CN103761487B - The hidden method and device of file - Google Patents
The hidden method and device of file Download PDFInfo
- Publication number
- CN103761487B CN103761487B CN201410041024.1A CN201410041024A CN103761487B CN 103761487 B CN103761487 B CN 103761487B CN 201410041024 A CN201410041024 A CN 201410041024A CN 103761487 B CN103761487 B CN 103761487B
- Authority
- CN
- China
- Prior art keywords
- private data
- key
- group
- piece
- attribute
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of hidden method of file and device, are related to technical field of data processing, can solve the problem that the problem that user's private data safety cannot be protected by application layer to the method that user's private data is encrypted.Methods described includes:Add hiding attribute in the file attribute of private data, wherein, in the private mode, the private data for adding hiding attribute is visible, and in normal mode, the private data for adding hiding attribute is sightless;The private data that hiding attribute will be added is stored in one or more first piece of group.File data of the present invention suitable for terminal unit is processed.
Description
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of hidden method of file and device.
Background technology
With the development of computer technology, the requirement more and more higher to data processing, various file system are arisen at the historic moment.No
Same file system has features and advantage, file system mainly to include according to targeted data object:FAT(File
Allocation Table, file configuration table)、NTFS(New Technology File System, New Technology File System)、
ext4(The fourth extended file system, forth generation extend file system)、exFAT(Extended File
Allocation Table, extend file configuration table)And VFS(Virtual File System, Virtual File System).
In above-mentioned file system, ext4 is using most wide file system on Linux, while being also android system handss
The main flow file system that machine is used, exFAT have higher performance compared to ext4, it is also possible to for android system.Due to
Mobile phone has become the most frequently used data conserving appliance of user, and people can be by a few thing data, private photos, video, communication note
Record etc. is related in the data Cun Chudao mobile phone of privacy.In order to ensure the safety of private data, can be by some applications to secret
Data are encrypted.
In prior art, at least there are the following problems:Private data encryption is easy to be cracked by application layer, data
Cannot ensure safely, the private data of user can still revealed.
Content of the invention
A kind of hidden method of file and device are provided, can solve the problem that the side that user's private data is encrypted by application layer
Method cannot protect the problem of user's private data safety.
A kind of first aspect, there is provided hidden method of file, including:
Add in the file attribute of private data and hide attribute, wherein, in the private mode, add the institute for hiding attribute
It is visible to state private data, and in normal mode, the private data for adding hiding attribute is sightless;
The private data that hiding attribute will be added is stored in one or more first piece of group.
A kind of second aspect, there is provided concealing device of file, including:
Hidden unit, hides attribute for adding in the file attribute of private data, wherein, in the private mode, adds
Plus the private data of hiding attribute is visible, in normal mode, adds the private data for hiding attribute for not
Visible;
Memory element, stores in one or more first piece of group for will add the private data for hiding attribute.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair
Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through
Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode
It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added
Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data
In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these
Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to embodiment or description of the prior art
Needed for accompanying drawing to be used be briefly described, it should be apparent that, drawings in the following description be only the present invention some
Embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can be with attached according to these
Figure obtains other accompanying drawings.
The method flow diagram that Fig. 1 is provided for one embodiment of the invention;
The method flow diagram that Fig. 2 is provided for further embodiment of this invention;
The block group schematic diagram that Fig. 3 is provided for further embodiment of this invention;
Data link schematic diagram between the block group that Fig. 4 is provided for further embodiment of this invention
The method flow diagram that Fig. 5 is provided for further embodiment of this invention;
The apparatus structure schematic diagram that Fig. 6, Fig. 7 are provided for further embodiment of this invention.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiment.It is based on
Embodiment in the present invention, it is all other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
The term for using in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting
The present invention." one kind ", " described " and " being somebody's turn to do " of singulative used in the embodiment of the present invention and appended claims
It is also intended to include most forms, unless context clearly shows that other implications.It is also understood that term used herein
"and/or" is referred to and comprising one or more associated any or all possible combination for listing project.
It will be appreciated that though may adopt term first, second, third, etc. various close to describe in embodiments of the present invention
Key, block group and unit, but these keys, block group and unit should not necessarily be limited by these terms.These terms are only used for key, block group
It is distinguished from each other out with unit.For example, in the case of without departing from range of embodiment of the invention, first key can also be referred to as
Two keys, similarly, second piece of group can also be referred to as first piece of group.
Depend on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection
(condition or event of statement) " can be construed to " when determining " or " in response to determining " or " when the detection (condition of statement
Or event) when " or " in response to detecting (condition or event of statement) "
Advantage for making technical solution of the present invention is clearer, and with reference to the accompanying drawings and examples the present invention is made specifically
Bright.
One embodiment of the invention provides a kind of hidden method of file, as shown in figure 1, methods described includes:
101st, add in the file attribute of private data and hide attribute.
It should be noted that in the private mode, the private data for adding hiding attribute is visible, in conventional mould
Under formula, the private data for adding hiding attribute is sightless.
For example, attribute is hidden in the interpolation in the file attribute of private data includes:
Add identification field unsigned int flags in inode structures.
102nd, the private data that will add hiding attribute is stored in one or more first piece of group.
Further, the private data storage for adding the hiding attribute is arrived one or more first pieces described
After in group, methods described also includes:
Arrange address corresponding with the private data in second piece of group to link, second piece of group is the non-secret of storage
The block group of data, wherein described first piece of group and second piece of group can be according to the data volume dynamic translations of the private data;
The address chain in second piece of group is connect using first key and be encrypted.
Further, after the use first key connects to the address chain in second piece of group and is encrypted, institute
Stating method also includes:
The private data in first piece of group is encrypted using the second key in file system layer.
Further, the second key is used to the private data in first piece of group described in file system layer
After being encrypted, methods described also includes:
The private data of receive user is accessed and is indicated;Judge that the private data is accessed and indicate the access key that carries whether
Mate with the first key and second key;If access key and the first key and described second close
Key mates, and parses the private data;If the access key is wherein appointed with the first key or second key
One mismatches, and refuses the private data and accesses instruction.
Optionally, the first key is identical or different with second key.When first key and second key
When differing, now accessing key includes two keys, respectively with first key and the second cipher key match, will first access key
Mate with first key, if the match is successful, then key and the second cipher key match will be accessed;If had in mating twice any one
Secondary it fails to match, then refuse the private data and access instruction;When only mating success twice, the secret can be parsed
Data.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair
Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through
Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode
It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added
Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data
In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these
Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
Further embodiment of this invention provides a kind of hidden method of file, be applied to using linux, windows or
The terminal unit of the systems such as android, changes file attribute by the operation of file layers, file is entered according to user's request
Row is hidden, and protects the safety of file, as shown in Fig. 2 methods described includes:
201st, add specific identifier field in the inode nodes of file.
For example, in order to understand the layout structure of file system, with the most frequently used file system ext4 in Android system it is
Example is illustrated, and ext4 file system structure layouts refer to table one.
Table one:
Bootstrap block | Block group 0 | Block group 1 | …… | Block group n-1 | Block group n |
As shown in Table 1, file system structure is made up of N number of logical block sequence, and the first logic sequence block is used for guiding, its
Remaining logic sequence block is divided into several block groups, each block group(Block Group)Size identical(Last block group can
Can be smaller), and order discharge.The size of one block group is 128MB, and each logic sequence block is 4kb.The structure of block group such as table
Shown in two.
Table two:
As above, superblock in table two(Super Block)With a group description(Group Descriptors)Containing all pieces of groups
Information.In order to save the copy for all not having block group information in the ext4 of space in all pieces of groups, but with sparse
Mode stores copy in specific block group.For example, in block group number be 3,5,7 power block group(Such as 1,3,5,7,9,25,
49…)Middle storage this copy.All of piece of group description all there must be in a block, and the space that each block group description takes is
64 bytes, the block of a 4k size can deposit 64 parts of block group descriptions.
For example, based on above-mentioned piece of group information, file attribute is changed, is that file adds hiding attribute.Specifically, in index section
Add the description of a line identification field in point inode, other parts are constant:
Wherein, after identification field is added, file is sightless in normal mode, and is visible in the private mode
's.Normal condition of the normal mode for terminal unit, and privacy mode is the pattern for being exclusively used in accessing that hidden file is arranged,
Edit operation can be carried out to hidden file under the pattern.
202nd, the file that with the addition of identification field is stored in hiding block group.
Further, as shown in figure 3, being managed for the ease of the file to the addition of hiding attribute, will be with hiding
The file data of attribute is all focused in a hiding block group, if a hiding block group is not stored, according to file data
Amount increases hides block group.Wherein, hide block group and be exclusively used in the file that storage tape hides attribute, hide block group and converted by conventional bar group
, the file data amount that conventional bar group and hiding block group can hide attribute according to band carry out dynamically mutually converting.
203rd, arrange address corresponding with the file being stored in hiding block group in conventional bar group to link.
For example, as shown in figure 4, the number of files that hides in block group can be hidden according to address link from conventional bar group positioning
According to.
204th, the address chain in conventional bar group is connect using first key and is encrypted.
205th, it is encrypted to hiding the file in block group using the second key.
It should be noted that the execution of above-mentioned steps 203-204 has no strict sequencing with the execution of step 205,
The two can also execute simultaneously.Ciphering process in above-mentioned steps refers to existing encryption technology, herein no longer to specific
AES and process are repeated.
More than, be to terminal unit in the operating procedure protected of file data.Further, as shown in figure 5, under
Face is illustrated to the protection process of mobile phone Chinese number of packages evidence by taking the flow process of practical operation as an example.
301st, the data access of mobile phone receive user is indicated.
For example, the signal such as the touch signal of mobile phone receive user, acoustical signal, determines user's file data to be accessed.
302nd, mobile phone judges whether present mode is privacy mode, if present mode is privacy mode, execution step
303;If present mode is normal mode, execution step 307.
Optionally, the conversion between normal mode and privacy mode can be configured realization by user on mobile phone, by normal
When scale formula switchs to privacy mode, the identification for carrying out key or password, identification is needed correctly can just to enable privacy mode;And secret
Pattern switchs to normal mode need not then carry out the identification of key or password.
303rd, mobile phone prompts the user with coupling first key.
304th, mobile phone judges whether the first key of user input is correct, if correctly, execution step 305;If not just
Really, execution step 308.
305th, mobile phone prompts the user with the second key of coupling.
306th, mobile phone judges whether the second key of user input is correct, if correctly, execution step 307;If not just
Really, execution step 308.
307th, mobile phone open data access indicates corresponding file.
308th, mobile phone refusal is opened data access and indicates corresponding file and prompt the user with failure information.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair
Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through
Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode
It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added
Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data
In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these
Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
Further embodiment of this invention provides a kind of concealing device 30 of file, as shown in fig. 6, described device 30 includes:
Hidden unit 31, hides attribute for adding in the file attribute of private data, wherein, in the private mode,
The private data for adding hiding attribute is visible, and in normal mode, the private data for adding hiding attribute is
Sightless;
Memory element 32, arrives one or more first piece of group for will add the private data storage for hiding attribute
In.
Wherein, the hidden unit 31 is specifically for adding identification field unsigned int in inode structures
flags.
Further, as shown in fig. 7, described device 30 can also include:
Link arranging unit 33, links for arranging address corresponding with the private data in second piece of group, described
Second piece of group is the block group for storing non-private data, and wherein described first piece of group and second piece of group can be according to the secret numbers
According to data volume dynamic translation;
First ciphering unit 34, adds for tapping into row to the address chain in second piece of group using first key
Close.
Further, as shown in fig. 7, described device 30 can also include:
Second ciphering unit 35, for using the second key to the secret in first piece of group in file system layer
Data are encrypted.
Further, as shown in fig. 7, described device 30 can also include:
Receiving unit 36, the private data for receive user access instruction;
For judging that the private data is accessed, judging unit 37, indicates whether the access key of carrying is close with described first
Key and second key mate;
First processing units 38, for mating with the first key and second key when the access key
When, parse the private data;
Second processing unit 39, for when the access key and the first key or the second key any of which
During mismatch, refuse the private data and access instruction.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair
Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through
Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode
It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added
Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data
In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these
Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
The concealing device of file provided in an embodiment of the present invention can realize the embodiment of the method for above-mentioned offer, concrete function
Realize referring to the explanation in embodiment of the method, will not be described here.The hidden method of file provided in an embodiment of the present invention and
The file data that device goes in terminal unit is processed, but is not limited only to this.
One of ordinary skill in the art will appreciate that realize all or part of flow process in above-described embodiment method, being can be with
Instruct related hardware to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access
Memory, RAM)Deng.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, the change or replacement that can readily occur in all are answered
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (8)
1. a kind of hidden method of file, it is characterised in that include:
Add in the file attribute of private data and hide attribute, wherein, in the private mode, add the private for hiding attribute
Ciphertext data is visible, and in normal mode, the private data for adding hiding attribute is sightless;
The private data that hiding attribute will be added is stored in one or more first piece of group;
Wherein, the private data for adding the hiding attribute is stored in one or more first piece of group it described
Afterwards, methods described also includes:
Arrange address corresponding with the private data in second piece of group to link, second piece of group is the non-private data of storage
Block group, wherein described first piece of group and second piece of group can be according to the data volume dynamic translations of the private data;
The address chain in second piece of group is connect using first key and be encrypted.
2. method according to claim 1, it is characterised in that described interpolation in the file attribute of private data hides category
Property includes:
Add identification field unsigned int flags in inode structures.
3. method according to claim 1, it is characterised in that in the use first key is to second piece of group
Address chain is connect after being encrypted, and methods described also includes:
The private data in first piece of group is encrypted using the second key in file system layer.
4. method according to claim 3, it is characterised in that described in file system layer using the second key to described
After the private data in first piece of group is encrypted, methods described also includes:
The private data of receive user is accessed and is indicated;
Judge whether the private data accesses the access key for indicating to carry equal with the first key and second key
Coupling;
If the access key is mated with the first key and second key, the private data is parsed;
If the access key is mismatched with the first key or the second key any of which, refuse the secret number
Indicate according to accessing.
5. a kind of concealing device of file, it is characterised in that include:
Hidden unit, hides attribute for adding in the file attribute of private data, wherein, in the private mode, adds hidden
The private data for hiding attribute is visible, and in normal mode, the private data for adding hiding attribute is invisible
's;
Memory element, stores in one or more first piece of group for will add the private data for hiding attribute;
Link arranging unit, links for arranging address corresponding with the private data in second piece of group, described second piece
Block group of the group for the non-private data of storage, wherein described first piece of group and second piece of group can be according to the numbers of the private data
According to amount dynamic translation;
First ciphering unit, is encrypted for being connect to the address chain in second piece of group using first key.
6. device according to claim 5, it is characterised in that the hidden unit is specifically in inode structures
Add identification field unsigned int flags.
7. device according to claim 5, it is characterised in that described device also includes:
Second ciphering unit, for being entered to the private data in first piece of group using the second key in file system layer
Row encryption.
8. device according to claim 7, it is characterised in that described device also includes:
Receiving unit, the private data for receive user access instruction;
Judging unit, for judge the private data access indicate the access key for carrying whether with the first key and institute
State the second key to mate;
First processing units, for when the access key is mated with the first key and second key, parsing
The private data;
Second processing unit, for mismatching when the access key and the first key or the second key any of which
When, refuse the private data and access instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410041024.1A CN103761487B (en) | 2014-01-27 | 2014-01-27 | The hidden method and device of file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410041024.1A CN103761487B (en) | 2014-01-27 | 2014-01-27 | The hidden method and device of file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103761487A CN103761487A (en) | 2014-04-30 |
CN103761487B true CN103761487B (en) | 2017-03-15 |
Family
ID=50528723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410041024.1A Active CN103761487B (en) | 2014-01-27 | 2014-01-27 | The hidden method and device of file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103761487B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10049228B2 (en) * | 2015-01-20 | 2018-08-14 | Microsoft Technology Licensing, Llc | File encryption support for FAT file systems |
CN104778418A (en) * | 2015-03-24 | 2015-07-15 | 四川长虹电器股份有限公司 | Method and terminal for safely displaying files |
CN104780179B (en) * | 2015-05-07 | 2017-10-24 | 浙江工商大学 | A kind of key policy attribute encryption method of hiding attribute |
CN110598463B (en) | 2019-04-19 | 2021-05-14 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101026822A (en) * | 2006-02-24 | 2007-08-29 | 江苏高通科技实业有限公司 | Method for protecting mobile phone private data |
CN103067170A (en) * | 2012-12-14 | 2013-04-24 | 深圳国微技术有限公司 | Encrypting file system, encrypting method and deciphering method based on EXT2 file system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9164700B2 (en) * | 2009-03-05 | 2015-10-20 | Sandisk Il Ltd | System for optimizing the transfer of stored content in response to a triggering event |
CN103324892A (en) * | 2013-06-08 | 2013-09-25 | 广东欧珀移动通信有限公司 | File display method and device of Android system |
-
2014
- 2014-01-27 CN CN201410041024.1A patent/CN103761487B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101026822A (en) * | 2006-02-24 | 2007-08-29 | 江苏高通科技实业有限公司 | Method for protecting mobile phone private data |
CN103067170A (en) * | 2012-12-14 | 2013-04-24 | 深圳国微技术有限公司 | Encrypting file system, encrypting method and deciphering method based on EXT2 file system |
Also Published As
Publication number | Publication date |
---|---|
CN103761487A (en) | 2014-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7854010B2 (en) | Method and apparatus for searching rights object and mapping method and mapping apparatus for the same | |
WO2020143620A1 (en) | Method for displaying block chain data, block chain browser, user node and medium | |
US10140370B1 (en) | Systems and methods for maintaining encrypted search indexes on third-party storage systems | |
CN103268455B (en) | The access method of data and device | |
KR20210092802A (en) | Systems and methods for efficient and secure processing, access and transmission of data via blockchain networks | |
US20150156011A1 (en) | Dynamic symmetric searchable encryption | |
CN103778380A (en) | Data desensitization method and device and data anti-desensitization method and device | |
CN103761487B (en) | The hidden method and device of file | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN109241484A (en) | A kind of sending method and equipment of the web data based on encryption technology | |
CN108055133A (en) | A kind of key secure signing method based on block chain technology | |
EP3435271A1 (en) | Access management method, information processing device, program, and recording medium | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN107038369A (en) | The method and terminal of a kind of resources accessing control | |
CN101593252B (en) | Method and system for controlling access of computer to USB equipment | |
CN108108633B (en) | Data file and access method, device and equipment thereof | |
CN103617401A (en) | Method and device for protecting data files | |
CN103955654A (en) | USB (Universal Serial Bus) flash disk secure storage method based on virtual file system | |
CN104252605A (en) | Method and system for file transparent encryption and decryption of Android platform | |
CN104537295B (en) | A kind of method of computer system and management computer user authority | |
CN106610995A (en) | Ciphertext index creating method, device and system | |
CN106778337A (en) | Document protection method, device and terminal | |
CN104484628B (en) | It is a kind of that there is the multi-application smart card of encrypting and decrypting | |
CN105279453B (en) | It is a kind of to support the partitions of file for separating storage management to hide system and method | |
CN107609412A (en) | A kind of method for realizing that mobile terminal safety stores under mobile Internet based on TrustZone technologies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |