CN106599690A - Method and system for managing and controlling mobile medium access authority in domestic operating system - Google Patents

Method and system for managing and controlling mobile medium access authority in domestic operating system Download PDF

Info

Publication number
CN106599690A
CN106599690A CN201611193891.2A CN201611193891A CN106599690A CN 106599690 A CN106599690 A CN 106599690A CN 201611193891 A CN201611193891 A CN 201611193891A CN 106599690 A CN106599690 A CN 106599690A
Authority
CN
China
Prior art keywords
file
control
removable medium
authority
operate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611193891.2A
Other languages
Chinese (zh)
Inventor
王辛宇
童志明
何公道
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201611193891.2A priority Critical patent/CN106599690A/en
Publication of CN106599690A publication Critical patent/CN106599690A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method and system for managing and controlling mobile medium access authority in a domestic operating system. The method specifically comprises the following steps: managing read-write authority, an execution authority, renaming authority, deletion authority and authority change of a mobile medium; and performing transmission management and control and access management and control on the mobile medium. By adoption of the method and system provided by the invention, the mobile medium can be dynamically monitored, and a malicious code is interrupted before being executed to prevent the harms brought by the malicious code to a host and guarantee the instantaneity of management and control. The tampering of the file in the mobile medium can also be prevented to ensure the safety and feasibility of mobile devices.

Description

The management-control method and system of the removable medium access rights under domestic operating system
Technical field
The present invention relates to computer safety field, the removable medium access right under more particularly to a kind of domestic operating system The management-control method and system of limit.
Background technology
With the development of computer technology, the reinforcement of information security idea, the safely controllable attention of nationalization, cause domestic The research and development of operating system have reached unprecedented temperature in recent years with popularization, are to realize the safely controllable base for laying compacting of independent research Plinth.Because removable medium is the important way that malicious code is propagated, therefore domestic operating system needed to move media data Transmission carries out comprehensive management and control, the malicious code that Initiative Defense is transmitted by move media.
Removable medium species is various, develops not loaded down with trivial details, so that developer is very different, version model is difficult effectively control System.Removable medium has good portability again, is the important tool of storage and transmission data, therefore these are also much attacked Person is utilized, attacker by the way that malicious code is implanted into into removable medium, removable medium intervention main frame after, by malicious code Main frame is imported with some form, and then does a series of illegal operations.
Prior art does not have the ripe solution to removable medium data transfer management and control under domestic operating system, Traditional removable medium data storage management, what the discovery of malicious code was namely carried out by scan mode.But for Some unknown malicious codes, can not effectively prevent it from performing, and some malicious codes are not to carry out attack operation immediately, A series of camouflage work can be carried out, therefore is difficult to find in conventional sense scanning, it is impossible to enough meet our demand.Actively Defense technique it is universal for various operating systems, but for the use under domestic operating system with popularization still to research people Member provides bigger interactive stage.The operations such as data transfer and execution based on LSM frameworks dynamic monitoring removable medium, be One lightweight generalized framework for access control of linux kernel.
The content of the invention
The present invention proposes a kind of management-control method and system of the removable medium access rights under domestic operating system, solves Data access authority and the problem of transmission management and control in removable medium under domestic operating system.
The inventive method is specifically, a kind of management-control method of the removable medium access rights under domestic operating system, bag Include:Access limit control, execution control of authority, renaming control of authority, deletion control of authority and authority change control;
Each authority control method is specially:
The call back function that corresponding authority is controlled under securty_operations structures under registration LSM frameworks;
Obtain operation information, the filename of the file of the operation information including current operation, the progress information of the file or The progress information for operating the file and the user profile for operating the file;
Whether the file for judging current operation is prohibited corresponding operating, or whether the progress information of the file is malice, if It is then to intercept the operation;
If otherwise described operation is read-write operation, whether the progress information for judging to operate the file is abnormal process, if It is to intercept the operation, otherwise judges to operate the user profile of the file whether illegal, if it is intercepts the operation, Otherwise allow to continue to operate;
If the operation judges whether the parent process of the file is abnormal to perform operation, the operation is if it is intercepted, Otherwise judge whether the user profile of the file is illegal, if it is, intercepting the operation, otherwise allow to continue to operate;
If the operation is renaming, deletes or authority change, allow to continue to operate.
In described method, also including transmission management and control;The transmission management and control includes:
General mode, it is allowed to file is carried out between removable medium and main frame and is mutually transmitted, and daily record is formed to data transmission information Record;
Reading mode, only allows file in removable medium to be copied to main frame, intercepts all write operations to removable medium, and Statistic record intercept information is formed and intercepts log recording;
Safe mode, forbids copied files to removable medium, while monitoring host computer, the file in control removable medium is only Copy the particular category of main frame to.
In described method, also including access management and control:Removable medium white list and blacklist are set, control whether to allow Removable medium access host;Including at least supplier ID, product ID and globally unique in the white list and blacklist Identification field.
In described method, whether the file of the current operation is prohibited the setting of corresponding operating, by configuration file It is configured and changes.
The present invention also accordingly proposes the removable medium access rights managing and control system under a kind of domestic operating system, including:
Registering modules, for registering LSM frameworks under under securty_operations structures corresponding authority control call back function;
Data obtaining module, for obtaining operation information, the operation information includes the filename of the file of current operation, described The progress information of file operates the progress information of the file and operates the user profile of the file;
Access limit control module, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting institute State operation;Otherwise, whether the progress information for judging to operate the file is abnormal process, if it is intercepts the operation;It is no Then judge to operate the user profile of the file whether illegal, if it is intercept the operation, otherwise allow to continue to operate;
Authority control module is performed, for judging whether the progress information of the file is malice, if it is, intercepting the behaviour Make;Otherwise judge whether the parent process of the file is abnormal, if it is intercepts the operation, otherwise judges the use of the file Whether family information is illegal, if it is, intercepting the operation, otherwise allows to continue to operate;
Renaming control of authority module, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting The operation;Otherwise allow to continue to operate;
Control of authority module is deleted, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting institute State operation;Otherwise allow to continue to operate;
Authority changes control module, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting institute State operation;Otherwise allow to continue to operate;
In described system, also including transmission management and control module;The transmission management and control includes:
General mode, it is allowed to file is carried out between removable medium and main frame and is mutually transmitted, and daily record is formed to data transmission information Record;
Reading mode, only allows file in removable medium to be copied to main frame, intercepts all write operations to removable medium, and Statistic record intercept information is formed and intercepts log recording;
Safe mode, forbids copied files to removable medium, while monitoring host computer, the file in control removable medium is only Copy the particular category of main frame to.
In described system, also including access management and control module:Removable medium white list and blacklist are set, are controlled whether Allow removable medium access host;Supplier ID, product ID and the overall situation are included at least in the white list and blacklist Unique mark field.
In described system, whether the file of the current operation is prohibited the setting of corresponding operating, by configuration file It is configured and changes.
The present invention solves the problems, such as data access authority and transmission management and control in removable medium under domestic operating system, Dynamic can monitor, intercepted before malicious code is performed, prevent the harm that malicious code brings, it is ensured that the reality of defence management and control Shi Xing, this method is also possible to prevent under domestic operating system file in movable equipment and is tampered, moves and deletes, and prevents data The possibility lost is damaged, protection is not implanted into by malicious code, it is ensured that the secure and trusted of removable medium;Management and control simultaneously is removable to be situated between Data transfer between matter and main frame, prevents the malicious code in removable medium from flowing into main frame, and host tape is endangered;Management and control The access of removable medium, the approach that malicious code is transmitted by removable medium is prevented from root.
Description of the drawings
In order to be illustrated more clearly that technical scheme of the invention or of the prior art, below will be to embodiment or prior art The accompanying drawing to be used needed for description is briefly described, it should be apparent that, drawings in the following description are only in the present invention Some embodiments recorded, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the access limit control method flow chart of the embodiment of the present invention one;
Fig. 2 is that the embodiment of the present invention two performs authority control method flow chart;
Fig. 3 is the renaming authority of the embodiment of the present invention three, deletes authority or authority change method flow diagram;
Removable medium access rights managing and control system structural representation under the domestic operating system of Fig. 4 present invention.
Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the embodiment of the present invention, and make the present invention's Above-mentioned purpose, feature and advantage can become apparent from understandable, and technical scheme in the present invention is made further in detail below in conjunction with the accompanying drawings Thin explanation.
The present invention proposes a kind of management-control method and system of the removable medium access rights under domestic operating system, solves Data access authority and the problem of transmission management and control in removable medium under domestic operating system.
The inventive method is specifically, a kind of management-control method of the removable medium access rights under domestic operating system, bag Include:Access limit control, execution control of authority, renaming control of authority, deletion control of authority and authority change control;
Each authority control method is specially:
Embodiment one is access limit control method in the present invention, for the reading and writing data authority in management and control removable medium, because Generally need to write or rewrite some parts hereof for some malicious code injections, the purpose of injection has been reached, at this moment Implant operation information can be just obtained, so as to intercept the operation.As shown in Figure 1:
S101:File_permission call back functions under securty_operations structures under registration LSM frameworks;
S102:Operation information is obtained, the operation information is the filename of the file of current operation, the process of the operation file The user profile of information and the operation file;
S103:Whether the file for judging current operation is prohibited read-write operation, if it is, intercepting the operation;Otherwise perform S104;
S104:Whether the progress information for judging to operate the file is abnormal process, if it is intercepts the operation, is otherwise held Row S105;
S105:Judge to operate the user profile of the file whether illegal, if it is intercept the operation, otherwise allow to continue Operation.
Embodiment two is to perform authority control method in the present invention, for the right of execution of file in management and control removable medium Limit, this management-control method is intercepted for the program that there is malicious act before program performing, prevents what malicious code from bringing Harm, for some unknown executable programs, has good killing to act on.As shown in Figure 2:
S201:Bprm_set_creds call back functions under securty_operations structures under registration LSM frameworks;
S202:Operation information is obtained, the operation information is filename, the progress information of the file of the file of current operation And the user profile of the operation file;
S203:Judge whether the file of current operation is prohibited to perform operation, if it is, intercepting the operation;Otherwise perform S204
S204:Judge whether the parent process of the file is abnormal, if it is, intercepting the operation, otherwise performs S205;
S205:Judge whether the user profile of the file is illegal, if it is, intercepting the operation, otherwise allow to continue to grasp Make.
Embodiment three is renaming authority in the present invention, authority or authority change method is deleted, because some are shielded Movement, change or the deletion of vital document or catalogue, may cause very big impact to user, therefore for some are not permitted Perhaps the file or catalogue of deletion are changed, needs to control its corresponding authority.And the execution authority of change executable file, usually compare Relatively hazardous behavior, is likely to result in serious consequence, it is therefore desirable to which the change behavior to authority carries out effective management and control.Such as Fig. 3 institutes Show:
S301:Corresponding call back function under securty_operations structures under registration LSM frameworks;Such as it is renaming authority, Then register path_rename call back functions;Such as to delete authority, then path_unlink and path_rmdir call back functions are registered; If authority change, then inode_setattr call back functions are registered;
S302:Operation information is obtained, the operation information is the filename of the file of current operation, the process of the operation file The user profile of information and the operation file;
S303:Whether the file for judging current operation is prohibited corresponding operating, if it is, intercepting the operation;Otherwise allow Continue to operate.
In described method, also including transmission management and control;The transmission management and control includes:
General mode, it is allowed to file is carried out between removable medium and main frame and is mutually transmitted, and daily record is formed to data transmission information Record;Realization is monitored using LSM frameworks, registers above-mentioned all control points, but does not carry out interception operation.
Reading mode, only allows file in removable medium to be copied to main frame, and interception writes behaviour to all of removable medium Make, and statistic record intercept information is formed and intercepts log recording;Realization is monitored using LSM frameworks, does not allow change removable The operation behavior to file in removable medium such as file content, title and authority in dynamic medium.
Safe mode, forbids copied files to removable medium, while monitoring host computer, controls the file in removable medium Only copy the particular category of main frame to.Safe mode is prevented from malicious code infections sensitivity catalogue, such as/sbin ,/bin ,/ The catalogues such as etc.
In described method, also including access management and control:Removable medium white list and blacklist are set, control whether to allow Removable medium access host;Including at least supplier ID, product ID and globally unique in the white list and blacklist Identification field.If opening white list, the equipment access host in white list list is only allowed, if opening blacklist, Equipment in blacklist list forbids access host.
In described method, whether the file of the current operation is prohibited the setting of corresponding operating, by configuration file It is configured and changes.
The present invention also accordingly proposes the removable medium access rights managing and control system under a kind of domestic operating system, such as Fig. 4 It is shown including:
Registering modules 401, for registering LSM frameworks under under securty_operations structures corresponding authority control readjustment letter Number;
Data obtaining module 402, for obtaining operation information, the operation information include the file of current operation filename, The progress information of the file operates the progress information of the file and operates the user profile of the file;
Access limit control module 403, for judging whether the file of current operation is prohibited corresponding operating, if it is, blocking Cut the operation;Otherwise, whether the progress information for judging to operate the file is abnormal process, if it is intercepts the behaviour Make;Otherwise judge to operate the user profile of the file whether illegal, if it is intercept the operation, otherwise allow to continue to grasp Make;
Authority control module 404 is performed, for judging whether the progress information of the file is malice, if it is, intercepting institute State operation;Otherwise judge whether the parent process of the file is abnormal, if it is intercepts the operation, otherwise judges the file User profile it is whether illegal, if it is, intercepting the operation, otherwise allow to continue to operate;
Renaming control of authority module 405, for judging whether the file of current operation is prohibited corresponding operating, if it is, Intercept the operation;Otherwise allow to continue to operate;
Control of authority module 406 is deleted, for judging whether the file of current operation is prohibited corresponding operating, if it is, blocking Cut the operation;Otherwise allow to continue to operate;
Authority changes control module 407, for judging whether the file of current operation is prohibited corresponding operating, if it is, blocking Cut the operation;Otherwise allow to continue to operate;
In described system, also including transmission management and control module;The transmission management and control includes:
General mode, it is allowed to file is carried out between removable medium and main frame and is mutually transmitted, and daily record is formed to data transmission information Record;
Reading mode, only allows file in removable medium to be copied to main frame, intercepts all write operations to removable medium, and Statistic record intercept information is formed and intercepts log recording;
Safe mode, forbids copied files to removable medium, while monitoring host computer, the file in control removable medium is only Copy the particular category of main frame to.
In described system, also including access management and control module:Removable medium white list and blacklist are set, are controlled whether Allow removable medium access host;Supplier ID, product ID and the overall situation are included at least in the white list and blacklist Unique mark field.
In described system, whether the file of the current operation is prohibited the setting of corresponding operating, by configuration file It is configured and changes.
The present invention solves the problems, such as data access authority and transmission management and control in removable medium under domestic operating system, Dynamic can monitor, intercepted before malicious code is performed, prevent the harm that malicious code brings, it is ensured that the reality of defence management and control Shi Xing, this method is also possible to prevent under domestic operating system file in movable equipment and is tampered, moves and deletes, and prevents data The possibility lost is damaged, protection is not implanted into by malicious code, it is ensured that the secure and trusted of removable medium;Management and control simultaneously is removable to be situated between Data transfer between matter and main frame, prevents the malicious code in removable medium from flowing into main frame, and host tape is endangered;Management and control The access of removable medium, the approach that malicious code is transmitted by removable medium is prevented from root.
Although depicting the present invention by embodiment, it will be appreciated by the skilled addressee that the present invention have it is many deformation and Change the spirit without deviating from the present invention, it is desirable to which appended claim includes these deformations and changes without deviating from the present invention's Spirit.

Claims (8)

1. the management-control method of the removable medium access rights under a kind of domestic operating system, it is characterised in that include:Read-write power Limit control, execution control of authority, renaming control of authority, deletion control of authority and authority change control;
Each authority control method is specially:
The call back function that corresponding authority is controlled under securty_operations structures under registration LSM frameworks;
Obtain operation information, the filename of the file of the operation information including current operation, the progress information of the file or The progress information for operating the file and the user profile for operating the file;
Whether the file for judging current operation is prohibited corresponding operating, or whether the progress information of the file is malice, if It is then to intercept the operation;
If otherwise described operation is read-write operation, whether the progress information for judging to operate the file is abnormal process, if It is to intercept the operation, otherwise judges to operate the user profile of the file whether illegal, if it is intercepts the operation, Otherwise allow to continue to operate;
If the operation judges whether the parent process of the file is abnormal to perform operation, the operation is if it is intercepted, Otherwise judge whether the user profile of the file is illegal, if it is, intercepting the operation, otherwise allow to continue to operate;
If the operation is renaming, deletes or authority change, allow to continue to operate.
2. the method for claim 1, it is characterised in that also including transmission management and control;The transmission management and control includes:
General mode, it is allowed to file is carried out between removable medium and main frame and is mutually transmitted, and daily record is formed to data transmission information Record;
Reading mode, only allows file in removable medium to be copied to main frame, intercepts all write operations to removable medium, and Statistic record intercept information is formed and intercepts log recording;
Safe mode, forbids copied files to removable medium, while monitoring host computer, the file in control removable medium is only Copy the particular category of main frame to.
3. method as claimed in claim 1 or 2, it is characterised in that also including accessing management and control:Removable medium white list is set And blacklist, control whether to allow removable medium access host;In the white list and blacklist including at least supplier ID, Product ID and globally unique identifier's field.
4. method as claimed in claim 3, it is characterised in that whether the file of the operation is prohibited setting for corresponding operating Put, be configured by configuration file and changed.
5. the removable medium access rights managing and control system under a kind of domestic operating system, it is characterised in that include:
Registering modules, for registering LSM frameworks under under securty_operations structures corresponding authority control call back function;
Data obtaining module, for obtaining operation information, the operation information includes the filename of the file of current operation, described The progress information of file operates the progress information of the file and operates the user profile of the file;
Access limit control module, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting institute State operation;Otherwise, whether the progress information for judging to operate the file is abnormal process, if it is intercepts the operation;It is no Then judge to operate the user profile of the file whether illegal, if it is intercept the operation, otherwise allow to continue to operate;
Authority control module is performed, for judging whether the progress information of the file is malice, if it is, intercepting the behaviour Make;Otherwise judge whether the parent process of the file is abnormal, if it is intercepts the operation, otherwise judges the use of the file Whether family information is illegal, if it is, intercepting the operation, otherwise allows to continue to operate;
Renaming control of authority module, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting The operation;Otherwise allow to continue to operate;
Control of authority module is deleted, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting institute State operation;Otherwise allow to continue to operate;
Authority changes control module, for judging whether the file of current operation is prohibited corresponding operating, if it is, intercepting institute State operation;Otherwise allow to continue to operate.
6. system as claimed in claim 5, it is characterised in that also including transmission management and control module;The transmission management and control includes:
General mode, it is allowed to file is carried out between removable medium and main frame and is mutually transmitted, and daily record is formed to data transmission information Record;
Reading mode, only allows file in removable medium to be copied to main frame, intercepts all write operations to removable medium, and Statistic record intercept information is formed and intercepts log recording;
Safe mode, forbids copied files to removable medium, while monitoring host computer, the file in control removable medium is only Copy the particular category of main frame to.
7. the system as described in claim 5 or 6, it is characterised in that also including accessing management and control module:It is white that removable medium is set List and blacklist, control whether to allow removable medium access host;Including at least supply in the white list and blacklist Business ID, product ID and globally unique identifier's field.
8. system as claimed in claim 7, it is characterised in that whether the file of the current operation is prohibited corresponding operating Arrange, be configured by configuration file and changed.
CN201611193891.2A 2016-12-21 2016-12-21 Method and system for managing and controlling mobile medium access authority in domestic operating system Pending CN106599690A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611193891.2A CN106599690A (en) 2016-12-21 2016-12-21 Method and system for managing and controlling mobile medium access authority in domestic operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611193891.2A CN106599690A (en) 2016-12-21 2016-12-21 Method and system for managing and controlling mobile medium access authority in domestic operating system

Publications (1)

Publication Number Publication Date
CN106599690A true CN106599690A (en) 2017-04-26

Family

ID=58600387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611193891.2A Pending CN106599690A (en) 2016-12-21 2016-12-21 Method and system for managing and controlling mobile medium access authority in domestic operating system

Country Status (1)

Country Link
CN (1) CN106599690A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609027A (en) * 2017-08-08 2018-01-19 捷开通讯(深圳)有限公司 The anti-deleted marker position of file is set and prevents from deleting the method and device of file by mistake
CN110135151A (en) * 2019-05-23 2019-08-16 北京计算机技术及应用研究所 The trust computing for intercepting and matching is called to realize system and method with system based on LSM
WO2023029835A1 (en) * 2021-09-01 2023-03-09 中兴通讯股份有限公司 Method for protecting kernel thread, and terminal and computer readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629403A (en) * 2012-03-14 2012-08-08 深圳市紫金支点技术股份有限公司 USB (Universal Serial Bus) flash disk authorization method and system based on ATM (Automatic Teller Machine) equipment
CN104735091A (en) * 2015-04-17 2015-06-24 三星电子(中国)研发中心 Linux system-based user access control method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629403A (en) * 2012-03-14 2012-08-08 深圳市紫金支点技术股份有限公司 USB (Universal Serial Bus) flash disk authorization method and system based on ATM (Automatic Teller Machine) equipment
CN104735091A (en) * 2015-04-17 2015-06-24 三星电子(中国)研发中心 Linux system-based user access control method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
杨天泉: "Android终端安全机制分析及安全防护技术研究", 《CNKI优秀硕士学位论文全文库》 *
沈昌祥: "高安全级操作系统访问控制关键技术研究", 《中国优秀硕士论文全文数据库》 *
罗俊等: "基于LSM架构对Linux文件系统进行安全性增强", 《计算机工程与应用》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609027A (en) * 2017-08-08 2018-01-19 捷开通讯(深圳)有限公司 The anti-deleted marker position of file is set and prevents from deleting the method and device of file by mistake
CN110135151A (en) * 2019-05-23 2019-08-16 北京计算机技术及应用研究所 The trust computing for intercepting and matching is called to realize system and method with system based on LSM
WO2023029835A1 (en) * 2021-09-01 2023-03-09 中兴通讯股份有限公司 Method for protecting kernel thread, and terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
EP3107024B1 (en) System and method of restoring modified data
US9053333B2 (en) Managing confidential information
US20110239306A1 (en) Data leak protection application
US20140165137A1 (en) Data Leak Prevention Systems and Methods
CN106295355B (en) A kind of active safety support method towards Linux server
RU2559728C2 (en) System and method of encoding files from encrypted drive
CN103620613A (en) System and method for virtual machine monitor based anti-malware security
US8452740B2 (en) Method and system for security of file input and output of application programs
CN101667232B (en) Terminal credible security system and method based on credible computing
US9432369B2 (en) Secure data containers
CN105122260A (en) Context based switching to a secure operating system environment
CN102043920A (en) Access quarantine method of public file in data divulgence protection system
CN110135151B (en) Trusted computing implementation system and method based on matching of LSM and system call interception
CN105528553A (en) A method and a device for secure sharing of data and a terminal
CN106599690A (en) Method and system for managing and controlling mobile medium access authority in domestic operating system
CN101308700A (en) Divulging secret prevention U disk
US9430674B2 (en) Secure data access
JP2015052950A (en) Data storage device, secure io device
CN108038380A (en) Inoculator and antibody for computer security
CN101320415B (en) Control system and method for application program
CN103051608B (en) A kind of method and apparatus of movable equipment access monitoring
US20210004477A1 (en) Enhanced computer objects security
KR102338774B1 (en) Data protection method to prevent data leakage and corruption by preventing file contents from being read and written at the kernel level of the storage operating system
CN103023651A (en) Method and device for monitoring access of mobile device
US9519759B2 (en) Secure access to programming data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin High-tech Industrial Development Zone, Heilongjiang Province (838 Shikun Road)

Applicant after: Harbin antiy Technology Group Limited by Share Ltd

Address before: 150090 Room 506, No. 162 Hongqi Street, Nangang District, Harbin Development Zone, Heilongjiang Province

Applicant before: Harbin Antiy Technology Co., Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170426

WD01 Invention patent application deemed withdrawn after publication