CN101408916A - Internet software internet privacy protection method - Google Patents
Internet software internet privacy protection method Download PDFInfo
- Publication number
- CN101408916A CN101408916A CNA2008100437380A CN200810043738A CN101408916A CN 101408916 A CN101408916 A CN 101408916A CN A2008100437380 A CNA2008100437380 A CN A2008100437380A CN 200810043738 A CN200810043738 A CN 200810043738A CN 101408916 A CN101408916 A CN 101408916A
- Authority
- CN
- China
- Prior art keywords
- data
- internet
- encrypted partition
- software
- partition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides an online privacy protection method by internet software. The method comprises the following steps: (1) creating an encryption partition protected by a password; (2) loading the encryption partition: causing the data storage path of the internet software to point to the encryption partition; (3) the internet software automatically storing the data generated online in the encryption partition according to the setting of the data storage path and automatically encrypting the data stored in the encryption partition; and the internet software being capable of further reading the data stored in the encryption partition and automatically decrypting the data when being read; and (4) unloading the encryption partition: causing the data storage path of the internet software to point to the original path. The online privacy protection method can ensure users to completely utilize the convenient functions provided by the internet software, and can effectively protect the online privacy of the user.
Description
Technical field
The present invention relates to a kind of computer data guard method, particularly a kind of internet software internet privacy protection method.
Background technology
The user is when the browse network website, and web browser can be stored some information of the accessed page, and the information that often requires the user to provide, for example Shu Ru name and password etc. are provided.For example the IE of Microsoft stores the information of following type: the historical record of the website of interim page cache, Cookie, ever accessed, the form information of input once, username and password, collection etc.
Usually is useful on computers with these information stores, because it can improve network browsing speed, or for the user provides information automatically, but this type of information is individual's privacy a bit, does not wish to be seen unintentionally by the people or is stolen or steals a glance at.
But in numerous occasions, as using many people under the situation of a computer, because computer is shared, the private data that the browse network website produces is difficult to be protected with simple way.
For this situation, the delete function that common way is to use web browser itself to provide is removed the data of these preservations, perhaps uses special deletion software to remove.
For the user of frequent use computer, in time remove private data and can bring very big workload, simultaneously unavoidably owing to removing is forgotten in carelessness, and can't use the convenience that browser storage general information provides.
Therefore,, user's personal data privacy can be protected again, just the deficiencies in the prior art can be remedied if there is a kind of method can either make full use of the convenience of the storage general information that browser provides.
Summary of the invention
The present invention is directed to the storage convenience that above-mentioned browser provides and the contradiction of individual protected data privacy, proposed a kind of guard method of internet software internet privacy.
For solving the problems of the technologies described above, the present invention adopts following technical scheme:
A kind of internet software internet privacy protection method is characterized in that comprising the steps:
(1) creates a password-protected encrypted partition;
(2) load encrypted partition, with this encrypted partition of data storage path point of internet works software;
(3) internet works software is kept at this encrypted partition according to the setting in the data storage path data that produce of will surfing the Net automatically, and the data that are kept at encrypted partition are encrypted automatically; Perhaps described internet works software reading and saving is deciphered during reading of data automatically in the data of encrypted partition;
(4) unloading encrypted partition, the path that the data storage path point of internet works software is original.
Further, described step (1) specifically comprises the steps:
(11) select one to specify the file of size or select a Physical Extents or whole magnetic disk as encrypted partition, this Physical Extents or whole magnetic disk be not for comprising the Free Partition of operating system file;
(12) password of input;
(13) generate a salt at random, generate data encryption key at random; Key schedule uses salt and repeatedly generates a key in the back by the password interative computation that step (12) is imported, with a secret key encryption data encryption key;
(14) salt and ciphered data encryption key are kept at the Head Section of encrypted partition fixed size, fill remaining space in the encrypted partition with random data;
(15) desalination and ciphered data encryption key are kept at outside the Head Section of encrypted partition, and remainder data is saved in the free space outside the encrypted partition Head Section.
Further, described step (2) specifically comprises the steps:
(21) file, subregion or the whole magnetic disk at the encrypted partition place of selection step (11) establishment;
(22) input password, the Head Section of reading encrypted subregion, acquisition is kept at the salt of Head Section; Carry out generating algorithm with the password of this salt and input and generate a key,, obtain data encryption key with ciphered data encryption key in the secret key decryption Head Section;
(23) be logic magnetic disc of encrypted partition mapping;
(24) the various data storage path of internet works software in modification configuration file, the registration table makes it point to the logic magnetic disc of step (23) mapping;
(25) some data as internet works software are kept in the file or registration table of a fixed route, back up these data, after emptying these data, load the corresponding data that backed up when unloading last time at encrypted partition then.
Further, described step (3) specifically comprises the steps:
(31) behind the startup internet works software, the various data that online produces are kept in the encrypted partition automatically, when preserving data, use the data encryption key enciphered data of step (22) acquisition, and cryptographic algorithm is disclosed standard symmetric encipherment algorithm;
(32) behind the startup internet works software, the data of reading and saving in encrypted partition, during reading of data, the data encryption key data decryption that uses step (22) to obtain, decipherment algorithm is identical with the cryptographic algorithm of step (31);
Further, described step (4) specifically comprises the steps:
(41) some data as internet works software are kept in the file or registration table of a fixed route, back up these data to encrypted partition, load the corresponding data of original backup then after emptying these data;
(42) logic magnetic disc of mapping in the step (23) is deleted from system;
(43) destroy the key of importing;
(44) destroy a key;
(45) destroy data encryption key;
(46) the various data storage path of internet works software in modification configuration file, the registration table makes it point to execution in step (24) path before.
Further, described internet works software comprises web browser, network browser card, chat tool etc.
The guard method of internet software internet privacy provided by the invention has following characteristics:
1, adopts the encryption technology of the password of importing based on the user to come the private data of encrypting storing internet works software storage, guarantee to have only the user oneself who creates encrypted partition just can visit encrypted partition;
2, make facilitating functions such as page cache, Cookies, collection, access history, the list that the user can make full use of various internet works softwares to be provided finished automatically, the preservation of list password, but can prevent effectively that non-user from utilizing these functions of browser to obtain private data, can protect computer user's online privacy well;
3, behind the unloading encrypted partition, the various private datas of internet works software storage are all invisible, just as not using these software;
4, after the user inputed password loading encrypted partition, the various private datas of internet works software storage all recovered automatically, facilitate for surfing the web.
Further specify the present invention below in conjunction with the drawings and specific embodiments.
Description of drawings
Fig. 1 is the structural representation of the memory block of the computing machine of application the inventive method.
Fig. 2 is the process flow diagram of internet software internet privacy protection method of the present invention.
Embodiment
As shown in Figure 1, the structural representation of the memory block of the computing machine of application the inventive method.Show among the figure that an encrypted partition is used for storing the data that internet works software produces specially.Its application system under windows platform comprises interface module and encrypted partition driver module that is operated in the Windows core of user's operation at least.Subscriber interface module is used to provide integration of user interaction functionality, comprise that the prompting user inputs password when creating encrypted partition and loading encrypted partition, create and select File or subregion when loading encrypted partition, subscriber interface module also is responsible for finishing when loading and the modification in internet works software data storage path during unloading.The encrypted partition driver module is finished the control of encrypted partition reading and writing data and the encryption and decryption of data.
Based on above-mentioned condition, the internet software internet privacy protection method in the present embodiment specifically comprises following step as shown in Figure 2:
(1) creates a password-protected encrypted partition;
(2) load encrypted partition, this encrypted partition of data storage path point with internet works software, the data of internet works software comprise that page cache, Cookies, collection, access history, the list of browser software are finished automatically, the list password, the chat record of chat software etc.;
(3) internet works software is kept at this encrypted partition according to the setting in the data storage path data that produce of will surfing the Net, and the data that are kept at encrypted partition are encrypted automatically; The all right reading and saving of internet works software is deciphered during reading of data automatically in the data of encrypted partition;
(4) unloading encrypted partition, the path that the data storage path point of internet works software is original.
Described step (1) specifically comprises the steps:
(11) select a file and appointment size; Perhaps select a Physical Extents or whole magnetic disk as encrypted partition, this Physical Extents or whole magnetic disk be not for comprising the Free Partition of operating system file;
(12) password of input;
(13) generate at random a salt (salt be meant for the hashed value of guaranteeing any two user ciphers all inequality, before Crypted password, a unique value of in each user's password, adding.This unique value is called " salt " value), generate data encryption key at random; A key schedule uses salt and repeatedly generates a key in the back by the password interative computation that step (12) is imported, with a secret key encryption data encryption key; Key schedule is disclosed standard digest algorithm;
(14) salt and ciphered data encryption key are kept at the Head Section of encrypted partition fixed size, fill remaining free space in the encrypted partition with random data;
(15) desalination and ciphered data encryption key are kept at outside the Head Section of encrypted partition, and remainder data is saved in the free space outside the encrypted partition Head Section.
Described step (2) realizes as follows:
(21) file, subregion or the whole magnetic disk at the encrypted partition place of selection step (11) establishment;
(22) import password, read in the Head Section of encrypted partition, obtain to be kept at the salt of Head Section; Carry out generating algorithm with the password of this salt and input and generate a key; With ciphered data encryption key in the secret key decryption Head Section, obtain data encryption key;
(23) be logic magnetic disc of encrypted partition mapping.
(24) the various data storage path of internet works software in modification configuration file, the registration table makes it point to the logic magnetic disc of step (23) mapping; IE 6 under the windows platform, IE 7 and FireFox 2, FireFox 3 have preserved the path of data storage in registration table;
(25) some data as internet works software are kept in the file or registration table of a fixed route, back up these data, load the corresponding data that backed up when unloading last time at encrypted partition then after emptying these data; As the IF under the windows platform 6, IF 7 the username and password encryption of page list is left in the registration table, the API that they provide by Windows can be derived backup or import and recover;
Described step (3) realizes as follows:
(31) behind the startup internet works software, the various data that online produces are kept in the encrypted partition automatically, when preserving data, use the data encryption key enciphered data of step (22) acquisition, and cryptographic algorithm is disclosed standard symmetric encipherment algorithm;
(32) start internet works software after, can the data of reading and saving in encrypted partition, during reading of data, the data encryption key data decryption that uses step (22) to obtain, decipherment algorithm is identical with the cryptographic algorithm of step (31);
Described step (4) realizes as follows:
(41) some data as internet works software are kept in the file or registration table of a fixed route, back up these data to encrypted partition, load the corresponding data of original backup then after emptying these data;
(42) logic magnetic disc of mapping in the step (23) is deleted from system;
(43) destroy the key of importing;
(44) destroy a key;
(45) destroy data encryption key;
(46) the various data storage path of browser in modification configuration file, the registration table makes it point to execution in step (24) path before.
More than show and described ultimate principle of the present invention and principal character and advantage of the present invention.Those skilled in the art should understand; that describes in the foregoing description and the instructions just illustrates principle of the present invention; without departing from the spirit and scope of the present invention, the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.The claimed scope of the present invention is defined by appending claims and doctrine of equivalents thereof.
Claims (6)
1, a kind of internet software internet privacy protection method is characterized in that comprising the steps:
(1) creates a password-protected encrypted partition;
(2) load encrypted partition, with this encrypted partition of data storage path point of internet works software;
(3) internet works software is kept at this encrypted partition according to the setting in the data storage path data that produce of will surfing the Net automatically, and the data that are kept at encrypted partition are encrypted automatically; Perhaps described internet works software reading and saving is deciphered during reading of data automatically in the data of encrypted partition;
(4) unloading encrypted partition, the path that the data storage path point of internet works software is original.
2, internet software internet privacy protection method according to claim 1 is characterized in that: described step (1) specifically comprises the steps:
(11) select one to specify the file of size or select a Physical Extents or whole magnetic disk as encrypted partition, this Physical Extents or whole magnetic disk be not for comprising the Free Partition of operating system file;
(12) user inputs a password;
(13) generate a salt at random, generate data encryption key at random; Key schedule uses salt and repeatedly generates a key in the back by the password interative computation that step (12) is imported, with a secret key encryption data encryption key;
(14) salt and ciphered data encryption key are kept at the Head Section of encrypted partition fixed size, fill remaining free space in the encrypted partition with random data;
(15) desalination and ciphered data encryption key are kept at outside the Head Section of encrypted partition, and remainder data is saved in the free space outside the encrypted partition Head Section.
3, internet software internet privacy protection method according to claim 1 and 2 is characterized in that: described step (2) specifically comprises the steps:
(21) file, subregion or the whole magnetic disk at the encrypted partition place of selection step (11) establishment;
(22) input password, the Head Section of reading encrypted subregion, acquisition is kept at the salt of Head Section; Carry out generating algorithm with the password of this salt and input and generate a key,, obtain data encryption key with ciphered data encryption key in the secret key decryption Head Section;
(23) be logic magnetic disc of encrypted partition mapping;
(24) the various data storage path of internet works software in modification configuration file, the registration table makes it point to the logic magnetic disc of step (23) mapping;
(25) some data as internet works software are kept in the file or registration table of a fixed route, back up these data, after emptying these data, load the corresponding data that backed up when unloading last time at encrypted partition then.
4, internet software internet privacy protection method according to claim 1 and 2 is characterized in that: described step (3) specifically comprises the steps:
(31) behind the startup internet works software, the various data that online produces are kept in the encrypted partition automatically, when preserving data, use the data encryption key enciphered data of step (22) acquisition, and cryptographic algorithm is disclosed standard symmetric encipherment algorithm;
(32) behind the startup internet works software, the data of reading and saving in encrypted partition, during reading of data, the data encryption key data decryption that uses step (22) to obtain, decipherment algorithm is identical with the cryptographic algorithm of step (31);
5, internet software internet privacy protection method according to claim 1 and 2 is characterized in that: described step (4) specifically comprises the steps:
(41) some data as internet works software are kept in the file or registration table of a fixed route, back up these data to encrypted partition, load the corresponding data of original backup then after emptying these data;
(42) logic magnetic disc of mapping in the step (23) is deleted from system;
(43) destroy the key of importing;
(44) destroy a key;
(45) destroy data encryption key;
(46) the various data storage path of internet works software in modification configuration file, the registration table makes it point to execution in step (24) path before.
6, internet software internet privacy protection method according to claim 1 and 2 is characterized in that: described internet works software comprises web browser, network browser card, chat tool.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100437380A CN101408916B (en) | 2008-08-27 | 2008-08-27 | Internet software internet privacy protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100437380A CN101408916B (en) | 2008-08-27 | 2008-08-27 | Internet software internet privacy protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101408916A true CN101408916A (en) | 2009-04-15 |
CN101408916B CN101408916B (en) | 2011-06-22 |
Family
ID=40571927
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008100437380A Expired - Fee Related CN101408916B (en) | 2008-08-27 | 2008-08-27 | Internet software internet privacy protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101408916B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102508791A (en) * | 2011-09-28 | 2012-06-20 | 梁守龙 | Method and device for encrypting hard disk partition |
CN102567688A (en) * | 2011-11-30 | 2012-07-11 | 中标软件有限公司 | File confidentiality keeping system and file confidentiality keeping method on Android operating system |
CN103235917A (en) * | 2013-03-28 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Application protection method and device |
CN103390026A (en) * | 2013-06-20 | 2013-11-13 | 中国软件与技术服务股份有限公司 | Mobile intelligent terminal security browser and working method thereof |
CN103870766A (en) * | 2012-12-18 | 2014-06-18 | 神讯电脑(昆山)有限公司 | Electronic storage device and data protection method thereof |
WO2015043323A1 (en) * | 2013-09-27 | 2015-04-02 | 贝壳网际(北京)安全技术有限公司 | Management method and device for privacy data of browser, and client |
CN104598651A (en) * | 2015-02-27 | 2015-05-06 | 深圳市欧珀通信软件有限公司 | Method and apparatus for managing favorite on mobile terminal |
CN104700001A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device of application program |
CN105046174A (en) * | 2015-07-17 | 2015-11-11 | 中国科学院信息工程研究所 | Disk data protection method and system |
CN105678197A (en) * | 2015-12-30 | 2016-06-15 | 青岛海信移动通信技术股份有限公司 | Client data saving method and mobile terminal |
CN105989116A (en) * | 2015-02-12 | 2016-10-05 | 广东欧珀移动通信有限公司 | Data collection method and device for favorite |
CN108121898A (en) * | 2016-11-30 | 2018-06-05 | 西门子公司 | A kind of program protection method and device |
CN109583242A (en) * | 2018-11-22 | 2019-04-05 | 郑州云海信息技术有限公司 | The method and system that fdisk encrypts under a kind of K-UX system |
CN110324288A (en) * | 2018-03-31 | 2019-10-11 | 汇银宝网络技术股份有限公司 | A method of user's checking is carried out based on mobile storage |
CN111159726A (en) * | 2019-12-10 | 2020-05-15 | 中国电子科技网络信息安全有限公司 | Full disk encryption and decryption method and system based on UEFI (unified extensible firmware interface) environment variable |
CN112199724A (en) * | 2020-10-16 | 2021-01-08 | 江苏小梦科技有限公司 | Internet software internet privacy protection method |
-
2008
- 2008-08-27 CN CN2008100437380A patent/CN101408916B/en not_active Expired - Fee Related
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102508791B (en) * | 2011-09-28 | 2015-05-13 | 辽源环宇佳讯通讯技术有限公司 | Method and device for encrypting hard disk partition |
CN102508791A (en) * | 2011-09-28 | 2012-06-20 | 梁守龙 | Method and device for encrypting hard disk partition |
CN102567688B (en) * | 2011-11-30 | 2015-05-20 | 中标软件有限公司 | File confidentiality keeping system and file confidentiality keeping method on Android operating system |
CN102567688A (en) * | 2011-11-30 | 2012-07-11 | 中标软件有限公司 | File confidentiality keeping system and file confidentiality keeping method on Android operating system |
CN103870766A (en) * | 2012-12-18 | 2014-06-18 | 神讯电脑(昆山)有限公司 | Electronic storage device and data protection method thereof |
CN103235917A (en) * | 2013-03-28 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Application protection method and device |
CN103390026A (en) * | 2013-06-20 | 2013-11-13 | 中国软件与技术服务股份有限公司 | Mobile intelligent terminal security browser and working method thereof |
CN103390026B (en) * | 2013-06-20 | 2017-08-25 | 中国软件与技术服务股份有限公司 | A kind of mobile intelligent terminal secure browser and its method of work |
WO2015043323A1 (en) * | 2013-09-27 | 2015-04-02 | 贝壳网际(北京)安全技术有限公司 | Management method and device for privacy data of browser, and client |
CN104700001A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device of application program |
WO2015081777A1 (en) * | 2013-12-04 | 2015-06-11 | Tencent Technology (Shenzhen) Company Limited | Method and device for encrypting information of an application |
CN104700001B (en) * | 2013-12-04 | 2020-01-10 | 腾讯科技(深圳)有限公司 | Information encryption method and device for application program |
CN105989116A (en) * | 2015-02-12 | 2016-10-05 | 广东欧珀移动通信有限公司 | Data collection method and device for favorite |
CN105989116B (en) * | 2015-02-12 | 2017-11-24 | 广东欧珀移动通信有限公司 | A kind of collection of data method and device of collection |
CN104598651A (en) * | 2015-02-27 | 2015-05-06 | 深圳市欧珀通信软件有限公司 | Method and apparatus for managing favorite on mobile terminal |
CN104598651B (en) * | 2015-02-27 | 2018-01-16 | 广东欧珀移动通信有限公司 | A kind of management method and device of mobile terminal collection |
CN105046174A (en) * | 2015-07-17 | 2015-11-11 | 中国科学院信息工程研究所 | Disk data protection method and system |
CN105678197A (en) * | 2015-12-30 | 2016-06-15 | 青岛海信移动通信技术股份有限公司 | Client data saving method and mobile terminal |
CN108121898A (en) * | 2016-11-30 | 2018-06-05 | 西门子公司 | A kind of program protection method and device |
CN110324288A (en) * | 2018-03-31 | 2019-10-11 | 汇银宝网络技术股份有限公司 | A method of user's checking is carried out based on mobile storage |
CN109583242A (en) * | 2018-11-22 | 2019-04-05 | 郑州云海信息技术有限公司 | The method and system that fdisk encrypts under a kind of K-UX system |
CN111159726A (en) * | 2019-12-10 | 2020-05-15 | 中国电子科技网络信息安全有限公司 | Full disk encryption and decryption method and system based on UEFI (unified extensible firmware interface) environment variable |
CN111159726B (en) * | 2019-12-10 | 2022-09-13 | 中国电子科技网络信息安全有限公司 | UEFI (unified extensible firmware interface) environment variable-based full-disk encryption and decryption method and system |
CN112199724A (en) * | 2020-10-16 | 2021-01-08 | 江苏小梦科技有限公司 | Internet software internet privacy protection method |
Also Published As
Publication number | Publication date |
---|---|
CN101408916B (en) | 2011-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101408916B (en) | Internet software internet privacy protection method | |
US7428306B2 (en) | Encryption apparatus and method for providing an encrypted file system | |
AU2012204448B2 (en) | System and method for in-place encryption | |
US8880879B2 (en) | Accelerated cryptography with an encryption attribute | |
US20070074038A1 (en) | Method, apparatus and program storage device for providing a secure password manager | |
CN102567688B (en) | File confidentiality keeping system and file confidentiality keeping method on Android operating system | |
JP2003044343A5 (en) | ||
US11494508B2 (en) | Secrets as a service | |
CN106682521B (en) | File transparent encryption and decryption system and method based on driver layer | |
KR20210078437A (en) | System, apparatus, and method for secure deduplication | |
CN102868826B (en) | Terminal and terminal data protection method | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
Belenko et al. | “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? | |
JP2007108833A (en) | Device for storing a plurality of passwords and password management method | |
US20090067624A1 (en) | System and method of protecting content of an electronic file using a computer | |
CN103379133A (en) | Safe and reliable cloud storage system | |
Sassani et al. | Evaluating encryption algorithms for sensitive data using different storage devices | |
US20140289517A1 (en) | Methods and apparatuses for securing tethered data | |
CN103516722A (en) | Subscriber stage file automatic encryption and decryption method and device | |
CN110855429A (en) | Software key protection method based on TPM | |
US11997191B2 (en) | System and method for protecting secret data items using multiple tiers of encryption and secure element | |
CN101604296A (en) | Disk-data sector-level encryption method | |
JP4338185B2 (en) | How to encrypt / decrypt files | |
US10992453B2 (en) | System architecture for encrypting external memory | |
JP2006004301A (en) | Method of managing data, and information processing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110622 Termination date: 20110827 |