CN106060084A - Transparent file encryption technology - Google Patents

Transparent file encryption technology Download PDF

Info

Publication number
CN106060084A
CN106060084A CN201610566308.1A CN201610566308A CN106060084A CN 106060084 A CN106060084 A CN 106060084A CN 201610566308 A CN201610566308 A CN 201610566308A CN 106060084 A CN106060084 A CN 106060084A
Authority
CN
China
Prior art keywords
module
file
safety
key
place
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610566308.1A
Other languages
Chinese (zh)
Inventor
咸鹤群
李京
田呈亮
李敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao University
Original Assignee
Qingdao University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao University filed Critical Qingdao University
Priority to CN201610566308.1A priority Critical patent/CN106060084A/en
Publication of CN106060084A publication Critical patent/CN106060084A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses a transparent file encryption technology, comprising a safe area setting module, a safe area importing module, an encryption algorithm setting module, an automatic encryption and decryption module, an automatic backup module, an automatic invalidation module, a transmission path setting module, a safe area exporting module, a data processing module, a private key setting module, a file matching module, a private key detection module, a private key matching module, a file replacement module, a file deletion module, a file environment detection module and a transmission path detection module. According to the technology, the security of a secret file before and after loss can be ensured; the efficiency of an encryption and decryption algorithm is relatively high; the encryption and decryption speed is relatively fast; and the program portability is high. The technology can be applied to storage media such as local hard disks and cloud disks of different brands, and the technology has very high flexibility. Both local data and cloud data can be protected effectively. In the process of automatically synchronizing the secret file from the local to the cloud, the transmission data is ciphertext; and attacks such as sniffing and packet capture can be effectively defended.

Description

A kind of transparent file encryption technology
Technical field
The present invention relates to file ciphering technology field, particularly relate to a kind of transparent file encryption technology.
Background technology
Transparent encryption technology is a kind of file ciphering technology arisen at the historic moment for enterprise document privacy requirements in recent years;Institute Call transparent, refer to it is unknown for user;When user is when opening or edit specified file, system will be automatically to not The file of encryption is encrypted, and automatically deciphers the file encrypted;File is ciphertext on hard disk, is in plain text in internal memory; Once leave use environment, the service that cannot automatically be deciphered due to application program and cannot open, thus the protection literary composition that gets up The effect of part content.
In the last few years, along with popularizing of network and improving constantly of network technology, big data age is following, " cloud " Concept is also arisen at the historic moment;Owing to cloud has plurality of advantages of waiting so long convenient, long, increasing user tends to individual's Private data is sent to high in the clouds and preserves;But, owing to individual's private data is stored in clear beyond the clouds, this just gives illegal point Sub-opportunity;Once cloud server is broken, or individual subscriber password is stolen, and personal data will be completely exposed;Add The insecurity of conventional hard medium stored in clear, the popularization of transparent encryption technology is extremely urgent.
Summary of the invention
The technical problem existed based on background technology, the present invention proposes a kind of transparent file encryption technology.
A kind of transparent file encryption technology that the present invention proposes, imports module including place of safety setting module, place of safety, adds Close algorithm setting module, automatic encryption/decryption module, automated back-up module, the module that ceases to be in force automatically, delivering path setting module, safety District derive module, data processing module, key setting module, file matching module, key detection module, key matching module, File replacement module, file removing module, document environment detection module and delivering path detection module, the described whole district sets mould Block, place of safety import module, AES setting module, automatic encryption/decryption module, automated back-up module, the module that ceases to be in force automatically, Module, key setting module, file matching module, key detection module, key are derived in delivering path setting module, place of safety Join module, file replacement module, file removing module, document environment detection module and delivering path detection module all with data at Reason module connects, and described whole district setting module and place of safety import module and connect, AES setting module and automatic encryption and decryption Module connects, and key setting module and key matching module connect.
Preferably, described place of safety setting module is for setting the position of place of safety, and place of safety imports module for inciting somebody to action File imports place of safety.
Preferably, described AES setting module is for setting the cipher mode of AES, and encryption and decryption mould automatically Block is for automatically encrypting and decrypting file.
Preferably, described automated back-up module is for automatically backing up file, and the module that ceases to be in force automatically is for automatically Change relief file at document environment to lose efficacy.
Preferably, described delivering path setting module is used for setting executable delivering path, and module is derived in place of safety For the file in place of safety is derived.
Preferably, described key setting module is for being set the key entering place of safety, and is used for key Authority is set, described file matching module file within mating the file and place of safety that user opens.
Preferably, described key detection module is for detecting the existence of key, and key matching module is for user's The key of key and setting is mated.
Preferably, the file after editor, for after user's editing files, is replaced original by described file replacement module File, and file removing module is for deleting the file outside place of safety after file replacement.
Preferably, described document environment detection module is for detecting the environment of file in place of safety, and transmission way Footpath detection module is for detecting the file delivering path of user operation.
In the present invention, this transparent file encryption technology can force, automatically, transparent encryption electronic document, prevent the first work Person divulges a secret;Document is set and reads authority, prevent reading of going beyond one's commission, it is possible to automated back-up encrypted document, prevent malice from deleting;Omnidistance note Record file operation behavior, it is possible to effectively control delivering path: equipment limits;Forbid screenshotss, pull;Forbid that content replicates;Triple Key management, safe and reliable;Do not affect original operating habit, it is not necessary to place restrictions on port;Externally forbid to reveal: once file leaves Using environment, file will cease to be in force automatically, thus protect intellectual property, before and after the present invention can protect secret file to lose Safety, enciphering and deciphering algorithm efficiency is higher, and encryption/decryption speed is fast, and program portability is good, can be applicable to this locality of different brands The storage medium such as hard disk and cloud disk, has the highest motility, and either local data or high in the clouds data, can obtain Effectively protection, resists the attack of hacker, and during secret file is automatically from local synchronization to high in the clouds, transmission data are ciphertexts, Can effectively resist sniff, packet capturing etc. to attack.
Accompanying drawing explanation
Fig. 1 is the system structure schematic diagram of a kind of transparent file encryption technology that the present invention proposes.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention is explained orally further.
Embodiment
With reference to Fig. 1, the present embodiment proposes a kind of transparent file encryption technology, including place of safety setting module, place of safety Importing module, AES setting module, automatic encryption/decryption module, automated back-up module, the module that ceases to be in force automatically, delivering path set Cover half block, place of safety derive module, data processing module, key setting module, file matching module, key detection module, secret Key matching module, file replacement module, file removing module, document environment detection module and delivering path detection module, described Whole district's setting module, place of safety import module, AES setting module, automatic encryption/decryption module, automated back-up module, automatically Module, key setting module, file matching module, key detection mould are derived in failed module, delivering path setting module, place of safety Block, key matching module, file replacement module, file removing module, document environment detection module and delivering path detection module All being connected with data processing module, described whole district setting module and place of safety import module and connect, AES setting module and Automatically encryption/decryption module connects, and key setting module and key matching module connect, this transparent file encryption technology can force, Automatically, transparent encryption electronic document, prevent the first authors from divulging a secret;Document is set and reads authority, prevent reading of going beyond one's commission, it is possible to automatically Backup encrypted document, prevents malice from deleting;Omnidistance log file operation behavior, it is possible to effectively control delivering path: equipment limits; Forbid screenshotss, pull;Forbid that content replicates;Triple key managements, safe and reliable;Do not affect original operating habit, it is not necessary to limit Not-go-end mouth;Externally forbid to reveal: once file leaves use environment, and file will cease to be in force automatically, thus protect intellectual property, this Bright protect secret file to lose before and after safety, enciphering and deciphering algorithm efficiency is higher, and encryption/decryption speed is fast, and program can Transplantability is good, the storage medium such as local hard drive and cloud disk of can be applicable to different brands, has the highest motility, either Local data or high in the clouds data, can be effectively protected, and resists the attack of hacker, and secret file is automatically from local synchronization During high in the clouds, transmission data are ciphertexts, can effectively resist sniff, packet capturing etc. and attack.
In the present embodiment, described place of safety setting module is for setting the position of place of safety, and place of safety imports module and uses In file imports place of safety, described AES setting module is for setting the cipher mode of AES, and automatically adds solution Close module is for automatically encrypting and decrypting file, and described automated back-up module is used for automatically backing up file, and The module that ceases to be in force automatically lost efficacy for automatically changing relief file at document environment, and described delivering path setting module can for setting The delivering path performed, and derivation module in place of safety is for deriving the file in place of safety, described key setting module is used for The key entering place of safety is set, and for the authority of key is set, described file matching module for File in file that adapted family is opened and place of safety, described key detection module is for detecting the existence of key, and key Joining module for mating the key of user and the key of setting, described file replacement module is at user's editing files After, the file after editor is replaced original file, and file removing module is used for the literary composition outside place of safety after file is replaced Part is deleted, and described document environment detection module is for detecting the environment of file in place of safety, and delivering path detection mould Block is for detecting the file delivering path of user operation, and this transparent file encryption technology can force, automatic, transparent add Cipher telegram subdocument, prevents the first authors from divulging a secret;Document is set and reads authority, prevent reading of going beyond one's commission, it is possible to automated back-up adds ciphertext Shelves, prevent malice from deleting;Omnidistance log file operation behavior, it is possible to effectively control delivering path: equipment limits;Forbid screenshotss, Pull;Forbid that content replicates;Triple key managements, safe and reliable;Do not affect original operating habit, it is not necessary to place restrictions on port;Right Forbid outward to reveal: once file leaves use environment, and file will cease to be in force automatically, thus protects intellectual property, and the present invention can protect Safety before and after secret file loss, enciphering and deciphering algorithm efficiency is higher, and encryption/decryption speed is fast, program portability Good, can be applicable to the storage medium such as local hard drive and cloud disk of different brands, there is the highest motility, either local number According to still high in the clouds data, can be effectively protected, resist the attack of hacker, secret file is automatically from local synchronization to high in the clouds During, transmission data are ciphertexts, can effectively resist sniff, packet capturing etc. and attack.
In the present embodiment, the aspect that this transparent file encryption technology controls is relatively low, a lot of bottoms easy to control, and Compatibility between various application programs, without special handling, is not easily susceptible to the restriction of application version, even if application have modified reading Write method, encryption software is without amendment;Higher safety and efficiency can be obtained, but technical difficulty is relatively low;Need not be with The application program of client layer is come into contacts with, and need not notify which program of system is legal program, and which program is illegal program; Be easily handled drive with other conflict, the problem such as application program white list;Because all of encryption process is not related to complexity Underlying programs, windows system program is consistent with the registration table path of the different editions of application program;So, hold in system During row, it is not necessary to limited by program version, this enhances the motility of system application;Enciphering and deciphering algorithm is unrestricted System;User can select the enciphering and deciphering algorithm of product voluntarily, changes program code without large area, and motility is stronger;Key is deposited Storage is in the key floppy disc of user, and only other authorized users of user oneself and this user just have key floppy disc, can resist The risk that medium is lost.
In the present embodiment, this technology, by the way of amendment system registry, associates specified type modes to open a file;Close When method user opens encryption file, this document is deciphered and is saved as temporary file, and then calls original by automatic encryption/decryption module The associated program of file opens file;After user completes Document Editing, automatic encryption/decryption module is by the temporary file after editor Encryption, by file replacement module alternate file, file removing module deletes temporary file;If user does not revise file content, File removing module directly deletes temporary file.
In the present embodiment, the transparency of transparent encryption is embodied in: the enforcement of the file encryption normal file to validated user Browsing or edit operation does not results in impact, user can be continuing with original mode of operation, retains original operating habit.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention is not limited thereto, Any those familiar with the art in the technical scope that the invention discloses, according to technical scheme and Inventive concept equivalent or change in addition, all should contain within protection scope of the present invention.

Claims (9)

1. a transparent file encryption technology, including place of safety setting module, place of safety imports module, AES sets mould Block, automatic encryption/decryption module, automated back-up module, the module that ceases to be in force automatically, delivering path setting module, place of safety derive module, Mould replaced by data processing module, key setting module, file matching module, key detection module, key matching module, file Block, file removing module, document environment detection module and delivering path detection module, it is characterised in that the described whole district sets mould Block, place of safety import module, AES setting module, automatic encryption/decryption module, automated back-up module, the module that ceases to be in force automatically, Module, key setting module, file matching module, key detection module, key are derived in delivering path setting module, place of safety Join module, file replacement module, file removing module, document environment detection module and delivering path detection module all with data at Reason module connects, and described whole district setting module and place of safety import module and connect, AES setting module and automatic encryption and decryption Module connects, and key setting module and key matching module connect.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described place of safety setting module is used In the position of setting place of safety, and place of safety imports module for file is imported place of safety.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described AES setting module For setting the cipher mode of AES, and encryption/decryption module is used for automatically encrypting and decrypting file automatically.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described automated back-up module is used for Automatically file is backed up, and the module that ceases to be in force automatically lost efficacy for automatically changing relief file at document environment.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described delivering path setting module For setting executable delivering path, and module is derived for being derived by the file in place of safety in place of safety.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described key setting module is used for The key entering place of safety is set, and for the authority of key is set, described file matching module for File in file that adapted family is opened and place of safety.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described key detection module is used for The existence of detection key, and key matching module is for mating the key of user and the key of setting.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described file replacement module is used for After user's editing files, the file after editor is replaced original file, and file removing module is after replacing at file File outside place of safety is deleted.
A kind of transparent file encryption technology the most according to claim 1, it is characterised in that described document environment detection module For detecting the environment of file in place of safety, and delivering path detection module is for transmitting way to the file of user operation Footpath is detected.
CN201610566308.1A 2016-07-18 2016-07-18 Transparent file encryption technology Pending CN106060084A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610566308.1A CN106060084A (en) 2016-07-18 2016-07-18 Transparent file encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610566308.1A CN106060084A (en) 2016-07-18 2016-07-18 Transparent file encryption technology

Publications (1)

Publication Number Publication Date
CN106060084A true CN106060084A (en) 2016-10-26

Family

ID=57187907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610566308.1A Pending CN106060084A (en) 2016-07-18 2016-07-18 Transparent file encryption technology

Country Status (1)

Country Link
CN (1) CN106060084A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1716219A (en) * 2004-07-01 2006-01-04 三星电子株式会社 The equipment and/or the method that are used for the encryption and/or the deciphering of multi-medium data
CN101751536A (en) * 2009-12-16 2010-06-23 深圳市虹安信息技术有限公司 Transparent file encryption method for increasing file header
CN102075544A (en) * 2011-02-18 2011-05-25 博视联(苏州)信息科技有限公司 Encryption system, encryption method and decryption method for local area network shared file
CN103546472A (en) * 2013-10-28 2014-01-29 中国软件与技术服务股份有限公司 Method and device for anti-fake protection of service system
CN105681031A (en) * 2016-01-08 2016-06-15 成都卫士通信息产业股份有限公司 Storage encryption gateway key management system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1716219A (en) * 2004-07-01 2006-01-04 三星电子株式会社 The equipment and/or the method that are used for the encryption and/or the deciphering of multi-medium data
CN101751536A (en) * 2009-12-16 2010-06-23 深圳市虹安信息技术有限公司 Transparent file encryption method for increasing file header
CN102075544A (en) * 2011-02-18 2011-05-25 博视联(苏州)信息科技有限公司 Encryption system, encryption method and decryption method for local area network shared file
CN103546472A (en) * 2013-10-28 2014-01-29 中国软件与技术服务股份有限公司 Method and device for anti-fake protection of service system
CN105681031A (en) * 2016-01-08 2016-06-15 成都卫士通信息产业股份有限公司 Storage encryption gateway key management system and method

Similar Documents

Publication Publication Date Title
CN101853363B (en) File protection method and system
US20140019753A1 (en) Cloud key management
US20080016127A1 (en) Utilizing software for backing up and recovering data
US9769213B1 (en) Method and system for secure digital object management
KR20040032786A (en) Method of protecting recorded multimedia content against unauthorized duplication
CN101923678A (en) Data security protection method of enterprise management software
RU2463721C2 (en) Method of sending electronic file
KR101033511B1 (en) Method for protecting private information and computer readable recording medium therefor
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
CN103995990A (en) Method for preventing electronic documents from divulging secrets
CN103647784A (en) Public and private isolation method and device
CN105827574A (en) File access system, file access method and file access device
CN105740725A (en) File protection method and system
CN103268452A (en) Method and device for file processing
CN104778954B (en) A kind of CD subregion encryption method and system
CN107563221A (en) A kind of certification decoding security management system for encrypting database
KR20220039779A (en) Enhanced security encryption and decryption system
CN104636675A (en) System and method for providing safety protection for database
CN202872828U (en) A circulation control system of files
CN104376270A (en) File protection method and system
CN110837634A (en) Electronic signature method based on hardware encryption machine
CN108399341B (en) Windows dual file management and control system based on mobile terminal
JP4471129B2 (en) Document management system, document management method, document management server, work terminal, and program
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
CN106203130A (en) A kind of transparent encipher-decipher method driving layer based on Intelligent Dynamic

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161026