CN104615946A - Virtual encrypted disk data protection system and method based on intelligent mobile terminals - Google Patents

Virtual encrypted disk data protection system and method based on intelligent mobile terminals Download PDF

Info

Publication number
CN104615946A
CN104615946A CN201510075859.3A CN201510075859A CN104615946A CN 104615946 A CN104615946 A CN 104615946A CN 201510075859 A CN201510075859 A CN 201510075859A CN 104615946 A CN104615946 A CN 104615946A
Authority
CN
China
Prior art keywords
disk
intelligent mobile
mobile terminal
virtual encryption
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510075859.3A
Other languages
Chinese (zh)
Inventor
杨伟伟
杨天平
秦德强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU WESTONE INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
CHENGDU WESTONE INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU WESTONE INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical CHENGDU WESTONE INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201510075859.3A priority Critical patent/CN104615946A/en
Publication of CN104615946A publication Critical patent/CN104615946A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a virtual encrypted disk data protection system and method based on intelligent mobile terminals. A server transmits a virtual encrypted disk management strategy configured, to an intelligent mobile terminal under control of the server; the intelligent mobile terminal analyzes the strategy received and performs creating, mounting, password changing or virtual encrypted disk deleting. The virtual encrypted disk data protection system and method has the advantages that protection is provided for important documents, otherness is prevented from removing sensitive information of an owner of the intelligent mobile terminal, operating a virtual encrypted disk is totally transparent to users, and redirecting security application generation data is also totally transparent to the users.

Description

Based on virtual encryption data in magnetic disk protection system and the method for intelligent mobile terminal
Technical field
The present invention relates to a kind of virtual encryption data in magnetic disk protection system and method, particularly relate to a kind of virtual encryption data in magnetic disk protection system and the method that are applicable to intelligent mobile terminal.
Background technology
Current phone terminal is enough universal, the operating system market of mobile phone terminal than in, the occupation ratio of android system holds a safe lead always, and meanwhile, and the safety problem of mobile phone safe problem especially Android phone emerges in an endless stream again.Therefore the protection problem of the private data in the especially special post of the private data of user is more and more important; and can from the viewpoint of two for the protection of private data; to initiatively stoping the behavior of access private data on the one hand; be passive being encrypted data message on the other hand, wherein data encryption is in vital effect at whole information security field.Therefore in android system, create the virtual disk of data encryption, realize encryption disk credible, and in the data redirection of user being specified to virtual encryption disk, just effectively can ensure the safety of privacy of user data.
Summary of the invention
The technical problem to be solved in the present invention is to provide one and is applicable to intelligent mobile terminal, especially based on virtual encryption data in magnetic disk protection system and the method for the intelligent mobile terminal of android system.
The technical solution used in the present invention is as follows: a kind of virtual encryption data in magnetic disk protection system based on intelligent mobile terminal, comprise service end and intelligent mobile terminal, it is characterized in that: described service end comprises virtual encryption disk management policy distribution module, issue the operating strategy for the establishment of virtual encryption disk, carry, change or deletion to intelligent mobile terminal;
Described intelligent mobile terminal comprises
Strategy processing module, receives the virtual encryption disk management strategy that service end issues, and carries out parsing execution;
Virtual encryption disk drive module, carry out creating for virtual encryption disk, carry, unloading, change password or deletion;
Redirection module, according to system call, calls the part system under system and is redirected, and operates virtual encryption disk and be redirected the file operation of application.
As preferably, described service end also comprises safety applications policy distribution module, issues application protection list security strategy to tactful processing module, and as the basis for estimation that redirection module can be redirected a certain application file.
As preferably, described virtual encryption disk management policy distribution module, according to level of encryption demand, issues the operating strategy for the establishment of virtual encryption disk, carry, change or deletion to intelligent mobile terminal.
As preferably, described safety applications policy distribution module, according to level of security demand, issues application protection list security strategy to intelligent mobile terminal.
A virtual encryption hard disk data protection method for intelligent mobile terminal, service end is sent to intelligent mobile terminal in its controlled area charactert by configuring virtual encryption disk management strategy; Intelligent mobile terminal resolve the strategy that receives and create accordingly, carry, change password or delete the operation of virtual encryption disk.
As preferably, for the virtual encryption disk that intelligent mobile terminal carry is good, user is saved to needing the private data preserved in this virtual encryption disk, and is used to complete this virtual encryption disk of rear unloading.
As preferably, described method also comprises, and just can carry out continuations access when carry access again after needing input password.
As preferably, described method also comprises, and the application protection list safety applications strategy needing to carry out data protection configured is sent to the intelligent mobile terminal in controlled area charactert by service end; When intelligent mobile terminal has the request starting new opplication, the data protection information of this application will be intercepted, judge that this application is the need of data protection, is, file operations all for this safety applications is redirected in the virtual encryption disk opened.
As preferably, the title of safety applications and corresponding virtual encryption Disk name is comprised in described safety applications strategy, when intelligent mobile terminal starts this application, by the virtual encryption disk also carry of correspondence, all data that this application produces and associated documents are all redirected in this virtual encryption disk.
As preferably, described method also comprises, and when creating virtual encryption disk, creates the empty virtual disk files of specifying size according to the policing parameter that service end issues; During mount virtual encryption disk, virtual disk files is mapped to the winding equipment in file system in the mode of encryption, then this winding device format is changed into ext4 file system format, under again this winding hanging equipment being connected to system path, when unloading virtual encryption disk, unload the winding equipment of this carry, and remove the mapping relations between disk file and winding equipment.
Compared with prior art; the invention has the beneficial effects as follows: important documents is protected; prevent other people from removing the sensitive information of owner, concerning the operation of virtual encryption disk for completely transparent user, produce being redirected of data to safety applications is also completely transparent for user.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with embodiment, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Arbitrary feature disclosed in this instructions (comprising any accessory claim and summary), unless specifically stated otherwise, all can be replaced by other equivalences or the alternative features with similar object.That is, unless specifically stated otherwise, each feature is an example in a series of equivalence or similar characteristics.
This specific embodiment is specifically described for the data protection system of the virtual encryption disk based on Android phone end and guard method.
Described data protection system, comprises service end and Android phone end, and described service end comprises virtual encryption disk management policy distribution module, issues the operating strategy for the establishment of virtual encryption disk, carry, change or deletion to mobile phone terminal; Needed to formulate encryption disk management strategy according to management or client by service end, and issue to mobile phone terminal, performed by mobile phone terminal.
Described mobile phone terminal comprises tactful processing module, receives the virtual encryption disk management strategy that service end issues, and carries out parsing execution.
Described mobile phone terminal also comprises virtual encryption disk drive module, carry out creating for virtual encryption disk, carry, unloading, change password or deletion.
Described mobile phone terminal also comprises redirection module, according to system call, calls be redirected (hook) the part system under android system, and operates virtual encryption disk and be redirected the file operation of application.
Described service end also comprises safety applications policy distribution module; issue application protection list (containing the application needing to carry out data protection in list) security strategy to tactful processing module; represent concrete a certain application need carry out data protection, and as the basis for estimation that can redirection module be redirected this application file.
Described virtual encryption disk management policy distribution module is according to level of encryption demand, service end is according to the level of encryption demand of cell-phone customer terminal, formulate accordingly for the operating strategy of virtual encryption disk, and issue the operating strategy for the establishment of this virtual encryption disk, carry, change or deletion to intelligent mobile terminal.
Described safety applications policy distribution module, according to level of security demand, issues application protection list security strategy to intelligent mobile terminal.According to level of security height demand, formulate application protection list, and be handed down to mobile phone terminal.
The virtual encryption hard disk data protection method of intelligent mobile terminal, service end is sent to intelligent mobile terminal in its controlled area charactert by configuring virtual encryption disk management strategy; The strategy that service end configures uses TLS cryptographic protocol to be sent to the mobile phone terminal of specifying in controlled area charactert after being assembled into certain format.Intelligent mobile terminal resolve the virtual encryption disk management strategy that receives and create accordingly, carry, change password or delete the operation of virtual encryption disk.Important documents is protected, prevents other people from removing the sensitive information of owner, concerning the operation of virtual encryption disk for completely transparent user.
For the virtual encryption disk that intelligent mobile terminal carry is good, access mount point the same as other class linux system paths carries out file operation, user is saved to needing the private data preserved in this virtual encryption disk, and unloads this virtual encryption disk after being used to complete again.
Described method also comprises, and just can carry out continuation access when carry is accessed again after needing input password.
User can select the virtual encryption disk created to copy out equally, and carry out carry access on the platform that other support this virtual encryption disk system, or in Android terminal, import the virtual encryption disk of other Android terminal or platform establishment and access.Virtual encryption disk reusability is high, the virtual encryption disk that an Android terminal creates can import very easily on another station terminal, and the enterprising enforcement of platform (Windows, Linux) even having filled this virtual encryption disk management program at other is used.
Described method also comprises, and the application protection list safety applications strategy needing to carry out data protection configured is sent to the intelligent mobile terminal in controlled area charactert by service end; When intelligent mobile terminal has the request starting new opplication, the data protection information of this application will be intercepted, judge that this application is the need of data protection, is, file operations all for this safety applications is redirected in the virtual encryption disk opened.Being redirected for completely transparent user of data is produced concerning safety applications.
According to strategy; if user starts the application that is named as safety applications; then open corresponding virtual encryption disk; and all data redirection this application produced are in this virtual encryption disk; its private data is protected, and this whole redirected ciphering process is completely transparent for user.And after turning off this safety applications, corresponding virtual encryption disk is also unloaded.
The title of safety applications and corresponding virtual encryption Disk name is comprised in described safety applications strategy, when intelligent mobile terminal starts this application, by the virtual encryption disk also carry of correspondence, the interface calling virtual encryption disk drive module carries out the switching action of virtual encryption disk, and all data simultaneously this application produced and associated documents are all redirected in this virtual encryption disk.
Described method also comprises, and when creating virtual encryption disk, creates the empty virtual disk files of specifying size according to the policing parameter that service end issues; During mount virtual encryption disk, virtual disk files is mapped to winding (loop) equipment in file system in the mode of encryption, then this winding device format is changed into ext4 file system format, under again this winding hanging equipment being connected to system path, so just can access the virtual encryption disk of this carry as access ordinary file path; When unloading virtual encryption disk, unload the winding equipment of this carry, and remove the mapping relations between disk file and winding equipment.

Claims (10)

1. the virtual encryption data in magnetic disk protection system based on intelligent mobile terminal, comprise service end and intelligent mobile terminal, it is characterized in that: described service end comprises virtual encryption disk management policy distribution module, issue the operating strategy for the establishment of virtual encryption disk, carry, change or deletion to intelligent mobile terminal;
Described intelligent mobile terminal comprises
Strategy processing module, receives the virtual encryption disk management strategy that service end issues, and carries out parsing execution;
Virtual encryption disk drive module, carry out creating for virtual encryption disk, carry, unloading, change password or deletion;
Redirection module, according to system call, calls the part system under system and is redirected, and operates virtual encryption disk and be redirected the file operation of application.
2. the virtual encryption data in magnetic disk protection system based on intelligent mobile terminal according to claim 1; it is characterized in that; described service end also comprises safety applications policy distribution module; issue application protection list security strategy to tactful processing module, and as the basis for estimation that redirection module can be redirected a certain application file.
3. the virtual encryption data in magnetic disk protection system based on intelligent mobile terminal according to claim 1 and 2; it is characterized in that; described virtual encryption disk management policy distribution module, according to level of encryption demand, issues the operating strategy for the establishment of virtual encryption disk, carry, change or deletion to intelligent mobile terminal.
4. the virtual encryption data in magnetic disk protection system based on intelligent mobile terminal according to claim 2, is characterized in that, described safety applications policy distribution module, according to level of security demand, issues application protection list security strategy to intelligent mobile terminal.
5. a virtual encryption hard disk data protection method for intelligent mobile terminal, service end is sent to intelligent mobile terminal in its controlled area charactert by configuring virtual encryption disk management strategy; Intelligent mobile terminal resolve the strategy that receives and create accordingly, carry, change password or delete the operation of virtual encryption disk.
6. the virtual encryption hard disk data protection method based on intelligent mobile terminal according to claim 5; for the virtual encryption disk that intelligent mobile terminal carry is good; user is saved to needing the private data preserved in this virtual encryption disk, and is used to complete this virtual encryption disk of rear unloading.
7. the virtual encryption hard disk data protection method based on intelligent mobile terminal according to claim 6, described method also comprises, and just can carry out continuation access when carry is accessed again after needing input password.
8. the virtual encryption hard disk data protection method based on intelligent mobile terminal according to claim 5, described method also comprises, and the application of data protection that needs configured protects list safety applications strategy to be sent to intelligent mobile terminal in controlled area charactert by service end; When intelligent mobile terminal has the request starting new opplication, the data protection information of this application will be intercepted, judge that this application is the need of data protection, is, file operations all for this application is redirected in the virtual encryption disk opened.
9. the virtual encryption hard disk data protection method based on intelligent mobile terminal according to claim 8; the title of safety applications and corresponding virtual encryption Disk name is comprised in described safety applications strategy; when intelligent mobile terminal starts this application; by the virtual encryption disk also carry of correspondence, all data that this application produces and associated documents are all redirected in this virtual encryption disk.
10. according to the virtual encryption hard disk data protection method based on intelligent mobile terminal one of claim 5 to 9 Suo Shu, described method also comprises, when creating virtual encryption disk, create the empty virtual disk files of specifying size according to the policing parameter that service end issues; During mount virtual encryption disk, virtual disk files is mapped to the winding equipment in file system in the mode of encryption, then this winding device format is changed into ext4 file system format, under again this winding hanging equipment being connected to system path, when unloading virtual encryption disk, unload the winding equipment of this carry, and remove the mapping relations between disk file and winding equipment.
CN201510075859.3A 2015-02-13 2015-02-13 Virtual encrypted disk data protection system and method based on intelligent mobile terminals Pending CN104615946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510075859.3A CN104615946A (en) 2015-02-13 2015-02-13 Virtual encrypted disk data protection system and method based on intelligent mobile terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510075859.3A CN104615946A (en) 2015-02-13 2015-02-13 Virtual encrypted disk data protection system and method based on intelligent mobile terminals

Publications (1)

Publication Number Publication Date
CN104615946A true CN104615946A (en) 2015-05-13

Family

ID=53150385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510075859.3A Pending CN104615946A (en) 2015-02-13 2015-02-13 Virtual encrypted disk data protection system and method based on intelligent mobile terminals

Country Status (1)

Country Link
CN (1) CN104615946A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650477A (en) * 2016-12-28 2017-05-10 郑州云海信息技术有限公司 Encryption method and apparatus
CN107944292A (en) * 2017-11-15 2018-04-20 北京邮电大学 A kind of private data guard method and system
WO2019071892A1 (en) * 2017-10-13 2019-04-18 平安科技(深圳)有限公司 Method for transmitting masking rules for sensitive information, application server, and computer readable storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800811A (en) * 2010-02-02 2010-08-11 中国软件与技术服务股份有限公司 Mobile phone data security protection method
CN101847184A (en) * 2009-12-16 2010-09-29 深圳市虹安信息技术有限公司 Method for encrypting files by adopting encryption sandbox
CN101901313A (en) * 2010-06-10 2010-12-01 中科方德软件有限公司 Linux file protection system and method
CN101950347A (en) * 2010-09-21 2011-01-19 烟台海颐软件股份有限公司 Method and system for encrypting data
CN102184356A (en) * 2011-04-21 2011-09-14 奇智软件(北京)有限公司 Method, device and safety browser by utilizing sandbox technology to defend
CN102223359A (en) * 2010-07-29 2011-10-19 上海华御信息技术有限公司 Network hard disk backup file data safe system and method based on virtual disk
WO2012045128A1 (en) * 2010-10-08 2012-04-12 Ecred Pty Ltd System and method of conducting transactions
CN102457567A (en) * 2010-11-08 2012-05-16 中标软件有限公司 Mirror image backup/recovery method and tool of web management mode
CN102761559A (en) * 2012-08-02 2012-10-31 上海上讯信息技术有限公司 Private data-based network security sharing method and communication terminal
CN102880498A (en) * 2012-09-13 2013-01-16 深圳市佳创软件有限公司 Method of virtual SD (Security Digital) card on device with android system
CN103425936A (en) * 2012-05-18 2013-12-04 联想(北京)有限公司 Method and electronic instrument for achieving data security
CN104200176A (en) * 2014-08-28 2014-12-10 电子科技大学 System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847184A (en) * 2009-12-16 2010-09-29 深圳市虹安信息技术有限公司 Method for encrypting files by adopting encryption sandbox
CN101800811A (en) * 2010-02-02 2010-08-11 中国软件与技术服务股份有限公司 Mobile phone data security protection method
CN101901313A (en) * 2010-06-10 2010-12-01 中科方德软件有限公司 Linux file protection system and method
CN102223359A (en) * 2010-07-29 2011-10-19 上海华御信息技术有限公司 Network hard disk backup file data safe system and method based on virtual disk
CN101950347A (en) * 2010-09-21 2011-01-19 烟台海颐软件股份有限公司 Method and system for encrypting data
WO2012045128A1 (en) * 2010-10-08 2012-04-12 Ecred Pty Ltd System and method of conducting transactions
CN102457567A (en) * 2010-11-08 2012-05-16 中标软件有限公司 Mirror image backup/recovery method and tool of web management mode
CN102184356A (en) * 2011-04-21 2011-09-14 奇智软件(北京)有限公司 Method, device and safety browser by utilizing sandbox technology to defend
CN103425936A (en) * 2012-05-18 2013-12-04 联想(北京)有限公司 Method and electronic instrument for achieving data security
CN102761559A (en) * 2012-08-02 2012-10-31 上海上讯信息技术有限公司 Private data-based network security sharing method and communication terminal
CN102880498A (en) * 2012-09-13 2013-01-16 深圳市佳创软件有限公司 Method of virtual SD (Security Digital) card on device with android system
CN104200176A (en) * 2014-08-28 2014-12-10 电子科技大学 System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈向群等: "《Windows内核实验教程》", 30 September 2002 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650477A (en) * 2016-12-28 2017-05-10 郑州云海信息技术有限公司 Encryption method and apparatus
WO2019071892A1 (en) * 2017-10-13 2019-04-18 平安科技(深圳)有限公司 Method for transmitting masking rules for sensitive information, application server, and computer readable storage medium
CN107944292A (en) * 2017-11-15 2018-04-20 北京邮电大学 A kind of private data guard method and system
CN107944292B (en) * 2017-11-15 2020-06-02 北京邮电大学 Privacy data protection method and system

Similar Documents

Publication Publication Date Title
CN109460660B (en) Mobile device safety management system
US10511601B2 (en) Security control method for social network user, social application device and terminal
US10003962B2 (en) Method and terminal for keeping subscriber identity module card in standby state
US9143512B2 (en) Communication devices, computer readable storage devices, and methods for secure multi-path communication
KR101505763B1 (en) Method for exporting and importing data of a javacard application
US9781255B1 (en) Authentication of phone call origination
CN109474650B (en) Configuration file downloading method and terminal
US20120278611A1 (en) Vpn-based method and system for mobile communication terminal to access data securely
WO2016101384A1 (en) Dual-system switch based data security processing method and apparatus
KR20160009966A (en) A method and apparatus for updating profile managing server
CN103647784B (en) A kind of method and apparatus of public and private isolation
WO2021016275A1 (en) Systems and methods of gesture triggered automatic erasure on a private network
CN105657712B (en) Access control method and device for WiFi hotspot
EP2965553A1 (en) Method and apparatus for multisim devices with embedded sim functionality
WO2017045417A1 (en) Remote control method and apparatus and mobile terminal
CN109857571B (en) Clipboard control method and device
KR20060120057A (en) Binding content to a user
WO2012041228A1 (en) Method for component access control and electronic device
CN101917513A (en) Method and device for implementing graded display of privacy information
CN104615946A (en) Virtual encrypted disk data protection system and method based on intelligent mobile terminals
CN100459816C (en) Encrypted information processing method and terminal
CN106375996B (en) Virtual user identity identification card protection method, application processor and terminal
CN102368798A (en) Mobile phone setting control system, control method thereof, mobile phone setting method, apparatus thereof and mobile phone
CN106648974A (en) Data backup method and mobile terminal
CN104994498B (en) The method and system that a kind of terminal applies are interacted with mobile phone card application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150513