CN112651038A - VR resource security protection method and terminal for reducing space and time - Google Patents

VR resource security protection method and terminal for reducing space and time Download PDF

Info

Publication number
CN112651038A
CN112651038A CN202110040427.4A CN202110040427A CN112651038A CN 112651038 A CN112651038 A CN 112651038A CN 202110040427 A CN202110040427 A CN 202110040427A CN 112651038 A CN112651038 A CN 112651038A
Authority
CN
China
Prior art keywords
key
resource
encrypted
time
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110040427.4A
Other languages
Chinese (zh)
Other versions
CN112651038B (en
Inventor
刘德建
丁迪锋
周小白
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN202110040427.4A priority Critical patent/CN112651038B/en
Publication of CN112651038A publication Critical patent/CN112651038A/en
Application granted granted Critical
Publication of CN112651038B publication Critical patent/CN112651038B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the field of data processing, in particular to a safety protection method and a terminal for VR resources, which can reduce space and time. The method includes the steps that VR resources stored on a disk are encrypted in a memory mapping file mode to obtain an encrypted file; and synchronizing the encrypted file to the client. Space and time occupied in the VR resource encryption process are reduced.

Description

VR resource security protection method and terminal for reducing space and time
The application is a divisional application of a parent application named as 'a safety protection method and terminal for VR resources' with the application number of 201810014602.0, the application date of 2018, 1, 8 and 8.
Technical Field
The invention relates to the field of data processing, in particular to a safety protection method and a terminal for VR resources, which can reduce space and time.
Background
With the popularization of VR (virtual reality) technology, many service providers offer a wide variety of VR resources for users to use in different scenarios. Among them, VR resources for teaching and gaming are popular. Because the size of the VR resource is generally greater than hundred million, the occupied space is large, and it takes a large amount of space and time to load the VR resource into the memory for encryption, therefore, most of the existing VR resources are in a non-encrypted state, and once the VR resources are obtained, the VR resources can be used, which makes it difficult to protect the rights and interests of the service provider.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: how to reduce the space and time occupied in the process of encrypting VR resources.
In order to solve the technical problems, the invention adopts the technical scheme that:
the invention provides a safety protection method for VR resources, which reduces space and time, and comprises the following steps:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
The present invention also provides a secure protection terminal for reducing VR resources in space and time, comprising one or more processors and a memory, the memory storing a program and configured to perform the following steps by the one or more processors:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
The invention has the beneficial effects that: the memory mapping file is a mapping from one file to one memory. In the process of memory mapping, there is no actual data copy, and VR resources are not actually loaded into memory, but are only logically placed into memory. The VR resources stored on the disk are encrypted in a memory mapping file mode, so that the VR resources do not need to be applied for encryption and allocated with cache when being encrypted, all file cache operations are directly managed by the system, and the steps of loading the VR resources to the memory, writing back the encrypted VR resources from the memory to the disk, releasing memory blocks and the like are eliminated. The space and time occupied in the process of encrypting the VR resources are effectively reduced, the VR resources with larger file sizes can be encrypted and then synchronized to authorized clients, and the clients can quickly decrypt and use the VR resources in a memory mapping file mode at any time.
Drawings
FIG. 1 is a block flow diagram of an embodiment of a method for securing VR resources with reduced space and time provided by the present invention;
fig. 2 is a block diagram of a security protection terminal for reducing VR resources in space and time according to an embodiment of the present invention;
description of reference numerals:
1. a processor; 2. a memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 and fig. 2,
as shown in fig. 1, the present invention provides a method for securing VR resources with reduced space and time, including:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
Further, the VR resources stored on the disk are encrypted in a memory mapped file manner to obtain an encrypted file, which specifically is:
acquiring the starting time of a system to obtain a first secret key;
and encrypting the VR resources stored on the disk by adopting the first secret key in a memory mapping file mode to obtain an encrypted file.
From the above description, it can be seen that by using the current startup time of the system as a key for encrypting the VR resources, the method has better randomness, and once one VR resource is cracked by a lawbreaker, other VR resources still have higher confidentiality.
Further, by means of memory mapping files, the VR resources stored on the disk are encrypted by using the first key to obtain an encrypted file, which specifically includes:
presetting a key information table; the key information table stores keys corresponding to each encryption operation;
acquiring a key corresponding to the last encryption operation from the key information table to obtain a second key;
calculating to obtain a random value by taking the first key and the second key as input parameters of a preset random algorithm;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
