Secure file system server architecture and methods
First Claim
1. A secure server platform providing protected access to persistent data, said secure server platform comprising:
- a) a persistent data store supporting storage of predetermined files;
b) a computer server system, including an operating system kernel supporting execution of an application program with respect to a user, a first file system layer, responsive to predetermined data transfer operations managed by said operating system kernel relative to said application program to transfer file data with respect to said persistent data store, and a second file system layer interposed between said operating system kernel and said first file system layer, said second file system layer establishing a file access control function selectively constraining said predetermined data transfer operations; and
c) a file access controller coupled to said second file system layer to support said file access control function, wherein said file access controller implements an access policy list establishing a predetermined correlation between said user and said predetermined files determinative of permitted ones of said predetermined data transfer operations, and wherein said access policy list is maintained within said file access controller independent of said computer server system.
4 Assignments
0 Petitions
Accused Products
Abstract
A data server platform includes a security file system layer interposed between the platform operating system kernel and file system. The secure file system layer is structured to implement a file access control function that selectively constrains data transfer operations initiated through the operating system kernel by an application program to transfer file data through the file system with respect to a persistent data store. A file access controller, implemented independent of the operating system kernel, is coupled to the security file system layer and supports the file access control function by defining permitted file data transfers through the file system. Management of the file access controller separate from the data server platform ensures that any security breach of the platform operating system kernel cannot compromise the function of the security file system layer.
221 Citations
33 Claims
-
1. A secure server platform providing protected access to persistent data, said secure server platform comprising:
-
a) a persistent data store supporting storage of predetermined files;
b) a computer server system, including an operating system kernel supporting execution of an application program with respect to a user, a first file system layer, responsive to predetermined data transfer operations managed by said operating system kernel relative to said application program to transfer file data with respect to said persistent data store, and a second file system layer interposed between said operating system kernel and said first file system layer, said second file system layer establishing a file access control function selectively constraining said predetermined data transfer operations; and
c) a file access controller coupled to said second file system layer to support said file access control function, wherein said file access controller implements an access policy list establishing a predetermined correlation between said user and said predetermined files determinative of permitted ones of said predetermined data transfer operations, and wherein said access policy list is maintained within said file access controller independent of said computer server system. - View Dependent Claims (2, 3)
-
-
4. A secure server system, supporting application access to file data persistently maintained in a file data store, said secure server system comprising:
-
a) a cryptographic data processor, responsive to session data, operative to encrypt and decrypt file data streams dependent on encryption keys, said cryptographic data processor including an encryption key store; and
b) a computer system, coupled to said cryptographic data processor, including an operating system kernel and a file system responsive to file data requests provided by said operating system kernel with respect to a predetermined file data store, said file system being operative to route, with respect to a predetermined file data request, a file data stream through said cryptographic data processor, said file system identifying predetermined session data with said predetermined file data request to selectively enable the encryption and decryption of said file data stream, and wherein said encryption key store is secure against access through said file system. - View Dependent Claims (5, 6)
-
-
7. A method of securing the transfer of persistently stored data between a computer system and a persistent data store, wherein said computer system includes a processor supporting the execution of an operating system kernel and a file system to transfer data with respect to said persistent data store, said method comprising the steps of:
-
a) associating session information with data transfer requests provided from said operating system kernel;
b) providing said session information and said data transfer requests to an independent security processor system to determine permitted data transfer operations; and
c) routing, between said operating system and said file system, the persistently stored data corresponding to said permitted data transfer operations exclusively through said independent security processor system. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of securing persistently stored file data stored by a persistent storage device and accessible through a computer server system including a processor, an operating system executable by said processor including an operating system kernel providing a first file system interface and a second file system interface to said persistent storage device, said method comprising the steps of:
-
a) coupling an independently operating encryption processor supporting the transparent encryption and decryption of persistent file data to said computer server system through a defined communications channel;
b) associating session information obtained through said operating system kernel with a predetermined persistent file data transfer request identifying predetermined persistent file data;
c) providing said predetermined persistent file data transfer request and said session information to said independently operating encryption processor through said defined communications channel; and
d) routing said predetermined persistent file data as transferred between said first and second file system interfaces through said independently operating encryption processor. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer system implementing a server architecture enforcing secure authentication and access control to file data, said computer system comprising:
-
a) a first processor system, coupled to said persistent file data store, including a server memory area and a server processor providing for the execution of an operating system within said server memory, wherein said operating system includes an operating system kernel, having a kernel data access interface, a filesystem switch, supporting routing of file data requests provided from said operating system kernel, and a security interposer layer coupled to said kernel data access interface and said filesystem switch, said security interposer layer being responsive to received file data requests to associate session information obtained from said operating system kernel with said file data requests; and
b) a second processor system coupled to said security interposer layer and responsive to said session information as associated with said file data requests to selectively enable said file data requests relative to the transfer of file data in response to said file data requests. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification