CN103207959A - Encryption method and system based on data card of file system - Google Patents

Encryption method and system based on data card of file system Download PDF

Info

Publication number
CN103207959A
CN103207959A CN2012100108623A CN201210010862A CN103207959A CN 103207959 A CN103207959 A CN 103207959A CN 2012100108623 A CN2012100108623 A CN 2012100108623A CN 201210010862 A CN201210010862 A CN 201210010862A CN 103207959 A CN103207959 A CN 103207959A
Authority
CN
China
Prior art keywords
bunch
root directory
password
data card
cluster
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100108623A
Other languages
Chinese (zh)
Inventor
陈雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN2012100108623A priority Critical patent/CN103207959A/en
Publication of CN103207959A publication Critical patent/CN103207959A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention is applicable to the technical field of encryption and provides an encryption method and an encryption system based on a data card of a file system. The method comprises the following steps that a cluster is selected for backing up the true root directory region first cluster; and data of the root directory region first cluster is backed up into the selected cluster, in addition, a false cluster is built, and the false cluster is written into the root directory region first cluster. The method and the system are safer and more reliable than the file folder hiding scheme, and compared with an ordinary encryption mode, the scheme only modifies the root directory region and reaches the effect of affecting the whole situation by a slight move in one part, the mobile phone performance lowering caused by frequent file encryption is avoided, because the root directory region is pretended through the false cluster, even the data card is lost, the data encryption problem cannot be carried about because the data card is only an empty directory for users without codes.

Description

A kind of time slot scrambling and system of the data card based on file system
Technical field
The invention belongs to the secrecy technology field, relate in particular to a kind of time slot scrambling and system of the data card based on file system.
Background technology
The portable terminal of prior art realizes that the scheme performance of data confidentiality is not good, and it realizes that the flow process of maintaining secrecy is as follows: S1, enter mobile phone menu, selection need be carried out the file of information protection; S2, arrange hide operation associated; If this operation associated not being used of S3, system then records the operation associated of generation, and hidden folder; If S4 operation associatedly is used this, this operation associated existing respective file folder of user is then informed by system; The user changes operation associated, returns step S2, resets operation associated; If S5 user wishes to inquire about the file that is hidden, only need hiding operation associated that execution has been set under the interface, cell phone system then recovers to show the respective file folder.
As from the foregoing, the security performance of above-mentioned prior art scheme is not good, and portable terminal has adopted the mode of hidden folder; when the user checks hidden file in folder pptions; this document can come out, and therefore this protection mechanism is comparatively weak, can not well protect user's data.
Summary of the invention
The object of the present invention is to provide a kind of time slot scrambling and system of the data card based on file system; be intended to solve the mode that existing portable terminal has adopted hidden folder; when the user checks hidden file in folder pptions; this document can come out; therefore this protection mechanism is comparatively weak, can not well protect the problem of user's data.
The present invention is achieved in that a kind of time slot scrambling of the data card based on file system, said method comprising the steps of:
Select one bunch, be used for backing up first bunch of real root directory zone;
With the data backup in first bunch of described root directory zone to described selection bunch in, and set up camouflage bunch, camouflage bunch write first bunch of root directory zone.
Another object of the present invention is to provide a kind of secrecy system of the data card based on file system, described system comprises:
Select module, be used for selecting one bunch, be used for backing up first bunch of real root directory zone;
The backup writing module, be used for the data backup in first bunch of described root directory zone to described selection bunch, and set up camouflage bunch, camouflage bunch write first bunch of root directory zone.
In the present invention, the present invention is by the dynamic open and close to the dynamic replacement realization privacy mechanism of first bunch of true root directory and camouflage bunch, this scheme is not only more safe and reliable than hidden folder scheme, and compared with general cipher mode, this scheme is only revised the root directory zone and is reached the effect of pulling one hair and move the whole body, do not need frequently to cause handset capability to descend to file encryption, owing to bunch pretended the root directory zone by camouflage, even lost data card, do not worry the problem of data security, because the data card that does not have the user of password to see is an empty list yet.
Description of drawings
Fig. 1 is the realization flow synoptic diagram based on the time slot scrambling of the data card of file system that the embodiment of the invention provides.
Fig. 2 is the structural representation based on the secrecy system of the data card of file system that the embodiment of the invention provides.
Embodiment
In order to make purpose of the present invention, technical scheme and beneficial effect clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explaining the present invention, and be not used in restriction the present invention.
In embodiments of the present invention, the present embodiment scheme is based on the data card file system of FAT32 file system and these two big main flows of NTFS, FTA32 adopts the mode of true bunch of FAT root directory zone and camouflage bunch exchange, and NTFS then adopts true bunch of backup MFT root directory and the exchange mode of pretending bunch.Because the mode of the camouflage of adopting bunch, the list item of the inside can be filled in arbitrarily, directly the root directory item is set to sky, and this data card only shows the root directory of a sky, and therefore after enabling this encryption mechanism, what this data card presented is the preprepared bibliographic structure.
See also Fig. 1, be the realization flow based on the time slot scrambling of the data card of file system that the embodiment of the invention provides, it may further comprise the steps:
In step S102, select one bunch, be used for backing up first bunch of real root directory zone;
As one embodiment of the invention, before step S102, further comprising the steps of:
Enable privacy mechanism, the prompting user inputs password;
Receive the password of user's input.
In embodiments of the present invention, by the password of described input is adopted Hash again hash select one bunch, be used for backing up first bunch of real root directory zone.
As another embodiment of the present invention, after step S102, further comprising the steps of:
With described selection bunch all sectors be set to bad sector.
In embodiments of the present invention, by the password of described input is adopted Hash again hash select one bunch, be used for backing up first bunch of real root directory zone, and with described selection bunch all sectors be set to bad sector; Like this file system can keep this selection bunch, can not be assigned with, thus can not be destroyed.
In step S104, with the data backup in first bunch of described root directory zone to described selection bunch in, and set up camouflage bunch, camouflage bunch write first bunch of root directory zone.
In embodiments of the present invention, with the data backup in first bunch of described root directory zone to described selection bunch in, and will pretend bunch write regional first bunch of root directory, thereby cause the camouflage information in the visit data card.Be understandable that, camouflage bunch be can be self-defining.For example, can be according to empty list of certain form camouflage, the perhaps catalogue of suitable camouflage necessity, if empty list, realizes fairly simple comparatively speaking, if the catalogue of camouflage necessity need be pretended each sub-directory.
As one embodiment of the invention, described method is further comprising the steps of:
When portable terminal needs the visit data card, the password of checking user input, if password is correct, the privacy mechanism of then temporarily stopping using, the true root directory information of restoring data card.
In embodiments of the present invention, the password of checking user input can be startup password.When importing startup password, the user starts shooting when waking up, the checking startup password, if password is correct, and the privacy mechanism of then temporarily stopping using, the true root directory information of restoring data card.
As another embodiment of the present invention, described method is further comprising the steps of:
When portable terminal is in holding state, enable privacy mechanism automatically.
See also Fig. 2, the structure based on the secrecy system of the data card of file system that provides for the embodiment of the invention.For convenience of explanation, only show the part relevant with the embodiment of the invention.The secrecy system of described data card based on file system can be the unit that is built in software unit, hardware cell or software and hardware combining in the portable terminal.
The secrecy system of described data card based on file system comprises: select module 104 and backup writing module 108.
Select module 104, be used for selecting one bunch, be used for backing up first bunch of real root directory zone.
Backup writing module 108, be used for the data backup in first bunch of described root directory zone to described selection bunch, and set up camouflage bunch, camouflage bunch write first bunch of root directory zone.
As one embodiment of the invention, described system also comprises: enable module, reminding module and receiver module.
Enable module, be used for enabling privacy mechanism.
Reminding module is used for the prompting user and inputs password.
Receiver module is used for receiving the password that the user imports.
In embodiments of the present invention, described selection module 104, concrete be used for by the password to described input adopt Hash again hash select one bunch, be used for backing up first bunch of real root directory zone.
As another embodiment of the present invention, described system also comprises: module is set.
Module is set, be used for described selection bunch all sectors be set to bad sector.
As another embodiment of the present invention, described system also comprises: authentication module, the control module of stopping using and recovery module.
Authentication module is used for when portable terminal needs the visit data card, the password of checking user input.
Inactive control module, if it is correct to be used for password, the privacy mechanism of then temporarily stopping using.
Recovery module is for the true root directory information of restoring data card.
In embodiments of the present invention, the password of checking user input can be startup password.Authentication module also is used for starting shooting when waking up when the user imports startup password, verifies startup password.If password is correct, the privacy mechanism of then temporarily stopping using, the true root directory information of restoring data card.
As another embodiment of the present invention, described system also comprises: enable control module.
Enable control module, be used for when portable terminal is in holding state, enabling privacy mechanism automatically.
In sum, the embodiment of the invention is by the dynamic open and close to the dynamic replacement realization privacy mechanism of first bunch of true root directory and camouflage bunch, this scheme is not only more safe and reliable than hidden folder scheme, and compared with general cipher mode, this scheme is only revised the root directory zone and is reached the effect of pulling one hair and move the whole body, do not need frequently to cause handset capability to descend to file encryption, owing to bunch pretended the root directory zone by camouflage, even lost data card, do not worry the problem of data security, because the data card that does not have the user of password to see is an empty list yet.
One of ordinary skill in the art will appreciate that all or part of step that realizes in above-described embodiment method is to instruct relevant hardware to finish by program, described program can be stored in the computer read/write memory medium, described storage medium is as ROM/RAM, disk, CD etc.
The above only is preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the time slot scrambling based on the data card of file system is characterized in that, said method comprising the steps of:
Select one bunch, be used for backing up first bunch of real root directory zone;
With the data backup in first bunch of described root directory zone to described selection bunch in, and set up camouflage bunch, camouflage bunch write first bunch of root directory zone.
2. the method for claim 1 is characterized in that, and is before the step of one bunch of described selection, further comprising the steps of:
Enable privacy mechanism, the prompting user inputs password;
Receive the password of user's input.
3. method as claimed in claim 2 is characterized in that, one bunch of described selection is used for backing up the step in first bunch of real root directory zone, is specially:
By the password of described input is adopted Hash again hash select one bunch, be used for backing up first bunch of real root directory zone.
4. method as claimed in claim 2 is characterized in that, described method is further comprising the steps of:
When portable terminal needs the visit data card, the password of checking user input, if password is correct, the privacy mechanism of then temporarily stopping using, the true root directory information of restoring data card.
5. method as claimed in claim 4 is characterized in that, the password of described checking user input is startup password; When importing startup password, the user starts shooting when waking up, the checking startup password, if password is correct, and the privacy mechanism of then temporarily stopping using, the true root directory information of restoring data card.
6. the method for claim 1 is characterized in that, described method is further comprising the steps of:
When portable terminal is in holding state, enable privacy mechanism automatically.
7. the method for claim 1 is characterized in that, one bunch of described selection is used for backing up after the step in first bunch of real root directory zone, and is further comprising the steps of:
With described selection bunch all sectors be set to bad sector.
8. the secrecy system based on the data card of file system is characterized in that, described system comprises:
Select module, be used for selecting one bunch, be used for backing up first bunch of real root directory zone;
The backup writing module, be used for the data backup in first bunch of described root directory zone to described selection bunch, and set up camouflage bunch, camouflage bunch write first bunch of root directory zone.
9. system as claimed in claim 8 is characterized in that, described system also comprises:
Module is set, be used for described selection bunch all sectors be set to bad sector.
10. system as claimed in claim 8 is characterized in that, described system also comprises:
Authentication module is used for when portable terminal needs the visit data card, the password of checking user input;
Inactive control module, if it is correct to be used for password, the privacy mechanism of then temporarily stopping using;
Recovery module is for the true root directory information of restoring data card.
CN2012100108623A 2012-01-13 2012-01-13 Encryption method and system based on data card of file system Pending CN103207959A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100108623A CN103207959A (en) 2012-01-13 2012-01-13 Encryption method and system based on data card of file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100108623A CN103207959A (en) 2012-01-13 2012-01-13 Encryption method and system based on data card of file system

Publications (1)

Publication Number Publication Date
CN103207959A true CN103207959A (en) 2013-07-17

Family

ID=48755176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100108623A Pending CN103207959A (en) 2012-01-13 2012-01-13 Encryption method and system based on data card of file system

Country Status (1)

Country Link
CN (1) CN103207959A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573573A (en) * 2014-11-14 2015-04-29 深圳市芯海科技有限公司 Data protection system and method for mobile storage
CN114356202A (en) * 2022-03-18 2022-04-15 广州世安信息技术股份有限公司 Portable mobile storage data exchange equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050065943A1 (en) * 2003-07-10 2005-03-24 Sony Corporation Data management apparatus, data management method and computer program
CN101006511A (en) * 2004-06-15 2007-07-25 松下电器产业株式会社 Drive device
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN101815119A (en) * 2009-12-10 2010-08-25 宇龙计算机通信科技(深圳)有限公司 Method and system for processing information of private contact person and mobile communication terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050065943A1 (en) * 2003-07-10 2005-03-24 Sony Corporation Data management apparatus, data management method and computer program
CN101006511A (en) * 2004-06-15 2007-07-25 松下电器产业株式会社 Drive device
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN101815119A (en) * 2009-12-10 2010-08-25 宇龙计算机通信科技(深圳)有限公司 Method and system for processing information of private contact person and mobile communication terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573573A (en) * 2014-11-14 2015-04-29 深圳市芯海科技有限公司 Data protection system and method for mobile storage
CN104573573B (en) * 2014-11-14 2017-09-29 深圳市芯海科技有限公司 The data protection system and method for a kind of mobile storage
CN114356202A (en) * 2022-03-18 2022-04-15 广州世安信息技术股份有限公司 Portable mobile storage data exchange equipment
CN114356202B (en) * 2022-03-18 2022-07-12 广州世安信息技术股份有限公司 Portable mobile storage data exchange equipment

Similar Documents

Publication Publication Date Title
CN102882923B (en) Secure storage system and method for mobile terminal
EP3161645B1 (en) Fast data protection using dual file systems
CN102483647B (en) For operating computer method and system via low-power attached processor
US20110218965A1 (en) System for remotely erasing data, method, server, and mobile device thereof, and computer program product
CN103559455A (en) Android device personal information protection method based on user identification
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN102207912A (en) Flash memory equipment for realizing partition function on equipment side and access method of flash memory equipment
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
CN109325355A (en) Mobile terminal data method for secure storing based on virtual disk
CN108287988B (en) Security management system and method for mobile terminal file
CN102075627A (en) Information prompting method and mobile terminal
CN102955745A (en) Mobile storage terminal and data management method thereof
CN104035891A (en) Android mobile terminal data security protection system
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN110929302B (en) Data security encryption storage method and storage device
Hong et al. Personal privacy protection framework based on hidden technology for smartphones
CN102280134B (en) Method for improving data security in removable storage device
CN102868826A (en) Terminal and terminal data protection method
CN107704337A (en) Method, mobile terminal and the device with store function of factory reset
CN103425938B (en) The folder encryption method of one kind Unix operating system and device
CN101945156A (en) Method and device for backuping data information of mobile terminal
CN101556640A (en) Confidential data encryption method, system and mobile terminal
CN103207959A (en) Encryption method and system based on data card of file system
CN102970414A (en) Cell phone password protection method based on Android system
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130717