TWI736012B - Bitlocker disc process identification management system and method - Google Patents
Bitlocker disc process identification management system and method Download PDFInfo
- Publication number
- TWI736012B TWI736012B TW108140685A TW108140685A TWI736012B TW I736012 B TWI736012 B TW I736012B TW 108140685 A TW108140685 A TW 108140685A TW 108140685 A TW108140685 A TW 108140685A TW I736012 B TWI736012 B TW I736012B
- Authority
- TW
- Taiwan
- Prior art keywords
- bit
- module
- user
- program
- identification code
- Prior art date
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本發明提出一種磁碟處理程序管理系統與方法,更詳而言之,為一種位元鎖磁碟處理程序管理系統與方法,解決執行應用程式時,可能造成程序識別碼(PID)於作業系統下相衝突問題。 The present invention provides a disk processing program management system and method. More specifically, it is a bit-locked disk processing program management system and method, which solves the problem that the program identification code (PID) may be caused in the operating system when the application program is executed. The following conflicting issues.
隨著電腦科技的發展,現代人不管在工作、學習、科研或其他應用皆採用電腦,或各種終端機為作業工具,尤其在企業、政府單位、金融機構、軍事單位,均無時無刻在產生大量的電子檔案。然而,在資訊化時代,只要牽涉到重要的,具有無論商務、策略、軍事、智慧創作等等具重大價值的電子檔案,即存在因組織內部管理不慎而洩漏,或遭到外部攻擊的可能,例如從組織內部非法備份、破壞電子檔案,或是物理上將裝有電子檔案的儲存設備夾帶至外部,再到由外部終端機藉由網路攻擊或竊取,再再使得企業或組織承受利益上的損失。此外,由於現代電腦的作業系統多可容納多組使用者帳號,亦或網路伺服器的分享,因此在多位使用者同時共享下,就必須對各種不同機密程度的機密文件加以區分。 With the development of computer technology, modern people use computers or various terminals as operating tools in work, study, scientific research or other applications, especially in enterprises, government units, financial institutions, and military units. Electronic archives. However, in the information age, as long as it involves important electronic files with significant value regardless of business, strategy, military, intelligent creation, etc., there is a possibility of leakage due to inadvertent internal management of the organization, or the possibility of external attacks. For example, from the organization's internal illegal backup, destroying electronic files, or physically entraining storage devices containing electronic files to the outside, and then attacking or stealing from external terminals through the network, and then making the enterprise or organization bear the benefits On the loss. In addition, because the operating system of modern computers can accommodate multiple user accounts or sharing on a network server, it is necessary to distinguish between various confidential documents with different levels of confidentiality when multiple users are sharing at the same time.
對於上述文件區分的方式,現時的作法通常針對組織或企業內,每一個用戶的業務性質,規劃分出相對的存取權限,例如特定的用戶,對於特定機密文件,具有列印、預覽、讀取、拷貝、執行、編輯的存取權限,但對於較不相關的業務被賦予的存取權限較低,則僅能執行預覽和讀取,而無法拷貝、編輯,以使組織或企業內的機密文件能分開管理。因此,為達到上述目的,其中一種作法為在組織或企業的系統內引入一沙箱機制(SandBox),使能存取的機密文件、軟體,或設定均被局限在作業系統提供的資源中,而不能超過,做到多個用戶隔 離,在它們之間提供不同程度的保護,以控制病毒、惡意程式的攻擊,更重要的,能防止企業或組織機密文件由內部洩漏至外部,例如:軟體公司的離職員工將原公司開發的程式碼攜出至競爭公司,或是商務公司將具有機密性的業務文件帶出。 Regarding the above-mentioned file classification method, the current practice is usually based on the business nature of each user in the organization or enterprise, and the relative access rights are planned. For example, specific users can print, preview, and read specific confidential documents. Access rights to access, copy, execute, and edit, but the less relevant business is given lower access rights, only preview and read can be performed, not copy, edit, so that the organization or enterprise Confidential documents can be managed separately. Therefore, in order to achieve the above objectives, one of the methods is to introduce a sandbox mechanism (SandBox) in the system of the organization or enterprise. The confidential documents, software, or settings that can be accessed are limited to the resources provided by the operating system. And cannot exceed, so that multiple users are separated It provides different levels of protection between them to control virus and malicious program attacks. More importantly, it can prevent the leakage of confidential documents of the enterprise or organization from the inside to the outside. For example: Bring out the code to a competing company, or a business company to bring out confidential business documents.
傳統上,某個程序發生錯誤(Error)時,只能選擇重新啟動作業系統,而上述沙箱機制,對機密文件執行存取權限的管理來說,通常以作業系統中的程序識別碼(Process Identifier,PID),做為機密文件的存取權限管理依據。所謂的程序識別碼,是大多數類UNIX(UNIX-Like)作業系統的核心用於標識機密文件的一個數值,這一數值,可以作為許多函式呼叫的參數,以調整程序優先級、刪除(Kill)程序,或程序的存取權限控制之類的程序控制。 Traditionally, when an error occurs in a certain program, the only option to restart the operating system is to restart the operating system. The aforementioned sandbox mechanism usually uses the process identification code (Process Identifier, PID), as the basis for the management of access rights of confidential files. The so-called program identification code is a value used to identify confidential files at the core of most UNIX-like operating systems. This value can be used as a parameter of many function calls to adjust program priority and delete ( Kill) program, or program control such as program access control.
雖然程序識別碼有上述優點,然而,對於某些特定的應用程式(例如Microsoft Excel)來說,以程序識別碼做為機密文件的權限管理,可能遭遇的困難在於,當有多個機密文件在同一個特定的應用程式下執行時,作業系統會分配予該些應用程式同樣的程序識別碼,這會導致所述的沙箱機制無法區分不同的機密文件係對應至何種存取權限,從而可能引起處理程序上的錯誤。如圖1所示,其顯示了用戶(301)、應用程式(303)、程序識別碼(305)、機密文件(307),與程序介面(309)的錯誤的情形。其中,當實際用戶(301A)藉由執行應用程式(303)(例如上述的Microsoft Excel)開啟機密文件(307)中的第一文件(307A)與第二文件(307C)時,由於第一文件(307A)與第二文件(307C)均對應第一程序識別碼(305A),造成在沙箱機制(111)中,無法分辨出第一文件(307A)與第二文件(307C)對於實際用戶(301A)的存取權限究竟為何。 Although the program ID has the above advantages, for some specific applications (such as Microsoft Excel), using the program ID as the permission management of confidential documents may encounter difficulties in that when there are multiple confidential documents in When running under the same specific application, the operating system will assign the same process identification code to these applications. This will cause the sandbox mechanism to be unable to distinguish which access permissions correspond to different confidential documents. Causes an error in the processing program. As shown in Figure 1, it shows the user (301), application program (303), program identification code (305), confidential document (307), and program interface (309) errors. Among them, when the actual user (301A) opens the first document (307A) and the second document (307C) in the confidential document (307) by running the application (303) (such as the above-mentioned Microsoft Excel), because the first document (307A) and the second file (307C) both correspond to the first program identification code (305A). As a result, in the sandbox mechanism (111), it is impossible to distinguish between the first file (307A) and the second file (307C) for actual users. What is the access authority of (301A)?
因此,於現時習知技術上,上述在沙箱機制中,透過程序識別碼管理機密文件的存取權限的系統與方法,仍有進一步改進的必要,以避免沙箱機制中的存取權限,對於特定應用程式可能產生錯誤,而使用戶對於不同機密文件的存取權限無法被有效發揮,且可能影響到作業系統穩定性的缺點。 Therefore, in the current known technology, the above-mentioned system and method for managing the access rights of confidential documents through the program identification code in the sandbox mechanism still needs further improvement to avoid the access rights in the sandbox mechanism. For certain applications, errors may occur, which prevents the user's access rights to different confidential documents from being effectively used, and may affect the stability of the operating system.
有鑒於此,本發明提出了一種位元鎖磁碟處理程序管理系統,以解決透過同一個應用程式(如Microsoft Excel、Word、Power Point)開啟多個機密文件,會對應到同一個程序識別碼(Process Identifier,PID)的問題。 In view of this, the present invention proposes a bit-locked disk processing program management system to solve the problem of opening multiple confidential documents through the same application (such as Microsoft Excel, Word, and Power Point), which will correspond to the same program identification code. (Process Identifier, PID) problem.
本發明的系統透過處理模組,分配系統元件的運算資源,與處理程序的協調。本發明的系統架構包含存取權限模組,設定位元鎖磁碟的存取權限,包含寫入、讀取、預覽、拷貝、刪除,或列印等處理程序;位元鎖磁碟保護模組,耦接存取權限模組,以認證位元鎖磁碟對於用戶的存取權限,其認證的方式,可為基於位元鎖(BitLocker)的認證方式;位元鎖管理模組,管理儲存於位元鎖磁碟中的機密文件,及位元鎖磁碟的建立與數量;位元鎖磁碟驅動模組,耦接上述的位元鎖磁碟管理模組,驅動位元鎖磁碟的運作,其中,上述的位元鎖磁碟驅動模組更包含:程序識別碼單元,根據存取權限模組所設定的存取權限,給予用戶、應用程式,與機密文件特定的程序識別碼(PID);以及,攔管單元(Hook),根據程序識別碼,攔截存取權限不允許的處理程序,並將存取權限允許的處理程序連接至程序介面(Application Programming Interface,API)。 The system of the present invention allocates the computing resources of the system components through the processing module, and coordinates with the processing program. The system architecture of the present invention includes an access authority module, which sets the access authority of the bit-lock disk, including processing procedures such as writing, reading, previewing, copying, deleting, or printing; the bit-lock disk protection module Group, coupled to the access authority module, to authenticate the access authority of the bit-lock disk to the user. The authentication method can be the authentication method based on the bit lock (BitLocker); the bit lock management module manages Confidential documents stored in the bit-lock disk, and the creation and quantity of the bit-lock disk; the bit-lock disk drive module, coupled to the above-mentioned bit-lock disk management module, drives the bit-lock disk The operation of the disk, where the above-mentioned bit-lock disk drive module further includes: a program identification code unit, which gives users, applications, and confidential documents specific program identification based on the access permissions set by the access permission module Code (PID); and, the hook unit (Hook), based on the program identification code, intercepts the processing program whose access authority is not allowed, and connects the processing program whose access authority is allowed to the application programming interface (API).
根據本發明內容,相同應用程式之不同的文件,將對應不同的程序識別碼(PID),亦即,第一文件所對應的第一程序識別碼,與第二文件所對應的第二程序識別碼並不相同。 According to the content of the present invention, different files of the same application program will correspond to different program identification codes (PID), that is, the first program ID corresponding to the first file and the second program ID corresponding to the second file The codes are not the same.
根據本發明內容,存取權限模組的系統架構更包含用戶單元,以根據多個機密文件於同一個應用程式下執行的需要,創建所需數量的虛擬用戶,使不同的機密文件可以對應不同的程序識別碼,根據本發明一較佳的實施例中,上述創建虛擬用戶的方式,為透過程序介面(API)執行。 According to the content of the present invention, the system architecture of the access authority module further includes a user unit to create a required number of virtual users according to the need for multiple confidential documents to be executed under the same application, so that different confidential documents can correspond to different According to a preferred embodiment of the present invention, the above-mentioned method of creating a virtual user is executed through a program interface (API).
根據本發明內容,存取權限模組的系統架構更包含函式庫單元,記錄特定用戶、應用程式,與機密文件的程序識別碼的函式,其中,該函式庫單元中的函式格式,可為一動態連結函式庫(Dynamic-Link Library,DLL)。 According to the content of the present invention, the system architecture of the access authority module further includes a library unit, a function that records the program identification code of a specific user, application, and confidential document, wherein the function format in the library unit , Can be a dynamic-link library (Dynamic-Link Library, DLL).
本發明提出了一種位元鎖磁碟處理程序管理方法,該方法包含下 列步驟:處理模組判斷應用程式執行前是否已經啟動第一文件;若上列的判斷為否,則程序識別碼單元建立對應於第一文件的第一識別碼;若上列的判斷為真,則用戶單元根據應用的需要,在實際用戶的環境下,建立虛擬用戶;以及,在相同的應用程式的環境下,程序識別碼單元對於上述之虛擬用戶,建立對應於第二文件的第二程序識別碼,當關閉第二文件後,可選擇在一預定時間後,刪除上述之虛擬用戶,或不刪除虛擬用戶。 The present invention provides a method for managing a bit-locked disk processing program. The method includes the following List steps: the processing module determines whether the first file has been activated before the application program is executed; if the above determination is no, the program identification code unit creates a first identifier corresponding to the first file; if the above determination is true , The user unit creates a virtual user in the environment of the actual user according to the needs of the application; and, in the environment of the same application, the program identification code unit creates a second file corresponding to the second file for the virtual user mentioned above. The program identification code, when the second file is closed, you can choose to delete the aforementioned virtual user after a predetermined period of time, or not to delete the virtual user.
根據本發明內容,上述位元鎖磁碟處理程序管理方法,更包含處理模組於實際用戶的環境下,啟動應用程式;攔管單元(Hook)攔截所有的處理程序(Process)。 According to the content of the present invention, the above-mentioned bit-locked disk processing program management method further includes a processing module to activate an application program in an actual user environment; and a hook unit (Hook) intercepts all processing programs (Process).
根據本發明內容,上述位元鎖磁碟處理程序管理方法,更包含攔管單元根據存取權限,攔截第一文件中,不允許的處理程序,並將允許的處理程序,連結至程序介面。 According to the content of the present invention, the above-mentioned bit-lock disk processing program management method further includes the blocking management unit intercepting the disallowed processing program in the first file according to the access authority, and linking the permitted processing program to the program interface.
根據本發明內容,攔管單元根據存取權限,攔截第二文件中的處理程序,待建立虛擬用戶後,將允許的處理程序,連結至程序介面。 According to the content of the present invention, the blocking management unit intercepts the processing program in the second file according to the access authority, and after the virtual user is created, the permitted processing program is linked to the program interface.
根據本發明內容,上述位元鎖磁碟處理程序管理方法,更包含處理模組,在實際用戶的作業系統環境下,執行存取權限允許的第一文件。 According to the content of the present invention, the above-mentioned bit-locked disk processing program management method further includes a processing module, which executes the first file permitted by the access authority under the operating system environment of the actual user.
根據本發明內容,上述位元鎖磁碟處理程序管理方法,更包含處理模組,藉由runas程式,於虛擬用戶的環境下,由應用程式執行存取權限允許的第二文件。 According to the content of the present invention, the above-mentioned bit-locked disk processing program management method further includes a processing module, through the runas program, in a virtual user environment, the application program executes the second file permitted by the access authority.
根據本發明內容,上述位元鎖磁碟處理程序管理方法,更包含以存取權限模組設定每一個用戶的存取權限,並儲存於用戶單元。 According to the content of the present invention, the above-mentioned bit-locked disk processing program management method further includes setting the access permission of each user with an access permission module and storing it in the user unit.
以上所述係用以說明本發明之目的、技術手段以及其可達成之功效,相關領域內熟悉此技術之人可以經由以下實施例之示範與伴隨之圖式說明 及申請專利範圍更清楚明瞭本發明。 The above descriptions are used to illustrate the purpose, technical means, and achievable effects of the present invention. Those familiar with this technology in the relevant field can use the following examples of demonstrations and accompanying drawings to illustrate And the scope of patent application makes the invention clearer.
111‧‧‧沙箱機制 111‧‧‧Sandbox mechanism
200‧‧‧位元鎖磁碟處理程序管理系統 200‧‧‧Bit Lock Disk Processing Management System
201‧‧‧處理模組 201‧‧‧Processing Module
203‧‧‧位元鎖磁碟管理模組 203‧‧‧Bit Lock Disk Management Module
205‧‧‧位元鎖磁碟驅動模組 205‧‧‧Bit Lock Disk Drive Module
205A‧‧‧程序識別碼單元 205A‧‧‧Program identification code unit
205C‧‧‧攔管單元 205C‧‧‧Barrier Unit
207‧‧‧位元鎖磁碟保護模組 207‧‧‧Bit Lock Disk Protection Module
209‧‧‧存取權限模組 209‧‧‧Access Permission Module
209A‧‧‧用戶單元 209A‧‧‧User Unit
209C‧‧‧函式庫單元 209C‧‧‧Library Unit
301‧‧‧用戶 301‧‧‧User
301A‧‧‧實際用戶 301A‧‧‧Actual user
301C‧‧‧虛擬用戶 301C‧‧‧Virtual User
303‧‧‧應用程式 303‧‧‧Application
305‧‧‧程序識別碼 305‧‧‧Program ID
305A‧‧‧第一程序識別碼 305A‧‧‧First program identification code
305C‧‧‧第二程序識別碼 305C‧‧‧Second program identification code
307‧‧‧機密文件 307‧‧‧Confidential Documents
307A‧‧‧第一文件 307A‧‧‧First Document
307C‧‧‧第二文件 307C‧‧‧Second Document
309‧‧‧程序介面 309‧‧‧Program interface
400‧‧‧位元鎖磁碟處理程序管理方法 400‧‧‧Bit lock disk processing program management method
S1-S11‧‧‧方法步驟 S1-S11‧‧‧Method steps
如下所述之對本發明的詳細描述與實施例之示意圖,應使本發明更被充分地理解;然而,應可理解此僅限於作為理解本發明應用之參考,而非限制本發明於一特定實施例之中。 The detailed description of the present invention and the schematic diagrams of the embodiments described below should make the present invention more fully understood; however, it should be understood that this is only used as a reference for understanding the application of the present invention, and does not limit the present invention to a specific implementation. In the case.
圖1說明在以往的沙箱機制下,根據程序識別碼(PID)來設定一用戶對於應用程式,或機密文件的存取權限時,可能遭遇的問題。 Figure 1 illustrates the problems that may be encountered when setting a user's access authority to applications or confidential documents based on the process identification code (PID) under the conventional sandbox mechanism.
圖2說明位元鎖磁碟處理程序管理系統的系統架構。 Figure 2 illustrates the system architecture of the bit-locked disk processing program management system.
圖3顯示在本發明中,存取權限不同的數個機密文件,在實際用戶的環境下如何於處理模組中執行。 FIG. 3 shows how several confidential files with different access rights in the present invention are executed in the processing module under the environment of the actual user.
圖4顯示在位元鎖磁碟處理程序管理方法的步驟。 Fig. 4 shows the steps of the method for managing a bit-locked disk processing program.
圖5顯示在位元鎖磁碟處理程序管理方法的步驟流程。 Fig. 5 shows the step flow of the method for managing a disk-locked disk processing program in bit position.
本發明將以較佳之實施例及觀點加以詳細敘述。下列描述提供本發明特定的施行細節,俾使閱者徹底瞭解這些實施例之實行方式。然該領域之熟習技藝者須瞭解本發明亦可在不具備這些細節之條件下實行。此外,本發明亦可藉由其他具體實施例加以運用及實施,本說明書所闡述之各項細節亦可基於不同需求而應用,且在不悖離本發明之精神下進行各種不同的修飾或變更。本發明將以較佳實施例及觀點加以敘述,此類敘述係解釋本發明之結構,僅用以說明而非用以限制本發明之申請專利範圍。以下描述中使用之術語將以最廣義的合理方式解釋,即使其與本發明某特定實施例之細節描述一起使用。 The present invention will be described in detail with preferred embodiments and viewpoints. The following description provides specific implementation details of the present invention, so that the reader can thoroughly understand the implementation of these embodiments. However, those skilled in the field must understand that the present invention can also be implemented without these details. In addition, the present invention can also be applied and implemented by other specific embodiments. The details described in this specification can also be applied based on different needs, and various modifications or changes can be made without departing from the spirit of the present invention. . The present invention will be described in terms of preferred embodiments and viewpoints. Such description is to explain the structure of the present invention, and is only for illustration and not to limit the scope of patent application of the present invention. The terms used in the following description will be interpreted in the broadest reasonable manner, even if they are used in conjunction with the detailed description of a specific embodiment of the present invention.
本發明的目的,在於提出一種位元鎖磁碟處理程序管理系統與方 法,解決以往的沙箱機制中,利用程序識別碼(PID)來設定一用戶對於應用程式,或機密文件的存取權限時,某些特定的應用程式在打開不同的機密文件時,會將處理程序合併入一個相同的程序識別碼,且無法於該些特定的應用程式,加入修正的參數將程序識別碼分開。舉例來說,當在實際用戶為Lisa的環境下,若以Excel打開兩個機密文件的情況下,其程序識別碼會被合併到同一個,例如2010(號碼僅為舉例),而不會以兩個程序識別碼來代表兩個機密文件(如1020、1030),在沙箱機制中,此現象可能會影響到沙箱機制的穩定性,並對機密文件的保護產生可能漏洞的問題。本發明提供的解決策略,在於利用程序介面,根據開啟機密文件的數量,在所應用的實際用戶環境下,創建出所需數量的虛擬用戶,使上述數個機密文件,利用runas程式,使其可以分別在不同的虛擬用戶上執行,以使該些特定的應用程式,能依據用戶的不同,對上述的機密文件賦予不同的程序識別碼,從而達到使不同的機密文件,能夠對應不同存取權限,並避免程序錯誤,達到提高系統穩定性,以及操作便利性的目的。其中,本發明的沙箱機制,為位元鎖(BitLocker)。本發明具體實施的技術手段,則將詳述如後。 The purpose of the present invention is to provide a bit-locked disk processing program management system and method In the past sandbox mechanism, when a user’s access authority to an application or confidential document is set by using a program identification code (PID), when certain specific applications open different confidential documents, they will The processing procedures are merged into a same procedure identification code, and it is impossible to add modified parameters to separate the procedure identification codes for these specific applications. For example, in an environment where the actual user is Lisa, if two confidential files are opened with Excel, their program identification codes will be merged into the same one, such as 2010 (the number is only an example), instead of Two program identification codes represent two confidential files (such as 1020, 1030). In the sandbox mechanism, this phenomenon may affect the stability of the sandbox mechanism and cause possible loopholes in the protection of confidential files. The solution provided by the present invention is to use the program interface to create a required number of virtual users in the actual user environment based on the number of open confidential documents, and to use the runas program to make the above-mentioned several confidential documents It can be executed on different virtual users, so that these specific applications can assign different program identification codes to the above-mentioned confidential documents according to different users, so that different confidential documents can be accessed differently. Permissions, and avoid program errors, to achieve the purpose of improving system stability and operating convenience. Among them, the sandbox mechanism of the present invention is BitLocker. The technical means for the specific implementation of the present invention will be described in detail later.
在本發明中,所述的處理模組(201),通常包含處理晶片、記憶體、暫存記憶體、顯示裝置、網路通訊模組、作業系統及應用程式等等,以通常已知方式相互連接,執行運算、暫存、顯示及資料傳輸,與提供位元鎖磁碟處理程序管理系統(200)之運作與管理協調等功能,基於以上係屬通常已知架構,故在此不贅述。此外,在本發明中,所述的存取權限,包含寫入、讀取、預覽、拷貝、刪除,或列印等處理程序,而所述的用戶(301)、應用程式(303)、程式識別碼(305)、機密文件(307),均可依照應用的需要,創建或執行所需的數量,例如第一識別碼(305A)、第二識別碼(305C),第N識別碼,或是第一文件(307A)、第二文件(307C),第N文件等等,本領域熟知技術者於閱讀本說明書後,當可輕易得到理解,於此先行敘明。 In the present invention, the processing module (201) usually includes a processing chip, memory, temporary memory, display device, network communication module, operating system and application programs, etc., in a commonly known manner Interconnect, perform calculation, temporary storage, display and data transmission, and provide functions such as the operation and management coordination of the bit-locked disk processing program management system (200). Based on the above-mentioned system, it is a commonly known architecture, so I will not repeat it here. . In addition, in the present invention, the access authority includes processing procedures such as writing, reading, previewing, copying, deleting, or printing, and the user (301), application (303), and program The identification code (305) and confidential documents (307) can be created or executed according to the needs of the application, such as the first identification code (305A), the second identification code (305C), the Nth identification code, or It is the first file (307A), the second file (307C), the Nth file, etc. After reading this specification, those skilled in the art can easily understand them, and they are described here first.
請參閱圖2與圖3,為達本發明之目的,本發明提出了一種位元鎖磁碟處理程序管理系統(200),執行本系統需透過上述之處理模組(201)執行,處理模組(201)分配系統元件的運算資源,與處理程序的協調。 2 and 3, in order to achieve the purpose of the present invention, the present invention provides a bit-locked disk processing program management system (200), the implementation of the system needs to be executed through the above-mentioned processing module (201), the processing module The group (201) allocates computing resources of system components and coordinates with processing programs.
本發明中,位元鎖磁碟處理程序管理系統(200)架構包含:存取權限模組(209),設定位元鎖磁碟的存取權限,包含寫入、讀取、預覽、拷貝、刪除,或列印等處理程序,其中,存取權限模組(209)包含用戶單元(209A),以根據多個機密文件(307)於同一個應用程式(303)下執行的需要,利用程序介面(309),創建所需數量的虛擬用戶,使不同的機密文件(307)可以對應不同的程序識別碼(305);位元鎖磁碟保護模組(207),耦接存取權限模組(209),以認證位元鎖磁碟對於用戶(301)的存取權限,其認證的方式,可為基於位元鎖(BitLocker)的認證方式;位元鎖管理模組(203),管理儲存於位元鎖磁碟中的機密文件(307),及位元鎖磁碟的建立與數量。 In the present invention, the architecture of the bit-lock disk processing program management system (200) includes: an access authority module (209), which sets the access permissions of the bit-lock disk, including writing, reading, previewing, copying, Processing procedures such as deletion or printing, where the access authority module (209) includes a user unit (209A) to use the program according to the need for multiple confidential documents (307) to be executed under the same application (303) Interface (309), create the required number of virtual users, so that different confidential files (307) can correspond to different program identification codes (305); bit-lock disk protection module (207), coupled with access authority modules The group (209) authenticates the access authority of the bit-lock disk to the user (301), and its authentication method can be an authentication method based on the bit-lock (BitLocker); the bit-lock management module (203), Manage the confidential documents (307) stored in bit-lock disks, and the creation and quantity of bit-lock disks.
在本發明中,位元鎖磁碟處理程序管理系統(200)更包含:位元鎖磁碟驅動模組(205),耦接上述的位元鎖磁碟管理模組(203),驅動位元鎖磁碟的運作,其中,上述的位元鎖磁碟驅動模組(205)更包含:程序識別碼單元(205A),根據存取權限模組(209)所設定的存取權限,給予用戶(301)、應用程式(303),與機密文件(307)特定的程序識別碼(305);以及,攔管單元(205C),根據程序識別碼(305),攔截存取權限不允許的處理程序,並將存取權限允許的處理程序連接至程序介面(309)。 In the present invention, the bit-lock disk processing program management system (200) further includes: a bit-lock disk drive module (205), coupled to the above-mentioned bit-lock disk management module (203), and the drive bit The operation of the meta-lock disk, wherein the above-mentioned bit-lock disk drive module (205) further includes: a program identification code unit (205A), which gives User (301), application (303), and confidential document (307) specific program identification code (305); and, the blocking management unit (205C), based on the program identification code (305), intercepts the access permission does not allow The processing program is connected to the program interface (309).
應當注意者為,在本發明內容中,上述實際用戶(301A),與虛擬用戶(301C),為對應實際上同樣的用戶(301),亦即,實際用戶(301A)與虛擬用戶(301C)對於應用程式(303)而言,具有相同的存取權限,但,對於第一文件(307A)與第二文件(307C)而言,因在組織或企業內的業務性質不同,可能具有不相同的存取權限,因此,位元鎖磁碟處理程序管理系統(200)為了使第一文件(307A)與第二文件(307C)具有不同的程序識別碼(305),需要將第二文件(307C)於虛擬用戶(301C)中執行。在本發明實施例中,上述第一文件(307A)與第二文件(307C),可於處理模組(201)中的同一個,或不同一個畫面執行。 It should be noted that in the context of the present invention, the above-mentioned actual user (301A) and virtual user (301C) correspond to the same user (301), that is, the actual user (301A) and the virtual user (301C). For the application (303), they have the same access rights, but for the first file (307A) and the second file (307C), due to the different nature of the business in the organization or enterprise, they may have different Therefore, in order to make the first file (307A) and the second file (307C) have different program identification codes (305), the bit-lock disk processing program management system (200) needs to add the second file ( 307C) is executed in the virtual user (301C). In the embodiment of the present invention, the above-mentioned first file (307A) and the second file (307C) can be executed on the same or different screens in the processing module (201).
請參閱圖3,其顯示了在處理模組(201)中,位元鎖磁碟處理程序管理系統(200)的執行方式。在本發明的實施例中,當實際用戶(301A),例如Lisa,在位元鎖的執行環境下,透過應用程式(303)執行第一文件(307A)時,程序識別碼 單元(205A)對第一文件(307A)賦予第一識別碼(305A)。在一實施例下,攔管單元(205C)透過該第一程序識別碼(305A)識別實際用戶(301A)在存取權限模組(209)中所設定的允許,與不允許的存取權限。例如,包含是否能能預覽第一文件(307A)的內容,其對第一文件(307A)的內容能否寫入、拷貝、刪除,或列印等等。當確認完存取權限後,攔管單元(205C)將所允許的處理程序連接至程序介面(API)(309),並將不允許的處理程序加以攔截。 Please refer to FIG. 3, which shows the execution mode of the bit-lock disk processing program management system (200) in the processing module (201). In the embodiment of the present invention, when the actual user (301A), such as Lisa, executes the first document (307A) through the application program (303) in the execution environment of the bit lock, the program identification code The unit (205A) assigns a first identification code (305A) to the first file (307A). In one embodiment, the blocking unit (205C) uses the first program identification code (305A) to identify the permitted and disallowed access permissions set by the actual user (301A) in the access permission module (209) . For example, it includes whether the content of the first file (307A) can be previewed, and whether the content of the first file (307A) can be written, copied, deleted, or printed. After confirming the access authority, the blocking management unit (205C) connects the permitted processing program to the program interface (API) (309), and blocks the disallowed processing program.
承上述,當實際用戶(301A),例如Lisa,透過上述相同之應用程式(303)執行第二文件(307C)時,本系統則創建具有與實際用戶(301A)相同存取權限的虛擬用戶(301C),並在虛擬用戶(301C),採用亂數產生虛擬名字,例如Dean的環境下,此時程序識別碼單元(205A)則將第二文件(307C)賦予第二識別碼(305C),利於執行第二文件(307C),以達到本發明針對同一個用戶(301),相對應同一應用程式(303)產生不同的程序識別碼(305),其中之一是對虛擬用戶(301C)產生對應之程序識別碼(305)。因此,相同使用者可使用相同應用程式(303)開啟不同之機密文件(307),而此機密文件(307)之對應使用者其中之一為虛擬使用者,因此被賦予不同之程序識別碼(305),利於同一使用者開啟具有不同程序識別碼(305),而屬於相同應用程式(303)之不同文件。例如第二個Excel的機密文件(307)在虛擬用戶(301C)下執行,且程序識別碼(305)和前一個Excel的機密文件(307)不同。其中,當注意者為,上述的Excel僅為舉例,其亦可依照應用程式(303)實際的使用狀況,應用於兩個機密文件(307)會合併程序識別碼(305)的應用程式(303)上,例如Word或Power Point。 In view of the above, when an actual user (301A), such as Lisa, executes the second file (307C) through the same application (303) as described above, the system creates a virtual user (301A) with the same access rights as the actual user (301A). 301C), and in the virtual user (301C), a random number is used to generate a virtual name. For example, in the Dean environment, the program identification code unit (205A) assigns the second file (307C) to the second identification code (305C) at this time, It is beneficial to execute the second file (307C) to achieve that the present invention generates different program identification codes (305) for the same user (301) corresponding to the same application (303), one of which is to generate a virtual user (301C) The corresponding program identification code (305). Therefore, the same user can use the same application (303) to open different confidential documents (307), and one of the corresponding users of this confidential document (307) is a virtual user, so it is assigned a different process ID ( 305), it is helpful for the same user to open different documents with different process identification codes (305) and belonging to the same application (303). For example, the second Excel confidential file (307) is executed under the virtual user (301C), and the program identification code (305) is different from the previous Excel confidential file (307). Among them, it should be noted that the above-mentioned Excel is only an example. It can also be applied to the application (303) in which the two confidential documents (307) will merge the program identification code (305) according to the actual usage of the application (303). ), such as Word or Power Point.
根據本發明一實施例,存取權限模組(209)的系統架構更包含函式庫單元(209C),記錄特定用戶(301)、應用程式(303),與機密文件(307)的程序識別碼(305)的函式,其中,該函式庫單元(209C)中的函式格式,可為一動態連結函式庫(Dynamic-Link Library,DLL)。其中,根據本發明之一觀點,機密文件(307)的程序識別碼(305),可依照應用的需要,由存取權限模組(209)進行設定,亦可由程序識別碼單元(205A)所賦予,以適應不同應用程式(303)的狀況,提高位元鎖磁碟處理程序管理系統(200)的相容性。 According to an embodiment of the present invention, the system architecture of the access authority module (209) further includes a library unit (209C) that records the program identification of a specific user (301), application program (303), and confidential document (307) The function format of the code (305), wherein the function format in the library unit (209C) can be a dynamic-link library (DLL). Among them, according to one aspect of the present invention, the program identification code (305) of the confidential file (307) can be set by the access authority module (209) according to the needs of the application, or it can be set by the program identification code unit (205A). Granted to adapt to the conditions of different applications (303) and improve the compatibility of the bit-locked disk processing program management system (200).
根據本發明一實施例,位元鎖磁碟保護模組(207)內所含的保護金鑰,可為對應存取權限模組(209)中,不同存取權限的設定,其保護金鑰的形式,可為但不限於可信賴平台模組(Trusted Platform Module,TPM)、用戶端識別碼(PIN Code)、移動裝置密鑰,或以上之組合。在本發明一觀點中,移動裝置金鑰可為一儲存於USB隨身碟中之密鑰,使存取權限得依用戶(301)所對應的使用者的業務性質,對應不同的金鑰保護形式。 According to an embodiment of the present invention, the protection key contained in the bit-lock disk protection module (207) can be set for different access permissions in the corresponding access permission module (209), and the protection key The form can be, but is not limited to, a trusted platform module (Trusted Platform Module, TPM), a client identification code (PIN Code), a mobile device key, or a combination of the above. In one aspect of the present invention, the mobile device key can be a key stored in a USB flash drive, so that the access rights are based on the nature of the user's business corresponding to the user (301), corresponding to different key protection forms .
請參閱圖4與圖5,本發明提出了一種位元鎖磁碟處理程序管理方法(400):該方法包含下列步驟:在步驟(S2)中,處理模組(201)於一用戶(301)的環境下,啟動應用程式(303);執行步驟(S4)時,處理模組(201)判斷一應用程式(303)事前是否已經啟動第一文件(307A);接著在步驟(S5)中,若步驟(S4)的判斷為否,則程序識別碼單元(205A)建立對應於第一文件(307A)的第一程序識別碼(305A);執行步驟(S8)時,若步驟(S4)的判斷為是,則本系統根據應用的需要,在用戶(301)的環境下,建立虛擬用戶(301C),此採用亂數產生;在步驟(S10)中,程序識別碼單元(205A)建立對應於應用程式(303)第二文件(307C)的第二程序識別碼(305C);其中,第一識別碼(305A),不同於第二識別碼(305C)。 4 and 5, the present invention proposes a bit-lock disk processing program management method (400): the method includes the following steps: in step (S2), the processing module (201) in a user (301) ), start the application (303); when step (S4) is executed, the processing module (201) judges whether an application (303) has activated the first file (307A) beforehand; then in step (S5) If the judgment of step (S4) is no, the program identification code unit (205A) establishes the first program identification code (305A) corresponding to the first file (307A); when step (S8) is executed, if step (S4) If the judgment is yes, the system creates a virtual user (301C) in the environment of the user (301) according to the needs of the application, which is generated by random numbers; in step (S10), the program identification code unit (205A) is established The second program identification code (305C) corresponding to the second file (307C) of the application program (303); wherein, the first identification code (305A) is different from the second identification code (305C).
根據本發明內容,上述位元鎖磁碟處理程序管理方法(400),更包含步驟(S2),處理模組(201)於實際用戶(301A)的環境下,啟動應用程式(303);步驟(S3),攔管單元(205C)攔截所有的處理程序(Process)。 According to the content of the present invention, the above-mentioned bit-lock disk processing program management method (400) further includes the step (S2). The processing module (201) starts the application program (303) in the environment of the actual user (301A); step (S3), the interception unit (205C) intercepts all processing programs (Process).
根據本發明內容,上述位元鎖磁碟處理程序管理方法(400),更包含步驟(S6)中,攔管單元(205C)根據存取權限,攔截第一文件(307A)中,不允許的處理程序,並將允許的處理程序,連結至程序介面(309)。 According to the content of the present invention, the above-mentioned bit-lock disk processing program management method (400) further includes step (S6), in which the blocking management unit (205C) intercepts the first file (307A) according to the access authority, which is not allowed Processing procedures and linking permitted processing procedures to the program interface (309).
根據本發明一實施例,上述的方法步驟更包含步驟(S7),處理模組(201),在實際用戶(301A)的環境下,執行存取權限允許的第一文件(307A),其中,攔管單元(205C)根據存取權限,將允許的處理程序,連結至程序介面(309)。 According to an embodiment of the present invention, the above method steps further include step (S7). The processing module (201) executes the first file (307A) allowed by the access authority under the environment of the actual user (301A), wherein, The control unit (205C) links the permitted processing program to the program interface (309) according to the access authority.
根據本發明內容,更包含步驟(S9),攔管單元(205C)攔截第二文 件(307C)中的處理程序。 According to the content of the present invention, it further includes the step (S9), the interception unit (205C) intercepts the second document The processing procedure in the file (307C).
根據本發明一實施例,上述的方法步驟更包含步驟(S11),攔管單元(205C)將根據存取權限,將允許的處理程序連結至程序介面(309),處理模組(201)於虛擬用戶(301C)的環境下執行應用程式(303)的第二文件(307C)。其中,在本發明的一實施例,當第二文件(307C)被實際用戶(301A)關閉之後,用戶單元(209A)可在一預定的時間後,選擇刪除,或不刪除虛擬用戶(301C)。在本發明之一觀點中,考量到虛擬用戶(301C)的建立需要的執行時間,因此當第二文件(307C)被關閉後,可選擇保留虛擬用戶(301C),使之後的第二文件(307C),或其它對應於應用程式(303)的機密文件(307)在啟動時能以較快的速度執行。 According to an embodiment of the present invention, the above method steps further include step (S11). The blocking unit (205C) will link the permitted processing program to the program interface (309) according to the access authority, and the processing module (201) will be connected to the program interface (309). The second file (307C) of the application (303) is executed under the environment of the virtual user (301C). Wherein, in an embodiment of the present invention, after the second file (307C) is closed by the actual user (301A), the user unit (209A) can choose to delete or not delete the virtual user (301C) after a predetermined time. . In one aspect of the present invention, considering the execution time required for the establishment of the virtual user (301C), when the second file (307C) is closed, the virtual user (301C) can be selected to be retained, so that the subsequent second file ( 307C), or other confidential documents (307) corresponding to the application (303) can be executed at a faster speed when activated.
根據本發明一實施例,上述的方法步驟,更包含步驟(S1),由存取權限模組(209)設定每一個用戶(301)的存取權限,並將存取權限的內容,儲存於用戶單元(209A)中,其中,該存取權限的檔案格式,可為一存取權限矩陣(Access Control Matrix)。 According to an embodiment of the present invention, the above method steps further include the step (S1). The access authority module (209) sets the access authority of each user (301), and stores the content of the access authority in In the user unit (209A), the file format of the access authority may be an access authority matrix (Access Control Matrix).
以上敘述係為本發明之較佳實施例。此領域之技藝者應得以領會其係用以說明本發明而非用以限定本發明所主張之專利權利範圍。其專利保護範圍當視後附之申請專利範圍及其等同領域而定。凡熟悉此領域之技藝者,在不脫離本專利精神或範圍內,所作之更動或潤飾,均屬於本發明所揭示精神下所完成之等效改變或設計,且應包含在下述之申請專利範圍內。 The above description is the preferred embodiment of the present invention. Those skilled in this field should understand that it is used to explain the present invention rather than to limit the scope of the patent rights claimed by the present invention. The scope of its patent protection shall be determined by the attached scope of patent application and its equivalent fields. Anyone who is familiar with the art in this field, without departing from the spirit or scope of this patent, makes changes or modifications that are equivalent changes or designs completed under the spirit of the present invention, and should be included in the scope of the following patent applications Inside.
200‧‧‧位元鎖磁碟處理程序管理系統 200‧‧‧Bit Lock Disk Processing Management System
201‧‧‧處理模組 201‧‧‧Processing Module
203‧‧‧位元鎖磁碟管理模組 203‧‧‧Bit Lock Disk Management Module
205‧‧‧位元鎖磁碟驅動模組 205‧‧‧Bit Lock Disk Drive Module
205A‧‧‧程序識別碼單元 205A‧‧‧Program identification code unit
205C‧‧‧攔管單元 205C‧‧‧Barrier Unit
207‧‧‧位元鎖磁碟保護模組 207‧‧‧Bit Lock Disk Protection Module
209‧‧‧存取權限模組 209‧‧‧Access Permission Module
209A‧‧‧用戶單元 209A‧‧‧User Unit
209C‧‧‧函式庫單元 209C‧‧‧Library Unit
Claims (11)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW108140685A TWI736012B (en) | 2019-11-08 | 2019-11-08 | Bitlocker disc process identification management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW108140685A TWI736012B (en) | 2019-11-08 | 2019-11-08 | Bitlocker disc process identification management system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
TW202119248A TW202119248A (en) | 2021-05-16 |
TWI736012B true TWI736012B (en) | 2021-08-11 |
Family
ID=77020763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW108140685A TWI736012B (en) | 2019-11-08 | 2019-11-08 | Bitlocker disc process identification management system and method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI736012B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200846928A (en) * | 2007-03-08 | 2008-12-01 | Sandisk Il Ltd | File system and methods for managing files according to application |
CN103563278A (en) * | 2011-05-20 | 2014-02-05 | 西里克斯系统公司 | Securing encrypted virtual hard disks |
CN104199734A (en) * | 2014-09-12 | 2014-12-10 | 上海斐讯数据通信技术有限公司 | Android smart terminal based application multi-run management method and system |
US20160125839A1 (en) * | 2014-03-10 | 2016-05-05 | Gazoo, Inc. | Multi-user display system and method |
-
2019
- 2019-11-08 TW TW108140685A patent/TWI736012B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200846928A (en) * | 2007-03-08 | 2008-12-01 | Sandisk Il Ltd | File system and methods for managing files according to application |
CN103563278A (en) * | 2011-05-20 | 2014-02-05 | 西里克斯系统公司 | Securing encrypted virtual hard disks |
US20160125839A1 (en) * | 2014-03-10 | 2016-05-05 | Gazoo, Inc. | Multi-user display system and method |
CN104199734A (en) * | 2014-09-12 | 2014-12-10 | 上海斐讯数据通信技术有限公司 | Android smart terminal based application multi-run management method and system |
Also Published As
Publication number | Publication date |
---|---|
TW202119248A (en) | 2021-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9881013B2 (en) | Method and system for providing restricted access to a storage medium | |
US8402269B2 (en) | System and method for controlling exit of saved data from security zone | |
KR100596135B1 (en) | Control system for access classified by application in virtual disk and Controling method thereof | |
EP1946238B1 (en) | Operating system independent data management | |
US8234477B2 (en) | Method and system for providing restricted access to a storage medium | |
JP4089171B2 (en) | Computer system | |
US8321667B2 (en) | Security model for common multiplexed transactional logs | |
US20050114672A1 (en) | Data rights management of digital information in a portable software permission wrapper | |
US10289860B2 (en) | Method and apparatus for access control of application program for secure storage area | |
EP1365306A2 (en) | Data protection system | |
KR20060045000A (en) | File locker and mechanisms for providing and using same | |
EP2583410A2 (en) | Single-use authentication methods for accessing encrypted data | |
GB2398134A (en) | Applying a data handing policy to predetermined system calls | |
CN107077565A (en) | The collocation method and equipment of a kind of safe configured information | |
CN115329351A (en) | File protection system and method for Windows system | |
CN109214204A (en) | Data processing method and storage equipment | |
KR101227187B1 (en) | Output control system and method for the data in the secure zone | |
TWI736012B (en) | Bitlocker disc process identification management system and method | |
CN112559982A (en) | Copyright protection method for application program | |
KR101299051B1 (en) | Environment setting device and method according to the user account | |
KR101056423B1 (en) | Program Execution Management Method and Record Media Using Logged-In Account Control | |
KR102338774B1 (en) | Data protection method to prevent data leakage and corruption by preventing file contents from being read and written at the kernel level of the storage operating system | |
CN112784263B (en) | Bit-locked disk handler management system and method | |
EP2431906B1 (en) | Method for inspecting actions with data | |
TWI783189B (en) | Bitlocker disc administration system |