Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for safe operation of shell script based on sandbox technology

A safe operation and sandbox technology, applied in the field of information system security, can solve the problem that malicious scripts cannot provide security guarantees, and achieve the effect of enhancing security

Inactive Publication Date: 2011-12-21
ZHEJIANG UNIV CITY COLLEGE
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned operating system security policy based on user identity cannot provide security protection for unknown and possible malicious scripts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safe operation of shell script based on sandbox technology
  • Method and system for safe operation of shell script based on sandbox technology
  • Method and system for safe operation of shell script based on sandbox technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] figure 1 It shows the structure of the shell script safe running system based on the sandbox technology of the present invention. This computer system comprises operating system, shell script, controllable environment, security policy, security manager and accessible resource, wherein controllable environment, security policy, security manager constitute the present invention's shell script safe running system based on sandbox technology . A typical computer contains an operating system. Shell scripts can be downloaded from the network, hard disk, CD, etc. These scripts can be safe or unsafe. The scripts can run in the foreground or in the background. The source and code of the script will affect the security manager What kind of security policy to adopt.

[0025] The controllable environment refers to the shell applying the security policy of the present invention, and shell scripts can be run on the shell. The controlled environment can configure (eg load) securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sandbox technology-based safe operation method and system for shell scripts. The shell script security operating system of the sandbox technology includes a controllable environment, a security manager, security policies and resources; the controllable environment is used to identify controllable commands, uncontrollable commands or custom permissions from shell scripts; dynamically Create a sandbox and implement the security policy of the controllable command, uncontrollable command or custom permission; the security manager is used to extract the security policy of the controllable command, uncontrollable command or custom permission; the security policy is used Used to define the commands that are allowed to execute, and the resources that the commands can access. The invention runs the shell script in a controllable environment, and can effectively prevent malicious commands in the shell script from harming the system. The security manager provides a variety of security policies for the operation of shell commands, which limits the access rights of commands to resources in the sandbox and greatly enhances the security of script execution.

Description

technical field [0001] The invention relates to the field of information system security, in particular to a method and system for safely running shell scripts based on sandbox technology. Background technique [0002] Shell scripting refers to a method of executing several commands in a computer. Shell scripts can be textual or graphical. Shell tools include shell commands such as directory listing (ls), file movement (mv) and deletion (rm). A shell script is stored in a file and contains a set of shell commands. Shell commands can access important resources within your computer. At present, the security used by the shell is provided by the operating system, mainly based on user identity. For example, user A can read and write B files, but user C cannot. [0003] There are more and more programs and scripts downloaded through the Internet and other means, and there is an urgent need for a method of restricting the downloaded potentially malicious codes from accessing co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/53
Inventor 孙霖吴明晖陈天洲王云武霍梅梅彭彬
Owner ZHEJIANG UNIV CITY COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products