CN105989304A - File storage method, file reading method, file storage apparatus and file reading apparatus - Google Patents

File storage method, file reading method, file storage apparatus and file reading apparatus Download PDF

Info

Publication number
CN105989304A
CN105989304A CN201510099131.4A CN201510099131A CN105989304A CN 105989304 A CN105989304 A CN 105989304A CN 201510099131 A CN201510099131 A CN 201510099131A CN 105989304 A CN105989304 A CN 105989304A
Authority
CN
China
Prior art keywords
file
file body
address
memory space
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510099131.4A
Other languages
Chinese (zh)
Inventor
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Coolpad Technologies Co Ltd
Original Assignee
Shenzhen Coolpad Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coolpad Technologies Co Ltd filed Critical Shenzhen Coolpad Technologies Co Ltd
Priority to CN201510099131.4A priority Critical patent/CN105989304A/en
Publication of CN105989304A publication Critical patent/CN105989304A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a file storage method, a file reading method, a file storage apparatus and a file reading apparatus, which relate to the technical field of mobile communication, can realize secure storage and reading of files with relatively low system overhead and greatly improve information security of a mobile terminal without degrading user experience. The storage method comprises steps: encrypting a file header of the file and storing the encrypted file header in a first storage space; allocating a virtual address for a file body of the file; respectively mapping all the virtual address occupied by the file body into a real address of the storage space according to a preset rule, and storing the file body into a second storage space according to the real address, wherein the virtual address is different from the real address.

Description

A kind of file memory method, read method and device
Technical field
The present invention relates to mobile communication technology field, particularly relate to a kind of file memory method, read method And device.
Background technology
Along with the development of mobile communication technology, intelligent terminal has become as in people's life the most important Instrument, communicate, handle official business, the function such as payment available in all varieties, accordingly, the information security of mobile terminal is also Increasingly it is subject to people's attention.
The file of the comparison secret in mobile terminal typically can carry out certain by methods such as encryptions Security fence.If but secret quantity of documents is many, volume is big, then these data are all encrypted It is again unpractical for processing, because the operand that file carries out data encryption or deciphering is bigger, very Easily cause Ka Dun or other are abnormal, make Consumer's Experience be deteriorated.
Although the dual system application mobile terminal possessing conventional system and security system at present starts to rise, use Safety and privacy can be required that higher file and application are arranged under security system by family, but File in current security systems is all not through encryption, as long as there being corresponding operating right just can The operation this secure file read or write.If having rogue program or process to steal user data It is possible that leaking data.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of file memory method, read method and device, The safety storage of file can be realized with less overhead and read, in the feelings not reducing Consumer's Experience The information security of mobile terminal is substantially increased under condition.
On the one hand, the present invention provides a kind of file memory method, including: after the file header of file is encrypted It is stored in the first memory space;File body for described file distributes virtual address;Described file body is accounted for All virtual addresses be mapped to the true address of memory space respectively according to preset rules, and by described File body stores the second memory space according to described true address, described virtual address with described truly Location is different.
Optionally, the described all virtual addresses described file body taken map respectively according to preset rules The true address becoming memory space includes: according to default mapping algorithm or default mapping table, by described All virtual addresses that file body takies are mapped to the true address of memory space respectively according to preset rules.
Optionally, described preset rules and IEMI (the International Mobile of mobile terminal Equipment Identity, international mobile equipment identification code) relevant, corresponding pre-of different mobile terminals If rule is different.
On the other hand, the present invention also provides for a kind of file reading, and described file is for carry according to the present invention The file of the file memory method storage of confession, described file reading includes: respectively user is carried out literary composition Part head safety verification and file body safety verification;In the described user feelings by described file header safety verification Under condition, from the first memory space, decipher described file header;Described user by described file body safety In the case of checking, the virtual address of described file body is supplied to described user, and further determine that into Whether the program executable unit of row File read operation has corresponding authority;Determining that described program performs list In the case of position has corresponding authority, described virtual address is mapped to the true address of memory space, presses According to described true address, described file body is supplied to described user.
Optionally, described determine whether the program executable unit carrying out File read operation has corresponding authority Including: determine whether the process needing to carry out file body reading or thread have permission described file body respectively Be read and need the application carrying out file body reading whether have permission call described process or Thread.
On the other hand, the present invention also provides for a kind of file storage device, including: file header memory element, It is stored in the first memory space after being encrypted by the file header of file;Allocation unit, is used for as described literary composition The file body distribution virtual address of part;File body memory element, all for what described file body was taken Virtual address is mapped to the true address of memory space respectively according to preset rules, and described file body is pressed Storing the second memory space according to described true address, described virtual address is different from described true address.
Optionally, described file body memory element, for according to the mapping algorithm preset or default mapping Table, all virtual addresses described file body taken are mapped to memory space respectively according to preset rules True address, and described file body is stored to the second memory space according to described true address.
Optionally, described preset rules is relevant to international mobile equipment identification code IEMI of mobile terminal, The preset rules that different mobile terminals is corresponding is different.
On the other hand, the present invention also provides for a kind of document reading apparatus, including: safety verification unit, use In respectively user being carried out file header safety verification and file body safety verification;File header decryption unit, Described user is by, in the case of described file header safety verification, deciphering described literary composition from the first memory space Part head;Authenticating unit, at the described user file body safety verification by described safety verification unit In the case of, the virtual address of described file body is supplied to described user, and further determines that and carry out literary composition Whether the program executable unit of part read operation has corresponding authority;File body provides unit, in institute State in the case of authenticating unit determines that described program executable unit has corresponding authority, by described virtual address It is mapped to the true address of memory space, according to described true address, described file body is supplied to described use Family.
Optionally, described authenticating unit, specifically for: described user by described safety verification unit File body safety verification in the case of, the virtual address of described file body is supplied to described user, and Determine whether the process needing to carry out file body reading or thread have permission respectively described file body is carried out Read operation and need the application carrying out file body reading whether to have permission to call described process or thread.
File memory method, read method and the device that the embodiment of the present invention provides, by the file header of file It is stored separately with file body and reads.For file header, first encrypt and store again, due in file header Only have recorded the information such as the type of file, size, check code, data volume is the least, therefore, to literary composition Part head is encrypted without expending a large amount of calculating, is conducive to improving Consumer's Experience;For file body, actual On be provided with two layer address, wherein the actual stored address of file body does not directly give (hidden to user Hide), but true address is mapped to diverse virtual address and uses to user, so, legal User can find the true address of correspondence to complete the reading of file body according to virtual address, and other are illegal User does not understands, and directly goes to read file body according to virtual address, only can read mess code, cannot at all Read real file body, thus protect file body and will not illegally be read, be effectively increased terminal Information Security.
Accompanying drawing explanation
A kind of flow chart of the file memory method that Fig. 1 provides for the embodiment of the present invention;
A kind of flow chart of the file reading that Fig. 2 provides for the embodiment of the present invention;
A kind of detail flowchart of the file memory method that Fig. 3 provides for the embodiment of the present invention;
A kind of detail flowchart of the file memory method that Fig. 4 provides for the embodiment of the present invention;
A kind of structural representation of the file storage device that Fig. 5 provides for the embodiment of the present invention;
A kind of structural representation of the document reading apparatus that Fig. 6 provides for the embodiment of the present invention.
Detailed description of the invention
By further illustrating the technological means and effect that the present invention taked by reaching predetermined purpose, below In conjunction with accompanying drawing and preferred embodiment, after the present invention is described in detail such as.By detailed description of the invention Explanation, it should technological means and the effect that can be taked the present invention by reaching predetermined purpose are more deepened Enter and concrete understanding, but appended diagram is only to provide reference and purposes of discussion, is not used for this Bright it is any limitation as.
As it is shown in figure 1, embodiments of the invention provide a kind of file memory method, including:
S11, is stored in the first memory space after being encrypted by the file header of file;
S12, the file body for described file distributes virtual address;
S13, all virtual addresses described file body taken are mapped to storage respectively according to preset rules The true address in space, and described file body is stored to the second memory space according to described true address, Described virtual address is different from described true address.
The file memory method that the embodiment of the present invention provides, separately deposits file header and the file body of file Storage.For file header, first encrypt and store again, due to file header only have recorded file type, The information such as size, check code, data volume is the least, therefore, is encrypted file header without expending big Amount calculates, and is conducive to improving Consumer's Experience;For file body, actually it is provided with two layer address, wherein The actual stored address of file body does not directly give (hiding user), but is reflected by true address Penetrating into diverse virtual address to use to user, so, validated user can be looked for according to virtual address Complete the reading of file body to corresponding true address, and other disabled users do not understand, directly according to Virtual address goes to read file body, only can read mess code, cannot read real file body at all, from And protect file body and will not illegally be read, it is effectively increased the Information Security of terminal.
Optionally, in the present embodiment, the first memory space and the second memory space both can be same and deposit The zones of different of reservoir, it is also possible to for the memorizer that two panels is different, as long as can divide file header and file body Opening and store, this is not limited by embodiments of the invention.
Specifically, the first memory space can be to be arranged to the form of a kind of file header manager, it is possible to right The file header of different file types carries out classification storage and management.When there being new file to store, Corresponding file header can be obtained according to the type (such as document, audio frequency, video file etc.) of this document, File header is stored in the first memory space according to after default AES encryption.Such as, if one File is the file of rm type, and the file header of its correspondence has fixing form, then only need to be according to these lattice Formula removes extraction document head in file, and file header is stored encrypted in the first memory space.
Concrete, the second memory space can be made up of multiple memory element, and each memory element has The physical address of oneself, correspond to the true address in the present embodiment.It is stored in second when there being file body to need During memory space, it is necessary first to obtain the address into the distribution of this document body from storage manager.Need Bright is, although obtain this address, but file body is not to go storage according to this address, because of This this address obtained is also referred to as virtual address.
According to the difference of file body size, each file body needs the quantity the most not phase of the memory element taken With, the quantity of corresponding virtual address also differs, and in step s 12, needs to take file body All virtual addresses all carry out address mapping, are mapped to true address diverse with virtual address, will File body is stored in the memory element that this true address is corresponding.Optionally, virtual address and true address Between address map can carry out according to various ways and algorithm, this is not done by embodiments of the invention Limiting, as long as virtual address can be made different from true address, and the two is at the second memory space one by one Corresponding.
Specifically, in step s 12, make all virtual addresses described file body taken according in advance If the true address that rule is mapped to memory space respectively can comprise the steps: to calculate according to the mapping preset Method or default mapping table, all virtual addresses described file body taken are reflected respectively according to preset rules Penetrate into the true address of memory space.It is to say, the mapping from virtual address to true address, both may be used With constructor or algorithm, obtain the most truly by virtual address being inputted this function or algorithm Location, it is also possible to directly the corresponding relation of virtual address Yu true address is made a mapping table, by looking into Ask this mapping table to find corresponding address.
Illustrating, the virtual address that the file body of one file of addition obtains from storage manager is 0x1234-0x1237 (wherein " 0x " represents hexadecimal), after mapping, actual storage locations is 0x4321、0x5321、0x6321、0x7321.Wherein, only virtual address can be visible to user, User is hidden by true address.For validated user, virtual address can be mapped to truly by system automatically Address, for disabled user, system will not carry out address map operation to it.So, reflected by address Penetrate as barrier, even if some disabled users get the virtual address of file body, according to this virtual address The data read are also mess code, thus are effectively protected file.
Preferably, in order to be further ensured that the safety of end message, it is also possible to virtual address is mapped to The preset rules of true address is arranged to relevant to international mobile equipment identification code IEMI of mobile terminal, So, it is all that unique, different mobile terminal is corresponding due to IEMI for any mobile terminal Preset rules different, disabled user will not understand because of the mapping address algorithm having cracked a station terminal How virtual address and true address to other mobile terminals map.
Accordingly, as in figure 2 it is shown, embodiments of the invention also provide for a kind of file reading, including:
S21, carries out file header safety verification and file body safety verification respectively to user;
S22, in the case of described user is by described file header safety verification, from the first memory space The described file header of middle deciphering;In the case of described user is by described file body safety verification, to described User provides the virtual address that file body is corresponding, and further determines that the program carrying out File read operation is held Whether row unit has corresponding authority;
S23, in the case of determining that described program executable unit has corresponding authority, by described virtually Location is mapped to the true address of memory space, described file body is supplied to described according to described true address User.
The file reading that the embodiment of the present invention provides, real by user being carried out file header safety verification The now deciphering to file header, by carrying out safety verification and determining and carry out File read operation to file body Whether program executable unit has corresponding authority, decides whether described virtual address is mapped to storage sky Between true address, and according to described true address, described file body is supplied to described user.So, Only by the secured user of safety verification, in the program executable unit reading file, there is corresponding reading In the case of authority, just can read corresponding file, otherwise, user cannot be known and deposits in the terminal The file of storage is that the mode being stored separately according to file header, file body carries out storing, both cannot be to file Head is decrypted, and also cannot find the true address of file body, thus effectively protect the file in terminal, Substantially increase the information security of terminal.
Specifically, in the step s 21, user is carried out file header safety verification and file body checking can Think that requirement user inputs safety verification code or requires that user inputs finger print information etc., optionally, file header Safety verification can be identical with the checking form that file body safety verification is taked, it is also possible to different.In step In rapid S22, if user has passed through file header safety verification, then can read according to the file of user and refer to Order, is decrypted the file header being stored in the first memory space, if user is tested safely by file body Card, then may further determine that whether the program executable unit carrying out file (file body) read operation has There is corresponding authority.Wherein, program executable unit can include application and apply the process or line called Journey.So, determine whether this program executable unit has authority and include the most accordingly: determine needs respectively Carry out the process of file body reading or thread whether have permission described file body is read and Need the application carrying out file body reading whether to have permission and call described process or thread, the mirror of twice authentication Power order does not limits.Only in the case of both of which has corresponding authority, just it is mapped to deposit by virtual address The true address in storage space, is supplied to user according to true address by file body.Accordingly even when rogue program Or process obtains storage manager and distributes to the virtual address of respective file, go according to this virtual address Read and also cannot obtain real file, thus be effectively increased the information security of terminal.
After respectively file header and file body being read, the two can be reconfigured, revert to be answered By the file format read, thus allow users to smoothly corresponding read concrete file data.
The file memory method provided the present invention below by specific embodiment and read method are carried out in detail Carefully illustrate.
In a mobile terminal with dual system, in order to improve the information security of security system further Property, file header is carried out for the file in security system and file body is stored separately and reads.
As it is shown on figure 3, in the present embodiment, file stores security system can be comprised the steps:
S301. determine whether that file is stored in security system, if it is, perform step S302;If it does not, Continue executing with step S301;
S302. file header is separated with file body;
S303. it is stored in file header manager after being encrypted by file header;
S304. the virtual address that file storage manager is the distribution of this document body is obtained;
S305. true address resolver is generated according to the unique IMEI of mobile phone;
S306. virtual address is inputted true address resolver, the true address corresponding to obtain file body;
S307. file body is stored according to true address.
Accordingly, as shown in Figure 4, File read operation can comprise the steps:
S401. determine whether that application obtains file data, if it is, perform step S402;If it does not, Continue executing with step S401;
S402. whether user is by file header safety verification, if performing S403, if it does not, perform S409;
S403. it is supplied to user after being deciphered by file header;
S404. whether user is by file body safety verification, if performing S405, if it does not, perform S409;
S405. the virtual address of file body is supplied to described user, and further determine that application, process or Whether thread has corresponding file reservation, if it is, perform S406, if it does not, perform S409;
S406. virtual address is input to address resolver to obtain true address;
S407. according to true address, file data is supplied to user;
S408. file header and file body are recombined the file that can be employed to read;
S409. terminate current operation and point out user.
The file memory method provided by the present embodiment and file reading, by the file header of file and File body is stored separately and reads.For file header, first encrypt and store again, due in file header only Only have recorded the information such as the type of file, size, check code, data volume is the least, therefore, to file Head is encrypted without expending a large amount of calculating, is conducive to improving Consumer's Experience;For file body, actually Being provided with two layer address, wherein the actual stored address of file body does not directly give (hidden to user Hide), but true address is mapped to diverse virtual address and uses to user, so, only Validated user can find the true address of correspondence to complete the reading of file body according to virtual address, and its He disabled user does not understands, and directly goes to read file body according to virtual address, only can read mess code, root Originally cannot read real file body, thus protect file body and will not illegally be read, be effectively improved The Information Security of terminal.
Accordingly, as it is shown in figure 5, embodiments of the invention also provide for a kind of file storage device 5, bag Include:
File header memory element 51, is stored in the first memory space after being encrypted by the file header of file;
Allocation unit 52, distributes virtual address for the file body for described file;
File body memory element 53, all virtual addresses being used for taking described file body are according to default rule It is mapped to the true address of memory space the most respectively, and described file body is stored according to described true address To the second memory space, described virtual address is different from described true address.
Embodiments of the invention also provide for a kind of file storage device 5, by file header and the file body of file It is stored separately.File header is first encrypted and is stored by file header memory element 51, due in file header Only have recorded the information such as the type of file, size, check code, data volume is the least, therefore, to literary composition Part head is encrypted without expending a large amount of calculating, is conducive to improving Consumer's Experience;File body memory element 53 Actually be provided with two layer address, wherein the actual stored address of file body do not directly give (to Family hides), but true address is mapped to diverse virtual address, by allocation unit 52 by void Intending address and distribute to user's use, so, validated user can find the true of correspondence according to virtual address Address completes the reading of file body, and other disabled users do not understand, and directly goes to read according to virtual address Take file body, only can read mess code, real file body cannot be read at all, thus protect file Body will not illegally be read, and is effectively increased the Information Security of terminal.
Optionally, file body memory element 53, can be specifically for according to the mapping algorithm or default preset Mapping table, all virtual addresses described file body taken are mapped to storage sky respectively according to preset rules Between true address, and described file body is stored to the second memory space according to described true address.
Optionally, described preset rules can be with the international mobile equipment identification code IEMI phase of mobile terminal Closing, the preset rules that different mobile terminals is corresponding is different.
Accordingly, as shown in Figure 6, embodiments of the invention also provide for a kind of document reading apparatus 6, bag Include:
Safety verification unit 61, is used for respectively user being carried out file header safety verification and file body is tested safely Card;
File header decryption unit 62, in the case of described user is by described file header safety verification, from First memory space is deciphered described file header;
Authenticating unit 63, for passing through the file body safety verification of safety verification unit 61 described user In the case of, the virtual address of described file body is supplied to described user, and further determines that and carry out literary composition Whether the program executable unit of part read operation has corresponding authority;
File body provides unit 64, for determining that described program executable unit has phase in described authenticating unit In the case of answering authority, described virtual address is mapped to the true address of memory space, according to described very Described file body is supplied to described user by real address.
The document reading apparatus 6 that the embodiment of the present invention provides, is carried out literary composition by safety verification unit 61 to user By file header decryption unit 62, file header is deciphered again after part head safety verification, by safety verification unit 61 File body is carried out safety verification and determines that by authenticating unit 63 program carrying out File read operation performs After whether unit has corresponding authority, then unit 64 is provided to determine whether described virtual by file body Address is mapped to the true address of memory space and described file body is supplied to described according to true address User.So, only by the secured user of safety verification, reading the program executable unit tool of file In the case of having corresponding reading authority, just can read corresponding file, otherwise, user cannot be known The file stored in the terminal is that the mode being stored separately according to file header, file body carries out storing, Both file header cannot be decrypted, and also cannot find the true address of file body, thus effectively protect File in terminal, substantially increases the information security of terminal.
Optionally, authenticating unit 63 can be specifically for: at user's file by safety verification unit 61 In the case of body safety verification, the virtual address of described file body is supplied to described user, and the most true Surely need to carry out the process of file body reading or whether thread has permission and described file body is read out behaviour Make and need the application carrying out file body reading whether to have permission to call described process or thread.
Although being example purpose, have been disclosed for the preferred embodiments of the present invention, those skilled in the art It is also possible for will be recognized by various improvement, increasing and replace, and therefore, the scope of the present invention should not limit In above-described embodiment.

Claims (10)

1. a file memory method, it is characterised in that including:
It is stored in the first memory space after being encrypted by the file header of file;
File body for described file distributes virtual address;
The all virtual addresses described file body taken are mapped to memory space respectively according to preset rules True address, and described file body is stored to the second memory space according to described true address, described Virtual address is different from described true address.
Method the most according to claim 1, it is characterised in that described described file body is taken All virtual addresses be mapped to the true address of memory space according to preset rules respectively and include:
According to default mapping algorithm or default mapping table, described file body is taken all virtually Location is mapped to the true address of memory space respectively according to preset rules.
Method the most according to claim 1 and 2, it is characterised in that described preset rules and shifting International mobile equipment identification code IEMI of dynamic terminal is correlated with, the preset rules that different mobile terminals is corresponding Different.
4. a file reading, it is characterised in that described file is for according to described in claim 1 Method storage file, described read method includes:
Respectively user is carried out file header safety verification and file body safety verification;
In the case of described user is by described file header safety verification, decipher from the first memory space Described file header;In the case of described user is by described file body safety verification, by described file body Virtual address be supplied to described user, and further determine that the program carrying out File read operation performs list Whether position has corresponding authority;
In the case of determining that described program executable unit has corresponding authority, described virtual address is mapped Become the true address of memory space, according to described true address, described file body is supplied to described user.
Method the most according to claim 4, it is characterised in that described determine carry out file reading Whether the program executable unit of operation has corresponding authority includes:
Determine whether the process needing to carry out file body reading or thread have permission described file body respectively Be read and need the application carrying out file body reading whether have permission call described process or Thread.
6. a file storage device, it is characterised in that including:
File header memory element, is stored in the first memory space after being encrypted by the file header of file;
Allocation unit, distributes virtual address for the file body for described file;
File body memory element, all virtual addresses being used for taking described file body are according to preset rules It is mapped to the true address of memory space respectively, and described file body is stored according to described true address Second memory space, described virtual address is different from described true address.
Device the most according to claim 6, it is characterised in that described file body memory element, For according to preset mapping algorithm or default mapping table, described file body is taken all virtually Location is mapped to the true address of memory space respectively according to preset rules, and by described file body according to described True address stores the second memory space.
8. according to the device described in claim 6 or 7, it is characterised in that described preset rules and shifting International mobile equipment identification code IEMI of dynamic terminal is correlated with, the preset rules that different mobile terminals is corresponding Different.
9. a document reading apparatus, it is characterised in that including:
Safety verification unit, is used for respectively user being carried out file header safety verification and file body is tested safely Card;
File header decryption unit, described user by the case of described file header safety verification, from the One memory space is deciphered described file header;
Authenticating unit, is used for described user by the file body safety verification of described safety verification unit In the case of, the virtual address of described file body is supplied to described user, and further determines that and carry out file Whether the program executable unit of read operation has corresponding authority;
File body provides unit, for determining that described program executable unit has accordingly in described authenticating unit In the case of authority, described virtual address is mapped to the true address of memory space, according to described truly Described file body is supplied to described user by address.
Device the most according to claim 9, it is characterised in that described authenticating unit, specifically uses In:
In the case of described user is by the file body safety verification of described safety verification unit, by described The virtual address of file body is supplied to described user, and determines the process needing to carry out file body reading respectively Or whether thread has permission and is read described file body and needs carrying out file body reading Whether application has permission is called described process or thread.
CN201510099131.4A 2015-03-06 2015-03-06 File storage method, file reading method, file storage apparatus and file reading apparatus Pending CN105989304A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510099131.4A CN105989304A (en) 2015-03-06 2015-03-06 File storage method, file reading method, file storage apparatus and file reading apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510099131.4A CN105989304A (en) 2015-03-06 2015-03-06 File storage method, file reading method, file storage apparatus and file reading apparatus

Publications (1)

Publication Number Publication Date
CN105989304A true CN105989304A (en) 2016-10-05

Family

ID=57039799

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510099131.4A Pending CN105989304A (en) 2015-03-06 2015-03-06 File storage method, file reading method, file storage apparatus and file reading apparatus

Country Status (1)

Country Link
CN (1) CN105989304A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110516465A (en) * 2019-07-11 2019-11-29 平安普惠企业管理有限公司 Management method, device, equipment and the computer readable storage medium of resource address
WO2020000391A1 (en) * 2018-06-29 2020-01-02 Intel Corporation Virtual storage services for client computing devices
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN113282521A (en) * 2021-05-19 2021-08-20 武汉天喻信息产业股份有限公司 Method and device for prolonging service life of smart card
CN114968088A (en) * 2022-04-08 2022-08-30 中移互联网有限公司 File storage method, file reading method and device
US11445009B1 (en) 2021-10-13 2022-09-13 International Business Machines Corporation Managing proprietary structured objects

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100037047A1 (en) * 2005-10-18 2010-02-11 Antonio Varriale Method for Controlling Access to File Systems, Related System, Sim Card and Computer Program Product for Use therein
CN102456116A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 File encryption method, file decryption method and devices
CN103164667A (en) * 2011-12-08 2013-06-19 三星电子株式会社 Data storage device and data management method
CN104038490A (en) * 2014-06-09 2014-09-10 可牛网络技术(北京)有限公司 Communication safety verification method and device thereof
CN104244240A (en) * 2013-06-07 2014-12-24 沈阳讯网网络科技有限公司 Method and system controlling user wireless communication authority in specific zone
CN104270380A (en) * 2014-10-15 2015-01-07 叶涛 End-to-end encryption method and system based on mobile network and communication client side

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100037047A1 (en) * 2005-10-18 2010-02-11 Antonio Varriale Method for Controlling Access to File Systems, Related System, Sim Card and Computer Program Product for Use therein
CN102456116A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 File encryption method, file decryption method and devices
CN103164667A (en) * 2011-12-08 2013-06-19 三星电子株式会社 Data storage device and data management method
CN104244240A (en) * 2013-06-07 2014-12-24 沈阳讯网网络科技有限公司 Method and system controlling user wireless communication authority in specific zone
CN104038490A (en) * 2014-06-09 2014-09-10 可牛网络技术(北京)有限公司 Communication safety verification method and device thereof
CN104270380A (en) * 2014-10-15 2015-01-07 叶涛 End-to-end encryption method and system based on mobile network and communication client side

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020000391A1 (en) * 2018-06-29 2020-01-02 Intel Corporation Virtual storage services for client computing devices
US11615194B2 (en) 2018-06-29 2023-03-28 Intel Corporation Virtual storage services for client computing devices
CN110516465A (en) * 2019-07-11 2019-11-29 平安普惠企业管理有限公司 Management method, device, equipment and the computer readable storage medium of resource address
CN110516465B (en) * 2019-07-11 2024-03-01 深圳市兴海物联科技有限公司 Resource address management method, device, equipment and computer readable storage medium
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN113282521A (en) * 2021-05-19 2021-08-20 武汉天喻信息产业股份有限公司 Method and device for prolonging service life of smart card
US11445009B1 (en) 2021-10-13 2022-09-13 International Business Machines Corporation Managing proprietary structured objects
CN114968088A (en) * 2022-04-08 2022-08-30 中移互联网有限公司 File storage method, file reading method and device
CN114968088B (en) * 2022-04-08 2023-09-05 中移互联网有限公司 File storage method, file reading method and device

Similar Documents

Publication Publication Date Title
CN105989304A (en) File storage method, file reading method, file storage apparatus and file reading apparatus
US9374712B2 (en) Multi-issuer secure element partition architecture for NFC enabled devices
US9769654B2 (en) Method of implementing a right over a content
CN107317677B (en) Secret key storage and equipment identity authentication method and device
CN103294961A (en) Method and device for file encrypting/decrypting
CN105812332A (en) Data protection method
CN107196907B (en) A kind of guard method of Android SO files and device
US20130185569A1 (en) Data protection system and method based on cloud storage
CN103246850A (en) Method and device for processing file
CN103259651A (en) Encryption and decryption method and system of terminal data
US20120278611A1 (en) Vpn-based method and system for mobile communication terminal to access data securely
CN106375990B (en) A kind of encrypting and deciphering system and encipher-decipher method of mobile phone private data
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN103268456A (en) Method and device for file safety control
CN104217175A (en) Data read-write method and device
CN102867157A (en) Mobile terminal and data protecting method
CN110650191A (en) Data read-write method of distributed storage system
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN103379483A (en) Method, device and mobile terminal for mobile terminal information security management
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
CN103458101B (en) The hardware encryption storage method of a kind of mobile phone privacy contact person and system
CN102799540B (en) Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption
CN114372242A (en) Ciphertext data processing method, authority management server and decryption server
CN102081575A (en) Dynamic distribution method and device of memory space of virtual disc
CN111177783B (en) Method and device for preventing mobile storage medium from being divulged

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005

RJ01 Rejection of invention patent application after publication