CN101901320A - Data leakage prevention method for electronic book reader - Google Patents
Data leakage prevention method for electronic book reader Download PDFInfo
- Publication number
- CN101901320A CN101901320A CN2010102419191A CN201010241919A CN101901320A CN 101901320 A CN101901320 A CN 101901320A CN 2010102419191 A CN2010102419191 A CN 2010102419191A CN 201010241919 A CN201010241919 A CN 201010241919A CN 101901320 A CN101901320 A CN 101901320A
- Authority
- CN
- China
- Prior art keywords
- password
- file
- book reader
- encrypted
- usb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a data leakage prevention method for an electronic book reader. The method is based on a password setting module, an encryption canceling module and a password verification module connected with a sqlite3 database in an Android system, wherein the password setting module comprises file encryption and machine encryption; the encryption canceling module comprises file decryption and machine decryption; and the password verification module comprises file opening, start-up password verification and USB password verification. The electronic book reader after a series of data leakage prevention treatments realizes that other people cannot examine a user private file by using any means such as using a computer or directly using the electronic book reader and the like, and a user can select file encryption, machine encryption or file and machine concurrent encryptions according to needs to determine the encryption level, so the user private file of the electronic book reader can be comprehensively, multiply and effectively protected, and data leakage can be prevented.
Description
Technical field
The present invention relates to a kind of data leakage prevention method, particularly relate to and a kind ofly be used for E-book reader and based on the data leakage prevention method of Android system.
Background technology:
Along with the development of E-Ink screen, E-book reader is liked by masses deeply, more and more being applied in people's life, and quite promising Android operating system also more and more is applied on the E-book reader.In science and technology highly developed today, information security issue is extremely urgent, people also more and more pay attention to personal information security, seldom has the anti-data-leakage function in the Android operating system in the existing E-book reader, though perhaps have the anti-data-leakage function, price is higher and cause and can not popularize.People have become the urgent demand of user to the data security protecting of electric paper book.
Summary of the invention:
The objective of the invention is to overcome the deficiencies in the prior art; a kind of data leakage prevention method that is used for E-book reader is provided; by file password and E-book reader password are set, can protect comprehensively and multi-effectively the user of E-book reader private document, prevent data leak.
In order to achieve the above object, the technical solution used in the present invention is: a kind of data leakage prevention method that is used for E-book reader is provided with crypto module, cancellation encrypting module, password authentication module based on what link to each other with the sqlite3 database in the Android system.Crypto module is set comprises that file encryption and machine encrypt, user's select File as required encrypts or machine encryption or file and machine are encrypted simultaneously; The cancellation crypto module comprises file decryption and machine decryption; Password authentication module comprise open file, start-up password verification, USB password authentification.
File encryption, open file, the data of file decryption, machine encryption, start-up password verification, USB password authentification and the required preservation of machine decryption all need to be placed on the sqlite3 database, the sqlite3 database is the data security stored data base that the Android system provides.
File encryption is saved in the data security memory mechanism sqlite3 database that the Android system provides for file password that the user is provided with or E-book reader password; Opening file is opening document on E-book reader, need write down by the password in the visit sqlite3 database and do cryptographic check; File decryption is for directly deleting respective record from the sqlite3 database; Password authentification then is that the password in input of password that the user is current and the sqlite3 database writes down and makes comparisons; Start-up password verification, when the USB password authentification is used E-book reader for the user, start or be connected to computer by USB all needs to write down by the password in the visit sqlite3 database and does cryptographic check; Machine decryption is the sqlite3 database that enters e-book, deletion machine password, the cancellation simultaneously of startup password and USB password.
Compared with prior art, the invention has the beneficial effects as follows: encrypt and the E-book reader of file encryption has been realized the function that others can't be by computer or directly uses any means such as E-book reader to check user's secret file through machine, comprehensively, prevented the user's data leakage completely, user's select File as required encrypts or machine encryption or file and machine are encrypted the level that decision is encrypted simultaneously.
Description of drawings:
Fig. 1 is a system principle diagram of the present invention;
Fig. 2 is machine encryption flow figure of the present invention;
Fig. 3 is a start-up password verification process flow diagram of the present invention;
Fig. 4 is a USB password authentification process flow diagram of the present invention;
Fig. 5 is a file encryption process flow diagram of the present invention;
Fig. 6 is the process flow diagram that opens file of the present invention.
Embodiment:
Central idea of the present invention is to overcome the deficiencies in the prior art, and a kind of data leakage prevention method that is used for E-book reader is provided, can protect comprehensively and multi-effectively the user of E-book reader private document, prevent data leak.Be elaborated with reference to accompanying drawing below in conjunction with embodiment, so that technical characterictic of the present invention and advantage are carried out more deep annotation.
System principle diagram of the present invention as shown in Figure 1, a kind of data leakage prevention method that is used for E-book reader is provided with crypto module, cancellation encrypting module, password authentication module based on what link to each other with the sqlite3 database in the Android system.Crypto module is set comprises that file encryption and machine encrypt, user's select File as required encrypts or machine encryption or file and machine are encrypted simultaneously; The cancellation crypto module comprises file decryption and machine decryption; Password authentication module comprise open file, start-up password verification, USB password authentification.
File encryption, open file, the data of file decryption, machine encryption, start-up password verification, USB password authentification and the required preservation of machine decryption all need to be placed on the sqlite3 database, the sqlite3 database is the data security stored data base that the Android system provides.
File encryption is saved in the data security memory mechanism sqlite3 database that the Android system provides for file password that the user is provided with or E-book reader password; Opening file is opening document on E-book reader, need write down by the password in the visit sqlite3 database and do cryptographic check; File decryption is for directly deleting respective record from the sqlite3 database; Password authentification then is that the password in input of password that the user is current and the sqlite3 database writes down and makes comparisons; Start-up password verification, when the USB password authentification is used E-book reader for the user, start or be connected to computer by USB all needs to write down by the password in the visit sqlite3 database and does cryptographic check; Machine decryption is the sqlite3 database that enters e-book, deletion machine password, the cancellation simultaneously of startup password and USB password.
The machine encrypting module comprises startup password, USB password is set that in case startup password and USB password are set up, then the two password is identical, unified E-book reader password for user's setting.The user must be provided with startup password when group is provided with the E-book reader password, but the user selects to be provided with whether simultaneously the USB password as required.The user is provided with startup password and when the USB password was not set, then the user need could normally use E-book reader by start-up password verification, and directly connects computer by USB, operates file on the E-book reader flash by computer.When the user is provided with startup password and USB password simultaneously, when then connecting USB, need by computer on the USB password authentification ability carry.
Machine is encrypted and to be comprised startup password and USB password setting, the process flow diagram that machine is encrypted as shown in Figure 2, step is as follows:
Step 1, enter e-book and use to be provided with;
Step 2, carry out machine and encrypt;
Step 3, user judge whether USB is encrypted as required, and USB encrypts and then has startup password and USB password simultaneously, and then only there is startup password in unencryption;
Step 4, encrypt successfully.
The decryption step that machine is encrypted is as follows: at first enter the e-book setting, delete the E-book reader password then, then startup password and USB password cancellation simultaneously.
The checking process flow diagram of the startup password during machine is encrypted as shown in Figure 3, step is as follows:
Step 1, user's unlocking electronic book reader;
Step 2, Android system can send start and finish broadcasting, and application layer receives the start that the Android system sends and finishes broadcasting, and visit sqlite3 database checks whether be provided with startup password earlier;
Step 3, E-book reader are not provided with startup password and then go to main interface and begin normally to use E-book reader, E-book reader is provided with startup password and then starts new task Actitivy, eject the picture of a password authentification, enter the password authentification stage, the user is by cryptographic check, then go to main interface and begin normally to use E-book reader, then can't not use by cryptographic check.
USB password authentification process flow diagram during machine is encrypted as shown in Figure 4, step is as follows:
Step 1, E-book reader connect computer by USB;
Step 2, application layer receive that the USB that the android system sends connects broadcasting, and inquiry sqlite3 database checks whether be provided with the USB password earlier;
Step 3, be not provided with password then automatically carry to computer, need not the manual carry of user, password is set then needs password authentification, password authentification not by E-book reader then can not carry to computer, the user can't operate the content of flash file in the E-book reader by computer, password authentification is passed through, then normal carry.
The file encryption process flow diagram as shown in Figure 5, step is as follows:
Step 103, affirmation password setting are finished;
Menu is encrypted in step 105, click;
The file that step 106, selection will be encrypted;
Step 107, reaffirm password, encrypt successfully.
In step 102,, can will reset after original password deletion or original password be made amendment if password has been set.
File encryption also can be in the following way, and its step is as follows:
Step 201, enter listed files;
Step 202, click to encrypt menu, judge whether file is encrypted, the file unencryption then execution in step 20 3., file encryption then skips to step 203;
Step 20 enters file password setting interface 3., automatically, and the file password is set;
Step 20 4., confirm that password setting finishes, rebound listed files automatically;
Step 203/20 5., select the file that will encrypt;
Step 204/20 6., reaffirm password, encrypt successfully.
All Files password through encryption is identical, when having avoided giving file encryption, all needs the user to input the complicated processes of password at every turn.
The process flow diagram of opening encrypt file as shown in Figure 6, step is as follows:
Step 1, enter listed files, choose a File Open
Step 2, visit sqlite3 database password record judge whether file is encrypted;
Step 3, file unencryption then open file, and file encryption is Activity interface of system creation then, enters the password authentification stage, and checking is by then opening file.
The decryption method step of single encrypt file is as follows: enter listed files, click the deciphering menu, choose encrypted file, need to confirm the file of deciphering, Activity interface of system creation enters the password authentification stage, and checking is disengaged by the encrypted state of selected file then.
All the decryption method step of encrypt file is as follows: enter the e-book setting in the E-book reader, and the deleted file password, then all encrypt files are decrypted, and the file password of e-book is not for sending out configuration state as yet simultaneously.
The user selects machine encryption or file encryption or machine and file to encrypt simultaneously as required, and is convenient and swift, is easy to realize the anti-data-leakage of E-book reader.
Although the present invention by specific embodiment machine is encrypted and file encryption has been made clear and complete description, but the present invention is not limited only to described embodiment, and to one skilled in the art, all improvement and the selection made based on the present invention are contingent and all be included in the present invention.
Claims (8)
1. data leakage prevention method that is used for E-book reader, based on what link to each other with the sqlite3 database in the Android system crypto module, cancellation encrypting module, password authentication module be set, it is characterized in that, it is characterized in that, described machine is encrypted and is comprised startup password and USB password setting, and the step that machine is encrypted is as follows:
Step 1, enter e-book and use to be provided with;
Step 2, carry out machine and encrypt;
Step 3, user judge whether USB is encrypted as required, and USB encrypts and then has startup password and USB password simultaneously, and then only there is startup password in unencryption;
Step 4, encrypt successfully.
2. the data leakage prevention method that is used for E-book reader according to claim 1, it is characterized in that, the decryption step that described machine is encrypted is as follows: at first enter the e-book setting, delete the E-book reader password then, then startup password and USB password cancellation simultaneously.
3. the data leakage prevention method that is used for E-book reader according to claim 2 is characterized in that, the verification step of the startup password during described machine is encrypted is as follows:
Step 1, user's unlocking electronic book reader;
Step 2, Android system can send start and finish broadcasting, and application layer receives the start that the Android system sends and finishes broadcasting, and visit sqlite3 database checks whether be provided with startup password earlier;
Step 3, E-book reader are not provided with startup password and then go to main interface and begin normally to use E-book reader, E-book reader is provided with startup password and then starts new task Actitivy, eject the picture of a password authentification, enter the password authentification stage, the user is by cryptographic check, then go to main interface and begin normally to use E-book reader, then can't not use by cryptographic check.
4. the data leakage prevention method that is used for E-book reader according to claim 3 is characterized in that, the step of the USB password authentification during described machine is encrypted is as follows:
Step 1, E-book reader connect computer by USB;
Step 2, application layer receive that the USB that the android system sends connects broadcasting, and inquiry sqlite3 database checks whether be provided with the USB password earlier;
Step 3, be not provided with password then automatically carry to computer, need not the manual carry of user, password is set then needs password authentification, password authentification not by E-book reader then can not carry to computer, the user can't operate the content of flash file in the E-book reader by computer, password authentification is passed through, then normal carry.
5. data leakage prevention method that is used for E-book reader is provided with crypto module, cancellation encrypting module, password authentication module based on what link to each other with the sqlite3 database in the Android system, it is characterized in that described file encryption step is as follows:
Step 101, enter e-book and use to be provided with;
Step 102, the file password is set;
Step 103, affirmation password setting are finished;
Step 104, enter listed files;
Menu is encrypted in step 105, click;
The file that step 106, selection will be encrypted;
Step 107, reaffirm password, encrypt successfully.
6. the data leakage prevention method that is used for E-book reader according to claim 5 is characterized in that, the step of opening encrypt file is as follows:
Step 1, enter listed files, choose a File Open
Step 2, visit sqlite3 database password record judge whether file is encrypted;
Step 3, file unencryption then open file, and file encryption is Activity interface of system creation then, enters the password authentification stage, and checking is by then opening file.
7. the data leakage prevention method that is used for E-book reader according to claim 6, it is characterized in that, the decryption method step of described single encrypt file is as follows: enter listed files, click the deciphering menu, choose encrypted file, need to confirm the file of deciphering, Activity interface of system creation, enter the password authentification stage, checking is disengaged by the encrypted state of selected file then.
8. the data leakage prevention method that is used for E-book reader according to claim 6, it is characterized in that, the decryption method step of described whole encrypt files is as follows: enter the e-book setting in the E-book reader, the deleted file password, then all encrypt files are decrypted, and the file password of e-book is not for being provided with state as yet simultaneously.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102419191A CN101901320A (en) | 2010-07-29 | 2010-07-29 | Data leakage prevention method for electronic book reader |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102419191A CN101901320A (en) | 2010-07-29 | 2010-07-29 | Data leakage prevention method for electronic book reader |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101901320A true CN101901320A (en) | 2010-12-01 |
Family
ID=43226849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102419191A Pending CN101901320A (en) | 2010-07-29 | 2010-07-29 | Data leakage prevention method for electronic book reader |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101901320A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102779251A (en) * | 2012-06-29 | 2012-11-14 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and encrypting/decrypting method thereof |
WO2015154469A1 (en) * | 2014-09-09 | 2015-10-15 | 中兴通讯股份有限公司 | Database operation method and device |
CN107169328A (en) * | 2017-05-15 | 2017-09-15 | 青岛海信移动通信技术股份有限公司 | The method to set up and device of clean boot function |
CN111159743A (en) * | 2019-12-30 | 2020-05-15 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007029398A1 (en) * | 2005-09-02 | 2007-03-15 | Megachips Corporation | Network camera-based image delivery method |
CN101136043A (en) * | 2006-08-31 | 2008-03-05 | 环达电脑(上海)有限公司 | Personal digital assistant locking and unlocking method |
CN101415186A (en) * | 2008-11-28 | 2009-04-22 | 北京亿企通信息技术有限公司 | Method for security protection of mobile phone information |
CN101446957A (en) * | 2008-09-08 | 2009-06-03 | 南京Lg新港显示有限公司 | Apparatus and method for browsing file with privacy protection function |
CN101533452A (en) * | 2009-04-17 | 2009-09-16 | 上海北大方正科技电脑系统有限公司 | Method for protecting cipher of USB interface |
-
2010
- 2010-07-29 CN CN2010102419191A patent/CN101901320A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007029398A1 (en) * | 2005-09-02 | 2007-03-15 | Megachips Corporation | Network camera-based image delivery method |
CN101136043A (en) * | 2006-08-31 | 2008-03-05 | 环达电脑(上海)有限公司 | Personal digital assistant locking and unlocking method |
CN101446957A (en) * | 2008-09-08 | 2009-06-03 | 南京Lg新港显示有限公司 | Apparatus and method for browsing file with privacy protection function |
CN101415186A (en) * | 2008-11-28 | 2009-04-22 | 北京亿企通信息技术有限公司 | Method for security protection of mobile phone information |
CN101533452A (en) * | 2009-04-17 | 2009-09-16 | 上海北大方正科技电脑系统有限公司 | Method for protecting cipher of USB interface |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102779251A (en) * | 2012-06-29 | 2012-11-14 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and encrypting/decrypting method thereof |
CN102779251B (en) * | 2012-06-29 | 2016-04-13 | 鸿富锦精密工业(深圳)有限公司 | Electronic equipment and encrypting/decrypting method thereof |
WO2015154469A1 (en) * | 2014-09-09 | 2015-10-15 | 中兴通讯股份有限公司 | Database operation method and device |
CN107169328A (en) * | 2017-05-15 | 2017-09-15 | 青岛海信移动通信技术股份有限公司 | The method to set up and device of clean boot function |
CN111159743A (en) * | 2019-12-30 | 2020-05-15 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
CN111159743B (en) * | 2019-12-30 | 2023-01-13 | 掌阅科技股份有限公司 | File encryption method of electronic book reader, computing device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101853363B (en) | File protection method and system | |
US8233624B2 (en) | Method and apparatus for securing data in a memory device | |
CN103530570B (en) | A kind of electronic document safety management system and method | |
CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
CN102882923A (en) | Secure storage system and method for mobile terminal | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
CN102624699A (en) | Method and system for protecting data | |
Lee et al. | Secure Data Deletion for USB Flash Memory. | |
JP4662138B2 (en) | Information leakage prevention method and system | |
CN101308475A (en) | Safe mobile storage system and method of use thereof | |
CN109547215B (en) | Document information protection method based on mobile terminal fingerprint | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN105303074A (en) | Method for protecting security of Web application | |
CN102868826B (en) | Terminal and terminal data protection method | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
CN108287988B (en) | Security management system and method for mobile terminal file | |
TW201415283A (en) | File management system and method | |
CN101901320A (en) | Data leakage prevention method for electronic book reader | |
CN114036003A (en) | Large file backup and recovery safety method based on hardware password equipment | |
JP5631251B2 (en) | Information leakage prevention method | |
CN106650492B (en) | A kind of multiple device file guard method and device based on security catalog | |
CN101604296A (en) | Disk-data sector-level encryption method | |
JP4600021B2 (en) | Encrypted data access control method | |
TWI444849B (en) | System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof | |
CN101794260A (en) | Automatically imported method of encryption key for mobile storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20101201 |