CN103530572A - Method for protecting virtual machine files and user terminal - Google Patents

Method for protecting virtual machine files and user terminal Download PDF

Info

Publication number
CN103530572A
CN103530572A CN201310500662.0A CN201310500662A CN103530572A CN 103530572 A CN103530572 A CN 103530572A CN 201310500662 A CN201310500662 A CN 201310500662A CN 103530572 A CN103530572 A CN 103530572A
Authority
CN
China
Prior art keywords
file
virtual machine
key
user
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310500662.0A
Other languages
Chinese (zh)
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201310500662.0A priority Critical patent/CN103530572A/en
Publication of CN103530572A publication Critical patent/CN103530572A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method for protecting virtual machine files and a user terminal. The method comprises the steps that a secret key is obtained by the user terminal when core files of an operation system of a virtual machine are operated, wherein the secret key is a secret key used for conducting encryption on the main file of the operation system of the virtual machine and the user files stored in the virtual machine; whether a decryption secret key sent by a user is legal or not is verified according to the secret key and if yes, decryption is conducted on the main file of the operation system and the user files. According to the method for protecting the virtual machine files and the user terminal, binding protection of the files of the operation system of the virtual machine and the user files is achieved, the user files of the virtual machine are prevented from being decrypted and attacked by a malicious user from other controllable operation systems, and the safety of the user files is improved.

Description

Virtual machine file guard method and user terminal
Technical field
The embodiment of the present invention relates to field of computer technology, relates in particular to a kind of virtual machine file guard method and user terminal.
Background technology
Arrival along with the cloud computing epoch, employee's computing machine, the mode by virtual machine moves on in cloud in increasing enterprise, employee visits the desktop of remote virtual machine by a very cheap client computer, can reduce greatly the maintenance cost for employee's computing machine like this.
The virtual hard disk of virtual machine exists in cloud with the form of file, particularly for the virtual machine of preserving the employee of sensitive data, there is very large information security threats, malicious user is easy to just can, from client access virtual machine, obtain the file being stored in virtual hard disk or the file of revising arbitrarily the inside.And existing solution to be user be only encrypted the user file in virtual machine, cannot avoid malicious user to enter this virtual machine from other operating systems and decode the user file of attacking this virtual machine.
Summary of the invention
For the above-mentioned defect of prior art, the embodiment of the present invention provides a kind of virtual machine file guard method and user terminal.
One aspect of the present invention provides a kind of virtual machine file guard method, comprising:
User terminal obtains key in the process of the operating system nucleus file of operation virtual machine, and wherein, described key is that the operating system master file of described virtual machine and the user file being stored in described virtual machine are encrypted to key used;
Whether the decruption key that described user terminal sends according to described key authentication user is legal, if so, described operating system master file and described user file is decrypted to processing.
The present invention provides a kind of user terminal on the other hand, comprising:
Acquisition module, obtains key for the process of the operating system nucleus file at operation virtual machine, and wherein, described key is that the operating system master file of described virtual machine and the user file being stored in described virtual machine are encrypted to key used;
Processing module, whether legal for the decruption key sending according to described key authentication user, if so, described operating system master file and described user file are decrypted to processing.
Virtual machine file guard method and user terminal that the embodiment of the present invention provides, by user terminal, in the process of the operating system nucleus file of operation virtual machine, obtain the operating system master file of virtual machine and the user file being stored in virtual machine are encrypted to key used, if the decruption key sending according to this key authentication user is legal, operating system master file and user file are decrypted to processing, realized by the operating system file in virtual machine and user file and carried out binding protection, avoid malicious user to decode from other controlled operating systems the user file of attacking virtual machine, improved the security of user file.
Accompanying drawing explanation
The process flow diagram of the virtual machine file guard method that Fig. 1 provides for the embodiment of the present invention;
The process flow diagram of another virtual machine file guard method that Fig. 2 provides for the embodiment of the present invention;
The structural representation of the user terminal that Fig. 3 provides for the embodiment of the present invention.
Embodiment
The process flow diagram of the virtual machine file guard method that Fig. 1 provides for the embodiment of the present invention, as shown in Figure 1, the method comprises:
Step 100, user terminal obtains key in the process of the operating system nucleus file of operation virtual machine, wherein, described key is that the operating system master file of described virtual machine and the user file being stored in described virtual machine are encrypted to key used;
Be stored in the virtual machine in high in the clouds and store operating system master file and user file, for fear of malicious user at an easy rate from other controllable operating system access virtual machines, obtain the file being stored in virtual machine or the file of revising arbitrarily the inside, need to carry out bulk encryption processing to the operating system master file of storing in virtual machine and user file, and encryption key used is embedded in operating system nucleus file, and the entry address of VME operating system is revised as to the kernel file of operating system.Wherein, it should be noted that, can need in several ways the operating system master file for to virtual machine be encrypted to key used with the user file that is stored in virtual machine according to practical application is embedded in operating system nucleus file, such as passing through user terminal or Virtual Machine Manager platform, with user terminal, illustrate as follows: when validated user is by after the work of the corresponding virtual machine completing user of user terminal access file processing, to user terminal, send the cryptographic operation that comprises key, when user terminal receives after the cryptographic operation that comprises key of user's transmission, call default disk encryption program, applying this key is encrypted operating system master file and the user file of virtual machine, and key is embedded in the operating system nucleus file of virtual machine, and to the operating system master file after processing, user file and operating system nucleus file carry out cloud storage.
User visits through the process of the virtual machine of above-mentioned encryption as follows by client computer, user terminal is loaded into the operating system nucleus file of virtual machine in internal memory according to the entry address of VME operating system, then move this operating system nucleus file and obtain key, this key is in advance the operating system master file in virtual machine and the user file being stored in virtual machine to be encrypted to key used.
Step 101, whether the decruption key that described user terminal sends according to described key authentication user is legal, if so, described operating system master file and described user file is decrypted to processing.
