CN1866225A - Mapping method for mobile memory device - Google Patents

Mapping method for mobile memory device Download PDF

Info

Publication number
CN1866225A
CN1866225A CN 200510073654 CN200510073654A CN1866225A CN 1866225 A CN1866225 A CN 1866225A CN 200510073654 CN200510073654 CN 200510073654 CN 200510073654 A CN200510073654 A CN 200510073654A CN 1866225 A CN1866225 A CN 1866225A
Authority
CN
China
Prior art keywords
encrypted partition
storage device
movable storage
user
partition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510073654
Other languages
Chinese (zh)
Other versions
CN100447765C (en
Inventor
杨宇光
李高强
王元成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB2005100736548A priority Critical patent/CN100447765C/en
Publication of CN1866225A publication Critical patent/CN1866225A/en
Application granted granted Critical
Publication of CN100447765C publication Critical patent/CN100447765C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosed mapping method for mobile storage device comprises: setting partition management program in the mobile storage device contained enciphered partition; when detecting mobile device, mapping the physical label for the device, and copying the management program into the computer to map the enciphered partition label and physical label, and fit to further manage partition and user, control access and read-write, etc. this invention improves data security.

Description

A kind of mapping method of movable storage device
Technical field
The present invention relates to the movable storage device field, be specifically related to a kind of mapping method of movable storage device.
Background technology
At present, movable storage device is widely used, as: portable hard drive etc.After being inserted into movable storage device on the computing machine, the user can carry out data read-write operation to movable storage device by computing machine.
In order to guarantee safety of data in the movable storage device, usually will be to the data encryption in the movable storage device.The mode of encrypting has multiple, and applying virtual disk technology is encrypted data usually at present.Before the data encryption in the movable storage device, the virtual disk software of specialty will be installed earlier on computers, the user can use this virtual disk software user password is encrypted and be provided with to the file in the movable storage device.And this virtual disk software is mapped as drive with the file in the movable storage device and is presented on the computer screen; Described operation system of computer then maps out the physics drive of this movable storage device and is presented on the computer screen.
The user is follow-up when the enciphered data in the described file of encrypting is read and write, and described virtual disk software can during sense data, be decrypted these data earlier from this document folder at computing machine, will finish decrypted data afterwards again and be presented on the computer screen; Equally, described virtual disk software can be encrypted these data earlier when computing machine writes data in described encryption folder, will finish ciphered data afterwards again and write this document folder.
As seen, as long as the user carries out read-write operation to the enciphered data in the described file of encrypting, will guarantee that described virtual disk software is in opening, guaranteeing that this document folder can be mapped as drive and normally is presented on the computer screen, and guarantee that the data encrypting and deciphering operation in the described data read-write operation process can normally carry out.
Have again, when the enciphered data in the user will be to movable storage device in certain encryption folder is carried out read-write operation, the drive that will choose this document to be clipped in earlier to show on the computer screen and to computing machine input user password.If the user password of input is correct, the user then can land the pairing file of this drive, and then can carry out read-write operation to the enciphered data in this document folder; Otherwise the user can't land the pairing file of this drive, also just can not carry out read-write operation to the enciphered data in this document folder.
By the above as seen, the present virtual disk technology of using specialty relatively, the user must have to a certain degree understanding to this technology, could use this technology the enciphered data in the movable storage device is carried out read-write operation.And in fact; most of users do not understand this technology; this makes the user be difficult to use this technology that the enciphered data in the movable storage device is carried out read-write operation; even the user can use this technology that the enciphered data in the movable storage device is carried out read-write operation; damage also through regular meeting's error in operation in the read-write operation process, even to the data in the movable storage device.
Have again, map out the physics drive and be presented on the computer screen because operation system of computer is a movable storage device, make that the user can be by selecting this physics drive so that the content in the next stage catalogue is operated, the content in this catalogue then comprises the encryption folder in the movable storage device.If it is its file of encrypting in order to guarantee data security that the user forgets this encryption folder, then probably when the content of arrangement movable storage device, this encryption folder is deleted.This can cause the user deleting the data that oneself will protect unintentionally.
Such as: after the user inserted computing machine with movable storage device, operation system of computer mapped out the physics drive I of movable storage device, and physics drive I is presented on the computer screen.When the user uses virtual disk software that the file A in this movable storage device and file B are carried out the data encryption operation, this virtual disk software is mapped as drive A, drive B respectively with file A, file B, and drive A, drive B are presented on the computer screen.Like this, just show physics drive I, drive A and drive B on the computer screen simultaneously.
When the user chooses physics drive I in modes such as mouse double-clicks, then demonstrate the content in the next stage catalogue of physics drive I on the computer screen, the content in this catalogue is include file folder A and file B then.If it is the file of encrypting in order to guarantee data security that the user forgets file A and file B; then probably when the content of arrangement movable storage device, file A or file B are deleted, cause the user deleting the data that oneself will protect unintentionally by mistake.
As seen; the present movable storage device mapping method of using; except the file in the movable storage device is mapped as drive and is presented on the computer screen; also be movable storage device mapping physical drive and being presented on the computer screen; cause the user probably deleting the data that to protect unintentionally by mistake; reduce data security, also reduced user satisfaction.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of mapping method of movable storage device, to improve data security, improves user satisfaction.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention discloses a kind of mapping method of movable storage device, this method is provided with PARTMGR in comprising the movable storage device of encrypted partition, and mapping process may further comprise the steps:
When a. computer operating system has detected the movable storage device insertion, map out the physics drive of this movable storage device, and copy in this computing machine described PARTMGR and operation;
B. described PARTMGR maps out the encrypted partition drive of this movable storage device, and the described physics drive that maps out among the hiding step a.
Described PARTMGR is based on automatic operation Autorun programming, and the method that this PARTMGR is copied in the described computing machine is:
Computing machine moves the Autorun program automatically, will copy to based on the PARTMGR of this programming in the data storage device of computing machine self.
The process of shining upon described encrypted partition drive comprises: described PARTMGR is searched the encrypted partition title in the described encrypted partition data structure, maps out the encrypted partition drive with this title.
The method of hiding the described physics drive map out is: described PARTMGR is searched the movable storage device drive and is shown list item in the registration table of computing machine, the value of this list item is revised as by the original pairing value of demonstration drive hides the pairing value of drive.
This method further comprises:
Pull out when described computer operating system detects described movable storage device, then delete the described physics drive of mapping once, and delete the described encrypted partition drive of mapping once by described PARTMGR.
This method further comprises: described PARTMGR is when having movable storage device to insert, judge whether this movable storage device is encryption device, if, this PARTMGR then maps out the encrypted partition drive of this movable storage device and shows, the physics drive of this movable storage device that hiding again computer operating system maps out.
Described PARTMGR comprises subregion virtual module, retrieval subroutine and physics drive at least and hides module;
Described computing machine is at copy during PARTMGR, further will retrieve in the automatic running program group that subroutine adds this computing machine;
Retrieval subroutine during described computer starting in the operation automatic running program group, this retrieval subroutine judges whether the movable storage device that is inserted into computing machine is encryption device, if, then map out the encrypted partition drive of this movable storage device and show, hide the physics drive that module is hidden this movable storage device that computer operating system maps out by the physics drive again by the subregion virtual module.
The method that the retrieval subroutine is carried out described judgement is:
The retrieval subroutine is searched the encrypted partition data structure in described movable storage device, if find the encrypted partition data structure, the retrieval subroutine determines that then this movable storage device is an encryption device; Otherwise the retrieval subroutine determines that then this movable storage device is not an encryption device.
Described PARTMGR further comprises the partition management module, and this method further comprises:
Described partition management module receives the establishment order that comprises the encrypted partition data structure, judges whether the encrypted partition size that this data structure comprises has surpassed the free space of described movable storage device, if surpass, computing machine then sends false alarm; If do not surpass, the partition management module is then created encrypted partition according to the described data structure that receives in this movable storage device; The partition management module is set up corresponding relation and is stored in this movable storage device between each data structure that receives, also mapped out the drive and the demonstration of the encrypted partition of establishment by described subregion virtual module; Or,
Described partition management module receives the deletion encrypted partition order that comprises encrypted partition user name and encrypted partition user cipher, obtain the identical pairing encrypted partition user cipher of storing in the movable storage device of encrypted partition user name of encrypted partition user name that comprises with this order, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, the partition management module is then sent false alarm; If it is identical, the partition management module is then deleted the encrypted partition that has described user name in the described movable storage device, also delete the described encrypted partition user name of storing in this movable storage device and the data structure of this user name correspondence, and the deletion of the drive of this encrypted partition that will map out.
Described PARTMGR further comprises user management module, and this method further comprises:
Described user management module receives revises the order of encrypted partition user cipher, and this order comprises the current user cipher of encrypted partition user name, encrypted partition and the new user cipher of encrypted partition; The identical pairing encrypted partition user cipher of encrypted partition user name of encrypted partition user name that comprises with this modification encrypted partition user cipher order that this user management module is obtained the storage of described movable storage device, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, user management module is then sent false alarm; If identical, user management module then is updated to the described encrypted partition user cipher in this movable storage device the new user cipher of described encrypted partition; Or,
Described user management module receives the deletion user command that comprises encrypted partition user name and encrypted partition user cipher, the identical pairing encrypted partition user cipher of encrypted partition user name of encrypted partition user name that comprises with this deletion user command that obtains the storage of described movable storage device, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, user management module is then sent false alarm; If identical, user management module is then with described encrypted partition user name in this movable storage device and corresponding encrypted partition user cipher deletion; Or,
Described user management module receives and comprises the encrypted partition title, the newly-built user command of encrypted partition user name and encrypted partition user cipher, in described movable storage device, search the identical encrypted partition title of encrypted partition title that comprises with this newly-built user command, and the encrypted partition title that is finding, set up corresponding relation between encrypted partition user name that the data structure of this encrypted partition title correspondence and newly-built user command comprise and the encrypted partition user cipher, again this encrypted partition user name and encrypted partition user cipher are stored in the described movable storage device.
Described PARTMGR further comprises access control module, read-write control module, cancellation encrypted partition functional module and factory reset module, and this method further comprises:
Described access control module is received and is shown to send after the drive contents command and land prompting, and after receiving encrypted partition user name and encrypted partition user cipher, obtain the pairing encrypted partition user cipher of encrypted partition user name identical in the described movable storage device with the encrypted partition user name of receiving, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, access control module then sends false alarm; If identical, then map out content in the described encrypted partition next stage catalogue by the subregion virtual module; Or,
Described read-write control module is read computer operating system by described encrypted partition data decryption shows and finishes decrypted data; Also computer operating system to be write the data encryption of described encrypted partition, will finish ciphered data again and write this encrypted partition; Or,
Described cancellation encrypted partition functional module receives the order of cancellation encrypted partition, deletes all the encrypted partition data structures in the described movable storage device; Or,
Described factory reset module receives the factory reset order, deletes all encrypted partitions and corresponding encrypted partition data structure in the described movable storage device; The factory reset module is also searched the encrypted partition data structure that self sets in advance, and creates encrypted partition according to this data structure in this movable storage device.
Compared with prior art, the mapping method of movable storage device provided by the present invention, in comprising the movable storage device of encrypted partition, PARTMGR is set, when computer operating system has detected the movable storage device insertion, map out the physics drive of this movable storage device, and copy in this computing machine described PARTMGR and operation; Described PARTMGR maps out the encrypted partition drive of this movable storage device, and hides the described physics drive that maps out.The present invention can obviously improve data security, improves user satisfaction.
Description of drawings
Fig. 1 is the movable storage device mapping process flow diagram of a preferred embodiment of the present invention;
Fig. 2 is the movable storage device mapping process flow diagram of another preferred embodiment of the present invention.
Embodiment
Below in conjunction with drawings and the specific embodiments to the detailed description of the invention.
Focusing on of the inventive method: in comprising the movable storage device of encrypted partition, PARTMGR is set, when computer operating system has detected the movable storage device insertion, map out the physics drive of this movable storage device, and copy in this computing machine described PARTMGR and operation; Described PARTMGR maps out the encrypted partition drive of this movable storage device, and hides the described physics drive that maps out.
In addition, the PARTMGR that copies in the computing machine further can carry out bookkeepings such as partition management, user management, access control, read-write control, cancellation encrypted partition function and factory reset to the encrypted partition in the movable storage device.
Referring to Fig. 1, Fig. 1 is the movable storage device mapping process flow diagram of a preferred embodiment of the present invention, and this flow process may further comprise the steps:
Step 101: in movable storage device, set in advance encrypted partition, encrypted partition information and the PARTMGR that to protect, the encrypted partition of creating when preserving this movable storage device in this PARTMGR and the dispatching from the factory information of dispatching from the factory.
Described encrypted partition information is to be used for data structure that the encrypted partition that described movable storage device is provided with is described, and this data structure is kept in this movable storage device with the form of encrypted partition tabulation usually; The described encrypted partition information of dispatching from the factory then is the data structure that set encrypted partition is described when being used for movable storage device just dispatched from the factory, and this data structure is kept in the described PARTMGR with the form of encrypted partition initial list usually.
Also comprise software modules such as subregion virtual module, the hiding module of physics drive, partition management module, user management module, access control module, read-write control module, cancellation encrypted partition functional module and factory reset module in the described PARTMGR.This PARTMGR is to be used for software that described encrypted partition is managed, and the encrypted partition information in the different movable storage devices might be different, but the PARTMGR in the different movable storage devices all is identical usually.
Described encrypted partition exists with the encrypt file form usually, and the mode that this encrypted partition is set is normally created at least one file in described movable storage device, can think that each file is exactly an encrypted partition.
As previously mentioned, encrypted partition information and the encrypted partition information of dispatching from the factory all is to be used for data structure that encrypted partition is described, such as: the size of encrypted partition, encrypted partition title, encrypted partition path, the user name of encrypted partition and the data structures such as user cipher of encrypted partition in described movable storage device.The encrypted partition title is consistent with this encrypted partition drive that computing machine maps out usually.
At the encrypted partition with the setting of encrypt file form, this encrypted partition information comprises: the data structures such as user cipher of the size of encrypt file, encrypt file title, encrypt file path, encrypt file user name and the encrypt file in described movable storage device.
