechanisms execution module:
Proactive mechanisms performs module the most in a dormant state, is activated when policy configuration file condition meets, and uses In receiving the instruction that equipment manager remotely sends, and the operation can specified according to instruction execution.
CN201610689785.7A 2016-08-19 2016-08-19 Safety management method for realizing alarming, locking and data destruction Pending CN106330884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610689785.7A CN106330884A (en) 2016-08-19 2016-08-19 Safety management method for realizing alarming, locking and data destruction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610689785.7A CN106330884A (en) 2016-08-19 2016-08-19 Safety management method for realizing alarming, locking and data destruction

Publications (1)

Publication Number Publication Date
CN106330884A true CN106330884A (en) 2017-01-11

Family

ID=57744316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610689785.7A Pending CN106330884A (en) 2016-08-19 2016-08-19 Safety management method for realizing alarming, locking and data destruction

Country Status (1)

Country Link
CN (1) CN106330884A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090044250A1 (en) * 2007-08-08 2009-02-12 Memory Experts International Inc. Embedded Self-Contained Security Commands
CN101917423A (en) * 2010-08-05 2010-12-15 上海酷族信息技术有限公司 Operating method for safety protection of database
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system
CN103200008A (en) * 2013-02-28 2013-07-10 山东超越数控电子有限公司 Linux identity authentication system and Linux identity authentication method
CN104268469A (en) * 2014-09-26 2015-01-07 深圳北控信息发展有限公司 Mobile terminal and information security protection method and device thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090044250A1 (en) * 2007-08-08 2009-02-12 Memory Experts International Inc. Embedded Self-Contained Security Commands
CN101917423A (en) * 2010-08-05 2010-12-15 上海酷族信息技术有限公司 Operating method for safety protection of database
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system
CN103200008A (en) * 2013-02-28 2013-07-10 山东超越数控电子有限公司 Linux identity authentication system and Linux identity authentication method
CN104268469A (en) * 2014-09-26 2015-01-07 深圳北控信息发展有限公司 Mobile terminal and information security protection method and device thereof

Similar Documents

Publication Publication Date Title
US10516533B2 (en) Password triggered trusted encryption key deletion
CN100568212C (en) Shielding system and partition method
JP5350528B2 (en) System and method for providing platform with additional security through location-based data
CN106295355B (en) A kind of active safety support method towards Linux server
US20110239306A1 (en) Data leak protection application
EP0449242A2 (en) Method and structure for providing computer security and virus prevention
KR970006392B1 (en) Trusted personal computer system with identification
GB2458568A (en) System for enforcing security policies on electronic files
CN102948114A (en) Single-use authentication methods for accessing encrypted data
CN112417391B (en) Information data security processing method, device, equipment and storage medium
CN112615842B (en) Network security implementation system and method based on big data platform
JP5319830B2 (en) Data protection method and computer apparatus
EP3623978B1 (en) Computer having isolated user computing unit
CN104361298B (en) The method and apparatus of Information Security
US7167958B2 (en) Second storage system equipped with security system and a method of controlling the second storage system
CN109583169B (en) Security authentication method
CN106330884A (en) Safety management method for realizing alarming, locking and data destruction
CN106778231A (en) A kind of application security management method realized in Android system
JP2010198062A (en) Log collection system, information processor, log collection method, and program
US9009454B2 (en) Secure operating system loader
Lehrfeld Preventing the insider–blocking USB write capabilities to prevent IP theft
Kim et al. Linux based unauthorized process control
CN113449296B (en) System, method, device and medium for data security protection
KR20070040449A (en) Apparatus and method of security for computer
CN117009957A (en) Clipboard data safety isolation method based on linux or credit terminal environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111

RJ01 Rejection of invention patent application after publication