CN112651038B - VR resource safety protection method and terminal capable of reducing space and time - Google Patents

VR resource safety protection method and terminal capable of reducing space and time Download PDF

Info

Publication number
CN112651038B
CN112651038B CN202110040427.4A CN202110040427A CN112651038B CN 112651038 B CN112651038 B CN 112651038B CN 202110040427 A CN202110040427 A CN 202110040427A CN 112651038 B CN112651038 B CN 112651038B
Authority
CN
China
Prior art keywords
key
encryption
encrypted
resource
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110040427.4A
Other languages
Chinese (zh)
Other versions
CN112651038A (en
Inventor
刘德建
丁迪锋
周小白
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianquan Educational Technology Ltd
Original Assignee
Fujian Tianquan Educational Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianquan Educational Technology Ltd filed Critical Fujian Tianquan Educational Technology Ltd
Priority to CN202110040427.4A priority Critical patent/CN112651038B/en
Publication of CN112651038A publication Critical patent/CN112651038A/en
Application granted granted Critical
Publication of CN112651038B publication Critical patent/CN112651038B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The present invention relates to the field of data processing, and in particular, to a method and terminal for protecting VR resources in reduced space and time. According to the invention, VR resources stored on a disk are encrypted in a memory mapping file mode, so that an encrypted file is obtained; and synchronizing the encrypted file to the client. The space and time occupied in the process of encrypting VR resources are reduced.

Description

VR resource safety protection method and terminal capable of reducing space and time
The scheme is that the patent application with the application number of 201810014602.0 and the application date of 2018, 1 month and 8 days is divided into the patent application with the name of a VR resource safety protection method and terminal.
Technical Field
The present invention relates to the field of data processing, and in particular, to a method and terminal for protecting VR resources in reduced space and time.
Background
With the popularity of VR (virtual reality) technology, many service providers offer a wide variety of VR resources for users to use in different scenarios. Among these, VR resources for teaching and gaming are popular. Because the VR resources are generally larger than hundred megabytes in size, and occupy a large space, and a large space and time are consumed for encrypting the VR resources when the VR resources are loaded into the memory, most of the existing VR resources are in an unencrypted state and can be used once being acquired, and the rights and interests of a service provider are difficult to protect.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: how to reduce the space and time occupied in encrypting VR resources.
In order to solve the technical problems, the invention adopts the following technical scheme:
the invention provides a safety protection method for VR resources for reducing space and time, which comprises the following steps:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
The present invention also provides a VR resource reduced space and time secure protection terminal comprising one or more processors and memory, the memory storing a program and configured to be executed by the one or more processors to:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
The invention has the beneficial effects that: memory mapped files are mappings from one file to one block of memory. In the memory mapping process, there is no actual data copy, VR resources are not actually loaded into memory, but are logically placed into memory. According to the invention, the VR resources stored on the disk are encrypted in a memory mapping file mode, so that the VR resources do not need to be applied for and are allocated with a cache when the VR resources are encrypted, all file caching operations are directly managed by a system, and the steps of loading the VR resources into a memory, writing back the encrypted VR resources from the memory to the disk, releasing memory blocks and the like are eliminated. The space and time occupied in the process of encrypting the VR resources are effectively reduced, so that the VR resources with larger file size can be encrypted and then synchronized to authorized clients, and the clients can decrypt the VR resources and use the VR resources quickly in a memory mapping file mode at any time.
Drawings
FIG. 1 is a block flow diagram of an embodiment of a method for securing VR resources in reduced space and time in accordance with the present invention;
fig. 2 is a block diagram of an embodiment of a VR resource security protection terminal with reduced space and time according to the present invention;
description of the reference numerals:
1. a processor; 2. a memory.
Detailed Description
In order to describe the technical contents, the achieved objects and effects of the present invention in detail, the following description will be made with reference to the embodiments in conjunction with the accompanying drawings.
Referring to figure 1 and figure 2 of the drawings,
as shown in fig. 1, the present invention provides a method for protecting VR resources in reduced space and time, comprising:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
Further, the VR resources stored on the disk are encrypted by means of a memory mapped file, so as to obtain an encrypted file, which specifically is:
acquiring the starting time of a system to obtain a first key;
and encrypting VR resources stored on the disk by adopting the first key in a memory mapping file mode to obtain an encrypted file.
As can be seen from the above description, by using the current start-up time of the system as a key for encrypting VR resources, the randomness is better, and once one VR resource is cracked by an lawbreaker, other VR resources still have higher confidentiality.
Further, encrypting the VR resources stored on the disk by using the first key in a memory mapping file manner to obtain an encrypted file, which specifically includes:
presetting a key information table; the key information table stores keys corresponding to each encryption operation;
obtaining a key corresponding to the last encryption operation from the key information table to obtain a second key;
taking the first secret key and the second secret key as input parameters of a preset random algorithm, and calculating to obtain a random value;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
and encrypting the data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
The above description shows that the encryption position is calculated according to the key with higher randomness for two times, so that the encryption interval of each time of encrypting the VR resource is different, the encrypted VR resource is difficult to crack even if an lawbreaker steals the key, and the encryption position has higher confidentiality and security.
Further, the method further comprises the following steps:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
From the above description, it is clear that the client can obtain the key from the server, ensuring that the user can still use the authorized VR resources after losing the key.
Further, before synchronizing the encrypted file to the client, the method further includes:
compressing the encrypted file.
As can be seen from the above description, the efficiency of synchronizing an encrypted file to a client is improved.
As shown in fig. 2, the present invention further provides a VR resource safety protection terminal for reducing space and time, comprising one or more processors 1 and a memory 2, wherein the memory 2 stores a program and is configured to execute the following steps by the one or more processors 1:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
and synchronizing the encrypted file to the client.
Further, the VR resources stored on the disk are encrypted by means of a memory mapped file, so as to obtain an encrypted file, which specifically is:
acquiring the starting time of a system to obtain a first key;
and encrypting VR resources stored on the disk by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Further, encrypting the VR resources stored on the disk by using the first key in a memory mapping file manner to obtain an encrypted file, which specifically includes:
presetting a key information table; the key information table stores keys corresponding to each encryption operation;
obtaining a key corresponding to the last encryption operation from the key information table to obtain a second key;
taking the first secret key and the second secret key as input parameters of a preset random algorithm, and calculating to obtain a random value;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
and encrypting the data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Further, the method further comprises the following steps:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
Further, before synchronizing the encrypted file to the client, the method further includes:
compressing the encrypted file.
The first embodiment of the invention is as follows:
the embodiment provides a method for protecting the safety of VR resources for reducing space and time, which comprises the following steps:
s1, encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file. The method comprises the following steps:
s11, presetting a key information table; the key information table holds keys corresponding to each encryption operation.
S12, acquiring the starting time of the system to obtain a first key.
S13, acquiring a key corresponding to the last encryption operation from the key information table to obtain a second key.
S14, taking the first secret key and the second secret key as input parameters of a preset random algorithm, and calculating to obtain a random value.
Optionally, the random algorithm is an elliptic algorithm.
S15, setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval.
For example: the byte size of VR resources is 20000 bytes. The encryption position 1000 is obtained by calculation through an elliptic algorithm, and the encryption position of the encryption is obtained by calculation through a proportion.
S16, encrypting data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Optionally, the data corresponding to the encryption section is encrypted by using an AES encryption technique.
S2, compressing the encrypted file.
S3, synchronizing the encrypted file to the client.
S4, the first secret key is sent to the client side, so that the client side decrypts the encrypted file according to the first secret key.
The method provided by the embodiment can greatly reduce space and time by encrypting the VR resource. For example, one VR resource may be 108 megabits in size, and the encrypted VR resource may be 109 megabits in size, only one megabit in size. If a common encryption mode is adopted, for example, asset processing is adopted for Asset files under a directory, then decryption operation is carried out in a DLL file, and the size of the VR resource after encryption is obviously increased.
From the above description, an unauthorized user can only acquire the encrypted VR resources and cannot normally use the VR resources, so that the problem that the VR resources are stolen and secondarily utilized by other service providers is effectively solved, and the rights and interests of the service providers are protected.
The second embodiment of the invention is as follows:
the present embodiment provides a safety protection terminal for VR resources for reducing space and time, comprising one or more processors 1 and a memory 2, the memory 2 storing a program and configured to be executed by the one or more processors 1 to:
s1, encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file. The method comprises the following steps:
s11, presetting a key information table; the key information table holds keys corresponding to each encryption operation.
S12, acquiring the starting time of the system to obtain a first key.
S13, acquiring a key corresponding to the last encryption operation from the key information table to obtain a second key.
S14, taking the first secret key and the second secret key as input parameters of a preset random algorithm, and calculating to obtain a random value.
Optionally, the random algorithm is an elliptic algorithm.
S15, setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval.
S16, encrypting data corresponding to the encryption interval by adopting the first key in a memory mapping file mode to obtain an encrypted file.
Optionally, the data corresponding to the encryption section is encrypted by using an AES encryption technique.
S2, compressing the encrypted file.
S3, synchronizing the encrypted file to the client.
S4, the first secret key is sent to the client side, so that the client side decrypts the encrypted file according to the first secret key.
In summary, according to the VR resource security protection method and terminal for reducing space and time provided by the invention, the VR resource stored on the disk is encrypted by means of the memory mapping file, so that the VR resource is not required to be applied and cached when being encrypted, all file caching operations are directly managed by the system, and the steps of loading the VR resource into the memory, writing back the encrypted VR resource from the memory to the disk, releasing the memory block and the like are eliminated. The space and time occupied in the process of encrypting the VR resources are effectively reduced, so that the VR resources with larger file size can be encrypted and then synchronized to authorized clients, and the clients can decrypt the VR resources and use the VR resources quickly in a memory mapping file mode at any time. Further, by using the current starting time of the system as a key for encrypting the VR resources, the method has better randomness, and once one VR resource is cracked by an lawbreaker, other VR resources still have higher confidentiality. Further, the encryption position is calculated according to the key with higher randomness for two times, so that the encryption interval of each time of encrypting VR resources is different, the encrypted VR resources are difficult to crack even if an lawbreaker steals the key, and the encryption position has higher confidentiality and security. Further, the client may obtain the key from the server, ensuring that the user can still use the authorized VR resources after losing the key. Further, efficiency of synchronizing the encrypted file to the client is improved.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent changes made by the specification and drawings of the present invention, or direct or indirect application in the relevant art, are included in the scope of the present invention.

Claims (6)

1. A method of securing VR resources to reduce space and time, comprising:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
compressing the encrypted file and synchronizing the encrypted file to a client;
the encrypting the VR resources stored on the disk by means of the memory mapped file to obtain an encrypted file includes:
acquiring the starting time of the system to obtain a first key;
obtaining a key corresponding to the last encryption operation from a preset key information table to obtain a second key;
determining the current encryption position of the VR resource according to the first key and the second key:
taking the first key and the second key as input parameters of an elliptic algorithm, and calculating to obtain a random value;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
and encrypting data corresponding to the current encrypted position in the VR resource by adopting the first key in a memory mapping file mode to obtain an encrypted file.
2. The method for protecting the safety of VR resources in reduced space and time according to claim 1, wherein said preset key information table stores keys corresponding to each encryption operation;
the encrypting the data corresponding to the current encrypted position in the VR resource by using the first key includes:
and encrypting data corresponding to the encryption interval by adopting the first key.
3. The method of claim 1, further comprising:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
4. A VR resource reduced space and time secure terminal comprising one or more processors and memory, the memory storing a program and configured to be executed by the one or more processors to:
encrypting VR resources stored on a disk in a memory mapping file mode to obtain an encrypted file;
compressing the encrypted file and synchronizing the encrypted file to a client;
the encrypting the VR resources stored on the disk by means of the memory mapped file to obtain an encrypted file includes:
acquiring the starting time of the system to obtain a first key;
obtaining a key corresponding to the last encryption operation from a preset key information table to obtain a second key;
determining the current encryption position of the VR resource according to the first key and the second key:
taking the first key and the second key as input parameters of an elliptic algorithm, and calculating to obtain a random value;
setting a starting encryption position and an ending encryption position corresponding to the VR resource according to the random value to obtain an encryption interval;
and encrypting data corresponding to the current encrypted position in the VR resource by adopting the first key in a memory mapping file mode to obtain an encrypted file.
5. The VR resource reduced space and time security protection terminal of claim 4, wherein the preset key information table stores keys corresponding to each encryption operation;
the encrypting the data corresponding to the current encrypted position in the VR resource by using the first key includes:
and encrypting data corresponding to the encryption interval by adopting the first key.
6. The VR resource reduced space and time security protection terminal of claim 4, further comprising:
and sending the first key to the client so that the client decrypts the encrypted file according to the first key.
CN202110040427.4A 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time Active CN112651038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110040427.4A CN112651038B (en) 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110040427.4A CN112651038B (en) 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time
CN201810014602.0A CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810014602.0A Division CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal

Publications (2)

Publication Number Publication Date
CN112651038A CN112651038A (en) 2021-04-13
CN112651038B true CN112651038B (en) 2023-06-16

Family

ID=67187427

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810014602.0A Active CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal
CN202110040427.4A Active CN112651038B (en) 2018-01-08 2018-01-08 VR resource safety protection method and terminal capable of reducing space and time

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810014602.0A Active CN110020533B (en) 2018-01-08 2018-01-08 Safety protection method for VR resources and terminal

Country Status (1)

Country Link
CN (2) CN110020533B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830521B (en) * 2020-01-13 2020-04-28 南昌市小核桃科技有限公司 VR multi-user same-screen data synchronous processing method and device
CN111803917A (en) * 2020-06-30 2020-10-23 北京金山云网络技术有限公司 Resource processing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902914A (en) * 2012-09-05 2013-01-30 福建伊时代信息科技股份有限公司 Method and device for achieving terminal tracelessness
CN103229546A (en) * 2010-09-28 2013-07-31 捷讯研究有限公司 Method and device for releasing connection with local GW when UE moved out of the residential/enterprise network coverage

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005300234A (en) * 2004-04-07 2005-10-27 Denso Corp Navigation system equipped with licensing function
CN103166783A (en) * 2011-12-14 2013-06-19 华为技术有限公司 Resource control method and resource control device
CN102880818A (en) * 2012-10-10 2013-01-16 北京深思洛克软件技术股份有限公司 Software protection method
US9602280B2 (en) * 2013-03-13 2017-03-21 Futurewei Technologies, Inc. System and method for content encryption in a key/value store
US11221967B2 (en) * 2013-03-28 2022-01-11 Hewlett Packard Enterprise Development Lp Split mode addressing a persistent memory
CN103324481B (en) * 2013-06-26 2016-08-31 网宿科技股份有限公司 By Compilation Method and the system of implementation by assembly Code obfuscation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103229546A (en) * 2010-09-28 2013-07-31 捷讯研究有限公司 Method and device for releasing connection with local GW when UE moved out of the residential/enterprise network coverage
CN102902914A (en) * 2012-09-05 2013-01-30 福建伊时代信息科技股份有限公司 Method and device for achieving terminal tracelessness

Also Published As

Publication number Publication date
CN112651038A (en) 2021-04-13
CN110020533A (en) 2019-07-16
CN110020533B (en) 2021-02-09

Similar Documents

Publication Publication Date Title
US20210099287A1 (en) Cryptographic key generation for logically sharded data stores
CA3066678C (en) Processing data queries in a logically sharded data store
KR101966767B1 (en) System for managing encryption keys for cloud services
WO2019015598A1 (en) Hybrid-cloud data storage method and apparatus, related device, and cloud system
US9122882B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
US9256499B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CA2900504A1 (en) Systems and methods for a cryptographic file system layer
CN111917540B (en) Data encryption and decryption method and device, mobile terminal and storage medium
CN115048658B (en) System, method and computer readable medium for protecting distributed data using a latent name slicing technique
EP3494662B1 (en) Method for storing data blocks from client devices to a cloud storage system
US20120254136A1 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CN112469036A (en) Message encryption and decryption method and device, mobile terminal and storage medium
CN110892403B (en) Method for securely accessing data
CN112651038B (en) VR resource safety protection method and terminal capable of reducing space and time
US9054864B2 (en) Method and apparatus of securely processing data for file backup, de-duplication, and restoration
CA3065767C (en) Cryptographic key generation for logically sharded data stores
CN112733189A (en) System and method for realizing file storage server side encryption
CN103532712A (en) Digital media file protection method, system and client
US11683159B2 (en) Hybrid content protection architecture
KR101629379B1 (en) Method of distributing original data with recovery data
CN116028995A (en) Data protection method and device for target cloud equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant