CN1627275A - Method and system for storing divided files and restoring treatment - Google Patents

Method and system for storing divided files and restoring treatment Download PDF

Info

Publication number
CN1627275A
CN1627275A CN 200310111168 CN200310111168A CN1627275A CN 1627275 A CN1627275 A CN 1627275A CN 200310111168 CN200310111168 CN 200310111168 CN 200310111168 A CN200310111168 A CN 200310111168A CN 1627275 A CN1627275 A CN 1627275A
Authority
CN
China
Prior art keywords
file
usb flash
flash disk
cpu
reduction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200310111168
Other languages
Chinese (zh)
Other versions
CN1291328C (en
Inventor
甘国工
刘学明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200310111168 priority Critical patent/CN1291328C/en
Publication of CN1627275A publication Critical patent/CN1627275A/en
Application granted granted Critical
Publication of CN1291328C publication Critical patent/CN1291328C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention relates to a method and a system for file segmentation storage and recovery. Said method carries out segment storage and recovery process to the stored file F by the computer and a movable memory in the following steps: 1, segment storage step: a, generating a certified code, b, ciphering and segment process, 2, file merge and recovery process: a, examining if the memories A,B are connected with CPU of the computer, B, CPU fetches the certified codes FK(A) and FK(B) in said memories (A), (B) and deciphers them to recover the hardware sequence number FK(S2) and FK(S1) to examine if they are in pair, if not, CPU ejects from the file process program, if so, it enters into the following steps, C, CPU fetches files in said memories (A) (B) and connects them to a hard disk, d, CPU opens the packet to separate a deciphered function to merge it to the original file.

Description

Method and system with file division storage and reduction processing
Technical field:
The present invention is relevant with the method for secure storing and the system of computer data file, especially with computer documents to cut apart storage and method of reduction treatment and system relevant.
Background technology:
Computing machine significant data information is easy to divulge a secret carrying when going out, and needs to solve the protection problem at mobile data.More common computing machine mobile data safeguard measure is with the encryption of file through strictness, forms the ciphertext form, stores in the particular device, as notebook computer, USB flash disk, disk cartridge, floppy disk, CD etc.The deficiency of this measure is that in a single day the equipment of storing ciphertext lose, and the person of stealing secret information has only made just to decode surplus matter of time to ciphertext.The another kind of mobile data safeguard measure of extensively being paid close attention to be with needs carry the data file of going out carry out storing (and carrying by different people respectively) in the different memory devices respectively into after the dividing processing (file is divided into 2 or a plurality of unique file according to certain rule), when file uses; the data file that to cut apart storage earlier merges reduction, the file of being cut apart storage is returned to cut apart preceding normal condition.This series products is main carrier (storage is by the part of divided file) with notebook computer mostly, be equipped with other movable storage device again as assistant carrier (storage by another one of divided file), for example: 1. notebook computer (hard disk in)+another notebook computer (hard disk in); 2. notebook computer (hard disk in)+USB flash disk; 3. notebook computer (hard basis in)+disk cartridge; 4. notebook computer (hard disk in)+floppy disk or CD; 5. disk cartridge+another disk cartridge etc.These disposal routes have solved data to a great extent with device and have moved problem and compare the intensity that has improved safeguard protection with aforementioned non-file division scheme; but, still exist and go out to carry inconvenient defective because notebook computer or disk cartridge volume are bigger.
The content of invention:
The purpose of this invention is to provide a kind of various storage mediums that are applicable to, the method and system with file division storage and reduction processing easy to use, safe.
The present invention is achieved in that
The method and system that the present invention handles file division storage and reduction, this method are cut apart storage and reduction processing by what computing machine and at least one removable memory of being connected with computing machine were carried out storage file F, and its step is as follows:
(2) file division storing step:
A. generate authentication code:
System is required two authentication code FK (A), the FK (B) of spanned file F reduction at first, authentication code FK (A) comprises the hardware sequence number FK (S2) of storer (B), authentication code FK (B) comprises that hardware sequence number FK (S1), each authentication code of storer (A) comprise the file encryption processing accepted standard algorithmic code FK of institute (X)
B. encrypt and dividing processing:
The encryption program that system call FK (X) is corresponding, file F is divided into file (1) and file (2), packing is united with decipherment algorithm function F (f) program segment respectively in file (1), (2), form one or one group executable file (1A), (2B) that can unpack the operation restoring function voluntarily, file (1A) and authentication code FK (A) are deposited in the storer (A), file (2B) and authentication code FK (B) are deposited in the storer (B)
2, file merges the reduction treatment step:
A. check whether storer (A), (B) are connected with the CPU of computing machine,
B.CPU reads authentication code FK (A) and the FK (B) among storer (A), (B), and deciphering restores wherein contained hardware sequence number FK (S2) and FK (S1), checks whether it matches, and denys, and CPU withdraws from documentor, be then to enter following steps,
C.CPU reads file (1A), (2B) among storer (A), (B), and to connect be one to be stored in hard disc of computer,
D.CPU isolates decipherment algorithm function F (f) with this document folding bag, and CPU transfers it to finish the reverse conversion of file with it, and is finally synthetic and be recovered to source document F.
Storer (A), (B) can be two USB flash disks or disk cartridge or hard disk or CD or one and are activity store, and another is a permanent memory.
Each authentication code that generates also comprises password code FK (P), the file encryption processing accepted standard algorithmic code FK of institute (X) of file storage timing code FK (D), effective service life sign indicating number FK (T), file reduction.
CPU calls the corresponding encryption program of FK (X), file content is carried out shifting processing, processing is deposited in the piecemeal transposition, two parts file (1) and file (2) that file division after handling the most at last becomes can deposit respectively, the executable file (1A) that packing forms is united with decipherment algorithm function F (f) program in file (1), (2), (2B) with after authentication code FK (A), FK (B) deposit USB flash disk (A) and USB flash disk (B) respectively in, computing machine can be carried out the CPU removing and be stored in divided file (1), (2) and authentication code FK (A), FK (B) in the hard disc of computer.
When the file user needed merged file, its reduction treatment step was as follows:
1. USB flash disk A, B are inserted the main frame USB port simultaneously, CPU reads the authentication code FK (A) of USB flash disk A, B, and FK (B) isolates each independent element FK (D), FK (T), FK (P), FK (S2), FK (S1), FK (X) in this sign indicating number after the deciphering reduction,
2. the reading system current time, carry out validity with file access time FX (D) and file time limit FK (T) and judge, if exceeded the term of validity, then refusal is gone back original and is removed respective file and auto-destruct scratch file in the USB flash disk,
3. carry out the check and correction of FK (P) sign indicating number password by man-machine conversation's mode and user, if the password check and correction is unsuccessful, refusal is original also,
4. read USB flash disk (B) sequence number FK (S2),,, show that USB flash disk (A) and USB flash disk (B) do not match, then withdraw from the file reduction and handle if inconsistent with FK (S2) among the FK (A) consistance relatively,
5. read sequence number FK (S1) in the USB flash disk (A),,, then withdraw from the file reduction and handle if inconsistent with FK (S1) among the FK (B) consistance relatively.
By computing machine and two independently the USB flash disk storer form, two USB flash disk storeies are connected with the central processor CPU of computing machine by USB interface, installation file reduction processor software bag on the USB flash disk, installation file cutting processor software package and the file enciphering/deciphering that calls during for the work of file division processor and file reduction processor and cut apart/synthesize the processing function library on the hard disc of computer, this function library and file division processor are installed on the same hard disc of computer, the file encryption that comprises in this function library is handled corresponding reduction handling procedure segment and is stored in two USB flash disks with the file of being cut apart and store, and is called by central processing unit (CPU) when file is synthetic.
The present invention can adopt two independently common U disk memory devices, these two independently USB flash disk make it to match one to one by the dynamic connection processing of software, two independently USB flash disk be used for depositing respectively different piece by divided file, and by cross-certification mechanism between two USB flash disks, guarantees two independently USB flash disk only meeting normally carrying out of could realizing under " spouse " condition that the file merging reduces; A private file cutting processor (software package) that is installed in the common computer; Usually in USB flash disk that is stored in aforementioned indication and can call in the private file compositor (software package) of computer run; An and private file enciphering/deciphering that calls when the work for file division processor and file compositor and cut apart/synthesize the processing function library, this function library and file division processor are installed on one, include some different algorithm processor segments (function) of encrypting and cutting apart needs that realize in the function library, these program segments (function) can constantly increase as required to strengthen the processing power in this storehouse, the pairing reduction handling procedure of file encryption segment will be stored among two USB flash disks with the data of being cut apart and store in this storehouse after file division stores the USB flash disk storer into, and be called execution by computing machine when the needs file is synthetic.
The present invention has following characteristics:
1, adopt double-H groove weld dish mechanism storing movement data file, alleviated employee on business trip's burden, the security intensity that the significant data file is carried go out improves;
2, file reduction processor carries with USB flash disk, does not require that the computing machine that reduction is handled must be equipped with special process software, makes to use to have greater flexibility;
3, with specific retrieving algorithm program segment break away from cut apart with restore software with data file " one to one " packing, accomplish " realizing one secrete key for one file ";
4, adopt independently encryption and decryption function library mechanism, making can constantly increase as required to strengthen the processing power in this storehouse, and system processing power can constantly be increased with application;
5, file division adds man-hour, adopts " file pulverizing " intensity of Bit level (rather than byte level) that the data file is handled;
6, in cutting apart storing process, in divided file, add time sequence information and the time again source file is carried out hybrid coding behind the limit information;
7, during document storage, each divided file is produced two different authentication codes, this authentication code has comprised the sequence number of two USB flash disks that pairing uses, and the intersection of making USB flash disk deposits, and the intersection that forms authentication code generates and deposits;
8, when file uses, adopt the two-way authentication between spouse's USB flash disk, the foundation of authentication has comprised the sequence number information of the USB flash disk of pairing with it; When authentication was not inconsistent, refusal carried out the synthetic and decoding of file;
9, before file is synthetic, judge that according to the time limit factor that adds in the file file uses the phase of licensing that whether is in, the expired file that then do not carry out is synthetic.
10, the present invention also can adopt the mutual matching scheme between the different mobile memory mediums such as spouse's scheme of spouse's scheme of USB flash disk+one disk cartridge, disk cartridge+another disk cartridge in force except that the spouse's scheme that adopts between two USB flash disks.Equally, also can adopt between notebook computer and the mobile memory medium and even the scheme of mating between desktop computer and the mobile memory medium.
Description of drawings:
Fig. 1: the synoptic diagram of spouse's type USB flash disk file division system works principle
Wherein:
The data file that 1=is complete
2=is by divided file A part
3=is by divided file B part
4=U coils A
5=U coils B
The 6=hard disc of computer
7=text delivering path
8=authentication code delivering path
Fig. 2: file division stores processor process flow diagram
Fig. 3: file merges the reduction processing flow chart
Fig. 4: the machine code Storage Format of file my_file.txt content
Fig. 5: the result that file my_file.txt step-by-step is negated after handling illustrates
Fig. 6: file my_file.txt content byte internal shift result
Fig. 7: the back result is handled in transposition between file my_file.txt byte
Fig. 8: the result of file my_file.txt after by isometric cutting apart
Fig. 9 is a system construction drawing.
Embodiment:
The file division storing step is:
1, generates authentication code.The data file of selecting at the user of cutting apart storage, system is the required authentication code FK (FK (A) of USB flash disk A correspondence and the FK (B) of USB flash disk B correspondence) of spanned file F reduction at first, and authentication code FK done encryption, the number of this authentication code is corresponding with the file number after the decomposition, comprises file storage timing code FK (D) in each authentication code, effective service life sign indicating number (time limit sign indicating number) FK (T), two hardware sequence number FK (S1) and FK (S2) that USB flash disk is fixing, the password code FK (P) of file reduction, file encryption is handled accepted standard algorithmic code (internal number of the function) FK of institute (X).Wherein file storage timing code FK (D) got by the reading system current time; Effective service life sign indicating number (time limit sign indicating number) FK (T) is the fate that file effectively uses, and is given by operating personnel by man-machine conversation's mode; Fixing hardware sequence number FK (S1) and the FK (S2) of USB flash disk gets by the hardware sequence number that Automatic Program reads two USB flash disks; The password code FK (P) of file reduction is given by the operator by man-machine conversation's mode; File encryption is handled the accepted standard algorithmic code FK of institute (X) and is encrypted the code of the computing method that adopted for presents, also is the in-line coding of relevant treatment function in the system encryption function library, is determined by the ad hoc approach stochastic calculation by system;
2, file is encrypted and dividing processing.Its processing procedure is, calls the corresponding encryption program of FK (X), by computer documents " position " level to file content carry out shifting processing, processing is deposited in the piecemeal transposition, the two parts that can deposit respectively of the one-tenth of the file division after the processing the most at last.Concrete displacement is handled according to different FK (X) function decisions with piecemeal, and the document form after different FK (X) function is handled is all different.For example, the file content shifting processing may be with (the BYTE of elder generation's some " byte ", eight " positions " are arranged in one " byte ") some " position " carry out certain rule exchange (as the 3rd with first exchange, the 7th with the 5th the exchange etc.), " negate " then by turn (make " 0 " become " 1 ", " 1 " becomes " 0 "), and carry out the step-by-step circulation according to certain rule at this and move (the first moving to left by turn after joining with the tail position or the disposal route of right tail) byte; The transposition of file content piecemeal is deposited to handle and is meant according to certain rule and will be subdivided into plurality of small blocks by the file that move after handling " position ", and upset original sequencing, connect and form new document storage form (" mess code " that can't read by conventional method) according to new rule interblock again; For example, file is divided into 8 isometric pieces, the rule according to 1-3-5-7-2-4-6-8 connects then.Final file division handle be according to two U available disk spaces and X algorithm specific rule carry out.Can be to be divided into two files, to be divided into a plurality of files, or not isometric a plurality of files.
3, divided file 1 part and decipherment algorithm function F (f) (program segment) are united packing, form one or one group can unpack voluntarily the operation restoring function executable file (tail of file for ".Exe " file), deposit USB flash disk A in, divided file 2 parts and decipherment algorithm function (program segment) are united packing, form one or one group of executable file that can unpack voluntarily (tail of file for ".Exe " file), deposit USB flash disk B in.
4, the authentication code FK (A) that file 1 (or 1 group) is corresponding deposits USB flash disk A in, and the authentication code FK (B) that file 2 (or 2 groups) is corresponding deposits USB flash disk B in, and the intersection that forms authentication code is deposited.
5, intermediate results such as the source file in the scavenge system, divided file and all authentication codes.File division stores processor logic is referring to accompanying drawing 2.
When the file user needs file merge to use and during with the reducing program filename in the click USB flash disk, will move the reduction handling procedure that deposits in advance in the USB flash disk automatically.After determining to go back the title of original, the treatment step that file merges the reduction handling procedure is:
1, checks whether two pairing USB flash disks insert the main frame USB port simultaneously;
2, read authentication code FK (A) among the USB flash disk A, isolate each independent element FK (D), FK (T), FK (P), K (S2), FK (X) in this sign indicating number after the deciphering reduction;
3, the reading system current time, carry out validity with file access time FK (D) and file time limit FK (T) and judge, if exceeded the term of validity, then refusal is gone back original and is removed corresponding file and auto-destruct scratch file in the USB flash disk;
If imported also old password (judging that FK (P) is not sky) of file during 4 file division, then carry out the password check and correction by man-machine conversation's mode and user, if the password check and correction is unsuccessful, then refusal is gone back original, withdraws from the reduction duty;
5, read USB flash disk B sequence number S2, K (S2) the comparison consistance with among the FK (B) if inconsistent, shows that USB flash disk A and USB flash disk B do not match, and then withdraws from the file reduction and handles;
6, read authentication code FK (B) among the USB flash disk B, isolate each independent element FK (D), FK (T), FK (P), K (S1), FK (X) in this sign indicating number after the deciphering reduction;
7, read USB flash disk A sequence number S1, K (S1) the comparison consistance with among the FK (A) if inconsistent, shows that USB flash disk A and USB flash disk B do not match, and then withdraws from the file reduction and handles;
8, read file A among the USB flash disk A and the file B among the USB flash disk B, two files connect an integrally formed complete file;
9, call the file reducing program that obtains by unpacking, i.e. decipherment algorithm function F (f) is finished the reverse conversion of file, and is finally synthetic and restore source document.
10, eliminate all intermediate treatment results.
File merges the reduction processing logic referring to accompanying drawing 3.
The example explanation:
For further specifying the present invention, as follows especially exemplified by example.But content of the present invention is not limited only to content related among the embodiment.
Illustrate one: for ease of explanation, suppose that the object that needs to handle is a text-only file (a kind of file memory format), its file is called my_file.txt, and its length is 16 bytes, and content is " ABCD1234EFGH5678 " 16 characters.The machine code Storage Format of this document content is referring to accompanying drawing four.
Processing request: with the isometric two parts that are divided into of file my_file.txt, putting into sequence number respectively is two USB flash disks of (USB flash disk B) AZ908765342 for (U. coils A) WH2193456032 and sequence number, the file division time is on October 8th, 2003, the term of validity 10 days, file lost efficacy after on October 19th, 1.
Illustrate two: suppose that the given old password of going back is " 111111 ";
Illustrate three: supposition is adopted " | " character to the authentication code delimiter, this delimiter does not participate in conversion, encryption is only done step-by-step complementary operation (most significant digit (the 0th) do not participate in) conversion to 7 low levels of text word joint, the machine code that is about in each character byte is done the step-by-step inclusive-OR operation with " 01111111 ", make back 7 contents become " 0 " by " 1 ", " 0 " becomes " 1 ";
Illustrate four: supposition is FSC009 (it restores algorithmic function is FSF009) by the code of system by the decomposable process algorithmic function determined at random, and this function decomposable process algorithm is as follows:
The first step: the byte step-by-step is negated, and the step-by-step inclusive-OR operation is done in the machine code in each byte and " 11111111 ", makes content become " 0 " by " 1 ", and " 0 " becomes " 1 ";
Second step: the byte internal shift, with the transposition that circulates from right to left of the machine code in each byte;
The 3rd step: replace between byte, the machine code of per two adjacent byte is carried out parity bit exchange;
The 4th step: cut apart by isometric, file is divided into two parts.
Example one: authentication code FK generative process and deposit example in the cutting procedure of file my_file.txt.
Determining of process one: authentication code FK (A) and FK (B) key element.Wherein:
1, file storage timing code FK (D)=[20031008]
2, effective service life sign indicating number (time limit sign indicating number) FK (T)=[10]
3, fixing hardware sequence number FK (S1)=[WH2193456032] of USB flash disk A
4, fixing hardware sequence number FK (S2)=[AZ908765342] of USB flash disk B
5, password code FK (P)=[111111] of file reduction
6, file encryption is handled accepted standard algorithmic code (internal number of the function) FK of institute (X)=[FSC009]
Process two: authentication code FK (A) and FK (B) are synthetic to be handled, and its result is:
FK(A)=【|20031008|10|AZ908765342|111111|FSC009|】
(sequence number of noting USB flash disk B is put into FK (A))
FK (B)=[| 20031008 10|WH2193456032|111111|FSC009|] (sequence number of noting USB flash disk A is put into FK (B))
The encryption conversion of process three: authentication code FK (A) and FK (B), its result is:
FK(A)=【|KOOLNOOG?NO|>%FOGHIJLKM|NNNNNN|9,COOF|】
FK(B)=【|KOOLNOOG?NO|(7MNFLKJIOLM|NNNNNN|9,COOF|)
Process four: authentication code FK (A) and FK (B) deposit USB flash disk respectively in, and its result is:
FK (A) deposits USB flash disk A in
FK (B) deposits USB flash disk B in
Example two: file my_file.txt's cuts apart the process example by the bit level.
Process one: the byte-by-byte step-by-step of the file processing of negating.Result after negating compares with original text and changes fully, and its result is referring to accompanying drawing five.
Process two: the byte-by-byte internal shift of file is handled.Result after the shifting processing compares with the result of first pre-treatment and further change is arranged, and its result is referring to accompanying drawing six.
Process three: the transposition of file word internode is handled.Change the sequencing of file content by force, its result is referring to accompanying drawing seven.
Process four:, form my_file1.txt and my_file2.txt by isometric divided file.Its result is referring to accompanying drawing eight.
System of the present invention adopts independently common U disk memory device A and independently common U disk memory device B, deposit spouse's validation processor (software module) among USB flash disk A and the USB flash disk B with USB flash disk hardware characteristics sign indicating number " one to one ", this module includes and the corresponding registration code of USB flash disk hardware characteristics sign indicating number " one to one ", universal " spouse " connection processing device (software module), intersection writes the identifying code in the USB flash disk after pairing is handled.The good really system architecture of the present invention is referring to Figure of description 9.
Accompanying drawing 9: spouse's type USB flash disk storage system constitutes synoptic diagram, wherein:
1=U coils A
2=U coils B
The special use of 3=U dish A " spouse " validation processor
The special use of 4=U dish B " spouse " validation processor
5=is universal " spouse " the connection processing device
The hardware characteristics sign indicating number (=USB flash disk A registration code) of 6=U dish A
The hardware characteristics sign indicating number (=USB flash disk B registration code) of 7=U dish B
8=U coils A identifying code (corresponding to the hardware characteristics sign indicating number of USB flash disk B)
9=U coils B identifying code (corresponding to the hardware characteristics sign indicating number of USB flash disk A)
The 10=PC machine
11=PC machine usb 1
12=PC machine USB interface 2
13=PC machine internal memory
14=PC machine central processor CPU
15=PC machine hard disk

Claims (7)

1, a kind of method and system that file division storage and reduction are handled, this method are cut apart storage and reduction processing by what computing machine and at least one removable memory of being connected with computing machine were carried out storage file F, and its step is as follows:
(1) file division storing step:
A. generate authentication code:
System is required two authentication code FK (A), the FK (B) of spanned file F reduction at first, authentication code FK (A) comprises the hardware sequence number FK (S2) of storer (B), authentication code FK (B) comprises that hardware sequence number FK (S1), each authentication code of storer (A) comprise the file encryption processing accepted standard algorithmic code FK of institute (X)
B. encrypt and dividing processing:
The encryption program that system call FK (X) is corresponding, file F is divided into file (1) and file (2), packing is united with decipherment algorithm function F (f) program segment respectively in file (1), (2), form one or one group executable file (1A), (2B) that can unpack the operation restoring function voluntarily, file (1A) and authentication code FK (A) are deposited in the storer (A), file (2B) and authentication code FK (B) are deposited in the storer (B)
2, file merges the reduction treatment step:
A. check whether storer (A), (B) are connected with the CPU of computing machine,
B.CPU reads authentication code FK (A) and the FK (B) among storer (A), (B), and deciphering restores wherein contained hardware sequence number FK (S2) and FK (S1), checks whether it matches, and denys, and CPU withdraws from documentor, be then to enter following steps,
C.CPU reads file (1A), (2B) among storer (A), (B), and to connect be one to be stored in hard disc of computer,
D.CPU isolates decipherment algorithm function F (f) with this document folding bag, and CPU transfers it to finish the reverse conversion of file with it, and is finally synthetic and be recovered to source document F.
2, method according to claim 1 is characterized in that storer (A), (B) can be two USB flash disks or disk cartridge or hard disk or CD or one and be activity store, and another is a permanent memory.
3, method according to claim 1 is characterized in that each authentication code that generates also comprises password code FK (P), the file encryption processing accepted standard algorithmic code FK of institute (X) of file storage timing code FK (D), effective service life sign indicating number FK (T), file reduction.
4, method according to claim 1, it is characterized in that CPU calls the corresponding encryption program of FK (X), file content is carried out shifting processing, processing is deposited in the piecemeal transposition, two parts file (1) and file (2) that file division after handling the most at last becomes can deposit respectively, with file (1), (2) unite the executable file (1A) that packing forms with decipherment algorithm function F (f) program, (2B) with authentication code FK (A), after FK (B) deposited USB flash disk (A) and USB flash disk (B) respectively in, computing machine can be carried out CPU and remove the divided file (1) that is stored in the hard disc of computer, (2) and authentication code FK (A), FK (B).
5, method according to claim 3 is characterized in that when the file user needs merged file, and its reduction treatment step is as follows:
1. USB flash disk A, B are inserted the main frame USB port simultaneously, CPU reads the authentication code FK (A) of USB flash disk A, B, and FK (B) isolates each independent element FK (D), FK (T), FK (P), FK (S2), FK (S1), FK (X) in this sign indicating number after the deciphering reduction,
2. the reading system current time, carry out validity with file access time FX (D) and file time limit FK (T) and judge, if exceeded the term of validity, then refusal is gone back original and is removed respective file and auto-destruct scratch file in the USB flash disk,
3. carry out the check and correction of FK (P) sign indicating number password by man-machine conversation's mode and user, if the password check and correction is unsuccessful, refusal is original also,
4. read USB flash disk (B) sequence number FK (S2),,, show that USB flash disk (A) and USB flash disk (B) do not match, then withdraw from the file reduction and handle if inconsistent with FK (S2) among the FK (A) consistance relatively,
5. read sequence number FK (S1) in the USB flash disk (A),,, then withdraw from the file reduction and handle if inconsistent with FK (S1) among the FK (B) consistance relatively.
6, the system of method according to claim 1, it is characterized in that by computing machine and two independently the USB flash disk storer form, two USB flash disk storeies are connected with the central processor CPU of computing machine by USB interface, installation file reduction processor software bag on the USB flash disk, installation file cutting processor software package and the file enciphering/deciphering that calls during for the work of file division processor and file reduction processor and cut apart/synthesize the processing function library on the hard disc of computer, this function library and file division processor are installed on the same hard disc of computer, the file encryption that comprises in this function library is handled corresponding reduction handling procedure segment and is stored in two USB flash disks with the file of being cut apart and store, and is called by central processing unit (CPU) when file is synthetic.
CN 200310111168 2003-12-11 2003-12-11 Method and system for storing divided files and restoring treatment Expired - Fee Related CN1291328C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200310111168 CN1291328C (en) 2003-12-11 2003-12-11 Method and system for storing divided files and restoring treatment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200310111168 CN1291328C (en) 2003-12-11 2003-12-11 Method and system for storing divided files and restoring treatment

Publications (2)

Publication Number Publication Date
CN1627275A true CN1627275A (en) 2005-06-15
CN1291328C CN1291328C (en) 2006-12-20

Family

ID=34759343

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200310111168 Expired - Fee Related CN1291328C (en) 2003-12-11 2003-12-11 Method and system for storing divided files and restoring treatment

Country Status (1)

Country Link
CN (1) CN1291328C (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100419760C (en) * 2005-12-16 2008-09-17 北京中星微电子有限公司 File segmenting method and device for FAT file system
CN101320356A (en) * 2008-07-14 2008-12-10 曹乃承 Data storage method and device
CN101968773A (en) * 2009-07-28 2011-02-09 茂晖科技股份有限公司 Data storage system with biometric protection and method thereof
CN101976388A (en) * 2010-10-25 2011-02-16 周守强 Product anti-theft method and system
CN101651678B (en) * 2009-09-11 2012-07-25 北京锐安科技有限公司 Method and system for dynamically merging files and respectively executing merged PE files in network
CN102693399A (en) * 2012-05-18 2012-09-26 孙巍 System and method for on-line separation and recovery of electronic documents
CN102790770A (en) * 2012-07-24 2012-11-21 孙巍 Electronic document concentrated preservation and takeout safety management system and method
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
WO2015018332A1 (en) * 2013-08-08 2015-02-12 Cao Naicheng Block delete/block write method for data storage device and flash storage device
CN104601681A (en) * 2014-12-31 2015-05-06 乐视网信息技术(北京)股份有限公司 File fragmentation processing method and device
CN104615944A (en) * 2015-01-09 2015-05-13 天脉聚源(北京)科技有限公司 Method and device for encrypting and decrypting files
CN105046173A (en) * 2015-07-02 2015-11-11 山东超越数控电子有限公司 Fast and reliable design method for destroying SSD hard disk
CN105631347A (en) * 2014-10-27 2016-06-01 鸿富锦精密工业(深圳)有限公司 File storage method and client device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4259588B2 (en) * 2007-03-30 2009-04-30 富士ゼロックス株式会社 Information processing system and information processing program

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100419760C (en) * 2005-12-16 2008-09-17 北京中星微电子有限公司 File segmenting method and device for FAT file system
CN101320356B (en) * 2008-07-14 2013-06-05 曹乃承 Data storage method and device
CN101320356A (en) * 2008-07-14 2008-12-10 曹乃承 Data storage method and device
CN101968773A (en) * 2009-07-28 2011-02-09 茂晖科技股份有限公司 Data storage system with biometric protection and method thereof
CN101651678B (en) * 2009-09-11 2012-07-25 北京锐安科技有限公司 Method and system for dynamically merging files and respectively executing merged PE files in network
CN101976388A (en) * 2010-10-25 2011-02-16 周守强 Product anti-theft method and system
CN102693399B (en) * 2012-05-18 2015-05-27 朱晓阳 System and method for on-line separation and recovery of electronic documents
CN102693399A (en) * 2012-05-18 2012-09-26 孙巍 System and method for on-line separation and recovery of electronic documents
CN102790770A (en) * 2012-07-24 2012-11-21 孙巍 Electronic document concentrated preservation and takeout safety management system and method
CN102790770B (en) * 2012-07-24 2015-06-17 朱晓阳 Electronic document concentrated preservation and takeout safety management system and method
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN104298926B (en) * 2013-07-19 2017-11-10 腾讯科技(深圳)有限公司 A kind of method and apparatus for running encryption file
WO2015018332A1 (en) * 2013-08-08 2015-02-12 Cao Naicheng Block delete/block write method for data storage device and flash storage device
CN105631347A (en) * 2014-10-27 2016-06-01 鸿富锦精密工业(深圳)有限公司 File storage method and client device
CN105631347B (en) * 2014-10-27 2018-11-09 鸿富锦精密工业(深圳)有限公司 File access method and client terminal device
CN104601681A (en) * 2014-12-31 2015-05-06 乐视网信息技术(北京)股份有限公司 File fragmentation processing method and device
CN104615944A (en) * 2015-01-09 2015-05-13 天脉聚源(北京)科技有限公司 Method and device for encrypting and decrypting files
CN105046173A (en) * 2015-07-02 2015-11-11 山东超越数控电子有限公司 Fast and reliable design method for destroying SSD hard disk

Also Published As

Publication number Publication date
CN1291328C (en) 2006-12-20

Similar Documents

Publication Publication Date Title
CN1291328C (en) Method and system for storing divided files and restoring treatment
CN1125564C (en) Conditional access system and smartcard allowing such access
CN1122213C (en) Method and apparatus for signing and sealing objects
CN1242323C (en) Disorder source program, souce program conversion method and equipment, and source conversion program
CN1133935C (en) Security system for protecting information stored in portable storage media
CN1257648C (en) Multi-level, multi-dimensional content protection
CN1193295C (en) Distributed data archive device and system
CN1310463C (en) Method for tracing traitor receivers in a broadcast encryption system
CN1199389C (en) Method, device and medium for transfering and recording content information and decipher method and device
CN1216377C (en) Information recording medium, method and apparatus for recording and regenerating information using said medium
CN101040275A (en) Contents encryption method, system and method for providing contents through network using the encryption method
CN1602600A (en) Content processing apparatus and content protection program
CN1303514C (en) Method for encrypting input and output of data to be hidden and apparatus thereof
CN1977489A (en) Content management method, content management program, and electronic device
CN107004068B (en) Secure transmission of genomic data
CN1860471A (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
CN1697367A (en) A method and system for recovering password protected private data via a communication network without exposing the private data
CN1749915A (en) Software copy right protecting method for extracting partial code to enciphed device from software
CN1766529A (en) Navigation system
CN101038612A (en) Method for generating licence and method and apparatus for providing contents using the same
CN1717894A (en) System and method for partially-encrypted data transmission and reception
CN1941691A (en) Apparatus and method for generating data for detecting false alteration of encrypted data during processing
CN1991870A (en) Preventing method and preventing system for data deletion
CN1236582C (en) pseudo-random squence generator and associated method
CN1788245A (en) Digital rights management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20061220

Termination date: 20111211