WO2013040915A1 - 文件加密方法和装置、文件解密方法和装置 - Google Patents
文件加密方法和装置、文件解密方法和装置 Download PDFInfo
- Publication number
- WO2013040915A1 WO2013040915A1 PCT/CN2012/076890 CN2012076890W WO2013040915A1 WO 2013040915 A1 WO2013040915 A1 WO 2013040915A1 CN 2012076890 W CN2012076890 W CN 2012076890W WO 2013040915 A1 WO2013040915 A1 WO 2013040915A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- virtual disk
- disk
- file
- file system
- virtual
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
Definitions
- the present invention relates to data processing techniques, and more particularly to file encryption methods and apparatus, file decryption methods and apparatus. Background technique
- file encryption technologies are: direct encryption, file transparent encryption, and system-owned encryption. Although these three encryption technologies can achieve encryption, they all have their own shortcomings.
- Direct encryption which is used to directly encrypt files on the disk, representing WinRar.
- the disadvantage of this direct encryption is: Manual decryption before each use of the file, and manual encryption after use, very dependent on manual operation, more complicated and cumbersome.
- the file is transparently encrypted. It uses the Windows filter driver to dynamically encrypt and decrypt files, which overcomes the shortcomings of direct encryption and manual encryption.
- this file transparent encryption has the following disadvantages: Since the Windows filter driver used is on top of the Windows file system driver, the use of the Windows filter driver requires extensive filtering of all file operations, which seriously affects system performance.
- a file encryption method includes: creating a virtual disk; the method further includes:
- the virtual disk receives a write request from the file system, encrypts data carried by the write request, and notifies the file system to write the encrypted data to the corresponding physical disk, so that the file system receives the notification from the virtual disk. Write the encrypted data to the corresponding physical disk.
- a file decryption method includes: creating a virtual disk; the method further includes:
- the virtual disk redirects the received read request from the file system to the physical disk, so that the file system obtains the data requested by the read request from the physical disk;
- the virtual disk receives data acquired by the file system from the physical disk, and decrypts the received data, and sends the decrypted data to the file system, and the file system provides the decrypted data to the user end.
- a file encryption device comprising:
- a virtual disk creation unit for creating a virtual disk
- a virtual disk drive unit configured to receive a write request from the file system, encrypt the data carried by the write request, and notify the file system to write the encrypted data to the corresponding physical disk, so that the file system receives the virtual disk. After the notification, the encrypted data is written to the corresponding physical disk.
- a file decryption device comprising:
- a virtual disk creation unit for creating a virtual disk
- a virtual disk drive unit comprising: a redirection module and a decryption module;
- the redirection module is configured to redirect the received read request from the file system to the physical disk, so that the file system obtains the data requested by the read request from the physical disk;
- the decryption module is configured to receive data acquired by the file system from the physical disk, decrypt the received data, and send the decrypted data to the file system, where the file system provides the decrypted data to the user end.
- the virtual disk is used to encrypt the data in the write request, and the virtual disk is used to decrypt the data requested by the read request, thereby improving the reliability, security and effectiveness of the file encryption.
- FIG. 1 is a flowchart of a method for establishing a virtual disk according to an embodiment of the present invention
- Embodiment 1 of the present invention is a basic flowchart provided by Embodiment 1 of the present invention.
- Embodiment 3 is a detailed flowchart provided by Embodiment 1 of the present invention.
- FIG. 4 is a structural diagram of a device according to Embodiment 1 of the present invention.
- FIG. 5 is a basic flowchart of Embodiment 2 of the present invention.
- FIG. 6 is a detailed flowchart of Embodiment 2 of the present invention.
- Figure 7 is a structural diagram of a device according to Embodiment 2 of the present invention.
- the file encryption method and device, the file decryption method and the device provided by the present invention are all based on a Windows virtual disk, wherein the virtual disk is substantially similar to the existing physical disk, and refers to a volume (Volume) in Windows, and at least one device. correspond.
- FIG. 1 is a flowchart of a method for establishing a virtual disk according to an embodiment of the present invention. As shown in Figure 1, the process can include the following steps:
- Step 101 Initialize a file of a physical disk corresponding to the virtual disk to be created.
- the file of the physical disk corresponding to the virtual disk may be manually pre-configured, and the file is suffixed as "*.qbox", and is used to store data written to the virtual disk. That is, when writing data to the virtual disk, the data needs to be redirected to the file of the physical disk corresponding to the virtual disk; when a read request is sent to the virtual disk to read the data, the read request needs to be heavy. A file directed to the physical disk corresponding to the virtual disk to obtain the data requested by the read request.
- Step 102 When the virtual disk is established, the user is required to provide a key for using the physical disk file, and verify the key provided by the user. If the verification succeeds, step 103 is performed, and the process returns to step 102. Or end the current process.
- Step 103 Create the virtual disk.
- the step 103 may include the following steps:
- Step 1 Initialize the driver running in the kernel, so that the driver is subsequently driven as a virtual disk to process read requests and write requests for the virtual disk.
- the driver can be: A type of Windows executable file with the suffix ".sys".
- Step 2 Initialize the kernel encryption and decryption threads.
- the thread is the basic unit of Windows task scheduling.
- the kernel encryption thread is a thread running in the system kernel space for encryption.
- the kernel decryption thread is a thread running in the system kernel space for decryption.
- Steps 1 and 2 are only examples of the initialization work required to create a virtual disk under Windows. In different Windows environments, the initialization work required to create a virtual disk is different, and the present invention is not specific. limited.
- Step 3 Create a virtual disk using the controls used to create the virtual disk.
- control used to create the virtual disk can be implemented as the IoCteateDevice control under Windows.
- the virtual disk created in step 3 has a unique identifier, such as ⁇ Device ⁇ HarddiskVolume2, and also has a corresponding device type, such as FILE_DEVICE_DISK, which is used to indicate that it is a disk device.
- a drive letter in order to make the virtual disk visible in the user mode, can be assigned to the virtual disk using a drive letter assignment control such as IoCreateSymbolicLink under Windows. Also, in order to be able to see the assigned drive letter in "My Computer" of Windows, the present invention also needs to arrange a symbolic connection for this device.
- the present embodiment 1 describes a file encryption method based on the virtual disk described above.
- FIG. 2 is a basic flowchart of Embodiment 1 of the present invention. As shown in Figure 2, the process can include the following steps:
- Step 201 The virtual disk receives a write request from the file system, and encrypts data carried by the write request.
- Step 202 The virtual disk notifies the file system to write the encrypted data to the corresponding physical disk, so that the file system receives the notification from the virtual disk and writes the encrypted data to the corresponding physical disk.
- FIG. 3 is a detailed flowchart of Embodiment 1 of the present invention. As shown in Figure 3, the process can include the following steps:
- Step 301 The user sends a write request in the user mode by using a control for issuing a write request, such as WriteFile.
- the write request carries the identity of the virtual disk and the data written to the virtual disk.
- the user mode is used to indicate that the write request issued in step 301 is performed in the user space.
- Step 302 The file system receives a write request from the user state in the kernel mode, and finds that the write request carries the identifier of the virtual disk, and sends the write request to the virtual disk.
- the file system in the first embodiment may be a file system driver (FSD) or other module having similar functions.
- FSD file system driver
- the kernel mode is used to indicate that the file system receiving the write request in step 302 is performed in the kernel space.
- Step 303 The virtual disk receives a write request from the file system, and encrypts data carried by the write request.
- This step 303 is specifically performed by the driver of the virtual disk.
- the current mainstream encryption algorithms are mainly divided into stream encryption algorithms and block encryption algorithms.
- block encryption algorithms have minimum encryption length and alignment requirements, and the minimum encryption length is usually 2 to the power of N, such as 8 Bytes or 16 bytes or 32 bytes, so the minimum read and write units of the disk just guarantee that the boundaries are aligned, and there is no need to add invalid data in order to use block encryption.
- N such as 8 Bytes or 16 bytes or 32 bytes
- the minimum read and write units of the disk just guarantee that the boundaries are aligned, and there is no need to add invalid data in order to use block encryption.
- the embodiment of the present invention may use the AES encryption algorithm with a higher security level in the block encryption algorithm to perform data encryption.
- Step 304 The virtual disk determines a file in the physical disk corresponding to the virtual disk, replaces the identifier of the virtual disk in the write request with the identifier of the determined physical disk file, and then sends a write request to the file system.
- the physical disk file determined in this step 304 is the initialized file described in step 101 above.
- this step 304 is specifically performed by the drive of the virtual disk.
- sending a write request to the file system is implemented by the virtual disk drive using a control such as ZWWriteFile for issuing a write request.
- Step 305 After receiving the write request from the virtual disk, the file system writes the encrypted data in the write request to the physical disk file corresponding to the physical disk file identifier in the write request.
- the first embodiment uses the virtual disk of the kernel state to encrypt the data, which is invisible to the user in the user state, so that even if the user logs in to Windows, the data cannot be read at will. Reliable encryption.
- the data is encrypted only by the virtual disk, and the normal read/write performance is not affected, and the system performance is hardly affected.
- Embodiment 1 further provides a file encryption device.
- FIG. 4 is a structural diagram of a device according to Embodiment 1 of the present invention. As shown in Figure 4, the device includes:
- a virtual disk creation unit for creating a virtual disk
- a virtual disk drive unit configured to receive a write request from the file system, encrypt the data carried by the write request, and notify the file system to write the encrypted data to the corresponding physical disk, so that the file system receives the virtual disk. After the notification, the encrypted data is written to the corresponding physical disk.
- the virtual disk is visible in the kernel mode and has a unique identifier; and, preferably, as shown in FIG. 4, the device further includes:
- a virtual disk notification unit after the virtual disk creation unit creates a virtual disk, And before the virtual disk drive unit receives the write request, notifying the virtual disk to the disk mount management module under Windows; and/or, using a broadcast message to notify the virtual disk to the resource management module Explorer under Windows, so as to make The resource management module re-enumerates the virtual disk.
- the virtual disk drive unit includes:
- a receiving module configured to receive a write request from a file system
- An encryption module configured to encrypt data carried by the write request
- a redirection module configured to determine a file in the physical disk corresponding to the virtual disk, replace the identifier of the virtual disk in the write request with the identifier of the determined physical disk file, and then send a write request to the file system, so that the file system After receiving the write request from the virtual disk, the encrypted data in the write request is written to the physical disk file corresponding to the physical disk file identifier in the write request.
- the virtual disk creation unit includes: an initialization module, a processing module, and a virtual disk creation module;
- An initialization module configured to initialize a file in a physical disk corresponding to the virtual disk
- a processing module configured to: when the virtual disk creation module is triggered to create the virtual disk, request a user to provide a key for using the physical disk file, and verify a key provided by the user, and if the verification passes, trigger the initialization
- the module continues to perform the initialization work required to create the virtual disk, and after detecting that the initialization module completes the initialization work, triggering the virtual disk creation module to create the virtual disk;
- a virtual disk creation module configured to create the virtual disk under the trigger of the processing module. So far, the device description provided in Embodiment 1 is completed.
- Embodiment 2 The following describes Embodiment 2:
- the second embodiment describes the file decryption method based on the virtual disk described above.
- FIG. 5 is a basic flowchart provided by Embodiment 2 of the present invention. As shown in Figure 5, the process can include the following steps:
- Step 501 The virtual disk redirects the read request received from the file system to the physical disk. Causing the file system to retrieve data requested by the read request from the physical disk.
- Step 502 The virtual disk receives data acquired by the file system from the physical disk, decrypts the received data, and sends the decrypted data to the file system, where the file system provides the decrypted data to the user end.
- Figure 6 is a detailed flowchart of Embodiment 2 of the present invention. As shown in Figure 6, the process can include the following steps:
- Step 601 The user issues a read request in the user mode by using a control such as ReadFile for issuing a read request.
- a control such as ReadFile for issuing a read request.
- the read request carries the identity of the virtual disk.
- Step 602 The file system receives a read request from the user state in the kernel mode, determines that the read request carries the identifier of the virtual disk, and sends the read request to the virtual disk.
- the file system in the second embodiment may be an FSD or other module having similar functions.
- Step 603 After receiving the read request from the file system, the virtual disk determines the file in the physical disk corresponding to the virtual disk.
- the physical disk file determined in this step 603 is the initialized file described in the above step 101.
- this step 603 is specifically performed by the drive of the virtual disk.
- Step 604 The virtual disk replaces the identifier of the virtual disk in the read request with the identifier of the determined physical disk file, and sends the read request to the file system.
- the sending of this step 604 can be implemented by a virtual disk drive using a control such as ZWReadFile for issuing a read request.
- Step 605 After receiving the read request from the virtual disk, the file system sends a read request to the physical disk file corresponding to the physical disk file identifier carried by the read request, to obtain the request requested by the read request from the physical disk file. data. Based on the description of Embodiment 1, it can be known that, in this step 605, the data acquired by the file system is encrypted data.
- Step 606 The virtual disk receives data acquired by the file system from the physical disk, and decrypts the received data, and sends the decrypted data to the file system.
- the algorithm for decrypting in this step 606 corresponds to the encryption algorithm in Embodiment 1, and may also be an AES decryption algorithm with a higher security level.
- Step 607 The file system provides the decrypted data to the client.
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
- FIG. 7 is a structural diagram of a device according to Embodiment 2 of the present invention. As shown in Figure 7, the device includes:
- a virtual disk creation unit for creating a virtual disk
- a virtual disk drive unit comprising: a redirection module and a decryption module;
- the redirection module is configured to redirect the received read request from the file system to the physical disk, so that the file system obtains the data requested by the read request from the physical disk;
- the decryption module is configured to receive data acquired by the file system from the physical disk, decrypt the received data, and send the decrypted data to the file system, where the file system provides the decrypted data to the user end.
- the virtual disk is visible in the kernel mode and has a unique identifier; and, as shown in FIG. 7, the device further includes:
- a virtual disk notification unit configured to notify the virtual disk to the Windows after the virtual disk creation unit creates the virtual disk and before the virtual disk drive unit receives the read request a disk mount management module; and/or, using a broadcast message to notify the virtual disk to a resource management module under Windows, so that the resource management module re-enumerates the virtual disk.
- the redirection module may include:
- Determining a sub-module configured to determine a file in a physical disk corresponding to the read request, and a redirecting sub-module, configured to replace the identifier of the virtual disk in the read request with the identifier of the determined physical disk file, and send the read Requesting to the file system, so that after receiving the read request from the virtual disk, the file system sends a read request to the physical disk file corresponding to the physical disk file identifier carried by the read request, to obtain the read from the physical disk file. Request the requested data.
- the virtual disk creation unit includes: an initialization module, a processing module, and a virtual disk creation module;
- An initialization module configured to initialize a file in a physical disk corresponding to the virtual disk
- a processing module configured to: when the virtual disk creation module is triggered to create the virtual disk, request a user to provide a key for using the physical disk file, and verify a key provided by the user, and if the verification passes, trigger the initialization
- the module continues to perform the initialization work required to create the virtual disk, and after detecting that the initialization module completes the initialization work, triggering the virtual disk creation module to create the virtual disk;
- a virtual disk creation module configured to create the virtual disk under the trigger of the processing module. So far, the device description provided in Embodiment 2 is completed.
- the virtual disk is used to encrypt the data in the write request, and the virtual disk is used to decrypt the data requested by the read request, thereby improving the reliability, security and effectiveness of the file encryption. Sex.
- the file encryption method and device, the file decryption method and device of the invention use the virtual disk to encrypt the data in the write request and decrypt the data requested by the read request by using the virtual disk, thereby improving the reliability and security of the file encryption. And effectiveness.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020147001351A KR20140027475A (ko) | 2011-09-22 | 2012-06-14 | 파일 암호화 방법과 장치, 파일 복호화 방법과 장치 |
NZ622859A NZ622859B2 (en) | 2011-09-22 | 2012-06-14 | File encryption method and device, file decryption method and device |
EP12833381.2A EP2759943B1 (en) | 2011-09-22 | 2012-06-14 | File encryption method and device, file decryption method and device |
CA2841606A CA2841606C (en) | 2011-09-22 | 2012-06-14 | File encryption method and device, file decryption method and device |
US14/140,531 US9224002B2 (en) | 2011-09-22 | 2013-12-25 | Method and apparatus for file encryption/decryption |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110283896.5 | 2011-09-22 | ||
CN201110283896.5A CN103020537B (zh) | 2011-09-22 | 2011-09-22 | 数据加密方法和装置、数据解密方法和装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/140,531 Continuation US9224002B2 (en) | 2011-09-22 | 2013-12-25 | Method and apparatus for file encryption/decryption |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013040915A1 true WO2013040915A1 (zh) | 2013-03-28 |
Family
ID=47913835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/076890 WO2013040915A1 (zh) | 2011-09-22 | 2012-06-14 | 文件加密方法和装置、文件解密方法和装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US9224002B2 (zh) |
EP (1) | EP2759943B1 (zh) |
JP (1) | JP2014530371A (zh) |
KR (1) | KR20140027475A (zh) |
CN (1) | CN103020537B (zh) |
CA (1) | CA2841606C (zh) |
WO (1) | WO2013040915A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103516722A (zh) * | 2013-09-17 | 2014-01-15 | 亚欧宝龙信息安全技术(湖南)有限公司 | 一种用户级文件自动加解密方法及装置 |
US9224002B2 (en) | 2011-09-22 | 2015-12-29 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for file encryption/decryption |
CN112214778A (zh) * | 2020-10-21 | 2021-01-12 | 上海英方软件股份有限公司 | 一种通过虚拟文件实现本地文件离散加密的方法及系统 |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745170B (zh) * | 2014-01-02 | 2017-01-04 | 浙江云巢科技有限公司 | 磁盘数据的处理方法及装置 |
US9904803B2 (en) | 2015-03-25 | 2018-02-27 | Intel Corporation | Technologies for hardening data encryption with secure enclaves |
JP6270780B2 (ja) * | 2015-06-25 | 2018-01-31 | 横河レンタ・リース株式会社 | データ管理装置、データ管理方法、及びデータ管理プログラム |
US10097534B2 (en) * | 2015-08-28 | 2018-10-09 | Dell Products L.P. | System and method to redirect hardware secure USB storage devices in high latency VDI environments |
DE102016213104A1 (de) * | 2016-07-18 | 2018-01-18 | bitagentur GmbH & Co. KG | Token-basiertes Authentisieren mit signierter Nachricht |
CN106685981B (zh) * | 2017-01-13 | 2021-03-23 | 北京元心科技有限公司 | 多系统的数据加密传输方法及装置 |
CN109325355A (zh) * | 2018-01-11 | 2019-02-12 | 白令海 | 基于虚拟磁盘的移动终端数据安全存储方法 |
CN108182129B (zh) * | 2018-01-24 | 2020-08-07 | 杭州字节信息技术有限公司 | 一种基于移动终端镜像还原数据信息的数字取证系统及方法 |
CN108304695A (zh) * | 2018-01-30 | 2018-07-20 | 云易天成(北京)安全科技开发有限公司 | 面向文件外发的数据防泄漏控制方法、系统 |
CN110598429B (zh) * | 2019-08-30 | 2021-07-13 | 百富计算机技术(深圳)有限公司 | 数据加密存储和读取的方法、终端设备及存储介质 |
CN111400778A (zh) * | 2020-03-12 | 2020-07-10 | 山东超越数控电子股份有限公司 | 一种虚拟磁盘文件的加密方法、系统、设备及介质 |
CN111984554B (zh) * | 2020-07-31 | 2023-03-28 | 新华三技术有限公司成都分公司 | 一种数据处理方法及装置 |
CN113326526B (zh) * | 2021-06-23 | 2023-04-25 | 杭州弗兰科信息安全科技有限公司 | 一种数据访问方法、装置、设备及存储介质 |
KR102491403B1 (ko) * | 2021-09-02 | 2023-01-27 | 주식회사 엘지유플러스 | 물리적 복제 불가능 기능 기반 가입자 식별 모듈 보안 강화 방법 및 그를 위한 장치 및 시스템 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1553347A (zh) * | 2003-05-28 | 2004-12-08 | 联想(北京)有限公司 | 一种计算机数据保护方法 |
CN1794210A (zh) * | 2006-01-05 | 2006-06-28 | 北京中讯锐尔科技有限公司 | 移动存储设备的数据安全存储和处理方法 |
CN101398824A (zh) * | 2007-09-26 | 2009-04-01 | 新奥特硅谷视频技术有限责任公司 | 利用虚拟文件系统技术实现数据处理后存储的方法 |
CN101877246A (zh) * | 2009-04-28 | 2010-11-03 | 许燕 | 加密u盘实现方法 |
TW201040775A (en) * | 2009-05-05 | 2010-11-16 | Via Tech Inc | Data processing systems and password management methods and data reading and written methods thereof |
CN102053925A (zh) * | 2009-11-04 | 2011-05-11 | 许燕 | 硬盘数据加密实现方法 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1063551A (ja) * | 1996-08-16 | 1998-03-06 | Nec Off Syst Ltd | 情報処理装置 |
CN1154050C (zh) * | 2001-11-29 | 2004-06-16 | 上海格尔软件股份有限公司 | 在Windows环境下虚拟磁盘的方法 |
KR100596135B1 (ko) * | 2004-02-24 | 2006-07-03 | 소프트캠프(주) | 가상 디스크를 이용한 응용 프로그램 별 접근통제시스템과 그 통제방법 |
CN101499038B (zh) * | 2008-01-30 | 2011-09-07 | 精品科技股份有限公司 | 可控存取资讯储存装置、资讯存取控制方法与资讯保护方法 |
US8386798B2 (en) * | 2008-12-23 | 2013-02-26 | Unisys Corporation | Block-level data storage using an outstanding write list |
JP5379520B2 (ja) * | 2009-02-27 | 2013-12-25 | サイエンスパーク株式会社 | ディジタルコンテンツ管理用電子計算機、そのためのプログラム、プログラムの記録媒体、及び、ディジタルコンテンツ管理システム |
CN101847184A (zh) * | 2009-12-16 | 2010-09-29 | 深圳市虹安信息技术有限公司 | 采用加密沙箱的文件加密方法 |
CN101853363B (zh) * | 2010-05-07 | 2012-08-08 | 飞天诚信科技股份有限公司 | 一种文件保护方法及系统 |
CN103020537B (zh) | 2011-09-22 | 2015-07-22 | 腾讯科技(深圳)有限公司 | 数据加密方法和装置、数据解密方法和装置 |
-
2011
- 2011-09-22 CN CN201110283896.5A patent/CN103020537B/zh active Active
-
2012
- 2012-06-14 KR KR1020147001351A patent/KR20140027475A/ko active Search and Examination
- 2012-06-14 JP JP2014530078A patent/JP2014530371A/ja active Pending
- 2012-06-14 CA CA2841606A patent/CA2841606C/en active Active
- 2012-06-14 WO PCT/CN2012/076890 patent/WO2013040915A1/zh active Application Filing
- 2012-06-14 EP EP12833381.2A patent/EP2759943B1/en active Active
-
2013
- 2013-12-25 US US14/140,531 patent/US9224002B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1553347A (zh) * | 2003-05-28 | 2004-12-08 | 联想(北京)有限公司 | 一种计算机数据保护方法 |
CN1794210A (zh) * | 2006-01-05 | 2006-06-28 | 北京中讯锐尔科技有限公司 | 移动存储设备的数据安全存储和处理方法 |
CN101398824A (zh) * | 2007-09-26 | 2009-04-01 | 新奥特硅谷视频技术有限责任公司 | 利用虚拟文件系统技术实现数据处理后存储的方法 |
CN101877246A (zh) * | 2009-04-28 | 2010-11-03 | 许燕 | 加密u盘实现方法 |
TW201040775A (en) * | 2009-05-05 | 2010-11-16 | Via Tech Inc | Data processing systems and password management methods and data reading and written methods thereof |
CN102053925A (zh) * | 2009-11-04 | 2011-05-11 | 许燕 | 硬盘数据加密实现方法 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9224002B2 (en) | 2011-09-22 | 2015-12-29 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for file encryption/decryption |
CN103516722A (zh) * | 2013-09-17 | 2014-01-15 | 亚欧宝龙信息安全技术(湖南)有限公司 | 一种用户级文件自动加解密方法及装置 |
CN103516722B (zh) * | 2013-09-17 | 2016-08-17 | 亚欧宝龙信息安全技术(湖南)有限公司 | 一种用户级文件自动加解密方法及装置 |
CN112214778A (zh) * | 2020-10-21 | 2021-01-12 | 上海英方软件股份有限公司 | 一种通过虚拟文件实现本地文件离散加密的方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN103020537B (zh) | 2015-07-22 |
CA2841606A1 (en) | 2013-03-28 |
US9224002B2 (en) | 2015-12-29 |
US20140108795A1 (en) | 2014-04-17 |
EP2759943A1 (en) | 2014-07-30 |
KR20140027475A (ko) | 2014-03-06 |
EP2759943A4 (en) | 2015-04-22 |
CN103020537A (zh) | 2013-04-03 |
NZ622859A (en) | 2015-05-29 |
CA2841606C (en) | 2017-03-21 |
EP2759943B1 (en) | 2020-12-30 |
JP2014530371A (ja) | 2014-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013040915A1 (zh) | 文件加密方法和装置、文件解密方法和装置 | |
US11270006B2 (en) | Intelligent storage devices with cryptographic functionality | |
EP3198500B1 (en) | Trusted computing | |
EP2572309B1 (en) | Host device and method for accessing a virtual file in a storage device by bypassing a cache in the host device | |
US8838961B2 (en) | Security credential deployment in cloud environment | |
US20190080099A1 (en) | Performing operations on intelligent storage with hardened interfaces | |
WO2016106566A1 (zh) | 虚拟化系统中加解密的方法、装置和系统 | |
US20080114980A1 (en) | System, method and apparatus for using standard and extended storage devices in two-factor authentication | |
US20140143550A1 (en) | Securing speech recognition data | |
US20160188896A1 (en) | Secure host interactions | |
US7995759B1 (en) | System and method for parallel compression of a single data stream | |
JP2010507328A (ja) | セキュアデバイス認証システム及び方法 | |
WO2014059575A1 (zh) | 输入输出操作的处理方法和装置 | |
US20160344749A1 (en) | Method and apparatus for protecting computer files from cpu resident malware | |
US20150082027A1 (en) | Drm method and drm system for supporting offline sharing of digital contents | |
CN114611133A (zh) | 存储设备及其数据存储管理方法 | |
US9152505B1 (en) | Verified hardware-based erasure of data on distributed systems | |
US9742759B2 (en) | Seamless authentication mechanism for user processes and web services residing on common host | |
WO2017067513A1 (zh) | 数据处理方法及存储网关 | |
WO2013181960A1 (zh) | 一种基于虚拟化的安全存储方法、终端及系统 | |
US8738935B1 (en) | Verified erasure of data implemented on distributed systems | |
US8607046B1 (en) | System and method for signing a message to provide one-time approval to a plurality of parties | |
US20220326975A1 (en) | Transparent data reduction in private/public cloud environments for host encrypted data | |
KR20040020175A (ko) | 공개키 암호화 알고리즘을 적용하여 콘텐츠 파일을커널모드에서 복호화하는 방법, 이를 이용하여뷰어프로그램의 plug-in 지원에 비종속적인 DRM클라이언트 프로그램 | |
NZ622859B2 (en) | File encryption method and device, file decryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12833381 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012833381 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2841606 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 20147001351 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2014530078 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |