Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides an intranet and extranet access control method and an access control system of a confidential computer.
According to a first aspect of the present invention there is provided a secret-related computer method comprising: setting a client network access strategy at a server, wherein the client network access strategy comprises that an internal network is forbidden to be accessed, an external network is forbidden to be accessed, a cloud control server is informed when the external network is connected, the client is quitted when the external network is connected, and a mail is sent when the external network is connected; wherein the client comprises an application layer and a driver layer; and the application layer loads the client network access strategy to the driver layer so that the driver layer performs network access control according to the loaded client network access strategy.
On the basis of the technical scheme, the invention can be improved as follows.
Optionally, the loading, by the application layer, the client network access policy to the driver layer, so that the driver layer performs network access control according to the loaded client network access policy, where the loading includes: when the client application layer is started, whether a computer is connected with an external network or not is judged according to a set client network access strategy, if so, whether a cloud control server needs to be informed or not, whether a client is started or not or whether a mail is sent to a designated mailbox or not is judged according to the client network access strategy when the computer is connected with the external network.
Optionally, when the client application layer judges whether to connect to the external network according to the set client network access policy, but the computer where the client is located is not currently connected to the external network, the network monitoring monitor is started for monitoring the network state of the computer where the client is located in real time; and when the state of the computer network where the client is located is monitored to be connected with an external network, informing the cloud control server according to the judgment whether the cloud control server is required to be informed, starting the client or sending a mail to a specified mailbox to execute corresponding operation.
Optionally, the method further includes: the client side automatically encrypts the confidential data to obtain the encrypted confidential data, the confidential data cannot be opened when leaving the confidential environment, and the client side cannot access the confidential data when quitting.
Optionally, the network access control is performed by the driver layer according to the loaded client network access policy, including: the client side driving layer is started, a filtering layer is added to filter all accesses of a computer where the client side is located, and when the computer where the client side is located has network access, an access port, an access process and an access destination IP are obtained through the filtering layer;
based on the access port, the access process and the access destination IP, judging the access type of the network, wherein the access type of the network comprises exception access, intranet access and extranet access;
and allowing the corresponding network access or blocking the corresponding network access based on the access type of the network and the set client network access policy.
Optionally, determining the access type of the network based on the access port, the access process, and the access destination IP includes: and judging whether the access is an exceptional access according to the access port and the access process, and judging whether the access is an intranet access IP or an extranet access IP according to the access destination IP.
Optionally, filtering all network accesses, and allowing or blocking network access based on the access type of the network and the set client network access policy, including:
when the access is exceptional access, the corresponding network access is allowed;
when the set client network access policy is to forbid intranet access and forbid extranet access, the corresponding network access is prevented;
when the set client network access strategy is that intranet access is forbidden but extranet access is allowed, if the access destination IP is the intranet access IP, the corresponding network access is prevented, and if the access destination IP is the extranet access IP, the corresponding network access is allowed;
when the set client network access policy is to allow intranet access and allow extranet access, corresponding network access is allowed;
and when the set client network access strategy is to allow intranet access but forbid extranet access, if the access destination IP is extranet access IP, preventing corresponding network access, and if the access destination IP is intranet access IP, allowing corresponding network access.
Optionally, the cloud control server is deployed in an external network, records relevant information of the confidential computer illegally connected to the external network, and sends a short message to the specified mobile phone according to the relevant information of the confidential computer illegally connected to the external network.
According to a second aspect of the present invention, an intranet and extranet access control system of a confidential computer is provided, including a server and a client, where the client includes an application layer and a driver layer;
the server is used for setting a client network access strategy, wherein the client network access strategy comprises that an internal network is forbidden to be accessed, an external network is forbidden to be accessed, a cloud control server is informed when the external network is connected, the client is quitted when the external network is connected, and a mail is sent when the external network is connected;
and the application layer of the client is used for loading the client network access strategy to the driver layer so as to enable the driver layer to carry out network access control according to the loaded client network access strategy.
Optionally, the client driver layer is started, and is further configured to add a filter layer to filter all network accesses of the computer where the client is located, and when the machine where the client is located has network access, the filter layer is used to obtain an access port, an access process, and an access destination IP;
the client driver layer is further used for judging the access type of the network based on the access port, the access process and the access destination IP, wherein the access type of the network comprises exception access, intranet access and extranet access; and filtering all network accesses based on the access types of the networks and the set client network access policy, and allowing the corresponding network access or preventing the corresponding network access.
The invention provides an internal and external network access control method and an access control system of a confidential computer.A client network access strategy is set at a server, wherein the client comprises an application layer and a drive layer; the application layer loads the client network access strategy to the driver layer so that the driver layer performs network access control according to the loaded client network access strategy.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Fig. 1 is a flowchart of an intranet and extranet access control method for a confidential computer provided in the present invention, and as shown in fig. 1, the method includes: 101. setting a client network access strategy at a server, wherein the client network access strategy comprises that an internal network is forbidden to be accessed, an external network is forbidden to be accessed, a cloud control server is informed when the external network is connected, the client is quitted when the external network is connected, and a mail is sent when the external network is connected; wherein the client comprises an application layer and a driver layer; 102. and the application layer loads the client network access strategy to the driver layer so that the driver layer performs network access control according to the loaded client network access strategy.
It can be understood that, based on the defects in the background art, the embodiment of the present invention provides a method capable of ensuring the secure network access of a confidential computer, specifically, when a client computer accesses a network, a network access policy of a computer where each client is located may be set at a server, where the network access policy mainly includes network access policies such as prohibiting access to an intranet, prohibiting access to an extranet, notifying a cloud control server when the extranet is connected, quitting the client when the extranet is connected, and sending a mail when the extranet is connected, and a schematic diagram of setting the client network access policy at the server may refer to fig. 2.
And the application layer of the client loads the client network access strategy into the driver layer according to the set client network access strategy, and the driver layer performs network access control according to the loaded client network access strategy.
For the confidential computers, the data security of the computers where the clients are located when accessing the internal and external networks is ensured by setting different network access strategies of the clients.
In a possible embodiment, the loading, by the application layer, the client network access policy to the driver layer, so that the driver layer performs network access control according to the loaded client network access policy includes: when the client application layer is started, whether the computer is connected with an external network is judged according to the set client network access strategy, if so, whether the cloud control server needs to be informed, whether the client is started or not or whether a mail is sent to a designated mailbox is judged according to the client network access strategy when the computer is connected with the external network.
It can be understood that when the client accesses the network, the client application layer is started, and whether the computer is connected to the external network is judged according to the set client network access policy, and if so, whether the cloud control server needs to be notified, whether the client is started, and whether the mail is sent to the designated mailbox is judged according to the client network access policy. When the computer is not connected with the external network currently, the client starts the network monitoring monitor to monitor the network change state of the computer in real time. When the computer is monitored to be connected with the external network, corresponding operations are executed according to the three control items (i.e. whether to notify the cloud control server, whether to start the client or whether to send a mail to a designated mailbox), as shown in fig. 3.
In a possible implementation manner, the method further includes: the client side automatically encrypts the confidential data to obtain the encrypted confidential data, the confidential data cannot be opened when leaving the confidential environment, and the confidential data cannot be accessed when the client side quits.
In order to improve the security of the confidential data of the confidential computer, the client has a transparent encryption and decryption function and can automatically encrypt and decrypt the confidential data, the encrypted confidential data cannot be opened when leaving the confidential environment, and the ciphertext of the local computer cannot be accessed when the client quits.
In a possible embodiment, the method for controlling network access by the driver layer according to the network access policy loaded by the client application layer includes: the client driving layer is started, a filter layer is added to filter all network accesses of a computer where the client is located, and when the computer where the client is located has network accesses, an access port, an access process and an access destination IP are obtained through the filter layer; judging the access type of the network based on an access port, an access process and an access destination IP (Internet Protocol Address), wherein the access type of the network comprises exception access, intranet access and extranet access; and allowing the corresponding network access or blocking the corresponding network access based on the access type of the network and the set client network access policy.
It can be understood that when the computer where the client is located has network access, it needs to determine whether the network access type is intranet or extranet or exception access. Specifically, referring to fig. 4, when the WFP driver is started, an ALE CONNECT filter layer is added, an ICMP \ RDP \ TCP \ UDP Filters are added, all network accesses of the computer where the client is located are filtered, and when a network access exists, the driver performs an ALE CONNECT callback to obtain information such as a network access destination IP/port/process. And judging the access type of the network based on the access port, the access process and the access destination IP, wherein the access type of the network comprises exception access, intranet access and extranet access. And then filtering the network access based on the network access type and the set client network access policy, and allowing the corresponding network access or preventing the corresponding network access.
The method for judging the network access type based on the access port, the access process and the access destination IP comprises the following steps: and judging whether the access is an exceptional access according to the access port and the access process, and judging whether the access is an intranet access IP or an extranet access IP according to the access destination IP.
It is understood that, for example, whether the current access is an exceptional access is determined according to the process name or the domain name resolution port of the access, and whether the access destination IP is an intranet access IP or an extranet access IP is determined according to the access destination IP.
In a possible embodiment, the network access control process for the computer where the client is located may be as shown in fig. 4, and based on the network access type and the set client network access policy, allowing the corresponding network access or blocking the corresponding network access includes: when the access is exceptional access, the corresponding network access is allowed; when the set client network access policy is to forbid intranet access and forbid extranet access, the corresponding network access is prevented; when the set client network access strategy is to forbid intranet access but allow extranet access, if the access destination IP is the intranet access IP, the corresponding network access is prevented, and if the access destination IP is the extranet access IP, the network access of the confidential computer process is allowed; when the set client network access policy is to allow intranet access and allow extranet access, corresponding network access is allowed; and when the set client network access strategy is to allow intranet access but prohibit extranet access, if the access destination IP is extranet access IP, the corresponding network access is prevented, and if the access destination IP is intranet access IP, the corresponding network access is allowed.
In order to ensure normal access of the client and the server, the drive layer is exceptional from internal and external network access of a client process, namely, when the client process is judged, corresponding network access is directly allowed, and meanwhile, an exceptional internal network machine name resolution port and an exceptional external network domain name resolution port are driven, so that normal resolution of computer names or domain names of internal and external networks is ensured when the client process is not forbidden. The client does not influence the access control function of the drive to the internal network and the external network when exiting. The client side can authorize offline use, and the policy of the local cache can be loaded when the client side is used offline.
In a possible embodiment mode, the cloud control server is deployed in an external network, records relevant information of a secret-involved computer illegally connected with the external network, sends a short message to a specified mobile phone according to the relevant information of the secret-involved computer illegally connected with the external network, and can take measures for the secret-involved computer illegally connected with the external network.
Fig. 5 is a structural diagram of an intranet and extranet access control system of a confidential computer according to an embodiment of the present invention, including a server 51 and a client 52, where the client 52 includes an application layer 521 and a driver layer 522;
and the server 51 is used for setting a client network access policy, wherein the client network access policy comprises that an intranet is forbidden to be accessed, an extranet is forbidden to be accessed, a cloud control server is informed when the extranet is connected, the client is quitted when the extranet is connected, and a mail is sent when the extranet is connected.
The application layer 521 of the client is configured to load the client network access policy to the driver layer 522, so that the driver layer 522 performs network access control according to the loaded client network access policy.
In order to ensure the security of the confidential data of the confidential computer, the client 52 is configured to: the confidential data is automatically encrypted to obtain encrypted confidential data, the confidential data cannot be opened when leaving the confidential environment, and the confidential data cannot be accessed when the client 52 exits.
The client driver layer 522 is further configured to add a filter layer during startup to filter all network accesses of the computer where the client is located, and obtain an access port, an access process, and an access destination IP through the filter layer when all computers of the client access the network.
The client driver layer 522 is further configured to determine a network access type based on the access port, the access process, and the access destination IP, where the network access type includes an exception access, an intranet access, and an extranet access; and allowing the corresponding network access or blocking the corresponding network access based on the network access type and the set client network access policy.
It can be understood that the intranet and extranet access control system of the confidential computer provided by the present invention corresponds to the intranet and extranet access control method of the confidential computer provided by the foregoing embodiments, and the relevant technical features of the intranet and extranet access control system of the confidential computer may refer to the relevant technical features of the intranet and extranet access control method of the confidential computer, and are not described herein again.
The embodiment of the invention provides an internal and external network access control method and an access control system of a confidential computer.A client network access strategy is set at a server, wherein the client comprises an application layer and a drive layer; the application layer loads the client network access strategy to the driver layer so that the driver layer performs network access control according to the loaded client network access strategy.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow or block of the flowchart illustrations or block diagrams, and combinations of flows or blocks in the flowchart illustrations or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.