[go: up one dir, main page]

TW201830282A - Computer system and file access control method capable of reducing danger that an unauthorized file, such as a malware, is accessed or executed - Google Patents

Computer system and file access control method capable of reducing danger that an unauthorized file, such as a malware, is accessed or executed Download PDF

Info

Publication number
TW201830282A
TW201830282A TW106141283A TW106141283A TW201830282A TW 201830282 A TW201830282 A TW 201830282A TW 106141283 A TW106141283 A TW 106141283A TW 106141283 A TW106141283 A TW 106141283A TW 201830282 A TW201830282 A TW 201830282A
Authority
TW
Taiwan
Prior art keywords
access
file
environment
dangerous
secure
Prior art date
Application number
TW106141283A
Other languages
Chinese (zh)
Other versions
TWI659328B (en
Inventor
川野克
井上浩二
斉藤眞一
Original Assignee
日商日立解決方案股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日商日立解決方案股份有限公司 filed Critical 日商日立解決方案股份有限公司
Publication of TW201830282A publication Critical patent/TW201830282A/en
Application granted granted Critical
Publication of TWI659328B publication Critical patent/TWI659328B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The object of the present invention is to reduce dangers of an unauthorized file, such as a malware, from being accessed (executed). The solution of the present invention is to provide a computer system which has a safe environment that is connected to a safe network and is not connected to a dangerous network, and a dangerous environment that is connected to the dangerous network and is not connected to the safe network. The computer system accepts file access from one of the environments, and determines whether the issuing source of the file is the safe environment or the dangerous environment. If the issuing source comes from the safe environment, the computer system adds the access path and the access type of the file access which originates from the safe environment into a white list which is a list of file information associated with an access permit.

Description

計算機系統及檔案存取控制方法Computer system and file access control method

[0001] 本發明,主要係有關於檔案存取之控制。[0001] The present invention mainly relates to control of file access.

[0002] 伴隨著網際網路的普及,在企業內而建構與網際網路作了連接之企業內網路的情形亦係變多。但是,在能夠從網際網路而獲取的各種資訊中,係會有包含惡意程式(典型而言,存在有惡意目的的程式)的情形。此些之程式,係會有進行將獲取了該程式的資訊處理裝置之軟體破壞或者是盜取資訊等的對於獲取者而言為有害的行為的情況,對於企業而言,要如何在享受網際網路之便利性的同時亦盡可能地將此些之存在有惡意目的的程式之威脅排除一事,係成為重大的課題。關連於程式之實行的限制,所謂的白名單型之控制方式係為周知(例如,專利文獻1)。   [先行技術文獻]   [專利文獻]   [0003] [專利文獻1] 日本特開2014-96142號公報[0002] With the spread of the Internet, there are also many cases in which an intranet connected to the Internet is constructed within an enterprise. However, in the various kinds of information that can be obtained from the Internet, there are cases where malicious programs (typically, programs with malicious purposes) are included. In the case of such a program, there is a case where the software of the information processing device that has acquired the program is destroyed or the information is stolen, which is harmful to the acquirer, and how the company enjoys the Internet. The convenience of the Internet and the exclusion of the threat of malicious programs as much as possible are a major issue. The so-called whitelist type control method is known as the limitation of the execution of the program (for example, Patent Document 1). [Prior Art Document] [Patent Document] [0003] [Patent Document 1] Japanese Patent Laid-Open Publication No. 2014-96142

[發明所欲解決之課題]   [0004] 若是藉由在專利文獻1中所揭示的對應法,則藉由將滿足特定之基準的程式登錄在白名單中,係能夠期待有對於存在有惡意之程式的實行之抑止力。   [0005] 但是,在專利文獻1所揭示的對應法中,當基準並非為適當的情況時,係會有將像是存在有惡意的程式一般之惡意程式登錄在白名單中並實行的危險性。   [0006] 本發明之目的,係在於將像是惡意程式一般的不正當檔案之被存取(實行)的危險性減輕。   [用以解決課題之手段]   [0007] 計算機系統,係具備有身為被與安全的網路作連接而並未被與危險的網路作連接的環境之安全的環境,並且亦具備有被與危險的網路作連接而並未被與安全的網路作連接的環境之危險的環境。計算機系統,係從其中一者之環境而受理檔案存取,並判斷該檔案存取之發行源頭係身為安全的環境和危險的環境之何者。當發行源頭係為安全的環境的情況時,計算機系統,係將基於從安全的環境而來之檔案存取所致的存取路徑以及存取種類,追加至身為關連於存取許可對象之檔案的資訊之清單之白名單中。   [0008] 在本發明中,「檔案」,係亦可包含被收容有程式之檔案。又,在本發明中,「存取」,係除了參照以及更新以外,亦可包含有檔案內之程式的實行。   [發明之效果]   [0009] 若依據本發明,則係能夠將像是惡意程式一般的不正當檔案之被登錄在白名單中的危險性減輕。[Problems to be Solved by the Invention] [0004] According to the correspondence method disclosed in Patent Document 1, by registering a program that satisfies a specific criterion in a white list, it is expected that there is a malicious presence. The suppression of the implementation of the program. [0005] However, in the correspondence method disclosed in Patent Document 1, when the reference is not appropriate, there is a risk that a malicious program such as a malicious program is registered in the white list and is implemented. . [0006] The object of the present invention is to reduce the risk of accessing (implementing) an unauthorized file, such as a malicious program. [Means for Solving the Problem] [0007] A computer system has a safe environment in which it is connected to a secure network and is not connected to a dangerous network. A dangerous environment in an environment that is connected to a dangerous network and is not connected to a secure network. The computer system accepts file access from one of the environments and determines which source of the file access is a safe environment and a dangerous environment. When the distribution source is in a secure environment, the computer system adds the access path and the access type based on the file access from the secure environment to the object that is related to the access permission. A white list of the list of information for the file. [0008] In the present invention, a "file" may also include a file in which a program is stored. Further, in the present invention, "access" may include the execution of a program in the file in addition to the reference and update. [Effect of the Invention] According to the present invention, it is possible to reduce the risk that a fraudulent file such as a malicious program is registered in a white list.

[0011] 又,在以下之說明中,「介面部」,係包含1以上之介面。1以上之介面,係可為1以上之相同種類的介面裝置(例如1以上之NIC(Network Interface Card)),亦可為2以上之不同種類之介面裝置(例如NIC和HBA(Host Bus Adapter))。   [0012] 又,在以下之說明中,「記憶部」,係包含1以上之記憶體。至少1個的記憶體,係可為揮發性記憶體,亦可為非揮發性記憶體。記憶部,主要係在由處理器部所致之處理時會被使用。   [0013] 又,在以下之說明中,「處理器部」,係包含1以上之處理器。至少1個的處理器,典型而言,係為如同CPU(Central Processing Unit)一般之微處理器。1以上之處理器的各個,係可為單核,亦可為多核。處理器,係亦可包含有進行處理之一部分或者是全部的硬體電路。   [0014] 又,在以下之說明中,雖係有藉由「kkk部」之表現來對於處理部(功能)作說明的情形,但是,處理部,係可藉由以處理器部來實行1以上之電腦程式一事而實現之,亦可藉由以1以上之硬體電路(例如FPGA(Field-Programmable Gate Array)或者是ASIC(Application Specific Integrated Circuit))來實現之。在將程式藉由處理器部來實現處理部的情況時,所被制定之處理,由於係適宜一面使用記憶部及/或介面部(例如通訊埠)等一面進行,因此,處理部係亦可被設為處理器部之至少一部分。以處理部作為主詞來說明的處理,係亦可設為處理器部或者是具備有該處理器部之裝置所進行的處理。又,處理器部,係亦可包含有進行處理之一部分或者是全部的硬體電路。程式,係亦可從程式來源而被安裝至處理器中。程式來源,例如,係亦可為程式發佈計算機、或者是計算機可讀取之記錄媒體(例如非暫時性之記錄媒體)。各處理部之說明,係僅為其中一例,亦可將複數之處理部統整為1個的處理部,亦可將1個的處理部分割成複數之處理部。   [0015] 又,在以下之說明中,「計算機系統」,係包含1以上之物理性的計算機。至少1個的物理性之計算機,係亦可為實行假想性之計算機(例如VM(Virtual Machine)),亦可為實行SDx(Software-Defined anything)。作為SDx,例如,係可採用SDS(Software Defined Storage)(假想性之儲存裝置的其中一例)或者是SDDC(Software-defined Datacenter)。   [0016] 以下,針對本發明之其中一個實施形態作說明。   [0017] 圖1,係為本發明之其中一個實施形態的資訊處理裝置之構成圖。   [0018] 資訊處理裝置101,係為計算機系統之其中一例。資訊處理裝置101,係具備有I/F(介面)161、和記憶裝置105(例如,HDD(Hard Disk Drive)或者是SSD(Solid State Drive)一般之輔助記憶裝置)、和記憶體106、以及被與該些作了連接的處理器100。I/F161,係為介面部之其中一例。記憶裝置105以及記憶體106,係為記憶部之其中一例。處理器100,係為處理器部之其中一例。I/F161,係被與企業內網路151以及網際網路152作連接。企業內網路151,係為相對性而言信賴性為高的網路之其中一例,網際網路152,係為相對性而言信賴性為低的網路之其中一例。   [0019] 資訊處理裝置內101之環境,係被假想性地分割成複數之環境。複數之環境,在本實施形態中,係為白名單作成環境204和業務環境205。白名單作成環境,係為安全的環境之其中一例。業務環境,係為危險的環境之其中一例。白名單作成環境204和業務環境205,係存在於相同的OS(作業系統)104上,並構成為能夠將記憶裝置105和記憶體106在環境102以及103之間而作共有。例如,在Windows OS(Windows係為註冊商標)中,係可將以使用者A來進行登入並僅能夠對於安全的企業內網路151進行存取的環境,設為白名單作成環境204,並將以使用者B來進行登入並僅能夠對於危險的網際網路152進行存取的環境,作為業務環境205,來構成之。   [0020] 在本實施形態中,係於白名單作成環境204中,作成對於檔案存取作限制的規則(白名單檔案215和黑名單檔案216),並藉由根據該規則來對於在業務環境205中所被實行的處理程序作控制,而能夠就算是在業務環境205中亦實現與白名單作成環境204同等安全的檔案存取。   [0021] 以下,對本實施形態作詳細說明。   [0022] 圖2,係為對於資訊處理裝置101所具備之環境與功能作展示之構成圖。   [0023] 在圖2中,資訊處理裝置101,係能夠將OS104假想性地分離而使用。資訊處理裝置101,係具備有身為安全的環境之其中一例之白名單作成環境204、和身為危險的環境之其中一例之業務環境205。   [0024] 又,OS104,係被安裝有檔案系統驅動程式203,並具備有藉由OS104來用以對於從處理程序206與處理程序207所產生的檔案I/O要求封包209進行過濾之過濾管理器210。   [0025] 又,在OS104內,係存在有通過過濾管理器210來受理檔案I/O要求封包209之I/O檢測功能211。I/O檢測功能211,係為藉由使處理器100實行電腦程式所發揮的功能,該程式,例如係可為被內掛(add in)至過濾管理器210中之程式。I/O檢測功能211,係具備有根據所受理了的檔案I/O要求封包209來對於實行了送訊源頭的程式之環境作確認之處理程序探索功能212、和當能夠藉由處理程序探索功能112而確認了處理程序係為在業務環境205中而作了實行者的情況時,依據白名單檔案215以及黑名單檔案216來進行存取控制之存取控制功能213、和當能夠藉由處理程序探索功能212而確認了處理程序係為在白名單作成環境204中而作了實行者的情況時,將資訊記錄在白名單檔案215中之白名單設定功能214。又,係設置有用以將在業務環境205中而對於實行、參照以及更新作了禁止的檔案在黑名單檔案216中進行記錄、編輯或刪除的設定工具217。設定工具217,例如,係被安裝至OS104中,並在白名單作成環境204中被實行,而在業務環境205中並不被實行。   [0026] 係存在有像是Excel(註冊商標)或Internet Explorer(註冊商標)等之處理程序(例如應用程式)。在圖2中,對於在白名單作成環境204中所被啟動的處理程序,係附加有元件符號206,對於在業務環境205中所被啟動的處理程序,係附加有元件符號207。亦即是,處理程序206,當將該處理程序之存取規則記錄在白名單檔案215中的情況時,例如係為藉由使用者而從白名單作成環境204所啟動了的處理程序。另一方面,處理程序207,當針對該處理程序而進行由白名單檔案215與黑名單檔案216所致之檢查的情況時,例如係為藉由使用者而從業務環境205所啟動了的處理程序。當處理程序206以及處理程序207之其中一者進行對於檔案之I/O的情況時,亦同樣的,OS104,係產生包含有I/O之內容與I/O源頭之處理程序的資訊之檔案I/O要求封包209,並通過過濾管理器210來遞交至檔案系統驅動器203處。   [0027] 在實行處理程序之前,在過濾管理器210處,係被登錄有I/O檢測功能211。藉由此,OS104,在檔案I/O要求封包209到達了過濾管理器210處時,係能夠將檔案I/O要求封包209遞交至I/O檢測功能211處。   [0028] 透過被登錄在過濾管理器210中之I/O檢測功能211,而進行有處理程序探索功能212之呼叫。處理程序探索功能212,係根據在檔案I/O要求封包209中所包含之資訊(I/O源頭之處理程序資訊),來判斷處理程序之實行源頭是身為白名單作成環境204還是業務環境205。處理程序探索功能212,當特定出I/O發行源頭之處理程序係身為從白名單作成環境204所實行了的處理程序206的情況時,係呼叫白名單設定功能214。另一方面,處理程序探索功能212,當特定出I/O發行源頭之處理程序係身為從業務環境205所實行了的處理程序207的情況時,係呼叫存取控制功能213。   [0029] 當白名單設定功能214被呼叫的情況時,白名單設定功能214,係在白名單檔案215中,記錄藉由處理程序206而被作存取的檔案之檔案名稱。藉由此,白名單設定功能214,係能夠將藉由在白名單作成環境204中所啟動了的處理程序206而被作存取之檔案,全部記錄在白名單檔案215中。   [0030] 當存取控制功能213被呼叫的情況時,存取控制功能213,係依據白名單檔案215與黑名單檔案216,而進行對於檔案I/O要求封包209而作許可或者是拒絕之存取控制。藉由此,存取控制功能213,係能夠對於藉由從業務環境205所啟動了的處理程序207而被作存取之檔案,來適用由白名單檔案215與黑名單檔案216所致之存取控制。又,存取控制功能213,由於雖然係對於白名單檔案215與黑名單檔案216作參照但是係並不會對於該些之檔案215以及216作更新,因此,從業務環境205所啟動了的處理程序107,係並無法對於白名單檔案215以及黑名單檔案216之任一者進行更新。藉由此控制,從業務環境205所實行的處理程序207,係能夠進行依循於在白名單作成環境204(亦即是安全的環境)下所作成的白名單檔案215以及黑名單檔案216,來進行安全的檔案存取。   [0031] 圖3,係為白名單檔案215之構成圖。   [0032] 白名單檔案215,係為具備有白名單之檔案。白名單檔案215,例如係為表,並針對存取許可對象之各檔案的每一者而具備有表目(entry)。各表目,係保持有像是成為管理上的編號之規則編號302和代表存取目標之檔案的存取路徑303以及代表被許可的存取種類之存取許可定義304之類的資訊。   [0033] 存取路徑303,係為包含有檔案名稱之檔案路徑(文字列)。存取路徑303,係以檔案單位而被作指定,但是,係亦可為目錄(directory)。作為存取許可定義304而被作登錄之值,例如,係存在有「實行」(許可實行)、「參照」(不許可進行更新但是許可作參照)、以及「參照、更新」(許可參照以及更新之雙方)。另外,所謂「實行」,係指被收容有程式的檔案之實行(亦即是程式之實行)。   [0034] 圖4,係為黑名單檔案216之構成圖。   [0035] 黑名單檔案216,係為具備有黑名單之檔案。黑名單檔案216,例如係為表,並針對存取禁止對象之各檔案的每一者而具備有表目。各表目,係保持有像是成為管理上的編號之規則編號402和代表存取目標之檔案或者是目錄的存取路徑403以及代表被禁止的存取種類之存取禁止定義404之類的資訊。   [0036] 存取路徑403,係為包含有檔案名稱之檔案路徑或者是包含有目錄名稱之目錄路徑(文字列)。作為存取禁止定義404而被作登錄之值,例如,係存在有「實行」(禁止實行)、「參照、更新」(禁止參照以及更新之雙方)、以及「更新」(並不禁止參照但是禁止更新)。   [0037] 以下,針對藉由本實施形態所進行的數個處理作說明。   [0038] 圖5,係為檔案I/O要求封包209之受訊處理的流程圖。   [0039] 過濾管理器210,係受訊檔案I/O要求封包209(檔案存取)(步驟501),並將該檔案I/O要求封包209送至I/O檢測功能211處(步驟502)。   [0040] 圖6,係為處理程序探索處理之流程圖。   [0041] 處理程序探索功能212,係藉由受理了檔案I/O要求封包209之I/O檢測功能211而被呼叫,並從該檔案I/O要求封包209來得到發行源頭處理程序(I/O發行源頭之處理程序)之處理程序資訊(步驟602)。   [0042] 接著,處理程序探索功能212,係根據在步驟602處所得到的處理程序資訊,來判斷發行源頭處理程序是身為處理程序206(在白名單作成環境204中所啟動了的處理程序)還是處理程序207(在業務環境205中所啟動了的處理程序)(步驟603)。   [0043] 當步驟603之判斷的結果,發行源頭處理程序係身為處理程序206的情況時,處理程序探索功能212,係呼叫白名單設定功能214(步驟606)。   [0044] 另一方面,當步驟603之判斷的結果,發行源頭處理程序係身為處理程序207的情況時,係呼叫存取控制功能213(步驟607)。   [0045] 圖7,係為白名單設定處理之流程圖。   [0046] 被呼叫了的白名單設定功能214,係從I/O檢測功能211所受理了的檔案I/O要求封包209來得到存取要求(步驟702)。   [0047] 接著,白名單設定功能214,係判斷藉由步驟702所得到了的存取要求是否身為實行要求(步驟703)。   [0048] 當步驟703之判斷的結果,存取要求係身為實行要求的情況時,白名單設定功能214,係將作為存取許可定義304之值乃身為「實行」與「參照」一事,記錄在記憶體106中(步驟706)。   [0049] 當步驟703之判斷的結果,存取要求係並非身為實行要求的情況時,白名單設定功能214,係判斷存取要求是否身為更新要求(步驟705)。   [0050] 當步驟705之判斷的結果,存取要求係身為更新要求的情況時,白名單設定功能214,係將作為存取許可定義304之值乃身為「更新、參照」一事,記錄在記憶體106中(步驟708)。   [0051] 另一方面,當步驟705之判斷的結果,存取要求係並非身為更新要求的情況時,白名單設定功能214,係將作為存取許可定義304之值乃身為「參照」一事,記錄在記憶體106中(步驟709)。   [0052] 上述步驟706、708或709之結果,係成為將根據檔案I/O要求封包209之存取要求所作為存取許可定義304來記錄在白名單檔案215中之值,記錄在記憶體106上。   [0053] 接著,白名單設定功能214,係從檔案I/O要求封包209來取得存取路徑,並判斷該所取得了的存取路徑是否與白名單檔案215之任一者的存取路徑303相互一致(步驟710)。   [0054] 當在步驟710之判斷的結果中,係並不存在有相互一致之存取路徑303的情況時,白名單設定功能214,係對於白名單檔案215,而將代表上述所取得了的存取路徑之存取路徑303和與該存取路徑相對應之存取許可定義304(在步驟706、步驟708或者是步驟709中所記錄在記憶體106中之值)追加至白名單檔案215中。   [0055] 另一方面,當在步驟710之判斷的結果中,係存在有相互一致之存取路徑303的情況時,白名單設定功能214,係在與該存取路徑303相對應之存取許可定義304中,追加在步驟706、步驟708或者是步驟709中所記錄於記憶體106中之值。例如,當作為存取許可定義304係存在有「參照」,並且所追加之值係為「更新」的情況時,存取許可定義304之值,係從「參照」而被變更為「參照、更新」。   [0056] 圖8,係為存取控制處理之流程圖。   [0057] 被呼叫了的存取控制功能213,係從I/O檢測功能211所受理了的檔案I/O要求封包209而取得存取路徑,並判斷該所取得了的存取路徑是否與白名單檔案215之任一者的存取路徑303相互一致(步驟801)。   [0058] 當在步驟801之判斷的結果中,係並不存在有相互一致之存取路徑303的情況時,存取控制功能213,係將依循於檔案I/O要求封包209之存取(檔案I/O)禁止(步驟809)。   [0059] 另一方面,當在步驟801之判斷的結果中,係存在有相互一致之存取路徑303的情況時,存取控制功能213,係判斷依循於檔案I/O要求封包209之存取要求的存取種類,是否符合於與上述相互一致之存取路徑303相對應的存取許可定義304(步驟803)。   [0060] 當步驟803之判斷的結果,並無法得到符合之結果的情況時,存取控制功能213,係實行步驟809。   [0061] 另一方面,當步驟803之判斷的結果,係得到符合之結果的情況時,存取控制功能213,係判斷根據檔案I/O要求封包209所取得了的存取路徑是否與黑名單檔案216之任一者的存取路徑403相互一致(步驟805)。   [0062] 當在步驟805之判斷的結果中,係並不存在有相互一致之存取路徑403的情況時,存取控制功能213,係對於依循於檔案I/O要求封包209之存取要求所致的存取種類之存取(檔案I/O)作許可(步驟810)。亦即是,存取控制功能213,係將I/O檢測功能211所受理了的檔案I/O要求封包209遞交至檔案系統驅動器203處。   [0063] 另一方面,當在步驟805之判斷的結果中,係存在有相互一致之存取路徑403的情況時,存取控制功能213,係判斷依循於檔案I/O要求封包209之存取要求的存取種類,是否符合於與上述相互一致之存取路徑403相對應的存取禁止定義404(步驟807)。   [0064] 當步驟807之判斷的結果,並無法得到符合之結果的情況時,存取控制功能213,係實行步驟810。   [0065] 另一方面,當步驟807之判斷的結果,係得到了符合之結果的情況時,存取控制功能213,係實行步驟809。   [0066] 若依據本實施形態,則係能夠藉由從存在於資訊處理裝置101內之白名單作成環境204所啟動了的處理程序206來設定白名單檔案215,並從存在於同一裝置101內之業務環境205來依循於白名單檔案215與黑名單檔案216而對於檔案I/O要求封包209適用存取控制。   [0067] 以下,對本實施形態作總結。   [0068] 在本實施形態中,所謂「環境」,係指像是Web瀏覽器、文書作成應用程式、表計算應用程式一般之OS104上之程式(處理程序)所被實行的程式實行環境。   [0069] 所謂「安全的環境」,係指被定義為安全的環境。在本實施形態中,所謂「安全的環境」,係為被與安全的網路作連接而並未被與危險的網路作連接的環境。安全的網路之其中一例,係為像是企業內網路151一般之私人的網路。危險的網路,係為相較於安全的網路而信賴性為低之網路。危險的網路之其中一例,係為像是網際網路152一般之公開的網路。   [0070] 所謂「危險的環境」,係指被定義為危險的環境,換言之,係為相較於安全的環境而信賴性為低之環境。在本實施形態中,所謂「危險的環境」,係為被與危險的網路作連接而並未被與安全的網路作連接的環境。   [0071] 例如,能夠進行經由企業內網路151之通訊的環境(安全的環境),係可為在資訊處理裝置101中而既存之環境。在此種環境中連接網際網路152一事,係會有像是導致惡意程式之流入一般的危險性。安全的環境,由於係被與企業內網路151作連接而並未被與網際網路152作連接。因此,針對安全的環境,係希望能夠盡可能將惡意程式的攻擊排除。因此,在本實施形態中,係對於資訊處理裝置101而追加有能夠與網際網路152作連接之環境,又,對於資訊處理裝置101,係追加有I/O檢測功能211(處理程序探索功能212、存取控制功能213以及白名單設定功能214)。被作了追加的環境,係被定義為危險的環境,從危險的環境而來之檔案存取(包含程式實行),係藉由存取控制功能213而被作控制。危險的環境,係可為作為業務環境205而主要被使用的環境,安全的環境,係可為作為白名單作成環境204而為了進行白名單檔案215之更新所被使用的環境。   [0072] 在安全的環境中,存取許可對象之檔案的路徑名稱,係在白名單檔案215中,被與所許可的存取種類(例如,僅許可進行參照、許可參照以及更新之雙方)相互附加關連性地而作登錄,存取禁止對象之檔案的路徑名稱,係在黑名單檔案216中,被與所禁止的存取種類(例如,僅禁止進行更新、禁止參照以及更新之雙方)相互附加關連性地而作登錄,   [0073] 具體而言,當被進行有從安全的環境而來之檔案存取的情況時,在白名單設定功能214處,係將對於被作了存取的檔案之路徑名稱、其之存取種類,追加至白名單檔案215中。亦即是,白名單檔案215,係因應於從安全的環境而來之檔案存取,而被適宜地自動作更新。也就是說,當在危險的環境中所實行的處理程式被惡意程式所感染的情況時,係難以判斷從該處理程序而來之檔案存取是否為正當,但是,由於在安全的環境中所被實行的處理程序係為安全,因此,從此種處理程序而來之存取,係被視為安全,白名單檔案215係自動性地被作更新。   [0074] 另一方面,黑名單檔案216,係藉由在安全的環境中所被實行的設定工具217而自動性地作更新,或者是由使用者來手動進行更新。例如,在想要針對於白名單檔案215中而對於存取作了許可的目錄內之一部分的檔案而禁止其之存取的情況時,該檔案之路徑名稱以及存取禁止種類,係可藉由設定工具217來追加至黑名單檔案216中。   [0075] 白名單檔案215以及黑名單檔案216,係均被儲存在能夠從安全的環境和危險的環境之雙方來進行存取的記憶資源(被安全的環境和危險的環境所共有之記憶資源)中。   [0076] 從危險的環境而來之檔案存取,係藉由存取控制功能213,來使用白名單檔案215以及黑名單檔案216之雙方而被作控制。具體而言,係進行有下述之存取控制。   (一)當依循於該檔案存取之存取路徑以及存取種類,係與被登錄在白名單檔案215中之存取路徑303以及存取許可定義304相符合,並且並未與被登錄在黑名單檔案216中之存取路徑403以及存取禁止定義404相符合的情況時,該檔案存取係被許可。   (一)當依循於該檔案存取之存取路徑以及存取種類,雖然為與被登錄在白名單檔案215中之存取路徑303以及存取許可定義304相符合,但是亦與被登錄在黑名單檔案216中之存取路徑403以及存取禁止定義404相符合的情況時,該檔案存取係被禁止。   (一)當依循於該檔案存取之存取路徑以及存取種類,係並未與被登錄在白名單檔案215中之存取路徑303以及存取許可定義304相符合,不論該存取路徑以及存取種類是否亦與被登錄在黑名單檔案216中之存取路徑403以及存取禁止定義404相符合的情況時,該檔案存取均係被禁止。   [0077] 若依據本實施形態,則在資訊處理裝置101中,危險的環境與安全的環境係共存,因應於在安全的環境下之檔案存取(包含程式實行),白名單檔案215係被自動作更新。由於在安全的環境下之檔案存取係為安全的存取,因此,係能夠避免不正當的檔案被登錄在白名單檔案215中的情形。又,相較於藉由完全獨立的其他資訊處理裝置來作成白名單檔案,係能夠謀求手續的削減以及精確度的提升。   [0078] 又,若依據本實施形態,則使用黑名單檔案216,檔案存取係被作限制。具體而言,係能夠對於從危險的環境而來之更新(寫入)或者是由危險的環境所致之參照(讀出)作禁止。因此,係能夠將從危險的環境而流入存在有惡意的檔案之危險性或者是藉由安全的環境所寫入的企業內資訊流出之外部的危險性減輕。   [0079] 以上,雖係針對本發明之其中一個實施形態作了說明,但是,此係僅為用以進行本發明之說明所例示者,本發明之範圍係並非僅被限定於此實施形態。本發明,係亦可藉由其他之各種的形態來實施。例如,白名單與黑名單,係亦可代替身為存在於相異之檔案中的相異之清單,而身為在同一檔案中的邏輯性相異之清單。[0011] In the following description, the "intermediate face" includes one or more interfaces. The interface of 1 or more may be the same type of interface device of 1 or more (for example, 1 or more NIC (Network Interface Card)), or 2 or more different types of interface devices (for example, NIC and HBA (Host Bus Adapter) ). [0012] In the following description, the "memory unit" includes one or more memories. At least one of the memories may be a volatile memory or a non-volatile memory. The memory unit is mainly used when it is processed by the processor unit. [0013] In the following description, the "processor unit" includes one or more processors. At least one processor is typically a microprocessor like a CPU (Central Processing Unit). Each of the above 1 processors may be a single core or a multi-core. The processor may also include hardware circuitry that performs some or all of the processing. [0014] In the following description, the processing unit (function) is described by the expression "kkk", but the processing unit can be executed by the processor unit. The above computer program can be realized by a hardware circuit of one or more (for example, an FPGA (Field-Programmable Gate Array) or an ASIC (Application Specific Integrated Circuit). When the processing unit is implemented by the processor unit, the processing to be performed is performed by using the memory unit and/or the face (for example, communication port), and the processing unit can be used. It is set to at least part of the processor unit. The processing described by the processing unit as a main word may be a processor unit or a processing performed by a device including the processor unit. Further, the processor unit may include a hardware circuit that performs part or all of the processing. The program can also be installed into the processor from the source of the program. The source of the program, for example, may also be a program publishing computer or a computer readable recording medium (eg, a non-transitory recording medium). The description of each processing unit is merely an example, and the processing unit of the plurality of processing units may be integrated into one processing unit, or one processing unit may be divided into a plurality of processing units. [0015] In the following description, the "computer system" is a computer including one or more physical ones. At least one physical computer may be a virtual computer (for example, VM (Virtual Machine)) or SDx (Software-Defined anything). As SDx, for example, SDS (Software Defined Storage) (an example of a virtual storage device) or SDDC (Software-defined Datacenter) can be used. [0016] Hereinafter, one embodiment of the present invention will be described. 1 is a configuration diagram of an information processing device according to an embodiment of the present invention. [0018] The information processing device 101 is an example of a computer system. The information processing device 101 includes an I/F (interface) 161 and a memory device 105 (for example, an HDD (Hard Disk Drive) or an SSD (Solid State Drive) auxiliary memory device), and a memory 106, and The processor 100 is connected to the ones. I/F161 is an example of a face. The memory device 105 and the memory 106 are examples of the memory unit. The processor 100 is an example of a processor unit. The I/F 161 is connected to the intranet 151 and the Internet 152. The intranet 151 is an example of a network having high reliability in terms of relativity, and the Internet 152 is an example of a network having low relative reliability. [0019] The environment in the information processing device 101 is imaginarily divided into plural environments. In the present embodiment, the plural environment is a whitelist creation environment 204 and a business environment 205. The whitelist is an environment and is one of the safe environments. The business environment is one of the dangerous environments. The whitelist creation environment 204 and the business environment 205 are present on the same OS (operation system) 104, and are configured to share the memory device 105 and the memory 106 between the environments 102 and 103. For example, in the Windows OS (registered trademark of Windows), an environment in which the user A logs in and can only access the secure intranet 151 can be set as the whitelist creation environment 204, and An environment in which the user B logs in and can only access the dangerous Internet 152 is configured as the business environment 205. [0020] In the present embodiment, in the whitelist creation environment 204, rules for restricting file access (whitelist file 215 and blacklist file 216) are created, and the business environment is used according to the rule. The processing program executed in 205 is controlled to enable file access that is as secure as the whitelist creation environment 204 even in the business environment 205. [0021] Hereinafter, this embodiment will be described in detail. 2 is a configuration diagram showing an environment and functions of the information processing apparatus 101. [0023] In FIG. 2, the information processing device 101 can use the OS 104 in a virtual manner. The information processing device 101 is provided with a whitelist creation environment 204 which is an example of a safe environment, and a business environment 205 which is an example of a dangerous environment. [0024] Further, the OS 104 is installed with the file system driver 203, and is provided with filtering management for filtering the file I/O request packet 209 generated from the processing program 206 and the processing program 207 by the OS 104. 210. Further, in the OS 104, there is an I/O detecting function 211 that accepts the file I/O request packet 209 by the filter manager 210. The I/O detection function 211 is a function that is performed by the processor 100 to execute a computer program, and the program may be, for example, a program that is added to the filter manager 210. The I/O detection function 211 is provided with a processing program search function 212 for confirming the environment of the program in which the source of the transmission is executed based on the accepted file I/O request packet 209, and can be explored by the processing program. When the function 112 confirms that the processing program is the implementer in the business environment 205, the access control function 213 for access control according to the whitelist file 215 and the blacklist file 216, and when When the program search function 212 confirms that the handler is the implementer in the whitelist creation environment 204, the information is recorded in the whitelist setting function 214 in the whitelist file 215. Further, a setting tool 217 for recording, editing, or deleting the files prohibited in the business environment 205 for execution, reference, and update in the blacklist file 216 is provided. The setting tool 217, for example, is installed into the OS 104 and executed in the whitelist creation environment 204, and is not implemented in the business environment 205. [0026] There are processing programs (for example, applications) such as Excel (registered trademark) or Internet Explorer (registered trademark). In FIG. 2, the component code 206 is attached to the processing program activated in the whitelist creation environment 204, and the component symbol 207 is attached to the processing program activated in the business environment 205. That is, the processing program 206, when the access rule of the processing program is recorded in the whitelist file 215, is, for example, a processing program activated by the user from the whitelist creation environment 204. On the other hand, when the processing program 207 performs the check by the whitelist file 215 and the blacklist file 216 for the processing program, for example, the processing initiated from the business environment 205 by the user is performed. program. When one of the processing program 206 and the processing program 207 performs I/O for the file, the same applies to the OS 104, which generates an archive of information including the contents of the I/O and the processing of the I/O source. The I/O requires the packet 209 and is delivered to the archive system driver 203 via the filter manager 210. [0027] Before the processing procedure is executed, at the filter manager 210, the I/O detection function 211 is registered. Thereby, the OS 104 can deliver the file I/O request packet 209 to the I/O detecting function 211 when the file I/O request packet 209 arrives at the filter manager 210. [0028] The call with the handler search function 212 is performed through the I/O detection function 211 registered in the filter manager 210. The handler search function 212 determines whether the execution source of the processing program is a whitelist creation environment 204 or a business environment based on the information (the processing information of the I/O source) included in the file I/O request packet 209. 205. The handler search function 212 calls the whitelist setting function 214 when the handler for specifying the I/O issue source is in the case of the handler 206 executed by the whitelist creation environment 204. On the other hand, the handler search function 212 calls the access control function 213 when the handler for specifying the I/O issue source is the handler 207 that is executed from the service environment 205. [0029] When the whitelist setting function 214 is called, the whitelist setting function 214 records the file name of the file accessed by the processing program 206 in the whitelist file 215. By this, the whitelist setting function 214 can record all of the files accessed by the processing program 206 activated in the whitelist creation environment 204 in the whitelist file 215. [0030] When the access control function 213 is called, the access control function 213 performs permission or rejection for the file I/O request packet 209 according to the whitelist file 215 and the blacklist file 216. Access control. Thereby, the access control function 213 is capable of applying the file created by the whitelist file 215 and the blacklist file 216 to the file accessed by the processing program 207 activated from the business environment 205. Take control. Moreover, since the access control function 213 does not refer to the whitelist file 215 and the blacklist file 216 but does not update the files 215 and 216, the processing initiated from the business environment 205 is performed. The program 107 does not update any of the whitelist file 215 and the blacklist file 216. By this control, the processing program 207 executed from the business environment 205 is capable of following the whitelist file 215 and the blacklist file 216 created in the whitelist creation environment 204 (that is, a secure environment). Secure file access. [0031] FIG. 3 is a block diagram of a whitelist file 215. [0032] The whitelist file 215 is a file with a whitelist. The whitelist file 215 is, for example, a table, and has an entry for each of the files of the access permission object. Each entry maintains information such as a rule number 302 that becomes a management number, an access path 303 that represents a file of an access target, and an access permission definition 304 that represents a permitted access type. [0033] The access path 303 is an archive path (character string) containing the file name. The access path 303 is specified in the file unit, but may be a directory. The value to be registered as the access permission definition 304 is, for example, "execution" (permission execution), "reference" (no permission is required for update but permission for reference), and "reference, update" (license reference and Both sides of the update). In addition, the term "implementation" refers to the implementation of a file containing a program (that is, the implementation of a program). [0034] FIG. 4 is a block diagram of a blacklist file 216. [0035] The blacklist file 216 is a file with a blacklist. The blacklist file 216 is, for example, a table, and has an entry for each of the files of the access prohibition object. Each entry maintains a rule number 402 that becomes a management number, an access path 403 that represents an access target file or a directory, and an access prohibition definition 404 that represents a prohibited access type. News. [0036] The access path 403 is an archive path including a file name or a directory path (text column) including a directory name. The value to be registered as the access prohibition definition 404, for example, "execution" (prohibition of execution), "reference, update" (both prohibition of reference and update), and "update" (not prohibited but reference) Update is forbidden). [0037] Hereinafter, a plurality of processes performed by the present embodiment will be described. [0038] FIG. 5 is a flow chart of the processing of the file I/O request packet 209. [0039] The filter manager 210 is a received file I/O request packet 209 (file access) (step 501), and sends the file I/O request packet 209 to the I/O detection function 211 (step 502). ). [0040] FIG. 6 is a flowchart of a processing program search process. [0041] The handler search function 212 is called by the I/O detection function 211 that accepts the file I/O request packet 209, and obtains the source processing program from the file I/O request packet 209 (I). The handler information of the /O issue source processing program (step 602). [0042] Next, the processing program search function 212 determines that the distribution source processing program is the processing program 206 (the processing program started in the whitelist creation environment 204) based on the processing program information obtained at step 602. It is also a processing program 207 (a processing program that is started in the business environment 205) (step 603). [0043] When the result of the determination in step 603 is that the distribution source processing program is in the case of the processing program 206, the processing program search function 212 calls the white list setting function 214 (step 606). On the other hand, when the result of the judgment of step 603 is that the distribution source processing program is in the case of the processing program 207, the call access control function 213 is called (step 607). [0045] FIG. 7 is a flowchart of a whitelist setting process. [0046] The called whitelist setting function 214 obtains an access request from the file I/O request packet 209 accepted by the I/O detecting function 211 (step 702). [0047] Next, the whitelist setting function 214 determines whether the access request obtained by step 702 is an execution request (step 703). [0048] When the access request is performed as a result of the determination in step 703, the whitelist setting function 214 is used as the value of the access permission definition 304 as "execution" and "reference". And recorded in the memory 106 (step 706). [0049] When the result of the determination in step 703, the access request is not the case where the request is implemented, the whitelist setting function 214 determines whether the access request is an update request (step 705). [0050] When the access request is a result of the update request, the whitelist setting function 214 records the value of the access permission definition 304 as "update, reference". In memory 106 (step 708). On the other hand, when the result of the determination in step 705 is that the access request is not the update request, the whitelist setting function 214 is used as the "access" as the value of the access permission definition 304. The matter is recorded in the memory 106 (step 709). [0052] The result of the above step 706, 708 or 709 is the value recorded in the whitelist file 215 as the access permission definition 304 according to the access request of the file I/O request packet 209, and is recorded in the memory. 106 on. [0053] Next, the whitelist setting function 214 obtains an access path from the file I/O request packet 209, and determines whether the obtained access path and the whitelist file 215 are access paths. 303 coincide with each other (step 710). [0054] When the result of the determination in step 710 is that there is no mutually consistent access path 303, the whitelist setting function 214 is for the whitelist file 215 and will represent the above obtained The access path access path 303 and the access permission definition 304 corresponding to the access path (the value recorded in the memory 106 in step 706, step 708, or step 709) are added to the whitelist file 215. in. On the other hand, when the result of the determination in step 710 is that there is a mutually consistent access path 303, the whitelist setting function 214 is in the access corresponding to the access path 303. In the license definition 304, the value recorded in the memory 106 in step 706, step 708, or step 709 is added. For example, when there is a "reference" in the access permission definition 304 and the added value is "update", the value of the access permission definition 304 is changed from "reference" to "reference". Update". [0056] FIG. 8 is a flow chart of an access control process. [0057] The called access control function 213 obtains an access path from the file I/O request packet 209 accepted by the I/O detection function 211, and determines whether the acquired access path is The access paths 303 of any of the whitelist files 215 coincide with each other (step 801). [0058] When the result of the determination in step 801 is that there is no mutually consistent access path 303, the access control function 213 will follow the access of the file I/O request packet 209 ( File I/O) is prohibited (step 809). On the other hand, when the result of the determination in step 801 is that there is a mutually consistent access path 303, the access control function 213 determines that the file I/O request packet 209 is stored. Whether or not the requested access type conforms to the access permission definition 304 corresponding to the mutually identical access path 303 (step 803). [0060] When the result of the determination in step 803 is that the result of the matching is not obtained, the access control function 213 executes step 809. On the other hand, when the result of the determination in step 803 is that the result of the matching is obtained, the access control function 213 determines whether the access path obtained by the file I/O request packet 209 is black or not. The access paths 403 of any of the list files 216 are identical to each other (step 805). [0062] When the result of the determination in step 805 is that there is no mutually consistent access path 403, the access control function 213 is for accessing the file I/O request packet 209. The resulting access type access (file I/O) is granted (step 810). That is, the access control function 213 delivers the file I/O request packet 209 accepted by the I/O detection function 211 to the file system driver 203. On the other hand, when the result of the determination in step 805 is that there is a mutually consistent access path 403, the access control function 213 determines that the file I/O request packet 209 is stored. Whether or not the requested access type conforms to the access prohibition definition 404 corresponding to the mutually identical access path 403 (step 807). [0064] When the result of the determination in step 807 does not result in a match result, the access control function 213 performs step 810. On the other hand, when the result of the determination in step 807 is that the result of the matching is obtained, the access control function 213 executes step 809. According to the present embodiment, the whitelist file 215 can be set by the processing program 206 activated by the whitelist creation environment 204 existing in the information processing device 101, and is present in the same device 101. The business environment 205 follows the whitelist file 215 and the blacklist file 216 and applies access control to the file I/O request packet 209. [0067] Hereinafter, the present embodiment will be summarized. In the present embodiment, the term "environment" refers to a program execution environment in which a program (processing program) on the OS 104 such as a web browser, a document creation application, or a table calculation application is executed. [0069] The term "safe environment" refers to an environment defined as safe. In the present embodiment, the "safe environment" is an environment that is connected to a secure network and is not connected to a dangerous network. An example of a secure network is a private network like the intranet 151. A dangerous network is a network with low reliability compared to a secure network. One example of a dangerous network is a public network like the Internet 152. [0070] The term "dangerous environment" refers to an environment that is defined as a dangerous environment, in other words, an environment in which the reliability is low compared to a safe environment. In the present embodiment, the "dangerous environment" is an environment that is connected to a dangerous network and is not connected to a secure network. [0071] For example, an environment (secure environment) capable of communication via the intranet 151 may be an environment existing in the information processing apparatus 101. Connecting to the Internet 152 in such an environment is likely to be a general risk of causing the influx of malicious programs. The secure environment is not connected to the Internet 152 because it is connected to the intranet 151. Therefore, for a secure environment, it is desirable to be able to exclude malicious programs as much as possible. Therefore, in the present embodiment, an environment that can be connected to the Internet 152 is added to the information processing device 101, and an I/O detection function 211 is added to the information processing device 101 (processing program search function) 212. Access control function 213 and whitelist setting function 214). The environment in which the addition is made is defined as a dangerous environment, and file access (including program execution) from a dangerous environment is controlled by the access control function 213. The dangerous environment may be an environment that is mainly used as the business environment 205, and a safe environment may be an environment that is used as a whitelist creation environment 204 for updating the whitelist file 215. [0072] In a secure environment, the path name of the file for accessing the license object is in the whitelist file 215, and is associated with the permitted access type (eg, only the license reference, the license reference, and the update). The path name of the file for accessing the prohibited object is registered in addition to each other, and is in the blacklist file 216, and is prohibited from being accessed (for example, only the update, the prohibition of reference, and the update are prohibited). Logging in with mutual relevance, [0073] Specifically, when a file access from a secure environment is performed, at the whitelist setting function 214, access is made to The path name of the file and the access type thereof are added to the whitelist file 215. That is, the whitelist file 215 is automatically updated as appropriate in response to file access from a secure environment. That is to say, when the processing program executed in a dangerous environment is infected by a malicious program, it is difficult to judge whether the file access from the processing program is justified, but because it is in a safe environment. The executed handler is secure, so access from such a handler is considered safe and the whitelist file 215 is automatically updated. [0074] On the other hand, the blacklist file 216 is automatically updated by the setting tool 217 that is executed in a secure environment, or manually updated by the user. For example, when it is desired to prohibit access to a file in a part of a directory in which the access is permitted in the whitelist file 215, the path name and the access prohibition type of the file may be borrowed. It is added to the blacklist file 216 by the setting tool 217. [0075] The whitelist file 215 and the blacklist file 216 are both stored in a memory resource that can be accessed from both a secure environment and a dangerous environment (a memory resource shared by a secure environment and a dangerous environment). )in. [0076] File access from a dangerous environment is controlled by the access control function 213 using both the whitelist file 215 and the blacklist file 216. Specifically, the following access control is performed. (1) The access path and the access type that follow the file access are consistent with the access path 303 and the access permission definition 304 registered in the whitelist file 215, and are not registered with When the access path 403 and the access prohibition definition 404 in the blacklist file 216 match, the file access system is permitted. (1) The access path and the access type according to the file access are matched with the access path 303 and the access permission definition 304 registered in the whitelist file 215, but are also registered with When the access path 403 and the access prohibition definition 404 in the blacklist file 216 match, the file access system is disabled. (1) When the access path and the access type of the file access are followed, the access path 303 and the access permission definition 304 registered in the whitelist file 215 are not matched, regardless of the access path. And whether the access type is also consistent with the access path 403 and the access prohibition definition 404 registered in the blacklist file 216, the file access is prohibited. According to the present embodiment, in the information processing apparatus 101, a dangerous environment and a safe environment coexist, and in accordance with file access (including program execution) in a secure environment, the whitelist file 215 is Self-action update. Since the file access in a secure environment is secure access, it is possible to prevent the improper file from being registered in the whitelist file 215. Moreover, it is possible to reduce the number of procedures and improve the accuracy by creating a whitelist file by using other information processing devices that are completely independent. Further, according to the present embodiment, the blacklist file 216 is used, and the file access system is restricted. Specifically, it is prohibited to update (write) from a dangerous environment or to refer to (read) from a dangerous environment. Therefore, it is possible to reduce the risk of having a malicious file from a dangerous environment or the risk of external information flowing out of the company written by a safe environment. The above is a description of one embodiment of the present invention. However, the present invention is only intended to be illustrative of the present invention, and the scope of the present invention is not limited to the embodiment. The present invention can also be implemented in other various forms. For example, whitelists and blacklists can also be used as a list of logical differences in the same file instead of being in a different list of different files.

[0080][0080]

101‧‧‧資訊處理裝置101‧‧‧Information processing device

104‧‧‧作業系統104‧‧‧Operating system

204‧‧‧白名單作成環境204‧‧‧White list environment

205‧‧‧業務環境205‧‧‧Business environment

210‧‧‧過濾管理器210‧‧‧Filter Manager

211‧‧‧I/O檢測功能211‧‧‧I/O detection function

212‧‧‧處理程序探索功能212‧‧‧Processing program exploration function

213‧‧‧存取控制功能213‧‧‧Access control function

214‧‧‧白名單設定功能214‧‧‧White list setting function

215‧‧‧白名單檔案215‧‧‧White List File

216‧‧‧黑名單檔案216‧‧‧Blacklist file

217‧‧‧設定工具217‧‧‧Setting tools

[0010]   [圖1] 係為本發明之其中一個實施形態的資訊處理裝置之構成圖。   [圖2] 係為對於本發明之其中一個實施形態的資訊處理裝置所具備之環境與功能作展示之構成圖。   [圖3] 係為本發明之其中一個實施形態的白名單檔案之構成圖。   [圖4] 係為本發明之其中一個實施形態的黑名單檔案之構成圖。   [圖5] 係為檔案I/O要求封包之受訊處理的流程圖。   [圖6] 係為處理程序探索處理之流程圖。   [圖7] 係為白名單設定處理之流程圖。   [圖8] 係為存取控制處理之流程圖。[ Fig. 1] Fig. 1 is a configuration diagram of an information processing apparatus according to an embodiment of the present invention. Fig. 2 is a block diagram showing the environment and functions of the information processing apparatus according to one embodiment of the present invention. Fig. 3 is a block diagram showing a white list file of one embodiment of the present invention. Fig. 4 is a block diagram showing a blacklist file of one embodiment of the present invention. [Fig. 5] is a flow chart of the processing of the file of the file I/O request packet. [Fig. 6] A flowchart showing the processing of the processing program. [Fig. 7] A flowchart showing a whitelist setting process. [Fig. 8] A flowchart showing an access control process.

Claims (6)

一種電腦程式,其特徵為:   係使具有身為被與安全的網路作連接而並未被與危險的網路作連接的環境之安全的環境和被與前述危險的網路作連接而並未被與前述安全的網路作連接的環境之危險的環境的計算機系統,實行下述之步驟:   從其中一者之環境而受理檔案存取;   判斷前述檔案存取之發行源頭係身為前述安全的環境和前述危險的環境之何者;   當前述發行源頭係為前述安全的環境的情況時,將基於身為從前述安全的環境而來之檔案存取之第1存取所致的存取路徑以及存取種類,追加至身為關連於存取許可對象之檔案的資訊之清單之白名單中。A computer program characterized by: having a secure environment that is connected to a secure network and not connected to a dangerous network, and is connected to the aforementioned dangerous network and A computer system that is not in a dangerous environment for an environment connected to the aforementioned secure network, performs the following steps: accepting file access from one of the environments; determining that the source of the file access is the aforementioned The security environment and the aforementioned dangerous environment; when the source of the distribution is in the aforementioned secure environment, the access is based on the first access of the file access from the secure environment. The path and the access type are added to the white list of the list of information related to the file of the access permission object. 如申請專利範圍第1項所記載之電腦程式,其中,   當前述發行源頭係身為前述危險的環境的情況時,係使前述計算機系統更進而實行下述之步驟:   (A1)判斷基於身為從前述危險的環境而來之檔案存取之第2存取所致的存取路徑以及存取種類,是否有被登錄在前述白名單中;   當(A1)之判斷結果為偽的情況時,   (B)禁止前述第2存取。The computer program according to claim 1, wherein when the source of the issue is in a dangerous environment, the computer system further performs the following steps: (A1) determining that the body is based on Whether the access route and the access type due to the second access of the file access from the dangerous environment are registered in the white list; and when the judgment result of (A1) is false, (B) The aforementioned second access is prohibited. 如申請專利範圍第2項所記載之電腦程式,其中,   當前述發行源頭係身為前述危險的環境的情況時,係使前述計算機系統更進而實行下述之步驟:   (A2)當(A1)之判斷結果為真的情況時,判斷在身為關連於存取禁止對象之檔案的資訊之清單並且身為被登錄有存取路徑和存取種類之清單的黑名單中,是否被登錄有基於前述第2存取所致的存取路徑以及存取種類;   當(A2)之判斷結果為真的情況時,實行(B),   當(A2)之判斷結果為偽的情況時,許可前述第2存取。The computer program according to claim 2, wherein when the source of the issue is in a dangerous environment, the computer system further performs the following steps: (A2) when (A1) When the result of the determination is true, it is determined whether or not the registration is based on the list of information related to the file of the access prohibition object and is listed as the list of the access path and the access type. The access path and the access type due to the second access; (B) when the judgment result of (A2) is true, and the case where the judgment result of (A2) is false 2 access. 如申請專利範圍第3項所記載之電腦程式,其中,當前述發行源頭係為前述安全的環境的情況時,前述白名單係被作更新,當前述發行源頭係為前述危險的環境的情況時,前述白名單以及前述黑名單係均不會被更新。The computer program according to claim 3, wherein when the source of the distribution is in the safe environment, the whitelist is updated, and when the source of the distribution is in the dangerous environment. The aforementioned whitelist and the aforementioned blacklist are not updated. 一種檔案存取控制方法,其特徵為:   係在具有身為被與安全的網路作連接而並未被與危險的網路作連接的環境之安全的環境和被與前述危險的網路作連接而並未被與前述安全的網路作連接的環境之危險的環境的計算機系統中:   從其中一者之環境而受理檔案存取;   判斷前述檔案存取之發行源頭係身為前述安全的環境和前述危險的環境之何者;   當前述發行源頭係為前述安全的環境的情況時,將基於身為從前述安全的環境而來之檔案存取之第1存取所致的存取路徑以及存取種類,追加至身為關連於存取許可對象之檔案的資訊之清單之白名單中。A file access control method characterized by: having a secure environment in an environment that is connected to a secure network and not connected to a dangerous network, and is connected to the aforementioned dangerous network In a computer system that is connected to a dangerous environment that is not connected to the aforementioned secure network: accepting file access from one of the environments; determining that the source of the file access is secure as described above The environment and the dangerous environment; when the source of the distribution is in the safe environment, the access path is based on the first access that is the file access from the secure environment and The access type is added to the white list of the list of information related to the file of the access permission object. 一種計算機系統,其特徵為,係具備有:   身為被與安全的網路作連接而並未被與危險的網路作連接的環境之安全的環境;和   被與前述危險的網路作連接而並未被與前述安全的網路作連接的環境之危險的環境;和   從其中一者之環境而受理檔案存取之手段;和   判斷前述檔案存取之發行源頭係身為前述安全的環境和前述危險的環境之何者之手段;和   當前述發行源頭係為前述安全的環境的情況時,將基於身為從前述安全的環境而來之檔案存取之第1存取所致的存取路徑以及存取種類,追加至身為關連於存取許可對象之檔案的資訊之清單之白名單中之手段。A computer system characterized by: a security environment that is connected to a secure network and not connected to a dangerous network; and is connected to the aforementioned dangerous network And a dangerous environment that is not connected to the aforementioned secure network; and means for accepting file access from one of the environments; and determining that the source of the file access is the aforementioned secure environment And the means of the above-mentioned dangerous environment; and when the source of the foregoing is the aforementioned secure environment, the access is based on the first access that is the file access from the secure environment. The path and the type of access are added to the white list of the list of information related to the file of the access permit.
TW106141283A 2017-02-03 2017-11-28 Computer system and file access control method TWI659328B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2017-018275 2017-02-03
JP2017018275A JP2018124893A (en) 2017-02-03 2017-02-03 Computer system and file access control method

Publications (2)

Publication Number Publication Date
TW201830282A true TW201830282A (en) 2018-08-16
TWI659328B TWI659328B (en) 2019-05-11

Family

ID=63111472

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106141283A TWI659328B (en) 2017-02-03 2017-11-28 Computer system and file access control method

Country Status (2)

Country Link
JP (1) JP2018124893A (en)
TW (1) TWI659328B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI730415B (en) * 2019-09-18 2021-06-11 財團法人工業技術研究院 Detection system, detection method, and an update verification method performed by using the detection method

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11188622B2 (en) * 2018-09-28 2021-11-30 Daniel Chien Systems and methods for computer security
JP7321795B2 (en) * 2019-06-27 2023-08-07 キヤノン株式会社 Information processing device, information processing method and program
US11677754B2 (en) 2019-12-09 2023-06-13 Daniel Chien Access control systems and methods
US12445453B2 (en) 2019-12-09 2025-10-14 Daniel Chien Access control systems and methods
CN113114611B (en) * 2020-01-13 2024-02-06 北京沃东天骏信息技术有限公司 Blacklist management method and device
US11509463B2 (en) 2020-05-31 2022-11-22 Daniel Chien Timestamp-based shared key generation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130333039A1 (en) * 2012-06-07 2013-12-12 Mcafee, Inc. Evaluating Whether to Block or Allow Installation of a Software Application
TW201502845A (en) * 2013-07-15 2015-01-16 Isgoodidea Website antivirus information security system
CN104243214B (en) * 2014-09-28 2019-11-26 奇安信科技集团股份有限公司 Method, device and system for data processing
CN105631312B (en) * 2015-12-25 2018-09-07 北京奇虎科技有限公司 The processing method and system of rogue program

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI730415B (en) * 2019-09-18 2021-06-11 財團法人工業技術研究院 Detection system, detection method, and an update verification method performed by using the detection method
US12086249B2 (en) 2019-09-18 2024-09-10 Industrial Technology Research Institute Detection system, detection method, and an update verification method performed by using the detection method

Also Published As

Publication number Publication date
JP2018124893A (en) 2018-08-09
TWI659328B (en) 2019-05-11

Similar Documents

Publication Publication Date Title
TWI659328B (en) Computer system and file access control method
US20190158512A1 (en) Lightweight anti-ransomware system
KR101700552B1 (en) Context based switching to a secure operating system environment
US8136147B2 (en) Privilege management
US11960590B2 (en) Enforcing trusted application settings for shared code libraries
US11221968B1 (en) Systems and methods for shadow copy access prevention
US11170103B2 (en) Method of detecting malicious files resisting analysis in an isolated environment
CN106796644B (en) Access control system and access control method
US9230128B2 (en) Assignment of security contexts to define access permissions for file system objects
KR20190021673A (en) Apparatus and method for preventing ransomware
US12511417B2 (en) Tamper-proof data protection method and system
US20180046454A1 (en) Securing secret information in source code verification and at runtime
CN110347616B (en) Trusted Out-of-Band Memory Acquisition for IOMMU-Based Computer Systems
CN112567349A (en) Hardware Protection of Files in Integrated Circuit Devices
CN108270735A (en) A kind of data leakage prevention method and equipment
US20180260563A1 (en) Computer system for executing analysis program, and method of monitoring execution of analysis program
EP3588346B1 (en) Method of detecting malicious files resisting analysis in an isolated environment
US12282573B2 (en) File system protection apparatus and method in auxiliary storage device
HK1237470A1 (en) Access control system and access control method
HK1237470B (en) Access control system and access control method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees