CN101692264A - Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard - Google Patents
Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard Download PDFInfo
- Publication number
- CN101692264A CN101692264A CN200910070593A CN200910070593A CN101692264A CN 101692264 A CN101692264 A CN 101692264A CN 200910070593 A CN200910070593 A CN 200910070593A CN 200910070593 A CN200910070593 A CN 200910070593A CN 101692264 A CN101692264 A CN 101692264A
- Authority
- CN
- China
- Prior art keywords
- cpu
- key
- encrypting
- file
- keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method of encrypting and protecting files by using the hidden partition (HPA), the CPU ID and the soft keyboard, belonging to the field of the computer security technology. The files are encrypted and protected by encrypting keys under the Windows operation system platform of the Intel CPU, and the encrypting keys are generated according to the following steps: (1) obtaining part of keys from the CPU ID of a personal computer (PC); (2) inputting part of keys manually by the user with the soft keyboard; and (3) connecting the keys obtained in the step (1) with the keys inputted in the step (2) to generate the final encrypting keys. After being encrypted by the final encrypting keys, the files are stored in the HPA at the tail of the hard disc, and the access to the encrypted files by the user and the program is restricted in the way of verifying the access authorization. The invention solves the problem that the original encrypted files can be easily decrypted by violence, has the characteristics of high encryption degree, safety, reliability and simple operation and is suitable for encrypting various files.
Description
Technical field
The invention belongs to the computer security technique field, relate to a kind of encryption protecting method of file.
Background technology
Modern society, file data is very important to everyone, how can effectively protect the file data of individual or company, prevents that the disabled user from obtaining, and has become the topic that people pay close attention to.
The encryption protecting method of current file is of a great variety, generally is the key that the requirement user imports certain-length, and the hiding defencive function of encrypting the back file is generally realized by the bottom document filtering system.Itself there is limitation in the bottom document filtering system, still leaves in the Windows system because encrypt the back file, and is a lot of at the virus of Windows operating system, so relatively still unsafe.Utilize keyboard equipments of recording, IE cache resources extracting tool etc. can be easy to the password that finds the user to input from keyboard, for only needing the manually software of input password, its security does not just guarantee.
Summary of the invention
The object of the invention is to overcome the above-mentioned deficiency of prior art; a kind of method of encrypting and protecting files of realizing under the Windows operating system platform of using the CPU of Intel is provided; method of the present invention can effectively prevent key leakage; prevent that effectively virus or disabled user from conducting interviews to encrypting the back file, and then carry out the possibility of Brute Force after obtaining.
In order to achieve the above object, technical scheme of the present invention is:
A kind of method of encrypting and protecting files that utilizes hidden partition and CPU sequence number and soft keyboard; under the Windows operating system platform of using the CPU of Intel, use; it is characterized in that: the key of encrypt file is made up of two parts key; a part is to obtain a part of key from the CPU sequence number of PC, and another part is the key that is used the soft keyboard input by the user.Then use cryptographic algorithm that file is carried out encryption, the document storage after the encryption is at the hidden partition of hard disk afterbody, and all the other programs can't unauthorized access except that designated program.
Above-mentioned encryption protecting method, can adopt following step:
(1) user uses soft keyboard input designated length key;
(2) on PC, detect this machine CPU sequence number;
(3) choose the part position of the whole of (1) and (2), be linked in sequence into the required key of final cryptographic algorithm;
(4) use cryptographic algorithm then, the key that generates with (3) is as encryption key, with the file of required encryption as input, the file after finally obtaining encrypting;
(5) then the encrypt file that generates is left in the hidden partition of hard disk afterbody by designated program.
(6) judge by described designated program whether access privilege is legal, is then file to be decrypted, otherwise can't visit hidden partition.
Wherein said Windows operating system refers to Windows 2000 operating systems, Windows XP operating system and Windows VISTA operating system; The wherein said CPU of Intel refers to Intel486
TMCPU after the model.
The present invention realizes encrypting and protecting files under the Windows operating system platform of using the CPU of Intel; its substantive distinguishing features is: the present invention adopts soft keyboard to carry out the key input; can effectively prevent key leakage; simultaneously in conjunction with CPU sequence number and hidden partition (HPA); make the safer method of file after the encryption, thereby protect encrypt file not visited and obtain effectively by the disabled user.
Compared with prior art, the present invention has following tangible advantage: because the present invention has used the CPU of the Intel sequence number of PC when encryption key generates, even only get its preceding 10, identical probability
Approach 0, make declassified document on the PC of encrypt file, to carry out; Adopt soft keyboard input user key, prevent of the threat of relevant hacker software effectively keyboard input record; Use hidden partition (HPA) technology, strengthened protection, prevent that effectively virus or disabled user from conducting interviews to encrypting the back file, and then carry out the possibility of Brute Force after obtaining the file after encrypting.
The present invention only carries out the elaboration of the inventive method as cryptographic algorithm with aes algorithm, but cryptographic algorithm can be not limited to aes algorithm, when choosing other cryptographic algorithm, can adjust the length of the manual key of importing of user and the length of the CPU sequence number that uses according to the length of the required key of algorithm.
Description of drawings
Fig. 1 is that encryption key of the present invention generates synoptic diagram.
Fig. 2 is that user key of the present invention and CPU sequence number part position is linked in sequence and generates final encryption key synoptic diagram.
Embodiment
Now for hiding data; popular is hidden partition (HPA) technology; this Technology Need is revised MBR and is set up a physical protection subregion at the hard disk afterbody; the physical protection subregion is to set up automatically; be independent of the place disk partition of Windows operating system; virus can't infect, and can't delete.Behind the intact file of user encryption, the document storage after will encrypting by designated program is in the physical protection subregion that the hard disk afterbody is set up, and hidden partition is increase constantly, has played like this more effective protection of encrypt file.
The CPU of Intel is from Intel486
TMWork the function of supporting to detect the CPU sequence number, the CPU of Intel sequence number is shown by 24 16 system numerical tables, because the identical probability of sequence number is
Be approximately 0, make decryption oprerations on same PC, to carry out, so use the CPU sequence number to generate encryption key, the security that has improved encryption key.
The present invention is under the PC that uses CPU of Intel and Windows operating system platform; use the high strength encrypting algorithm; generate final secret key encryption file by the part position of using the user to import key and PC CPU sequence number, cooperate the hidden partition (HPA) of hard disk afterbody to hide the encryption protecting method of protecting the file after encrypting afterwards.
Below by specific embodiment the present invention is carried out more detailed description:
Ciphering process comprises the steps that the present invention is example with the aes algorithm, referring to Fig. 1 and Fig. 2:
At first obtain to encrypt required key, aes algorithm needs 16, i.e. the key of 128bit length:
(1) user uses 6 keys of soft keyboard input.It is long that the reason of selecting 6 bit lengths for use is that the user imports, and is not easy to user's self memory.If the user imports 6 of curtailments, then add and specify key to form 6 by designated program; If user's input surpasses 6, then can designated program ignore unnecessary key, only stay top 6 keys.
(2) on PC, obtain the preceding 10 bit CPU sequence numbers of this machine, the identical probability of preceding 10 bit sequence number of Intel by designated program
This shows that probability is approximately zero, and the CPU of AMD do not support sequence number, so declassified document is impossible substantially on different computers.
(3) 10 keys that 6 keys that (1) generated and (2) generate according to 1 key getting earlier in (1), are then got 2 keys in (2), are linked in sequence into 16 keys that final cryptographic algorithm is required.
Use aes algorithm then, 16 keys that (3) are generated carry out the input of the file of encryption as algorithm, the file after finally obtaining encrypting as encryption key with preparing.
Then the encrypt file that generates is left in the hidden partition (HPA) of hard disk afterbody by designated program.Can whether delete the file before encrypting according to user's needs.Hidden partition (HPA) should be created out by designated program before encrypt file, and carrying out along with the encryption and decryption operation, hidden partition (HPA) can become big dynamically or diminish, and the shared disk size of Windows operating system is also along with dynamic change.
At last, use designated program can be decrypted operation, whether correct by judging user cipher; be then can be decrypted operation; otherwise can't decipher, the file after then encrypting is in hidden state, to reach the visit that the protection encrypt file prevents disabled user or program.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (4)
1. method of encrypting and protecting files that utilizes hidden partition and CPU sequence number and soft keyboard, under the Windows operating system platform of using the CPU of Intel, use, it is characterized in that: the key of encrypt file is made up of two parts key, a part is to obtain a part of key from the CPU sequence number of PC, and another part is the key that is used the soft keyboard input by the user; Then use cryptographic algorithm that file is carried out encryption, the document storage after the encryption is at the hidden partition of hard disk afterbody, and all the other programs can't unauthorized access except that designated program.
2. encryption protecting method according to claim 1, it is characterized in that: process may further comprise the steps:
(1) user uses soft keyboard input designated length key;
(2) on PC, detect this machine CPU sequence number;
(3) choose the part position of the whole of (1) and (2), be linked in sequence into the required key of final cryptographic algorithm;
(4) use cryptographic algorithm, the key that generates with (3) is as encryption key, with the file of required encryption as input, the file after finally obtaining encrypting;
(5) encrypt file that generates is left in the hidden partition of hard disk afterbody by designated program.
(6) judge by described designated program whether access privilege is legal, is then file to be decrypted, otherwise can't visit hidden partition.
3. method according to claim 1, wherein said Windows operating system refers to Windows 2000 operating systems, Windows XP operating system and Windows VISTA operating system.
4. method according to claim 1, the wherein said CPU of Intel refers to Intel486
TMCPU after the model.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910070593A CN101692264A (en) | 2009-09-25 | 2009-09-25 | Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910070593A CN101692264A (en) | 2009-09-25 | 2009-09-25 | Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101692264A true CN101692264A (en) | 2010-04-07 |
Family
ID=42080948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910070593A Pending CN101692264A (en) | 2009-09-25 | 2009-09-25 | Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101692264A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908024A (en) * | 2010-08-17 | 2010-12-08 | 湖南源科高新技术有限公司 | Encrypting method, device and hard disk |
CN105656866A (en) * | 2014-12-02 | 2016-06-08 | 华为技术有限公司 | Data encryption method and system |
CN108809634A (en) * | 2017-05-02 | 2018-11-13 | 青岛博文广成信息安全技术有限公司 | Part of key tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China technical method |
-
2009
- 2009-09-25 CN CN200910070593A patent/CN101692264A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908024A (en) * | 2010-08-17 | 2010-12-08 | 湖南源科高新技术有限公司 | Encrypting method, device and hard disk |
WO2012022207A1 (en) * | 2010-08-17 | 2012-02-23 | 湖南源科高新技术有限公司 | Method and device for encryption and hard disk |
CN105656866A (en) * | 2014-12-02 | 2016-06-08 | 华为技术有限公司 | Data encryption method and system |
CN108809634A (en) * | 2017-05-02 | 2018-11-13 | 青岛博文广成信息安全技术有限公司 | Part of key tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China technical method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI463349B (en) | Method and system for secure data access among two devices | |
CN105740725B (en) | A kind of document protection method and system | |
CN102567688B (en) | File confidentiality keeping system and file confidentiality keeping method on Android operating system | |
CN103236930A (en) | Data encryption method and system | |
US20120284534A1 (en) | Memory Device and Method for Accessing the Same | |
CN102236756A (en) | File encryption method based on TCM (trusted cryptography module) and USBkey | |
CN107908574A (en) | The method for security protection of solid-state disk data storage | |
CN103440462A (en) | Embedded control method for improving security and secrecy performance of security microprocessor | |
CN104639332A (en) | Protective method for solid-state disk encryption key | |
Belenko et al. | “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? | |
CN108537048B (en) | Security association method and system for encrypted solid state disk and authorized computer | |
CN101692265A (en) | Method of encrypting and protecting files | |
CN105160272B (en) | A kind of safe encryption method and system based on autonomous controlled data library | |
CN101692266A (en) | Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID | |
CN105760789A (en) | Protection method for encryption key in encrypted mobile solid-state disk | |
CN1266617C (en) | Computer data protective method | |
CN101692264A (en) | Method of encrypting and protecting files by using hidden partition (HPA), CPU ID and soft keyboard | |
CN104463003A (en) | File encryption protecting method | |
CN102426637B (en) | A kind of embedded database cryptographic storage method | |
CN102270182B (en) | Encrypted mobile storage equipment based on synchronous user and host machine authentication | |
CN101795194B (en) | Method for protecting multi-digital certificate of intelligent card | |
CN102883039A (en) | Method for encrypting multimedia private diary of mobile phone | |
KR101318668B1 (en) | Portable memory card having information security function | |
US11997191B2 (en) | System and method for protecting secret data items using multiple tiers of encryption and secure element | |
CN102831360B (en) | Personal electronic document safety management system and management method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20100407 |