When user terminal has moved after this operating system nucleus file, can input decruption key by interface prompt user, user inputs decruption key according to information by user terminal, thereby user terminal receives the decryption instructions that comprises decruption key that user sends by user terminal, this decryption instructions is for being decrypted processing to operating system master file and the user file of process encryption in advance.User terminal compares to verify that by the decruption key in the decryption instructions of the key by operation system kernel file acquisition and user's transmission whether decruption key is legal, if comparative result is consistent, illustrate that decruption key is legal, user terminal is decrypted processing to operating system master file and user file, thereby the operating system master file of user terminal loaded virtual machine is to internal memory, then thereby operation system master file starts the operating system of virtual machine, after os starting, user normally accesses virtual machine according to the Requirement Acquisition user file of self.
The virtual machine file guard method that the present embodiment provides, by user terminal, in the process of the operating system nucleus file of operation virtual machine, obtain the operating system master file of virtual machine and the user file being stored in virtual machine are encrypted to key used, if the decruption key sending according to this key authentication user is legal, operating system master file and user file are decrypted to processing, realized by the operating system file in virtual machine and user file and carried out binding protection, avoid malicious user to decode from other controlled operating systems the user file of attacking virtual machine, improved the security of user file.
Based on above-described embodiment, it will be understood by those skilled in the art that, according to the design of different operating system program, the operating system master file for to virtual machine and the user file that is stored in virtual machine being encrypted to the concrete manifestation form that key used is embedded in operating system nucleus file is not limited to a kind of, such as: layering is called, shell routine call etc., below by take the mode of shell routine call, it is example, by embodiment illustrated in fig. 2, illustrate, the process flow diagram of another virtual machine file guard method that Fig. 2 provides for the embodiment of the present invention, as shown in Figure 2, in the present embodiment, by Virtual Machine Manager platform, the operating system master file for to virtual machine being encrypted to key used with the user file that is stored in virtual machine is embedded in operating system nucleus file, the method comprises:
Step 200, user terminal sends the cryptographic operation that comprises virtual machine identification information to Virtual Machine Manager platform, for described Virtual Machine Manager platform, according to the pre-stored user's registration information in this locality, obtain the key corresponding with described virtual machine identification information, apply described key the operating system master file of virtual machine corresponding with described virtual machine identification information in cloud storage and the user file being stored in described virtual machine are encrypted, and described key is embedded in the operating system nucleus file of described virtual machine;
When validated user is by after the work of the corresponding virtual machine completing user of user terminal access file processing, to Virtual Machine Manager platform, send the cryptographic operation that comprises virtual machine identification information, Virtual Machine Manager platform is resolved and is obtained virtual machine identification information the cryptographic operation obtaining, then according to the pre-stored user's registration information in this locality, obtain key corresponding to virtual machine identification information sending with user terminal, applying this key is encrypted by adding the operating system master file of virtual machine corresponding with this virtual machine identification information in the storage of shell side ordered pair cloud and the user file being stored in virtual machine, and this shell side order is embedded in operating system nucleus file, and the entry address that the information of operating system the first sector is revised as to shell side order, wherein, this shell side order comprises the subroutine of obtaining key, decryption subprogram and encryption subroutine, wherein, the subroutine of obtaining key is encrypted key used for obtaining to operating system master file and user file, the decryption subprogram of decryption subprogram for operating system master file and user file are decrypted, encrypting subroutine is encrypted key used to operating system master file and user file and treats and store the encryption subroutine that the user file of virtual machine is encrypted into for applying.
Step 201, described user terminal jumps to the entrance of default described shell side order in the process of the described operating system nucleus file of operation, calls key and obtains subroutine and obtain described key;
User terminal is loaded into the operating system nucleus file in virtual machine in internal memory, then move this operating system nucleus file, in the process of this operating system nucleus file of operation, jump to the entrance of default shell side order, and move the subroutine of obtaining key in shell side order and obtain key, the key obtaining is that Virtual Machine Manager platform is encrypted key used to the operating system master file in virtual machine and user file in advance.
Step 202, whether the decruption key that described user terminal sends according to described key authentication user is legal, if so, the decryption subprogram of operation for described operating system master file and described user file are decrypted;
When user terminal has moved after this operating system nucleus file, can input decruption key by interface prompt user, user inputs decruption key according to information by user terminal, thereby user terminal receives the decryption instructions that comprises decruption key that user terminal sends, user terminal compares to verify that by obtaining by operation key key and the decruption key in decryption instructions that subroutine obtains whether decruption key is legal, if comparative result is consistent, illustrate that decruption key is legal, the user terminal operation decryption subprogram for operating system master file and user file are decrypted, thereby user terminal load operation system master file is to internal memory, then thereby operation system master file starts the operating system, after os starting, user normally accesses virtual machine according to the Requirement Acquisition user file of self.
Step 203, user terminal is after described os starting, and the storage instruction sending by user terminal according to user, calls described encryption subroutine and applies described key and treat the user file storing in described virtual machine and be encrypted.
After user terminal has loaded operating system master file and has started the operating system, user can carry out file processing by user terminal, when user terminal receives the storage instruction that user sends, move the encryption subroutine in shell side order, thereby operating system master file and user file are encrypted to key used before application, treat after the user file storing in virtual machine is encrypted and store in virtual machine again.
The virtual machine file guard method that the present embodiment provides, by in advance the operating system master file in virtual machine and user file being added to cryptor, be encrypted, and shell side order is embedded in operating system nucleus file, user terminal obtains key by the shell side order in operation system kernel file, if the decruption key sending by user terminal according to key authentication user is legal, by the decryption subprogram in operation shell side order, be decrypted, and can treat the file storing in virtual machine by the encryption subroutine in operation shell side order is encrypted.Realized by the operating system file in virtual machine and user file and carried out binding protection, avoided malicious user to decode the user file of attacking virtual machine, the security that has improved user file from other controlled operating systems.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can complete by the relevant hardware of programmed instruction, aforesaid program can be stored in a user terminal read/write memory medium, this program, when carrying out, is carried out the step that comprises said method embodiment; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
The structural representation of the user terminal that Fig. 3 provides for the embodiment of the present invention, as shown in Figure 3, this user terminal comprises: acquisition module 11 and processing module 12, wherein, acquisition module 11 obtains key for the process of the operating system nucleus file at operation virtual machine, wherein, described key is that the operating system master file of described virtual machine and the user file being stored in described virtual machine are encrypted to key used; Whether processing module 12 is legal for the decruption key sending according to described key authentication user, if so, described operating system master file and described user file is decrypted to processing.
The function of each module and treatment scheme in the user terminal that the present embodiment provides, can be referring to the embodiment of the method shown in above-mentioned Fig. 1, and it realizes principle and technique effect is similar, repeats no more herein.
It should be noted that, can need in several ways the operating system master file for to virtual machine be encrypted to key used with the user file that is stored in virtual machine according to practical application and be embedded in operating system nucleus file, illustrate as follows:
Situation one: when executive agent is Virtual Machine Manager platform, validated user is by after the work of the corresponding virtual machine completing user of user terminal access file processing, processing module 12 also for: to Virtual Machine Manager platform, send the cryptographic operation comprise virtual machine identification information, for described Virtual Machine Manager platform, according to the pre-stored user's registration information in this locality, obtain the key corresponding with described virtual machine identification information, applying described key is encrypted the operating system master file of virtual machine corresponding with described virtual machine identification information in cloud storage and the user file being stored in described virtual machine, and described key is embedded in the operating system nucleus file of described virtual machine.
Situation two: when executive agent is user terminal, validated user is by after the work of the corresponding virtual machine completing user of user terminal access file processing, processing module 12 also for: receive the cryptographic operation that comprises key that user sends; Call default disk encryption program, applying described key is encrypted described operating system master file and described user file, and described key is embedded in the operating system nucleus file of described virtual machine, and described operating system master file, described user file and the described operating system nucleus file after processing carried out to cloud storage.
Based on above-described embodiment, it will be understood by those skilled in the art that, according to the design of different operating system program, the operating system master file for to virtual machine and the user file that is stored in virtual machine being encrypted to the concrete manifestation form that key used is embedded in operating system nucleus file is not limited to a kind of, such as: layering is called, shell routine call etc., below by take the mode of shell routine call, illustrate as example: operating system nucleus file comprises shell side order, described shell side order comprises: key obtains subroutine and decryption subprogram, acquisition module 11 specifically for:
In the process of the described operating system nucleus file of operation, jump to the entrance of default described shell side order;
Calling described key obtains subroutine and obtains described key;
Processing module 12 specifically for:
If legal according to decruption key described in described key authentication, call described decryption subprogram described operating system master file and described user file are decrypted to processing.
Further, in described shell side order, also comprise: encrypt subroutine;
Described described operating system master file and described user file are decrypted to processing after, processing module 12 also for: described in the storage instruction calls sending according to described user, encrypt subroutine, apply after described key is encrypted user file to be stored and store in described virtual machine.
The function of each module and treatment scheme in the user terminal that the present embodiment provides, can be referring to the embodiment of the method shown in above-mentioned Fig. 2, and it realizes principle and technique effect is similar, repeats no more herein.
Finally it should be noted that: above embodiment only, in order to technical scheme of the present invention to be described, is not intended to limit; Although the present invention is had been described in detail with reference to previous embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or part technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a virtual machine file guard method, is characterized in that, comprising:
User terminal obtains key in the process of the operating system nucleus file of operation virtual machine, and wherein, described key is that the operating system master file of described virtual machine and the user file being stored in described virtual machine are encrypted to key used;
Whether the decruption key that described user terminal sends according to described key authentication user is legal, if so, described operating system master file and described user file is decrypted to processing.
2. virtual machine file guard method according to claim 1, is characterized in that, described obtain key before, described method also comprises:
Described user terminal sends the cryptographic operation that comprises virtual machine identification information to Virtual Machine Manager platform, for described Virtual Machine Manager platform, according to the pre-stored user's registration information in this locality, obtain the key corresponding with described virtual machine identification information, apply described key the operating system master file of virtual machine corresponding with described virtual machine identification information in cloud storage and the user file being stored in described virtual machine are encrypted, and described key is embedded in the operating system nucleus file of described virtual machine.
3. virtual machine file guard method according to claim 1, is characterized in that, described obtain key before, described method also comprises:
Described user terminal receives the cryptographic operation that comprises key that user sends;
Described user terminal calls default disk encryption program, applying described key is encrypted described operating system master file and described user file, and described key is embedded in the operating system nucleus file of described virtual machine, and described operating system master file, described user file and the described operating system nucleus file after processing carried out to cloud storage.
4. according to the arbitrary described virtual machine file guard method of claim 1-3, it is characterized in that, described operating system nucleus file comprises shell side order, and described shell side order comprises: key obtains subroutine and decryption subprogram;
Described user terminal obtains key and specifically comprises in the process of the operating system nucleus file of operation virtual machine:
Described user terminal jumps to the entrance of default described shell side order in the process of the described operating system nucleus file of operation;
Described user terminal calls described key and obtains subroutine and obtain described key;
Described be decrypted to process comprise:
If described user terminal is legal according to decruption key described in described key authentication, calls described decryption subprogram described operating system master file and described user file are decrypted to processing.
5. virtual machine file guard method according to claim 4, is characterized in that, in described shell side order, also comprises: encrypt subroutine;
Described described operating system master file and described user file are decrypted to processing after, described method also comprises:
Described in the storage instruction calls that described user terminal sends according to described user, encrypt subroutine, apply after described key is encrypted user file to be stored and store in described virtual machine.
6. a user terminal, is characterized in that, comprising:
Acquisition module, obtains key for the process of the operating system nucleus file at operation virtual machine, and wherein, described key is that the operating system master file of described virtual machine and the user file being stored in described virtual machine are encrypted to key used;
Processing module, whether legal for the decruption key sending according to described key authentication user, if so, described operating system master file and described user file are decrypted to processing.
7. user terminal according to claim 6, is characterized in that, described obtain key before, described processing module also for:
To Virtual Machine Manager platform, send the cryptographic operation that comprises virtual machine identification information, for described Virtual Machine Manager platform, according to the pre-stored user's registration information in this locality, obtain the key corresponding with described virtual machine identification information, apply described key the operating system master file of virtual machine corresponding with described virtual machine identification information in cloud storage and the user file being stored in described virtual machine are encrypted, and described key is embedded in the operating system nucleus file of described virtual machine.
8. user terminal according to claim 6, is characterized in that, described obtain key before, described processing module also for:
Receive the cryptographic operation that comprises key that user sends;
Call default disk encryption program, applying described key is encrypted described operating system master file and described user file, and described key is embedded in the operating system nucleus file of described virtual machine, and described operating system master file, described user file and the described operating system nucleus file after processing carried out to cloud storage.
9. according to the arbitrary described user terminal of claim 6-8, it is characterized in that, described operating system nucleus file comprises shell side order, and described shell side order comprises: key obtains subroutine and decryption subprogram, described acquisition module specifically for:
In the process of the described operating system nucleus file of operation, jump to the entrance of default described shell side order;
Calling described key obtains subroutine and obtains described key;
Described processing module specifically for:
If legal according to decruption key described in described key authentication, call described decryption subprogram described operating system master file and described user file are decrypted to processing.
10. user terminal according to claim 9, is characterized in that, in described shell side order, also comprises: encrypt subroutine;
Described described operating system master file and described user file are decrypted to processing after, described processing module also for:
Described in the storage instruction calls sending according to described user, encrypt subroutine, apply after described key is encrypted user file to be stored and store in described virtual machine.
CN201310500662.0A 2013-10-22 2013-10-22 Method for protecting virtual machine files and user terminal Pending CN103530572A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310500662.0A CN103530572A (en) 2013-10-22 2013-10-22 Method for protecting virtual machine files and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310500662.0A CN103530572A (en) 2013-10-22 2013-10-22 Method for protecting virtual machine files and user terminal

Publications (1)

Publication Number Publication Date
CN103530572A true CN103530572A (en) 2014-01-22

Family

ID=49932574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310500662.0A Pending CN103530572A (en) 2013-10-22 2013-10-22 Method for protecting virtual machine files and user terminal

Country Status (1)

Country Link
CN (1) CN103530572A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474418A (en) * 2019-01-22 2019-03-15 网易(杭州)网络有限公司 File enciphering method, document decryption method, device, medium and calculating equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070124600A1 (en) * 2005-11-29 2007-05-31 Lite-On Semiconductor Corporation Work system with an automatic OS login function and method for using the same
US20080065952A1 (en) * 1998-01-23 2008-03-13 Mustafa Eroz Forward error correction scheme for data channels using universal turbo codes
CN101989196A (en) * 2009-08-04 2011-03-23 张济政 Mobile storage equipment-based parasitic operation system
CN102722670A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Mobile storage equipment-based file protection method, equipment and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080065952A1 (en) * 1998-01-23 2008-03-13 Mustafa Eroz Forward error correction scheme for data channels using universal turbo codes
US20070124600A1 (en) * 2005-11-29 2007-05-31 Lite-On Semiconductor Corporation Work system with an automatic OS login function and method for using the same
CN101989196A (en) * 2009-08-04 2011-03-23 张济政 Mobile storage equipment-based parasitic operation system
CN102722670A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Mobile storage equipment-based file protection method, equipment and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474418A (en) * 2019-01-22 2019-03-15 网易(杭州)网络有限公司 File enciphering method, document decryption method, device, medium and calculating equipment

Similar Documents

Publication Publication Date Title
US9852289B1 (en) Systems and methods for protecting files from malicious encryption attempts
US9258122B1 (en) Systems and methods for securing data at third-party storage services
EP3105701B1 (en) Systems and methods for scanning packed programs in response to detecting suspicious behaviors
CN102722670B (en) Mobile storage equipment-based file protection method, equipment and system
JP6227772B2 (en) Method and apparatus for protecting a dynamic library
EP2795829B1 (en) Cryptographic system and methodology for securing software cryptography
US9720721B2 (en) Protected guests in a hypervisor controlled system
KR102433011B1 (en) Method of apk file protection, apk file protection system performing the same, and storage medium storing the same
KR100926631B1 (en) Data security apparatus
CN105612715A (en) Security processing unit with configurable access control
CN105528553A (en) A method and a device for secure sharing of data and a terminal
US20150186681A1 (en) Method of encryption and decryption for shared library in open operating system
CN105308610A (en) Method and system for platform and user application security on a device
CN103530169A (en) Method for protecting virtual machine files and user terminal
CN106326733A (en) Method and apparatus for managing applications in mobile terminal
CN101464934B (en) Mutual binding and authenticating method for computer platform and storage device, and computer thereof
CN111177773A (en) Full disk encryption and decryption method and system based on network card ROM
KR101859823B1 (en) Ransomware prevention technique using key backup
US20110145596A1 (en) Secure Data Handling In A Computer System
JP2023517531A (en) System and method for protecting folders from unauthorized file modification
RU2467389C1 (en) Method of protecting software and dataware from unauthorised use
CN104504310A (en) Method and device for software protection based on shell technology
CN103530572A (en) Method for protecting virtual machine files and user terminal
KR20160141462A (en) Apparatus and method for managing data security
GB2595509A (en) Computer secure boot method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140122

RJ01 Rejection of invention patent application after publication