Method and system for safe operation of shell script based on sandbox technology

A safe operation and sandbox technology, applied in the field of information system security, can solve the problem that malicious scripts cannot provide security guarantees, and achieve the effect of enhancing security

Inactive Publication Date: 2011-12-21
ZHEJIANG UNIV CITY COLLEGE
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned operating system security policy based on user identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safe operation of shell script based on sandbox technology
  • Method and system for safe operation of shell script based on sandbox technology
  • Method and system for safe operation of shell script based on sandbox technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] figure 1 It shows the structure of the shell script safe running system based on the sandbox technology of the present invention. This computer system comprises operating system, shell script, controllable environment, security policy, security manager and accessible resource, wherein controllable environment, security policy, security manager constitute the present invention's shell script safe running system based on sandbox technology . A typical computer contains an operating system. Shell scripts can be downloaded from the network, hard disk, CD, etc. These scripts can be safe or unsafe. The scripts can run in the foreground or in the background. The source and code of the script will affect the security manager What kind of security policy to adopt.

[0025] The controllable environment refers to the shell applying the security policy of the present invention, and shell scripts can be run on the shell. The controlled environment can configure (eg load) security p

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sandbox technology-based safe operation method and system for shell scripts. The shell script security operating system of the sandbox technology includes a controllable environment, a security manager, security policies and resources; the controllable environment is used to identify controllable commands, uncontrollable commands or custom permissions from shell scripts; dynamically Create a sandbox and implement the security policy of the controllable command, uncontrollable command or custom permission; the security manager is used to extract the security policy of the controllable command, uncontrollable command or custom permission; the security policy is used Used to define the commands that are allowed to execute, and the resources that the commands can access. The invention runs the shell script in a controllable environment, and can effectively prevent malicious commands in the shell script from harming the system. The security manager provides a variety of security policies for the operation of shell commands, which limits the access rights of commands to resources in the sandbox and greatly enhances the security of script execution.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZHEJIANG UNIV CITY COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products