Check patentability & draft patents in minutes with Patsnap Eureka AI!

Linux file protection system and method

A file system and protection system technology, applied in the direction of digital data protection, etc., can solve problems such as cannot prevent viewing

Inactive Publication Date: 2013-12-18
ZHONGKE FANGDE SOFTWARE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, none of these methods can completely prevent illegal access to the plaintext content of sensitive files in the following ways; for example, process counterfeiting can penetrate mandatory access control, and super users can easily obtain the plaintext of files in the transparently encrypted file system. Manual decryption cannot Prevent other illegal intrusion users from viewing the plaintext content after decryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linux file protection system and method
  • Linux file protection system and method
  • Linux file protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The system and method of the present invention will be further described in detail below in conjunction with the accompanying drawings and the embodiments of the present invention.

[0044] The basic idea of ​​the present invention is: the mandatory access control based on process authentication is closely combined with Linux-based unified key installation (LUKS, Linux Unify Key Setup) transparent encrypted files, and an independent Linux kernel module is fully responsible for process authentication, access Control and transparently mount and unmount encrypted file systems. This kernel module only allows specified processes to access specified resources (sensitive files), and rejects file access requests that do not comply with the above rules.

[0045]The present invention prevents sensitive data files from being illegally operated by unauthorized processes when reading, modifying and moving protected sensitive files stored in a transparent encrypted file system under a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Linux file protection system and a method. System call of Linux core file system is substituted, a HOOK function is added between a core system call interface and a file system, so as to intercept access of process to the file system, and process verification and access control are carried out; the way that access control based on process verification is combined with a transparent encryption file system is adopted, so that the protected file can be dynamically protected when system is in operation, and a file protection core module closes an encryption disk where the transparent encryption file system is located when the system is shut down, so that the protected file is statically protected in time.

Description

technical field [0001] The invention relates to information system and file safety protection technology, in particular to a Linux file protection system and method. Background technique [0002] In recent years, with the popularity of personal computers and office automation, protecting sensitive files from leakage has become a hot issue that people pay attention to. In addition to directly stealing storage information, system intruders can also steal file data through network attacks; moreover, due to the need for sharing, sensitive data will be accessed by multiple people, which also increases the possibility of data leakage. [0003] At present, file security protection can be roughly divided into three levels: (1) Identity identification: judging whether it is a permitted user, that is, verifying the user's identity based on a password; (2) Access control: autonomous access based on user and group authority allocation Control and mandatory access control based on the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
Inventor 任元王戍靖
Owner ZHONGKE FANGDE SOFTWARE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More