CN103763313B - File protection method and system - Google Patents

File protection method and system Download PDF

Info

Publication number
CN103763313B
CN103763313B CN201410004266.3A CN201410004266A CN103763313B CN 103763313 B CN103763313 B CN 103763313B CN 201410004266 A CN201410004266 A CN 201410004266A CN 103763313 B CN103763313 B CN 103763313B
Authority
CN
China
Prior art keywords
document
encryption
application
client
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410004266.3A
Other languages
Chinese (zh)
Other versions
CN103763313A (en
Inventor
黄鑫
吴鲁加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN DACHENGTIANXIA INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN DACHENGTIANXIA INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN DACHENGTIANXIA INFORMATION TECHNOLOGY Co Ltd filed Critical SHENZHEN DACHENGTIANXIA INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410004266.3A priority Critical patent/CN103763313B/en
Publication of CN103763313A publication Critical patent/CN103763313A/en
Application granted granted Critical
Publication of CN103763313B publication Critical patent/CN103763313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a file protection device which is arranged on a client side. The client side is provided with an operating system. The operating system is divided into a user space layer and a kernel layer. The file protection device comprises an encryption and decryption module and a self-protection module. The encryption and decryption module runs on the user space layer and monitors operation which is conducted on files by an application on the client side. When the file content is read by the application, the encryption and decryption module obtains encrypted file content from the client side, decrypts the encrypted file content, and places the decrypted content into a temporary storage space to be read by the application. When the file content is stored in the application, the encryption and decryption module encrypts the content in the temporary storage space and stores the encrypted file. The self-protection module runs in the kernel layer and monitors the temporary storage space so that other applications except the application can be prevented from having access to the temporary storage space. The invention further discloses a file protection system with the file protection device and a corresponding file protection method.

Description

A kind of document protection method and system
Technical field
The present invention relates to computer and internet arena, more particularly to a kind of technology for preventing document from being leaked.
Background technology
With the popularization and development of computer technology and network technology, abundant network data resource is the life band of people Great convenience is carried out, while also bringing many puzzlements, for example, in enterprise, some are easily related to enterprise by employee The secret file of industry is sent to outside enterprise, so as to cause file to be divulged a secret.Accordingly, it would be desirable to one kind can protect document to prevent text The scheme of shelves content unofficial biography.
It is provided various schemes to prevent the document in computing device from getting compromised.A kind of scheme is set in calculating For upper special software is installed to block hardware interface(Such as USB interface, infrared interface)With closing procotol(FTP、HTTP Deng)To prevent to outside transmission electronic document.However, existing in this scheme outside technical deficiency.First, the program is needed Block hardware interface and close procotol, sacrifice the availability of computer.Secondly, as computer technology constantly develops, The new agreement of new technique is constantly updated, and this kind of scheme is difficult to prevent the text by new storage medium and host-host protocol in the very first time Shelves are divulged a secret problem.
Another scheme is to dispose rights management software in a network, while configuring special reader to read text Shelves, so as to prevent electronic document from getting compromised.The program can arrange the authority that user processes electronic document, and the user so having is only Possess the authority of reading, and some users possess various authorities such as reading, modification, printing.So both having reached prevents file quilt Divulge a secret, also reached Corporate Intellectual accumulation shared with file.Manager starts control and uses from user download document function The authorities such as reading, storage, duplication, the output of person so that the limited document in oneself scope of business can only be touched per user, Prevent bootlegging between user, externally copy, distribution, optical disc copy.Although this scheme will not be by storage medium and biography The impact of defeated agreement, but which need produce file after by electronic document manual switch into dedicated reader file format, Therefore it is cumbersome.In addition, this mode is due to needing user to carry out format transformation manually, therefore user master can not be prevented It is dynamic to divulge a secret.
Therefor it is required that it is a kind of can solve the above problems and for user substantially transparent document protection side Case.
The content of the invention
For this purpose, the present invention provides a kind of new scheme to try hard to solve the problems, such as or at least alleviate above.
According to an aspect of the invention, there is provided a kind of document protection equipment, is resident on the client.In the client With operating system, the operating system is divided into user's space layer and inner nuclear layer.The document protection equipment includes:Encryption and decryption mould Block, in the operation of user's space layer, monitors operation of the application on the client to document, when document content is read in application, from The document content of encryption is obtained in client and is decrypted, decryption content is placed in temporary memory space so that application is read Take;When application memory document content, the content in temporary memory space is encrypted, and stores the document of encryption;And Self-shield module, runs in inner nuclear layer, temporary memory space is monitored, to prevent the other application in addition to the application from accessing The temporary memory space.
Alternatively, in document protection equipment of the invention, self-shield module is also carried out to the encryption/decryption module Monitoring, when encryption/decryption module quits work, the self-shield module will be emptied in the decryption in the temporary memory space Hold.
Alternatively, document protection equipment of the invention also includes rule management, is couple to encryption/decryption module, the rule Then manager includes that various applications carry out the rule of various document functions;And encryption and decryption template is being monitored using to document During operation, the document function rule being associated with the application is obtained from rule management, and determine whether the application can enter Row the document is operated.
Alternatively, document protection equipment of the invention also includes Client Agent module, is suitable to be taken with document protection Business device is communicated, and is couple to encryption/decryption module, and the document function record that encryption/decryption module is monitored is sent to text Shelves protection server.Client Agent module also includes authentication part, is suitable to via the communication with document protection server To be authenticated to client, and the client terminal start-up encryption/decryption module that certification passes through only is allowed to carry out document function.
Alternatively, in document protection equipment of the invention, wherein encryption/decryption module is being carried out with self-shield module During communication, the check information of itself is added in communication data, so that self-shield module determines encryption and decryption mould according to the information The identity of block.
According to another aspect of the present invention, there is provided a kind of document protection method, it is suitable to run on the client.Client There is operating system, the operating system is divided into user's space layer and inner nuclear layer in end.The document guard method includes step: Operation of the user's space layer monitoring application on the client to document, when document content is read in application, obtains from client Take the document content of encryption and be decrypted, decryption content is placed in temporary memory space so that application is read;Work as application During store document content, the content in temporary memory space is encrypted, and stores the document of encryption;And in inner nuclear layer Monitoring temporary memory space, prevents the other application in addition to the application from accessing the temporary memory space.
Alternatively, document protection method of the invention also includes step:In inner nuclear layer monitoring user's space layer monitoring Using the step of operation to document, when the policer operation of user's space layer quits work, the interim storage will be emptied Decryption content in space.
Alternatively, in document protection method of the invention, in user's space layer monitoring application on the client To also including the step of the operation of document:When monitoring using to the operation of document, the document being associated with the application is obtained Operation ruless, and determine whether the application can carry out the document operation.
Alternatively, document protection method of the invention also includes step:Communicated with document protection server, with The document function monitored in user's space layer record is sent to into document protection server;And via taking with document protection The communication of business device only allows to be supervised in user's space layer described in the client terminal start-up that certification passes through being authenticated client Control application on the client is to the step of the operation of document.
It is of the invention to also have on one side, there is provided a kind of file protection system, including document protection server;With And one or more client, it is connected with document protection server communication, and be populated with the client according to the present invention Document protection equipment.
Document protection scheme of the invention, document is stored in the memorizer of computing device with encrypted test mode, and During using carrying out document function, just in application layer, again encryption/decryption module be decrypted into plaintext by application to operate for meeting, and work as and apply behaviour When completing, document content can just complete encryption in application layer, and be stored in computing device with encrypted test mode.Therefore, in root According to the solution of the present invention, during process of the document content in whole operation system, encryption is decrypted earliest the latest, maximum Limit shortens accessible paths of the cleartext information in memory space.Further, since encryption/decryption module utilizes application in application layer The HOOK technologies of layer are completed, and compared with HOOK is carried out in inner nuclear layer, reduce the complexity of program realization, it is to avoid driving layer text In the implementation of the transparent encryption and decryption of part, because of any treatment of details it is improper and cause the phenomenon of the frequent blue screen of system send out It is raw.
In addition, in document protection scheme of the invention, solution is stored to safeguard by the self-shield module of inner nuclear layer The temporary memory space of close rear plaintext, while the encryption/decryption module normal work of client layer is also guaranteed by self-shield module, from And can prevent the plaintext of temporary memory space from maliciously being stolen, the basic phase of encryption and decryption scheme of its safety and pure inner nuclear layer Together.
Additionally, in document protection scheme of the invention, the user of service in a computing device can be utilized The record of application operating document can be uploaded on the file protection server of present invention offer, therefore, management personnel can be on request Form is generated come the document function situation of the user of service that audits, so when document gets compromised, document can be traced back to and divulged a secret Source, has thereby further ensured that the safety of document.
Description of the drawings
In order to realize above-mentioned and related purpose, some illustrative sides are described herein in conjunction with explained below and accompanying drawing Face, these aspects indicate various modes that can be to put into practice principles disclosed herein, and all aspects and its equivalent aspect It is intended to fall under in the range of theme required for protection.By being read in conjunction with the accompanying detailed description below, the disclosure it is above-mentioned And other purposes, feature and advantage will be apparent from.Throughout the disclosure, identical reference generally refers to identical Part or element.
Fig. 1 shows the schematic diagram of file protection system according to an embodiment of the invention;
Fig. 2 shows the schematic diagram of document protection equipment according to an embodiment of the invention;And
Fig. 3 shows the schematic flow sheet of document protection method according to an embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 shows the schematic diagram of file protection system according to an embodiment of the invention 100.As shown in figure 1, document Protection system 100 includes document protection server 110 and one or more passes through network and document protection server 110 leads to Connected client 120-140 of letter.Document protection equipment 200 is populated with each client 120-140.Client 120- 140 can be any equipment that can process electronic data in this area, including but not limited to desktop computer, notebook type meter Calculation machine, personal digital assistant, intelligent mobile terminal, panel computer etc..The generally modern operation of operation in client 110 and 120 System, using operating system to manage computing device in hardware resource.In general, modern operating system can be divided into use Family space layer and inner nuclear layer.The interface of each hardware component in inner nuclear layer process and client 120-140, so as to user's space Layer provides a unified Processing Interface.In general, in inner nuclear layer, the problems such as user right can't be paid close attention to, but close How note efficiently enters line interface, such as transceiver network data etc. with various hardware.User from user's space layer to client or Person applies and provides such as function such as user management, process scheduling and memory management, so as to facilitate various application in client Run on 120-140.Document protection equipment 200 not only runs in user's space layer, and its some part is in behaviour Make to be run in the inner nuclear layer of system.
Document protection equipment 200 in document protection server 110 and each client 120-140, especially client Communicated, checked on the miscellaneous equipment that the document such that it is able to guarantee in the client can not be outside client, changed Deng.According to an embodiment, being not installed with the client of document protection equipment 200 can not open document.In addition, document protection Server 110 also includes log memory 112.In each client document protection equipment 200 monitored, each is using right The operation note of document can all be sent to document protection server 110 and store in log memory 112.So, discovery is worked as When certain document is leaked, can determine which client be likely to be according to the operation note stored in log memory 112 End there occurs leaks.Additionally can carry out statistical analysiss to determine by the operation note to storing in log memory 112 The risk that document is leaked.
Alternatively, document protection server 110 also includes authentication part 114, is suitable to the use at each client Family carries out authentication, so that it is guaranteed that the user that only certification passes through just can carry out document function using client.
In addition, document protection server 110 can also include rule memory 116, wherein store different user using Various applications carrying out the rule of document function, such as general user, it is possible to use word Words come clear Word document is look at and changed, but is unable to printed document.And for general financial staff, then can be using at Exel forms Manage software to open, browse financial documentation, but exploitation document can not be browsed.And for the Chief Financial Officer of company, for Financial documentation has whole authorities.Document protection server 110 can as needed update the rule stored in rule memory 116 Then, and corresponding client is sent to, so that document protection equipment 200 can determine the authority of document function according to the rule Deng.
Fig. 2 shows the schematic diagram of document protection equipment 200 according to an embodiment of the invention.As shown in Fig. 2 document Protection equipment 200 includes encryption/decryption module 210 and self-shield module 220.
Run in the user's space layer of operating system of the encryption/decryption module 210 in client 120-140, monitor in client Operation of the application on end to document.When application will read document content, encryption/decryption module 210 is from client, such as visitor The document content of encryption is obtained in the memorizer at family end and is decrypted, will decryption content be placed in temporary memory space for Using reading.And when store document content is wanted in application, encryption/decryption module 210 carries out the content in temporary memory space to add It is close, and the document of encryption is stored in the memorizer of client.
It is sightless, or perhaps transparent that the encryption and decryption of encryption/decryption module 210 is operated for upper layer application.When Apply open or edit specify document when, encryption/decryption module will be encrypted to unencrypted file automatically, to what is encrypted File is decrypted automatically.Document is stored on the permanent memory of client with encrypted test mode, and in application operating, is deposited temporarily With clear-text way presence in storage space.Once the document leaves the environment of file protection system, because application cannot be obtained automatically The service of decryption and these documents cannot be opened, so as to play protection document content effect.
Encryption/decryption module 210 needs and operating system is combined closely.In general, this encryption and decryption technology can be divided into kernel Level encryption and application layer encrypt two classes.Kernel level generally adopts filter Driver on FSD technology, application layer generally to adopt application layer API HOOK(It is commonly called as hook)Technology, its reason is all adapter file I/O(Read-write)Operation, by the read-write operation of supervision application, to document Dynamically encrypted and decrypted.Because these operations are all automatically performed in bottom, in addition to speed possibility is in a slight decrease, user With no difference at ordinary times in occupation mode.
One basic principle of encryption and decryption process is that encryption opportunity should be as early as possible, and decryption opportunity should be as late as possible.Only Have and just encrypted immediately when application just produces confidential data, and until application needs just to be decrypted using the eve of data It, could farthest reduce the possibility that confidential information is intercepted.Based on above-mentioned consideration, encryption/decryption module 210 with Family space layer is to run in application layer, and using application layer APIHOOK technology.When various applications are operated to document, plus Deciphering module 210 can be intercepted and captured in advance at system API of application layer using API HOOK change, clip and paste including document, screenshotss, The operation requests such as printing, the encryption and decryption such that it is able to fulfil document content ahead of schedule is processed.
According to one embodiment of present invention, encryption/decryption module 210 can using any encryption and decryption technology of this area come Document encryption and decryption operation is carried out, without deviating from protection scope of the present invention.
In addition, inside encryption/decryption module 210, encryption and decryption operation is designed to can not be split, if cryptographic operation failure Or maliciously disabled, then decryption oprerations are also failed simultaneously, and ensuring that cannot individually bypass encryption flow.Thus can ensure If encrypted document can be read, all documents for producing force encrypted;If the document for producing is not encrypted, cannot read and appoint What encrypted document.
Self-shield module 220 is run in the inner nuclear layer of operating system.Whenever encryption/decryption module 210 is monitored using to text During the operation of shelves, will be by the memory space position informing of store document content plaintext to self-shield module 220, self-shield module 220 can monitor the temporary memory space, to prevent the other application in addition to the application from accessing the temporary memory space, so as to Guarantee that the plaintext in temporary memory space will not be by unauthorized access.For example, when disabled user attempt by non-protected application come When accessing the plaintext in temporary memory space, the horse back of self-protection module 216 judges whether the application is shielded application, such as The whether shielded application of fruit just forbids the reference to access the temporary memory space.
Further, since encryption/decryption module 210 is in application layer in user's space, therefore, it is difficult to ensure itself process or Thread is not by force termination in process, it is also difficult to ensure that own module is not extractd by force or replaced by malicious user.This will cause Malicious user possibly through kernel-driven level special tool(s), the force termination module reduces the attack resistance of encrypting and deciphering system Intensity.And the guard process of inner nuclear layer is difficult to be bypassed, attack resistance intensity is far above application layer, therefore one of the invention Embodiment, can be to be monitored, when encryption/decryption module 210 is due to various by self-shield module 220 to encryption/decryption module 210 Reason, such as when being deleted by force or quit work by force termination, self-shield module 220 will immediately empty interim storage Clear content in space, so as to prevent document from leaking.
By means of which, by the self-shield module 220 in inner nuclear layer and the encryption/decryption module 210 in user's space layer it Between cooperate, both can ensure that encryption and decryption process basic principle it is achieved that while can also ensure that these modules exist Safety in operating system.
According to one embodiment of present invention, self-shield module 220 is started by encryption/decryption module 210.Encryption/decryption module 210 Can be by relevant information, such as information such as temporary memory space position is sent to self-shield module 220.In order to ensure self-shield module 220 information for receiving are that alternatively, encryption/decryption module 210 is being carried out with self-shield module 220 from encryption/decryption module 210 During communication, the check information of itself is added in communication data, so that self-shield module 220 determines encryption and decryption according to the information The identity of module 210, is controlled so as to prevent the identity of malicious user forgery encryption/decryption module to self-shield module 220.
According to one embodiment of present invention, document protection equipment 200 can also include rule management 230.Rule pipe Reason device 230 is couple to encryption/decryption module 210, and the various applications that are wherein stored with carry out the rule of document function.Such as rule Manager 230 can safeguard a protected list of application, and such encryption/decryption module 210 is being monitored using carrying out document read-write During operation, the application can be determined according to rule management 230 whether in protected list of application, and only applied When in the protected list of application, the application is just allowed to carry out document function.Each application can also be included in rule management 230 The mode of document function can be carried out, for example, some applications can only open document and can not edit.Encryption/decryption module 210 can be with Rule in rule management come control apply document function authority.
In order to be communicated with document protection server 110, alternatively, document protection equipment 200 also includes client generation Reason module 240.The proxy module 240 is couple to encryption/decryption module 210 and is communicated with document protection server 110, with Just the document function record for encryption/decryption module 210 being monitored is sent to document protection server 110, and for example storage is to daily record In memorizer 112, determining that such that it is able to subsequently be analyzed to the operation note document is divulged a secret path and may get compromised Document.
Rule management 230 can also be couple to Client Agent module 240, so as to from document protection server 110, especially It is that rule memory 116 obtains the rule of newest application operating document and the rule in rule management 230 is carried out more Newly.
Client Agent module 240 also includes authentication part 242, and it utilizes the body in document protection server 110 Part certification part 114 is interacted, and so as to be authenticated the user in client, especially client, and only allows to recognize The client terminal start-up encryption/decryption module 210 that passes through of card is carrying out document function.In addition, rule management 230 is also via client Proxy module 240 obtains the profile operation ruless being associated with the user that certification passes through from document protection server 110.This Sample, encryption/decryption module 210 can first determine the user operated in client when the document function applied is monitored, And whether authority is had determining the document operation according to rule relevant with the user in rule management 230, if do not had Authority, then refuse the operation.
Document protection equipment 220 of the invention, by the application layer deployment encryption/decryption module in operating system, and Inner nuclear layer dispose self-shield module come monitor encryption/decryption module and storage plaintext temporary memory space, such that it is able to guarantee it is bright While the shortest path that literary data are deposited in the entire system, it can also be ensured that the safety and reliability of whole document protection equipment Property.
Fig. 3 shows the schematic flow sheet of document protection method 300 according to an embodiment of the invention.Document protection side Method 300 is suitable to be performed in the client described in Fig. 1, is particularly suited for being performed in the document protection equipment 200 shown in Fig. 2, from And various documents on the client can be protected to prevent from leaking.
Document protection method 300 starts from step S310.In step S310, the use of the operating system run on the client Operation of the family space layer monitoring application on the client to document.When application will read document content, from client, example As obtained the document content of encryption in the memorizer of client and being decrypted, decryption content is placed in temporary memory space So that application is read.And when store document content is wanted in application, the content in temporary memory space is encrypted, and will encryption Document store in the memorizer of client.
It is sightless, or perhaps transparent that encryption and decryption in step S310 is operated for upper layer application.When should Used in open or edit specify document when, unencrypted file will be encrypted automatically, the file to having encrypted is decrypted automatically. Document is stored on the permanent memory of client with encrypted test mode, and in application operating, with bright in temporary memory space Literary mode is present.Once the document leaves the environment of file protection system, because application cannot obtain the service of automatic decryption These documents cannot be opened, so as to play the effect of protection document content.
Encryption and decryption operation in step S310 needs and operating system is combined closely.In general, this encryption and decryption technology Kernel level encryption can be divided into and application layer encrypts two classes.Kernel level generally adopts filter Driver on FSD technology, application layer generally to adopt With application layer API HOOK(It is commonly called as hook)Technology, its reason is all adapter file I/O(Read-write)Operation, by the reading of supervision application Write operation, is dynamically encrypted and is decrypted to document.Because these operations are all automatically performed in bottom, except speed may be slightly There is reduction outer, user is in occupation mode and at ordinary times without difference.
One basic principle of encryption and decryption process is that encryption opportunity should be as early as possible, and decryption opportunity should be as late as possible.Only Have and just encrypted immediately when application just produces confidential data, and until application needs just to be decrypted using the eve of data It, could farthest reduce the possibility that confidential information is intercepted.Based on above-mentioned consideration, step S310 is empty in user Interbed is to run in application layer, and using application layer API HOOK technologies.When various applications are operated to document, step S310 can in advance be intercepted and captured at system API of application layer using API HOOK and be changed, clips and pastes including document, screenshotss, beating The operation requests such as print, the encryption and decryption such that it is able to fulfil document content ahead of schedule is processed.
According to one embodiment of present invention, step S310 can enter style of writing using any encryption and decryption technology of this area Shelves encryption and decryption operation, without deviating from protection scope of the present invention.
In addition, in step S310, encryption and decryption operation is designed to can not be split, if cryptographic operation fails or is disliked Meaning disabling, then decryption oprerations are also failed simultaneously, and ensuring that cannot individually bypass encryption flow.If thus can ensure to read Encrypted document, the then all documents for producing force encrypted;If the document for producing is not encrypted, cannot read any encrypted Document.
Meanwhile, in step s 320, temporary memory space is monitored in inner nuclear layer, prevent other in addition to the application Using the access temporary memory space.Whenever monitoring to apply the operation to document in step S310, storage will be obtained The memory space position of document content plaintext, can monitor in step s 320 the temporary memory space, to prevent except the application Other application in addition accesses the temporary memory space, so that it is guaranteed that the plaintext in temporary memory space will not be by unauthorized access. For example, when disabled user attempt by non-protected application to access temporary memory space in plaintext when, in step s 320 Whether can at once judge whether the application is shielded application, forbid the reference to access this if shielded application if Temporary memory space.
Further, since the encryption and decryption operation in step S310 is carried out in user's space is application layer, therefore, it is difficult to ensureing Thread is not by force termination in itself process or process, it is also difficult to ensure that the operation is not extractd by force or replaced by malicious user Change.This will cause special tool(s) of the malicious user possibly through kernel-driven level, the force termination operation.And inner nuclear layer is anti- Shield program is difficult to be bypassed, and attack resistance intensity is far above application layer, therefore according to one embodiment of present invention, can also include Step 330.In step S330, step S310 is monitored in inner nuclear layer, when step S310 is due to a variety of causes, example When such as being deleted by force or quit work by force termination, the clear content in temporary memory space will be immediately emptied, from And prevent document from leaking.
By means of which, the monitoring mechanism of inner nuclear layer and the mutual association between the encryption and decryption operation of user's space layer Make, both can ensure that the basic principle of encryption and decryption process it is achieved that while these modules can also be ensured in an operating system Safety.
According to one embodiment of present invention, the policer operation of inner nuclear layer is started by step S310.In step S310, meeting Relevant information, such as information such as temporary memory space position are sent to into inner nuclear layer.In order to ensure the information that inner nuclear layer is received is From encryption and decryption operation, alternatively, in step S310 and when inner nuclear layer is communicated, the check information of itself is added to In communication data, so that inner nuclear layer determines these requests from step S310 according to the information, so as to prevent malicious user from forging The identity of encryption and decryption operation is cheating inner nuclear layer.
According to one embodiment of present invention, the application in the monitoring of user's space layer on the client in step S310 is right The step of operation of document also includes, when monitoring using operation to document, obtains the document being associated with the application and grasps Make rule, and determine whether the application can carry out the document operation.In client, especially document protection equipment(Especially The rule management 230 of Fig. 2)In the various applications that are stored with carry out the rule of document function.For example document protection equipment can be tieed up One protected list of application of shield, so monitors using when carrying out document read-write operation, it may be determined that should in step S310 Using whether in protected list of application, and only when applying in the protected list of application, the application is just allowed to enter Row document function.Can also include that each application can carry out the mode of document function in document protection equipment, for example, some applications are only Document can be opened and can not be edited.Rule that can be in rule management in step S310 is come the document that controls to apply Operating right.
In order to be communicated with document protection server 110, alternatively, document protection method 300 also includes step S340, In step S340, communicated with document protection server, by the document function monitored in user's space layer record Document protection server is sent to, such as in storing log memory 112, such that it is able to subsequently carry out to the operation note point Analyse to determine that document is divulged a secret path and the document that may get compromised.
Further, it is also possible to obtain newest application operating from document protection server 110, especially rule memory 116 The rule of document is simultaneously updated to the rule in document protection equipment.
Alternatively, document protection method 300 also includes step S350.In step S350, via with document protection service The communication of device only allows the operation in client terminal start-up step S310 that certification passes through being authenticated to client. In step S350, interact with the authentication part 114 in document protection server 110, so as to client, especially User in client is authenticated, and only allows the client that certification passes through to carry out document function.Furthermore it is also possible to from Document protection server 110 obtains the profile operation ruless being associated with the user that certification passes through.So, in step S310 In when the document function applied is monitored, can first determine the user operated in client, and according to the user Whether relevant rule has authority determining the document operation, if without authority, refusing the operation.
Document protection method 300 of the invention, by the application layer in operating system encryption and decryption operation is carried out, and Inner nuclear layer monitoring encryption and decryption operation and the temporary memory space of storage plaintext, such that it is able to guarantee clear data in whole system While the shortest path of middle storage, it can also be ensured that the security and the reliability of whole document protection equipment.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of without these details.In some instances, known method, knot is not been shown in detail Structure and technology, so as not to obscure the understanding of this description.
B10, the document protection method as described in B8 or 9, wherein described monitor on the client in user's space layer Using also including the step of operation to document:When monitoring using to the operation of document, what acquisition was associated with the application Document function rule, and determine whether the application can carry out the document operation.B11, the document as described in any one in B8-10 Guard method, also including step:Communicated with document protection server, by the document monitored in user's space layer behaviour Note down and be sent to document protection server.B12, the document protection method as described in B11, also including step:Via and document The communication of protection server is only allowed empty in user described in the client terminal start-up that certification passes through being authenticated to client Interbed monitoring application on the client is to the step of the operation of document.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The feature more features that the application claims ratio of shield is expressly recited in each claim.More precisely, as following As claims reflect, inventive aspect is all features less than single embodiment disclosed above.Therefore, abide by Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself As the separate embodiments of the present invention.
Those skilled in the art should be understood the module or unit or group of the equipment in example disclosed herein Part can be arranged in equipment as depicted in this embodiment, or alternatively can be positioned at and the equipment in the example In one or more different equipment.Module in aforementioned exemplary can be combined as a module or be segmented in addition multiple Submodule.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requires, makes a summary and accompanying drawing)Disclosed in each feature can be by providing identical, equivalent or the alternative features of similar purpose carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint One of meaning can in any combination mode using.
Additionally, some heres in the embodiment be described as can be by the processor of computer system or by performing The combination of method or method element that other devices of the function are implemented.Therefore, with for implementing methods described or method The processor of the necessary instruction of element forms the device for implementing the method or method element.Additionally, device embodiment Element described in this is the example of following device:The device is used to implement by performed by the element for the purpose for implementing the invention Function.
As used in this, unless specifically stated so, come using ordinal number " first ", " second ", " the 3rd " etc. Description plain objects are merely representative of and are related to the different instances of similar object, and are not intended to imply that the object being so described must Must have the time it is upper, spatially, sequence aspect or given order in any other manner.
Although describing the present invention according to the embodiment of limited quantity, above description, the art are benefited from It is interior it is clear for the skilled person that in the scope of the present invention for thus describing, it can be envisaged that other embodiments.Additionally, it should be noted that Language used in this specification primarily to readable and teaching purpose and select, rather than in order to explain or limit Determine subject of the present invention and select.Therefore, in the case of without departing from the scope of the appended claims and spirit, for this Many modifications and changes will be apparent from for the those of ordinary skill of technical field.For the scope of the present invention, to this The done disclosure of invention is illustrative and not restrictive, and it is intended that the scope of the present invention be defined by the claims appended hereto.

Claims (8)

1. a kind of document protection equipment, is resident on the client, has operating system in the client, and the operating system is divided into User's space layer and inner nuclear layer, the document protection equipment includes:
Encryption/decryption module, in the operation of user's space layer, monitors operation of the application on the client to document, when text is read in application During shelves content, the document content of encryption is obtained from client and is decrypted, decryption content is placed on into temporary memory space In for application read;When application memory document content, the content in temporary memory space is encrypted, and stores encryption Document;And
Self-shield module, runs in inner nuclear layer, temporary memory space is monitored, to prevent the other application in addition to the application The temporary memory space is accessed, the self-shield module is also monitored to the encryption/decryption module, when encryption/decryption module stops During work, the self-shield module will empty the decryption content in the temporary memory space.
2. document protection equipment as claimed in claim 1, also including rule management, is couple to encryption/decryption module, and including Various applications carry out the rule of various document functions;And
The encryption and decryption template is obtained when monitoring using to the operation of document, from the rule management and applies phase with this The document function rule of association, and determine whether the application can carry out the document operation.
3. document protection equipment as claimed in claim 2, also including Client Agent module, is suitable to and document protection server Communicated, and be couple to the encryption/decryption module, the document function record that the encryption/decryption module is monitored is sent To document protection server.
4. document protection equipment as claimed in claim 3, the Client Agent module also includes authentication part, is suitable to Client is authenticated via the communication with document protection server, and only allows the client terminal start-up that certification passes through to add Deciphering module carries out document function.
5. document protection equipment as claimed in claim 4, the Client Agent module is also from the document protection server The document function rule that acquisition is associated with the client, and store to the rule management.
6. document protection equipment as claimed in claim 5, wherein the encryption/decryption module is being communicated with self-shield module When, the check information of itself is added in communication data, so that self-shield module determines encryption/decryption module according to the information Identity.
7. a kind of document protection method, is suitable to run on the client, has operating system in the client, and the operating system is drawn It is divided into user's space layer and inner nuclear layer, the document guard method includes step:
In operation of the user's space layer monitoring application on the client to document, when document content is read in application, from client The document content of encryption is obtained in end and is decrypted, decryption content is placed in temporary memory space so that application is read; When application memory document content, the content in temporary memory space is encrypted, and stores the document of encryption;
Temporary memory space is monitored in inner nuclear layer, prevents the other application in addition to the application from accessing the interim storage empty Between;And
Operation of the user's space layer monitoring application to document is monitored in inner nuclear layer, when the policer operation of the user's space layer When quitting work, the decryption content in the temporary memory space will be emptied.
8. a kind of file protection system, including
Document protection server;And
One or more client, is connected with the document protection server communication, and is resident just like power in the client Profit requires in 1-6 the document protection equipment described in any one.
CN201410004266.3A 2014-01-03 2014-01-03 File protection method and system Active CN103763313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410004266.3A CN103763313B (en) 2014-01-03 2014-01-03 File protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410004266.3A CN103763313B (en) 2014-01-03 2014-01-03 File protection method and system

Publications (2)

Publication Number Publication Date
CN103763313A CN103763313A (en) 2014-04-30
CN103763313B true CN103763313B (en) 2017-05-10

Family

ID=50530473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410004266.3A Active CN103763313B (en) 2014-01-03 2014-01-03 File protection method and system

Country Status (1)

Country Link
CN (1) CN103763313B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408376A (en) * 2014-10-28 2015-03-11 深圳市大成天下信息技术有限公司 File protection method, equipment and system
CN104361294B (en) * 2014-10-28 2017-08-25 深圳市大成天下信息技术有限公司 A kind of document protection method, equipment and system
CN104361265A (en) * 2014-10-28 2015-02-18 深圳市大成天下信息技术有限公司 Document protection method, device and system
CN104318175B (en) * 2014-10-28 2018-01-05 深圳市大成天下信息技术有限公司 A kind of document protection method, equipment and system
CN105790962B (en) * 2014-12-24 2020-02-14 华为技术有限公司 Method, device and system for acquiring conference document
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
CN105893846A (en) * 2016-04-22 2016-08-24 北京金山安全软件有限公司 Method and device for protecting target application program and electronic equipment
CN106060010A (en) * 2016-05-11 2016-10-26 广东七洲科技股份有限公司 Android platform transparent encryption and decryption system
CN106250072A (en) * 2016-07-26 2016-12-21 北京明朝万达科技股份有限公司 A kind of mobile terminal safety Method of printing and system
CN106295397A (en) * 2016-07-29 2017-01-04 无锡永中军安科技有限公司 A kind of document function information tracking method
CN106973035A (en) * 2017-02-09 2017-07-21 成都九安科技有限公司 A kind of document outgoing control system
CN107423634B (en) * 2017-06-30 2018-11-09 武汉斗鱼网络科技有限公司 File decryption method, apparatus, computer readable storage medium and equipment
CN111274579B (en) * 2020-01-15 2022-07-01 湖北工程学院 Enterprise document encryption protection system based on computer
CN112784223A (en) * 2021-01-28 2021-05-11 深信服科技股份有限公司 Application program protection method, device, medium and user behavior control method
CN113609080A (en) * 2021-07-22 2021-11-05 深圳市元征未来汽车技术有限公司 File processing method and device, terminal equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1822014A (en) * 2006-03-23 2006-08-23 沈明峰 Protecting method for security files under cooperative working environment
CN1928881A (en) * 2006-09-26 2007-03-14 南京擎天科技有限公司 Computer data security protective method
CN101072102A (en) * 2007-03-23 2007-11-14 南京联创网络科技有限公司 Information leakage preventing technology based on safety desktop for network environment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007142615A2 (en) * 2005-02-18 2007-12-13 Credant Technologies, Inc. System and method for intelligence based security

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1822014A (en) * 2006-03-23 2006-08-23 沈明峰 Protecting method for security files under cooperative working environment
CN1928881A (en) * 2006-09-26 2007-03-14 南京擎天科技有限公司 Computer data security protective method
CN101072102A (en) * 2007-03-23 2007-11-14 南京联创网络科技有限公司 Information leakage preventing technology based on safety desktop for network environment

Also Published As

Publication number Publication date
CN103763313A (en) 2014-04-30

Similar Documents

Publication Publication Date Title
CN103763313B (en) File protection method and system
US11431495B2 (en) Encrypted file storage
US11347880B1 (en) Applying an authorization policy across multiple application programs with requests submitted through an HTTP-based API
US20220286448A1 (en) Access to data stored in a cloud
EP3356978B1 (en) Applying rights management policies to protected files
CN101729550A (en) Digital content safeguard system based on transparent encryption and decryption method thereof
TWI493950B (en) Conditional electric document right management system and method
CN104361291B (en) Data processing method and device
CN104077244A (en) Process isolation and encryption mechanism based security disc model and generation method thereof
US10616225B2 (en) Controlling access rights of a document using enterprise digital rights management
US20150026465A1 (en) Methods And Devices For Protecting Private Data
US10210337B2 (en) Information rights management using discrete data containerization
CN101320414A (en) Electronic document information security control system and method thereof
CN109063499A (en) A kind of electronic record area authorization method and system that flexibly can configure
CN111131216A (en) File encryption and decryption method and device
KR20130108679A (en) Data sharing system using a tablets apparatus and controlling method therefor
US10546142B2 (en) Systems and methods for zero-knowledge enterprise collaboration
CN107967430B (en) A kind of document protection method, equipment and system
CN103488755A (en) File system access method and system
TWI381285B (en) Rights management system for electronic files
CN105205403A (en) Method and system for managing and controlling file data of local area network based on file filtering
EP2790123B1 (en) Generating A Data Audit Trail For Cross Perimeter Data Transfer
JP2006178724A (en) Method for controlling access to shared file, system, server apparatus, and program
CN116686316A (en) Encrypted file control
JP2012119809A (en) Image formation device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant