CN105989304A - File storage method, file reading method, file storage apparatus and file reading apparatus - Google Patents
File storage method, file reading method, file storage apparatus and file reading apparatus Download PDFInfo
- Publication number
- CN105989304A CN105989304A CN201510099131.4A CN201510099131A CN105989304A CN 105989304 A CN105989304 A CN 105989304A CN 201510099131 A CN201510099131 A CN 201510099131A CN 105989304 A CN105989304 A CN 105989304A
- Authority
- CN
- China
- Prior art keywords
- file
- file body
- address
- memory space
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a file storage method, a file reading method, a file storage apparatus and a file reading apparatus, which relate to the technical field of mobile communication, can realize secure storage and reading of files with relatively low system overhead and greatly improve information security of a mobile terminal without degrading user experience. The storage method comprises steps: encrypting a file header of the file and storing the encrypted file header in a first storage space; allocating a virtual address for a file body of the file; respectively mapping all the virtual address occupied by the file body into a real address of the storage space according to a preset rule, and storing the file body into a second storage space according to the real address, wherein the virtual address is different from the real address.
Description
Technical field
The present invention relates to mobile communication technology field, particularly relate to a kind of file memory method, read method
And device.
Background technology
Along with the development of mobile communication technology, intelligent terminal has become as in people's life the most important
Instrument, communicate, handle official business, the function such as payment available in all varieties, accordingly, the information security of mobile terminal is also
Increasingly it is subject to people's attention.
The file of the comparison secret in mobile terminal typically can carry out certain by methods such as encryptions
Security fence.If but secret quantity of documents is many, volume is big, then these data are all encrypted
It is again unpractical for processing, because the operand that file carries out data encryption or deciphering is bigger, very
Easily cause Ka Dun or other are abnormal, make Consumer's Experience be deteriorated.
Although the dual system application mobile terminal possessing conventional system and security system at present starts to rise, use
Safety and privacy can be required that higher file and application are arranged under security system by family, but
File in current security systems is all not through encryption, as long as there being corresponding operating right just can
The operation this secure file read or write.If having rogue program or process to steal user data
It is possible that leaking data.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of file memory method, read method and device,
The safety storage of file can be realized with less overhead and read, in the feelings not reducing Consumer's Experience
The information security of mobile terminal is substantially increased under condition.
On the one hand, the present invention provides a kind of file memory method, including: after the file header of file is encrypted
It is stored in the first memory space;File body for described file distributes virtual address;Described file body is accounted for
All virtual addresses be mapped to the true address of memory space respectively according to preset rules, and by described
File body stores the second memory space according to described true address, described virtual address with described truly
Location is different.
Optionally, the described all virtual addresses described file body taken map respectively according to preset rules
The true address becoming memory space includes: according to default mapping algorithm or default mapping table, by described
All virtual addresses that file body takies are mapped to the true address of memory space respectively according to preset rules.
Optionally, described preset rules and IEMI (the International Mobile of mobile terminal
Equipment Identity, international mobile equipment identification code) relevant, corresponding pre-of different mobile terminals
If rule is different.
On the other hand, the present invention also provides for a kind of file reading, and described file is for carry according to the present invention
The file of the file memory method storage of confession, described file reading includes: respectively user is carried out literary composition
Part head safety verification and file body safety verification;In the described user feelings by described file header safety verification
Under condition, from the first memory space, decipher described file header;Described user by described file body safety
In the case of checking, the virtual address of described file body is supplied to described user, and further determine that into
Whether the program executable unit of row File read operation has corresponding authority;Determining that described program performs list
In the case of position has corresponding authority, described virtual address is mapped to the true address of memory space, presses
According to described true address, described file body is supplied to described user.
Optionally, described determine whether the program executable unit carrying out File read operation has corresponding authority
Including: determine whether the process needing to carry out file body reading or thread have permission described file body respectively
Be read and need the application carrying out file body reading whether have permission call described process or
Thread.
On the other hand, the present invention also provides for a kind of file storage device, including: file header memory element,
It is stored in the first memory space after being encrypted by the file header of file;Allocation unit, is used for as described literary composition
The file body distribution virtual address of part;File body memory element, all for what described file body was taken
Virtual address is mapped to the true address of memory space respectively according to preset rules, and described file body is pressed
Storing the second memory space according to described true address, described virtual address is different from described true address.
Optionally, described file body memory element, for according to the mapping algorithm preset or default mapping
Table, all virtual addresses described file body taken are mapped to memory space respectively according to preset rules
True address, and described file body is stored to the second memory space according to described true address.
Optionally, described preset rules is relevant to international mobile equipment identification code IEMI of mobile terminal,
The preset rules that different mobile terminals is corresponding is different.
On the other hand, the present invention also provides for a kind of document reading apparatus, including: safety verification unit, use
In respectively user being carried out file header safety verification and file body safety verification;File header decryption unit,
Described user is by, in the case of described file header safety verification, deciphering described literary composition from the first memory space
Part head;Authenticating unit, at the described user file body safety verification by described safety verification unit
In the case of, the virtual address of described file body is supplied to described user, and further determines that and carry out literary composition
Whether the program executable unit of part read operation has corresponding authority;File body provides unit, in institute
State in the case of authenticating unit determines that described program executable unit has corresponding authority, by described virtual address
It is mapped to the true address of memory space, according to described true address, described file body is supplied to described use
Family.
Optionally, described authenticating unit, specifically for: described user by described safety verification unit
File body safety verification in the case of, the virtual address of described file body is supplied to described user, and
Determine whether the process needing to carry out file body reading or thread have permission respectively described file body is carried out
Read operation and need the application carrying out file body reading whether to have permission to call described process or thread.
File memory method, read method and the device that the embodiment of the present invention provides, by the file header of file
It is stored separately with file body and reads.For file header, first encrypt and store again, due in file header
Only have recorded the information such as the type of file, size, check code, data volume is the least, therefore, to literary composition
Part head is encrypted without expending a large amount of calculating, is conducive to improving Consumer's Experience;For file body, actual
On be provided with two layer address, wherein the actual stored address of file body does not directly give (hidden to user
Hide), but true address is mapped to diverse virtual address and uses to user, so, legal
User can find the true address of correspondence to complete the reading of file body according to virtual address, and other are illegal
User does not understands, and directly goes to read file body according to virtual address, only can read mess code, cannot at all
Read real file body, thus protect file body and will not illegally be read, be effectively increased terminal
Information Security.
Accompanying drawing explanation
A kind of flow chart of the file memory method that Fig. 1 provides for the embodiment of the present invention;
A kind of flow chart of the file reading that Fig. 2 provides for the embodiment of the present invention;
A kind of detail flowchart of the file memory method that Fig. 3 provides for the embodiment of the present invention;
A kind of detail flowchart of the file memory method that Fig. 4 provides for the embodiment of the present invention;
A kind of structural representation of the file storage device that Fig. 5 provides for the embodiment of the present invention;
A kind of structural representation of the document reading apparatus that Fig. 6 provides for the embodiment of the present invention.
Detailed description of the invention
By further illustrating the technological means and effect that the present invention taked by reaching predetermined purpose, below
In conjunction with accompanying drawing and preferred embodiment, after the present invention is described in detail such as.By detailed description of the invention
Explanation, it should technological means and the effect that can be taked the present invention by reaching predetermined purpose are more deepened
Enter and concrete understanding, but appended diagram is only to provide reference and purposes of discussion, is not used for this
Bright it is any limitation as.
As it is shown in figure 1, embodiments of the invention provide a kind of file memory method, including:
S11, is stored in the first memory space after being encrypted by the file header of file;
S12, the file body for described file distributes virtual address;
S13, all virtual addresses described file body taken are mapped to storage respectively according to preset rules
The true address in space, and described file body is stored to the second memory space according to described true address,
Described virtual address is different from described true address.
The file memory method that the embodiment of the present invention provides, separately deposits file header and the file body of file
Storage.For file header, first encrypt and store again, due to file header only have recorded file type,
The information such as size, check code, data volume is the least, therefore, is encrypted file header without expending big
Amount calculates, and is conducive to improving Consumer's Experience;For file body, actually it is provided with two layer address, wherein
The actual stored address of file body does not directly give (hiding user), but is reflected by true address
Penetrating into diverse virtual address to use to user, so, validated user can be looked for according to virtual address
Complete the reading of file body to corresponding true address, and other disabled users do not understand, directly according to
Virtual address goes to read file body, only can read mess code, cannot read real file body at all, from
And protect file body and will not illegally be read, it is effectively increased the Information Security of terminal.
Optionally, in the present embodiment, the first memory space and the second memory space both can be same and deposit
The zones of different of reservoir, it is also possible to for the memorizer that two panels is different, as long as can divide file header and file body
Opening and store, this is not limited by embodiments of the invention.
Specifically, the first memory space can be to be arranged to the form of a kind of file header manager, it is possible to right
The file header of different file types carries out classification storage and management.When there being new file to store,
Corresponding file header can be obtained according to the type (such as document, audio frequency, video file etc.) of this document,
File header is stored in the first memory space according to after default AES encryption.Such as, if one
File is the file of rm type, and the file header of its correspondence has fixing form, then only need to be according to these lattice
Formula removes extraction document head in file, and file header is stored encrypted in the first memory space.
Concrete, the second memory space can be made up of multiple memory element, and each memory element has
The physical address of oneself, correspond to the true address in the present embodiment.It is stored in second when there being file body to need
During memory space, it is necessary first to obtain the address into the distribution of this document body from storage manager.Need
Bright is, although obtain this address, but file body is not to go storage according to this address, because of
This this address obtained is also referred to as virtual address.
According to the difference of file body size, each file body needs the quantity the most not phase of the memory element taken
With, the quantity of corresponding virtual address also differs, and in step s 12, needs to take file body
All virtual addresses all carry out address mapping, are mapped to true address diverse with virtual address, will
File body is stored in the memory element that this true address is corresponding.Optionally, virtual address and true address
Between address map can carry out according to various ways and algorithm, this is not done by embodiments of the invention
Limiting, as long as virtual address can be made different from true address, and the two is at the second memory space one by one
Corresponding.
Specifically, in step s 12, make all virtual addresses described file body taken according in advance
If the true address that rule is mapped to memory space respectively can comprise the steps: to calculate according to the mapping preset
Method or default mapping table, all virtual addresses described file body taken are reflected respectively according to preset rules
Penetrate into the true address of memory space.It is to say, the mapping from virtual address to true address, both may be used
With constructor or algorithm, obtain the most truly by virtual address being inputted this function or algorithm
Location, it is also possible to directly the corresponding relation of virtual address Yu true address is made a mapping table, by looking into
Ask this mapping table to find corresponding address.
Illustrating, the virtual address that the file body of one file of addition obtains from storage manager is
0x1234-0x1237 (wherein " 0x " represents hexadecimal), after mapping, actual storage locations is
0x4321、0x5321、0x6321、0x7321.Wherein, only virtual address can be visible to user,
User is hidden by true address.For validated user, virtual address can be mapped to truly by system automatically
Address, for disabled user, system will not carry out address map operation to it.So, reflected by address
Penetrate as barrier, even if some disabled users get the virtual address of file body, according to this virtual address
The data read are also mess code, thus are effectively protected file.
Preferably, in order to be further ensured that the safety of end message, it is also possible to virtual address is mapped to
The preset rules of true address is arranged to relevant to international mobile equipment identification code IEMI of mobile terminal,
So, it is all that unique, different mobile terminal is corresponding due to IEMI for any mobile terminal
Preset rules different, disabled user will not understand because of the mapping address algorithm having cracked a station terminal
How virtual address and true address to other mobile terminals map.
Accordingly, as in figure 2 it is shown, embodiments of the invention also provide for a kind of file reading, including:
S21, carries out file header safety verification and file body safety verification respectively to user;
S22, in the case of described user is by described file header safety verification, from the first memory space
The described file header of middle deciphering;In the case of described user is by described file body safety verification, to described
User provides the virtual address that file body is corresponding, and further determines that the program carrying out File read operation is held
Whether row unit has corresponding authority;
S23, in the case of determining that described program executable unit has corresponding authority, by described virtually
Location is mapped to the true address of memory space, described file body is supplied to described according to described true address
User.
The file reading that the embodiment of the present invention provides, real by user being carried out file header safety verification
The now deciphering to file header, by carrying out safety verification and determining and carry out File read operation to file body
Whether program executable unit has corresponding authority, decides whether described virtual address is mapped to storage sky
Between true address, and according to described true address, described file body is supplied to described user.So,
Only by the secured user of safety verification, in the program executable unit reading file, there is corresponding reading
In the case of authority, just can read corresponding file, otherwise, user cannot be known and deposits in the terminal
The file of storage is that the mode being stored separately according to file header, file body carries out storing, both cannot be to file
Head is decrypted, and also cannot find the true address of file body, thus effectively protect the file in terminal,
Substantially increase the information security of terminal.
Specifically, in the step s 21, user is carried out file header safety verification and file body checking can
Think that requirement user inputs safety verification code or requires that user inputs finger print information etc., optionally, file header
Safety verification can be identical with the checking form that file body safety verification is taked, it is also possible to different.In step
In rapid S22, if user has passed through file header safety verification, then can read according to the file of user and refer to
Order, is decrypted the file header being stored in the first memory space, if user is tested safely by file body
Card, then may further determine that whether the program executable unit carrying out file (file body) read operation has
There is corresponding authority.Wherein, program executable unit can include application and apply the process or line called
Journey.So, determine whether this program executable unit has authority and include the most accordingly: determine needs respectively
Carry out the process of file body reading or thread whether have permission described file body is read and
Need the application carrying out file body reading whether to have permission and call described process or thread, the mirror of twice authentication
Power order does not limits.Only in the case of both of which has corresponding authority, just it is mapped to deposit by virtual address
The true address in storage space, is supplied to user according to true address by file body.Accordingly even when rogue program
Or process obtains storage manager and distributes to the virtual address of respective file, go according to this virtual address
Read and also cannot obtain real file, thus be effectively increased the information security of terminal.
After respectively file header and file body being read, the two can be reconfigured, revert to be answered
By the file format read, thus allow users to smoothly corresponding read concrete file data.
The file memory method provided the present invention below by specific embodiment and read method are carried out in detail
Carefully illustrate.
In a mobile terminal with dual system, in order to improve the information security of security system further
Property, file header is carried out for the file in security system and file body is stored separately and reads.
As it is shown on figure 3, in the present embodiment, file stores security system can be comprised the steps:
S301. determine whether that file is stored in security system, if it is, perform step S302;If it does not,
Continue executing with step S301;
S302. file header is separated with file body;
S303. it is stored in file header manager after being encrypted by file header;
S304. the virtual address that file storage manager is the distribution of this document body is obtained;
S305. true address resolver is generated according to the unique IMEI of mobile phone;
S306. virtual address is inputted true address resolver, the true address corresponding to obtain file body;
S307. file body is stored according to true address.
Accordingly, as shown in Figure 4, File read operation can comprise the steps:
S401. determine whether that application obtains file data, if it is, perform step S402;If it does not,
Continue executing with step S401;
S402. whether user is by file header safety verification, if performing S403, if it does not, perform
S409;
S403. it is supplied to user after being deciphered by file header;
S404. whether user is by file body safety verification, if performing S405, if it does not, perform
S409;
S405. the virtual address of file body is supplied to described user, and further determine that application, process or
Whether thread has corresponding file reservation, if it is, perform S406, if it does not, perform S409;
S406. virtual address is input to address resolver to obtain true address;
S407. according to true address, file data is supplied to user;
S408. file header and file body are recombined the file that can be employed to read;
S409. terminate current operation and point out user.
The file memory method provided by the present embodiment and file reading, by the file header of file and
File body is stored separately and reads.For file header, first encrypt and store again, due in file header only
Only have recorded the information such as the type of file, size, check code, data volume is the least, therefore, to file
Head is encrypted without expending a large amount of calculating, is conducive to improving Consumer's Experience;For file body, actually
Being provided with two layer address, wherein the actual stored address of file body does not directly give (hidden to user
Hide), but true address is mapped to diverse virtual address and uses to user, so, only
Validated user can find the true address of correspondence to complete the reading of file body according to virtual address, and its
He disabled user does not understands, and directly goes to read file body according to virtual address, only can read mess code, root
Originally cannot read real file body, thus protect file body and will not illegally be read, be effectively improved
The Information Security of terminal.
Accordingly, as it is shown in figure 5, embodiments of the invention also provide for a kind of file storage device 5, bag
Include:
File header memory element 51, is stored in the first memory space after being encrypted by the file header of file;
Allocation unit 52, distributes virtual address for the file body for described file;
File body memory element 53, all virtual addresses being used for taking described file body are according to default rule
It is mapped to the true address of memory space the most respectively, and described file body is stored according to described true address
To the second memory space, described virtual address is different from described true address.
Embodiments of the invention also provide for a kind of file storage device 5, by file header and the file body of file
It is stored separately.File header is first encrypted and is stored by file header memory element 51, due in file header
Only have recorded the information such as the type of file, size, check code, data volume is the least, therefore, to literary composition
Part head is encrypted without expending a large amount of calculating, is conducive to improving Consumer's Experience;File body memory element 53
Actually be provided with two layer address, wherein the actual stored address of file body do not directly give (to
Family hides), but true address is mapped to diverse virtual address, by allocation unit 52 by void
Intending address and distribute to user's use, so, validated user can find the true of correspondence according to virtual address
Address completes the reading of file body, and other disabled users do not understand, and directly goes to read according to virtual address
Take file body, only can read mess code, real file body cannot be read at all, thus protect file
Body will not illegally be read, and is effectively increased the Information Security of terminal.
Optionally, file body memory element 53, can be specifically for according to the mapping algorithm or default preset
Mapping table, all virtual addresses described file body taken are mapped to storage sky respectively according to preset rules
Between true address, and described file body is stored to the second memory space according to described true address.
Optionally, described preset rules can be with the international mobile equipment identification code IEMI phase of mobile terminal
Closing, the preset rules that different mobile terminals is corresponding is different.
Accordingly, as shown in Figure 6, embodiments of the invention also provide for a kind of document reading apparatus 6, bag
Include:
Safety verification unit 61, is used for respectively user being carried out file header safety verification and file body is tested safely
Card;
File header decryption unit 62, in the case of described user is by described file header safety verification, from
First memory space is deciphered described file header;
Authenticating unit 63, for passing through the file body safety verification of safety verification unit 61 described user
In the case of, the virtual address of described file body is supplied to described user, and further determines that and carry out literary composition
Whether the program executable unit of part read operation has corresponding authority;
File body provides unit 64, for determining that described program executable unit has phase in described authenticating unit
In the case of answering authority, described virtual address is mapped to the true address of memory space, according to described very
Described file body is supplied to described user by real address.
The document reading apparatus 6 that the embodiment of the present invention provides, is carried out literary composition by safety verification unit 61 to user
By file header decryption unit 62, file header is deciphered again after part head safety verification, by safety verification unit 61
File body is carried out safety verification and determines that by authenticating unit 63 program carrying out File read operation performs
After whether unit has corresponding authority, then unit 64 is provided to determine whether described virtual by file body
Address is mapped to the true address of memory space and described file body is supplied to described according to true address
User.So, only by the secured user of safety verification, reading the program executable unit tool of file
In the case of having corresponding reading authority, just can read corresponding file, otherwise, user cannot be known
The file stored in the terminal is that the mode being stored separately according to file header, file body carries out storing,
Both file header cannot be decrypted, and also cannot find the true address of file body, thus effectively protect
File in terminal, substantially increases the information security of terminal.
Optionally, authenticating unit 63 can be specifically for: at user's file by safety verification unit 61
In the case of body safety verification, the virtual address of described file body is supplied to described user, and the most true
Surely need to carry out the process of file body reading or whether thread has permission and described file body is read out behaviour
Make and need the application carrying out file body reading whether to have permission to call described process or thread.
Although being example purpose, have been disclosed for the preferred embodiments of the present invention, those skilled in the art
It is also possible for will be recognized by various improvement, increasing and replace, and therefore, the scope of the present invention should not limit
In above-described embodiment.
Claims (10)
1. a file memory method, it is characterised in that including:
It is stored in the first memory space after being encrypted by the file header of file;
File body for described file distributes virtual address;
The all virtual addresses described file body taken are mapped to memory space respectively according to preset rules
True address, and described file body is stored to the second memory space according to described true address, described
Virtual address is different from described true address.
Method the most according to claim 1, it is characterised in that described described file body is taken
All virtual addresses be mapped to the true address of memory space according to preset rules respectively and include:
According to default mapping algorithm or default mapping table, described file body is taken all virtually
Location is mapped to the true address of memory space respectively according to preset rules.
Method the most according to claim 1 and 2, it is characterised in that described preset rules and shifting
International mobile equipment identification code IEMI of dynamic terminal is correlated with, the preset rules that different mobile terminals is corresponding
Different.
4. a file reading, it is characterised in that described file is for according to described in claim 1
Method storage file, described read method includes:
Respectively user is carried out file header safety verification and file body safety verification;
In the case of described user is by described file header safety verification, decipher from the first memory space
Described file header;In the case of described user is by described file body safety verification, by described file body
Virtual address be supplied to described user, and further determine that the program carrying out File read operation performs list
Whether position has corresponding authority;
In the case of determining that described program executable unit has corresponding authority, described virtual address is mapped
Become the true address of memory space, according to described true address, described file body is supplied to described user.
Method the most according to claim 4, it is characterised in that described determine carry out file reading
Whether the program executable unit of operation has corresponding authority includes:
Determine whether the process needing to carry out file body reading or thread have permission described file body respectively
Be read and need the application carrying out file body reading whether have permission call described process or
Thread.
6. a file storage device, it is characterised in that including:
File header memory element, is stored in the first memory space after being encrypted by the file header of file;
Allocation unit, distributes virtual address for the file body for described file;
File body memory element, all virtual addresses being used for taking described file body are according to preset rules
It is mapped to the true address of memory space respectively, and described file body is stored according to described true address
Second memory space, described virtual address is different from described true address.
Device the most according to claim 6, it is characterised in that described file body memory element,
For according to preset mapping algorithm or default mapping table, described file body is taken all virtually
Location is mapped to the true address of memory space respectively according to preset rules, and by described file body according to described
True address stores the second memory space.
8. according to the device described in claim 6 or 7, it is characterised in that described preset rules and shifting
International mobile equipment identification code IEMI of dynamic terminal is correlated with, the preset rules that different mobile terminals is corresponding
Different.
9. a document reading apparatus, it is characterised in that including:
Safety verification unit, is used for respectively user being carried out file header safety verification and file body is tested safely
Card;
File header decryption unit, described user by the case of described file header safety verification, from the
One memory space is deciphered described file header;
Authenticating unit, is used for described user by the file body safety verification of described safety verification unit
In the case of, the virtual address of described file body is supplied to described user, and further determines that and carry out file
Whether the program executable unit of read operation has corresponding authority;
File body provides unit, for determining that described program executable unit has accordingly in described authenticating unit
In the case of authority, described virtual address is mapped to the true address of memory space, according to described truly
Described file body is supplied to described user by address.
Device the most according to claim 9, it is characterised in that described authenticating unit, specifically uses
In:
In the case of described user is by the file body safety verification of described safety verification unit, by described
The virtual address of file body is supplied to described user, and determines the process needing to carry out file body reading respectively
Or whether thread has permission and is read described file body and needs carrying out file body reading
Whether application has permission is called described process or thread.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510099131.4A CN105989304A (en) | 2015-03-06 | 2015-03-06 | File storage method, file reading method, file storage apparatus and file reading apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510099131.4A CN105989304A (en) | 2015-03-06 | 2015-03-06 | File storage method, file reading method, file storage apparatus and file reading apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105989304A true CN105989304A (en) | 2016-10-05 |
Family
ID=57039799
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510099131.4A Pending CN105989304A (en) | 2015-03-06 | 2015-03-06 | File storage method, file reading method, file storage apparatus and file reading apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105989304A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110516465A (en) * | 2019-07-11 | 2019-11-29 | 平安普惠企业管理有限公司 | Management method, device, equipment and the computer readable storage medium of resource address |
WO2020000391A1 (en) * | 2018-06-29 | 2020-01-02 | Intel Corporation | Virtual storage services for client computing devices |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
CN113282521A (en) * | 2021-05-19 | 2021-08-20 | 武汉天喻信息产业股份有限公司 | Method and device for prolonging service life of smart card |
CN114968088A (en) * | 2022-04-08 | 2022-08-30 | 中移互联网有限公司 | File storage method, file reading method and device |
US11445009B1 (en) | 2021-10-13 | 2022-09-13 | International Business Machines Corporation | Managing proprietary structured objects |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100037047A1 (en) * | 2005-10-18 | 2010-02-11 | Antonio Varriale | Method for Controlling Access to File Systems, Related System, Sim Card and Computer Program Product for Use therein |
CN102456116A (en) * | 2010-10-28 | 2012-05-16 | 无锡江南计算技术研究所 | File encryption method, file decryption method and devices |
CN103164667A (en) * | 2011-12-08 | 2013-06-19 | 三星电子株式会社 | Data storage device and data management method |
CN104038490A (en) * | 2014-06-09 | 2014-09-10 | 可牛网络技术(北京)有限公司 | Communication safety verification method and device thereof |
CN104244240A (en) * | 2013-06-07 | 2014-12-24 | 沈阳讯网网络科技有限公司 | Method and system controlling user wireless communication authority in specific zone |
CN104270380A (en) * | 2014-10-15 | 2015-01-07 | 叶涛 | End-to-end encryption method and system based on mobile network and communication client side |
-
2015
- 2015-03-06 CN CN201510099131.4A patent/CN105989304A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100037047A1 (en) * | 2005-10-18 | 2010-02-11 | Antonio Varriale | Method for Controlling Access to File Systems, Related System, Sim Card and Computer Program Product for Use therein |
CN102456116A (en) * | 2010-10-28 | 2012-05-16 | 无锡江南计算技术研究所 | File encryption method, file decryption method and devices |
CN103164667A (en) * | 2011-12-08 | 2013-06-19 | 三星电子株式会社 | Data storage device and data management method |
CN104244240A (en) * | 2013-06-07 | 2014-12-24 | 沈阳讯网网络科技有限公司 | Method and system controlling user wireless communication authority in specific zone |
CN104038490A (en) * | 2014-06-09 | 2014-09-10 | 可牛网络技术(北京)有限公司 | Communication safety verification method and device thereof |
CN104270380A (en) * | 2014-10-15 | 2015-01-07 | 叶涛 | End-to-end encryption method and system based on mobile network and communication client side |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020000391A1 (en) * | 2018-06-29 | 2020-01-02 | Intel Corporation | Virtual storage services for client computing devices |
US11615194B2 (en) | 2018-06-29 | 2023-03-28 | Intel Corporation | Virtual storage services for client computing devices |
CN110516465A (en) * | 2019-07-11 | 2019-11-29 | 平安普惠企业管理有限公司 | Management method, device, equipment and the computer readable storage medium of resource address |
CN110516465B (en) * | 2019-07-11 | 2024-03-01 | 深圳市兴海物联科技有限公司 | Resource address management method, device, equipment and computer readable storage medium |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
CN113282521A (en) * | 2021-05-19 | 2021-08-20 | 武汉天喻信息产业股份有限公司 | Method and device for prolonging service life of smart card |
US11445009B1 (en) | 2021-10-13 | 2022-09-13 | International Business Machines Corporation | Managing proprietary structured objects |
CN114968088A (en) * | 2022-04-08 | 2022-08-30 | 中移互联网有限公司 | File storage method, file reading method and device |
CN114968088B (en) * | 2022-04-08 | 2023-09-05 | 中移互联网有限公司 | File storage method, file reading method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105989304A (en) | File storage method, file reading method, file storage apparatus and file reading apparatus | |
US9374712B2 (en) | Multi-issuer secure element partition architecture for NFC enabled devices | |
US9769654B2 (en) | Method of implementing a right over a content | |
CN107317677B (en) | Secret key storage and equipment identity authentication method and device | |
CN103294961A (en) | Method and device for file encrypting/decrypting | |
CN105812332A (en) | Data protection method | |
CN107196907B (en) | A kind of guard method of Android SO files and device | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
CN103246850A (en) | Method and device for processing file | |
CN103259651A (en) | Encryption and decryption method and system of terminal data | |
US20120278611A1 (en) | Vpn-based method and system for mobile communication terminal to access data securely | |
CN106375990B (en) | A kind of encrypting and deciphering system and encipher-decipher method of mobile phone private data | |
US20120284534A1 (en) | Memory Device and Method for Accessing the Same | |
CN103268456A (en) | Method and device for file safety control | |
CN104217175A (en) | Data read-write method and device | |
CN102867157A (en) | Mobile terminal and data protecting method | |
CN110650191A (en) | Data read-write method of distributed storage system | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN103379483A (en) | Method, device and mobile terminal for mobile terminal information security management | |
CN101174941B (en) | Off-line digital copyright protection method and device for mobile terminal document | |
CN103458101B (en) | The hardware encryption storage method of a kind of mobile phone privacy contact person and system | |
CN102799540B (en) | Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption | |
CN114372242A (en) | Ciphertext data processing method, authority management server and decryption server | |
CN102081575A (en) | Dynamic distribution method and device of memory space of virtual disc | |
CN111177783B (en) | Method and device for preventing mobile storage medium from being divulged |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161005 |
|
RJ01 | Rejection of invention patent application after publication |