CN101692264A - Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard - Google Patents

Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard Download PDF

Info

Publication number
CN101692264A
CN101692264A CN200910070593A CN200910070593A CN101692264A CN 101692264 A CN101692264 A CN 101692264A CN 200910070593 A CN200910070593 A CN 200910070593A CN 200910070593 A CN200910070593 A CN 200910070593A CN 101692264 A CN101692264 A CN 101692264A
Authority
CN
China
Prior art keywords
cpu
key
encrypting
file
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910070593A
Other languages
Chinese (zh)
Inventor
吴晨刚
金志刚
葛卫民
邓玮
赵西满
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN200910070593A priority Critical patent/CN101692264A/en
Publication of CN101692264A publication Critical patent/CN101692264A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method of encrypting and protecting files by using the hidden partition (HPA), the CPU ID and the soft keyboard, belonging to the field of the computer security technology. The files are encrypted and protected by encrypting keys under the Windows operation system platform of the Intel CPU, and the encrypting keys are generated according to the following steps: (1) obtaining part of keys from the CPU ID of a personal computer (PC); (2) inputting part of keys manually by the user with the soft keyboard; and (3) connecting the keys obtained in the step (1) with the keys inputted in the step (2) to generate the final encrypting keys. After being encrypted by the final encrypting keys, the files are stored in the HPA at the tail of the hard disc, and the access to the encrypted files by the user and the program is restricted in the way of verifying the access authorization. The invention solves the problem that the original encrypted files can be easily decrypted by violence, has the characteristics of high encryption degree, safety, reliability and simple operation and is suitable for encrypting various files.

Description

Utilize the method for encrypting and protecting files of hidden partition and CPU sequence number and soft keyboard
Technical field
The invention belongs to the computer security technique field, relate to a kind of encryption protecting method of file.
Background technology
Modern society, file data is very important to everyone, how can effectively protect the file data of individual or company, prevents that the disabled user from obtaining, and has become the topic that people pay close attention to.
The encryption protecting method of current file is of a great variety, generally is the key that the requirement user imports certain-length, and the hiding defencive function of encrypting the back file is generally realized by the bottom document filtering system.Itself there is limitation in the bottom document filtering system, still leaves in the Windows system because encrypt the back file, and is a lot of at the virus of Windows operating system, so relatively still unsafe.Utilize keyboard equipments of recording, IE cache resources extracting tool etc. can be easy to the password that finds the user to input from keyboard, for only needing the manually software of input password, its security does not just guarantee.
Summary of the invention
The object of the invention is to overcome the above-mentioned deficiency of prior art; a kind of method of encrypting and protecting files of realizing under the Windows operating system platform of using the CPU of Intel is provided; method of the present invention can effectively prevent key leakage; prevent that effectively virus or disabled user from conducting interviews to encrypting the back file, and then carry out the possibility of Brute Force after obtaining.
In order to achieve the above object, technical scheme of the present invention is:
A kind of method of encrypting and protecting files that utilizes hidden partition and CPU sequence number and soft keyboard; under the Windows operating system platform of using the CPU of Intel, use; it is characterized in that: the key of encrypt file is made up of two parts key; a part is to obtain a part of key from the CPU sequence number of PC, and another part is the key that is used the soft keyboard input by the user.Then use cryptographic algorithm that file is carried out encryption, the document storage after the encryption is at the hidden partition of hard disk afterbody, and all the other programs can't unauthorized access except that designated program.
Above-mentioned encryption protecting method, can adopt following step:
(1) user uses soft keyboard input designated length key;
(2) on PC, detect this machine CPU sequence number;
(3) choose the part position of the whole of (1) and (2), be linked in sequence into the required key of final cryptographic algorithm;
(4) use cryptographic algorithm then, the key that generates with (3) is as encryption key, with the file of required encryption as input, the file after finally obtaining encrypting;
(5) then the encrypt file that generates is left in the hidden partition of hard disk afterbody by designated program.
(6) judge by described designated program whether access privilege is legal, is then file to be decrypted, otherwise can't visit hidden partition.
Wherein said Windows operating system refers to Windows 2000 operating systems, Windows XP operating system and Windows VISTA operating system; The wherein said CPU of Intel refers to Intel486 TMCPU after the model.
The present invention realizes encrypting and protecting files under the Windows operating system platform of using the CPU of Intel; its substantive distinguishing features is: the present invention adopts soft keyboard to carry out the key input; can effectively prevent key leakage; simultaneously in conjunction with CPU sequence number and hidden partition (HPA); make the safer method of file after the encryption, thereby protect encrypt file not visited and obtain effectively by the disabled user.
Compared with prior art, the present invention has following tangible advantage: because the present invention has used the CPU of the Intel sequence number of PC when encryption key generates, even only get its preceding 10, identical probability
Figure G2009100705938D0000021
Approach 0, make declassified document on the PC of encrypt file, to carry out; Adopt soft keyboard input user key, prevent of the threat of relevant hacker software effectively keyboard input record; Use hidden partition (HPA) technology, strengthened protection, prevent that effectively virus or disabled user from conducting interviews to encrypting the back file, and then carry out the possibility of Brute Force after obtaining the file after encrypting.
The present invention only carries out the elaboration of the inventive method as cryptographic algorithm with aes algorithm, but cryptographic algorithm can be not limited to aes algorithm, when choosing other cryptographic algorithm, can adjust the length of the manual key of importing of user and the length of the CPU sequence number that uses according to the length of the required key of algorithm.
Description of drawings
Fig. 1 is that encryption key of the present invention generates synoptic diagram.
Fig. 2 is that user key of the present invention and CPU sequence number part position is linked in sequence and generates final encryption key synoptic diagram.
Embodiment
Now for hiding data; popular is hidden partition (HPA) technology; this Technology Need is revised MBR and is set up a physical protection subregion at the hard disk afterbody; the physical protection subregion is to set up automatically; be independent of the place disk partition of Windows operating system; virus can't infect, and can't delete.Behind the intact file of user encryption, the document storage after will encrypting by designated program is in the physical protection subregion that the hard disk afterbody is set up, and hidden partition is increase constantly, has played like this more effective protection of encrypt file.
The CPU of Intel is from Intel486 TMWork the function of supporting to detect the CPU sequence number, the CPU of Intel sequence number is shown by 24 16 system numerical tables, because the identical probability of sequence number is Be approximately 0, make decryption oprerations on same PC, to carry out, so use the CPU sequence number to generate encryption key, the security that has improved encryption key.
The present invention is under the PC that uses CPU of Intel and Windows operating system platform; use the high strength encrypting algorithm; generate final secret key encryption file by the part position of using the user to import key and PC CPU sequence number, cooperate the hidden partition (HPA) of hard disk afterbody to hide the encryption protecting method of protecting the file after encrypting afterwards.
Below by specific embodiment the present invention is carried out more detailed description:
Ciphering process comprises the steps that the present invention is example with the aes algorithm, referring to Fig. 1 and Fig. 2:
At first obtain to encrypt required key, aes algorithm needs 16, i.e. the key of 128bit length:
(1) user uses 6 keys of soft keyboard input.It is long that the reason of selecting 6 bit lengths for use is that the user imports, and is not easy to user's self memory.If the user imports 6 of curtailments, then add and specify key to form 6 by designated program; If user's input surpasses 6, then can designated program ignore unnecessary key, only stay top 6 keys.
(2) on PC, obtain the preceding 10 bit CPU sequence numbers of this machine, the identical probability of preceding 10 bit sequence number of Intel by designated program This shows that probability is approximately zero, and the CPU of AMD do not support sequence number, so declassified document is impossible substantially on different computers.
(3) 10 keys that 6 keys that (1) generated and (2) generate according to 1 key getting earlier in (1), are then got 2 keys in (2), are linked in sequence into 16 keys that final cryptographic algorithm is required.
Use aes algorithm then, 16 keys that (3) are generated carry out the input of the file of encryption as algorithm, the file after finally obtaining encrypting as encryption key with preparing.
Then the encrypt file that generates is left in the hidden partition (HPA) of hard disk afterbody by designated program.Can whether delete the file before encrypting according to user's needs.Hidden partition (HPA) should be created out by designated program before encrypt file, and carrying out along with the encryption and decryption operation, hidden partition (HPA) can become big dynamically or diminish, and the shared disk size of Windows operating system is also along with dynamic change.
At last, use designated program can be decrypted operation, whether correct by judging user cipher; be then can be decrypted operation; otherwise can't decipher, the file after then encrypting is in hidden state, to reach the visit that the protection encrypt file prevents disabled user or program.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (4)

1. method of encrypting and protecting files that utilizes hidden partition and CPU sequence number and soft keyboard, under the Windows operating system platform of using the CPU of Intel, use, it is characterized in that: the key of encrypt file is made up of two parts key, a part is to obtain a part of key from the CPU sequence number of PC, and another part is the key that is used the soft keyboard input by the user; Then use cryptographic algorithm that file is carried out encryption, the document storage after the encryption is at the hidden partition of hard disk afterbody, and all the other programs can't unauthorized access except that designated program.
2. encryption protecting method according to claim 1, it is characterized in that: process may further comprise the steps:
(1) user uses soft keyboard input designated length key;
(2) on PC, detect this machine CPU sequence number;
(3) choose the part position of the whole of (1) and (2), be linked in sequence into the required key of final cryptographic algorithm;
(4) use cryptographic algorithm, the key that generates with (3) is as encryption key, with the file of required encryption as input, the file after finally obtaining encrypting;
(5) encrypt file that generates is left in the hidden partition of hard disk afterbody by designated program.
(6) judge by described designated program whether access privilege is legal, is then file to be decrypted, otherwise can't visit hidden partition.
3. method according to claim 1, wherein said Windows operating system refers to Windows 2000 operating systems, Windows XP operating system and Windows VISTA operating system.
4. method according to claim 1, the wherein said CPU of Intel refers to Intel486 TMCPU after the model.
CN200910070593A 2009-09-25 2009-09-25 Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard Pending CN101692264A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910070593A CN101692264A (en) 2009-09-25 2009-09-25 Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910070593A CN101692264A (en) 2009-09-25 2009-09-25 Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard

Publications (1)

Publication Number Publication Date
CN101692264A true CN101692264A (en) 2010-04-07

Family

ID=42080948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910070593A Pending CN101692264A (en) 2009-09-25 2009-09-25 Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard

Country Status (1)

Country Link
CN (1) CN101692264A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
CN105656866A (en) * 2014-12-02 2016-06-08 华为技术有限公司 Data encryption method and system
CN108809634A (en) * 2017-05-02 2018-11-13 青岛博文广成信息安全技术有限公司 Part of key tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China technical method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
WO2012022207A1 (en) * 2010-08-17 2012-02-23 湖南源科高新技术有限公司 Method and device for encryption and hard disk
CN105656866A (en) * 2014-12-02 2016-06-08 华为技术有限公司 Data encryption method and system
CN108809634A (en) * 2017-05-02 2018-11-13 青岛博文广成信息安全技术有限公司 Part of key tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China technical method

Similar Documents

Publication Publication Date Title
TWI463349B (en) Method and system for secure data access among two devices
CN105740725B (en) A kind of document protection method and system
CN103236930A (en) Data encryption method and system
CN102156843B (en) Data encryption method and system as well as data decryption method
CN101938497A (en) Multistage security file structure as well as file access control and secret key management user terminal, service terminal, system and method thereof
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN107908574A (en) The method for security protection of solid-state disk data storage
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
CN103440462A (en) Embedded control method for improving security and secrecy performance of security microprocessor
CN104639332A (en) Protective method for solid-state disk encryption key
Belenko et al. “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really?
CN108537048B (en) Security association method and system for encrypted solid state disk and authorized computer
CN105160272B (en) A kind of safe encryption method and system based on autonomous controlled data library
CN101692265A (en) Method of encrypting and protecting files
CN105760789A (en) Protection method for encryption key in encrypted mobile solid-state disk
CN101692266A (en) Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
CN104376270A (en) File protection method and system
CN1266617C (en) Computer data protective method
CN101692264A (en) Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard
CN104463003A (en) File encryption protecting method
CN102426637B (en) A kind of embedded database cryptographic storage method
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
Hu Study of file encryption and decryption system using security key
CN101795194B (en) Method for protecting multi-digital certificate of intelligent card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100407