CN105653967A - Information storage protection system and method - Google Patents

Information storage protection system and method Download PDF

Info

Publication number
CN105653967A
CN105653967A CN201410631679.4A CN201410631679A CN105653967A CN 105653967 A CN105653967 A CN 105653967A CN 201410631679 A CN201410631679 A CN 201410631679A CN 105653967 A CN105653967 A CN 105653967A
Authority
CN
China
Prior art keywords
file
user
function
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410631679.4A
Other languages
Chinese (zh)
Inventor
蒋斐
李村
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Wei Dun Network Technology Co Ltd
Original Assignee
Jiangsu Wei Dun Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Wei Dun Network Technology Co Ltd filed Critical Jiangsu Wei Dun Network Technology Co Ltd
Priority to CN201410631679.4A priority Critical patent/CN105653967A/en
Publication of CN105653967A publication Critical patent/CN105653967A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an information storage protection system characterized by comprising an information safety module, an information leakage protection module, a system management and setting module; an information storage protection method is characterized by comprising the following steps: a user can encrypt a random file and catalog through a random encryption algorithm, a password or/and secret key, or a multiple combination of the two; an operation system is tightly combined, and an attribute menu order called by a right mouse in a random file manage program (like the resource manager) under WINDOWS can be used for encrypting the file and catalog. The invention provides the information storage protection system and method can enhance safety protection in an information storage node, thus truly improving the information safety protection ability.

Description

A kind of system and method for information storage protection
Technical field
The present invention relates to the system and method for a kind of information storage protection.
Background technology
Along with life and information technology increasingly tight of people, strengthen protecting information safety work very urgent. At links such as the acquisition of information, storage, process, transmission, display and application, all there is protecting information safety problem. Current security protection product also exists mistaken ideas, and most of Protection Products are for information transmission, process and display link, and store link and be usually left in the basket. But the fire wall of safety all can be broken again, confidential encryption device can not can be used everywhere, network transmission safety does not ensure that the safety being carried out information exchange by disk, and the control measures of forced quarantine office computer (network) and home-use computer (the Internet) are difficult to prove effective for a long time. Confidential encryption device is due to fixed-encryption algorithm and key, once keeping is not good at it is necessary to change by the gross, otherwise it is possible to cause information-leakage. Therefore, do security protection well in information storage link most important, for improving protecting information safety ability, be of great immediate significance.
Therefore, prior art needs to be improved.
Summary of the invention
The present invention is to solve the deficiencies in the prior art, it is provided that the system and method for a kind of information storage protection, improve the security protection ability of information storage link.
For solving above-mentioned technical problem, the system and method for a kind of information storage protection that the embodiment of the present invention provides, adopt the following technical scheme that
The system of a kind of information storage protection, it is characterised in that including:
By information security module, leakage of information protection module, system administration and arrange module three part and form;
Described information security module, it is provided that user's encryption and decryption services, user can pass through to run encryption file function and directly run encrypted file, can by encryption file packing backup by encrypting file backup function;
Described leakage of information protection module, user can pass through thoroughly to know that file function removes secret file, by disk space clearing function defrag, it is possible to prevent malicious user from recovering disk and deleted content, be possible to prevent file private information to leak by clearing up end of file memory block function;
Described system administration with module is set, user produces the key file of native system by key systematic function, password code in can arranging with system is combined use, simultaneity factor arranges that AES, random number can be claimed algorithm by function, the surface of encryption file is configured, it is prevented that when maloperation function can make user carry out the operations such as deletion, input password confirms.
The method of a kind of information storage protection, it is characterised in that comprise the steps:
S1: user A can to any file and encrypted directory, can any Choice encryption algorithm, by password or (with) key disk, and the Multiple Combination of the two is encrypted, combine closely with operating system, it is possible to any documentor (such as explorer) uses the attribute menu order of right mouse button exhalation to file and encrypted directory under WINDOWS;
S2: user A complete encryption after, it is possible to use file or catalogue are decrypted operation by password or key disk, use the attribute menu order of right mouse button exhalation that file and catalogue are deciphered;
S3: user A opens encrypted word document, first encryption file DOC file is decrypted, then automatically call the application program word associated with this document to open this document edit-modify, after closing application program, automatically this document is encrypted operation;
S4: user A runs " thoroughly removing file function ", and this function, while deleting file, uses random data to rewrite the memory block of this document thus reaching the purpose of fully erased file;
S5: user A runs " defrag space function ", uses the random number of various ways or stationary digital to fill free disk space. Cover the data block of common deletion file, make the data of free space not to be resumed;
S6: user A runs " cleaning end of file memory block ", the free space of one end of file memory block of cleaning;
S7: user A runs " generation key ", can generate the key of 1 ~ 1024bit, and key saves as data file, it is possible to be placed in the various storage mediums such as hard disk, flash disk and IC-card, it is only necessary to designated memory position before system uses, and can use.
The system and method for a kind of information provided by the invention storage protection, stores link in information and strengthens security protection, conscientiously improves protecting information safety ability.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of the method for a kind of information storage protection described in the embodiment of the present invention.
Detailed description of the invention
The system and method for the information storage protection embodiment of the present invention being supplied to below in conjunction with accompanying drawing is described in detail.
As it is shown in figure 1, the system that a kind of information storage that the embodiment of the present invention provides is protected, it is characterised in that including:
By information security module, leakage of information protection module, system administration and arrange module three part and form;
Described information security module, it is provided that user's encryption and decryption services, user can pass through to run encryption file function and directly run encrypted file, can by encryption file packing backup by encrypting file backup function;
Described leakage of information protection module, user can pass through thoroughly to know that file function removes secret file, by disk space clearing function defrag, it is possible to prevent malicious user from recovering disk and deleted content, be possible to prevent file private information to leak by clearing up end of file memory block function;
Described system administration with module is set, user produces the key file of native system by key systematic function, password code in can arranging with system is combined use, simultaneity factor arranges that AES, random number can be claimed algorithm by function, the surface of encryption file is configured, it is prevented that when maloperation function can make user carry out the operations such as deletion, input password confirms.
The method of a kind of information storage protection, it is characterised in that comprise the steps:
S1: user A can to any file and encrypted directory, can any Choice encryption algorithm, by password or (with) key disk, and the Multiple Combination of the two is encrypted, combine closely with operating system, it is possible to any documentor (such as explorer) uses the attribute menu order of right mouse button exhalation to file and encrypted directory under WINDOWS;
S2: user A complete encryption after, it is possible to use file or catalogue are decrypted operation by password or key disk, use the attribute menu order of right mouse button exhalation that file and catalogue are deciphered;
S3: user A opens encrypted word document, first encryption file DOC file is decrypted, then automatically call the application program word associated with this document to open this document edit-modify, after closing application program, automatically this document is encrypted operation;
S4: user A runs " thoroughly removing file function ", and this function, while deleting file, uses random data to rewrite the memory block of this document thus reaching the purpose of fully erased file;
S5: user A runs " defrag space function ", uses the random number of various ways or stationary digital to fill free disk space. Cover the data block of common deletion file, make the data of free space not to be resumed;
S6: user A runs " cleaning end of file memory block ", the free space of one end of file memory block of cleaning;
S7: user A runs " generation key ", can generate the key of 1 ~ 1024bit, and key saves as data file, it is possible to be placed in the various storage mediums such as hard disk, flash disk and IC-card, it is only necessary to designated memory position before system uses, and can use.
The system and method for a kind of information provided by the invention storage protection, stores link in information and strengthens security protection, conscientiously improves protecting information safety ability.
The above; being only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should be encompassed within protection scope of the present invention. Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.

Claims (2)

1. the system of an information storage protection, it is characterised in that including:
By information security module, leakage of information protection module, system administration and arrange module three part and form;
Described information security module, it is provided that user's encryption and decryption services, user can pass through to run encryption file function and directly run encrypted file, can by encryption file packing backup by encrypting file backup function;
Described leakage of information protection module, user can pass through thoroughly to know that file function removes secret file, by disk space clearing function defrag, it is possible to prevent malicious user from recovering disk and deleted content, be possible to prevent file private information to leak by clearing up end of file memory block function;
Described system administration with module is set, user produces the key file of native system by key systematic function, password code in can arranging with system is combined use, simultaneity factor arranges that AES, random number can be claimed algorithm by function, the surface of encryption file is configured, it is prevented that when maloperation function can make user carry out the operations such as deletion, input password confirms.
2. the method for an information storage protection, it is characterised in that comprise the steps:
S1: user A can to any file and encrypted directory, can any Choice encryption algorithm, by password or (with) key disk, and the Multiple Combination of the two is encrypted, combine closely with operating system, it is possible to any documentor (such as explorer) uses the attribute menu order of right mouse button exhalation to file and encrypted directory under WINDOWS;
S2: user A complete encryption after, it is possible to use file or catalogue are decrypted operation by password or key disk, use the attribute menu order of right mouse button exhalation that file and catalogue are deciphered;
S3: user A opens encrypted word document, first encryption file DOC file is decrypted, then automatically call the application program word associated with this document to open this document edit-modify, after closing application program, automatically this document is encrypted operation;
S4: user A runs " thoroughly removing file function ", and this function, while deleting file, uses random data to rewrite the memory block of this document thus reaching the purpose of fully erased file;
S5: user A runs " defrag space function ", uses the random number of various ways or stationary digital to fill free disk space, covers the data block of common deletion file, make the data of free space not to be resumed;
S6: user A runs " cleaning end of file memory block ", the free space of one end of file memory block of cleaning;
S7: user A runs " generation key ", can generate the key of 1 ~ 1024bit, and key saves as data file, it is possible to be placed in the various storage mediums such as hard disk, flash disk and IC-card, it is only necessary to designated memory position before system uses, and can use.
CN201410631679.4A 2014-11-12 2014-11-12 Information storage protection system and method Pending CN105653967A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410631679.4A CN105653967A (en) 2014-11-12 2014-11-12 Information storage protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410631679.4A CN105653967A (en) 2014-11-12 2014-11-12 Information storage protection system and method

Publications (1)

Publication Number Publication Date
CN105653967A true CN105653967A (en) 2016-06-08

Family

ID=56483391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410631679.4A Pending CN105653967A (en) 2014-11-12 2014-11-12 Information storage protection system and method

Country Status (1)

Country Link
CN (1) CN105653967A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859433A (en) * 2020-07-28 2020-10-30 江西金格科技股份有限公司 Linkage encryption and decryption application mode based on multiple intelligent key storage devices

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185695A (en) * 2009-12-22 2011-09-14 谷电机工业株式会社 Information management system, information management method and apparatus, and encryption method and program
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185695A (en) * 2009-12-22 2011-09-14 谷电机工业株式会社 Information management system, information management method and apparatus, and encryption method and program
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
林鹰,苏日娜: "信息存储安全防护系统设计", 《西南师范大学学报(自然科学版)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859433A (en) * 2020-07-28 2020-10-30 江西金格科技股份有限公司 Linkage encryption and decryption application mode based on multiple intelligent key storage devices

Similar Documents

Publication Publication Date Title
US10140370B1 (en) Systems and methods for maintaining encrypted search indexes on third-party storage systems
CN103106372B (en) For lightweight privacy data encryption method and the system of android system
USRE49194E1 (en) Method and apparatus for controlling access to encrypted data
WO2016173264A1 (en) Electronic data protection method and device, and terminal device
CN101408916B (en) Internet software internet privacy protection method
WO2018218953A1 (en) Data backup method and device, storage medium and server
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN204595860U (en) A kind of memory device encryption bridge
CN102043927B (en) Data divulgence protection method for computer system
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN104253933A (en) Shooting method and device
CN105117635A (en) Local data security protection system and method
CN103745162A (en) Secure network file storage system
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN102868826A (en) Terminal and terminal data protection method
CN115982761A (en) Sensitive information processing method and device, electronic equipment and storage medium
CN110892403A (en) Method for securely accessing data
Gupta et al. A light weight centralized file monitoring approach for securing files in cloud environment
US20170262640A1 (en) Database operation method and device
CN108256346B (en) Key data protection method, encryption protection device and embedded system device
CN105653967A (en) Information storage protection system and method
WO2014141802A1 (en) Information processing device, information processing system, information processing method, and program
CN108229203A (en) Document protection method and device in a kind of terminal
Braga et al. Adding secure deletion to an encrypted file system on android smartphones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160608