Security mechanism for interpreting scripts in an interpretive environment

    公开(公告)号:US20060225036A1

    公开(公告)日:2006-10-05

    申请号:US11096623

    申请日:2005-03-31

    IPC分类号: G06F9/44

    CPC分类号: G06F9/45508

    摘要: The techniques and mechanisms described herein are directed to a scripting security mechanism that minimizes security risks associated with interpreting a script written with a scripting language. An interpreter recognizes the scripting-language syntax within the script and processes each line that is designated within a data block using a restrictive set of operations. The restrictive set of operations are a subset of the total operations available for processing. If one of the lines within the data block attempts to perform an operation that is not within the restrictive set of operations, the interpreter provides an indication, such as an exception or message explaining the illegal operation. The interpreter also recognizes a list of export variables associated with the data block and exports only the variables identified in the list to an external environment if the export variable meets a constraint identified for it, if any.

    System and method for distinguishing safe and potentially unsafe data during runtime processing
    2.
    发明申请
    System and method for distinguishing safe and potentially unsafe data during runtime processing 有权
    在运行时处理期间区分安全和潜在不安全数据的系统和方法

    公开(公告)号:US20060277604A1

    公开(公告)日:2006-12-07

    申请号:US11133676

    申请日:2005-05-20

    IPC分类号: G06F12/14

    CPC分类号: G06F21/52

    摘要: The techniques and mechanisms described herein are directed to a taint mechanism. An object-based command declares a taint directive for a parameter within a command declaration. The taint directive is then associated with that parameter in a manner such that when an engine processes the command, the engine determines whether to process the command based on the taint directive and input for the parameter. The taint directive may specify that the input may be tainted or untainted. The command declaration may also include a taint parameter that specifies a taint characteristic for output from the command. The taint characteristic may be tainted, untainted, or propagated. Any type of object may become tainted. An untaint process may be applied to tainted data to obtain untainted data if an authorization check performed by the engine is successful.

    摘要翻译: 本文描述的技术和机制针对污染机制。 基于对象的命令在命令声明中声明一个参数的污点指令。 然后,污染指令以这样的方式与该参数相关联,使得当引擎处理命令时,引擎根据污点指令和参数的输入来确定是否处理命令。 污点指令可能指定输入可能被污染或未被保留。 命令声明还可以包括一个污染参数,该参数指定了从命令输出的污点特性。 污点特性可能会被污染,未被维护或传播。 任何类型的物体可能会被污染。 如果发动机执行的授权检查成功,则可以将污染过程应用于污染数据以获得未维护的数据。

    Interpreter security mechanism
    3.
    发明申请
    Interpreter security mechanism 审中-公开
    口译安全机制

    公开(公告)号:US20070028211A1

    公开(公告)日:2007-02-01

    申请号:US11192535

    申请日:2005-07-29

    IPC分类号: G06F9/44

    CPC分类号: G06F21/52

    摘要: The techniques and mechanisms described herein are directed to an interpreter security mechanism that minimizes security risks associated with interpreting a script written with a scripting language. The interpreter security mechanism recognizes a marker that indicates a beginning for a set of non-interpreted lines. Upon recognizing the marker, the interpreter refrains from interpreting subsequent lines in the script until an end of marker occurs or an end of file occurs. The end of marker indicates that the interpreter can resume interpreting the lines in the script that follow the end of marker.

    摘要翻译: 本文描述的技术和机制针对解释器安全机制,其最小化与用脚本语言编写的脚本解释相关联的安全风险。 解释器安全机制识别指示一组非解释行的开始的标记。 识别标记后,解释器不会解释脚本中的后续行,直到出现标记结束或文件结束。 标记的末端表示解释器可以恢复解释跟随标记结尾的脚本中的行。

    Extensible security architecture for an interpretive environment
    5.
    发明申请
    Extensible security architecture for an interpretive environment 有权
    用于解释环境的可扩展安全架构

    公开(公告)号:US20060248574A1

    公开(公告)日:2006-11-02

    申请号:US11118971

    申请日:2005-04-28

    IPC分类号: H04L9/00

    CPC分类号: G06F21/54

    摘要: The techniques and mechanisms described herein are directed to an extensible security architecture that provides a security mechanism for minimizing security problems within interpretive environments. The extensible security architecture comprises a script engine configured to process a script and a security manager configured to monitor the processing of the script based on a security policy. The security manager determines whether to open an assembly associated with a command within the script, whether to process the command, whether to allow certain input to the command, and the like. The security policy may be implemented by overriding one or more methods of a base security class that are called when processing the script. The input may be an object passed via an object-based pipeline.