When on the external interface that described movable storage device is inserted a computing machine, this Interface status can become connection status by original not-connected status.Because this computing machine is checked the external interface state of self constantly,, inserts by computing machine so can having detected movable storage device by above-mentioned state variation.
At this moment, computing machine copies the PARTMGR in the movable storage device that inserts in the data storage devices such as hard disk in the computing machine to.The mode of copy has multiple, be generally: with automatic operation (Autorun) programming of described PARTMGR based on the support of operating systems such as present Windows, when described movable storage device inserts computing machine, Autorun program in this movable storage device of this computer automatic execution will copy in the data storage device of computing machine based on the described PARTMGR of this Autorun programming.
Described PARTMGR also comprises the retrieval subroutine, computing machine is when this PARTMGR of copy, also this retrieval subroutine is added in the automatic running program group of computer operating system, all this retrieval subroutine can be called in internal memory when guaranteeing that this computing machine is started shooting at every turn, to move this retrieval subroutine.This retrieval subroutine is used to support computing machine to judge whether the movable storage device that inserts is encryption device.
Step 102: operation system of computer maps out the physics drive of described movable storage device, subregion virtual module in the described partition management module is then searched the encrypted partition title in the encrypted partition data structure of this movable storage device, and maps out the respective encrypted subregion drive with this title.And described physics drive and encrypted partition drive that computing machine also will map out are presented on the computer screen.The method of shining upon described physics drive is identical with the method for the described encrypted partition drive of mapping.
In fact, shining upon described this operation of physics drive is the operation that present computer operating system automatically performs, that is: when the external interface of knowing self had inserted movable storage device, operation system of computer mapped out the physics drive of this movable storage device.
Step 103: computing machine stashes the physics drive of the movable storage device that maps out.The method of hiding described physical disks symbol has multiple, be generally: the physics drive in the described PARTMGR is hidden module and search movable storage device drive demonstration list item in the registration table of computing machine, the value of this list item is revised as the hiding pairing value of drive by the original pairing value of demonstration drive, as: will show that drive pairing 1 is revised as hiding drive pairing 0.Like this, the described physics drive that maps out just can not be presented on the computer screen.
After having finished aforesaid operations; because computer screen has finally only demonstrated the encrypted partition drive of described movable storage device; so the user can only operate this encrypted partition drive; and can't the content in the next stage catalogue of hiding described physics drive or this physics drive be operated; this makes the data content in the described encrypted partition obtain protection, and data security is significantly improved.
Such as: after the user inserted computing machine with movable storage device, operation system of computer mapped out the physics drive I of movable storage device, and physics drive I is presented on the computer screen; And described PARTMGR is mapped as drive A, drive B respectively to encrypted partition A and the encrypted partition B that is pre-created in this movable storage device, and drive A, drive B are presented on the computer screen; Simultaneously, described PARTMGR stashes the physics drive I that maps out.
Like this, just show drive A and drive B on the computer screen, and can not show physics drive I; And, because physics drive I is short to the time compole being hidden from being presented at first on the computer screen, so the user can not have an opportunity to see physics drive I.At this moment, the user can only operate drive A and the drive B that shows on the computer screen, and can't carry out any operation to the physics drive I that hides.
Certainly, owing to demonstrated the encrypted partition drive of described movable storage device on the computer screen, so the user can operate the content in the next stage catalogue of this drive and this drive.Operations such as user's modification that the encrypted partition content is carried out at this moment, deletion all are conscious data management operations, and have different character with aforesaid mistake deletion action.
Computing machine is checked the external interface state of self constantly, if described movable storage device is pulled out from computing machine, computing machine knows that then the external interface state of self becomes not-connected status by original connection status.At this moment, the described encrypted partition drive that the deletion of the PARTMGR of the storage in the computing machine maps out, operation system of computer is then deleted the physics drive of this movable storage device that has shone upon but stashed.
Described above is the situation of for the first time described movable storage device being inserted computing machine, if after having pulled out this movable storage device from described computing machine, again this movable storage device is inserted this computing machine, situation as shown in Figure 2 then can appear, Fig. 2 is the movable storage device mapping process flow diagram of another preferred embodiment of the present invention, and this flow process may further comprise the steps:
Step 201: when described movable storage device inserted the external interface of computing machine, this COMPUTER DETECTION was to there being movable storage device to insert.
Step 202: computing machine judges whether the movable storage device that inserts is encryption device, if encryption device then enters step 204; If not encryption device, then enter step 203.
The method of described judgement has multiple, be generally: the retrieval subroutine that computing machine calls self storage is searched the encrypted partition sign in the movable storage device of insertion, if computer searching to described encrypted partition sign, determines that then described movable storage device is an encryption device; If computing machine does not find described encrypted partition sign, determine that then described movable storage device is not an encryption device.The encrypted partition tabulation that will be stored in usually in the described movable storage device identifies as described encrypted partition.
Step 203: operation system of computer as the generic storage device processes, maps out movable storage device the physics drive of this movable storage device and is presented on the computer screen process ends.
Step 204: operation system of computer maps out the physics drive of described movable storage device and is presented on the computer screen, and the subregion virtual module in the described PARTMGR then maps out the drive of the encrypted partition in the movable storage device and is presented on the computer screen.
Step 205: the physics drive in the described PARTMGR is hidden module the described physics drive that maps out in the step 204 is stashed.
Step 206: computing machine judges whether self stores complete PARTMGR, if store complete PARTMGR, then process ends; Otherwise, enter step 207.Described determination methods is generally: all program modules that the PARTMGR of computer searching self storage comprises, all program module titles that the title of the program module that relatively finds and self set in advance, if the title of the program module that finds is identical with the program module title that is provided with respectively, computing machine then determines self to store complete PARTMGR; Otherwise computing machine determines that then the PARTMGR of self storing is imperfect.
Step 207: computing machine copies the PARTMGR in the described movable storage device, and upgrades the described PARTMGR of self storing in modes such as coverings with the PARTMGR of copy.
As seen; flow process shown in Fig. 2 can guarantee that equally computer screen finally only demonstrates the encrypted partition drive of described movable storage device; so the user can only operate this encrypted partition drive; and can't the content in the next stage catalogue of hiding described physics drive or this physics drive be operated; this makes the data content in the described encrypted partition obtain protection, and data security is significantly improved.
Except the operation of described hiding movable storage device physics drive, computing machine can also be used the PARTMGR that once copied and the encrypted partition in the described movable storage device be carried out bookkeepings such as partition management, user management, access control, read-write control, cancellation encrypted partition function and factory reset.
For described partition management operation, this partition management operation can be divided into creates encrypted partition and deletion encrypted partition.
When creating encrypted partition, the user comprises the establishment order of encrypted partition data structure to computing machine input, and this data structure is generally: the size of encrypted partition, encrypted partition title, encrypted partition path, the user name of encrypted partition and the user cipher of encrypted partition etc. in described movable storage device.
After the partition management module that PARTMGR in the computing machine comprises is received and is created order, judge whether the described encrypted partition size of input has surpassed the free space of movable storage device, if surpass, the partition management module is then sent false alarm in modes such as dialog box or warning tones to the user, further can also eject prompting frame, require the user to re-enter the data structure of the encrypted partition that will create; If do not surpass, the partition management module is then created encrypted partition according to the described data structure that receives with forms such as files in described movable storage device, send establishment in modes such as dialog boxes to the user afterwards and successfully point out.
Certainly, the partition management module also will be upgraded the encrypted partition data structure of storage in the encrypted partition tabulation, and concrete update method is: set up corresponding relation and be stored in this encrypted partition tabulation between the data structure of the described encrypted partition that will create that receives.And the drive of the encrypted partition of the establishment that also will be made new advances by the subregion virtual module mapping that described partition management module comprises also is presented on the computer screen.
When deleting encrypted partition, the user comprises the deletion encrypted partition order of encrypted partition user name and encrypted partition user cipher to the computing machine input, after the partition management module that PARTMGR in the computing machine comprises is received this deletion encrypted partition order, obtain the identical pairing encrypted partition user cipher of storing in the movable storage device of encrypted partition user name of encrypted partition user name that comprises with this deletion encrypted partition order mode such as to read, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, the partition management module is then sent false alarm in modes such as dialog box or warning tones to the user; If identical, the partition management module is then deleted the encrypted partition that has described user name in the described movable storage device, sends deletion in modes such as dialog boxes to the user afterwards and successfully points out.
Certainly, the partition management module also will be upgraded the encrypted partition data structure of storage in the encrypted partition tabulation, and concrete update method is: the described encrypted partition user name of storage and other data structure of this user name correspondence in the tabulation of deletion encrypted partition.And the partition management module is deleted the drive that deleted this encrypted partition mapped out.
For described user management operation, this user management operation can be divided into revises encrypted partition user cipher, deletion user and newly-built user.
When revising the encrypted partition user cipher, the user revises the order of encrypted partition user cipher to the computing machine input, this order comprises the encrypted partition user name, the new user cipher of user cipher that encrypted partition is current and encrypted partition, after the user management module that PARTMGR in the computing machine comprises is received this modification encrypted partition user cipher order, with the identical pairing encrypted partition user cipher of encrypted partition user name of encrypted partition user name that comprises with this order that reads etc. that mode obtains storage in the encrypted partition tabulation of movable storage device, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, user management module is then sent false alarm in modes such as dialog box or warning tones to the user; If identical, user management module then is updated to the described encrypted partition user cipher of storage in the encrypted partition tabulation the new user cipher of described encrypted partition, sends the modification user cipher in modes such as dialog boxes to the user afterwards and successfully points out.
When deleting the user, the user comprises the deletion user command of encrypted partition user name and encrypted partition user cipher to the computing machine input, after the user management module that PARTMGR in the computing machine comprises is received this deletion user command, with the identical pairing encrypted partition user cipher of encrypted partition user name of encrypted partition user name that comprises with this deletion user command that reads etc. that mode obtains storage in the encrypted partition tabulation of movable storage device, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, user management module is then sent false alarm in modes such as dialog box or warning tones to the user; If identical, user management module then with the described encrypted partition user name of storage in the encrypted partition tabulation and corresponding encrypted partition user cipher deletion, is sent the deletion user in modes such as dialog boxes to the user afterwards and is successfully pointed out.
Like this, just no longer corresponding any one user of this encrypted partition.
Will be when not having the newly-built user of encrypted partition of corresponding Any user, the user comprises the encrypted partition title to the computing machine input, the newly-built user command of encrypted partition user name and encrypted partition user cipher, after the user management module that PARTMGR in the computing machine comprises is received this newly-built user command, in the encrypted partition tabulation of movable storage device, search the identical encrypted partition title of encrypted partition title that comprises with this newly-built user command, and the encrypted partition title that is finding, set up corresponding relation between encrypted partition user name that the data structure of this encrypted partition title correspondence and newly-built user command comprise and the encrypted partition user cipher, again this encrypted partition user name and encrypted partition user cipher are stored in the described encrypted partition tabulation, send newly-built user in modes such as dialog boxes to the user afterwards and successfully point out.
For described access control operation, the user can double-click modes such as encrypted partition drive by mouse and select the encrypted partition drive that maps out, at this moment, the access control module that PARTMGR in the computing machine comprises can receive and show the drive contents command, access control module then sends to the user in modes such as dialog boxes and lands prompting, and the user is according to landing prompting input encrypted partition user name and encrypted partition user cipher.After access control module is received this encrypted partition user name and encrypted partition user cipher, obtain the identical pairing encrypted partition user cipher of encrypted partition user name of the encrypted partition user name with receiving of storage in the encrypted partition tabulation of movable storage device mode such as to read, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, access control module then sends false alarm in modes such as dialog box or warning tones to the user; If identical, then by the mapping of described subregion virtual module and demonstrate content in the described encrypted partition next stage catalogue.
After computing machine demonstrates content in the described encrypted partition next stage catalogue, the user just can by computing machine to the content in this catalogue make amendment, read-write operation such as deletion.Because the data content in the encrypted partition all is through encrypting, so the read-write control module that the PARTMGR in the computing machine comprises will be read and write control to this encrypted partition, the mode of reading and writing control is generally: computing machine is during from the encrypted partition sense data, the read-write control module is decrypted these data earlier, will finish decrypted data afterwards again and be presented on the computer screen; Equally, computing machine will be when encrypted partition writes data, and the read-write control module is encrypted these data earlier, will finish ciphered data afterwards again and write encrypted partition.
For cancellation encrypted partition function, the user is to the command function of computing machine input cancellation encrypted partition, after the cancellation encrypted partition functional module that PARTMGR in the computing machine comprises is received this cancellation encrypted partition command function, the encrypted partition tabulation in the deletion movable storage device.Like this, PARTMGR is follow-up when this movable storage device is carried out any operation, all can determine that this movable storage device is a common memory device because of finding the encrypted partition tabulation.
For factory reset, the user is to computing machine input factory reset order, after the factory reset module that PARTMGR in the computing machine comprises is received this factory reset order, delete all encrypted partitions in the described movable storage device and all data structures in the corresponding encrypted partition tabulation, and search encrypted partition initial list in the PARTMGR, in this movable storage device, create corresponding encrypted partition according to the encrypted partition factory data structure that this tabulation comprises.The method of using when the method for the establishment encrypted partition of Ying Yonging is with aforesaid establishment encrypted partition here is identical.Particularly, described encrypted partition initial list is arranged in the factory reset module usually.
Have, the factory reset module also will be stored in the data structure in the encrypted partition initial list in the described encrypted partition tabulation again.
Certainly, because described factory reset operation will be deleted the encrypted partition in the described movable storage device, so might make user data impaired, therefore after computing machine is received described factory reset order, can further confirm to eject mode request users such as dialog box, if the user sends acknowledge message by clicking modes such as ACK button to computing machine, the factory reset module is then carried out above-mentioned deletion encrypted partition, is created the encrypted partition operation after receiving this message.
As seen, the user can carry out multiple bookkeepings such as partition management, user management, access control, read-write control, cancellation encrypted partition function and factory reset by computing machine to the encrypted partition in the described movable storage device, make the data of user in can managing encrypted flexibly and comfortably subregion; And, when the user carries out read-write operation to the data in the encrypted partition, no longer needing to use the virtual disk software of specialty, this makes described data read-write operation become very simple, and then can obviously improve user satisfaction.
By the above as can be seen, the mapping method of movable storage device provided by the present invention has improved data security, has improved user satisfaction.

Claims (11)

1, a kind of mapping method of movable storage device is characterized in that, this method is provided with PARTMGR in comprising the movable storage device of encrypted partition, and mapping process may further comprise the steps:
When a. computer operating system has detected the movable storage device insertion, map out the physics drive of this movable storage device, and copy in this computing machine described PARTMGR and operation;
B. described PARTMGR maps out the encrypted partition drive of this movable storage device, and the described physics drive that maps out among the hiding step a.
2, the method for claim 1 is characterized in that, described PARTMGR is based on automatic operation Autorun programming, and the method that this PARTMGR is copied in the described computing machine is:
Computing machine moves the Autorun program automatically, will copy to based on the PARTMGR of this programming in the data storage device of computing machine self.
3, the method for claim 1 is characterized in that, the process of shining upon described encrypted partition drive comprises: described PARTMGR is searched the encrypted partition title in the described encrypted partition data structure, maps out the encrypted partition drive with this title.
4, the method for claim 1, it is characterized in that, the method of hiding the described physics drive map out is: described PARTMGR is searched the movable storage device drive and is shown list item in the registration table of computing machine, the value of this list item is revised as by the original pairing value of demonstration drive hides the pairing value of drive.
5, the method for claim 1 is characterized in that, this method further comprises:
Pull out when described computer operating system detects described movable storage device, then delete the described physics drive of mapping once, and delete the described encrypted partition drive of mapping once by described PARTMGR.
6, method as claimed in claim 5, it is characterized in that, this method further comprises: described PARTMGR is when having movable storage device to insert, judge whether this movable storage device is encryption device, if, this PARTMGR then maps out the encrypted partition drive of this movable storage device and shows, the physics drive of this movable storage device that hiding again computer operating system maps out.
7, method as claimed in claim 6 is characterized in that, described PARTMGR comprises subregion virtual module, retrieval subroutine and physics drive at least and hides module;
Described computing machine is at copy during PARTMGR, further will retrieve in the automatic running program group that subroutine adds this computing machine;
Retrieval subroutine during described computer starting in the operation automatic running program group, this retrieval subroutine judges whether the movable storage device that is inserted into computing machine is encryption device, if, then map out the encrypted partition drive of this movable storage device and show, hide the physics drive that module is hidden this movable storage device that computer operating system maps out by the physics drive again by the subregion virtual module.
8, method as claimed in claim 7 is characterized in that, the method that the retrieval subroutine is carried out described judgement is:
The retrieval subroutine is searched the encrypted partition data structure in described movable storage device, if find the encrypted partition data structure, the retrieval subroutine determines that then this movable storage device is an encryption device; Otherwise the retrieval subroutine determines that then this movable storage device is not an encryption device.
9, method as claimed in claim 8 is characterized in that, described PARTMGR further comprises the partition management module, and this method further comprises:
Described partition management module receives the establishment order that comprises the encrypted partition data structure, judges whether the encrypted partition size that this data structure comprises has surpassed the free space of described movable storage device, if surpass, computing machine then sends false alarm; If do not surpass, the partition management module is then created encrypted partition according to the described data structure that receives in this movable storage device; The partition management module is set up corresponding relation and is stored in this movable storage device between each data structure that receives, also mapped out the drive and the demonstration of the encrypted partition of establishment by described subregion virtual module; Or,
Described partition management module receives the deletion encrypted partition order that comprises encrypted partition user name and encrypted partition user cipher, obtain the identical pairing encrypted partition user cipher of storing in the movable storage device of encrypted partition user name of encrypted partition user name that comprises with this order, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, the partition management module is then sent false alarm; If it is identical, the partition management module is then deleted the encrypted partition that has described user name in the described movable storage device, also delete the described encrypted partition user name of storing in this movable storage device and the data structure of this user name correspondence, and the deletion of the drive of this encrypted partition that will map out.
10, method as claimed in claim 8 is characterized in that, described PARTMGR further comprises user management module, and this method further comprises:
Described user management module receives revises the order of encrypted partition user cipher, and this order comprises the current user cipher of encrypted partition user name, encrypted partition and the new user cipher of encrypted partition; The identical pairing encrypted partition user cipher of encrypted partition user name of encrypted partition user name that comprises with this modification encrypted partition user cipher order that this user management module is obtained the storage of described movable storage device, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, user management module is then sent false alarm; If identical, user management module then is updated to the described encrypted partition user cipher in this movable storage device the new user cipher of described encrypted partition; Or,
Described user management module receives the deletion user command that comprises encrypted partition user name and encrypted partition user cipher, the identical pairing encrypted partition user cipher of encrypted partition user name of encrypted partition user name that comprises with this deletion user command that obtains the storage of described movable storage device, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, user management module is then sent false alarm; If identical, user management module is then with described encrypted partition user name in this movable storage device and corresponding encrypted partition user cipher deletion; Or,
Described user management module receives and comprises the encrypted partition title, the newly-built user command of encrypted partition user name and encrypted partition user cipher, in described movable storage device, search the identical encrypted partition title of encrypted partition title that comprises with this newly-built user command, and the encrypted partition title that is finding, set up corresponding relation between encrypted partition user name that the data structure of this encrypted partition title correspondence and newly-built user command comprise and the encrypted partition user cipher, again this encrypted partition user name and encrypted partition user cipher are stored in the described movable storage device.
11, method as claimed in claim 8 is characterized in that, described PARTMGR further comprises access control module, read-write control module, cancellation encrypted partition functional module and factory reset module, and this method further comprises:
Described access control module is received and is shown to send after the drive contents command and land prompting, and after receiving encrypted partition user name and encrypted partition user cipher, obtain the pairing encrypted partition user cipher of encrypted partition user name identical in the described movable storage device with the encrypted partition user name of receiving, and judge whether this encrypted partition user cipher is identical with the described encrypted partition user cipher of receiving, if different, access control module then sends false alarm; If identical, then map out content in the described encrypted partition next stage catalogue by the subregion virtual module; Or,
Described read-write control module is read computer operating system by described encrypted partition data decryption shows and finishes decrypted data; Also computer operating system to be write the data encryption of described encrypted partition, will finish ciphered data again and write this encrypted partition; Or,
Described cancellation encrypted partition functional module receives the order of cancellation encrypted partition, deletes all the encrypted partition data structures in the described movable storage device; Or,
Described factory reset module receives the factory reset order, deletes all encrypted partitions and corresponding encrypted partition data structure in the described movable storage device; The factory reset module is also searched the encrypted partition data structure that self sets in advance, and creates encrypted partition according to this data structure in this movable storage device.
CNB2005100736548A 2005-05-20 2005-05-20 Mapping method for mobile memory device Active CN100447765C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100736548A CN100447765C (en) 2005-05-20 2005-05-20 Mapping method for mobile memory device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100736548A CN100447765C (en) 2005-05-20 2005-05-20 Mapping method for mobile memory device

Publications (2)

Publication Number Publication Date
CN1866225A true CN1866225A (en) 2006-11-22
CN100447765C CN100447765C (en) 2008-12-31

Family

ID=37425250

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100736548A Active CN100447765C (en) 2005-05-20 2005-05-20 Mapping method for mobile memory device

Country Status (1)

Country Link
CN (1) CN100447765C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996053A (en) * 2009-08-24 2011-03-30 巴比禄股份有限公司 External storage device, control method for computer system, and control method for external storage device
CN102662797A (en) * 2012-04-11 2012-09-12 无锡华御信息技术有限公司 Virtualization-based software backup method
CN103677675A (en) * 2013-12-30 2014-03-26 深圳市维信联合科技有限公司 Data input method, data input device and data input system
CN103823730A (en) * 2014-02-27 2014-05-28 山东超越数控电子有限公司 Drive detecting method based on domestic disc array
CN104778954A (en) * 2015-02-06 2015-07-15 北京北信源软件股份有限公司 Optical disc partition encryption method and system
CN105488436A (en) * 2015-12-25 2016-04-13 北京奇虎科技有限公司 Mobile storage equipment access method and device
CN107784233A (en) * 2016-08-25 2018-03-09 中兴通讯股份有限公司 The method and device of AKU is read in a kind of user data subregion from encryption
CN111177783A (en) * 2019-12-31 2020-05-19 北京明朝万达科技股份有限公司 Method and device for preventing mobile storage medium from being divulged
CN112817975A (en) * 2021-01-25 2021-05-18 惠州Tcl移动通信有限公司 Method and system for setting physical memory and mobile terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6681304B1 (en) * 2000-06-30 2004-01-20 Intel Corporation Method and device for providing hidden storage in non-volatile memory
CN100389408C (en) * 2001-11-08 2008-05-21 联想(北京)有限公司 Fixed disk data enciphering back-up and restoring method
JP2005115636A (en) * 2003-10-07 2005-04-28 Ankoku Kokusai Kagi Kofun Yugenkoshi Portable information storage device and method for dynamically setting format of magnetic disk thereof
CN100440178C (en) * 2004-02-24 2008-12-03 深圳市朗科科技股份有限公司 Method for managing notations of disks of mobile storage device

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996053A (en) * 2009-08-24 2011-03-30 巴比禄股份有限公司 External storage device, control method for computer system, and control method for external storage device
CN102662797A (en) * 2012-04-11 2012-09-12 无锡华御信息技术有限公司 Virtualization-based software backup method
CN103677675A (en) * 2013-12-30 2014-03-26 深圳市维信联合科技有限公司 Data input method, data input device and data input system
CN103823730A (en) * 2014-02-27 2014-05-28 山东超越数控电子有限公司 Drive detecting method based on domestic disc array
CN104778954A (en) * 2015-02-06 2015-07-15 北京北信源软件股份有限公司 Optical disc partition encryption method and system
CN104778954B (en) * 2015-02-06 2018-06-08 北京北信源软件股份有限公司 A kind of CD subregion encryption method and system
CN105488436B (en) * 2015-12-25 2019-05-10 北京奇虎科技有限公司 A kind of movable storage device access method and device
CN105488436A (en) * 2015-12-25 2016-04-13 北京奇虎科技有限公司 Mobile storage equipment access method and device
CN107784233A (en) * 2016-08-25 2018-03-09 中兴通讯股份有限公司 The method and device of AKU is read in a kind of user data subregion from encryption
CN107784233B (en) * 2016-08-25 2021-09-03 中兴通讯股份有限公司 Method and device for reading upgrade package from encrypted user data partition
CN111177783A (en) * 2019-12-31 2020-05-19 北京明朝万达科技股份有限公司 Method and device for preventing mobile storage medium from being divulged
CN111177783B (en) * 2019-12-31 2022-05-27 北京明朝万达科技股份有限公司 Method and device for preventing mobile storage medium from being divulged
CN112817975A (en) * 2021-01-25 2021-05-18 惠州Tcl移动通信有限公司 Method and system for setting physical memory and mobile terminal

Also Published As

Publication number Publication date
CN100447765C (en) 2008-12-31

Similar Documents

Publication Publication Date Title
CN1866225A (en) Mapping method for mobile memory device
JP6971542B2 (en) Interface provision method and system for utilizing data characteristic infrastructure data allocation in non-volatile memory device, and non-volatile memory apparatus and its data characteristic infrastructure data allocation method
US8838875B2 (en) Systems, methods and computer program products for operating a data processing system in which a file delete command is sent to an external storage device for invalidating data thereon
US7818395B2 (en) Method and apparatus for interfacing with a restricted access computer system
CN103250161B (en) For the treatment of the method for private metadata
US9146735B2 (en) Associating workflows with code sections in a document control system
US20160110295A1 (en) Secure data encryption in shared storage using namespaces
CN1790265A (en) Portable applications
US9286307B2 (en) Document management apparatus improved in efficiency of deletion of files, method of controlling the same, and storage medium
US20080232592A1 (en) Method and apparatus for performing selective encryption/decryption in a data storage system
CN1831774A (en) System and method for reducing memory requirements and offering security update and memory area thereof
CN1761923A (en) Method and apparatus for encrypting database columns
CN1848087A (en) Using usb memory device to recover operating system
US20120131336A1 (en) Automatic Secure Escrowing of a Password for an Encrypted File or Partition Residing on an Attachable Storage Device that the Device can be Unlocked Without User Intervention
CN1708746A (en) Attachable/detachable device and programs start method
US20150095549A1 (en) Systems and methods for managing data in a computing environment
CN1524224A (en) Systems and methods of information backup
CN1591359A (en) Apparatus and method for controlling booting operation of computer system
CN1866224A (en) Mobile memory device and method for accessing encrypted data in mobile memory device
JP2008527532A (en) Method for assigning security area to non-security area and portable storage device
CN1773509A (en) Computer file system
US9037620B2 (en) File system active symbolic link
CN103617398A (en) Protecting method and device for data files
CN1673922A (en) Information processing apparatus, control method thereof, control program, and storage medium
CN101350034B (en) Mobile memory apparatus and method for visiting file

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant