[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109117664A - The access control method and device of application program - Google Patents

The access control method and device of application program Download PDF

Info

Publication number
CN109117664A
CN109117664A CN201810798889.0A CN201810798889A CN109117664A CN 109117664 A CN109117664 A CN 109117664A CN 201810798889 A CN201810798889 A CN 201810798889A CN 109117664 A CN109117664 A CN 109117664A
Authority
CN
China
Prior art keywords
call request
function
file
default
desktop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810798889.0A
Other languages
Chinese (zh)
Other versions
CN109117664B (en
Inventor
王志刚
彭洪涛
王志海
喻波
曲恩纯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201810798889.0A priority Critical patent/CN109117664B/en
Publication of CN109117664A publication Critical patent/CN109117664A/en
Application granted granted Critical
Publication of CN109117664B publication Critical patent/CN109117664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of access control method of application program and devices, this method comprises: creation virtual desktop;At least one application program in original desktop is added to virtual desktop;If detecting any one destination application starting in virtual desktop, Inline Hook is carried out to the preset function in the function library of Windows, preset function includes default network access function, default clipbook handling function, default registration list processing function;Intercept and capture call request of the destination application to preset function;According to the parameter in preconfigured control strategy and call request, target control strategy corresponding with parameter and preset function is determined;If target control strategy is to allow, preset function is called in response to call request;If target control strategy is refusal, call request is refused according to the default refusal strategy of preset function;If target control strategy is to redirect to call request, call request is redirected according to the default redirection strategy of preset function.

Description

The access control method and device of application program
Technical field
The present invention relates to technical field of data security, more particularly to the access control method and dress of a kind of application program It sets.
Background technique
In recent years, with the burst of the various leakages of a state or party secret, the leakage of a state or party secret all constitutes nation's security and long term growth Great threat.For the financial industry for being related to national economy, then there is higher security protection demand, with greater need for timely Prevent the generation of the leakage of a state or party secret.
Whether which industry requires to prevent the leakage of a state or party secret, can be with then in order to avoid the generation of the leakage of a state or party secret Safe access control is carried out to the application program in employee's computer of every profession and trade, so that the personnel of divulging a secret be avoided to pass through in enterprise computer Application program divulge a secret.
Therefore, a technical problem that needs to be urgently solved by technical personnel in the field at present is exactly: how to answer terminal Various access controls are carried out with program, it is ensured that the safety of end message.
Summary of the invention
The present invention provides a kind of access control method of application program and devices, can not be to terminal to solve the relevant technologies Application program carry out various access controls the problem of.
To solve the above-mentioned problems, according to an aspect of the present invention, the invention discloses a kind of access of application program Control method is applied to terminal device, which comprises
Create virtual desktop;
At least one application program in original desktop is added to the virtual desktop;
If any one destination application starting in the virtual desktop is detected, in the function library of Windows Preset function carry out Inline Hook, wherein the preset function includes default network access function, default clipbook behaviour Make function, default registration list processing function;
Intercept and capture call request of the destination application to the preset function;
It is determining with the parameter and described pre- according to the parameter in preconfigured control strategy and the call request If the corresponding target control strategy of function;
If the target control strategy is to allow the call request, called in response to the call request described pre- If function;
If the target control strategy is to refuse the call request, in response to the call request, according to described The default refusal strategy of preset function refuses the call request, returns to refusal result;
If the target control strategy is to redirect to the call request, default according to the preset function is reset The call request is redirected to strategy, the preset function is called in the call request in response to redirection.
Optionally, when the preset function includes default network access function, the parameter in the call request includes The destination address section of network address to be visited;
The parameter according in preconfigured control strategy and the call request, determining and the parameter and institute State the corresponding target control strategy of preset function, comprising:
According to the different address section and the corresponding relationship of different control strategies for default network access function preset configuration, Determine the corresponding target control strategy of the destination address section.
Optionally, the parameter packet when the preset function includes default clipbook handling function, in the call request It is corresponding to include the first desktop mark belonging to text to be pasted, the corresponding source file of the text to be pasted, the text to be pasted File destination belonging to the second desktop mark;
The parameter according in preconfigured control strategy and the call request, determining and the parameter and institute State the corresponding target control strategy of preset function, comprising:
It is identical to judge that the first desktop mark and second desktop identify whether;
If they are the same, then target control plan is determined according to the control strategy for default clipbook handling function preset configuration Slightly the call request is allowed;
If it is different, then determining target control plan according to the control strategy for default clipbook handling function preset configuration Slightly the call request is refused;
If the target control strategy is to refuse the call request, in response to the call request, according to The default refusal strategy of the preset function refuses the call request, returns to refusal result, comprising:
If the target control strategy is to refuse the call request, in response to the call request, according to described The default refusal strategy of default clipbook handling function carries out default modification to the text to be pasted in the call request, Return to modification result, wherein the default modification includes that character empties or upset character arrangements sequence.
Optionally, the default registration list processing function includes registration table write-in function, when the preset function includes institute When stating registration table write-in function, the parameter in the call request includes original road of the project to be written in original licensed table Diameter, the object key of the project to be written, the target value of the object key;
The parameter according in preconfigured control strategy and the call request, determining and the parameter and institute State the corresponding target control strategy of preset function, comprising:
According to for the ginseng in the default registration table write-in preconfigured control strategy of function and the call request Number, determining target control strategy corresponding with the parameter and the default registration table write-in function is to the call request It redirects;
If the target control strategy is to redirect to the call request, according to the default of the preset function It redirects strategy to redirect the call request, the preset function, packet are called in the call request in response to redirection It includes:
If the target control strategy is to redirect to the call request, according to the original path described original Creation redirects registration table in the sub-key of the object key of registration table;
The original path in the call request is revised as the project to be written in the redirection registration table In redirected path;
Call request in response to redirection calls the default registration table that function is written, and the target value is written to institute State the value for redirecting the object key of the redirected path in registration table.
Optionally, it is described after described at least one application program by original desktop is added to the virtual desktop Method further include:
If default microfiltration driving detects the file of the destination application of any one starting in the virtual desktop Operation requests judge file operation type then according to the file operation requests;
If file operation type is to open file, it is determined that file destination title and mesh in the file operation requests Mark original directory of the file in original desktop;
According to the structure of the original directory in the corresponding memory space of the virtual desktop to the original directory into Row redirects, and obtains the redirection catalogue of the file destination;
The file destination with the file destination title in the original directory of the original desktop is copied to At the redirection catalogue of the virtual desktop;
In response to file operation requests, the mesh with the file destination title redirected at catalogue is opened Mark file.
Optionally, if the default microfiltration driving detects the target application of any one starting in the virtual desktop The file operation requests of program, then according to the file operation requests, after judging file operation type, the method is also wrapped It includes:
If file operation type is file write operation, it is determined that the file destination title in the file operation requests, with And original directory of the file destination in original desktop;
According to the structure of the original directory in the corresponding memory space of the virtual desktop to the original directory into Row redirects, and obtains the redirection catalogue of the file destination;
File destination in the original directory of the original desktop is copied to described in the virtual desktop and is reset To at catalogue;
In response to file operation requests, write operation is carried out to the file destination at the redirection catalogue;
The file destination after write operation is encrypted according to predetermined encryption algorithm.
Optionally, if the default microfiltration driving detects the target application of any one starting in the virtual desktop The file operation requests of program, then according to the file operation requests, after judging file operation type, the method is also wrapped It includes:
If file operation type is file read operation, it is determined that the file destination title in the file operation requests, with And original directory of the file destination in original desktop;
Redirection catalogue of the file destination in the virtual desktop is determined according to the original directory;
According to default decipherment algorithm to it is described redirection catalogue at the file destination with the file destination title into Row decryption;
In response to file operation requests, read operation is carried out to the file destination after decryption, returns and reads result.
Optionally, the method also includes:
If closing the virtual desktop, according to preconfigured data scrubbing strategy, to being generated in the virtual desktop Ephemeral data and/or redirect data be purged.
Optionally, it is described after described at least one application program by original desktop is added to the virtual desktop Method further include:
If detecting the access request of any one application program, judge whether the application program is the virtual desktop Interior destination application;
If it is not, then refusing the access request.
According to another aspect of the present invention, the invention also discloses a kind of access control apparatus of application program, it is applied to Terminal device, described device include:
Creation module, for creating virtual desktop;
Adding module, at least one application program in original desktop to be added to the virtual desktop;
Hook module, it is right if any one destination application starts in the virtual desktop for detecting Preset function in the function library of Windows carries out Inline Hook, wherein the preset function includes default network access Function, default clipbook handling function, default registration list processing function;
Interception module, for intercepting and capturing call request of the destination application to the preset function;
First determining module, for according to the parameter in preconfigured control strategy and the call request, determine with The parameter and the corresponding target control strategy of the preset function;
First respond module, if being to allow the call request for the target control strategy, in response to described The preset function is called in call request;
Second respond module, if being to refuse the call request for the target control strategy, in response to described Call request refuses the call request according to the default refusal strategy of the preset function, returns to refusal result;
Third respond module, if being to be redirected to the call request for the target control strategy, according to described The default redirection strategy of preset function redirects the call request, and institute is called in the call request in response to redirection State preset function.
Optionally, first determining module includes:
First determines submodule, for when the preset function includes default network access function, wherein the calling Parameter in request includes the destination address section of network address to be visited, according to for default network access function preset configuration Different address section and the corresponding relationship of different control strategies, determine the corresponding target control strategy of the destination address section.
Optionally, first determining module includes:
Judging submodule, for when the preset function includes default clipbook handling function, wherein the calling is asked The parameter asked include text to be pasted, the first desktop mark belonging to the corresponding source file of the text to be pasted, it is described to The mark of second desktop belonging to the corresponding file destination of paste text judges the first desktop mark and the second desktop mark Whether identical know;
Second determines submodule, for if they are the same, then basis to be for the control for presetting clipbook handling function preset configuration Strategy determines that target control strategy is to allow the call request;
Third determines submodule, for if it is different, then according to the control for default clipbook handling function preset configuration Strategy determines that target control strategy is to refuse the call request;
Second respond module includes:
Second response submodule, if being to refuse the call request for the target control strategy, in response to institute State call request, according to the default clipbook handling function default refusal strategy to described in the call request to viscous Patch text carries out default modification, returns to modification result, wherein the default modification includes that character empties or to upset character arrangements suitable Sequence.
Optionally, first determining module includes:
4th determines submodule, described pre- for including registration table write-in function when the default registration list processing function If function includes the registration table write-in function, the parameter in the call request includes project to be written in original licensed table In original path, the project to be written object key, the target value of the object key, according to be directed to the default registration table The parameter in the preconfigured control strategy of function and the call request, determining and the parameter and the default note is written The corresponding target control strategy of volume table write-in function is to redirect to the call request;
The third respond module includes:
Submodule is created, if being to redirect to the call request for the target control strategy, according to the original Beginning path creates in the sub-key of the object key of the original licensed table redirects registration table;
Submodule is modified, for the original path in the call request to be revised as the project to be written in institute State the redirected path redirected in registration table;
Third responds submodule, calls the default registration table that function is written for the call request in response to redirection, The target value is written to the value of the object key of the redirected path into the redirection registration table.
Optionally, described device further include:
First judgment module, if the mesh for detecting that any one starts in the virtual desktop for presetting microfiltration driving The file operation requests of mark application program judge file operation type then according to the file operation requests;
Second determining module, if being to open file for file operation type, it is determined that mesh in the file operation requests Mark the original directory of file name and file destination in original desktop;
First redirection module, for the structure according to the original directory in the corresponding memory space of the virtual desktop In the original directory is redirected, obtain the redirection catalogue of the file destination;
First replication module, for there is the file destination title in the original directory by the original desktop File destination be copied at the redirection catalogue of the virtual desktop;
4th respond module, in response to file operation requests, opening described redirect at catalogue to have the mesh Mark the file destination of file name.
Optionally, described device further include:
Third determining module, if being file write operation for file operation type, it is determined that in the file operation requests Original directory in original desktop of file destination title and file destination;
Second redirection module, for the structure according to the original directory in the corresponding memory space of the virtual desktop In the original directory is redirected, obtain the redirection catalogue of the file destination;
Second replication module is copied to the void for the file destination in the original directory by the original desktop At the redirection catalogue of quasi- desktop;
5th respond module, for being carried out to the file destination at the redirection catalogue in response to file operation requests Write operation;
Encrypting module, for being encrypted according to predetermined encryption algorithm to the file destination after write operation.
Optionally, described device further include:
4th determining module, if being file read operation for file operation type, it is determined that in the file operation requests Original directory in original desktop of file destination title and file destination;
5th determining module, for determining weight of the file destination in the virtual desktop according to the original directory Orient catalogue;
Deciphering module, for there is the file destination title at the redirection catalogue according to default decipherment algorithm File destination be decrypted;
6th respond module, for carrying out read operation to the file destination after decryption, returning in response to file operation requests Readback takes result.
Optionally, described device further include:
Module is removed, if for closing the virtual desktop, according to preconfigured data scrubbing strategy, to the void The ephemeral data and/or redirection data generated in quasi- desktop is purged.
Optionally, described device further include:
Second judgment module, if judging the application program for detecting the access request of any one application program It whether is destination application in the virtual desktop;
Refuse module, if determining application program not for the second judgment module and being the target application journey in the virtual desktop Sequence then refuses the access request.
Compared with prior art, the present invention includes the following advantages:
In this way, the embodiment of the present invention is by creation virtual desktop, and by one or more application programs in original desktop Be added to the virtual desktop, and in the virtual desktop any one destination application starting when, to default network access Function, default clipbook handling function, default registration list processing function carry out Inline Hook operation, then when the target is answered With program to it is above-mentioned any one be called by the function of Inline Hook when, the embodiment of the present invention can intercept and capture the tune The call request control that accesses (including permission, is refused and reset with request, and according to preconfigured control strategy To), so as to carry out various access controls such as network, clipbook, registration table to the application program in virtual desktop, really The access safety of breath information-preserving.
Detailed description of the invention
Fig. 1 is a kind of system architecture diagram of the access control system embodiment of application program of the invention;
Fig. 2 is a kind of step flow chart of the access control method embodiment of application program of the invention;
Fig. 3 is a kind of structural block diagram of the access control system embodiment of application program of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
Referring to Fig.1, a kind of system architecture diagram of the access control system embodiment of application program of the invention is shown.
The access control system of the application program of the embodiment of the present invention is based on windows platform, is generally divided into three Level: being respectively desktop management layer, MAC layer, file encryption layer.
Wherein, desktop management layer is responsible for desktop security environment (i.e. virtual desktop) management, is substantially carried out desktop security environment Environmental test before creation, creation exits desktop working environment, exits the cleaning of rear environment etc..
MAC layer, the strategy for being configured according to desktop working environment carry out the application program started in desktop Behaviour control;
File encryption layer is responsible for redirecting the data generated in desktop working environment and encryption.
Wherein, as shown in Figure 1, desktop management layer by desktop management module, creates table positioned at the top layer of general frame Face working environment module, the preceding context detection module of creation exit desktop working environment module and exit rear environment cleaning modul group At.
Desktop management module such as calls creation desktop working environment for providing the user with visual desktop management operation Module carries out the creation of desktop working environment, calls and exit desktop working environment module to exit desktop working environment and cut Change desktop working environment etc.;
Desktop working environment module is created, preceding context detection module is created for calling, checks whether current environment meets The condition of desktop working environment is created, inspection can call windows api creation desktop and start resource manager after passing through Into MAC layer.
Desktop working environment module is exited, is responsible for destroying the desktop working environment of creation, and calls and exits rear environment cleaning Module, cleaning and desktop working environment relevant information specifically include such as redirection catalogue and file, registration table etc..
Rear environment cleaning modul is exited, cleaning desktop working environment related information is responsible for.
MAC layer is formed a connecting link positioned at the middle layer of general frame, is responsible for (i.e. empty under monitoring desktop working environment Quasi- desktop) starting application program, network, clipbook control module can be called according to the configuration strategy of desktop working environment The application letter for being protected, being controlled with registration table redirection module, and started to file encryption-decryption layer transmitting desktop working environment Breath (can specifically include virtual desktop starting the PID (Process identifier) of application program, the identification information of the virtual desktop and The control strategy of the virtual desktop).
MAC layer includes that protection module, network clipbook control module, registration table redirection module are applied in desktop, Wherein, in the case that application protection module in virtual desktop for having the application program of starting in desktop, network is cliped and pasted Plate control module, registration table redirection module are loaded into respectively in the process address space of the application program.
File encryption-decryption layer is to be responsible for place where the core of file redirection and encryption positioned at the lowest level of overall architecture The file read-write operations for managing application program in desktop working environment execute the file write-in of application program and redirect operation, right File is written and carries out cryptographic operation, to guarantee the safety of data.
File encryption-decryption layer includes document processing module, file redirection module, encryption and decryption service module.
Wherein, document processing module out of desktop using protection module for receiving the text of the application program in virtual desktop Part operation requests, and file redirection module and encryption and decryption service module is called to respond this document operation requests.
Wherein, file redirection module is responsible for the file access (including reading and writing) of application program being redirected to specific bit It sets;
Encryption/decryption module is responsible for encrypting the file data of write-in using assignment algorithm, and by the file of reading Data are decrypted using assignment algorithm.
For the concrete function of modules in three-tier architecture in above-mentioned Fig. 1, here in conjunction with shown in Fig. 2 of the invention one The step flow chart of the access control method embodiment of kind application program is described in detail, this method can be applied to terminal Equipment can specifically include following steps:
Step 101, virtual desktop is created;
Wherein, as shown in Figure 1, when user selects creation virtual desktop in Windows original desktop, desktop management mould Block can call creation desktop working environment module to create a virtual desktop, and creation desktop working environment module is empty in creation When quasi- desktop, it is alternatively possible to context detection module before creation be called, to detect whether the environment of Windows meets creation void The condition of quasi- desktop.
Wherein, which can be customized condition, such as Windows has run predetermined software at present;Or memory Residue is greater than the conditions such as memory threshold.
Wherein, terminal device can be the arbitrary equipment with Windows operating system, such as PC (PC), pen Remember this computer, tablet computer, mobile phone etc..
Wherein, original desktop is the included original desktop of Windows system, is known technology, which is not described herein again.
So when the environment of Windows meets the condition of creation virtual desktop, then desktop working environment module is created then Windows api can be called to create virtual desktop, specifically, the CreateDesktop letter of windows system can be used Number creation virtual desktop, wherein virtual desktop is a container.
Step 102, at least one application program in original desktop is added to the virtual desktop;
Wherein, creation desktop working environment module can also be the void of creation in Windows original desktop according to user At least one application program in original desktop, is added to the void of the creation by least one application program of quasi- desktop selection Quasi- desktop.So on the virtual desktop, so that it may access control to these application programs.
That is, the application program in virtual desktop is all the application program installed in original desktop.
Step 103, if any one destination application starting in the virtual desktop is detected, to Windows's Preset function in function library carries out Inline Hook;
Wherein, the preset function includes default network access function, default clipbook handling function, presets at registration table Manage function;
Wherein, there is application program (any one APP, when starting referred to herein as target APP), in desktop in virtual desktop Network, clipbook control module and registration table redirection module can be injected into the process of target APP using protection module Location space.In this way, network, clipbook control module can network function library to Windows Key Functions, i.e., default net Network access function (such as connect function (i.e. network connection function), Sendto function are (that is, send number to a specified destination According to function), recvfrom function (for receiving data, and capturing the address of data transmission source)), the clipbook of Windows Key Functions in function library, i.e. default clipbook handling function (such as SetClipboardData function (is stored data Function on to clipbook), GetClipboardData function (i.e. from clipbook obtain data function), OleSetClipboard function (function of an IDataObject interface pointer is placed i.e. on clipbook), OleGetClipboard function (function of an IDataObject interface pointer is obtained i.e. from clipbook) etc.) it carries out Inline Hook operation, so as in function of the application call by Inline Hook, the correlation of interception target APP Network access operation and clipbook operation;In addition, registration table redirection module can also registry functions library to Windows Key Functions, i.e. default registration list processing function (such as ZwOpenKey function, ZwCreateKey function, ZwDeleteKey Function, ZwQueryKey function, ZwEnumerateValueKey function etc.) carry out Inline Hook operation, so as to Application call is by the function of Inline Hook, the pertinent registration table handling of interception target APP.
Wherein, the above registration list processing function is all known function, is specifically repeated no more.
Wherein, Hook mechanism allows application program to intercept and handle windows messaging or specified event etc..
Step 104, call request of the destination application to the preset function is intercepted and captured;
Wherein, when the target APP run in virtual desktop is to default network access function or default clipbook handling function When calling, then the network of the embodiment of the present invention, clipbook control module can intercept and capture the target APP and visit the default network Ask the call request of function or default clipbook handling function;At the target APP run in virtual desktop is to default registration table When managing function call, then the registration table redirection module of the embodiment of the present invention can intercept and capture the target APP to the default note The call request of volume list processing function.
Step 105, according to the parameter in preconfigured control strategy and the call request, it is determining with the parameter with And the corresponding target control strategy of the preset function;
Wherein, the target APP configuration control that the method for the embodiment of the present invention can in advance to operating in the virtual desktop Strategy, such as which type of call request of preset function is allowed and (let off), to which type of tune of preset function Refused with request, which type of call request of preset function is redirected.Therefore, it is necessary to according in call request Parameter, to determine target control plan corresponding with the parameter and called preset function in preconfigured control strategy Slightly.
I.e. using the target control strategy come handling the call request of the preset function to intercepting and capturing.
Step 106, the call request is allowed if the target control strategy is, in response to the call request tune With the preset function;
Step 107, if the target control strategy is to refuse the call request, in response to the call request, The call request is refused according to the default refusal strategy of the preset function, returns to refusal result;
Wherein, every kind of preset function is all provided with corresponding refusal strategy in advance.
Step 108, if the target control strategy is to redirect to the call request, according to the preset function The default strategy that redirects redirects the call request, and the default letter is called in the call request in response to redirection Number.
Wherein, if any one preset function in above-mentioned three kinds of preset functions is provided with the control plan of redirection in advance Slightly, then it can also be pre-configured with redirection strategy to the preset function, therefore, can be reset here according to the default of the preset function The call request of the preset function is redirected to strategy, call request redirection can be understood as to call request In parameter modify, to achieve the effect that redirection.
In this way, the embodiment of the present invention is by creation virtual desktop, and by one or more application programs in original desktop Be added to the virtual desktop, and in the virtual desktop any one destination application starting when, to default network access Function, default clipbook handling function, default registration list processing function carry out Inline Hook operation, then when the target is answered With program to it is above-mentioned any one be called by the function of Inline Hook when, the embodiment of the present invention can intercept and capture the tune The call request control that accesses (including permission, is refused and reset with request, and according to preconfigured control strategy To), so as to carry out various access controls such as network, clipbook, registration table to the application program in virtual desktop, really The access safety of breath information-preserving.
Optionally, in one embodiment, when the preset function includes default network access function, the calling is asked Parameter in asking includes the destination address section of network address to be visited;
That is, when user carries out the operation of network access to the target APP run in virtual desktop, such as request When accessing the content of some link, then step 104 can be intercepted to the connect function of network access (in advance by Inline Hook call request), wherein the parameter in the call request includes the IP address of link to be visited (i.e. network address) Section.
Correspondingly, when executing step 105 then network access function preset configuration can be preset differently according to being directed to Location section from the corresponding relationship of different control strategies, determine the corresponding target control strategy of the destination address section.
Wherein, since default network access function may include that network accesses relevant multiple Key Functions, the present invention is real Control strategy can be pre-configured with to the Key Functions of each network access in advance by applying example.
Different control plans can have due to the difference of its parameter for the Key Functions of any one network range Slightly.
So by taking connect function here as an example, can different IP addresses section to the network address of link configure Different control strategies.Such as the link to IP address section 1, when by calling connect function to access, control strategy is Allow to access;Link to IP address section 2, when by calling connect function to access, control strategy is denied access; Link to IP address section 3, by call connect function access when, control strategy attach most importance to orientation visit (such as will adjust It is adjusted with the parameter in request, so that the call request redirected may only access one in the webpage of IP address section 3 Divide web page contents;Alternatively, the call request redirected is made to remove the web page contents in the webpage of accessible IP address section 4).
In this way, the embodiment of the present invention can carry out the control of network access to the target APP run in virtual desktop.
Optionally, the parameter packet when the preset function includes default clipbook handling function, in the call request It is corresponding to include the first desktop mark belonging to text to be pasted, the corresponding source file of the text to be pasted, the text to be pasted File destination belonging to the second desktop mark;
That is, when user carries out the key operation of clipbook to the target APP run in virtual desktop, such as it is right Some content of text in target APP is replicated, it is desirable to paste another desktop (can be original desktop or other Virtual desktop) when, then step 104 can intercept the call request to clipbook paste function (in advance by Inline Hook), Wherein, the parameter in the call request includes text to be pasted, first belonging to the corresponding source file of the text to be pasted Second desktop mark belonging to desktop mark, the corresponding file destination of the text to be pasted;
Wherein, when replicating paste operation, or when shearing paste operation, the text to be pasted for being replicated/shearing belongs to One source file.Such as the target APP in the present embodiment is operated in virtual desktop 1, user is in virtual desktop 1 to target The content in some file (i.e. source file) in APP replicate/shear, it is desirable to paste another virtual desktop 2 or In another file (i.e. file destination) of original desktop.So system is to not only including being cut in the call request of paste operation The text to be pasted cut/replicated further includes that the desktop mark of virtual desktop 1 and the desktop of 2/ original desktop of virtual desktop identify.
Wherein, clipbook is system share, data be also it is shared, by being carried out to default clipbook handling function Hook can obtain out information to be pasted is which process to be copied to clipbook from, so as to know data source and correlation Desktop controls information, therefore the control of clipbook between different virtual desktops may be implemented.
Correspondingly, can be then accomplished by the following way when executing step 105:
It is identical to judge that the first desktop mark and second desktop identify whether;
If they are the same, then target control plan is determined according to the control strategy for default clipbook handling function preset configuration Slightly the call request is allowed;
Wherein, if it is identical, illustrate user in virtual desktop 1 to the content in some file in target APP into Row duplication stickup/shearing paste operation when, only carry out in same virtual desktop clipbook operation, i.e., by duplication or shearing Content is wanted to paste in the file destination in the virtual desktop 1, wherein the file destination can be in target APP, can also With other APP being added in virtual desktop 1.In addition, source file and file destination can also be identical.
So due to the operation that the duplication/shearing paste operation is in the same virtual desktop, hence, it can be determined that this The control strategy of call request is to let off to it.So system can call the default clipbook handling function to carry out same Text duplication/cut and paste operation in one virtual desktop.
Wherein, presetting clipbook handling function may include that multiple clipbooks operate relevant Key Functions.These are crucial The preconfigured control strategy of function is then let off and is not handled if it is the clipbook operation in the same virtual desktop;If It is the clipbook operation between different virtual desktops, then refuses the call request.
If it is different, then determining target control plan according to the control strategy for default clipbook handling function preset configuration Slightly the call request is refused;
Wherein, if it is different, then illustrate user in virtual desktop 1 to the content in some file in target APP into When row duplication stickup/shearing paste operation, it is desirable to by text to be pasted paste another desktop (can be original desktop, its His virtual desktop) in file destination in, wherein the file destination can be in target APP.
So since the duplication/shearing paste operation is between the operation different desktops, hence, it can be determined that the calling The control strategy of request is to refuse it.
So when executing step 107, if the target control strategy is to refuse the call request, in response to institute State call request, according to the default clipbook handling function default refusal strategy to described in the call request to viscous Patch text carries out default modification, returns to modification result, wherein the default modification includes that character empties or to upset character arrangements suitable Sequence.
Wherein, when the call request of the Key Functions to clipbook relevant operation is refused, the mode of refusal then may be used It is modified to the text to be pasted in the call request with to be, such as text to be pasted is emptied or to upset character arrangements suitable The modes such as sequence modify to it, then, in response to the call request, modified text to be pasted are back to and is stuck Position in.In this way, the content being stuck is the content being modified, it is ensured that this virtual desktop in another desktop Interior information security.
Optionally, the default registration list processing function includes registration table write-in function, when the preset function includes institute When stating registration table write-in function, the parameter in the call request includes original road of the project to be written in original licensed table Diameter, the object key of the project to be written, the target value of the object key;
That is, when user carries out registration table write operation to the target APP that runs in virtual desktop, then step 104 can intercept the call request to the write-in function (in advance by Inline Hook) of the registration table of this virtual desktop, In, the parameter in the call request includes original path of the project to be written in original licensed table, the project to be written The target value of object key, the object key;
Wherein, the structure of registration table is the tree-like directory that each project is constituted, wherein each project has one or more Key, each key can assign value.
So due in virtual desktop target APP request to registration table carry out write operation, then meeting in the call request Carry original path of the project of this secondary write-in in original licensed table, and this secondary write-in project which key (i.e. Object key), and to the value of key write-in, i.e. target value.
Correspondingly, when executing step 105, then it can be according to preconfigured for the default registration table write-in function Parameter in control strategy and the call request, it is determining corresponding with the parameter and the default registration table write-in function Target control strategy is to redirect to the call request;
Wherein, in order to ensure being independent from each other between different desktops to the operation of registration table, the embodiment of the present invention is preparatory It is to be redirected to the call request of the function to the registration table write-in preconfigured control strategy of function.
Correspondingly, can be then accomplished by the following way when executing step 108:
If the target control strategy is to redirect to the call request, according to the original path described original Creation redirects registration table in the sub-key of the object key of registration table;
It is illustrated using the bibliographic structure of original licensed table as tree, wherein each item in original licensed table Mesh be trunk in tree, project key be the leaf of trunk, the value of key is the color of leaf, is written in this registration table Want to be revised as the color of the leaf 1 (object key) of the trunk 1 (destination item) in tree green (target value) in operation, then Modification in order to avoid the APP in virtual desktop directly to the value of the object key of the destination item in original licensed table, the present invention Embodiment can be according to the original path of the leaf 1 in entire tree, and re-creating one tree, (this sets not certainly All Paths with original licensed table only sketch out the original path of leaf 1 to come), then the one tree re-created Tree root be then to create on the cotyledon (i.e. sub-key) of the leaf 1.Here the one tree re-created is exactly to redirect note Volume table.In this way, also having trunk 1 (referred to herein as trunk 1 '), leaf 1 in redirecting registration table (referred to herein as leaf 1 ').
The original path in the call request is revised as the project to be written in the redirection registration table In redirected path;
For example, this wants to repair the value of the color key in the color file (destination item) under root catalogue Change, then it is color key in color file under root catalogue that original path, which is redirected path, and redirected path is original The color key in the color file under root catalogue under color key in path.
Call request in response to redirection calls the default registration table that function is written, and the target value is written to institute State the value for redirecting the object key of the redirected path in registration table.
Here, it can the color file under the root catalogue under the color key into original path is written into target value In the numerical value of color key in folder.
The embodiment of the present invention is from the angle of actual demand and application, more desktop security works based on windows platform Make environment, it, can be to the application in newly-built desktop working environment using HOOK technology (control clipbook, network, registration table etc.) Program carries out comprehensive access control.
Optionally, when registration table redirection module is intercepted to registration table read operation, if redirected in registration table There are the key assignments of destination item to be read, then directly read the key assignments, if it does not exist, then reading from original licensed table should Key assignments, and redirect registration table in draw the key assignments where catalogue.
Optionally, after step 102, can also include: according to the method for the embodiment of the present invention
If default microfiltration driving detects the file of the destination application of any one starting in the virtual desktop Operation requests judge file operation type then according to the file operation requests;
Wherein, microfiltration frame (Minifilter) of the embodiment of the present invention based on Microsoft, develops the embodiment of the present invention The driving of default microfiltration, wherein default microfiltration driving can be registered to microsoft system in advance.In the virtual desktop Any file operation requests require by this preset microfiltration driving be filtered after, can just carry out file read-write.
Wherein, the default microfiltration driving configuration is in the document processing module of Fig. 1.
If user wants to open, read, write-in file data using the target APP of starting in the virtual desktop, should After file operation requests to inner nuclear layer, by the file microfiltration frame driving A adapter tube of Microsoft, then, Microsoft's microfiltration frame is driven Dynamic A calls the microfiltration driving B to its embodiment of the present invention registered to handle this document operation requests, and microfiltration drives Dynamic B judges that the file operation type of this document operation requests is to open file, read file, or file data is written.
Wherein, the mark for indicating file operation type can be carried in file operation requests.Microfiltration is driven through the mark To determine the file operation type of file operation requests.
If file operation type is to open file, it is determined that file destination title and mesh in the file operation requests Mark original directory of the file in original desktop;
Wherein, if file operation type is to open file, i.e. target APP wants to open a file, then file operation is asked It asks, i.e., the title and file C that open file C (file destination) can be recorded in file open request are in original desktop In original directory.
According to the structure of the original directory in the corresponding memory space of the virtual desktop to the original directory into Row redirects, and obtains the redirection catalogue of the file destination;
Wherein, when one virtual desktop of every creation, the embodiment of the present invention can distribute individual blank for the virtual desktop Memory space, then in the virtual desktop operate application program caused by any file data be all stored in the storage sky Between.
And in order to ensure, to the independence of the operation of same file, avoiding interfering with each other between different desktops, the present invention is real Apply example can according to file C the original directory of original desktop structure, to be drawn again in memory space to the structure System, to obtain redirection catalogue of this document C in the virtual desktop.
Wherein, the structure of the original directory of file C and redirection catalogue is completely the same, but they are located at not In same memory space.
The file destination with the file destination title in the original directory of the original desktop is copied to At the redirection catalogue of the virtual desktop;
Wherein, since, there are no specific file data, text is opened in target APP request here in the catalogue of above-mentioned redirection Part C, therefore, it is necessary to read the file C of the file destination title from the original directory of original desktop, and by the data of file C It is copied at the redirection catalogue of the virtual desktop.
That is, really storing the data of file C at the redirection catalogue of the memory space.
In response to file operation requests, the mesh with the file destination title redirected at catalogue is opened Mark file.
Here, i.e., in response to file open request, the file C at the redirection catalogue in the memory space is opened, and simultaneously The file C being not switched under the original directory of original desktop.
In this way, the embodiment of the present invention can realize the access control to different application, Jin Erke on different desktops To separate sensitive applications with original desktop, the secure access of application, anti-stopping leak are realized in the case where not increasing cost Close generation.
Optionally, if the default microfiltration driving detects the target application of any one starting in the virtual desktop The file operation requests of program are then implemented after judging file operation type according to the file operation requests according to the present invention Example method can also include:
If file operation type is file write operation, it is determined that the file destination title in the file operation requests, with And original directory of the file destination in original desktop;
Wherein, if file operation type is file write operation, i.e. target APP wants to carry out write operation to a file, that This document operation requests can record the title of the file C (file destination) for the data write, Yi Jiwen in file write request Original directory of the part C in original desktop.
According to the structure of the original directory in the corresponding memory space of the virtual desktop to the original directory into Row redirects, and obtains the redirection catalogue of the file destination;
Wherein, the specific descriptions for specifically performing similarly to last File Open embodiment of the step, which is not described herein again.
File destination in the original directory of the original desktop is copied to described in the virtual desktop and is reset To at catalogue;
Wherein, the specific descriptions for specifically performing similarly to last File Open embodiment of the step, which is not described herein again.
In response to file operation requests, write operation is carried out to the file destination at the redirection catalogue;
Wherein it is possible to be counted in response to file write request to the file destination at the redirection catalogue of the virtual desktop According to write operation, wherein the data for needing to be written carry in file write request.
The file destination after write operation is encrypted according to predetermined encryption algorithm.
Wherein, after writing, document processing module may call upon encryption and decryption service module, according to predetermined encryption Algorithm carries out encryption storage to the file destination (i.e. the full content of file) after the write operation at the redirection catalogue.
It is individually saved in this way, the application program in virtual desktop can be operated the file data generated by the embodiment of the present invention In specific region, refuse the application program in other desktops except the virtual desktop to the data access of the specific region.
It is understood that when the embodiment of the present invention creates multiple virtual desktops, even if each virtual desktop is to same One application program is operated, but each file data caused by operating all is to be stored separately on each virtual desktop pair The memory space answered, and the application program will not be changed in the initial data of original desktop, also, different virtual desktops institute The data of generation may only be accessed by the application program in respective virtual desktop, refused the application access of other desktops, both guaranteed Not modified arbitrarily of the initial data of original desktop, moreover, mutually independent answer can be executed in different virtual desktops With the access control of program.
Optionally, if the default microfiltration driving detects the target application of any one starting in the virtual desktop The file operation requests of program are then implemented after judging file operation type according to the file operation requests according to the present invention Example method can also include:
If file operation type is file read operation, it is determined that the file destination title in the file operation requests, with And original directory of the file destination in original desktop;
Wherein, if file operation type is file write operation, i.e. target APP wants to carry out read operation to a file, that This document operation requests can record the name of the file C (file destination) where the data to be read in file read request The original directory of title and file C in original desktop.
Redirection catalogue of the file destination in the virtual desktop is determined according to the original directory;
Wherein, defaulted in the virtual desktop here and the original directory of file C is redirected, it therefore, can be with Redirection catalogue is directly determined according to the original directory.
Certainly, if in other embodiments, if by the memory space to virtual environment lookup discovery do not have Standby file C, then can draw the redirection catalogue of file destination according to the method for the embodiment of the write operation of file destination C, And file destination C is stored encrypted in and is redirected at catalogue;
It is specifically described referring to above-mentioned file write operation embodiment, which is not described herein again.
According to default decipherment algorithm to it is described redirection catalogue at the file destination with the file destination title into Row decryption;
Wherein, since the file in the redirection catalogue in virtual desktop is all encryption storage, it can be by adding solution Close service module according to default decipherment algorithm is decrypted file destination C, obtains file C in plain text.
Wherein, decryption oprerations can execute in memory, so that redirecting the file C in catalogue after this reads file C Or encryption storage.
In response to file operation requests, read operation is carried out to the file destination after decryption, returns and reads result.
Wherein it is possible to be read out in response to file read request to the file destination after decryption, by the file data of reading Upper layer target APP is returned in plain text.
By means of the technical solution of the embodiment of the present invention, when creating multiple virtual desktops, even if each virtual desktop The same application program is operated, but each file data caused by operating all is to be stored separately on each virtual table The corresponding memory space in face, and the application program will not be changed in the initial data of original desktop, also, different virtual tables Data caused by face may only be accessed by the application program in respective virtual desktop, refuse the application access of other desktops, both It ensure that not modified arbitrarily for the initial data of original desktop, moreover, can execute in different virtual desktops mutually indepedent Application program access control.
Optionally, can also include: according to the method for the embodiment of the present invention
If closing the virtual desktop, according to preconfigured data scrubbing strategy, to being generated in the virtual desktop Ephemeral data and/or redirect data be purged.
Wherein, if user closes the virtual desktop, the desktop working environment module shown in FIG. 1 that exits can be with Calling exits rear environment cleaning modul and comes according to preconfigured data scrubbing strategy, interim to generating in the virtual desktop Data and/or redirection data are purged.
Wherein, the operations such as which can be above-mentioned File Open, file is read, file write-in generate any one Kind or all files data, and any one that redirects data then and can be in above-described embodiment redirects data.
Which data is specifically cleared up, then is determined according to preconfigured data scrubbing strategy.Wherein, the embodiment of the present invention The data scrubbing strategy of the virtual desktop created at present can be formulated previously according to user demand, such as only cleaning redirects Data;Or only clear up ephemeral data etc..
Optionally, after step 102, can also include: according to the method for the embodiment of the present invention
If detecting the access request of any one application program, judge whether the application program is the virtual desktop Interior destination application;
Wherein, it in the virtual desktop created, if detecting the access request of any one application program, needs First determine whether the application program is application program in the virtual desktop, referred to herein as destination application.
If it is not, then refusing the access request.
In this way, the embodiment of the present invention can only receive in this desktop in the virtual desktop after creating virtual desktop Routine access, and refuse the application access in other desktops, so as to reach to the different application in different virtual desktops Access control.
Wherein, the virtual desktop created in above-described embodiment can be multiple, their working principle is similar, here no longer It repeats.
It, can be based on the safe work of more desktops of windows platform by means of the technical solution of the above embodiment of the present invention Make environment, is carried out using HOOK technical controlling clipbook, network, registration table etc. and to the file data generated in virtual desktop File redirection and encryption and decryption operation carry out omnibearing protection to the working environment of newly-built virtual desktop.
After entering some virtual desktop, clipbook operation, the registration list processing, net of the application program in the virtual desktop Network operation will be protected, and encrypted storage is arrived specified region by the file data of generation, and refuses non-virtual desktop ring Domestic application access (for example, the catalogue of file redirection is the position 1 of C disk by this virtual desktop, then the journey in other desktop Sequence cannot access the position).
In addition, the access profile of application program can individually be set in each virtual desktop, and generated in each virtual desktop Data are mutually isolated, mutually invisible.
When exiting any one virtual desktop, (it can be pre-configured with according to configuration and whether remain registered with table, redirect catalogue In file etc.) decide whether to retain the data generated in the virtual desktop.
The virtual desktop of creation of the embodiment of the present invention, can not change user to the premise of the operating habit of application program Under, the comprehensive controls such as clipbook, registration table, network, file are carried out to application program, even if the hard disk of the virtual desktop (should Data in virtual desktop are stored in the hard disk) be detached from the machine can also be protected since the data in the hard disk are encrypted The data safety generated in desktop security working environment, prevents unauthorized access.
In addition, the virtual desktop of the embodiment of the present invention can realize different desktop access different applications according to user demand, it will Sensitive application is separated with ordinary desktop, and the secure access of application is realized in the case where not increasing cost, prevents generation of divulging a secret.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented Necessary to example.
It is corresponding with method provided by the embodiments of the present invention, referring to Fig. 3, show a kind of application program of the present invention Access control apparatus embodiment structural block diagram, be applied to terminal device, can specifically include following module:
Creation module 31, for creating virtual desktop;
Adding module 32, at least one application program in original desktop to be added to the virtual desktop;
Hook module 33, it is right if any one destination application starts in the virtual desktop for detecting Preset function in the function library of Windows carries out Inline Hook, wherein the preset function includes default network access Function, default clipbook handling function, default registration list processing function;
Interception module 34, for intercepting and capturing call request of the destination application to the preset function;
First determining module 35, for determining according to the parameter in preconfigured control strategy and the call request Target control strategy corresponding with the parameter and the preset function;
First respond module 36, if being to allow the call request for the target control strategy, in response to institute It states call request and calls the preset function;
Second respond module 37, if being to refuse the call request for the target control strategy, in response to institute Call request is stated, the call request is refused according to the default refusal strategy of the preset function, returns to refusal result;
Third respond module 38, if being to be redirected to the call request for the target control strategy, according to institute The default redirection strategy for stating preset function redirects the call request, and the call request in response to redirection is called The preset function.
Optionally, first determining module 35 includes:
First determines submodule, for when the preset function includes default network access function, wherein the calling Parameter in request includes the destination address section of network address to be visited, according to for default network access function preset configuration Different address section and the corresponding relationship of different control strategies, determine the corresponding target control strategy of the destination address section.
Optionally, first determining module 35 includes:
Judging submodule, for when the preset function includes default clipbook handling function, wherein the calling is asked The parameter asked include text to be pasted, the first desktop mark belonging to the corresponding source file of the text to be pasted, it is described to The mark of second desktop belonging to the corresponding file destination of paste text judges the first desktop mark and the second desktop mark Whether identical know;
Second determines submodule, for if they are the same, then basis to be for the control for presetting clipbook handling function preset configuration Strategy determines that target control strategy is to allow the call request;
Third determines submodule, for if it is different, then according to the control for default clipbook handling function preset configuration Strategy determines that target control strategy is to refuse the call request;
Second respond module 37 includes:
Second response submodule, if being to refuse the call request for the target control strategy, in response to institute State call request, according to the default clipbook handling function default refusal strategy to described in the call request to viscous Patch text carries out default modification, returns to modification result, wherein the default modification includes that character empties or to upset character arrangements suitable Sequence.
Optionally, first determining module 35 includes:
4th determines submodule, described pre- for including registration table write-in function when the default registration list processing function If function includes the registration table write-in function, the parameter in the call request includes project to be written in original licensed table In original path, the project to be written object key, the target value of the object key, according to be directed to the default registration table The parameter in the preconfigured control strategy of function and the call request, determining and the parameter and the default note is written The corresponding target control strategy of volume table write-in function is to redirect to the call request;
The third respond module 38 includes:
Submodule is created, if being to redirect to the call request for the target control strategy, according to the original Beginning path creates in the sub-key of the object key of the original licensed table redirects registration table;
Submodule is modified, for the original path in the call request to be revised as the project to be written in institute State the redirected path redirected in registration table;
Third responds submodule, calls the default registration table that function is written for the call request in response to redirection, The target value is written to the value of the object key of the redirected path into the redirection registration table.
Optionally, described device further include:
First judgment module, if the mesh for detecting that any one starts in the virtual desktop for presetting microfiltration driving The file operation requests of mark application program judge file operation type then according to the file operation requests;
Second determining module, if being to open file for file operation type, it is determined that mesh in the file operation requests Mark the original directory of file name and file destination in original desktop;
First redirection module, for the structure according to the original directory in the corresponding memory space of the virtual desktop In the original directory is redirected, obtain the redirection catalogue of the file destination;
First replication module, for there is the file destination title in the original directory by the original desktop File destination be copied at the redirection catalogue of the virtual desktop;
4th respond module, in response to file operation requests, opening described redirect at catalogue to have the mesh Mark the file destination of file name.
Optionally, described device further include:
Third determining module, if being file write operation for file operation type, it is determined that in the file operation requests Original directory in original desktop of file destination title and file destination;
Second redirection module, for the structure according to the original directory in the corresponding memory space of the virtual desktop In the original directory is redirected, obtain the redirection catalogue of the file destination;
Second replication module is copied to the void for the file destination in the original directory by the original desktop At the redirection catalogue of quasi- desktop;
5th respond module, for being carried out to the file destination at the redirection catalogue in response to file operation requests Write operation;
Encrypting module, for being encrypted according to predetermined encryption algorithm to the file destination after write operation.
Optionally, described device further include:
4th determining module, if being file read operation for file operation type, it is determined that in the file operation requests Original directory in original desktop of file destination title and file destination;
5th determining module, for determining weight of the file destination in the virtual desktop according to the original directory Orient catalogue;
Deciphering module, for there is the file destination title at the redirection catalogue according to default decipherment algorithm File destination be decrypted;
6th respond module, for carrying out read operation to the file destination after decryption, returning in response to file operation requests Readback takes result.
Optionally, described device further include:
Module is removed, if for closing the virtual desktop, according to preconfigured data scrubbing strategy, to the void The ephemeral data and/or redirection data generated in quasi- desktop is purged.
Optionally, described device further include:
Second judgment module, if judging the application program for detecting the access request of any one application program It whether is destination application in the virtual desktop;
Refuse module, if determining application program not for the second judgment module and being the target application journey in the virtual desktop Sequence then refuses the access request.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
The access control of access control method to a kind of application program provided by the present invention and a kind of application program above Device processed, is described in detail, and used herein a specific example illustrates the principle and implementation of the invention, The above description of the embodiment is only used to help understand the method for the present invention and its core ideas;Meanwhile for the one of this field As technical staff, according to the thought of the present invention, there will be changes in the specific implementation manner and application range, to sum up institute It states, the contents of this specification are not to be construed as limiting the invention.

Claims (14)

1. a kind of access control method of application program, which is characterized in that be applied to terminal device, which comprises
Create virtual desktop;
At least one application program in original desktop is added to the virtual desktop;
If any one destination application starting in the virtual desktop is detected, to pre- in the function library of Windows If function carries out Inline Hook, wherein the preset function includes default network access function, default clipbook operation letter Number, default registration list processing function;
Intercept and capture call request of the destination application to the preset function;
According to the parameter in preconfigured control strategy and the call request, determining and the parameter and the default letter The corresponding target control strategy of number;
If the target control strategy is to allow the call request, the default letter is called in response to the call request Number;
If the target control strategy is to refuse the call request, in response to the call request, according to described default The default refusal strategy of function refuses the call request, returns to refusal result;
If the target control strategy is to redirect to the call request, according to the default redirection plan of the preset function Slightly the call request is redirected, the preset function is called in the call request in response to redirection.
2. the method according to claim 1, wherein when the preset function includes default network access function When, the parameter in the call request includes the destination address section of network address to be visited;
The parameter according in preconfigured control strategy and the call request, it is determining with the parameter and described pre- If the corresponding target control strategy of function, comprising:
According to the different address section for presetting network access function preset configuration and the corresponding relationship of different control strategies is directed to, determine The corresponding target control strategy of the destination address section.
3. the method according to claim 1, wherein when the preset function includes default clipbook handling function When, the parameter in the call request includes text to be pasted, the first table belonging to the corresponding source file of the text to be pasted Second desktop mark belonging to face mark, the corresponding file destination of the text to be pasted;
The parameter according in preconfigured control strategy and the call request, it is determining with the parameter and described pre- If the corresponding target control strategy of function, comprising:
It is identical to judge that the first desktop mark and second desktop identify whether;
If they are the same, then determine that target control strategy is according to the control strategy for default clipbook handling function preset configuration The call request is allowed;
If it is different, then determining that target control strategy is according to the control strategy for default clipbook handling function preset configuration The call request is refused;
If the target control strategy is to refuse the call request, in response to the call request, according to described The default refusal strategy of preset function refuses the call request, returns to refusal result, comprising:
If the target control strategy is to refuse the call request, in response to the call request, according to described default The default refusal strategy of clipbook handling function carries out default modification to the text to be pasted in the call request, returns Modify result, wherein the default modification includes that character empties or upset character arrangements sequence.
4. the method according to claim 1, wherein the default registration list processing function includes registration table write-in Function, when the preset function includes the registration table write-in function, the parameter in the call request includes item to be written Object key, the target value of the object key of original path of the mesh in original licensed table, the project to be written;
The parameter according in preconfigured control strategy and the call request, it is determining with the parameter and described pre- If the corresponding target control strategy of function, comprising:
The parameter in the preconfigured control strategy of function and the call request is written according to for the default registration table, really Fixed target control strategy corresponding with the parameter and the default registration table write-in function is to reset to the call request To;
If the target control strategy is to redirect to the call request, default according to the preset function is reset The call request is redirected to strategy, the preset function is called in the call request in response to redirection, comprising:
If the target control strategy is to redirect to the call request, according to the original path in the original licensed Creation redirects registration table in the sub-key of the object key of table;
The original path in the call request is revised as the project to be written in the redirection registration table Redirected path;
Call request in response to redirection calls the default registration table that function is written, and the target value is written to described heavy Orient the value of the object key of the redirected path in registration table.
5. the method according to claim 1, wherein described at least one application program by original desktop adds It adds to after the virtual desktop, the method also includes:
If default microfiltration driving detects the file operation of the destination application of any one starting in the virtual desktop Request, then according to the file operation requests, judge file operation type;
If file operation type is file write operation, it is determined that file destination title and mesh in the file operation requests Mark original directory of the file in original desktop;
Weight is carried out to the original directory in the corresponding memory space of the virtual desktop according to the structure of the original directory Orientation, obtains the redirection catalogue of the file destination;
File destination in the original directory of the original desktop is copied to the redirection mesh of the virtual desktop At record;
In response to file operation requests, write operation is carried out to the file destination at the redirection catalogue;
The file destination after write operation is encrypted according to predetermined encryption algorithm.
6. according to the method described in claim 5, it is characterized in that, if the default microfiltration driving detects the virtual table The file operation requests of any one destination application started judge file then according to the file operation requests in face After action type, the method also includes:
If file operation type is file read operation, it is determined that file destination title and mesh in the file operation requests Mark original directory of the file in original desktop;
Redirection catalogue of the file destination in the virtual desktop is determined according to the original directory;
The file destination with the file destination title at the redirection catalogue is solved according to default decipherment algorithm It is close;
In response to file operation requests, read operation is carried out to the file destination after decryption, returns and reads result.
7. the method according to claim 1, wherein the method also includes:
If closing the virtual desktop, according to preconfigured data scrubbing strategy, face what is generated in the virtual desktop When data and/or redirect data be purged;
After described at least one application program by original desktop is added to the virtual desktop, if detecting any one The access request of application program judges whether the application program is destination application in the virtual desktop;
If it is not, then refusing the access request.
8. a kind of access control apparatus of application program, which is characterized in that be applied to terminal device, described device includes:
Creation module, for creating virtual desktop;
Adding module, at least one application program in original desktop to be added to the virtual desktop;
Hook module, if any one destination application starts in the virtual desktop for detecting, to Windows's Preset function in function library carries out Inline Hook, wherein the preset function includes default network access function, presets Clipbook handling function, default registration list processing function;
Interception module, for intercepting and capturing call request of the destination application to the preset function;
First determining module, for according to the parameter in preconfigured control strategy and the call request, it is determining with it is described Parameter and the corresponding target control strategy of the preset function;
First respond module, if being to allow the call request for the target control strategy, in response to the calling Preset function described in request call;
Second respond module, if being to refuse the call request for the target control strategy, in response to the calling Request, refuses the call request according to the default refusal strategy of the preset function, returns to refusal result;
Third respond module, if being to be redirected to the call request for the target control strategy, according to described default The default redirection strategy of function redirects the call request, described pre- in response to the call request calling of redirection If function.
9. device according to claim 8, which is characterized in that first determining module includes:
First determines submodule, for when the preset function includes default network access function, wherein the call request In parameter include network address to be visited destination address section, according to for default network access function preset configuration not With the corresponding relationship of address field and different control strategies, the corresponding target control strategy of the destination address section is determined.
10. device according to claim 8, which is characterized in that
First determining module includes:
Judging submodule, for when the preset function includes default clipbook handling function, wherein in the call request Parameter include text to be pasted, it is the first desktop mark belonging to the corresponding source file of the text to be pasted, described to be pasted The mark of second desktop belonging to the corresponding file destination of text, judges the first desktop mark and second desktop mark is It is no identical;
Second determines submodule, is used for if they are the same, then basis is directed to the control strategy of default clipbook handling function preset configuration, Determine that target control strategy is to allow the call request;
Third determines submodule, for if it is different, then according to the control strategy for default clipbook handling function preset configuration, Determine that target control strategy is to refuse the call request;
Second respond module includes:
Second response submodule, if being to refuse the call request for the target control strategy, in response to the tune With request, according to the default refusal strategy of the default clipbook handling function to the text to be pasted in the call request This carries out default modification, returns to modification result, wherein the default modification includes that character empties or upset character arrangements sequence.
11. device according to claim 8, which is characterized in that
First determining module includes:
4th determines submodule, for including registration table write-in function, the default letter when the default registration list processing function When number includes registration table write-in function, the parameter in the call request includes project to be written in original licensed table Original path, the object key of the project to be written, the target value of the object key are written according to for the default registration table Parameter in the preconfigured control strategy of function and the call request, determining and the parameter and the default registration table It is to redirect to the call request that the corresponding target control strategy of function, which is written,;
The third respond module includes:
Submodule is created, if being to redirect to the call request for the target control strategy, according to the original road Diameter creates in the sub-key of the object key of the original licensed table redirects registration table;
Submodule is modified, for the original path in the call request to be revised as the project to be written described heavy Orient the redirected path in registration table;
Third responds submodule, calls the default registration table that function is written for the call request in response to redirection, by institute State the value of the object key for the redirected path that target value is written into the redirection registration table.
12. device according to claim 8, which is characterized in that described device further include:
First judgment module, if detecting that any one target started is answered in the virtual desktop for presetting microfiltration driving File operation type is judged then according to the file operation requests with the file operation requests of program;
Third determining module, if being file write operation for file operation type, it is determined that the mesh in the file operation requests Mark the original directory of file name and file destination in original desktop;
Second redirection module is right in the corresponding memory space of the virtual desktop for the structure according to the original directory The original directory redirects, and obtains the redirection catalogue of the file destination;
Second replication module is copied to the virtual table for the file destination in the original directory by the original desktop At the redirection catalogue in face;
5th respond module, for carrying out writing behaviour to the file destination at the redirection catalogue in response to file operation requests Make;
Encrypting module, for being encrypted according to predetermined encryption algorithm to the file destination after write operation.
13. device according to claim 12, which is characterized in that described device further include:
4th determining module, if being file read operation for file operation type, it is determined that the mesh in the file operation requests Mark the original directory of file name and file destination in original desktop;
5th determining module, for determining redirection of the file destination in the virtual desktop according to the original directory Catalogue;
Deciphering module, for according to default decipherment algorithm to it is described redirection catalogue at the mesh with the file destination title Mark file is decrypted;
6th respond module, for carrying out read operation to the file destination after decryption, returning and read in response to file operation requests Take result.
14. device according to claim 8, which is characterized in that described device further include:
Module is removed, if for closing the virtual desktop, according to preconfigured data scrubbing strategy, to the virtual table The ephemeral data and/or redirection data generated in face is purged;
Second judgment module, if whether judging the application program for detecting the access request of any one application program For the destination application in the virtual desktop;
Refuse module, if determining application program not for the second judgment module and being the destination application in the virtual desktop, Then refuse the access request.
CN201810798889.0A 2018-07-19 2018-07-19 Access control method and device for application program Active CN109117664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810798889.0A CN109117664B (en) 2018-07-19 2018-07-19 Access control method and device for application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810798889.0A CN109117664B (en) 2018-07-19 2018-07-19 Access control method and device for application program

Publications (2)

Publication Number Publication Date
CN109117664A true CN109117664A (en) 2019-01-01
CN109117664B CN109117664B (en) 2020-11-10

Family

ID=64863041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810798889.0A Active CN109117664B (en) 2018-07-19 2018-07-19 Access control method and device for application program

Country Status (1)

Country Link
CN (1) CN109117664B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096856A (en) * 2019-04-19 2019-08-06 奇安信科技集团股份有限公司 Access control method, system, electronic device and medium
CN110457925A (en) * 2019-08-12 2019-11-15 深圳市网心科技有限公司 Data isolation method, device, terminal and storage medium are applied in the storage of inside and outside
CN111539010A (en) * 2020-06-16 2020-08-14 北京明朝万达科技股份有限公司 Clipboard control method and device, electronic equipment and computer-readable storage medium
CN112269986A (en) * 2020-10-29 2021-01-26 深信服科技股份有限公司 Process management method, device and storage medium
CN112685745A (en) * 2020-12-31 2021-04-20 北京梆梆安全科技有限公司 Firmware detection method, device, equipment and storage medium
CN112905260A (en) * 2021-02-07 2021-06-04 深信服科技股份有限公司 Application starting method and device, electronic equipment and storage medium
CN113515389A (en) * 2020-04-09 2021-10-19 奇安信安全技术(珠海)有限公司 Calling method, device and system of intermediate interface, storage medium and electronic device
CN115543663A (en) * 2022-12-01 2022-12-30 北京志翔科技股份有限公司 Data processing method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314373A (en) * 2011-07-07 2012-01-11 李鹏 Method for realizing safe working environment based on virtualization technology
CN102821094A (en) * 2012-07-09 2012-12-12 深圳市深信服电子科技有限公司 Method and system for secure data processing in virtual desktop
CN103605930A (en) * 2013-11-27 2014-02-26 湖北民族学院 Double file anti-divulging method and system based on HOOK and filtering driving
CN103778384A (en) * 2014-02-24 2014-05-07 北京明朝万达科技有限公司 Identity authentication based virtual terminal safety environment protection method and system
CN104318179A (en) * 2014-10-30 2015-01-28 成都卫士通信息产业股份有限公司 File redirection technology based virtualized security desktop
EP3118768A1 (en) * 2015-07-17 2017-01-18 Backes SRT GmbH Method for forming a virtual environment in an operating system of a computer
CN106951775A (en) * 2016-01-06 2017-07-14 梁洪亮 A kind of safe-guard system based on operating system nucleus Intel Virtualization Technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314373A (en) * 2011-07-07 2012-01-11 李鹏 Method for realizing safe working environment based on virtualization technology
CN102821094A (en) * 2012-07-09 2012-12-12 深圳市深信服电子科技有限公司 Method and system for secure data processing in virtual desktop
CN103605930A (en) * 2013-11-27 2014-02-26 湖北民族学院 Double file anti-divulging method and system based on HOOK and filtering driving
CN103778384A (en) * 2014-02-24 2014-05-07 北京明朝万达科技有限公司 Identity authentication based virtual terminal safety environment protection method and system
CN104318179A (en) * 2014-10-30 2015-01-28 成都卫士通信息产业股份有限公司 File redirection technology based virtualized security desktop
EP3118768A1 (en) * 2015-07-17 2017-01-18 Backes SRT GmbH Method for forming a virtual environment in an operating system of a computer
CN106951775A (en) * 2016-01-06 2017-07-14 梁洪亮 A kind of safe-guard system based on operating system nucleus Intel Virtualization Technology

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096856A (en) * 2019-04-19 2019-08-06 奇安信科技集团股份有限公司 Access control method, system, electronic device and medium
CN110457925A (en) * 2019-08-12 2019-11-15 深圳市网心科技有限公司 Data isolation method, device, terminal and storage medium are applied in the storage of inside and outside
CN110457925B (en) * 2019-08-12 2023-05-09 深圳市网心科技有限公司 Application data isolation method and device in internal and external storage, terminal and storage medium
CN113515389A (en) * 2020-04-09 2021-10-19 奇安信安全技术(珠海)有限公司 Calling method, device and system of intermediate interface, storage medium and electronic device
CN113515389B (en) * 2020-04-09 2024-03-01 奇安信安全技术(珠海)有限公司 Method and device for calling intermediate interface, system, storage medium and electronic device
CN111539010B (en) * 2020-06-16 2023-09-01 北京明朝万达科技股份有限公司 Clipboard control method, device, electronic equipment and computer readable storage medium
CN111539010A (en) * 2020-06-16 2020-08-14 北京明朝万达科技股份有限公司 Clipboard control method and device, electronic equipment and computer-readable storage medium
CN112269986A (en) * 2020-10-29 2021-01-26 深信服科技股份有限公司 Process management method, device and storage medium
CN112685745A (en) * 2020-12-31 2021-04-20 北京梆梆安全科技有限公司 Firmware detection method, device, equipment and storage medium
CN112685745B (en) * 2020-12-31 2023-11-21 北京梆梆安全科技有限公司 Firmware detection method, device, equipment and storage medium
CN112905260A (en) * 2021-02-07 2021-06-04 深信服科技股份有限公司 Application starting method and device, electronic equipment and storage medium
CN112905260B (en) * 2021-02-07 2024-02-23 深信服科技股份有限公司 Application starting method and device, electronic equipment and storage medium
CN115543663A (en) * 2022-12-01 2022-12-30 北京志翔科技股份有限公司 Data processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109117664B (en) 2020-11-10

Similar Documents

Publication Publication Date Title
CN109117664A (en) The access control method and device of application program
AU2020200073B2 (en) Method and apparatus for multi-tenancy secrets management
CN104025544B (en) Sensitive information leakage prevention system, and sensitive information leakage prevention method
US20080052514A1 (en) Information Sharing System, Information Sharing Method, Group Management Program and Compartment Management Program
CN104268479B (en) A kind of method of text maninulation isolation, device and mobile terminal
JP2008276756A (en) Web services intermediary
JP2013521587A (en) Information protection using zones
CN111756621A (en) Method and device for managing data of group users and maintaining instant messaging group
CN102281141B (en) Document permission management method, apparatus and system
CN104462997B (en) Method, device and system for protecting work data in mobile terminal
CN103268456A (en) Method and device for file safety control
CN105530261B (en) The guard method of privacy information and device
CN107786551B (en) Method for accessing intranet server and device for controlling access to intranet server
CN105991565A (en) Reading and writing separation method and system and database agent server
CN103778379B (en) Application in management equipment performs and data access
CN106873958A (en) The call method and device of a kind of API
CN105162763A (en) Method and device for processing communication data
CN112651039A (en) Electric power data differentiation desensitization method and device fusing service scenes
CN108399341B (en) Windows dual file management and control system based on mobile terminal
US20110170674A1 (en) Apparatus, a mediating method, a program thereof and a system
CN107294930A (en) The management method and device of file propagation
CN106130968A (en) A kind of identity identifying method and system
CN111625843A (en) Data transparent encryption and decryption system suitable for big data platform
CN116488913A (en) Security access control method and device based on dynamic access of network environment
CN105205403A (en) Method and system for managing and controlling file data of local area network based on file filtering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant