CN103761487B - The hidden method and device of file - Google Patents

The hidden method and device of file Download PDF

Info

Publication number
CN103761487B
CN103761487B CN201410041024.1A CN201410041024A CN103761487B CN 103761487 B CN103761487 B CN 103761487B CN 201410041024 A CN201410041024 A CN 201410041024A CN 103761487 B CN103761487 B CN 103761487B
Authority
CN
China
Prior art keywords
private data
key
group
piece
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410041024.1A
Other languages
Chinese (zh)
Other versions
CN103761487A (en
Inventor
程力行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410041024.1A priority Critical patent/CN103761487B/en
Publication of CN103761487A publication Critical patent/CN103761487A/en
Application granted granted Critical
Publication of CN103761487B publication Critical patent/CN103761487B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of hidden method of file and device, are related to technical field of data processing, can solve the problem that the problem that user's private data safety cannot be protected by application layer to the method that user's private data is encrypted.Methods described includes:Add hiding attribute in the file attribute of private data, wherein, in the private mode, the private data for adding hiding attribute is visible, and in normal mode, the private data for adding hiding attribute is sightless;The private data that hiding attribute will be added is stored in one or more first piece of group.File data of the present invention suitable for terminal unit is processed.

Description

The hidden method and device of file
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of hidden method of file and device.
Background technology
With the development of computer technology, the requirement more and more higher to data processing, various file system are arisen at the historic moment.No Same file system has features and advantage, file system mainly to include according to targeted data object:FAT(File Allocation Table, file configuration table)、NTFS(New Technology File System, New Technology File System)、 ext4(The fourth extended file system, forth generation extend file system)、exFAT(Extended File Allocation Table, extend file configuration table)And VFS(Virtual File System, Virtual File System).
In above-mentioned file system, ext4 is using most wide file system on Linux, while being also android system handss The main flow file system that machine is used, exFAT have higher performance compared to ext4, it is also possible to for android system.Due to Mobile phone has become the most frequently used data conserving appliance of user, and people can be by a few thing data, private photos, video, communication note Record etc. is related in the data Cun Chudao mobile phone of privacy.In order to ensure the safety of private data, can be by some applications to secret Data are encrypted.
In prior art, at least there are the following problems:Private data encryption is easy to be cracked by application layer, data Cannot ensure safely, the private data of user can still revealed.
Content of the invention
A kind of hidden method of file and device are provided, can solve the problem that the side that user's private data is encrypted by application layer Method cannot protect the problem of user's private data safety.
A kind of first aspect, there is provided hidden method of file, including:
Add in the file attribute of private data and hide attribute, wherein, in the private mode, add the institute for hiding attribute It is visible to state private data, and in normal mode, the private data for adding hiding attribute is sightless;
The private data that hiding attribute will be added is stored in one or more first piece of group.
A kind of second aspect, there is provided concealing device of file, including:
Hidden unit, hides attribute for adding in the file attribute of private data, wherein, in the private mode, adds Plus the private data of hiding attribute is visible, in normal mode, adds the private data for hiding attribute for not Visible;
Memory element, stores in one or more first piece of group for will add the private data for hiding attribute.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to embodiment or description of the prior art Needed for accompanying drawing to be used be briefly described, it should be apparent that, drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can be with attached according to these Figure obtains other accompanying drawings.
The method flow diagram that Fig. 1 is provided for one embodiment of the invention;
The method flow diagram that Fig. 2 is provided for further embodiment of this invention;
The block group schematic diagram that Fig. 3 is provided for further embodiment of this invention;
Data link schematic diagram between the block group that Fig. 4 is provided for further embodiment of this invention
The method flow diagram that Fig. 5 is provided for further embodiment of this invention;
The apparatus structure schematic diagram that Fig. 6, Fig. 7 are provided for further embodiment of this invention.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiment.It is based on Embodiment in the present invention, it is all other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The term for using in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting The present invention." one kind ", " described " and " being somebody's turn to do " of singulative used in the embodiment of the present invention and appended claims It is also intended to include most forms, unless context clearly shows that other implications.It is also understood that term used herein "and/or" is referred to and comprising one or more associated any or all possible combination for listing project.
It will be appreciated that though may adopt term first, second, third, etc. various close to describe in embodiments of the present invention Key, block group and unit, but these keys, block group and unit should not necessarily be limited by these terms.These terms are only used for key, block group It is distinguished from each other out with unit.For example, in the case of without departing from range of embodiment of the invention, first key can also be referred to as Two keys, similarly, second piece of group can also be referred to as first piece of group.
Depend on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection (condition or event of statement) " can be construed to " when determining " or " in response to determining " or " when the detection (condition of statement Or event) when " or " in response to detecting (condition or event of statement) "
Advantage for making technical solution of the present invention is clearer, and with reference to the accompanying drawings and examples the present invention is made specifically Bright.
One embodiment of the invention provides a kind of hidden method of file, as shown in figure 1, methods described includes:
101st, add in the file attribute of private data and hide attribute.
It should be noted that in the private mode, the private data for adding hiding attribute is visible, in conventional mould Under formula, the private data for adding hiding attribute is sightless.
For example, attribute is hidden in the interpolation in the file attribute of private data includes:
Add identification field unsigned int flags in inode structures.
102nd, the private data that will add hiding attribute is stored in one or more first piece of group.
Further, the private data storage for adding the hiding attribute is arrived one or more first pieces described After in group, methods described also includes:
Arrange address corresponding with the private data in second piece of group to link, second piece of group is the non-secret of storage The block group of data, wherein described first piece of group and second piece of group can be according to the data volume dynamic translations of the private data; The address chain in second piece of group is connect using first key and be encrypted.
Further, after the use first key connects to the address chain in second piece of group and is encrypted, institute Stating method also includes:
The private data in first piece of group is encrypted using the second key in file system layer.
Further, the second key is used to the private data in first piece of group described in file system layer After being encrypted, methods described also includes:
The private data of receive user is accessed and is indicated;Judge that the private data is accessed and indicate the access key that carries whether Mate with the first key and second key;If access key and the first key and described second close Key mates, and parses the private data;If the access key is wherein appointed with the first key or second key One mismatches, and refuses the private data and accesses instruction.
Optionally, the first key is identical or different with second key.When first key and second key When differing, now accessing key includes two keys, respectively with first key and the second cipher key match, will first access key Mate with first key, if the match is successful, then key and the second cipher key match will be accessed;If had in mating twice any one Secondary it fails to match, then refuse the private data and access instruction;When only mating success twice, the secret can be parsed Data.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
Further embodiment of this invention provides a kind of hidden method of file, be applied to using linux, windows or The terminal unit of the systems such as android, changes file attribute by the operation of file layers, file is entered according to user's request Row is hidden, and protects the safety of file, as shown in Fig. 2 methods described includes:
201st, add specific identifier field in the inode nodes of file.
For example, in order to understand the layout structure of file system, with the most frequently used file system ext4 in Android system it is Example is illustrated, and ext4 file system structure layouts refer to table one.
Table one:
Bootstrap block Block group 0 Block group 1 …… Block group n-1 Block group n
As shown in Table 1, file system structure is made up of N number of logical block sequence, and the first logic sequence block is used for guiding, its Remaining logic sequence block is divided into several block groups, each block group(Block Group)Size identical(Last block group can Can be smaller), and order discharge.The size of one block group is 128MB, and each logic sequence block is 4kb.The structure of block group such as table Shown in two.
Table two:
As above, superblock in table two(Super Block)With a group description(Group Descriptors)Containing all pieces of groups Information.In order to save the copy for all not having block group information in the ext4 of space in all pieces of groups, but with sparse Mode stores copy in specific block group.For example, in block group number be 3,5,7 power block group(Such as 1,3,5,7,9,25, 49…)Middle storage this copy.All of piece of group description all there must be in a block, and the space that each block group description takes is 64 bytes, the block of a 4k size can deposit 64 parts of block group descriptions.
For example, based on above-mentioned piece of group information, file attribute is changed, is that file adds hiding attribute.Specifically, in index section Add the description of a line identification field in point inode, other parts are constant:
Wherein, after identification field is added, file is sightless in normal mode, and is visible in the private mode 's.Normal condition of the normal mode for terminal unit, and privacy mode is the pattern for being exclusively used in accessing that hidden file is arranged, Edit operation can be carried out to hidden file under the pattern.
202nd, the file that with the addition of identification field is stored in hiding block group.
Further, as shown in figure 3, being managed for the ease of the file to the addition of hiding attribute, will be with hiding The file data of attribute is all focused in a hiding block group, if a hiding block group is not stored, according to file data Amount increases hides block group.Wherein, hide block group and be exclusively used in the file that storage tape hides attribute, hide block group and converted by conventional bar group , the file data amount that conventional bar group and hiding block group can hide attribute according to band carry out dynamically mutually converting.
203rd, arrange address corresponding with the file being stored in hiding block group in conventional bar group to link.
For example, as shown in figure 4, the number of files that hides in block group can be hidden according to address link from conventional bar group positioning According to.
204th, the address chain in conventional bar group is connect using first key and is encrypted.
205th, it is encrypted to hiding the file in block group using the second key.
It should be noted that the execution of above-mentioned steps 203-204 has no strict sequencing with the execution of step 205, The two can also execute simultaneously.Ciphering process in above-mentioned steps refers to existing encryption technology, herein no longer to specific AES and process are repeated.
More than, be to terminal unit in the operating procedure protected of file data.Further, as shown in figure 5, under Face is illustrated to the protection process of mobile phone Chinese number of packages evidence by taking the flow process of practical operation as an example.
301st, the data access of mobile phone receive user is indicated.
For example, the signal such as the touch signal of mobile phone receive user, acoustical signal, determines user's file data to be accessed.
302nd, mobile phone judges whether present mode is privacy mode, if present mode is privacy mode, execution step 303;If present mode is normal mode, execution step 307.
Optionally, the conversion between normal mode and privacy mode can be configured realization by user on mobile phone, by normal When scale formula switchs to privacy mode, the identification for carrying out key or password, identification is needed correctly can just to enable privacy mode;And secret Pattern switchs to normal mode need not then carry out the identification of key or password.
303rd, mobile phone prompts the user with coupling first key.
304th, mobile phone judges whether the first key of user input is correct, if correctly, execution step 305;If not just Really, execution step 308.
305th, mobile phone prompts the user with the second key of coupling.
306th, mobile phone judges whether the second key of user input is correct, if correctly, execution step 307;If not just Really, execution step 308.
307th, mobile phone open data access indicates corresponding file.
308th, mobile phone refusal is opened data access and indicates corresponding file and prompt the user with failure information.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
Further embodiment of this invention provides a kind of concealing device 30 of file, as shown in fig. 6, described device 30 includes:
Hidden unit 31, hides attribute for adding in the file attribute of private data, wherein, in the private mode, The private data for adding hiding attribute is visible, and in normal mode, the private data for adding hiding attribute is Sightless;
Memory element 32, arrives one or more first piece of group for will add the private data storage for hiding attribute In.
Wherein, the hidden unit 31 is specifically for adding identification field unsigned int in inode structures flags.
Further, as shown in fig. 7, described device 30 can also include:
Link arranging unit 33, links for arranging address corresponding with the private data in second piece of group, described Second piece of group is the block group for storing non-private data, and wherein described first piece of group and second piece of group can be according to the secret numbers According to data volume dynamic translation;
First ciphering unit 34, adds for tapping into row to the address chain in second piece of group using first key Close.
Further, as shown in fig. 7, described device 30 can also include:
Second ciphering unit 35, for using the second key to the secret in first piece of group in file system layer Data are encrypted.
Further, as shown in fig. 7, described device 30 can also include:
Receiving unit 36, the private data for receive user access instruction;
For judging that the private data is accessed, judging unit 37, indicates whether the access key of carrying is close with described first Key and second key mate;
First processing units 38, for mating with the first key and second key when the access key When, parse the private data;
Second processing unit 39, for when the access key and the first key or the second key any of which During mismatch, refuse the private data and access instruction.
In prior art, the protection that realizes to private data in mobile phone is encrypted by application software, but passes through application layer pair Private data encryption is easy to be cracked, and data safety cannot be ensured.Compared with prior art, the embodiment of the present invention passes through Add in the file attribute of private data and hide attribute, so that the private data for adding hiding attribute can be in normal mode It is sightless down, is only under special privacy mode visible;For the ease of management, the private for hiding attribute will be added Ciphertext data is stored in one or more first piece of group.By the modification in file layers in said method so that private data In normal mode for hidden, even if there being the device losses such as the mobile phone of private data, other people cannot also view these Hiding private data, improves private data safety, has ensured that the privacy of user will not be revealed.
The concealing device of file provided in an embodiment of the present invention can realize the embodiment of the method for above-mentioned offer, concrete function Realize referring to the explanation in embodiment of the method, will not be described here.The hidden method of file provided in an embodiment of the present invention and The file data that device goes in terminal unit is processed, but is not limited only to this.
One of ordinary skill in the art will appreciate that realize all or part of flow process in above-described embodiment method, being can be with Instruct related hardware to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access Memory, RAM)Deng.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, the change or replacement that can readily occur in all are answered It is included within the scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (8)

1. a kind of hidden method of file, it is characterised in that include:
Add in the file attribute of private data and hide attribute, wherein, in the private mode, add the private for hiding attribute Ciphertext data is visible, and in normal mode, the private data for adding hiding attribute is sightless;
The private data that hiding attribute will be added is stored in one or more first piece of group;
Wherein, the private data for adding the hiding attribute is stored in one or more first piece of group it described Afterwards, methods described also includes:
Arrange address corresponding with the private data in second piece of group to link, second piece of group is the non-private data of storage Block group, wherein described first piece of group and second piece of group can be according to the data volume dynamic translations of the private data;
The address chain in second piece of group is connect using first key and be encrypted.
2. method according to claim 1, it is characterised in that described interpolation in the file attribute of private data hides category Property includes:
Add identification field unsigned int flags in inode structures.
3. method according to claim 1, it is characterised in that in the use first key is to second piece of group Address chain is connect after being encrypted, and methods described also includes:
The private data in first piece of group is encrypted using the second key in file system layer.
4. method according to claim 3, it is characterised in that described in file system layer using the second key to described After the private data in first piece of group is encrypted, methods described also includes:
The private data of receive user is accessed and is indicated;
Judge whether the private data accesses the access key for indicating to carry equal with the first key and second key Coupling;
If the access key is mated with the first key and second key, the private data is parsed;
If the access key is mismatched with the first key or the second key any of which, refuse the secret number Indicate according to accessing.
5. a kind of concealing device of file, it is characterised in that include:
Hidden unit, hides attribute for adding in the file attribute of private data, wherein, in the private mode, adds hidden The private data for hiding attribute is visible, and in normal mode, the private data for adding hiding attribute is invisible 's;
Memory element, stores in one or more first piece of group for will add the private data for hiding attribute;
Link arranging unit, links for arranging address corresponding with the private data in second piece of group, described second piece Block group of the group for the non-private data of storage, wherein described first piece of group and second piece of group can be according to the numbers of the private data According to amount dynamic translation;
First ciphering unit, is encrypted for being connect to the address chain in second piece of group using first key.
6. device according to claim 5, it is characterised in that the hidden unit is specifically in inode structures Add identification field unsigned int flags.
7. device according to claim 5, it is characterised in that described device also includes:
Second ciphering unit, for being entered to the private data in first piece of group using the second key in file system layer Row encryption.
8. device according to claim 7, it is characterised in that described device also includes:
Receiving unit, the private data for receive user access instruction;
Judging unit, for judge the private data access indicate the access key for carrying whether with the first key and institute State the second key to mate;
First processing units, for when the access key is mated with the first key and second key, parsing The private data;
Second processing unit, for mismatching when the access key and the first key or the second key any of which When, refuse the private data and access instruction.
CN201410041024.1A 2014-01-27 2014-01-27 The hidden method and device of file Active CN103761487B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410041024.1A CN103761487B (en) 2014-01-27 2014-01-27 The hidden method and device of file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410041024.1A CN103761487B (en) 2014-01-27 2014-01-27 The hidden method and device of file

Publications (2)

Publication Number Publication Date
CN103761487A CN103761487A (en) 2014-04-30
CN103761487B true CN103761487B (en) 2017-03-15

Family

ID=50528723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410041024.1A Active CN103761487B (en) 2014-01-27 2014-01-27 The hidden method and device of file

Country Status (1)

Country Link
CN (1) CN103761487B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10049228B2 (en) * 2015-01-20 2018-08-14 Microsoft Technology Licensing, Llc File encryption support for FAT file systems
CN104778418A (en) * 2015-03-24 2015-07-15 四川长虹电器股份有限公司 Method and terminal for safely displaying files
CN104780179B (en) * 2015-05-07 2017-10-24 浙江工商大学 A kind of key policy attribute encryption method of hiding attribute
CN110598463B (en) 2019-04-19 2021-05-14 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN103067170A (en) * 2012-12-14 2013-04-24 深圳国微技术有限公司 Encrypting file system, encrypting method and deciphering method based on EXT2 file system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9164700B2 (en) * 2009-03-05 2015-10-20 Sandisk Il Ltd System for optimizing the transfer of stored content in response to a triggering event
CN103324892A (en) * 2013-06-08 2013-09-25 广东欧珀移动通信有限公司 File display method and device of Android system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN103067170A (en) * 2012-12-14 2013-04-24 深圳国微技术有限公司 Encrypting file system, encrypting method and deciphering method based on EXT2 file system

Also Published As

Publication number Publication date
CN103761487A (en) 2014-04-30

Similar Documents

Publication Publication Date Title
US7854010B2 (en) Method and apparatus for searching rights object and mapping method and mapping apparatus for the same
WO2020143620A1 (en) Method for displaying block chain data, block chain browser, user node and medium
US10140370B1 (en) Systems and methods for maintaining encrypted search indexes on third-party storage systems
CN103268455B (en) The access method of data and device
KR20210092802A (en) Systems and methods for efficient and secure processing, access and transmission of data via blockchain networks
US20150156011A1 (en) Dynamic symmetric searchable encryption
CN103778380A (en) Data desensitization method and device and data anti-desensitization method and device
CN103761487B (en) The hidden method and device of file
CN106506159A (en) Encryption method and equipment for key safety
CN109241484A (en) A kind of sending method and equipment of the web data based on encryption technology
CN108055133A (en) A kind of key secure signing method based on block chain technology
EP3435271A1 (en) Access management method, information processing device, program, and recording medium
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN107038369A (en) The method and terminal of a kind of resources accessing control
CN101593252B (en) Method and system for controlling access of computer to USB equipment
CN108108633B (en) Data file and access method, device and equipment thereof
CN103617401A (en) Method and device for protecting data files
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN104252605A (en) Method and system for file transparent encryption and decryption of Android platform
CN104537295B (en) A kind of method of computer system and management computer user authority
CN106610995A (en) Ciphertext index creating method, device and system
CN106778337A (en) Document protection method, device and terminal
CN104484628B (en) It is a kind of that there is the multi-application smart card of encrypting and decrypting
CN105279453B (en) It is a kind of to support the partitions of file for separating storage management to hide system and method
CN107609412A (en) A kind of method for realizing that mobile terminal safety stores under mobile Internet based on TrustZone technologies

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant