CN107403090A - A kind of sandbox redirecting structure of striding equipment deployment - Google Patents

A kind of sandbox redirecting structure of striding equipment deployment Download PDF

Info

Publication number
CN107403090A
CN107403090A CN201710663566.6A CN201710663566A CN107403090A CN 107403090 A CN107403090 A CN 107403090A CN 201710663566 A CN201710663566 A CN 201710663566A CN 107403090 A CN107403090 A CN 107403090A
Authority
CN
China
Prior art keywords
client
service end
sandbox
program
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710663566.6A
Other languages
Chinese (zh)
Inventor
张维加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710663566.6A priority Critical patent/CN107403090A/en
Publication of CN107403090A publication Critical patent/CN107403090A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention devises a kind of sandbox redirecting structure of striding equipment deployment, realizes physical isolation in file and registration table aspect, and build transparent encryption in server end.System includes client and service end, and service end can be that the computer room of unit can also be special server, is actual stored area corresponding to each client is set in service end in client deployment sandbox redirector(Network disk or AES encryption virtual disk), then the message of FTP client FTP with process intercept and path redirection by being deployed in the sandbox redirector of client, the credible and judgement of untrusted is not carried out to process to identify, but directly by the file operation of client, registry operations and the true path of procedure operation all point in service end to should client actual stored area, so that the operation of client and be not written into FTP client FTP but the actual stored area at write service end, it is physically separated, the virtual disk of transparent encryption structure can be used to the actual stored area of service end, realize and the additional rights of consumer process are controlled.

Description

A kind of sandbox redirecting structure of striding equipment deployment
Technical field
The invention belongs to Computer and Network Security field.
Background technology
Current data leakage event takes place frequently, and is related to the various data types such as document, drawing, personal information and source code. The confidential document of enterprises and institutions, research and develop the core technology confidential data such as source code, drawing, it is easy to which the active through interior employee is divulged a secret Circulate to outside, or even fall in rival's hand.The current protectiving scheme of in the market mainly has three kinds, and 1)File encryption software; 2)SDC sandboxs;3)DSA data safeties are isolated;But from the point of view of technology is fed back with practice, DSA data safeties isolation user's ratio It is more.
Traditional encryption influences to use, can divulge a secret after decryption, eliminate from the market substantially because speed is slow.
The isolation of DSA data safeties is one of effective means in current data Anticompromise Technique, is mainly used in soft and hardware and opens The source code of hair enterprise or department is anti-to divulge a secret, and no matter source code is located in the server such as terminal or SVN, can protect.Pass through magnetic The multiple isolation technology means such as disk, storage, network, build one or more source code places of safety on demand over multiple terminals.Source For code using unrestricted in terminal security area, the use that can also normally be circulated between multiple places of safety does not influence day Often work, only carries out necessary management and control when source code will depart from some place of safety.Because it does not have during whole protection Gone out when being handled, therefore can fundamentally avoided using file encryption software encryption and protection source code in itself for source code It is existing block, slowly, blue screen phenomena such as.
However, this is feasible as a kind of salvo, user's such as software work can be but caused in the use of reality The situation that Cheng Shi divulges a secret.Under DSA management and control, once divulging a secret and can follow the trail of although software engineer occurs, it can prosecute, be difficult to Retrieve the massive losses divulged a secret and brought.
This respect, sandbox can be with customer services, and sandbox does not influence to use, and is still in protecting in use, rather than just isolation Preserve.The advantages of SDC sandboxs:
1)Using state-of-the-art third generation transparent encryption technology-kernel level depth defense framework in the world;
2)Land and encrypt during confidential data use on server;
3)All-transparent is encrypted, and does not influence staffing effectiveness and custom;
4)All Files form, including all document formats can be protected, all source code formats, drawing form, safety is surely It is fixed, do not destroy file;
5)Mail, file to outgoing are audited, and confidential document can be encrypted automatically, outgoing result record;
6)Non-customer end can not access secret end, and the data at secret end can be operated and surfed the Net simultaneously;
7)For management end to the secret end in system, client carries out tactical management and organization and administration, and client log is collected, added Close key management;The outgoing examination & verification authentication management of secret section;
8)SDC sandboxs are adapted to the use of all trades and professions;Example:Office, software company, game company, manufacturing industry and finance etc., It is in need to oneself secret secrecy unit;
9)Concerning security matters network internal is unobstructed, obstructs external PC, forms isolated island;
10)During non-concerning security matters online can effectively be controlled, confidential document content is can not to replicate stickup, and file uploads, mouse Mark pulls, and the mode such as screen interception is used by non-concerning security matters program;
11)SDC systems provide plaintext outgoing, three kinds of sides of encryption outgoing and mail outgoing when confidential document is taken out concerning security matters environment Formula, the effective circulation way for controlling file;
12)The confidential document of client is backed up from trend server;
13)Tyre pc client confidential document controls;
14)SDC sandbox softwares are difficult to crack, even the programmer to coomputerate;
15)Using extensively, the huge enterprise for having many is using SDC sandboxs software.
But past sandbox is mainly there is also some problems:1. traditional sandbox belief system safety, but sandbox If machine control in high-tech employee's hand, due to its authentic document also on this machine, then by crack sandbox according to Right possibility of divulging a secret;2. the authentic document of sandbox points to path and is once acquired control, file can be stolen;3. traditional sandbox effect Rate is low, influences operating efficiency;Treated with a certain discrimination 4. can not be realized between pair concerning security matters program and non-concerning security matters program assembly.
The content of the invention
The present invention devises a kind of sandbox redirecting structure of striding equipment deployment, and physics is realized in file and registration table aspect Isolation, and build transparent encryption in server end.Its specific implementation is as follows:First, it is assumed that system needs what is taken precautions against Main body is the user of client machine(Such as employee's computer of research and development department of enterprises and institutions), the system that the present invention is directed to is comprising objective Family end and service end, service end can be that the computer room of unit can also be special server, and journey is redirected in client deployment Sequence(A kind of sandbox program of transformation), it is actual stored area corresponding to each client is set in service end(Network disk or void Intend disk or file), then by being deployed in message and process of the sandbox redirector to FTP client FTP of client Intercept and redirected with path, not carrying out the credible and judgement of untrusted to process identifies, but directly by the text of client Part operation, the true path of registry operations and procedure operation all point in service end to should client actual stored area, So that the operation of client and be not written into FTP client FTP but the actual stored area at write service end, carry out physics every From, depend on whether it is necessary in the case of, transparent encryption can be carried out to the actual stored area of service end.The client redirection area of system The virtual disk of one transparent encryption structure of service end is pointed in domain, and the virtual disk is also realized to consumer process by transparent encryption Additional rights control.
Client does not use traditional hard disk as storage, but uses one to be shunted for program layer and file layers, pin To the storage architecture system of concerning security matters operation and the operation shunting of non-concerning security matters, the framework includes such as lower part:A. program layer storage device, And subdivision includes two fractions, a non-concerning security matters program layer, its running environment is local in client, has relatively high speed, For running the program assembly such as windows system kernels, general application component etc. of not concerning security matters, a concerning security matters program Layer, including browser rs cache, input method journal file, office daily records and core component etc., its true path run are actual Point to service end;B. file layers storage device, can be marked by the keeper of whole safety-protection system, it is big still for capacity The true path of service end can be then pointed to labeled as the storage file of not concerning security matters for the file of concerning security matters in local runtime.
The service end of system can be independently of the server for being dedicated as sandbox store path of the original computer room of office, with Its multiple disk share as multiple network disks as corresponding to each client machine real storage or Sandbox is created for computer in server Ramdisk and redirect region, and protected with AES encryption and transparent encryption.
As a specific implementation case, on the basis of above-mentioned basic framework, case study on implementation has also done following setting:
1. client also deploys screen monitor, webmaster can be carried out to the screen of client except redirecting;2. in order to anti- Only memory overflow, interacting between the client's end memory and service end of system are encrypted;3. it set up strict self protect Protection mechanism, the client sandbox process of system carry out self-protection, verify the defence program of Resident Process, once defence program is certainly Inspection is abnormal with regard to locking computer.And this defence program can carry out the detection to debugging enironment, Rogue program etc., once finding Mark is abnormal;4. for the needs of some foreign works, the concerning security matters content in all safety zones of system client will be sent outside Go to non-concerning security matters region, it is necessary to which, by a transfer program, such as mailing system or instant communicating system, the transfer program is by examining Core and there is more detailed logging record, be available for subsequent query, accountability.
Advantage of the invention is that present invention incorporates the advantages of sandbox and physical isolation and transparent encryption, one kind has been created The redirection encryption sandbox system of striding equipment.
Details are referring to Figure of description 1 to 3.Figure of description explanation:
The deployment schematic diagram of figure one, the present invention.
Figure two, the present invention anti-copy divulge a secret function citing.
The attack protection function of figure three, the present invention.

Claims (10)

1. a kind of sandbox redirecting structure of striding equipment deployment, the system includes client and service end, in client deployment weight Oriented program(A kind of sandbox program of transformation), it is actual stored area corresponding to each client is set in service end(Network magnetic Disk or virtual disk or file), then by being deployed in message of the sandbox redirector to FTP client FTP of client With process intercept and redirected with path, not carrying out the credible and judgement of untrusted to process identifies, but directly by client The true path of the file operation at end, registry operations and concerning security matters procedure operation all point in service end to should client it is true Real storage so that the operation of client and be not written into FTP client FTP but the actual stored area at write service end, enter Row physical isolation.
2. according to a kind of system of claim 1, it is characterised in that client does not use traditional hard disk as storage, but Shunted using one for program layer and file layers, operate the storage architecture system of shunting with non-concerning security matters for concerning security matters operation, should Framework includes such as lower part:A. program layer storage device, and subdivision includes two fractions, a non-concerning security matters program layer, it runs Environment is local in client, has relatively high speed, for running the program assembly such as windows system kernels of not concerning security matters, General application component etc., a concerning security matters program layer, including browser rs cache, input method journal file, office daily records With core component etc., its true path run is actually pointed to service end;B. file layers storage device, can be by whole security protection system The keeper of system is marked, for capacity greatly but can be in local runtime, for relating to labeled as the storage file of not concerning security matters Close file then points to the true path of service end.
3. according to a kind of system of claim 1, it is characterised in that the client of system redirects region and points to service end one The virtual disk of individual transparent encryption structure, sandbox point to the file operation of client, registry operations and concerning security matters procedure operation To the virtual disk, the virtual disk is also realized by transparent encryption and the additional rights of consumer process is controlled.
4. according to a kind of system of claim 1, it is characterised in that the service end of system is independently of the original computer room of office The server of sandbox store path is dedicated as, is shared with its multiple disk as multiple network disks, for each client point Carry is not connected, as the real storage corresponding to each client machine, while the network disk carries out transparent encryption I/O is read and write with control so that different user process possesses different rights.
5. according to a kind of system of claim 1, it is characterised in that the client or service end of system are in internal memory virtual hard disk Sandbox is created for computer redirect region in Ramdisk.
6. according to a kind of system of claim 1, it is characterised in that client device is not also using residing in client External program, including but not limited to cloud program or external Virtual program, to strengthen security.
7. according to a kind of system of claim 1, it is characterised in that client except redirect, also deploy screen monitor, Webmaster can be carried out to the screen of client.
8. according to a kind of system of claim 1, it is characterised in that interacting between the client's end memory and service end of system Encrypted.
9. a kind of system according to claim 1, it is characterised in that the client sandbox process of system carries out self-protection, school The defence program of Resident Process is tested, it is abnormal with regard to locking computer once defence program self-test.
A kind of 10. system according to claim 1, it is characterised in that the concerning security matters content in all safety zones of system client Non- concerning security matters region is sent out outside, it is necessary to pass through a transfer program, such as mailing system or instant communicating system, carryover in this Sequence is by examination & verification and has more detailed logging record, is available for subsequent query, accountability.
CN201710663566.6A 2017-08-05 2017-08-05 A kind of sandbox redirecting structure of striding equipment deployment Pending CN107403090A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710663566.6A CN107403090A (en) 2017-08-05 2017-08-05 A kind of sandbox redirecting structure of striding equipment deployment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710663566.6A CN107403090A (en) 2017-08-05 2017-08-05 A kind of sandbox redirecting structure of striding equipment deployment

Publications (1)

Publication Number Publication Date
CN107403090A true CN107403090A (en) 2017-11-28

Family

ID=60401985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710663566.6A Pending CN107403090A (en) 2017-08-05 2017-08-05 A kind of sandbox redirecting structure of striding equipment deployment

Country Status (1)

Country Link
CN (1) CN107403090A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109413189A (en) * 2018-11-05 2019-03-01 张维加 A kind of electronic trading system based on bottom translation
WO2020073877A1 (en) * 2018-10-07 2020-04-16 张维加 Distributed computing system deployed across devices
CN111079097A (en) * 2018-10-22 2020-04-28 张维加 Programming development system based on network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020073877A1 (en) * 2018-10-07 2020-04-16 张维加 Distributed computing system deployed across devices
CN111079097A (en) * 2018-10-22 2020-04-28 张维加 Programming development system based on network
CN109413189A (en) * 2018-11-05 2019-03-01 张维加 A kind of electronic trading system based on bottom translation
WO2020094157A1 (en) * 2018-11-05 2020-05-14 张维加 Electronic trading system based on base layer translation

Similar Documents

Publication Publication Date Title
CN103530570B (en) A kind of electronic document safety management system and method
US8341756B2 (en) Securing data in a networked environment
CN101755269B (en) Device with a secure virtual machine
CN102999732B (en) Multi-stage domain protection method and system based on information security level identifiers
CN101923678A (en) Data security protection method of enterprise management software
CN106022155A (en) Method and server for security management in database
CN103218575A (en) Host file security monitoring method
CN107403090A (en) A kind of sandbox redirecting structure of striding equipment deployment
CN109033824A (en) Cloud disk safety access method based on virtual isolation mech isolation test
Tse et al. Emerging issues in cloud storage security: encryption, key management, data redundancy, trust mechanism
US10339325B2 (en) Multi-level security model for securing access to encrypted private data
US10749880B2 (en) Cloud tenant oriented method and system for protecting privacy data
CN201805447U (en) Electronic information management platform system of Intranet
CN109388942A (en) A kind of local area network accelerates the safe sandbox system of operation
CN104753924B (en) A kind of business data safeguarding of assets method based on dynamically transparent isolating and protecting
CN113221139A (en) Electronic information encryption method
CN111079154A (en) Kernel reinforcing system for protecting kernel of operating system from being damaged by external program
Gupta et al. Information security and cloud computing
Saeed et al. Analytical Approach for Security of Sensitive Business Cloud
Yu et al. Construction of Data Security System
Robinson Cloud systems with its security, privacy and trust claims to a sustainable solution
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Reddy et al. A Systematic Approach towards Security Concerns in Cloud
CN102096641A (en) Double-factor shadow password protection method for mobile storage medium data safety
Fairuzullah et al. A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171128