Summary of the invention
The present invention is directed to the deficiencies in the prior art and defective, a kind of content safety supervisory control system and method based on digital label is provided, make it be applicable to the enterprises classified network, certificate of necessity center is not supported, by network information medium being added the method for label, the transmission of important content on the managerial grid internet avoids data to be abused.The present invention is achieved through the following technical solutions, system of the present invention comprises: the client and server end, server end passes through proxy modules, the authentication server module is connected with client, server end is except common network information server, increased acting server, label office, strategic server, four modules of authentication server, label office module is connected with the authentication server module with proxy modules by network with the strategic server module, the network information server module is connected the rear end of proxy modules, avoids directly being visited by client.
Client has also increased a miscellaneous function module except generic browser, browser and miscellaneous function module are positioned at same computer, is connected with proxy modules, the authentication server module of server end by network.
Proxy modules is actually an enhancing version that common proxy modules has been increased new function.It can carry out the inquiry of searching label and control strategy after receiving user's request, and can whether send this information to client according to label and strategy decision, perhaps before information is sent to client content is encrypted.Proxy modules can be finished access control function, and when the user asked some pages, proxy modules is the label and the access control policy of this page of inquiry earlier, if strategy allows, then finish user's requested operation, otherwise, return show the operation unaccepted html page.
The later security strategy of information content issue is implemented by the authentication server module, in fact asks after a certain page as the user, and proxy modules returns to client is the page after encrypting.Deciphering to the page realizes by browser plug-in.Guaranteed in the time of insert design that the user can't preserve the page of plain code in this locality, but can preserve the page after the encryption.In the time of resource after user capture is downloaded like this, still need be by the checking of authentication server, and obtain decruption key.To guarantee to decipher the back when it is pointed out that insert design here and destroy key, by the authentication server module can guarantee user's download Internet resources still can continue to implement security strategy later on.
With above-mentioned similar, the user also finishes by the authentication server module the audit of resource access operations, because the user is when accesses network resource (resource and the local encrypt asset of preserving that comprise the access server end) all needs to obtain content key through the authentication server module.Therefore, the solicit operation of content key be can be used as the foundation of information content accessing operation audit.
After the user side download message, the strategy on the strategic server module can dynamic-configuration, and comes into force in real time by the authentication server module.Dynamically change policy configurations and realize that by strategic server module and authentication server module because the user is to the visit of Internet resources each time, online or off-line all needs current strategy is inquired about.Therefore, Ce Lve change can come into force.So-called online and off-line is said at information server, even but the local resource of visit, the user still needs to visit the authentication server module, according to system design of the present invention, even after content is downloaded, security strategy in the strategic server module still can dynamically change, and effectively.
Deposited user's information and resource access control tabulation in the strategic server module, it is equivalent to a LIST SERVER on function, and directory service is provided on network.
The resource description label is mainly stored and issued to label office module, and comprising unique content key of corresponding needs with each Internet resources, this content key can play encryption and decryption in workflow.
Browser can send to authentication module together with label with user authentication information, and is decrypted later on obtaining content key, and auto-destruct key after deciphering if browser can not obtain content key, then can't show the encryption webpage.An acting server is arranged between common network information server and user browser, be used for finishing user's variety of protocol request.Acting server can be tabulated from strategic server searching user's information and resource access, and can encrypt information from label office inquiry tag information.
The miscellaneous function module of client at first is used for limiting the performance constraint of client to the important information content, and it can shield printing, the hold function of browser, can also copy the screen function by the SHIELDING CALCULATION machine.In addition, it also needs to finish the function of deciphering.
The present invention is on the basis of this system, propose to realize contents supervision's method, by the information content is added label, and manage by security strategy based on label, method is divided into two parts: content distribution flow and checking audit process, these two flow processs are carried out in order, and concrete steps are as follows:
1) content distribution flow:
1. browser sends request;
2. proxy modules is from network information server module downloading page;
3. proxy modules is from label office module inquiry tag;
4. proxy modules is obtained Access Control List (ACL) from the strategic server module;
5. proxy modules is encrypted the page;
6. the page and label thereof after proxy modules will be encrypted send to browser.
2) checking audit process:
1. browser sends to the authentication server module with user authentication information and resource tag;
2. the authentication server module obtains content key from label office module;
3. the authentication server module obtains Access Control List (ACL) from the strategic server module;
4. authentication server module verification user right;
5. the authentication server module sends to browser to content key;
6. browser is deciphered the page.
Below the inventive method is further described:
● at first need to add digital label for the information content important in the network information server module, the title that contains resource in the digital label of the present invention, the founder, summary, and and unique content key of being associated of content, digital label can adopt many methods to describe, no matter what it adopted is any form, it does not change its essence, wherein method is to adopt the form of resource description framework (RDF) to be described preferably, benefit with resource description framework (RDF) is can integrated many existing description vocabulary, dublin core (Dublin Core) etc. as previously mentioned.
● the step of content distribution flow is 3. and 4., and proxy modules is obtained resource access control tabulation and digital label according to user's request respectively from strategic server module and label office module, and according to security strategy decision subsequent step;
Security strategy of the present invention is to formulate at the rating information that contains in the digital label, the description of strategy comprises following content: unified resource location (URL), blacklist, classified filtering strategy, Access Control List (ACL), audit content, wherein the classified filtering strategy selects the situation of platform (Platform for Internet Content Selection) classification vocabulary to formulate at containing internet content in the label.
● the step of content distribution flow is 5. and 6., if user's information conforms security strategy, the content key that the proxy modules utilization is obtained from digital label is encrypted information, and information and key after the encryption send to client together, if user's information does not meet the requirement of security strategy, proxy modules refusing user's request then, and send the page of Reason For Denial to client;
Described key is a content key, and it is the unique key that is associated with specific information content, and it is to generate when adding label.Proxy modules is all undertaken by this key contents decryption content-encrypt and browser plug-in, because this key and information content direct correlation, so can regard accessing operation to the information content as to the solicit operation of this key.
● the step of checking audit process 1. in, browser obtains encrypting after the page, and user profile and digital label are sent to the authentication server module, the authentication server module is according to user's mandate decision subsequent operation;
● checking audit process step is 5. and 6., if user's information conforms security strategy, then the authentication server module sends content key to browser, the miscellaneous function module is after obtaining key, be decrypted encrypting webpage, if user's information does not meet security strategy, then the authentication server module does not send key to browser, and browser can't show encrypted content.
The present invention has substantive distinguishing features and marked improvement, after having adopted native system and method thereof, can improve the monitoring to important content aspect three:
1. can realize access control and operation audit to important content.The user need be undertaken by proxy modules the request of information, proxy modules can be according to the security strategy control that conducts interviews, and in addition, the user needs the information of enabling decryption of encrypted, also need by the authentication server module, be equivalent to and increased controlled function one.Because the user visits secret content each time all needs to obtain content key, therefore, the authentication server module can be operated audit to the request of content key according to the user.
2. the security strategy of overall process.Common content delivering system, after being downloaded, content just lost control to information, and native system continues to realize security strategy by the authentication server module after content is downloaded, thereby has realized from content release until the security strategy of inefficacy overall process.
3. dynamic security strategy.Common supervisory control system leaves strategy in client terminal local, and strategy just can not dynamically change like this, and native system is issued strategy with the form of service, can real time altering, and come into force.
Embodiment
As shown in Figure 1, the present invention mainly comprises: client 1 and server end 2, the proxy modules 6 of server end 2, authentication server module 9 is connected with client 1 by network 3, server end 2 comprises that 5 are formed module: proxy modules 6, label office module 7, strategic server module 8, authentication server module 9, network information server module 10, its connected mode is: label office module 7, strategic server module 8 is by network 3 and proxy modules 6, authentication server module 9 is connected, and network information server module 10 is connected the rear end of proxy modules 6.
Client 1 comprises 2 modules: browser 4, miscellaneous function module 5, browser 4 and miscellaneous function module 5 are positioned at same computer, are connected with proxy modules 6, the authentication server module 9 of server end 2 by network 3.
Browser 4 sends to authentication server module 9 with user authentication information together with label, and is decrypted auto-destruct key after deciphering later on obtaining content key.
Deposit user's information and resource access control tabulation in the strategic server module 8,7 storages of label office module and issue resource description label, comprising with the corresponding unique content key of each Internet resources.
Provide following examples in conjunction with content of the present invention:
Dispose the confidential information delivery system of an enterprises classified network in concrete network environment, client also increases a browser plug-in except normally used browser.If use Microsoft's browser (IE), the ActiveX that then uses Microsoft to provide writes browser component, and this browser component is a kind of block that depends on browser, is used for finishing the restriction of deciphering and function.
A complete information issue flow process can be divided into two parts, and they are content release flow process and checking audit process.The concrete steps of these two flow processs are as follows: 1) content distribution flow: 1. browser 4 sends request to acting server 6; 2. acting server 6 is from network information server 10 downloading page; 3. acting server 6 is from label office 7 inquiry tags; 4. acting server 6 obtains Access Control List (ACL) from strategic server 8; 5. acting server 6 is encrypted the page; 6. the page and label thereof after acting server 6 will be encrypted send to browser 4.
2) checking audit process: 1. browser 4 sends to authentication server module 9 modules with user authentication information and resource tag; 2. authentication server module 9 obtains content key from label office module 7; 3. authentication server module 9 obtains Access Control List (ACL) from strategic server module 8; 4. authentication server module 9 is verified user rights; 5. authentication server module 9 sends to browser 4 to content key; 6. browser supplementary module 5 is deciphered the pages.General user's browse operation relates to the process 1 that order is carried out) and process 2), if user capture is kept at local encryption webpage, then only relate to the checking audit process.Need to guarantee secure communication between each module of server end, therefore need to adopt secure communication protocols (SSL).In addition, before work, need earlier authenticating identity mutually between browser and the certificate server.Existing subscriber identity information has resource access control tabulation again in the strategic server, and what it provided is the function of a directory service basically, therefore can adopt LDAP (LDAP) agreement to realize query manipulation, also can adopt other modes.
Adopt such method to carry out the information issue, just can realize management capsule information.Specifically, can obtain following effect: the user that the data of concerning security matters is merely able to be hoped visits, and can stipulate his operating right, such as printing, preserve and the copy screen, can carry out detailed audit to his accessing operation; Still can monitor later in the confidential data granting it, such as, hope changes this user's operating right after providing, and then can dynamically change authorization conditions by strategic server.