    摘要翻译: 本文所描述的技术和机制涉及可扩展的安全架构,其提供用于最小化解释环境内的安全问题的安全机制。 可扩展安全架构包括被配置为处理脚本的脚本引擎和被配置为基于安全策略来监视脚本的处理的安全管理器。 安全管理器确定是否打开与脚本中的命令相关联的程序集,是否处理命令,是否允许对命令的某些输入等。 可以通过覆盖在处理脚本时调用的基本安全类的一个或多个方法来实现安全策略。 输入可以是通过基于对象的管道传递的对象。

    Administrative Tool Environment
    6.
    发明申请
    Administrative Tool Environment 有权
    行政工具环境

    公开(公告)号:US20070135949A1

    公开(公告)日:2007-06-14

    申请号:US11678555

    申请日:2007-02-23

    IPC分类号: G05B19/42

    摘要: In an administrative tool environment, user input is supplied to an administrative tool framework for processing. The administrative tool framework maps user input to cmdlet objects. The cmdlet objects describe a grammar for parsing the user input and input objects to obtain expected input parameters. The input objects are emitted by one cmdlet and are available as input to another cmdlet. The input objects may be any precisely parseable input, such as .NET objects, plain strings, XML documents, and the like. The input objects are not live objects. The cmdlets may operate within the same process. Alternatively, one cmdlet may operate locally while another cmdlet operates remotely. The cmdlets may be provided by the administrative tool framework or may be provided by third party developers. The user input may be supplied to the framework via a host cmdlet.

    摘要翻译: 在管理工具环境中,将用户输入提供给管理工具框架进行处理。 管理工具框架将用户输入映射到cmdlet对象。 cmdlet对象描述用于解析用户输入和输入对象以获取预期输入参数的语法。 输入对象由一个cmdlet发出,可作为另一个cmdlet的输入使用。 输入对象可以是任何精确可解析的输入,例如.NET对象,纯字符串,XML文档等。 输入对象不是活动对象。 该cmdlet可以在相同的过程中操作。 或者,一个cmdlet可以在本地操作,而另一个cmdlet远程操作。 cmdlet可以由管理工具框架提供,或者可以由第三方开发者提供。 用户输入可以通过主机cmdlet提供给框架。

    Administrative tool environment
    7.
    发明申请
    Administrative tool environment 有权
    行政工具环境

    公开(公告)号:US20050091201A1

    公开(公告)日:2005-04-28

    申请号:US10693785

    申请日:2003-10-24

    摘要: In an administrative tool environment, user input is supplied to an administrative tool framework for processing. The administrative tool framework maps user input to cmdlet objects. The cmdlet objects describe a grammar for parsing the user input and input objects to obtain expected input parameters. The input objects are emitted by one cmdlet and are available as input to another cmdlet. The input objects may be any precisely parseable input, such as .NET objects, plain strings, XML documents, and the like. The cmdlets may operate within the same process. Alternatively, one cmdlet may operate locally while another cmdlet operates remotely. The cmdlets may be provided by the administrative tool framework or may be provided by third party developers. The user input may be supplied to the framework via a host cmdlet.

    摘要翻译: 在管理工具环境中,将用户输入提供给管理工具框架进行处理。 管理工具框架将用户输入映射到cmdlet对象。 cmdlet对象描述用于解析用户输入和输入对象以获取预期输入参数的语法。 输入对象由一个cmdlet发出,可作为另一个cmdlet的输入使用。 输入对象可以是任何精确可解析的输入,例如.NET对象,纯字符串,XML文档等。 该cmdlet可以在相同的过程中操作。 或者,一个cmdlet可以在本地操作,而另一个cmdlet远程操作。 cmdlet可以由管理工具框架提供,或者可以由第三方开发者提供。 用户输入可以通过主机cmdlet提供给框架。

    Administrative tool environment
    8.
    发明申请
    Administrative tool environment 有权
    行政工具环境

    公开(公告)号:US20050091258A1

    公开(公告)日:2005-04-28

    申请号:US10882609

    申请日:2004-06-30

    摘要: In an administrative tool environment, user input is supplied to an administrative tool framework for processing. The administrative tool framework maps user input to cmdlet objects. The cmdlet objects describe a grammar for parsing the user input and input objects to obtain expected input parameters. The input objects are emitted by one cmdlet and are available as input to another cmdlet. The input objects may be any precisely parseable input, such as .NET objects, plain strings, XML documents, and the like. The input objects are not live objects. The cmdlets may operate within the same process. Alternatively, one cmdlet may operate locally while another cmdlet operates remotely. The cmdlets may be provided by the administrative tool framework or may be provided by third party developers. The user input may be supplied to the framework via a host cmdlet.

    摘要翻译: 在管理工具环境中,将用户输入提供给管理工具框架进行处理。 管理工具框架将用户输入映射到cmdlet对象。 cmdlet对象描述用于解析用户输入和输入对象以获取预期输入参数的语法。 输入对象由一个cmdlet发出,可作为另一个cmdlet的输入使用。 输入对象可以是任何精确可解析的输入,例如.NET对象,纯字符串,XML文档等。 输入对象不是活动对象。 该cmdlet可以在相同的过程中操作。 或者,一个cmdlet可以在本地操作,而另一个cmdlet远程操作。 cmdlet可以由管理工具框架提供,或者可以由第三方开发者提供。 用户输入可以通过主机cmdlet提供给框架。

    External configuration of processing content for script
    9.
    发明申请
    External configuration of processing content for script 有权
    脚本处理内容的外部配置

    公开(公告)号:US20070174813A1

    公开(公告)日:2007-07-26

    申请号:US11339127

    申请日:2006-01-25

    IPC分类号: G06F9/44 G06F9/45

    CPC分类号: G06F9/45508

    摘要: Script is accessed and interpreted to identify an executable component. Processing context configuration files may then be used to identify an appropriate processing context for the identified executable component. Examples of processing context include, but are not limited to, a process in which the identified executable component is to run, one or more adaptations to perform on the component prior to running, and/or a security context in which to run the component. Processing context thus need not be specified in the actual script itself. The identified components may then be executed in the identified processing context.

    摘要翻译: 脚本被访问和解释以识别可执行组件。 然后可以使用处理上下文配置文件来识别所识别的可执行组件的适当处理上下文。 处理上下文的示例包括但不限于其中运行所识别的可执行组件的过程,在运行之前执行对组件执行的一个或多个修改,和/或用于运行组件的安全上下文。 因此,处理上下文不需要在实际脚本本身中指定。 然后可以在所识别的处理环境中执行所识别的组件。

    Analyzing interpretable code for harm potential
    10.
    发明申请
    Analyzing interpretable code for harm potential 有权
    分析可解释代码的危害潜力

    公开(公告)号:US20070180531A1

    公开(公告)日:2007-08-02

    申请号:US11339397

    申请日:2006-01-25

    IPC分类号: G06F11/00

    摘要: Computerized facilitation of an assessment of risk associated with running interpretable code. The interpretable code under evaluation is parsed to identify a command unit within the interpretable code. One or more risk factors associated with the identified command unit is then identified using the parsed code. A report is then made of including identification of the command unit found the interpretable code along with the identified associated one or more risk factors. Thus, a user need not have to read and evaluate the interpretable code itself, but may instead review the much less complex report to evaluate the risks associated with running the interpretable code.

    摘要翻译: 计算机化促进与运行可解释代码相关的风险评估。 解析的可解释代码被解析以识别可解释代码中的命令单元。 然后使用解析的代码识别与所识别的命令单元相关联的一个或多个危险因素。 然后,报告包括识别可解释代码的命令单元以及所识别的相关联的一个或多个危险因素。 因此,用户不需要读取和评估可解释的代码本身,而是可以审查不那么复杂的报告来评估与运行可解释代码相关的风险。