and encrypting the data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
According to the description, the encryption position is calculated according to the key with high randomness twice, so that the encryption intervals of the VR resources are different, even if a lawless person steals the key, the encrypted VR resources are difficult to crack, and the security and safety are high.
Further, still include:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
As can be seen from the above description, the client can obtain the key from the server, and it is guaranteed that the user can still use the authorized VR resource after losing the key.
Further, before synchronizing the encrypted file to the client, the method further includes:
and compressing the encrypted file.
From the above description, the efficiency of synchronizing the encrypted file to the client is improved.
As shown in fig. 2, the present invention also provides a security protection terminal for reducing VR resources in space and time, comprising one or more processors 1 and a memory 2, wherein the memory 2 stores programs and is configured to execute the following steps by the one or more processors 1:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
Further, the VR resources stored on the disk are encrypted in a memory mapped file manner to obtain an encrypted file, which specifically is:
acquiring the starting time of a system to obtain a first secret key;
and encrypting the VR resources stored on the disk by adopting the first secret key in a memory mapping file mode to obtain an encrypted file.
Further, by means of memory mapping files, the VR resources stored on the disk are encrypted by using the first key to obtain an encrypted file, which specifically includes:
presetting a key information table; the key information table stores keys corresponding to each encryption operation;
acquiring a key corresponding to the last encryption operation from the key information table to obtain a second key;
calculating to obtain a random value by taking the first key and the second key as input parameters of a preset random algorithm;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
and encrypting the data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Further, still include:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
Further, before synchronizing the encrypted file to the client, the method further includes:
and compressing the encrypted file.
The first embodiment of the invention is as follows:
the embodiment provides a method for reducing the security protection of VR resources in space and time, which comprises the following steps:
and S1, encrypting the VR resource stored on the disk in a memory mapping file mode to obtain an encrypted file. The method specifically comprises the following steps:
s11, presetting a key information table; the key information table stores a key corresponding to each encryption operation.
And S12, acquiring the starting time of the system to obtain a first key.
And S13, obtaining a key corresponding to the last encryption operation from the key information table to obtain a second key.
And S14, calculating to obtain a random value by taking the first key and the second key as input parameters of a preset random algorithm.
Optionally, the random algorithm is an elliptic algorithm.
And S15, setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval.
For example: obtain byte size 20000 bytes of VR resource. The encryption position 1000 is obtained by calculation of an elliptic algorithm, and the encryption position of the current encryption is obtained by proportional calculation.
And S16, encrypting the data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Optionally, data corresponding to the encryption interval is encrypted by using an AES encryption technique.
S2, compressing the encrypted file.
And S3, synchronizing the encrypted file to the client.
And S4, sending the first key to the client so that the client can decrypt the encrypted file according to the first key.
The method provided by the embodiment is used for encrypting the VR resource, so that the space and time can be greatly reduced. For example, the size of one VR resource is 108 megabits, and the size of the encrypted VR resource is 109 megabits, which is increased by only one megabit. If a common encryption mode is adopted, for example Asset is adopted to process the Asset resource file under the directory, and then the decryption operation is performed in the DLL file, the size of the encrypted VR resource will be increased significantly.
According to the description, an unauthorized user can only acquire the encrypted VR resource and cannot normally use the VR resource, so that the problem that the VR resource is stolen to cause secondary utilization of other service providers is effectively solved, and the rights and interests of the service providers are protected.
The second embodiment of the invention is as follows:
the embodiment provides a security protection terminal for reducing VR resources in space and time, comprising one or more processors 1 and a memory 2, wherein the memory 2 stores programs and is configured to execute the following steps by the one or more processors 1:
and S1, encrypting the VR resource stored on the disk in a memory mapping file mode to obtain an encrypted file. The method specifically comprises the following steps:
s11, presetting a key information table; the key information table stores a key corresponding to each encryption operation.
And S12, acquiring the starting time of the system to obtain a first key.
And S13, obtaining a key corresponding to the last encryption operation from the key information table to obtain a second key.
And S14, calculating to obtain a random value by taking the first key and the second key as input parameters of a preset random algorithm.
Optionally, the random algorithm is an elliptic algorithm.
And S15, setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval.
And S16, encrypting the data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Optionally, data corresponding to the encryption interval is encrypted by using an AES encryption technique.
S2, compressing the encrypted file.
And S3, synchronizing the encrypted file to the client.
And S4, sending the first key to the client so that the client can decrypt the encrypted file according to the first key.
In summary, according to the VR resource security protection method and terminal for reducing space and time provided by the present invention, the VR resource stored on the disk is encrypted by means of the memory mapping file, so that it is not necessary to apply for and allocate a cache for the VR resource when performing an encryption operation on the VR resource, all file cache operations are directly managed by the system, and steps of loading the VR resource to the memory, writing back the encrypted VR resource from the memory to the disk, releasing the memory block, and the like are eliminated. The space and time occupied in the process of encrypting the VR resources are effectively reduced, the VR resources with larger file sizes can be encrypted and then synchronized to authorized clients, and the clients can quickly decrypt and use the VR resources in a memory mapping file mode at any time. Furthermore, the starting time of the system is used as a key for encrypting the VR resources, so that the method has good randomness, and once one VR resource is cracked by a lawbreaker, other VR resources still have high confidentiality. Furthermore, the position of the encryption is calculated according to the keys with high randomness twice, so that the encryption intervals of the VR resources are different, even if a lawless person steals the keys, the encrypted VR resources are difficult to crack, and the security and safety are high. Further, the client can obtain the key from the server, and the user can still use the authorized VR resource after losing the key. Further, efficiency of synchronizing the encrypted file to the client is improved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for securing VR resources with reduced space and time, comprising:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
synchronizing the encrypted file to a client;
the encrypting the VR resource stored on the disk by means of the memory mapping file to obtain the encrypted file comprises:
acquiring the starting time of the system to obtain a first key;
acquiring a key corresponding to the last encryption operation from a preset key information table to obtain a second key;
determining the position of the VR resource encrypted this time according to the first key and the second key;
and encrypting data corresponding to the encrypted position in the VR resource by adopting the first secret key in a memory mapping file mode to obtain an encrypted file.
2. The method of claim 1, wherein the pre-defined key information table stores keys corresponding to each cryptographic operation;
the determining the position of the VR resource encrypted at this time according to the first key and the second key comprises:
taking the first key and the second key as input parameters of an elliptic algorithm, and calculating to obtain a random value;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
the encrypting the data corresponding to the encrypted position in the VR resource by using the first key comprises:
and encrypting data corresponding to the encryption interval by adopting the first key.
3. The method for securing a reduced space and time VR resource of claim 1 further comprising:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
4. The method for securing a reduced space and time VR resource of claim 1 further comprising, prior to synchronizing the encrypted file to a client:
and compressing the encrypted file.
5. A secure protection terminal for reducing VR resources in space and time, comprising one or more processors and memory, the memory storing a program and configured to perform the following steps by the one or more processors:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
synchronizing the encrypted file to a client;
the encrypting the VR resource stored on the disk by means of the memory mapping file to obtain the encrypted file comprises:
acquiring the starting time of the system to obtain a first key;
acquiring a key corresponding to the last encryption operation from a preset key information table to obtain a second key;
determining the position of the VR resource encrypted this time according to the first key and the second key;
and encrypting data corresponding to the encrypted position in the VR resource by adopting the first secret key in a memory mapping file mode to obtain an encrypted file.
6. The space and time reduced VR resource security terminal of claim 5, wherein the pre-defined key information table holds keys corresponding to each cryptographic operation;
the determining the position of the VR resource encrypted at this time according to the first key and the second key comprises:
taking the first key and the second key as input parameters of an elliptic algorithm, and calculating to obtain a random value;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
the encrypting the data corresponding to the encrypted position in the VR resource by using the first key comprises:
and encrypting data corresponding to the encryption interval by adopting the first key.
7. The reduced space and time VR resource security terminal of claim 5 further comprising:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
8. The space and time reduced VR resource security terminal of claim 5 further comprising, prior to synchronizing the encrypted file to the client:
and compressing the encrypted file.
CN202110040427.4A 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time Active CN112651038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110040427.4A CN112651038B (en) 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110040427.4A CN112651038B (en) 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time
CN201810014602.0A CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810014602.0A Division CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal

Publications (2)

Publication Number Publication Date
CN112651038A true CN112651038A (en) 2021-04-13
CN112651038B CN112651038B (en) 2023-06-16

Family

ID=67187427

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810014602.0A Active CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal
CN202110040427.4A Active CN112651038B (en) 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810014602.0A Active CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal

Country Status (1)

Country Link
CN (2) CN110020533B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830521B (en) * 2020-01-13 2020-04-28 南昌市小核桃科技有限公司 VR multi-user same-screen data synchronous processing method and device
CN111803917A (en) * 2020-06-30 2020-10-23 北京金山云网络技术有限公司 Resource processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902914A (en) * 2012-09-05 2013-01-30 福建伊时代信息科技股份有限公司 Method and device for achieving terminal tracelessness
CN103229546A (en) * 2010-09-28 2013-07-31 捷讯研究有限公司 Method and device for releasing connection with local GW when UE moved out of the residential/enterprise network coverage
US20140270153A1 (en) * 2013-03-13 2014-09-18 Futurewei Technologies, Inc. System and Method for Content Encryption in a Key/Value Store
US20140289839A1 (en) * 2011-12-14 2014-09-25 Huawei Technologies Co., Ltd. Resource control method and apparatus

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005300234A (en) * 2004-04-07 2005-10-27 Denso Corp Navigation system equipped with licensing function
CN102880818A (en) * 2012-10-10 2013-01-16 北京深思洛克软件技术股份有限公司 Software protection method
US11221967B2 (en) * 2013-03-28 2022-01-11 Hewlett Packard Enterprise Development Lp Split mode addressing a persistent memory
CN103324481B (en) * 2013-06-26 2016-08-31 网宿科技股份有限公司 By Compilation Method and the system of implementation by assembly Code obfuscation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103229546A (en) * 2010-09-28 2013-07-31 捷讯研究有限公司 Method and device for releasing connection with local GW when UE moved out of the residential/enterprise network coverage
US20140289839A1 (en) * 2011-12-14 2014-09-25 Huawei Technologies Co., Ltd. Resource control method and apparatus
CN102902914A (en) * 2012-09-05 2013-01-30 福建伊时代信息科技股份有限公司 Method and device for achieving terminal tracelessness
US20140270153A1 (en) * 2013-03-13 2014-09-18 Futurewei Technologies, Inc. System and Method for Content Encryption in a Key/Value Store

Also Published As

Publication number Publication date
CN110020533A (en) 2019-07-16
CN112651038B (en) 2023-06-16
CN110020533B (en) 2021-02-09

Similar Documents

Publication Publication Date Title
CN109144961B (en) Authorization file sharing method and device
KR101966767B1 (en) System for managing encryption keys for cloud services
CA3066678A1 (en) Processing data queries in a logically sharded data store
US9122882B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9064133B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN106992851B (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN111917540B (en) Data encryption and decryption method and device, mobile terminal and storage medium
US10887085B2 (en) System and method for controlling usage of cryptographic keys
US20030210791A1 (en) Key management
US10671748B2 (en) Secrets as a service
CN107040520B (en) Cloud computing data sharing system and method
CN104618096A (en) Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
CN110892403B (en) Method for securely accessing data
CN112469036A (en) Message encryption and decryption method and device, mobile terminal and storage medium
CN110020533B (en) Safety protection method for VR resources and terminal
US20120250857A1 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN111177773A (en) Full disk encryption and decryption method and system based on network card ROM
CN114372242A (en) Ciphertext data processing method, authority management server and decryption server
CN108495309B (en) Information processing method, electronic device, and storage medium
CN113986448A (en) Container deployment method and device
WO2022199796A1 (en) Method and computer-based system for key management
US11683159B2 (en) Hybrid content protection architecture
Vignesh et al. Secure data deduplication system with efficient and reliable multi-key management in cloud storage
KR101629379B1 (en) Method of distributing original data with recovery data
CN116028995A (en) Data protection method and device for target cloud equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant