CN1291328C - Method and system for storing divided files and restoring treatment - Google Patents
Method and system for storing divided files and restoring treatment Download PDFInfo
- Publication number
- CN1291328C CN1291328C CN 200310111168 CN200310111168A CN1291328C CN 1291328 C CN1291328 C CN 1291328C CN 200310111168 CN200310111168 CN 200310111168 CN 200310111168 A CN200310111168 A CN 200310111168A CN 1291328 C CN1291328 C CN 1291328C
- Authority
- CN
- China
- Prior art keywords
- file
- storer
- cpu
- reduction
- authentication code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a method which causes a file to be stored through a division way and processed through a reduction way and a system thereof. In the method, the division storage and the reduction processing of a storage file F are executed by a computer and at least one movable memory which is connected with the computer. The present invention comprises the following procedures: (1) file division and storage procedures: a. generating authentication codes; b. encrypting and dividing processing; (2) file merge and reduction processing procedures: a. inspecting memories (A), (B) whether to connect with a CPU of the computer; b. reading the authentication codes FK (A) and FK (B) in the memories (A), (B) by the CPU, decrypting and reducing hardware serial numbers FK (S2) and FK (S1) which are respectively contained in the authentication codes FK (A) and FK (B), inspecting whether the hardware serial numbers FK (S2) and FK (S1) are matched, if false, the CPU exits out of a file processing program, and else then entering the following procedures: c. reading files (1A), (2B) in the memories (A), (B) by the CPU, and connecting and storing the files (1A), (2B) to a hard disc of the computer; d. unpacking and separating a decoding algorithm function F (f) from the files by the CPU, and synthesizing and restoring into the original file F.
Description
Technical field:
The present invention is relevant with the method for secure storing and the system of computer data file, especially with computer documents to cut apart storage and method of reduction treatment and system relevant.
Background technology:
Computing machine significant data information is easy to divulge a secret carrying when going out, and needs to solve the protection problem at mobile data.More common computing machine mobile data safeguard measure is with the encryption of file through strictness, forms the ciphertext form, stores in the particular device, as notebook computer, USB flash disk, disk cartridge, floppy disk, CD etc.The deficiency of this measure is that in a single day the equipment of storing ciphertext lose, and the person of stealing secret information has only made just to decode surplus matter of time to ciphertext.The another kind of mobile data safeguard measure of extensively being paid close attention to is needs to be carried the data file of going out carry out storing in the different memory devices respectively after the dividing processing (file is divided into 2 or a plurality of unique file according to certain rule) and being carried by different people respectively.When file used, the data file that will cut apart storage earlier merged reduction, the file of being cut apart storage is returned to cut apart preceding normal condition.This series products is that main carrier storage is by the part of divided file with notebook computer mostly, be equipped with again other movable storage device as assistant carrier storage by another part of divided file, for example: the 1. hard disk of the hard disk of notebook computer+another notebook computer; 2. hard disk+the USB flash disk of notebook computer; 3. hard disk+the disk cartridge of notebook computer; 4. hard disk+the floppy disk of notebook computer or CD; 5. disk cartridge+another disk cartridge etc.These disposal routes have solved data to a great extent with device and have moved problem and compare the intensity that has improved safeguard protection with aforementioned non-file division scheme; but, still exist and go out to carry inconvenient defective because notebook computer or disk cartridge volume are bigger.
The content of invention:
The purpose of this invention is to provide a kind of various storage mediums that are applicable to, the method with file division storage and reduction processing easy to use, safe.
The present invention is achieved in that
The present invention is with the method for file division storage and reduction processing, this method is by computing machine and two storeies that are connected with computing machine, at least one is removable memory in two storeies, carries out cutting apart of storage file F and stores and reduce and handle, and its step is as follows:
(1) file division storing step:
A. generate authentication code:
A. generate authentication code:
Required two authentication code FK (A), the FK (B) of spanned file F reduction at first, authentication code FK (A) comprises the hardware sequence number FK (S2) of storer B, authentication code FK (B) comprises that hardware sequence number FK (S1), each authentication code of storer A comprise the file encryption processing accepted standard algorithmic code FK of institute (X)
B. encrypt and dividing processing:
Call the corresponding encryption program of FK (X), file F is divided into file 1 and file 2, file 1,2 is united packing with decipherment algorithm function F (f) program segment respectively, form one or one group executable file 1A, the 2B that can unpack the operation restoring function voluntarily respectively, file 1A and authentication code FK (A) are deposited among the storer A, file 2B and authentication code FK (B) are deposited among the storer B
(2), file merges the reduction treatment step:
A. check whether storer A, B are connected with the CPU of computing machine,
B.CPU reads authentication code FK (A) and the FK (B) among storer A, the B, and deciphering restores wherein contained hardware sequence number FK (S2) and FK (S1), and relatively whether FK (S2) is consistent with the hardware sequence number among storer A and the B with FK (S1).Not, CPU does not withdraw from documentor, be then to enter following steps,
C.CPU reads file 1A, the 2B among storer A, the B, and to connect be that a file is stored in hard disc of computer,
D.CPU isolates decipherment algorithm function F (f) with the folding bag of the file in the hard disk, and CPU transfers it to finish the reverse conversion of file with it, and is finally synthetic and be recovered to source document F.
Storer A, B can be two USB flash disks or disk cartridge or CD or one and are activity store, and another is a permanent memory.
Each authentication code that generates also comprises password code FK (P), the file encryption processing accepted standard algorithmic code FK of institute (X) of file storage timing code FK (D), effective service life sign indicating number FK (T), file reduction.
CPU calls the corresponding encryption program of FK (X), file content is carried out shifting processing, processing is deposited in the piecemeal transposition, two parts file 1 and file 2 that file division after handling the most at last becomes can deposit respectively, file 1,2 and decipherment algorithm function F (f) program are united the executable file 1A that packing forms, after 2B and authentication code FK (A), FK (B) deposited storer A and storer B respectively in, computing machine can be carried out CPU and remove divided file 1,2 and authentication code FK (A), the FK (B) that is stored in the hard disc of computer.
When the file user needed merged file, its reduction treatment step was as follows:
1. storer A, B are inserted the main frame USB port simultaneously, CPU reads the authentication code FK (A) of storer A, B, and FK (B) isolates each independent element FK (D), FK (T), FK (P), FK (S2), FK (S1), FK (X) in this sign indicating number after the deciphering reduction,
2. the reading system current time, judge effectively that if exceeded the term of validity, then refusal is gone back original and removed respective file and auto-destruct scratch file in the storer with file storage timing code FX (D) and file time limit FK (T),
3. carry out the check and correction of FK (P) sign indicating number password by man-machine conversation's mode and user, if the password check and correction is unsuccessful, refusal is original also,
4. read storer B sequence number FK (S2), FK (S2) the comparison consistance with among the FK (A) if inconsistent, shows that storer A and storer B do not match, then withdraw from the file reduction and handle,
5. read sequence number FK (S1) among the storer A,,, then withdraw from the file reduction and handle if inconsistent with FK (S1) the comparison consistance among the FK (B).
By computing machine and two storer A independently, B forms, two storeies are connected with the central processor CPU of computing machine by USB interface, storer A, B is a USB flash disk, installation file reduction processor software bag on the USB flash disk, installation file cutting processor software package and the file enciphering/deciphering that calls during for the work of file division processor and file reduction processor and cut apart/synthesize the processing function library on the hard disc of computer, this function library and file division processor are installed on the same hard disc of computer, the file encryption that comprises in this function library is handled corresponding reduction handling procedure segment and is stored in two USB flash disks with the file of being cut apart and store, and is called by central processing unit (CPU) when file is synthetic.
The present invention can adopt two independently common U disk memory devices, these two independently USB flash disk make it to match one to one by the dynamic connection processing of software, two independently USB flash disk be used for depositing respectively different piece by divided file, and by cross-certification mechanism between two USB flash disks, guarantees two independently USB flash disk only meeting normally carrying out of could realizing under " spouse " condition that the file merging reduces; A private file cutting processor (software package) that is installed in the common computer; Usually in USB flash disk that is stored in aforementioned indication and can call in the private file compositor (software package) of computer run; An and private file enciphering/deciphering that calls when the work for file division processor and file compositor and cut apart/synthesize the processing function library, this function library and file division processor are installed on one, include some different algorithm processor segments (function) of encrypting and cutting apart needs that realize in the function library, these program segments (function) can constantly increase as required to strengthen the processing power in this storehouse, the pairing reduction handling procedure of file encryption segment will be stored among two USB flash disks with the data of being cut apart and store in this storehouse after file division stores the USB flash disk storer into, and be called execution by computing machine when the needs file is synthetic.
The present invention has following characteristics:
1, adopt double-H groove weld dish mechanism storing movement data file, alleviated employee on business trip's burden, the security intensity that the significant data file is carried go out improves;
2, file reduction processor carries with USB flash disk, does not require that the computing machine that reduction is handled must be equipped with special process software, makes to use to have greater flexibility;
3, with specific retrieving algorithm program segment break away from cut apart with restore software with data file " one to one " packing, accomplish " realizing one secrete key for one file ";
4, adopt independently encryption and decryption function library mechanism, making can constantly increase as required to strengthen the processing power in this storehouse, and system processing power can constantly be increased with application;
5, file division adds man-hour, adopts " file pulverizing " intensity of Bit level (rather than byte level) that the data file is handled;
6, in cutting apart storing process, in divided file, add time sequence information and the time again source file is carried out hybrid coding behind the limit information;
7, during document storage, each divided file is produced two different authentication codes, this authentication code has comprised the sequence number of two USB flash disks that pairing uses, and the intersection of making USB flash disk deposits, and the intersection that forms authentication code generates and deposits;
8, when file uses, adopt the two-way authentication between spouse's USB flash disk, the foundation of authentication has comprised the sequence number information of the USB flash disk of pairing with it; When authentication was not inconsistent, refusal carried out the synthetic and decoding of file;
9, before file is synthetic, judge that according to the time limit factor that adds in the file file uses the phase of licensing that whether is in, the expired file that then do not carry out is synthetic.
10, the present invention also can adopt the mutual matching scheme between the different mobile memory mediums such as spouse's scheme of spouse's scheme of USB flash disk+one disk cartridge, disk cartridge+another disk cartridge in force except that the spouse's scheme that adopts between two USB flash disks.Equally, also can adopt between notebook computer and the mobile memory medium and even the scheme of mating between desktop computer and the mobile memory medium.
Description of drawings:
Fig. 1: the synoptic diagram of spouse's type USB flash disk file division system works principle
Wherein:
The data file that 1=is complete
2=is by divided file A part
3=is by divided file B part
4=U coils A
5=U coils B
The 6=hard disc of computer
7=text delivering path
8=authentication code delivering path
Fig. 2: file division stores processor process flow diagram
Fig. 3: file merges the reduction processing flow chart
Fig. 4: the machine code Storage Format of file my_file.txt content
Fig. 5: the result that file my_file.txt step-by-step is negated after handling illustrates
Fig. 6: file my_file.txt content byte internal shift result
Fig. 7: the back result is handled in transposition between file my_file.txt byte
Fig. 8: the result of file my_file.txt after by isometric cutting apart
Fig. 9 is a system construction drawing.
Embodiment:
The file division storing step is:
1, generates authentication code.The data file of selecting at the user of cutting apart storage, system is the required authentication code FK (FK (A) of USB flash disk A correspondence and the FK (B) of USB flash disk B correspondence) of spanned file F reduction at first, and authentication code FK done encryption, the number of this authentication code is corresponding with the file number after the decomposition, comprises file storage timing code FK (D) in each authentication code, effective service life sign indicating number (time limit sign indicating number) FK (T), hardware sequence number FK (S1) or FK (S2) that USB flash disk is fixing, the password code FK (P) of file reduction, file encryption is handled accepted standard algorithmic code (internal number of the function) FK of institute (X).Wherein file storage timing code FK (D) got by the reading system current time; Effective service life sign indicating number (time limit sign indicating number) FK (T) is the fate that file effectively uses, and is given by operating personnel by man-machine conversation's mode; Fixing hardware sequence number FK (S1) and the FK (S2) of USB flash disk gets by the hardware sequence number that Automatic Program reads two USB flash disks; The password code FK (P) of file reduction is given by the operator by man-machine conversation's mode; File encryption is handled the accepted standard algorithmic code FK of institute (X) and is encrypted the code of the computing method that adopted for presents, also is the in-line coding of relevant treatment function in the system encryption function library, is determined by the ad hoc approach stochastic calculation by system;
2, file is encrypted and dividing processing.Its processing procedure is, calls the corresponding encryption program of FK (X), by computer documents " position " level to file content carry out shifting processing, processing is deposited in the piecemeal transposition, the two parts that can deposit respectively of the one-tenth of the file division after the processing the most at last.Concrete displacement is handled according to different FK (X) function decisions with piecemeal, and the document form after different FK (X) function is handled is all different.For example, the file content shifting processing may be earlier with some " byte " (BYTE, eight " positions " are arranged in one " byte ") some " position " carry out certain rule exchange (as the 3rd with first exchange, the 7th with the 5th the exchange etc.), " negate " then by turn (make " 0 " become " 1 ", " 1 " becomes " 0 "), and carry out the step-by-step circulation according to certain rule at this and move (the first disposal route that moves to left by turn or move to right after joining with the tail position) byte; The transposition of file content piecemeal is deposited to handle and is meant according to certain rule and will be subdivided into plurality of small blocks by the file that move after handling " position ", and upset original sequencing, connect and form new document storage form (" mess code " that can't read by conventional method) according to new rule interblock again; For example, file is divided into 8 isometric pieces, the rule according to 1-3-5-7-2-4-6-8 connects then.Final file division handle be according to two available USB flash disk spaces and X algorithm specific rule carry out.Can be to be divided into two files, to be divided into a plurality of files, or not isometric a plurality of files.
3, divided file 1 part and decipherment algorithm function F (f) (program segment) are united packing, form one or the one group executable file (tail of file is the file of " exe ") that can unpack the operation restoring function voluntarily, deposit USB flash disk A in, divided file 2 parts and decipherment algorithm function (program segment) are united packing, form one or one group of executable file that can unpack voluntarily (tail of file is the file of " exe "), deposit USB flash disk B in.
4, the authentication code FK (A) that file 1 (or 1 group) is corresponding deposits USB flash disk A in, and the authentication code FK (B) that file 2 (or 2 groups) is corresponding deposits USB flash disk B in, and the intersection that forms authentication code is deposited.
5, intermediate results such as the source file in the scavenge system, divided file and all authentication codes.File division stores processor logic is referring to accompanying drawing 2.
When the file user needs file merge to use and during with the reducing program filename in the click USB flash disk, will move the reduction handling procedure that deposits in advance in the USB flash disk automatically.After determining to go back the title of original, the treatment step that file merges the reduction handling procedure is:
1, checks whether two pairing USB flash disks insert the main frame USB port simultaneously;
2, read authentication code FK (A) among the USB flash disk A, isolate each independent element FK (D), FK (T), FK (P), FK (S2), FK (X) in this sign indicating number after the deciphering reduction;
3, the reading system current time, carry out validity with file access time FK (D) and file time limit FK (T) and judge, if exceeded the term of validity, then refusal is gone back original and is removed corresponding file and auto-destruct scratch file in the USB flash disk;
If imported also old password (judging that FK (P) is not sky) of file during 4 file division, then carry out the password check and correction by man-machine conversation's mode and user, if the password check and correction is unsuccessful, then refusal is gone back original, withdraws from the reduction duty;
5, read USB flash disk B sequence number FK (S2), FK (S2) the comparison consistance with among the FK (A) if inconsistent, shows that USB flash disk A and USB flash disk B do not match, and then withdraws from the file reduction and handles;
6, read authentication code FK (B) among the USB flash disk B, isolate each independent element FK (D), FK (T), FK (P), FK (S1), FK (X) in this sign indicating number after the deciphering reduction;
7, read USB flash disk A sequence number S1, FK (S1) the comparison consistance with among the FK (B) if inconsistent, shows that USB flash disk A and USB flash disk B do not match, and then withdraws from the file reduction and handles;
8, read file A among the USB flash disk A and the file B among the USB flash disk B, two files connect an integrally formed complete file;
9, call the file reducing program that obtains by unpacking, i.e. decipherment algorithm function F (f) is finished the reverse conversion of file, and is finally synthetic and restore source document.
10, eliminate all intermediate treatment results.
File merges the reduction processing logic referring to accompanying drawing 3.
The example explanation:
For further specifying the present invention, as follows especially exemplified by example.But content of the present invention is not limited only to content related among the embodiment.
Illustrate one: for ease of explanation, suppose that the object that needs to handle is a text-only file (a kind of file memory format), its file is called my_file.txt, and its length is 16 bytes, and content is " ABCD1234EFGH5678 " 16 characters.The machine code Storage Format of this document content is referring to accompanying drawing four.
Processing request: with the isometric two parts that are divided into of file my_file.txt, putting into sequence number respectively is two USB flash disks of (USB flash disk B) AZ908765342 for (USB flash disk A) WH2193456032 and sequence number, the file division time is on October 8th, 2003, the term of validity 10 days, file lost efficacy after on October 19th, 1.
Illustrate two: suppose that the given old password of going back is " 111111 ";
Illustrate three: supposition is adopted " | " character to the authentication code delimiter, this delimiter does not participate in conversion, encryption is only done step-by-step complementary operation (most significant digit (the 0th) do not participate in) conversion to 7 low levels of text word joint, the machine code that is about in each character byte is done the step-by-step inclusive-OR operation with " 01111111 ", make back 7 contents become " 0 " by " 1 ", " 0 " becomes " 1 ";
Illustrate four: supposition is FSC009 (it restores algorithmic function is FSF009) by the code of system by the decomposable process algorithmic function determined at random, and this function decomposable process algorithm is as follows:
The first step: the byte step-by-step is negated, and the step-by-step inclusive-OR operation is done in the machine code in each byte and " 11111111 ", makes content become " 0 " by " 1 ", and " 0 " becomes " 1 ";
Second step: the byte internal shift, with the transposition that circulates from right to left of the machine code in each byte;
The 3rd step: replace between byte, the machine code of per two adjacent byte is carried out parity bit exchange;
The 4th step: cut apart by isometric, file is divided into two parts.
Example one: authentication code FK generative process and deposit example in the cutting procedure of file my_file.txt.
Determining of process one: authentication code FK (A) and FK (B) key element.Wherein:
1, file storage timing code FK (D)=[20031008]
2, effective service life sign indicating number (time limit sign indicating number) FK (T)=[10]
3, fixing hardware sequence number FK (S1)=[WH2193456032] of USB flash disk A
4, fixing hardware sequence number FK (S2)=[AZ908765342] of USB flash disk B
5, password code FK (P)=[111111] of file reduction
6, file encryption is handled accepted standard algorithmic code (internal number of the function) FK of institute (X)=[FSC009]
Process two: authentication code FK (A) and FK (B) are synthetic to be handled, and its result is:
FK(A)=【|20031008|10|AZ908765342|111111|FSC009|】
(sequence number of noting USB flash disk B is put into FK (A))
FK (B)=[| 20031008|10|WH2193456032|111111|FSC009|] (sequence number of noting USB flash disk A is put into FK (B))
The encryption conversion of process three: authentication code FK (A) and FK (B), its result is:
FK(A)=【|KOOLNOOG|NO|>%FOGHIJLKM|NNNNNN|9,COOF|】
FK(B)=【|KOOLNOOG|NO|(7MNFLKJIOLM|NNNNNN|9,COOF|)
Process four: authentication code FK (A) and FK (B) deposit USB flash disk respectively in, and its result is:
FK (A) deposits USB flash disk A in
FK (B) deposits USB flash disk B in
Example two: file my_file.txt's cuts apart the process example by the bit level.
Process one: the byte-by-byte step-by-step of the file processing of negating.Result after negating compares with original text and changes fully, and its result is referring to accompanying drawing five.
Process two: the byte-by-byte internal shift of file is handled.Result after the shifting processing compares with the result of first pre-treatment and further change is arranged, and its result is referring to accompanying drawing six.
Process three: the transposition of file word internode is handled.Change the sequencing of file content by force, its result is referring to accompanying drawing seven.
Process four:, form my_filel.txt and my_file2.txt by isometric divided file.Its result is referring to accompanying drawing eight.
System of the present invention adopts independently common U disk memory device A and independently common U disk memory device B, deposit spouse's validation processor (software module) among USB flash disk A and the USB flash disk B with USB flash disk hardware characteristics sign indicating number " one to one ", this module includes and the corresponding registration code of USB flash disk hardware characteristics sign indicating number " one to one ", universal " spouse " connection processing device (software module), intersection writes the identifying code in the USB flash disk after pairing is handled.System architecture of the present invention is referring to Figure of description 9.
Accompanying drawing 9: spouse's type USB flash disk storage system constitutes synoptic diagram, wherein:
1=U coils A
2=U coils B
The special use of 3=U dish A " spouse " validation processor
The special use of 4=U dish B " spouse " validation processor
5=is universal " spouse " the connection processor
The hardware characteristics code (=USB flash disk A registration code) of 6=U dish A
The hardware characteristics code (=USB flash disk B registration code) of 7=U dish B
8=U coils A identifying code (corresponding to the hardware characteristics code of USB flash disk B)
9=U coils B identifying code (corresponding to the hardware characteristics code of USB flash disk A)
The 10=PC machine
11=PC machine usb 1
12=PC machine USB interface 2
13=PC machine internal memory
14=PC machine central processor CPU
15=PC machine hard disk
Claims (6)
1, a kind of method with file division storage and reduction processing, this method is by computing machine and two storeies that are connected with computing machine, at least one is removable memory in two storeies, carries out cutting apart of storage file F and stores and reduce and handle, and its step is as follows:
(1) file division storing step:
A. generate authentication code:
Required two authentication code FK (A), the FK (B) of spanned file F reduction at first, authentication code FK (A) comprises the hardware sequence number FK (S2) of storer B, authentication code FK (B) comprises that hardware sequence number FK (S1), each authentication code of storer A comprise the file encryption processing accepted standard algorithmic code FK of institute (X)
B. encrypt and dividing processing:
Call the corresponding encryption program of FK (X), file F is divided into file 1 and file 2, file 1,2 is united packing with decipherment algorithm function F (f) program segment respectively, form one or one group executable file 1A, the 2B that can unpack the operation restoring function voluntarily respectively, file 1A and authentication code FK (A) are deposited among the storer A, file 2B and authentication code FK (B) are deposited among the storer B
(2), file merges the reduction treatment step:
A. check whether storer A, B are connected with the CPU of computing machine,
B.CPU reads authentication code FK (A) and the FK (B) among storer A, the B, deciphering restores wherein contained hardware sequence number FK (S2) and FK (S1), relatively whether FK (S2) is consistent with the hardware sequence number among storer A and the B with FK (S1), not, CPU withdraws from documentor, be then to enter following steps
C.CPU reads file 1A, the 2B among storer A, the B, and to connect be that a file is stored in hard disc of computer,
D.CPU isolates decipherment algorithm function F (f) with the folding bag of the file in the hard disk, and CPU transfers it to finish the reverse conversion of file with it, and is finally synthetic and be recovered to source document F.
2, method according to claim 1 is characterized in that storer A, B can be two USB flash disks or disk cartridge or CD or one and be activity store, and another is a permanent memory.
3, method according to claim 1 is characterized in that each authentication code that generates also comprises password code FK (P), the file encryption processing accepted standard algorithmic code FK of institute (X) of file storage timing code FK (D), effective service life sign indicating number FK (T), file reduction.
4, method according to claim 1, it is characterized in that CPU calls the corresponding encryption program of FK (X), file content is carried out shifting processing, processing is deposited in the piecemeal transposition, two parts file 1 and file 2 that file division after handling the most at last becomes can deposit respectively, with file 1,2 unite the executable file 1A that packing forms with decipherment algorithm function F (f) program, 2B and authentication code FK (A), after FK (B) deposited storer A and storer B respectively in, computing machine can be carried out CPU and remove the divided file 1 that is stored in the hard disc of computer, 2 and authentication code FK (A), FK (B).
5, method according to claim 3 is characterized in that when the file user needs merged file, and its reduction treatment step is as follows:
1. storer A, B are inserted the main frame USB port simultaneously, CPU reads the authentication code FK (A) of storer A, B, and FK (B) isolates each independent element FK (D), FK (T), FK (P), FK (S2), FK (S1), FK (X) in this sign indicating number after the deciphering reduction,
2. the reading system current time, carry out validity with file storage timing code FX (D) and file time limit FK (T) and judge, if exceeded the term of validity, then refusal is gone back original and is removed respective file and auto-destruct scratch file in the storer,
3. carry out the check and correction of FK (P) sign indicating number password by man-machine conversation's mode and user, if the password check and correction is unsuccessful, refusal is original also,
4. read storer B sequence number FK (S2), FK (S2) the comparison consistance with among the FK (A) if inconsistent, shows that storer A and storer B do not match, then withdraw from the file reduction and handle,
5. read sequence number FK (S1) among the storer A,,, then withdraw from the file reduction and handle if inconsistent with FK (S1) the comparison consistance among the FK (B).
6, the system of method according to claim 1, it is characterized in that storer A independently by computing machine and two, B forms, two storeies are connected with the central processor CPU of computing machine by USB interface, storer A, B is a USB flash disk, installation file reduction processor software bag on the USB flash disk, installation file cutting processor software package and the file enciphering/deciphering that calls during for the work of file division processor and file reduction processor and cut apart/synthesize the processing function library on the hard disc of computer, this function library and file division processor are installed on the same hard disc of computer, the file encryption that comprises in this function library is handled corresponding reduction handling procedure segment and is stored in two USB flash disks with the file of being cut apart and store, and is called by central processing unit (CPU) when file is synthetic.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310111168 CN1291328C (en) | 2003-12-11 | 2003-12-11 | Method and system for storing divided files and restoring treatment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310111168 CN1291328C (en) | 2003-12-11 | 2003-12-11 | Method and system for storing divided files and restoring treatment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1627275A CN1627275A (en) | 2005-06-15 |
CN1291328C true CN1291328C (en) | 2006-12-20 |
Family
ID=34759343
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200310111168 Expired - Fee Related CN1291328C (en) | 2003-12-11 | 2003-12-11 | Method and system for storing divided files and restoring treatment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1291328C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101276299B (en) * | 2007-03-30 | 2012-07-25 | 富士施乐株式会社 | Information processing system and information processing method |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100419760C (en) * | 2005-12-16 | 2008-09-17 | 北京中星微电子有限公司 | File segmenting method and device for FAT file system |
CN101320356B (en) * | 2008-07-14 | 2013-06-05 | 曹乃承 | Data storage method and device |
CN101968773A (en) * | 2009-07-28 | 2011-02-09 | 茂晖科技股份有限公司 | Data storage system with biometric protection and method thereof |
CN101651678B (en) * | 2009-09-11 | 2012-07-25 | 北京锐安科技有限公司 | Method and system for dynamically merging files and respectively executing merged PE files in network |
CN101976388A (en) * | 2010-10-25 | 2011-02-16 | 周守强 | Product anti-theft method and system |
CN102693399B (en) * | 2012-05-18 | 2015-05-27 | 朱晓阳 | System and method for on-line separation and recovery of electronic documents |
CN102790770B (en) * | 2012-07-24 | 2015-06-17 | 朱晓阳 | Electronic document concentrated preservation and takeout safety management system and method |
CN104298926B (en) * | 2013-07-19 | 2017-11-10 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus for running encryption file |
CN103365789B (en) * | 2013-08-08 | 2016-12-28 | 曹乃承 | The block of data storage device and FLASH storage device deletes block wiring method |
CN105631347B (en) * | 2014-10-27 | 2018-11-09 | 鸿富锦精密工业(深圳)有限公司 | File access method and client terminal device |
CN104601681A (en) * | 2014-12-31 | 2015-05-06 | 乐视网信息技术(北京)股份有限公司 | File fragmentation processing method and device |
CN104615944A (en) * | 2015-01-09 | 2015-05-13 | 天脉聚源(北京)科技有限公司 | Method and device for encrypting and decrypting files |
CN105046173A (en) * | 2015-07-02 | 2015-11-11 | 山东超越数控电子有限公司 | Fast and reliable design method for destroying SSD hard disk |
-
2003
- 2003-12-11 CN CN 200310111168 patent/CN1291328C/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101276299B (en) * | 2007-03-30 | 2012-07-25 | 富士施乐株式会社 | Information processing system and information processing method |
Also Published As
Publication number | Publication date |
---|---|
CN1627275A (en) | 2005-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1291328C (en) | Method and system for storing divided files and restoring treatment | |
CN1125564C (en) | Conditional access system and smartcard allowing such access | |
CN1122213C (en) | Method and apparatus for signing and sealing objects | |
CN1242323C (en) | Disorder source program, souce program conversion method and equipment, and source conversion program | |
CN1133935C (en) | Security system for protecting information stored in portable storage media | |
CN1193295C (en) | Distributed data archive device and system | |
CN100346255C (en) | Software copy right protecting method for extracting partial code to enciphed device from software | |
CN1216377C (en) | Information recording medium, method and apparatus for recording and regenerating information using said medium | |
CN100343844C (en) | Apparatus for data distribution and terminal for data distribution | |
CN1303514C (en) | Method for encrypting input and output of data to be hidden and apparatus thereof | |
CN1602600A (en) | Content processing apparatus and content protection program | |
CN1534655A (en) | Method and apparatus for encrypting input and output of data to be hidden | |
CN1866224A (en) | Mobile memory device and method for accessing encrypted data in mobile memory device | |
CN1977489A (en) | Content management method, content management program, and electronic device | |
CN1783038A (en) | Information leakage prevention method and apparatus and program for the same | |
CN1150850A (en) | Data exchange system comprising portable data processing units | |
CN1638327A (en) | Encryption device and program and method used along with the same | |
CN101038612A (en) | Method for generating licence and method and apparatus for providing contents using the same | |
CN1941691A (en) | Apparatus and method for generating data for detecting false alteration of encrypted data during processing | |
CN1991870A (en) | Preventing method and preventing system for data deletion | |
CN1717894A (en) | System and method for partially-encrypted data transmission and reception | |
CN1141707C (en) | Content information recording method and device | |
CN1698056A (en) | Content processing terminal, copy right management system, and method thereof | |
CN100340081C (en) | Pseudo-random squence generator and associated method | |
CN1430411A (en) | Image generation equipment and verification data generating method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20061220 Termination date: 20111211 |