HK1237470B - Access control system and access control method - Google Patents
Access control system and access control methodInfo
- Publication number
- HK1237470B HK1237470B HK17111248.8A HK17111248A HK1237470B HK 1237470 B HK1237470 B HK 1237470B HK 17111248 A HK17111248 A HK 17111248A HK 1237470 B HK1237470 B HK 1237470B
- Authority
- HK
- Hong Kong
- Prior art keywords
- aforementioned
- request
- file
- access control
- identification information
- Prior art date
Links
Description
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请基于平成27年(2015年)3月25日提出的日本专利申请特愿2015-62999主张优先权,在此引用其全部内容。This application claims priority based on Japanese Patent Application No. 2015-62999, filed on March 25, 2015, the entire contents of which are incorporated herein by reference.
技术领域Technical Field
本发明涉及访问控制系统。The present invention relates to access control systems.
背景技术Background Art
以往,在处理机密信息文件的PC等的终端中,有以机密信息保护为目的而设定防火墙或向文件系统的访问控制、以防止来自有恶意的使用者的不正当的访问或机密信息文件的泄漏等的技术。Conventionally, terminals such as PCs that handle confidential information files have implemented technologies such as firewalls and file system access control to protect confidential information, thereby preventing unauthorized access by malicious users and leakage of confidential information files.
作为本技术的背景技术,有特开2007-140798号公报。特开2007-140798号公报记载有一种计算机的信息泄漏防止系统:在计算机上执行的应用要向硬盘等的存储部中所存储的信息访问的时点,由判定部判定是否满足预先设定的访问容许条件,在判定为不正当的访问的情况下禁止上述信息向应用的交接。Japanese Patent Application Publication No. 2007-140798 serves as background technology for this technology. Japanese Patent Application Publication No. 2007-140798 describes a computer information leakage prevention system. When an application executing on a computer attempts to access information stored in a storage unit such as a hard disk, a determination unit determines whether pre-set access permission conditions are met. If the determination indicates unauthorized access, the information is prohibited from being passed to the application.
发明内容Summary of the Invention
发明所要解决的课题Problems to be solved by the invention
另一方面,在综合办公软件中包含文字处理器、表计算等多个应用,综合办公软件处理各种形式的文件。因此,在利用综合办公软件编辑机密信息文件的情况下,在上述以往的技术中,能够着眼于扩展名设定访问控制。但是,必须掌握应用所处理的全部的扩展名来进行需要的全部的设定。On the other hand, comprehensive office software includes multiple applications such as word processors and spreadsheets, and it handles files of various formats. Therefore, when using comprehensive office software to edit confidential information files, the aforementioned conventional technology can focus on setting access control by extension. However, this requires understanding all the extensions handled by the application to configure all necessary settings.
此外,在利用防火墙控制网络通信的情况下,必须对通信目标及通信程序等分别设定访问控制。Furthermore, when controlling network communications using a firewall, access control must be set for each communication destination and communication program.
本发明的目的是提供一种将上述那样的文件系统及防火墙的访问控制的设定简略化的系统。An object of the present invention is to provide a system that simplifies the settings of access control for the above-mentioned file system and firewall.
用于解决课题的手段Means for solving problems
如果表示在本申请中公开的发明的代表性的一例,则如以下所述。即,一种访问控制系统,由具有执行进程的处理器和保存上述程序的存储器的计算机构成,该访问控制系统具有:启动器,是将上述进程启动的进程;访问控制列表文件即ACL文件,定义了上述进程发出的I/O请求的控制内容;进程探索部,追溯上述进程的父级,判定是否是以上述启动器为起源而启动的进程;以及访问控制部,按照由上述ACL文件定义的内容,控制以上述启动器为起源而启动的进程所发出的I/O请求。A representative example of the invention disclosed in this application is as follows: an access control system comprising a computer having a processor for executing a process and a memory for storing the program, the access control system comprising: an initiator for initiating the process; an access control list (ACL) file defining control details for I/O requests issued by the process; a process discovery unit for tracing the parent of the process to determine whether the process was initiated by the initiator; and an access control unit for controlling I/O requests issued by the process initiated by the initiator in accordance with the details defined in the ACL file.
发明的效果Effects of the Invention
根据本发明的代表性的实施方式,能够使访问控制的设定简略化。通过以下的实施例的说明将使上述以外的问题、结构及效果变得清楚。According to a representative embodiment of the present invention, it is possible to simplify the setting of access control. Other problems, structures, and effects than those described above will become clear through the following description of the embodiments.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是表示本发明实施例的系统的结构的图。FIG1 is a diagram showing the configuration of a system according to an embodiment of the present invention.
图2是表示本实施例的用户终端的物理性的结构的框图。FIG2 is a block diagram showing the physical structure of a user terminal according to this embodiment.
图3是说明本实施例的ACL表的结构例的图。FIG. 3 is a diagram illustrating a configuration example of an ACL table according to this embodiment.
图4是将本实施例的I/O检测功能向过滤管理器登录的处理的流程图。FIG. 4 is a flowchart of a process for registering the I/O detection function of this embodiment to the filter manager.
图5是本实施例的进程探索功能的流程图。FIG5 is a flow chart of the process exploration function of this embodiment.
图6是本实施例的访问控制功能的流程图。FIG6 is a flow chart of the access control function of this embodiment.
具体实施方式DETAILED DESCRIPTION
以下,利用附图对实施本发明的情况详细地说明。Hereinafter, the embodiment of the present invention will be described in detail with reference to the accompanying drawings.
图1是表示本发明实施例的系统的结构的图。FIG1 is a diagram showing the configuration of a system according to an embodiment of the present invention.
在图1中,用户终端101具有存储装置102、和网络适配器103。此外,在用户终端101中,安装着操作系统107、文件系统驱动105、和网络驱动106。进而,用户终端101,在操作系统107内具有将从进程109产生的文件I/O请求包110以及网络I/O请求包111过滤的过滤管理器108。在过滤管理器108中登记有I/O检测功能113。I/O检测功能113包括进程探索功能114和访问控制功能115。此外,在用户终端101内安装着启动器112和设定工具116。In Figure 1, a user terminal 101 includes a storage device 102 and a network adapter 103. Furthermore, an operating system 107, a file system driver 105, and a network driver 106 are installed in the user terminal 101. Furthermore, within the operating system 107, the user terminal 101 includes a filter manager 108 that filters file I/O request packets 110 and network I/O request packets 111 generated by a process 109. An I/O detection function 113 is registered in the filter manager 108. The I/O detection function 113 includes a process discovery function 114 and an access control function 115. Furthermore, a launcher 112 and a configuration tool 116 are installed in the user terminal 101.
启动器112将任意的进程109启动。I/O检测功能113经由过滤管理器108接受文件I/O请求包110及网络I/O请求包111。进程探索功能114根据由I/O检测功能113接受到的请求包确认发送源的进程109的父进程。在能够由进程探索功能114确认父进程是启动器112的情况下,访问控制功能115根据ACL文件117进行访问控制。设定工具116对ACL文件117记录、编辑、删除访问控制设定。The launcher 112 launches an arbitrary process 109. The I/O detection function 113 receives file I/O request packets 110 and network I/O request packets 111 via the filter manager 108. The process discovery function 114 identifies the parent process of the source process 109 based on the request packets received by the I/O detection function 113. If the process discovery function 114 confirms that the parent process is the launcher 112, the access control function 115 performs access control based on the ACL file 117. The configuration tool 116 records, edits, and deletes access control settings in the ACL file 117.
当将文字处理器、表计算、Web浏览器等任意的进程109启动时,在想要应用ACL文件117的情况下,用户从启动器112启动进程109。在进程109进行向文件或网络的访问的情况下,操作系统107生成包含访问内容及访问源的进程信息在内的包,经由过滤管理器108向文件系统驱动105或网络驱动106传递。When starting any process 109 such as a word processor, spreadsheet, or web browser, and wishing to apply the ACL file 117, the user starts the process 109 from the launcher 112. When the process 109 accesses a file or a network, the operating system 107 generates a packet including the access content and process information of the access source, and transmits the packet to the file system driver 105 or the network driver 106 via the filter manager 108.
过滤管理器108调用I/O检测功能113内的进程探索功能114。进程探索功能114探索进程109的父进程、更父级的进程,判定进程109的起源是否是启动器112。在进程探索功能114判定为进程109的起源是启动器112的情况下,过滤管理器108调用访问控制功能115。The filter manager 108 calls the process discovery function 114 within the I/O detection function 113. The process discovery function 114 discovers the parent process and the parent-level processes of the process 109 and determines whether the origin of the process 109 is the launcher 112. If the process discovery function 114 determines that the origin of the process 109 is the launcher 112, the filter manager 108 calls the access control function 115.
访问控制功能115按照ACL文件117,进行文件I/O请求包110及网络I/O请求包111的许可、拒绝、变更等的访问控制。The access control function 115 performs access control such as permission, rejection, and modification of the file I/O request packet 110 and the network I/O request packet 111 in accordance with the ACL file 117 .
通过上述,能够对以启动器112为起源的全部的子进程及孙进程一起应用ACL文件117的访问控制。As described above, the access control of the ACL file 117 can be applied to all child processes and grandchild processes originating from the launcher 112 .
图2是表示用户终端101的物理性的结构的框图。FIG. 2 is a block diagram showing the physical structure of the user terminal 101 .
本实施方式的用户终端101由具有处理器(CPU)1、存储器2、辅助存储装置3、通信接口4、输入接口5及输出接口8的计算机构成。The user terminal 101 of the present embodiment is constituted by a computer including a processor (CPU) 1 , a memory 2 , an auxiliary storage device 3 , a communication interface 4 , an input interface 5 , and an output interface 8 .
处理器1执行存储器2中所存储的程序。存储器2包括作为非易失性的存储元件的ROM以及作为易失性的存储元件的RAM。ROM保存不变的程序(例如BIOS)等。RAM是DRAM(Dynamic Random Access Memory、动态随机存取存储器)那样的高速且易失性的存储元件,暂时地保存处理器1执行的程序及在程序的执行时使用的数据。Processor 1 executes programs stored in memory 2. Memory 2 includes ROM, a nonvolatile storage element, and RAM, a volatile storage element. ROM stores persistent programs (such as BIOS). RAM, a high-speed, volatile storage element like DRAM (Dynamic Random Access Memory), temporarily stores programs executed by processor 1 and data used during program execution.
辅助存储装置3例如是磁存储装置(HDD、硬盘驱动器)、闪存存储器(SSD、固态硬盘)等的大容量且非易失性的存储装置,其构成存储装置102。此外,辅助存储装置3保存处理器1执行的程序。即,程序被从辅助存储装置3读出,装载到存储器2中,被处理器1执行。The auxiliary storage device 3 is a large-capacity, non-volatile storage device such as a magnetic storage device (HDD, hard disk drive) or a flash memory (SSD, solid state drive), and constitutes the storage device 102. Furthermore, the auxiliary storage device 3 stores programs executed by the processor 1. Specifically, the programs are read from the auxiliary storage device 3, loaded into the memory 2, and executed by the processor 1.
通信接口4是按照规定的协议来控制与其他装置(文件服务器或网关等)的通信的网络接口装置。The communication interface 4 is a network interface device that controls communications with other devices (such as a file server and a gateway) according to a predetermined protocol.
输入接口5连接着键盘6或鼠标7等,是接受来自操作者的输入的接口。输出接口8连接着显示器装置9及打印机等,是将程序的执行结果以操作者能够可见的形式输出的接口。The input interface 5 is connected to a keyboard 6 and a mouse 7 and receives input from the operator. The output interface 8 is connected to a display device 9 and a printer and outputs the program execution results in a form visible to the operator.
处理器1执行的程序经由可移动介质(CD-ROM、闪存存储器等)或网络被提供给用户终端101,保存到作为非暂时性存储介质的非易失性的辅助存储装置3中。因此,用户终端101可以具有从可移动介质读入数据的接口。The program executed by processor 1 is provided to user terminal 101 via removable media (CD-ROM, flash memory, etc.) or a network and stored in nonvolatile auxiliary storage device 3, which is a non-transitory storage medium. Therefore, user terminal 101 may have an interface for reading data from removable media.
用户终端101是由在物理上为一个计算机、或者在逻辑上或物理上构成的多个计算机所构成的计算机系统,可以是在同一个计算机上以分别的线程动作,也可以是在构建于多个物理的计算机资源上的虚拟计算机上动作。The user terminal 101 is a computer system consisting of one physical computer or multiple logically or physically constructed computers. It can operate in separate threads on the same computer or on a virtual computer built on multiple physical computer resources.
图3是说明ACL文件117的结构例的图。FIG. 3 is a diagram illustrating a structural example of the ACL file 117 .
ACL文件117包括定义网络访问的规则的网络ACL201、以及定义文件访问的规则的文件ACL202。The ACL file 117 includes a network ACL 201 that defines rules for network access and a file ACL 202 that defines rules for file access.
网络ACL201保持用来唯一地识别规则的规则号码203、通信源204、通信目标205、以及访问控制的定义206。The network ACL 201 holds a rule number 203 for uniquely identifying a rule, a communication source 204 , a communication destination 205 , and an access control definition 206 .
在通信源204中,指定适用访问控制的通信源的网络信息的IP地址及网络掩码、表示自身的“LOCAL”或表示全部的“ANY”等。在通信目标205中,指定适用访问控制的通信目标的网络信息的IP地址及网络掩码、表示自身的“LOCAL”或表示全部的“ANY”等。在定义206中,指定在符合规则的情况下是许可还是拒绝通信。此外,在定义206中,还可以指定在符合规则的情况下将通信目标向别的地址变更。In the communication source 204, specify the IP address and network mask of the communication source's network information to which access control applies, "LOCAL" indicating the user, or "ANY" indicating all, etc. In the communication destination 205, specify the IP address and network mask of the communication destination's network information to which access control applies, "LOCAL" indicating the user, or "ANY" indicating all, etc. In the definition 206, specify whether to permit or deny communication if the rules are met. Furthermore, in the definition 206, it can be specified that the communication destination be changed to another address if the rules are met.
文件ACL202保持用来唯一地识别规则的规则号码207、表示访问目标的文件或目录的访问路径208、访问控制的定义209。The file ACL 202 holds a rule number 207 for uniquely identifying a rule, an access path 208 indicating a file or directory to be accessed, and an access control definition 209 .
在访问路径208中,用字符串指定适用访问控制的文件路径或目录路径。在定义209中,指定在符合规则的情况下是许可还是拒绝向文件或目录的访问。此外,在定义209中,还可以指定在符合规则的情况下将访问路径向别的路径变更。In access path 208, a character string specifies the file path or directory path to which access control applies. In definition 209, whether access to the file or directory is permitted or denied if the rules are met is specified. Furthermore, definition 209 can also specify that the access path be changed to another path if the rules are met.
图4是将I/O检测功能113向过滤管理器108登录的处理的流程图。FIG. 4 is a flowchart of a process for registering the I/O detection function 113 to the filter manager 108 .
过滤管理器108是由操作系统107提供的功能。操作者通过向操作系统107发出指令,能够将操作系统107处理的文件I/O请求包110或网络I/O请求包111经由过滤管理器108向I/O检测功能113传递。The filter manager 108 is a function provided by the operating system 107. By issuing instructions to the operating system 107, the operator can pass the file I/O request packet 110 or network I/O request packet 111 processed by the operating system 107 to the I/O detection function 113 via the filter manager 108.
首先,过滤管理器108根据操作者的指示进行设定,以将文件I/O请求包110向I/O检测功能113转送(步骤301)。进而,过滤管理器108根据操作者的指示进行设定,以将网络I/O请求包111向I/O检测功能113转送(步骤302)。First, the filter manager 108 is configured to forward the file I/O request packet 110 to the I/O detection function 113 according to the operator's instructions (step 301). Furthermore, the filter manager 108 is configured to forward the network I/O request packet 111 to the I/O detection function 113 according to the operator's instructions (step 302).
图5是进程探索功能114的流程图。FIG5 is a flow chart of the process discovery function 114 .
进程探索功能114执行追溯生成了文件I/O请求包110及网络I/O请求包111的进程的父进程的处理。The process search function 114 performs processing to trace the parent process of the process that generated the file I/O request packet 110 and the network I/O request packet 111 .
在从过滤管理器108经由I/O检测功能113接受到文件I/O请求包110或网络I/O请求包111的情况下,进程探索功能114开始父进程探索处理。When receiving the file I/O request packet 110 or the network I/O request packet 111 from the filter manager 108 via the I/O detection function 113 , the process search function 114 starts a parent process search process.
首先,进程探索功能114从文件I/O请求包110或网络I/O请求包111取得调用源的进程109的进程ID,作为Check ID(步骤401)。First, the process search function 114 obtains the process ID of the calling process 109 from the file I/O request packet 110 or the network I/O request packet 111 as a Check ID (step 401 ).
接着,判定在步骤401中取得的Check ID是否与启动器112的进程ID一致(步骤402)。Next, it is determined whether the Check ID acquired in step 401 matches the process ID of the launcher 112 (step 402).
在步骤402中判定为Check ID与启动器112的进程ID一致的情况下(步骤403中“是”),将进程109被从启动器112启动的消息向调用源返送,结束处理(步骤407)。If it is determined in step 402 that the Check ID matches the process ID of the launcher 112 (YES in step 403 ), a message indicating that the process 109 has been launched by the launcher 112 is returned to the call source, and the processing ends (step 407 ).
另一方面,在判定为Check ID与启动器112的进程ID不一致的情况下(步骤403中“否”),取得Check ID的父进程的进程ID(步骤404)。On the other hand, when it is determined that the Check ID does not match the process ID of the launcher 112 (No in step 403), the process ID of the parent process of the Check ID is acquired (step 404).
在不能取得父进程的进程ID的情况下(步骤405中“否”),将进程109没有从启动器112启动的消息向调用源返送(步骤408),结束处理。If the process ID of the parent process cannot be obtained (No in step 405 ), a message indicating that the process 109 has not been started by the launcher 112 is returned to the call source (step 408 ), and the processing ends.
另一方面,在能够取得父进程的进程ID的情况下(步骤405中“是”),将在步骤404中取得的进程ID新设为Check ID(步骤406),向步骤402返回,进一步探索父级进程。On the other hand, when the process ID of the parent process can be obtained ("Yes" in step 405), the process ID obtained in step 404 is newly set as the Check ID (step 406), and the process returns to step 402 to further search for the parent process.
图6是访问控制功能115的流程图。FIG6 is a flow chart of the access control function 115. As shown in FIG6 , the access control function 115
访问控制功能115执行网络或文件的访问控制。The access control function 115 performs access control of a network or a file.
在步骤408的结果为调用源的进程109是从启动器112启动的进程的情况下,为了对文件I/O请求包110或网络I/O请求包111处理访问控制,判定I/O请求包是文件I/O还是网络I/O(步骤501)。When the result of step 408 is that the calling source process 109 is a process started from the launcher 112, in order to process access control for the file I/O request packet 110 or the network I/O request packet 111, it is determined whether the I/O request packet is file I/O or network I/O (step 501).
在I/O请求包是文件I/O请求包110的情况下,从ACL文件117的文件ACL202取得一个规则(步骤502)。When the I/O request packet is the file I/O request packet 110 , one rule is obtained from the file ACL 202 of the ACL file 117 (step 502 ).
另一方面,在I/O请求包是网络I/O请求包111的情况下,从ACL文件117的网络ACL201取得一个规则(步骤503)。On the other hand, when the I/O request packet is the network I/O request packet 111, one rule is obtained from the network ACL 201 of the ACL file 117 (step 503).
在步骤502及步骤503中不能取得规则的情况下(步骤504中“否”),结束访问控制处理。If the rules cannot be acquired in steps 502 and 503 (No in step 504), the access control process ends.
另一方面,在步骤502及步骤503中能够取得规则的情况下(步骤504中“是”),判定I/O请求包的内容(通信源、通信目标、访问路径等)与在步骤502及步骤503中取得的规则(通信源204、通信目标205、访问路径208等)是否一致(步骤505)。On the other hand, when the rules can be obtained in steps 502 and 503 ("Yes" in step 504), determine whether the content of the I/O request packet (communication source, communication target, access path, etc.) is consistent with the rules obtained in steps 502 and 503 (communication source 204, communication target 205, access path 208, etc.) (step 505).
结果,在I/O请求包的内容与规则一致的情况下(步骤506中“是”),根据ACL文件117的定义206、209将I/O请求包更新(步骤507),结束访问控制处理。As a result, if the content of the I/O request packet is consistent with the rule ("Yes" in step 506), the I/O request packet is updated according to the definitions 206 and 209 of the ACL file 117 (step 507), and the access control process ends.
另一方面,在上述I/O请求包的内容与规则不一致的情况下(步骤506中“否”),从ACL文件117取得一个接着的规则(步骤508),向步骤504返回,继续处理。On the other hand, when the content of the I/O request packet does not match the rule (No in step 506), the next rule is obtained from the ACL file 117 (step 508), and the process returns to step 504 to continue.
通过上述方法,能够利用进程的父子关系,对从启动器112启动的全部的进程109适用由ACL文件117设定的访问控制。By using the above method, the access control set in the ACL file 117 can be applied to all processes 109 started from the launcher 112 by utilizing the parent-child relationship of the processes.
另外,在多个规则符合的情况下,优选的是以优先适用的顺序在ACL文件117中登记规则。此外,也可以在ACL文件117中定义优先顺序,将符合I/O请求包的规则全部选择,按照定义的优先顺序对I/O请求包适用访问控制定义。In addition, when multiple rules are matched, it is preferable to register the rules in the ACL file 117 in the order of priority of application. Alternatively, a priority order may be defined in the ACL file 117, and all rules matching the I/O request packet may be selected, and the access control definition may be applied to the I/O request packet in the defined priority order.
如以上说明,根据本发明的实施例,由于具有:作为将进程启动的进程的启动器112;定义了进程发出的I/O请求的控制内容的ACL文件202;追溯被启动的进程的父级、判定是否是以启动器112为起源而被启动的进程的进程探索功能114;以及根据在ACL文件202中定义的内容来控制以启动器112为起源而被启动的进程所发出的I/O请求的访问控制功能115,所以使用者即使不按每个进程或每个文件来设定访问控制,通过在过滤管理器108中设定访问控制、将想要适用安全性的进程从启动器112启动,也能够唯一地控制向网络或文件系统的访问。As described above, according to an embodiment of the present invention, since it has: a launcher 112 that is a process that starts a process; an ACL file 202 that defines the control content of I/O requests issued by the process; a process discovery function 114 that traces the parent of the started process and determines whether it is a process started with the launcher 112 as the origin; and an access control function 115 that controls the I/O requests issued by the process started with the launcher 112 as the origin based on the content defined in the ACL file 202, even if the user does not set access control for each process or each file, by setting access control in the filter manager 108 and starting the process to which security is desired to be applied from the launcher 112, it is possible to uniquely control access to the network or file system.
此外,进程探索功能114取得发出了I/O请求的进程的识别信息,如果启动了进程的进程的识别信息与启动器112的识别信息相同,则判定为发出了I/O请求的进程是以启动器112为起源而被启动的进程,如果进程的识别信息与上述启动器112的识别信息不同,则追溯父进程,判定父进程的识别信息是否与启动器112的识别信息相同,由此,能够可靠地判定启动了进程的起源的进程。In addition, the process exploration function 114 obtains the identification information of the process that issued the I/O request. If the identification information of the process that started the process is the same as the identification information of the launcher 112, it is determined that the process that issued the I/O request is a process that was started with the launcher 112 as the origin. If the identification information of the process is different from the identification information of the above-mentioned launcher 112, the parent process is traced back to determine whether the identification information of the parent process is the same as the identification information of the launcher 112. In this way, the origin process of the process that started the process can be reliably determined.
此外,访问控制功能115判定I/O请求的类别,在I/O请求是文件I/O请求的情况下,参照文件ACL202,根据I/O请求的访问目标决定I/O的控制内容,在I/O请求是网络I/O请求的情况下,参照网络ACL201,根据I/O请求的通信源及通信目标决定I/O的控制内容,由此,能够根据I/O的对象可靠地应用不同的规则。In addition, the access control function 115 determines the type of I/O request. If the I/O request is a file I/O request, the file ACL 202 is referenced to determine the I/O control content based on the access target of the I/O request. If the I/O request is a network I/O request, the network ACL 201 is referenced to determine the I/O control content based on the communication source and communication target of the I/O request. In this way, different rules can be reliably applied according to the object of the I/O.
另外,本发明并不限定于上述实施例,而包含权利要求书的主旨内的各种各样的变形例及等同的结构。例如,上述实施例是为了使本发明容易理解而进行了详细地说明,本发明并不限定于一定具备所说明的全部结构。此外,也可以将某个实施例的结构的一部分替换为其他实施例的结构。此外,也可以对某个实施例的结构添加其他实施例的结构。此外,关于各实施例的结构的一部分也可以进行其他结构的追加、删除、替换。Furthermore, the present invention is not limited to the above-described embodiments, but encompasses various variations and equivalent structures within the spirit of the claims. For example, the above-described embodiments are described in detail to facilitate understanding of the present invention, and the present invention is not limited to all of the structures described. Furthermore, a portion of the structure of a particular embodiment may be replaced with a structure of another embodiment. Furthermore, a structure of another embodiment may be added to a structure of a particular embodiment. Furthermore, a portion of the structure of each embodiment may be supplemented with, deleted from, or replaced with another structure.
此外,上述各结构、功能、处理部、处理机构等也可以通过将它们的一部分或全部例如用集成电路设计等而通过硬件来实现,也可以通过处理器将实现各个功能的程序解释并执行而由软件实现。In addition, the above-mentioned structures, functions, processing units, processing mechanisms, etc. can also be implemented by hardware by designing part or all of them, such as using integrated circuits, or by software by having a processor interpret and execute programs that implement various functions.
实现各功能的程序、表、文件等的信息可以保存到存储器、硬盘、SSD(Solid StateDrive、固态硬盘)等的存储装置、或IC卡、SD卡、DVD等的记录介质中。Information such as programs, tables, and files that implement various functions can be stored in storage devices such as memories, hard disks, and SSDs (Solid State Drives), or in recording media such as IC cards, SD cards, and DVDs.
此外,控制线及信息线是考虑到说明上的需要而显示的,并不一定表示在安装上需要的全部的控制线及信息线。实际上,也可以认为几乎全部的结构被相互连接。In addition, the control lines and information lines are shown for the purpose of explanation and do not necessarily represent all the control lines and information lines required for installation. In fact, it can also be considered that almost all the structures are connected to each other.
Claims (2)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2015-062999 | 2015-03-25 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1237470A1 HK1237470A1 (en) | 2018-04-13 |
| HK1237470B true HK1237470B (en) | 2021-03-05 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1773417B (en) | System and method for aggregating the knowledge base of antivirus software applications | |
| US10592352B1 (en) | Backup system | |
| CN106796644B (en) | Access control system and access control method | |
| US10460131B2 (en) | Preventing access of a host device to malicious data in a portable device | |
| KR102863710B1 (en) | Techniques for protecting selected disks in a computer system | |
| TWI659328B (en) | Computer system and file access control method | |
| CN107643940A (en) | Container creation method, relevant device and computer-readable storage medium | |
| KR20060051383A (en) | System and method for gathering a knowledge base of antivirus software applications | |
| CN107315973A (en) | The vague generalization proof scheme changed for security metadata | |
| CN116611058A (en) | Lexovirus detection method and related system | |
| WO2023124041A1 (en) | Ransomware detection method and related system | |
| CN104520821A (en) | Dynamic directory controls | |
| US11003786B2 (en) | System and method to manage file access rights in an information handling system | |
| CN108270735A (en) | A kind of data leakage prevention method and equipment | |
| HK1237470B (en) | Access control system and access control method | |
| JP4728871B2 (en) | Device quarantine method, quarantine device, aggregate client management device, aggregate client management program, network connection device, and user terminal | |
| CN119442282B (en) | Cluster detection method, device, equipment, medium and product | |
| HK1237470A1 (en) | Access control system and access control method | |
| JP2001350663A (en) | Information processing device | |
| JP7807103B2 (en) | Data Protection System | |
| JP7304452B2 (en) | backup system | |
| CN112580023B (en) | Shadow stack management method and device, media, and equipment | |
| KR20020060517A (en) | Method for Securing Document File Using Process Identification and Hard Disk Identification | |
| CN109800580A (en) | The authority control method and device of system process, storage medium, computer equipment | |
| CN115567315A (en) | A network protection method, device and electronic equipment |