CN109190385A - A kind of file encrypting method of law-enforcing recorder - Google Patents
A kind of file encrypting method of law-enforcing recorder Download PDFInfo
- Publication number
- CN109190385A CN109190385A CN201810838763.1A CN201810838763A CN109190385A CN 109190385 A CN109190385 A CN 109190385A CN 201810838763 A CN201810838763 A CN 201810838763A CN 109190385 A CN109190385 A CN 109190385A
- Authority
- CN
- China
- Prior art keywords
- subregion
- data
- law
- file
- enforcing recorder
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to law-enforcing recorder technical fields, a kind of file encrypting method of law-enforcing recorder is specifically disclosed, comprising steps of starting carry subregion, and judges whether the subregion is in encryption mode, if so then execute carry process and terminate to the carry of the subregion, if otherwise performing the next step;It prompts the user whether to need to be formatted the subregion, terminates the carry to the subregion if user's negative, if user performs the next step certainly;It exits the carry to the subregion and formats the subregion, during formatting the subregion, it is encryption mode that the subregion, which is arranged, and the first step is returned to after the completion of formatting.This method only encrypts the attribute information of file and catalogue in enforcement data; clear data is not encrypted, the encryption to data had both been realized, the read-write efficiency of data will not be influenced; enforcement data is protected not to be leaked, the public safety and the social people for being conducive to maintenance country are pacified.
Description
Technical field
The present invention relates to law-enforcing recorder technical field more particularly to a kind of file encrypting methods of law-enforcing recorder.
Background technique
Many law-enforcing recorders are all to store the file recorded and generated using SD card or TF card (to come in the application at present
Source enforcement data can also store the file not generated by law-enforcing recorder, such as use bluetooth in addition to the enforcement data of source
Etc. the enforcement data that comes from another terminal transmission of interconnection techniques).Due to SD card or TF card generally use FAT or NTFS this two
General file system is planted, as long as storage card can be taken out from law-enforcing recorder, is then snapped fit by the equipment such as card reader handle
On computer or other card-reading apparatus, the enforcement data inside storage card just can be read easily, because law-enforcing recorder is public security machine
It closes dedicated, more classified papers can be related to, then being then easy to without the information in the SD card or TF card of encryption can quilt
Leakage does not utilize the public safety and society's people's peace of maintenance country.
Summary of the invention
The technical issues of present invention provides a kind of file encrypting method of law-enforcing recorder, solution is existing law enforcement record
The storage card of instrument does not use encryption technology, and such as enforcement data organ document stored thereon is easy to be leaked, and influences country
Public safety and social people's peace.
In order to solve the above technical problems, the present invention provides a kind of file encrypting method of law-enforcing recorder, including following step
It is rapid:
S1. start carry subregion, and judge whether the subregion is in encryption mode, if so then execute carry process and tie
Beam is to the carry of the subregion, if otherwise performing the next step;
S2. it prompts the user whether to need to be formatted the subregion, terminate if user's negative to the subregion
Carry performs the next step if user's affirmative;
S3. it exits the carry to the subregion and formats the subregion, during formatting the subregion, setting
The subregion is encryption mode, and the step S1 is returned to after the completion of formatting.
Further, in the step S3, the setting subregion is encryption mode specifically:
S3-1. the write operation to source enforcement data is triggered;
S3-2. by the file of unencryption in the source enforcement data and the attribute information of catalogue execute after cryptographic operation with
The subregion is written in corresponding clear data jointly.
Further, it is further comprised the steps of: after the step S3
S4. the read operation to enforcement data existing in the subregion is triggered;
S5. judge whether the existing enforcement data includes the file of encryption and the attribute information of catalogue, if then
The attribute information of the file and catalogue to encryption, which executes, takes out the corresponding clear data after decryption oprerations for reading,
If otherwise the clear data in the existing enforcement data is taken out for reading.
Specifically, in the step S4, the existing enforcement data include the encrypted source enforcement data with
And the other party clear data being stored into for the first time.
More specifically, the other party clear data is the accessed by wire communication mode or wireless communication mode
Tripartite's data;The wire communication mode includes USB data transmission;The wireless communication mode includes that mobile network data passes
Defeated and WIFI, Bluetooth data transfer.
Specifically, the storage card that the subregion belongs to the law-enforcing recorder is deposited by what the existing enforcement data distributed
Storage area domain;The memory card is SD card or TF card.
Further, the step S3-1 is specifically, trigger the attribute to file described in the enforcement data of source and catalogue
The write operation of information.
Further, the step S4 specifically, triggering to file described in existing enforcement data in the subregion and
The read operation of the attribute information of catalogue.
A kind of file encrypting method of law-enforcing recorder provided by the invention, to the FAT file system of law-enforcing recorder into
Row transformation, first to the category of file and catalogue in the source enforcement data for not reaching storage card (SD card or TF card) subregion of typing
Property information is encrypted, and then encrypted information is saved in memory card jointly with clear data together, is held in reading
During method data, the file or directory attribute information of encryption are first read from memory card, is then carried out using corresponding key
Decryption, restores true file or directory attribute information, takes out corresponding clear data for reading.This method is only to law enforcement
The attribute information of file and catalogue in data is encrypted, and is not encrypted to the actual content of file (clear data),
Both the encryption to data had been realized, the read-write efficiency of data will not be influenced, enforcement data is protected not to be leaked, has been conducive to safeguard
The public safety of country and social people's peace.
Detailed description of the invention
Fig. 1 is a kind of working principle diagram of the file encrypting method of law-enforcing recorder provided in an embodiment of the present invention;
Fig. 2 is a kind of step flow chart of the file encrypting method of law-enforcing recorder provided in an embodiment of the present invention;
Fig. 3 is a kind of carry flow chart of the file encrypting method of law-enforcing recorder provided in an embodiment of the present invention;
Fig. 4 is a kind of encryption flow figure of the file encrypting method of law-enforcing recorder provided in an embodiment of the present invention;
Fig. 5 is a kind of decryption flow chart of the file encrypting method of law-enforcing recorder provided in an embodiment of the present invention.
Specific embodiment
Embodiments of the present invention are specifically illustrated with reference to the accompanying drawing, embodiment is only given for illustrative purposes,
It can not be interpreted as limitation of the invention, including attached drawing is only for reference and illustrates use, not constitute and the invention patent is protected
The limitation of range, because on the basis of not departing from spirit and scope of the invention many changes can be carried out to the present invention.
A kind of file encrypting method of law-enforcing recorder provided in an embodiment of the present invention, working principle is as shown in Figure 1, elder generation
To the attribute information of file and catalogue in the source enforcement data for not reaching storage card (SD card or TF card) subregion of typing into
Row encryption, is then jointly saved in encrypted information (ciphertext) in memory card with clear data together, enforces the law reading
During data, the file or directory attribute information (ciphertext) of encryption are first read from memory card, then uses corresponding key
It is decrypted, restores true file or directory attribute information, take out corresponding clear data for reading.
In the present embodiment, the file encrypting method of a kind of law-enforcing recorder, after law-enforcing recorder booting first
The subregion of carry SD card or TF card during carry, can first detect whether the subregion is in encryption mode, if it is not, then
Carry process is exited, then prompt needs to be formatted the subregion, when user's selection is formatted subregion, format
The subregion can be arranged to encryption mode during change, after the completion of formatting, enter back into subregion carry process, detect the subregion
After being in encryption mode, continue to execute carry process down.A kind of text of law-enforcing recorder provided in an embodiment of the present invention
Part encryption method, steps flow chart as shown in Fig. 2, specifically includes the following steps:
S1. start carry subregion, and judge whether the subregion is in encryption mode, if so then execute carry process and tie
Beam is to the carry of the subregion, if otherwise performing the next step;
S2. it prompts the user whether to need to be formatted the subregion, terminate if user's negative to the subregion
Carry performs the next step if user's affirmative;
S3. it exits the carry to the subregion and formats the subregion, during formatting the subregion, setting
The subregion is encryption mode, and the step S1 is returned to after the completion of formatting.
Above step relates generally to carry process, and carry process can refer to Fig. 3.
Further, in the step S3, with reference to Fig. 4, the setting subregion is encryption mode specifically:
S3-1. trigger the write operation to source enforcement data, namely triggering to file described in the enforcement data of source and
The write operation of the attribute information of catalogue;
S3-2. by the file of unencryption in the source enforcement data and the attribute information of catalogue execute after cryptographic operation with
The subregion is written (in most cases, in the source enforcement data in corresponding clear data (ciphertext+plaintext) jointly
It is encrypted, if but the source enforcement data that is hereinafter turned over by other party clear data, because of identification error, in fact
Through encrypted situation but it is unrecognized go out in the case where, be identified to the category of the file and catalogue in the presence of encryption in this step
Property information, then the partial data is written directly to subregion and stored as encrypted source enforcement data).
Further, further include step (reading enforcement data) after the step S3 with reference to Fig. 5:
S4. the read operation to enforcement data existing in the subregion is triggered, namely triggering is held to existing in the subregion
The read operation of file described in method data and the attribute information of catalogue;
S5. judge whether the existing enforcement data includes the file of encryption and the attribute information of catalogue, if then
The attribute information of the file and catalogue to encryption, which executes, takes out the corresponding clear data after decryption oprerations for reading,
If otherwise the clear data in the existing enforcement data is taken out for reading.
In the present embodiment, in the step S4, the existing enforcement data includes the encrypted source law enforcement
Data and the other party clear data being stored into for the first time.The other party clear data is to pass through wire communication mode or nothing
Third party's data of line communication modes access;The wire communication mode includes but is not limited to USB data transmission;The channel radio
News mode includes but is not limited to mobile network data transmission and WIFI, Bluetooth data transfer.
When other party clear data is input into memory card for the first time, and needs to be read, if detecting in step s 5 not
To the file of encryption and the attribute information of catalogue, then the partial data is directly read, because as this other party clear data, and
It is not to be generated on the law-enforcing recorder with this encryption function, is more that storage card is taken out, by does not add
The equipment of close function (or using other cipher modes), copies data to storage card, finally storage card is put back to again law enforcement
Recorder, the partial data do not need especially to maintain secrecy.The application is more directed to, if storage card is weighed during taking-up
Format mistake detects that the subregion is not at encryption mode after reinserting, just need to carry out again to format card, by this
Subregion is re-set as encryption mode, to guarantee that the law-enforcing recorder still is able to acquisition in the subsequent use process
Enforcement data is saved after being encrypted automatically, and the source enforcement data on this law-enforcing recorder can directly be decrypted reading
Out, once but the partial data be removed, be detached from the FAT file system of this law-enforcing recorder storage card, then it is encrypted described
Source enforcement data then can not be read out, so that enforcement data be protected not to be leaked.
Specifically, the storage card that the subregion belongs to the law-enforcing recorder is deposited by what the existing enforcement data distributed
Storage area domain, the subregion can according to according to division of teaching contents be source enforcement data subregion (because being written into, being already encrypted) and
When other party clear data subregion.
In the present embodiment, the memory card preferably uses the SD card or TF card of FAT file system.
The file encrypting method of a kind of law-enforcing recorder provided in an embodiment of the present invention, to the FAT file of law-enforcing recorder
System is transformed, first to the file and mesh in the source enforcement data for not reaching storage card (SD card or TF card) subregion of typing
The attribute information of record is encrypted, and then encrypted information and clear data together are saved in memory card jointly,
During reading enforcement data, the file or directory attribute information of encryption are first read from memory card, then using corresponding close
Key is decrypted, and restores true file or directory attribute information, takes out corresponding clear data for reading.This method is only
The attribute information of file and catalogue in enforcement data is encrypted, the actual content of file (clear data) is not carried out
Encryption, had both realized the encryption to data, and will not influence the read-write efficiency of data, enforcement data is protected not to be leaked, favorably
Public safety and social people's peace in maintenance country.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment
Limitation, other any changes, modifications, substitutions, combinations, simplifications made without departing from the spirit and principles of the present invention,
It should be equivalent substitute mode, be included within the scope of the present invention.
Claims (8)
1. a kind of file encrypting method of law-enforcing recorder, which comprises the following steps:
S1. start carry subregion, and judge whether the subregion is in encryption mode, if so then execute carry process and end pair
The carry of the subregion, if otherwise performing the next step;
S2. it prompts the user whether to need to be formatted the subregion, terminates the carry to the subregion if user's negative,
It is performed the next step if user's affirmative;
S3. it exits the carry to the subregion and formats the subregion, during formatting the subregion, described in setting
Subregion is encryption mode, and the step S1 is returned to after the completion of formatting.
2. a kind of file encrypting method of law-enforcing recorder as described in claim 1, which is characterized in that in the step S3
In, the setting subregion is encryption mode specifically:
S3-1. the write operation to source enforcement data is triggered;
S3-2. by the file of unencryption in the source enforcement data and the attribute information of catalogue execute after cryptographic operation with it is corresponding
Clear data the subregion is written jointly.
3. a kind of file encrypting method of law-enforcing recorder as claimed in claim 2, which is characterized in that after the step S3
It further comprises the steps of:
S4. the read operation to enforcement data existing in the subregion is triggered;
S5. judge whether the existing enforcement data includes the file of encryption and the attribute information of catalogue, if then to adding
The attribute information of the close file and catalogue takes out the corresponding clear data for reading, if not after executing decryption oprerations
Then the clear data in the existing enforcement data is taken out for reading.
4. a kind of file encrypting method of law-enforcing recorder as claimed in claim 3, it is characterised in that: in the step S4
In, the existing enforcement data includes the encrypted source enforcement data and the other party unencryption number that is stored into for the first time
According to.
5. a kind of file encrypting method of law-enforcing recorder as claimed in claim 4, it is characterised in that: the other party unencryption
Data are the third party's data accessed by wire communication mode or wireless communication mode;The wire communication mode includes
USB data transmission;The wireless communication mode includes mobile network data transmission and WIFI, Bluetooth data transfer.
6. a kind of file encrypting method of law-enforcing recorder as claimed in claim 3, which is characterized in that the subregion belongs to institute
State the storage region that the storage card of law-enforcing recorder is distributed by the existing enforcement data;The memory card is SD card or TF
Card.
7. a kind of file encrypting method of law-enforcing recorder as claimed in claim 2, it is characterised in that: the step S3-1 tool
Body is to trigger the write operation to the attribute information of file described in the enforcement data of source and catalogue.
8. a kind of file encrypting method of law-enforcing recorder as claimed in claim 3, it is characterised in that: the step S4 is specific
To trigger the read operation to file and the attribute information of catalogue described in existing enforcement data in the subregion.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810838763.1A CN109190385A (en) | 2018-07-27 | 2018-07-27 | A kind of file encrypting method of law-enforcing recorder |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810838763.1A CN109190385A (en) | 2018-07-27 | 2018-07-27 | A kind of file encrypting method of law-enforcing recorder |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109190385A true CN109190385A (en) | 2019-01-11 |
Family
ID=64937124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810838763.1A Pending CN109190385A (en) | 2018-07-27 | 2018-07-27 | A kind of file encrypting method of law-enforcing recorder |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109190385A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941843A (en) * | 2019-11-22 | 2020-03-31 | 北京明略软件系统有限公司 | Encryption implementation method, device, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831081A (en) * | 2012-09-03 | 2012-12-19 | 郑州信大捷安信息技术股份有限公司 | Transparent encryption and decryption secure digital memory card (SD card) and implementation method thereof |
CN103065102A (en) * | 2012-12-26 | 2013-04-24 | 中国人民解放军国防科学技术大学 | Data encryption mobile storage management method based on virtual disk |
CN103473512A (en) * | 2013-08-26 | 2013-12-25 | 北京明朝万达科技有限公司 | Mobile storage medium management method and mobile storage medium management device |
CN103488956A (en) * | 2012-06-07 | 2014-01-01 | 亚旭电脑股份有限公司 | Data protection method of portable electronic device and computer program product thereof |
CN103761067A (en) * | 2013-12-13 | 2014-04-30 | 昆山五昌新精密电子工业有限公司 | Processing system and processing method for encryption/decryption of data files |
CN104657670A (en) * | 2013-11-19 | 2015-05-27 | 北京天地超云科技有限公司 | Data encryption based safety use method of configuration file |
JP2017188830A (en) * | 2016-04-07 | 2017-10-12 | キヤノン株式会社 | Device operating by having external unit mounted and external unit therefor |
-
2018
- 2018-07-27 CN CN201810838763.1A patent/CN109190385A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488956A (en) * | 2012-06-07 | 2014-01-01 | 亚旭电脑股份有限公司 | Data protection method of portable electronic device and computer program product thereof |
CN102831081A (en) * | 2012-09-03 | 2012-12-19 | 郑州信大捷安信息技术股份有限公司 | Transparent encryption and decryption secure digital memory card (SD card) and implementation method thereof |
CN103065102A (en) * | 2012-12-26 | 2013-04-24 | 中国人民解放军国防科学技术大学 | Data encryption mobile storage management method based on virtual disk |
CN103473512A (en) * | 2013-08-26 | 2013-12-25 | 北京明朝万达科技有限公司 | Mobile storage medium management method and mobile storage medium management device |
CN104657670A (en) * | 2013-11-19 | 2015-05-27 | 北京天地超云科技有限公司 | Data encryption based safety use method of configuration file |
CN103761067A (en) * | 2013-12-13 | 2014-04-30 | 昆山五昌新精密电子工业有限公司 | Processing system and processing method for encryption/decryption of data files |
JP2017188830A (en) * | 2016-04-07 | 2017-10-12 | キヤノン株式会社 | Device operating by having external unit mounted and external unit therefor |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941843A (en) * | 2019-11-22 | 2020-03-31 | 北京明略软件系统有限公司 | Encryption implementation method, device, equipment and storage medium |
CN110941843B (en) * | 2019-11-22 | 2022-03-29 | 北京明略软件系统有限公司 | Encryption implementation method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104134046B (en) | encryption method and device | |
CN101800811B (en) | Mobile phone data security protection method | |
CN201160005Y (en) | U disk for encryption | |
CA2432141A1 (en) | Computer oriented record administration system | |
CN102334124A (en) | File protection method and device | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
CN104318286B (en) | Management method, management system and the terminal of NFC label data | |
CN102647712B (en) | A kind of mobile phone data encryption method and decryption method | |
CN103345601A (en) | Identity recording and verification system based on radio frequency | |
CN107516045A (en) | Document protection method and device | |
JP2002281019A (en) | Portable information storage medium and method for authenticating the same | |
CN102831346A (en) | Method and system for file protection | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
CN103870759A (en) | NFC encryption method, NFC encryption system and terminal | |
CN101239543A (en) | Seal and signing and sealing system | |
CN106713334A (en) | Encryption method, decryption method, access method and corresponding apparatuses of virtual storage volume | |
CN103368736B (en) | Business information encryption, decryption method and device | |
CN114756887A (en) | Method and device for encrypting and storing sensitive information block in file | |
CN102385673B (en) | Human body lock | |
CN102902933B (en) | Based on the file saving method of file fragmentation process | |
CN110929302A (en) | Data security encryption storage method and storage device | |
CN109190385A (en) | A kind of file encrypting method of law-enforcing recorder | |
CN109766681A (en) | User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing | |
CN103646121B (en) | A kind of identification code and using method and device | |
CN102034040A (en) | Log implementation method in encryption card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190111 |
|
RJ01 | Rejection of invention patent application after publication |