CN101604296A - Disk-data sector-level encryption method - Google Patents

Disk-data sector-level encryption method Download PDF

Info

Publication number
CN101604296A
CN101604296A CNA2009103049606A CN200910304960A CN101604296A CN 101604296 A CN101604296 A CN 101604296A CN A2009103049606 A CNA2009103049606 A CN A2009103049606A CN 200910304960 A CN200910304960 A CN 200910304960A CN 101604296 A CN101604296 A CN 101604296A
Authority
CN
China
Prior art keywords
data
disk
user
password
deciphering module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2009103049606A
Other languages
Chinese (zh)
Inventor
许元进
吴滨华
杨小焰
林华斌
吴慧明
洪跃强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Original Assignee
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd filed Critical FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority to CNA2009103049606A priority Critical patent/CN101604296A/en
Publication of CN101604296A publication Critical patent/CN101604296A/en
Pending legal-status Critical Current

Links

Images

Abstract

The present invention relates to data in magnetic disk encryption technology field, particularly a kind of disk-data sector-level encryption method, it is provided with the data encrypting and deciphering module between operating system and disk, it takes over operating system and the application software read-write requests to disk fully, when writing data in magnetic disk, the at first acquire the right of control of this module, the password of importing according to the user carries out cryptographic operation, and the data that will encrypt write the disk assigned address then; During the reading disk data, the same preferential acquire the right of control of this module is decrypted operation to disk assigned address reading of data and the password imported according to the user, and the data after will deciphering are then submitted to corresponding program; Described data encrypting and deciphering module is in the uni-directional hash value of the authentication password of assigned address storage user preset, when unknown subscriber's login system and when inputing password, the uni-directional hash value of the password of this user input is made comparisons with the uni-directional hash value of authentication password, to verify validated user.This encryption method is difficult for cracking, and cipher round results is good.

Description

Disk-data sector-level encryption method
Technical field
The present invention relates to data in magnetic disk encryption technology field, particularly a kind of disk-data sector-level encryption method.
Background technology
To the encryption of data in magnetic disk, divide from the level of encrypting, disk level (sector-level) encryption method and file-level encryption method two big classes are arranged.Compared to the file-level encryption method, the advantage of disk level encryption method is:
The Cipher Strength height, security is good.Because this other cipher mode of level is directly encrypted the disk physical sector, do not consider the logical concept of storage data such as file, under this cipher mode, any data that are stored on the disk are all encrypted, on the contrary, adopt general of the cryptographic algorithm of file-level that some file of user's appointment is encrypted, and these files are in the daily use of user, system generally can be at the backup file of local interim these files of storage such as temp directory, though generally speaking, these temporary files all can be deleted after use, but because a variety of causes, temporary file might be omitted and not timely these temporary files of deletion by system after creating temporary file.In addition, in theory, even temporary file is deleted, as long as the data field of these temporary file storages is not capped or did operations such as encryption, just can easily regain by means such as anti-deletions, therefore, the cipher mode of disk level is safer than the cipher mode of file-level.
And in sector-level encryption method, have again:
1, revise the information table of hard disk guiding: this method more easily cracks comparatively speaking, the 02H subfunction of the enough INT 13H of energy is read 0 cylinder, 0 magnetic head, 1 sector, rule of thumb the relevant position data are repaired, realization is to the hard disk release, because the data of these positions are normally fixing or limited several situations.Just can't be to hard disk release and access hard disk.
2, fdisk control of authority: the method be the subregion list structure that utilizes each Logical Disk in the hard disk partition table, adopt the compilation programming to realize, to destroy, do not allow the refitting system.
Crack easily in the said method, data are not carried out real encryption, and may cause heap file to damage, cause capsule information to be lost.
Summary of the invention
The objective of the invention is to overcome the deficiencies in the prior art, a kind of disk-data sector-level encryption method is provided, this encryption method is difficult for cracking, and cipher round results is good.
For achieving the above object, the invention provides a kind of disk-data sector-level encryption method, this encryption method is provided with the data encrypting and deciphering module between operating system and disk;
Described data encrypting and deciphering module is taken over operating system and the application software read-write requests to disk fully, when system when disk writes data, the at first acquire the right of control of described data encrypting and deciphering module, password according to user's input carries out cryptographic operation to the data that will write, and the data that will encrypt write the disk assigned address then; When system read to the disk reading of data, the same preferential acquire the right of control of described data encrypting and deciphering module was decrypted operation to disk assigned address reading of data and the password imported according to the user, and the data after will deciphering are then submitted to corresponding program;
Described data encrypting and deciphering module is in the uni-directional hash value of the authentication password of assigned address storage user preset, when unknown subscriber's login system and when inputing password, described data encrypting and deciphering module is done the uni-directional hash computing with the password of described unknown subscriber's input, and the uni-directional hash value of operation result and described authentication password compared, as identical, judge that then described unknown subscriber is validated user, requirement according to this user is carried out corresponding read-write operation to disk, as difference, judge that then described unknown subscriber is the disabled user, refuse the read-write requests of this user disk.
The invention has the beneficial effects as follows the encryption method of employing based on the physical sector level, it can be encrypted all data that are kept on the hard disk, comprise the cryptographic operation system, any data that are stored on the disk are all encrypted, unauthorized user not only be can't see the file content on the hard disk, and can't see the title that is kept at any file on the disk.
The present invention is described in further detail below in conjunction with drawings and the specific embodiments.
Description of drawings
Fig. 1 is the encryption and decryption schematic diagram of the embodiment of the invention.
Fig. 2 is the computer starting process flow diagram of the embodiment of the invention.
Embodiment
Disk-data sector-level encryption method of the present invention is provided with the data encrypting and deciphering module, as shown in Figure 1 between operating system and disk.
Described data encrypting and deciphering module is taken over operating system and the application software read-write requests to disk fully, when system when disk writes data, the at first acquire the right of control of described data encrypting and deciphering module, password according to user's input carries out cryptographic operation to the data that will write, and the data that will encrypt write the disk assigned address then; When system read to the disk reading of data, the same preferential acquire the right of control of described data encrypting and deciphering module was decrypted operation to disk assigned address reading of data and the password imported according to the user, and the data after will deciphering are then submitted to corresponding program.
Described data encrypting and deciphering module is in the uni-directional hash value of the authentication password of assigned address storage user preset, when unknown subscriber's login system and when inputing password, described data encrypting and deciphering module is done the uni-directional hash computing with the password of described unknown subscriber's input, and the uni-directional hash value of operation result and described authentication password compared, as identical, judge that then described unknown subscriber is validated user, requirement according to this user is carried out corresponding read-write operation to disk, as difference, judge that then described unknown subscriber is the disabled user, refuse the read-write requests of this user disk.
As shown in Figure 2, adopt the start-up course of the computing machine that this method encrypts data in magnetic disk to be different from prior art, it comprises the steps:
(1) starts computing machine;
(2) the request user inputs password;
(3) described data encrypting and deciphering module is done the uni-directional hash computing with the password of this user's input;
(4) the uni-directional hash value of operation result with default authentication password compared,, judge that then this user is validated user, be decrypted operation to disk assigned address reading system log-on data and the password imported according to the user as identical;
(5) load operation system in the usual way.
The present invention writes from data and encrypts and read these two processes of deciphering and realized cryptographic operation to data in magnetic disk.But since data write or readout all needs correct password to carry out data encryption or decryption oprerations, therefore, change user's use habit for the convenience of the user and not, what the present invention adopted is the method for dynamic encryption and deciphering, after validated user is correctly inputed password and login system, described data encrypting and deciphering module is preserved the password of user's input automatically, when the user carries out data writing operation, described data encrypting and deciphering module loads the password of preservation automatically, so that the data that will write are carried out cryptographic operation; When the user carried out the read data operation, described data encrypting and deciphering module was to disk assigned address reading of data and load the password of preserving automatically, so that data are decrypted operation.Thereby make data write with readout all be transparent concerning validated user, the data write operation has any difference after its imperceptible at all employing encryption method of the present invention, data when data of storing on the disk and unencryption are just the same, can directly use data in magnetic disk in normal mode.
Its principle of various disk encryptions is identical, all can abstractly be hook (hook) theory.Promptly on data this path from the user interface to the disk somewhere, the processing procedure of oneself is installed, i.e. " hook ".When the request that writes arrives earlier data through mathematic(al) manipulation, and then call processing procedure on the original path, be written to disk, when request arrives, earlier data through reciprocal transformation, and then be delivered to upper level applications.Encryption method of the present invention adopts the filtering layer driver to realize HD encryption, promptly hook is placed on following one deck of disk driver, by taking over the read-write requests of operating system fully to disk, on sector level, carry out encrypting and decrypting, its reach is identical with hardware encipher, all is whole magnetic disk.This Hook's Realization is not that replace the simple function address on the common meaning, but realizes by a complete filtering layer device driver.It provides and the irrelevant access interface of hard disk at the hardware driving layer, and the upper strata is considered as continuous storage medium to hard disk; At the file system access interface that I/O service interface layer provides and file system format is irrelevant, the upper strata is considered as unified file system to hard disk and no matter this document is what form is.Like this, owing to adopt the driver that compares bottom to realize that can combine together with operating system, speed is faster, encrypt more thorough.Characteristics such as it is very fast that this hard disk encryption method possesses speed, and algorithm is variable, irrelevant with file system, and usable range is wide.Though, owing to used driver, realize more difficultly, with respect to realizing that in the client layer application program it combines together with operating system, and its realization mechanism is identical on different platforms, so have better adaptability.
The present invention can adopt the cryptographic algorithm of present international popular, and there is multiple encryption algorithms to select for the user, according to the principle of contemporary cryptology we as can be known, do not having under the situation of key, even the cracker is knowing under the various prerequisites such as cryptographic algorithm, want the data behind the enabling decryption of encrypted, also be very difficult, the key length that is provided with as the user reaches 16 characters when above, under the condition of active computer arithmetic speed, analyze theoretically, want the data behind the enabling decryption of encrypted, the required time was digit with 1,000,000 years also.
Import key the user, under the situation of normal startup computing machine, the data that are stored on the disk are transparent (promptly In the view of the user to the user, the data that are stored on the disk are expressly), therefore, encryption method of the present invention can't prevent under the normal situation about using of computing machine, transmission mediums such as other users from networks copy user's data, she only is applicable at computer shutdown, under the dormancy and the situation of losing (because in this case, computing machine generally is in shutdown or dormant state, from the principle of Etim-DiskEnc as can be known, all data of storing on the disk are all encrypted, and under the state of computer shutdown or dormancy, want to decipher the data on the disk, must import key), can guarantee that the data in the computing machine are not divulged a secret.
The place one's entire reliance upon password of user preset of the data security that the present invention encrypts disk.In order to prevent to crack, encryption method of the present invention is storage user's preset password on disk not, but the uni-directional hash value of storage user preset password, be used for the correctness that the comparison unknown subscriber inputs password, and according to existing password scientific principle opinion as can be known, be the preset password that can't backstepping goes out original input by hashed value.In fact, encryption method of the present invention can not stored any information relevant with password fully on disk, as long as importing any key, the user just continues to carry out, under this execution flow process, having only password when user input is under the correct situation, data that could correct deciphering disk, otherwise, data after " deciphering " only can be more random, and certainly operating system also can start, and the user has only by restarting computing machine and inputs the correct password system that uses a computer again.
Certainly, as can be known from the above analysis, adopt encryption method of the present invention, under the situation of password loss, the data on the disk can't be replied.Therefore, the user must keep oneself default Crypted password firmly in mind behind preset password.
More than be preferred embodiment of the present invention, all changes of doing according to technical solution of the present invention when the function that is produced does not exceed the scope of technical solution of the present invention, all belong to protection scope of the present invention.

Claims (3)

1. a disk-data sector-level encryption method is characterized in that: the data encrypting and deciphering module is set between operating system and disk;
Described data encrypting and deciphering module is taken over operating system and the application software read-write requests to disk fully, when system when disk writes data, the at first acquire the right of control of described data encrypting and deciphering module, password according to user's input carries out cryptographic operation to the data that will write, and the data that will encrypt write the disk assigned address then; When system read to the disk reading of data, the same preferential acquire the right of control of described data encrypting and deciphering module was decrypted operation to disk assigned address reading of data and the password imported according to the user, and the data after will deciphering are then submitted to corresponding program;
Described data encrypting and deciphering module is in the uni-directional hash value of the authentication password of assigned address storage user preset, when unknown subscriber's login system and when inputing password, described data encrypting and deciphering module is done the uni-directional hash computing with the password of described unknown subscriber's input, and the uni-directional hash value of operation result and described authentication password compared, as identical, judge that then described unknown subscriber is validated user, requirement according to this user is carried out corresponding read-write operation to disk, as difference, judge that then described unknown subscriber is the disabled user, refuse the read-write requests of this user disk.
2. disk-data sector-level encryption method according to claim 1 is characterized in that: adopt the start-up course of the computing machine that this method encrypts data in magnetic disk to comprise the steps:
(1) starts computing machine;
(2) the request user inputs password;
(3) described data encrypting and deciphering module is done the uni-directional hash computing with the password of this user's input;
(4) the uni-directional hash value of operation result with default authentication password compared,, judge that then this user is validated user, be decrypted operation to disk assigned address reading system log-on data and the password imported according to the user as identical;
(5) load operation system in the usual way.
3. disk-data sector-level encryption method according to claim 1 and 2, it is characterized in that: after validated user is correctly inputed password and login system, described data encrypting and deciphering module is preserved the password of user's input automatically, when the user carries out data writing operation, described data encrypting and deciphering module loads the password of preservation automatically, so that the data that will write are carried out cryptographic operation; When the user carried out the read data operation, described data encrypting and deciphering module was to disk assigned address reading of data and load the password of preserving automatically, so that data are decrypted operation.
CNA2009103049606A 2009-07-29 2009-07-29 Disk-data sector-level encryption method Pending CN101604296A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2009103049606A CN101604296A (en) 2009-07-29 2009-07-29 Disk-data sector-level encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2009103049606A CN101604296A (en) 2009-07-29 2009-07-29 Disk-data sector-level encryption method

Publications (1)

Publication Number Publication Date
CN101604296A true CN101604296A (en) 2009-12-16

Family

ID=41470032

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2009103049606A Pending CN101604296A (en) 2009-07-29 2009-07-29 Disk-data sector-level encryption method

Country Status (1)

Country Link
CN (1) CN101604296A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104881613A (en) * 2014-02-27 2015-09-02 中国科学院声学研究所 Disk global data encryption system and method
CN106357412A (en) * 2016-10-14 2017-01-25 国政通科技股份有限公司 Method, device and system for verifying identity information
CN108900550A (en) * 2018-08-15 2018-11-27 北京信安世纪科技股份有限公司 Unified cipher management method for server
CN109325355A (en) * 2018-01-11 2019-02-12 白令海 Mobile terminal data method for secure storing based on virtual disk

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104881613A (en) * 2014-02-27 2015-09-02 中国科学院声学研究所 Disk global data encryption system and method
CN106357412A (en) * 2016-10-14 2017-01-25 国政通科技股份有限公司 Method, device and system for verifying identity information
CN106357412B (en) * 2016-10-14 2019-11-26 国政通科技股份有限公司 A kind of method, apparatus and system for veritifying identity information
CN109325355A (en) * 2018-01-11 2019-02-12 白令海 Mobile terminal data method for secure storing based on virtual disk
CN108900550A (en) * 2018-08-15 2018-11-27 北京信安世纪科技股份有限公司 Unified cipher management method for server
CN108900550B (en) * 2018-08-15 2021-04-30 北京信安世纪科技股份有限公司 Unified password management method for server

Similar Documents

Publication Publication Date Title
US11263020B2 (en) System and method for wiping encrypted data on a device having file-level content protection
US10348497B2 (en) System and method for content protection based on a combination of a user pin and a device specific identifier
US8412934B2 (en) System and method for backing up and restoring files encrypted with file-level content protection
US8589680B2 (en) System and method for synchronizing encrypted data on a device having file-level content protection
US8433901B2 (en) System and method for wiping encrypted data on a device having file-level content protection
US8233624B2 (en) Method and apparatus for securing data in a memory device
CN100585608C (en) Data file safe treatment method and system
CN103530570A (en) Electronic document safety management system and method
CN102882923A (en) Secure storage system and method for mobile terminal
CN105117635A (en) Local data security protection system and method
US8891773B2 (en) System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions
CN104123506A (en) Data access method and device and data encryption storage and access method and device
US20080098217A1 (en) Method for efficient and secure data migration between data processing systems
CN101604296A (en) Disk-data sector-level encryption method
CN106919348A (en) Distributed memory system and storage method that anti-violence is cracked
CN116594567A (en) Information management method and device and electronic equipment
CN101763319A (en) Disk FDE (Full Disk Encryption) system and method
CN113342896B (en) Scientific research data safety protection system based on cloud fusion and working method thereof
CN115712927A (en) Encryption disc key management method
SWATHI et al. A Survey on Secure and Authorized De-Duplication using Hybrid Clouds
JP2013074386A (en) Information leakage prevention system for portable terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20091216