WO2016065517A1 - 加密存储区域设置方法、加密存储区域设置装置和终端 - Google Patents

加密存储区域设置方法、加密存储区域设置装置和终端 Download PDF

Info

Publication number
WO2016065517A1
WO2016065517A1 PCT/CN2014/089600 CN2014089600W WO2016065517A1 WO 2016065517 A1 WO2016065517 A1 WO 2016065517A1 CN 2014089600 W CN2014089600 W CN 2014089600W WO 2016065517 A1 WO2016065517 A1 WO 2016065517A1
Authority
WO
WIPO (PCT)
Prior art keywords
storage area
operating system
encrypted
key
operating systems
Prior art date
Application number
PCT/CN2014/089600
Other languages
English (en)
French (fr)
Inventor
阳得常
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Priority to PCT/CN2014/089600 priority Critical patent/WO2016065517A1/zh
Priority to CN201480081148.0A priority patent/CN107077325A/zh
Priority to EP14904826.6A priority patent/EP3214543A1/en
Publication of WO2016065517A1 publication Critical patent/WO2016065517A1/zh
Priority to US15/499,525 priority patent/US20170242802A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to a method for setting an encrypted storage area, an apparatus for setting an encrypted storage area, and a terminal.
  • the security system and the general system can share external devices such as a memory card. Since the security system requires high data security, the data to be externally stored in the memory card needs to be encrypted, and the common system pairs The confidentiality of data is relatively low. Therefore, the two operating systems of the terminal generally use the memory card for partitioning. Different operating systems can only mount different partitions (directories) to prevent their own confidential data from being read by other operating systems. take.
  • the correspondence between the operating system and the partition is limited.
  • the operating system can only use the space of the partition that is mounted by itself, and cannot use the space of the partition mounted by other operating systems, so that an operating system that requires a large storage space is difficult to obtain. High storage speed.
  • the memory card is not encrypted. When the memory card is connected to other terminals, other terminals can easily obtain the data in the memory card.
  • the present invention provides an encryption storage area setting method for a terminal having multiple operating systems, including: in any operating system, using the storage in any of the operating systems
  • the preset key in the system encrypts a storage area set in the memory card for any of the operating systems; sets an encryption state of the storage area to encryption, and saves the encrypted state in the storage In the area, data of any one of the operating systems that needs to be encrypted is saved in the storage area.
  • the security of the data stored in the storage area by the operating system can be protected, wherein the storage area is encrypted.
  • Methods include, but are not limited to, encryption using Ecryptfs, a virtual encrypted file system.
  • the encryption state of the storage area may be set to be encrypted, the key for encrypting the encrypted area is saved in the operating system of the terminal, and the encryption state of the encrypted area is saved in the encrypted area of the memory card. .
  • the encryption state of the storage area read by other operating systems or other terminals of the terminal when accessing the memory card can be encrypted, so that the data stored in the storage area by the operating system cannot be read, and the encrypted information is effectively protected.
  • the security of the data in the storage area since only the storage area set in the memory card is encrypted by any operating system, the operating system of the terminal can use all the remaining space in the memory card, which breaks the storage area that the operating system can only use itself.
  • the limitation of the memory card improves the space utilization of the memory card and meets the high storage speed requirements of the operating system.
  • the encryption state is saved in the encrypted folder, when the security system is exited, even if the security system cancels the mounting of the folder, the folder is still encrypted and does not affect the security of the folder; At the same time, due to the above reasons, when the security system is exited, the security system can be unmounted on all the mounted folders, so that the normal operating system can mount these folders. Similarly, since the folder is still encrypted, it will not be Affect the security of the folder, thus ensuring the security of the data stored in the folder by the security system, and enabling the security system and the normal operating system to use the space outside the folder in the memory card, thereby improving the memory card. Space utilization, meeting the operating system pair High storage speed requirements.
  • the data that needs to be encrypted of the operating system is saved in the storage area, and at this time, the encryption of the storage area is performed.
  • the state is encryption, so that all data written to the storage area by the operating system is encrypted, effectively protecting the security of the data in the encrypted storage area.
  • a security system in a dual-system terminal creates a folder under the root directory of the memory card, and after encrypting the folder, the encrypted state of the folder is saved in the folder, so the data is saved. After requesting access to the data after the encrypted state is encrypted, the folder must be decrypted first.
  • the operating system after the operating system is exited, since the encryption state of the encrypted area is saved in the encrypted area, even if other operating systems access the encrypted area, the other operating system cannot acquire the data in the encrypted area because there is no key.
  • other operating systems because the space outside the encrypted area is not encrypted, other operating systems can use other space to meet the operating system's demand for high storage speed.
  • the operating system when exiting the operating system, the operating system can be unmounted from all the folders that the operating system has mounted, so that other operating systems can mount the folders, and for the folder that the operating system has encrypted, the operation After the system unmounts the folder, the encrypted state is saved in the folder. Even if the other operating system mounts the folder, the folder is still encrypted.
  • the storage area of the memory card can be encrypted by using an existing or newly created key, and the key is stored in the operating system, so that the operating system can call the key to perform the encryption area of the memory card. Encrypting or decrypting, at the same time, other operating systems or terminals that do not have the key cannot decrypt the storage area, thereby failing to acquire data in the storage area, and protecting data stored in the storage area by the operating system. Safety.
  • the method further includes: encrypting the preset key stored in the any operating system; and before decrypting the storage area by using the preset key, Decrypt the preset key.
  • encrypting the preset key may prevent the preset key from being illegally erased or changed, thereby failing to decrypt the encrypted storage area of the memory card, and preventing the preset key from being easily intercepted.
  • the security of the key is protected, thereby indirectly protecting the security of the encrypted storage area of the memory card.
  • the method further includes: replicating the preset key, and storing the copied preset key in at least one of any one of the plurality of operating systems In other operating systems, the at least one other operating system may decrypt the storage area using the copied preset key.
  • the default key of the operating system can be saved in other operating systems, so that other operating systems can also decrypt and read the data of the operating system, for example, save the key of the common operating system.
  • the encrypted folder of the normal operating system can be decrypted by the key in the security system to obtain encrypted data of the common operating system.
  • the method further includes: determining, when the command to access the storage area is received, whether the preset key is stored in an operating system that issues the command, where the determination result is yes Decrypting the storage area according to the preset key to allow the operating system to access the storage area; when the determination result is no, the operating system is not allowed to access the storage area.
  • Another aspect of the present invention provides an encrypted storage area setting apparatus for a terminal having a plurality of operating systems, including: a first encryption unit, in any operating system, used in any of the operating systems The preset key encrypts a storage area set in the memory card for any one of the operating systems; a setting unit configured to set an encryption state of the storage area to be encrypted; and a storage unit to save the encrypted state In the storage area, data of any one of the operating systems that needs to be encrypted is saved in the storage area.
  • the security of the data stored in the storage area by the operating system can be protected, wherein the storage area is encrypted.
  • Methods include, but are not limited to, encryption using Ecryptfs, a virtual encrypted file system.
  • the encryption state of the storage area may be set to be encrypted, the key for encrypting the encrypted area is saved in the operating system of the terminal, and the encryption state of the encrypted area is saved in the encrypted area of the memory card. .
  • the encryption state of the storage area read by other operating systems or other terminals of the terminal when accessing the memory card can be encrypted, so that the data stored in the storage area by the operating system cannot be read, and the encrypted information is effectively protected.
  • the security of the data in the storage area since only the storage area set in the memory card is encrypted by any operating system, the operating system of the terminal can use all the remaining space in the memory card, which breaks the storage area that the operating system can only use itself.
  • the limitation of the memory card improves the space utilization of the memory card and meets the high storage speed requirements of the operating system.
  • the data that needs to be encrypted of the operating system is saved in the storage area, and at this time, the encryption of the storage area is performed.
  • the state is encryption, so that all data written to the storage area by the operating system is encrypted, effectively protecting the security of the data in the encrypted storage area.
  • a security system in a dual-system terminal creates a folder under the root directory of the memory card, and after encrypting the folder, the encrypted state of the folder is saved in the folder, so the data is saved. After requesting access to the data after the encrypted state is encrypted, the folder must be decrypted first.
  • the method further includes: after exiting the operating system, allowing other operating systems of the plurality of operating systems to access the storage area other than the storage area in the memory card All remaining space.
  • the operating system after the operating system is exited, since the encryption state of the encrypted area is saved in the encrypted area, even if other operating systems access the encrypted area, the other operating system cannot acquire the data in the encrypted area because there is no key.
  • other operating systems because the space outside the encrypted area is not encrypted, other operating systems can use other space to meet the operating system's demand for high storage speed.
  • the operating system when exiting the operating system, the operating system can be unmounted from all the folders that the operating system has mounted, so that other operating systems can mount the folders, and for the folder that the operating system has encrypted, the operation After the system unmounts the folder, the encrypted state is saved in the folder. Even if the other operating system mounts the folder, the folder is still encrypted.
  • the method further includes: a key setting unit, configured to set a key existing in any one of the operating systems as the preset key; or create a key for any of the operating systems And setting the created key as the preset key; and the storage unit is further configured to: store the preset key in any of the operating systems.
  • a key setting unit configured to set a key existing in any one of the operating systems as the preset key; or create a key for any of the operating systems And setting the created key as the preset key
  • the storage unit is further configured to: store the preset key in any of the operating systems.
  • the storage area of the memory card can be encrypted by using an existing or newly created key, and the key is stored in the operating system, so that the operating system can call the key to perform the encryption area of the memory card. Encrypting or decrypting, at the same time, other operating systems or terminals that do not have the key cannot decrypt the storage area, thereby failing to acquire data in the storage area, and protecting data stored in the storage area by the operating system. Safety.
  • encrypting the preset key may prevent the preset key from being illegally erased or changed, thereby failing to decrypt the encrypted storage area of the memory card, and preventing the preset key from being easily intercepted.
  • the security of the key is protected, thereby indirectly protecting the security of the encrypted storage area of the memory card.
  • the method further includes: a copying unit, copying the preset key; and the storage unit is further configured to: store the copied preset key in the multiple operating systems In at least one other operating system other than any of the operating systems, such that the at least one other operating system can decrypt the storage area using the copied preset key.
  • a further aspect of the present invention provides a terminal having a plurality of operating systems including the encrypted storage area setting device described in the above technical solution. Therefore, the terminal has all the beneficial effects of the encrypted storage area setting device provided by the foregoing technical solution, and details are not described herein again.
  • the multiple operating systems of the terminal can share the remaining space of the memory card, which satisfies the requirement of the operating system for high storage speed.
  • FIG. 1 shows a flow chart of a method of setting an encrypted storage area according to an embodiment of the present invention
  • FIG. 2 is a flow chart showing a method of setting an encrypted storage area according to another embodiment of the present invention.
  • FIG. 3 is a block diagram showing an encrypted storage area setting device according to an embodiment of the present invention.
  • FIG. 1 shows a flow chart of a method of setting an encrypted storage area according to an embodiment of the present invention.
  • the encrypted storage area setting method of this embodiment is used for a terminal having multiple operating systems, including:
  • Step 102 In any operating system, the storage area set for any operating system in the memory card is encrypted using a preset key stored in any operating system.
  • Step 106 Save data of any operating system that needs to be encrypted in the storage area.
  • the security of the data stored in the storage area by the operating system can be protected, wherein the storage area is encrypted.
  • Methods include, but are not limited to, encryption using Ecryptfs, a virtual encrypted file system.
  • the encryption state of the storage area may be set to be encrypted, the key for encrypting the encrypted area is saved in the operating system of the terminal, and the encryption state of the encrypted area is saved in the encrypted area of the memory card. .
  • the encryption state of the storage area read by other operating systems or other terminals of the terminal when accessing the memory card can be encrypted, so that the data stored in the storage area by the operating system cannot be read, and the encrypted information is effectively protected.
  • the security of the data in the storage area since only the storage area set in the memory card is encrypted by any operating system, the operating system of the terminal can use all the remaining space in the memory card, which breaks the storage area that the operating system can only use itself.
  • the limitation of the memory card improves the space utilization of the memory card and meets the high storage speed requirements of the operating system.
  • the method further includes: allowing other operating systems of the plurality of operating systems to access all remaining space except the storage area in the memory card after exiting any operating system.
  • the folder even if the other operating system mounts the folder, the folder is still encrypted, and other operating systems can only read the ciphertext, and does not affect the security of the data in the folder. Therefore, the security of the data in the encrypted folder is ensured, and other operating systems can use the space outside the folder in the memory card, thereby improving the space utilization of the memory card and satisfying the operating system for high storage speed. demand.
  • the method further includes: The key is set as the default key; or a key is created for any operating system and the created key is set as the default key; and the preset key is stored in any operating system.
  • the storage area of the memory card can be encrypted by using an existing or newly created key, and the key is stored in the operating system, so that the operating system can call the key to perform the encryption area of the memory card. Encrypting or decrypting, at the same time, other operating systems or terminals that do not have the key cannot decrypt the storage area, thereby failing to acquire data in the storage area, and protecting data stored in the storage area by the operating system. Safety.
  • the method further includes: encrypting a preset key stored in any operating system; and decrypting the preset key before decrypting the storage area by using the preset key.
  • encrypting the preset key may prevent the preset key from being illegally erased or changed, thereby failing to decrypt the encrypted storage area of the memory card, and preventing the preset key from being easily intercepted.
  • the security of the key is protected, thereby indirectly protecting the security of the encrypted storage area of the memory card.
  • the method further includes: replicating the preset key, and storing the copied preset key in at least one other operating system other than any one of the multiple operating systems, so as to at least One other operating system can decrypt the storage area using the copied preset key.
  • the operating system's preset key can be saved in other operating systems.
  • the key pair can be passed in the security system.
  • the encrypted folder of the normal operating system is decrypted to obtain encrypted data of the ordinary operating system.
  • the method further includes: when receiving the command to access the storage area, determining whether a preset key is stored in the operating system that issues the command, wherein, when the determination result is yes, according to the preset password The key decrypts the storage area to allow the operating system to access the storage area; when the judgment result is no, the operating system is not allowed to access the storage area.
  • the key is used to decrypt the storage area, and may be the operating system.
  • the storage area is mounted to allow the operating system to access data in the storage area.
  • the mounting of the storage area can be cancelled.
  • FIG. 2 shows a flow chart of a method of setting an encrypted storage area according to another embodiment of the present invention.
  • the encrypted storage area setting method of this embodiment is used for a dual system terminal including a security system and a general system, including:
  • step 202 the security system is entered by the ordinary system.
  • step 204 the security system is started.
  • the encryption module is entered, and the encryption module of the security system can encrypt and decrypt the storage area of the memory card, and has a user interaction interface for the user to operate.
  • Step 208 prompting to encrypt the storage area.
  • step 210 a user password is created.
  • Step 212 creating a key.
  • the created key is used to encrypt the storage area of the memory card.
  • Storing the key in the system partition under the security system ensures that only the security system can invoke the key to encrypt or decrypt the encrypted area of the memory card, and at the same time, the ordinary system that does not have the key cannot make the storage area.
  • the decryption is performed so that the data in the storage area cannot be obtained, and the security of the data stored in the storage area by the security system is protected.
  • Step 216 encrypting the storage area.
  • the encrypted storage area is used to store data that the security system needs to encrypt.
  • step 220 it is determined whether the password input by the user is correct. When the determination result is yes, the process proceeds to step 224. If the determination result is negative, the process proceeds to step 222.
  • step 222 When entering the security system again, first obtain the encryption status of the storage area. If it is an encrypted storage area, prompt the user to enter the password verification. After the password verification is successful, the memory card is decrypted and mounted.
  • step 222 access to the storage area is prohibited.
  • Step 224 decrypting the mount. That is, the encrypted storage area is decrypted using the key, and the encrypted storage area is mounted for the security system.
  • step 2208 the decryption is cancelled.
  • step 230 the ordinary system is entered. Encrypted storage that has been mounted when exiting the security system If the storage area is unmounted, all the data in the encrypted storage area seen from the normal system is cipher text.
  • FIG. 3 shows a block diagram of an encrypted storage area setting device in accordance with one embodiment of the present invention.
  • the security of the data stored in the storage area by the operating system can be protected, wherein the storage area is encrypted.
  • Methods include, but are not limited to, encryption using Ecryptfs, a virtual encrypted file system.
  • the encryption state of the storage area may be set to be encrypted, the key for encrypting the encrypted area is saved in the operating system of the terminal, and the encryption state of the encrypted area is saved in the encrypted area of the memory card. .
  • the encryption state of the storage area read by other operating systems or other terminals of the terminal when accessing the memory card can be encrypted, so that the data stored in the storage area by the operating system cannot be read, and the encrypted information is effectively protected.
  • the security of the data in the storage area since only the storage area set in the memory card is encrypted by any operating system, the operating system of the terminal can use all the remaining space in the memory card, which breaks the storage area that the operating system can only use itself.
  • the limitation of the memory card improves the space utilization of the memory card and meets the high storage speed requirements of the operating system.
  • the encryption state is saved in the encrypted folder, when the security system is exited, even if the security system cancels the mounting of the folder, the folder is still encrypted and does not affect the security of the folder; At the same time, by For the above reasons, when you exit the security system, you can unmount all the folders that the security system mounts, so that the normal operating system can mount these folders. Similarly, since the folder is still encrypted, it will not affect the file.
  • the security of the folder ensures the security of the data stored in the folder by the security system, and the security system and the normal operating system can use the space outside the folder in the memory card, thereby improving the space of the memory card. Utilization meets the operating system's need for high storage speeds.
  • the data that needs to be encrypted of the operating system is saved in the storage area, and at this time, the encryption of the storage area is performed.
  • the state is encryption, so that all data written to the storage area by the operating system is encrypted, effectively protecting the security of the data in the encrypted storage area.
  • a security system in a dual-system terminal creates a folder under the root directory of the memory card, and after encrypting the folder, the encrypted state of the folder is saved in the folder, so the data is saved. After requesting access to the data after the encrypted state is encrypted, the folder must be decrypted first.
  • control unit 308 further allows other operating systems in the plurality of operating systems to access all remaining space except the storage area in the memory card after exiting any operating system.
  • the operating system after the operating system is exited, since the encryption state of the encrypted area is saved in the encrypted area, even if other operating systems access the encrypted area, the other operating system cannot acquire the data in the encrypted area because there is no key.
  • other operating systems because the space outside the encrypted area is not encrypted, other operating systems can use other space to meet the operating system's demand for high storage speed.
  • the operating system when exiting the operating system, the operating system can be unmounted from all the folders that the operating system has mounted, so that other operating systems can mount the folders, and for the folder that the operating system has encrypted, the operation After the system unmounts the folder, the encrypted state is saved in the folder. Even if the other operating system mounts the folder, the folder is still encrypted.
  • the storage area of the memory card can be encrypted by using an existing or newly created key, and the key is stored in the operating system, so that the operating system can call the key to perform the encryption area of the memory card. Encrypting or decrypting, at the same time, other operating systems or terminals that do not have the key cannot decrypt the storage area, thereby failing to acquire data in the storage area, and protecting data stored in the storage area by the operating system. Safety.
  • the method further includes: a second encryption unit 312 for encrypting a preset key stored in any operating system; and a second decryption unit 314 for using the preset key Decrypt the preset key before decrypting the storage area.
  • the method further includes: a copying unit 316, copying the preset key; and the storage unit 306 is further configured to: store the copied preset key in any one of the plurality of operating systems At least one other operating system, such that at least one other operating system can decrypt the storage area using the copied preset key.
  • the default key of the operating system can be saved in other operating systems, so that other operating systems can also decrypt and read the data of the operating system, for example, save the key of the common operating system.
  • the encrypted folder of the normal operating system can be decrypted by the key in the security system to obtain encrypted data of the common operating system.
  • the determining unit 318 determines, when receiving the command to access the storage area, whether a key is stored in the operating system that issues the command, and the first decrypting unit 320 is configured to determine Unit 318 determines that a preset key is stored in the operating system The storage area is decrypted according to the preset key to allow the operating system to access the storage area; and the control unit 308 is further configured to: when the determining unit 318 determines that the preset key is not stored in the operating system, the operating system is not allowed. Access the storage area.
  • the key is used to decrypt the storage area, and may be the operating system.
  • the storage area is mounted to allow the operating system to access data in the storage area.
  • the mounting of the storage area can be cancelled.
  • the terminal 400 of one embodiment of the present invention includes an encrypted storage area setting means 402 (corresponding to the encrypted storage area setting means 300 in the embodiment shown in FIG. 3).
  • the technical solution of the present invention is described in detail above with reference to the accompanying drawings.
  • the technical solution of the present invention can ensure that the remaining operating space of the memory card can be shared by multiple operating systems of the terminal while ensuring the security of the data in the memory card.
  • the operating system's need for high storage speed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提出了一种加密存储区域设置方法、一种加密存储区域设置装置和一种终端,其中,所述加密存储区域设置方法用于具有多个操作系统的终端,包括:在任一操作系统中,使用存储在所述任一操作系统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;将所述存储区域的加密状态设置为加密,并将所述加密状态保存在所述存储区域中;将所述任一操作系统的需要加密的数据保存在所述存储区域中。通过本发明的技术方案,可以确保存储卡的加密存储区域中的数据的安全,并使终端的多个操作系统可以共享存储卡的剩余空间,满足了操作系统对高存储速度的需求。

Description

加密存储区域设置方法、加密存储区域设置装置和终端 技术领域
本发明涉及终端技术领域,具体而言,涉及一种加密存储区域设置方法、一种加密存储区域设置装置和一种终端。
背景技术
在现有的双系统终端中,安全系统和普通系统能够共用存储卡等外部设备,由于安全系统对数据的安全性要求较高,需要对外置在存储卡中的数据进行加密,而普通系统对数据的保密性要求较低,因此,终端的两个操作系统一般对存储卡进行分区使用,不同的操作系统只能挂载不同的分区(目录),以避免自身的保密数据被其他操作系统读取。
但是,这样做具有如下缺陷:
1.限制了操作系统与分区的对应关系,操作系统只能使用自身挂载的分区的空间,不能使用其他操作系统挂载的分区的空间,使得需要较大的存储空间的操作系统难以获取较高的存储速度。
2.对存储卡没有加密,当存储卡被接入其他终端时,其他终端可以轻易获取存储卡中的数据。
因此,需要一种新的技术方案,可以在确保存储卡中的数据的安全的同时,使多个操作系统可以共享存储卡的剩余空间。
发明内容
本发明正是基于上述问题,提出了一种新的技术方案,可以在确保存储卡中的数据的安全的同时,使多个操作系统可以共享存储卡的剩余空间。
有鉴于此,本发明提出了一种加密存储区域设置方法,用于具有多个操作系统的终端,包括:在任一操作系统中,使用存储在所述任一操作系 统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;将所述存储区域的加密状态设置为加密,并将所述加密状态保存在所述存储区域中;将所述任一操作系统的需要加密的数据保存在所述存储区域中。
在该技术方案中,通过使用预先设置的密钥对操作系统在存储卡中设置的存储区域进行加密,可以保护该操作系统存储在该存储区域中的数据的安全,其中,对存储区域的加密方法包括但不限于采用Ecryptfs(一种虚拟的加密文件系统)进行加密。在该技术方案中,还可以将存储区域的加密状态设置为加密,将对加密区域进行加密的密钥保存在终端的操作系统中,并将加密区域的加密状态保存在存储卡的加密区域中。这样,可以使终端的其他操作系统或其他终端访问存储卡时读取到的存储区域的加密状态为加密,从而无法读取该操作系统存储在该存储区域中的数据,有效地保护了加密的存储区域中的数据的安全。同时,由于只对任一操作系统在存储卡中设置的存储区域加密,使得终端的多个操作系统都可以使用存储卡中的所有剩余空间,打破了操作系统只能使用自身挂载的存储区域的限制,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,使用安全系统中的密钥对该文件夹进行加密,并将该文件夹的加密状态保存在该文件夹中,这样,当终端的普通操作系统请求对该文件夹进行访问时,可以读取到该文件夹的加密状态为加密,而普通操作系统由于不具有上述的密钥,也就无法对该文件夹进行解密。因此,由于加密状态保存在该加密文件夹中,当退出安全系统时,即使安全系统取消对该文件夹的挂载,该文件夹仍为加密的,并不会影响该文件夹的安全性;同时,由于上述原因,退出安全系统时可以取消安全系统对挂载的所有文件夹的挂载,使得普通操作系统可以挂载这些文件夹,同样,由于该文件夹仍为加密的,并不会影响该文件夹的安全性,从而保证了安全系统保存在该文件夹下的数据的安全,同时使安全系统和普通操作系统都可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对 高存储速度的需求。
另外,在该技术方案中,可以在对操作系统设置在存储卡中的存储区域进行加密后,将该操作系统的需要加密的数据保存在该存储区域中,此时,由于该存储区域的加密状态为加密,使得所有通过该操作系统写入该存储区域的数据都是加密的,有效地保护了加密的存储区域中的数据的安全。例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,在对该文件夹进行加密后,将该文件夹的加密状态保存在该文件夹中,因此,将数据保存在加密状态为加密的文件夹中之后,请求访问该数据时,必须先对该文件夹进行解密。
在上述技术方案中,优选地,还包括:在退出所述任一操作系统后,允许所述多个操作系统中的其他操作系统访问所述存储卡中的所述存储区域以外的所有剩余空间。
在该技术方案中,在退出操作系统后,由于加密区域的加密状态保存在加密区域中,即使其他操作系统访问该加密区域,由于不具有密钥,其他操作系统无法获取该加密区域中的数据,同时,由于该加密区域以外的其他空间未加密,其他操作系统可以使用其他空间,以满足了操作系统对高存储速度的需求。比如,在退出操作系统时可以取消该操作系统对其已挂载的所有文件夹的挂载,使得其他操作系统可以挂载这些文件夹,并且,对于该操作系统已经加密的文件夹,该操作系统对该文件夹取消挂载后,由于加密状态保存在文件夹内,即使其他操作系统挂载了该文件夹,该文件夹仍为加密的,其他操作系统只能读到密文,并不会影响该文件夹中的数据的安全性。因此,既保证了加密文件夹下的数据的安全,也使其他操作系统可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
在上述技术方案中,优选地,在所述使用存储在所述任一操作系统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密之前,还包括:将所述任一操作系统中已有的密钥设置为所述预设密钥;或为所述任一操作系统创建密钥,并将创建的所述密钥设置为所述预设密钥;以及将所述预设密钥存储在所述任一操作系统中。
在该技术方案中,使用已有的或新建的密钥可以对存储卡的存储区域进行加密,而将密钥存储在操作系统中,可以使该操作系统调用密钥对存储卡的加密区域进行加密或解密,同时,使不具有该密钥的其他操作系统或终端无法对该存储区域进行解密,从而无法获取该存储区域中的数据,保护了该操作系统存储在该存储区域中的数据的安全。
在上述技术方案中,优选地,还包括:对存储在所述任一操作系统中的所述预设密钥进行加密;以及在使用所述预设密钥对所述存储区域进行解密前,对所述预设密钥进行解密。
在该技术方案中,对预设密钥进行加密可以防止预设密钥被非法抹除或更改而导致无法对存储卡的加密的存储区域进行解密,也可以防止预设密钥被轻易截获,保护了密钥的安全性,从而间接保护了存储卡的加密的存储区域的安全。
在上述技术方案中,优选地,还包括:复制所述预设密钥,并将复制的所述预设密钥存储在所述多个操作系统中的所述任一操作系统以外的至少一个其他操作系统中,以使所述至少一个其他操作系统可以使用复制的所述预设密钥对所述存储区域进行解密。
在该技术方案中,可以将操作系统的预设密钥保存在其他操作系统中,以使其他操作系统也可以解密并读取该操作系统的数据,比如,将普通操作系统的密钥保存在权限更高的安全系统中,则在安全系统中就可以通过该密钥对普通操作系统的加密文件夹进行解密,从而获取普通操作系统的加密数据。通过该技术方案,提升了对存储区域加密或解密的灵活性。
在上述技术方案中,优选地,还包括:在接收到访问所述存储区域的命令时,判断发出所述命令的操作系统中是否存储有所述预设密钥,其中,当判断结果为是时,根据所述预设密钥对所述存储区域进行解密,以允许所述操作系统访问所述存储区域;当判断结果为否时,不允许所述操作系统访问所述存储区域。
在该技术方案中,在操作系统请求访问加密的存储区域时,如果该操作系统具有对该存储区域进行解密的密钥,则使用该密钥对该存储区域进 行解密,并可以为该操作系统挂载该存储区域,以允许该操作系统访问该存储区域中的数据。另外,为了保证存储区域的安全,在退出该操作系统时,可以取消对该存储区域的挂载。而在操作系统请求访问加密的存储区域时,如果该操作系统不具有对该存储区域进行解密的密钥,则无法对该存储区域进行解密,只能读取到该存储区域的加密状态为加密,从而无法获取该存储区域中的数据,保护了该存储区域中的数据的安全。
本发明的另一方面提出了一种加密存储区域设置装置,用于具有多个操作系统的终端,包括:第一加密单元,在任一操作系统中,使用存储在所述任一操作系统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;设置单元,用于将所述存储区域的加密状态设置为加密;存储单元,将所述加密状态保存在所述存储区域中,并将所述任一操作系统的需要加密的数据保存在所述存储区域中。
在该技术方案中,通过使用预先设置的密钥对操作系统在存储卡中设置的存储区域进行加密,可以保护该操作系统存储在该存储区域中的数据的安全,其中,对存储区域的加密方法包括但不限于采用Ecryptfs(一种虚拟的加密文件系统)进行加密。在该技术方案中,还可以将存储区域的加密状态设置为加密,将对加密区域进行加密的密钥保存在终端的操作系统中,并将加密区域的加密状态保存在存储卡的加密区域中。这样,可以使终端的其他操作系统或其他终端访问存储卡时读取到的存储区域的加密状态为加密,从而无法读取该操作系统存储在该存储区域中的数据,有效地保护了加密的存储区域中的数据的安全。同时,由于只对任一操作系统在存储卡中设置的存储区域加密,使得终端的多个操作系统都可以使用存储卡中的所有剩余空间,打破了操作系统只能使用自身挂载的存储区域的限制,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,使用安全系统中的密钥对该文件夹进行加密,并将该文件夹的加密状态保存在该文件夹中,这样,当终端的普通操作系统请求对该文件夹进行访问时,可以读取到该文件夹的加密状态为加密,而普通操作系统由于不具有上述的密钥,也就无法对该文件夹进行解密。因此,由于加密状态保 存在该加密文件夹中,当退出安全系统时,即使安全系统取消对该文件夹的挂载,该文件夹仍为加密的,并不会影响该文件夹的安全性;同时,由于上述原因,退出安全系统时可以取消安全系统对挂载的所有文件夹的挂载,使得普通操作系统可以挂载这些文件夹,同样,由于该文件夹仍为加密的,并不会影响该文件夹的安全性,从而保证了安全系统保存在该文件夹下的数据的安全,同时使安全系统和普通操作系统都可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
另外,在该技术方案中,可以在对操作系统设置在存储卡中的存储区域进行加密后,将该操作系统的需要加密的数据保存在该存储区域中,此时,由于该存储区域的加密状态为加密,使得所有通过该操作系统写入该存储区域的数据都是加密的,有效地保护了加密的存储区域中的数据的安全。例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,在对该文件夹进行加密后,将该文件夹的加密状态保存在该文件夹中,因此,将数据保存在加密状态为加密的文件夹中之后,请求访问该数据时,必须先对该文件夹进行解密。
在上述技术方案中,优选地,还包括:控制单元,在退出所述任一操作系统后,允许所述多个操作系统中的其他操作系统访问所述存储卡中的所述存储区域以外的所有剩余空间。
在该技术方案中,在退出操作系统后,由于加密区域的加密状态保存在加密区域中,即使其他操作系统访问该加密区域,由于不具有密钥,其他操作系统无法获取该加密区域中的数据,同时,由于该加密区域以外的其他空间未加密,其他操作系统可以使用其他空间,以满足了操作系统对高存储速度的需求。比如,在退出操作系统时可以取消该操作系统对其已挂载的所有文件夹的挂载,使得其他操作系统可以挂载这些文件夹,并且,对于该操作系统已经加密的文件夹,该操作系统对该文件夹取消挂载后,由于加密状态保存在文件夹内,即使其他操作系统挂载了该文件夹,该文件夹仍为加密的,其他操作系统只能读到密文,并不会影响该文件夹中的数据的安全性。因此,既保证了加密文件夹下的数据的安全,也使其 他操作系统可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
在上述技术方案中,优选地,还包括:密钥设置单元,将所述任一操作系统中已有的密钥设置为所述预设密钥;或为所述任一操作系统创建密钥,并将创建的所述密钥设置为所述预设密钥;以及所述存储单元还用于:将所述预设密钥存储在所述任一操作系统中。
在该技术方案中,使用已有的或新建的密钥可以对存储卡的存储区域进行加密,而将密钥存储在操作系统中,可以使该操作系统调用密钥对存储卡的加密区域进行加密或解密,同时,使不具有该密钥的其他操作系统或终端无法对该存储区域进行解密,从而无法获取该存储区域中的数据,保护了该操作系统存储在该存储区域中的数据的安全。
在上述技术方案中,优选地,还包括:第二加密单元,对存储在所述任一操作系统中的所述预设密钥进行加密;以及第二解密单元,在使用所述预设密钥对所述存储区域进行解密前,对所述预设密钥进行解密。
在该技术方案中,对预设密钥进行加密可以防止预设密钥被非法抹除或更改而导致无法对存储卡的加密的存储区域进行解密,也可以防止预设密钥被轻易截获,保护了密钥的安全性,从而间接保护了存储卡的加密的存储区域的安全。
在上述技术方案中,优选地,还包括:复制单元,复制所述预设密钥;以及所述存储单元还用于:将复制的所述预设密钥存储在所述多个操作系统中的所述任一操作系统以外的至少一个其他操作系统中,以使所述至少一个其他操作系统可以使用复制的所述预设密钥对所述存储区域进行解密。
在该技术方案中,可以将操作系统的预设密钥保存在其他操作系统中,以使其他操作系统也可以解密并读取该操作系统的数据,比如,将普通操作系统的密钥保存在权限更高的安全系统中,则在安全系统中就可以通过该密钥对普通操作系统的加密文件夹进行解密,从而获取普通操作系统的加密数据。通过该技术方案,提升了对存储区域加密或解密的灵活性。
在上述技术方案中,优选地,还包括:判断单元,在接收到访问所述存储区域的命令时,判断发出所述命令的操作系统中是否存储有所述预设密钥;以及第一解密单元,用于在所述判断单元判断所述操作系统中存储有所述预设密钥时,根据所述预设密钥对所述存储区域进行解密,以允许所述操作系统访问所述存储区域;以及所述控制单元还用于:在所述判断单元判断所述操作系统中未存储有所述预设密钥时,不允许所述操作系统访问所述存储区域。
在该技术方案中,在操作系统请求访问加密的存储区域时,如果该操作系统具有对该存储区域进行解密的密钥,则使用该密钥对该存储区域进行解密,并可以为该操作系统挂载该存储区域,以允许该操作系统访问该存储区域中的数据。另外,为了保证存储区域的安全,在退出该操作系统时,可以取消对该存储区域的挂载。而在操作系统请求访问加密的存储区域时,如果该操作系统不具有对该存储区域进行解密的密钥,则无法对该存储区域进行解密,只能读取到该存储区域的加密状态为加密,从而无法获取该存储区域中的数据,保护了该存储区域中的数据的安全。
本发明的再一方面提出了一种终端,该终端具有多个操作系统,包括有上述技术方案中所述的加密存储区域设置装置。因此,该终端具有上述技术方案提供的加密存储区域设置装置的全部有益效果,在此不再赘述。
通过以上技术方案,可以在确保存储卡中的数据的安全的同时,使终端的多个操作系统可以共享存储卡的剩余空间,满足了操作系统对高存储速度的需求。
附图说明
图1示出了根据本发明的一个实施例的加密存储区域设置方法的流程图;
图2示出了根据本发明的另一个实施例的加密存储区域设置方法的流程图;
图3示出了根据本发明的一个实施例的加密存储区域设置装置的框图;
图4示出了根据本发明的一个实施例的终端的框图。
具体实施方式
为了能够更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。
图1示出了根据本发明的一个实施例的加密存储区域设置方法的流程图。
如图1所示,本实施例的加密存储区域设置方法用于具有多个操作系统的终端,包括:
步骤102,在任一操作系统中,使用存储在任一操作系统中的预设密钥对存储卡中为任一操作系统设置的存储区域进行加密。
步骤104,将存储区域的加密状态设置为加密,并将加密状态保存在存储区域中。
步骤106,将任一操作系统的需要加密的数据保存在存储区域中。
在该技术方案中,通过使用预先设置的密钥对操作系统在存储卡中设置的存储区域进行加密,可以保护该操作系统存储在该存储区域中的数据的安全,其中,对存储区域的加密方法包括但不限于采用Ecryptfs(一种虚拟的加密文件系统)进行加密。在该技术方案中,还可以将存储区域的加密状态设置为加密,将对加密区域进行加密的密钥保存在终端的操作系统中,并将加密区域的加密状态保存在存储卡的加密区域中。这样,可以使终端的其他操作系统或其他终端访问存储卡时读取到的存储区域的加密状态为加密,从而无法读取该操作系统存储在该存储区域中的数据,有效地保护了加密的存储区域中的数据的安全。同时,由于只对任一操作系统在存储卡中设置的存储区域加密,使得终端的多个操作系统都可以使用存储卡中的所有剩余空间,打破了操作系统只能使用自身挂载的存储区域的限制,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,使用安全系统中的密钥对该文件夹进行加密,并将该文件夹的加密状态保存在该文件夹中,这样,当终端的普通操作系统请求对该文件夹进行访问时,可以读取到该文件夹的加密状态为加密,而普通操作系统由于不具有上述的密钥,也就无法对该文件夹进行解密。因此,由于加密状态保存在该加密文件夹中,当退出安全系统时,即使安全系统取消对该文件夹的挂载,该文件夹仍为加密的,并不会影响该文件夹的安全性;同时,由于上述原因,退出安全系统时可以取消安全系统对挂载的所有文件夹的挂载,使得普通操作系统可以挂载这些文件夹,同样,由于该文件夹仍为加密的,并不会影响该文件夹的安全性,从而保证了安全系统保存在该文件夹下的数据的安全,同时使安全系统和普通操作系统都可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
另外,在该技术方案中,可以在对操作系统设置在存储卡中的存储区域进行加密后,将该操作系统的需要加密的数据保存在该存储区域中,此时,由于该存储区域的加密状态为加密,使得所有通过该操作系统写入该存储区域的数据都是加密的,有效地保护了加密的存储区域中的数据的安全。例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,在对该文件夹进行加密后,将该文件夹的加密状态保存在该文件夹中,因此,将数据保存在加密状态为加密的文件夹中之后,请求访问该数据时,必须先对该文件夹进行解密。
在上述技术方案中,优选地,还包括:在退出任一操作系统后,允许多个操作系统中的其他操作系统访问存储卡中的存储区域以外的所有剩余空间。
在该技术方案中,在退出操作系统后,由于加密区域的加密状态保存在加密区域中,即使其他操作系统访问该加密区域,由于不具有密钥,其他操作系统无法获取该加密区域中的数据,同时,由于该加密区域以外的其他空间未加密,其他操作系统可以使用其他空间,以满足了操作系统对高存储速度的需求。比如,在退出操作系统时可以取消该操作系统对其已 挂载的所有文件夹的挂载,使得其他操作系统可以挂载这些文件夹,并且,对于该操作系统已经加密的文件夹,该操作系统对该文件夹取消挂载后,由于加密状态保存在文件夹内,即使其他操作系统挂载了该文件夹,该文件夹仍为加密的,其他操作系统只能读到密文,并不会影响该文件夹中的数据的安全性。因此,既保证了加密文件夹下的数据的安全,也使其他操作系统可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
在上述技术方案中,优选地,在使用存储在任一操作系统中的预设密钥对存储卡中为任一操作系统设置的存储区域进行加密之前,还包括:将任一操作系统中已有的密钥设置为预设密钥;或为任一操作系统创建密钥,并将创建的密钥设置为预设密钥;以及将预设密钥存储在任一操作系统中。
在该技术方案中,使用已有的或新建的密钥可以对存储卡的存储区域进行加密,而将密钥存储在操作系统中,可以使该操作系统调用密钥对存储卡的加密区域进行加密或解密,同时,使不具有该密钥的其他操作系统或终端无法对该存储区域进行解密,从而无法获取该存储区域中的数据,保护了该操作系统存储在该存储区域中的数据的安全。
在上述技术方案中,优选地,还包括:对存储在任一操作系统中的预设密钥进行加密;以及在使用预设密钥对存储区域进行解密前,对预设密钥进行解密。
在该技术方案中,对预设密钥进行加密可以防止预设密钥被非法抹除或更改而导致无法对存储卡的加密的存储区域进行解密,也可以防止预设密钥被轻易截获,保护了密钥的安全性,从而间接保护了存储卡的加密的存储区域的安全。
在上述技术方案中,优选地,还包括:复制预设密钥,并将复制的预设密钥存储在多个操作系统中的任一操作系统以外的至少一个其他操作系统中,以使至少一个其他操作系统可以使用复制的预设密钥对存储区域进行解密。
在该技术方案中,可以将操作系统的预设密钥保存在其他操作系统 中,以使其他操作系统也可以解密并读取该操作系统的数据,比如,将普通操作系统的密钥保存在权限更高的安全系统中,则在安全系统中就可以通过该密钥对普通操作系统的加密文件夹进行解密,从而获取普通操作系统的加密数据。通过该技术方案,提升了对存储区域加密或解密的灵活性。
在上述技术方案中,优选地,还包括:在接收到访问存储区域的命令时,判断发出命令的操作系统中是否存储有预设密钥,其中,当判断结果为是时,根据预设密钥对存储区域进行解密,以允许操作系统访问存储区域;当判断结果为否时,不允许操作系统访问存储区域。
在该技术方案中,在操作系统请求访问加密的存储区域时,如果该操作系统具有对该存储区域进行解密的密钥,则使用该密钥对该存储区域进行解密,并可以为该操作系统挂载该存储区域,以允许该操作系统访问该存储区域中的数据。另外,为了保证存储区域的安全,在退出该操作系统时,可以取消对该存储区域的挂载。而在操作系统请求访问加密的存储区域时,如果该操作系统不具有对该存储区域进行解密的密钥,则无法对该存储区域进行解密,只能读取到该存储区域的加密状态为加密,从而无法获取该存储区域中的数据,保护了该存储区域中的数据的安全。
图2示出了根据本发明的另一个实施例的加密存储区域设置方法的流程图。
如图2所示,本实施例的加密存储区域设置方法用于包括安全系统和普通系统的双系统终端,包括:
步骤202,由普通系统进入安全系统。
步骤204,安全系统启动。在安全系统启动后,进入加密模块,安全系统的加密模块能够对存储卡的存储区域进行加密和解密,并具有用户交互界面供用户操作。
步骤206,判断存储卡的存储区域是否已加密,即获取存储区域的加密状态,当存储区域未加密时,进入步骤208,否则,进入步骤220。
步骤208,提示对存储区域加密。进入安全系统时首先获取存储区域的加密状态,如果没有加密,为确保安全系统下的数据安全,提示对存储 卡的存储区域加密。
步骤210,创建用户密码。
步骤212,创建密钥。创建的密钥是用来对存储卡的存储区域进行加密的。
步骤214,使用用户密码对密钥加密,保存加密后的密钥。加密时先创建用户密码,然后创建密钥,使用用户密码对密钥进行加密,将加密之后的密钥保存在安全系统下的系统分区中。其中,对密钥进行加密可以防止密钥被非法抹除或更改而导致无法对存储卡的加密的存储区域进行解密,也可以防止密钥被轻易截获,保护了密钥的安全性,从而间接保护了存储卡的加密的存储区域的安全。而将密钥存储在安全系统下的系统分区中,可以确保只有安全系统能调用密钥对存储卡的加密区域进行加密或解密,同时,使不具有该密钥的普通系统无法对该存储区域进行解密,从而无法获取该存储区域中的数据,保护了安全系统存储在该存储区域中的数据的安全。
步骤216,加密存储区域。加密后的存储区域用于存储安全系统需要加密的数据。
步骤218,设置加密状态。即将加密后的存储区域的加密状态设置为加密,并将加密状态保存在加密后的存储区域中。此时,所有通过安全系统写入到存储卡的该存储区域中的数据都是加密的。
步骤220,判断用户输入的密码是否正确,当判断结果为是时,进入步骤224,当判断结果为否时,进入步骤222。再次进入安全系统时首先获取存储区域的加密状态,如果是已经加密的存储区域,提示用户输入密码验证,密码验证成功后对存储卡进行解密挂载。
步骤222,禁止访问存储区域。
步骤224,解密挂载。即使用密钥对加密后的存储区域进行解密,并为安全系统挂载该加密后的存储区域。
步骤226,接收到退出安全系统的命令。
步骤228,取消解密挂载。
步骤230,进入普通系统。退出安全系统时对已经挂载的加密后的存 储区域取消挂载,则从普通系统下看到的加密后的存储区域下的所有数据均是密文。
图3示出了根据本发明的一个实施例的加密存储区域设置装置的框图。
如图3所示,本实施例的加密存储区域设置装置300用于具有多个操作系统的终端,包括:第一加密单元302,在任一操作系统中,使用存储在任一操作系统中的预设密钥对存储卡中为任一操作系统设置的存储区域进行加密;设置单元304,用于将存储区域的加密状态设置为加密;存储单元306,用于将加密状态保存在存储区域中,并将任一操作系统的需要加密的数据保存在存储区域中。
在该技术方案中,通过使用预先设置的密钥对操作系统在存储卡中设置的存储区域进行加密,可以保护该操作系统存储在该存储区域中的数据的安全,其中,对存储区域的加密方法包括但不限于采用Ecryptfs(一种虚拟的加密文件系统)进行加密。在该技术方案中,还可以将存储区域的加密状态设置为加密,将对加密区域进行加密的密钥保存在终端的操作系统中,并将加密区域的加密状态保存在存储卡的加密区域中。这样,可以使终端的其他操作系统或其他终端访问存储卡时读取到的存储区域的加密状态为加密,从而无法读取该操作系统存储在该存储区域中的数据,有效地保护了加密的存储区域中的数据的安全。同时,由于只对任一操作系统在存储卡中设置的存储区域加密,使得终端的多个操作系统都可以使用存储卡中的所有剩余空间,打破了操作系统只能使用自身挂载的存储区域的限制,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,使用安全系统中的密钥对该文件夹进行加密,并将该文件夹的加密状态保存在该文件夹中,这样,当终端的普通操作系统请求对该文件夹进行访问时,可以读取到该文件夹的加密状态为加密,而普通操作系统由于不具有上述的密钥,也就无法对该文件夹进行解密。因此,由于加密状态保存在该加密文件夹中,当退出安全系统时,即使安全系统取消对该文件夹的挂载,该文件夹仍为加密的,并不会影响该文件夹的安全性;同时,由 于上述原因,退出安全系统时可以取消安全系统对挂载的所有文件夹的挂载,使得普通操作系统可以挂载这些文件夹,同样,由于该文件夹仍为加密的,并不会影响该文件夹的安全性,从而保证了安全系统保存在该文件夹下的数据的安全,同时使安全系统和普通操作系统都可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
另外,在该技术方案中,可以在对操作系统设置在存储卡中的存储区域进行加密后,将该操作系统的需要加密的数据保存在该存储区域中,此时,由于该存储区域的加密状态为加密,使得所有通过该操作系统写入该存储区域的数据都是加密的,有效地保护了加密的存储区域中的数据的安全。例如,为双系统终端中的安全系统在存储卡的根目录下创建一个文件夹,在对该文件夹进行加密后,将该文件夹的加密状态保存在该文件夹中,因此,将数据保存在加密状态为加密的文件夹中之后,请求访问该数据时,必须先对该文件夹进行解密。
在上述技术方案中,优选地,还包括:控制单元308,在退出任一操作系统后,允许多个操作系统中的其他操作系统访问存储卡中的存储区域以外的所有剩余空间。
在该技术方案中,在退出操作系统后,由于加密区域的加密状态保存在加密区域中,即使其他操作系统访问该加密区域,由于不具有密钥,其他操作系统无法获取该加密区域中的数据,同时,由于该加密区域以外的其他空间未加密,其他操作系统可以使用其他空间,以满足了操作系统对高存储速度的需求。比如,在退出操作系统时可以取消该操作系统对其已挂载的所有文件夹的挂载,使得其他操作系统可以挂载这些文件夹,并且,对于该操作系统已经加密的文件夹,该操作系统对该文件夹取消挂载后,由于加密状态保存在文件夹内,即使其他操作系统挂载了该文件夹,该文件夹仍为加密的,其他操作系统只能读到密文,并不会影响该文件夹中的数据的安全性。因此,既保证了加密文件夹下的数据的安全,也使其他操作系统可以使用存储卡中的该文件夹以外的空间,提高了存储卡的空间利用率,满足了操作系统对高存储速度的需求。
在上述技术方案中,优选地,还包括:密钥设置单元310,将任一操作系统中已有的密钥设置为预设密钥;或为任一操作系统创建密钥,并将创建的密钥设置为预设密钥;以及存储单元306还用于:将预设密钥存储在任一操作系统中
在该技术方案中,使用已有的或新建的密钥可以对存储卡的存储区域进行加密,而将密钥存储在操作系统中,可以使该操作系统调用密钥对存储卡的加密区域进行加密或解密,同时,使不具有该密钥的其他操作系统或终端无法对该存储区域进行解密,从而无法获取该存储区域中的数据,保护了该操作系统存储在该存储区域中的数据的安全。
在上述技术方案中,优选地,还包括:第二加密单元312,用于对存储在任一操作系统中的预设密钥进行加密;以及第二解密单元314,用于在使用预设密钥对存储区域进行解密前,对预设密钥进行解密。
在该技术方案中,对预设密钥进行加密可以防止预设密钥被非法抹除或更改而导致无法对存储卡的加密的存储区域进行解密,也可以防止预设密钥被轻易截获,保护了密钥的安全性,从而间接保护了存储卡的加密的存储区域的安全。
在上述技术方案中,优选地,还包括:复制单元316,复制预设密钥;以及存储单元306还用于:将复制的预设密钥存储在多个操作系统中的任一操作系统以外的至少一个其他操作系统中,以使至少一个其他操作系统可以使用复制的预设密钥对存储区域进行解密。
在该技术方案中,可以将操作系统的预设密钥保存在其他操作系统中,以使其他操作系统也可以解密并读取该操作系统的数据,比如,将普通操作系统的密钥保存在权限更高的安全系统中,则在安全系统中就可以通过该密钥对普通操作系统的加密文件夹进行解密,从而获取普通操作系统的加密数据。通过该技术方案,提升了对存储区域加密或解密的灵活性。
在上述技术方案中,优选地,还包括:判断单元318,在接收到访问存储区域的命令时,判断发出命令的操作系统中是否存储有密钥;以及第一解密单元320,用于在判断单元318判断操作系统中存储有预设密钥 时,根据预设密钥对存储区域进行解密,以允许操作系统访问存储区域;以及控制单元308还用于:在判断单元318判断操作系统中未存储有预设密钥时,不允许操作系统访问存储区域。
在该技术方案中,在操作系统请求访问加密的存储区域时,如果该操作系统具有对该存储区域进行解密的密钥,则使用该密钥对该存储区域进行解密,并可以为该操作系统挂载该存储区域,以允许该操作系统访问该存储区域中的数据。另外,为了保证存储区域的安全,在退出该操作系统时,可以取消对该存储区域的挂载。而在操作系统请求访问加密的存储区域时,如果该操作系统不具有对该存储区域进行解密的密钥,则无法对该存储区域进行解密,只能读取到该存储区域的加密状态为加密,从而无法获取该存储区域中的数据,保护了该存储区域中的数据的安全。
图4示出了根据本发明的一个实施例的终端的框图。
如图4所示,本发明的一个实施例的终端400包括加密存储区域设置装置402(相当于图3示出的实施例中的加密存储区域设置装置300)。
其中,加密存储区域设置装置402可以使用存储在多个操作系统的任一操作系统中的密钥对该任一操作系统在存储卡中设置的存储区域进行加密,以保护该任一操作系统存储在该存储区域中的数据的安全,其中,对存储区域的加密方法包括但不限于采用Ecryptfs(一种虚拟的加密文件系统)进行加密。
加密存储区域设置装置402还可以将存储区域的加密状态设置为加密,并将加密区域的加密状态保存在存储卡的加密区域中。这样,可以使其他终端或多个操作系统中的其他操作系统访问存储卡时读取到的加密存储区域的加密状态为加密,从而无法读取该任一操作系统存储在该存储区域中的数据,有效地保护了加密的存储区域中的数据的安全。同时,由于只对该存储区域加密,使得终端400的多个操作系统都可以使用存储卡中的该存储区域以外的所有剩余空间,打破了操作系统只能使用自身挂载的存储区域的限制,提高了存储卡的空间利用率。因此,通过以上技术方案,可以在确保存储卡中的数据的安全的同时,使终端的多个操作系统可以共享存储卡的剩余空间。
以上结合附图详细说明了本发明的技术方案,通过本发明的技术方案,可以在确保存储卡中的数据的安全的同时,使终端的多个操作系统可以共享存储卡的剩余空间,满足了操作系统对高存储速度的需求。
根据本发明的实施方式,还提供了一种存储在非易失性机器可读介质上的程序产品,用于为操作系统设置加密存储区域,所述程序产品包括用于使计算机系统执行以下步骤的机器可执行指令:使用存储在任一操作系统中的密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;将所述存储区域的加密状态设置为加密,并将所述加密状态保存在所述存储区域中;将所述任一操作系统的需要加密的数据保存在所述存储区域中。
根据本发明的实施方式,还提供了一种非易失机器可读介质,存储有用于为操作系统设置加密存储区域的程序产品,所述程序产品包括用于使计算机系统执行以下步骤的机器可执行指令:使用存储在任一操作系统中的密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;将所述存储区域的加密状态设置为加密,并将所述加密状态保存在所述存储区域中;将所述任一操作系统的需要加密的数据保存在所述存储区域中。
根据本发明的实施方式,还提供了一种机器可读程序,所述程序使机器执行如上所述技术方案中任一所述的加密存储区域设置方法。
根据本发明的实施方式,还提供了一种存储有机器可读程序的存储介质,其中,所述机器可读程序使得机器执行如上所述技术方案中任一所述的加密存储区域设置方法。
在本发明中,术语“第一”、“第二”仅用于描述的目的,而不能理解为指示或暗示相对重要性;术语“多个”表示两个或两个以上。对于本领域的普通技术人员而言,可以根据具体情况理解上述术语在本发明中的具体含义。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (13)

  1. 一种加密存储区域设置方法,用于具有多个操作系统的终端,其特征在于,包括:
    在任一操作系统中,使用存储在所述任一操作系统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;
    将所述存储区域的加密状态设置为加密,并将所述加密状态保存在所述存储区域中;
    将所述任一操作系统的需要加密的数据保存在所述存储区域中。
  2. 根据权利要求1所述的方法,其特征在于,还包括:
    在退出所述任一操作系统后,允许所述多个操作系统中的其他操作系统访问所述存储卡中的所述存储区域以外的所有剩余空间。
  3. 根据权利要求1或2所述的方法,其特征在于,在所述使用存储在所述任一操作系统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密之前,还包括:
    将所述任一操作系统中已有的密钥设置为所述预设密钥;或为所述任一操作系统创建密钥,并将创建的所述密钥设置为所述预设密钥;以及
    将所述预设密钥存储在所述任一操作系统中。
  4. 根据权利要求3所述的方法,其特征在于,还包括:
    对存储在所述任一操作系统中的所述预设密钥进行加密;以及
    在使用所述预设密钥对所述存储区域进行解密前,对所述预设密钥进行解密。
  5. 根据权利要求3所述的方法,其特征在于,还包括:
    复制所述预设密钥,并将复制的所述预设密钥存储在所述多个操作系统中的所述任一操作系统以外的至少一个其他操作系统中,以使所述至少一个其他操作系统可以使用复制的所述预设密钥对所述存储区域进行解密。
  6. 根据权利要求5所述的方法,其特征在于,还包括:
    在接收到访问所述存储区域的命令时,判断发出所述命令的操作系统 中是否存储有所述预设密钥,
    其中,当判断结果为是时,根据所述预设密钥对所述存储区域进行解密,以允许所述操作系统访问所述存储区域;
    当判断结果为否时,不允许所述操作系统访问所述存储区域。
  7. 一种加密存储区域设置装置,用于具有多个操作系统的终端,其特征在于,包括:
    第一加密单元,在任一操作系统中,使用存储在所述任一操作系统中的所述预设密钥对存储卡中为所述任一操作系统设置的存储区域进行加密;
    设置单元,用于将所述存储区域的加密状态设置为加密;
    存储单元,将所述加密状态保存在所述存储区域中,并将所述任一操作系统的需要加密的数据保存在所述存储区域中。
  8. 根据权利要求7所述的装置,其特征在于,还包括:
    控制单元,在退出所述任一操作系统后,允许所述多个操作系统中的其他操作系统访问所述存储卡中的所述存储区域以外的所有剩余空间。
  9. 根据权利要求7或8所述的装置,其特征在于,还包括:
    密钥设置单元,将所述任一操作系统中已有的密钥设置为所述预设密钥;或为所述任一操作系统创建密钥,并将创建的所述密钥设置为所述预设密钥;以及
    所述存储单元还用于:
    将所述预设密钥存储在所述任一操作系统中。
  10. 根据权利要求9所述的装置,其特征在于,还包括:
    第二加密单元,对存储在所述任一操作系统中的所述预设密钥进行加密;
    第二解密单元,在使用所述预设密钥对所述存储区域进行解密前,对所述预设密钥进行解密。
  11. 根据权利要求9所述的装置,其特征在于,还包括:
    复制单元,复制所述预设密钥;以及
    所述存储单元还用于:
    将复制的所述预设密钥存储在所述多个操作系统中的所述任一操作系统以外的至少一个其他操作系统中,以使所述至少一个其他操作系统可以使用复制的所述预设密钥对所述存储区域进行解密。
  12. 根据权利要求11所述的装置,其特征在于,还包括:
    判断单元,在接收到访问所述存储区域的命令时,判断发出所述命令的操作系统中是否存储有所述预设密钥;以及
    第一解密单元,用于在所述判断单元判断所述操作系统中存储有所述预设密钥时,根据所述预设密钥对所述存储区域进行解密,以允许所述操作系统访问所述存储区域;以及
    所述控制单元还用于:
    在所述判断单元判断所述操作系统中未存储有所述预设密钥时,不允许所述操作系统访问所述存储区域。
  13. 一种终端,具有多个操作系统,其特征在于,包括:
    如权利要求7至12中任一项所述的加密存储区域设置装置。
PCT/CN2014/089600 2014-10-27 2014-10-27 加密存储区域设置方法、加密存储区域设置装置和终端 WO2016065517A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2014/089600 WO2016065517A1 (zh) 2014-10-27 2014-10-27 加密存储区域设置方法、加密存储区域设置装置和终端
CN201480081148.0A CN107077325A (zh) 2014-10-27 2014-10-27 加密存储区域设置方法、加密存储区域设置装置和终端
EP14904826.6A EP3214543A1 (en) 2014-10-27 2014-10-27 Method for setting encrypted storage area, apparatus for setting encrypted storage area, and terminal
US15/499,525 US20170242802A1 (en) 2014-10-27 2017-04-27 Method for setting encrypted storage area, apparatus for setting encrypted storage area, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/089600 WO2016065517A1 (zh) 2014-10-27 2014-10-27 加密存储区域设置方法、加密存储区域设置装置和终端

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/499,525 Continuation-In-Part US20170242802A1 (en) 2014-10-27 2017-04-27 Method for setting encrypted storage area, apparatus for setting encrypted storage area, and terminal

Publications (1)

Publication Number Publication Date
WO2016065517A1 true WO2016065517A1 (zh) 2016-05-06

Family

ID=55856341

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/089600 WO2016065517A1 (zh) 2014-10-27 2014-10-27 加密存储区域设置方法、加密存储区域设置装置和终端

Country Status (4)

Country Link
US (1) US20170242802A1 (zh)
EP (1) EP3214543A1 (zh)
CN (1) CN107077325A (zh)
WO (1) WO2016065517A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10742414B1 (en) 2019-10-18 2020-08-11 Capital One Services, Llc Systems and methods for data access control of secure memory using a short-range transceiver

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778383A (zh) * 2009-01-08 2010-07-14 索尼公司 用于信息处理的设备、方法、程序和系统
CN201590091U (zh) * 2009-10-13 2010-09-22 航天信息股份有限公司 基于口令认证的加密型存储卡读写装置
US8271801B2 (en) * 2009-11-19 2012-09-18 Hitachi Global Storage Technologies Netherlands B.V. Implementing data confidentiality and integrity of shingled written data
CN103617388A (zh) * 2013-12-11 2014-03-05 长城信息产业股份有限公司 一种具有进程可信认证的安全操作系统的实现方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9495562B2 (en) * 2011-07-25 2016-11-15 Lenovo (Singapore) Pte. Ltd. Removable storage device data protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778383A (zh) * 2009-01-08 2010-07-14 索尼公司 用于信息处理的设备、方法、程序和系统
CN201590091U (zh) * 2009-10-13 2010-09-22 航天信息股份有限公司 基于口令认证的加密型存储卡读写装置
US8271801B2 (en) * 2009-11-19 2012-09-18 Hitachi Global Storage Technologies Netherlands B.V. Implementing data confidentiality and integrity of shingled written data
CN103617388A (zh) * 2013-12-11 2014-03-05 长城信息产业股份有限公司 一种具有进程可信认证的安全操作系统的实现方法

Also Published As

Publication number Publication date
EP3214543A1 (en) 2017-09-06
CN107077325A (zh) 2017-08-18
US20170242802A1 (en) 2017-08-24

Similar Documents

Publication Publication Date Title
US11263020B2 (en) System and method for wiping encrypted data on a device having file-level content protection
KR101213118B1 (ko) 다기능 컨텐츠 제어가 가능한 메모리 시스템
KR101238848B1 (ko) 파티셔닝을 포함한 다기능 컨텐트 제어
US11675919B2 (en) Separation of managed and unmanaged data in a computing device
US11809584B2 (en) File system metadata protection
US20170277898A1 (en) Key management for secure memory address spaces
JP6203386B2 (ja) 異なるドメイン固有鍵を用いてコンテンツのセキュリティを確保するための方法
US20150256518A1 (en) Scalable and Secure Key Management for Cryptographic Data Processing
JP4857284B2 (ja) 多目的コンテンツ制御をするコントロール構造の生成システム
JP2008524753A5 (zh)
US8750519B2 (en) Data protection system, data protection method, and memory card
US10216913B2 (en) Mobile device with built-in access control functionality
JP2008524758A5 (zh)
US20120096280A1 (en) Secured storage device with two-stage symmetric-key algorithm
US11531626B2 (en) System and method to protect digital content on external storage
KR20150032970A (ko) 보안 기능을 제공하는 저장 매체 및 그 보안 방법
KR20070087175A (ko) 다기능 컨텐트 제어를 위한 제어구조 및 상기 구조를이용한 방법
KR20090052321A (ko) 다기능 제어 구조를 이용하는 콘텐트 제어 시스템과 방법
US11735319B2 (en) Method and system for processing medical data
KR20090026357A (ko) 증명서 체인을 이용한 콘텐트 제어 시스템과 방법
WO2016065517A1 (zh) 加密存储区域设置方法、加密存储区域设置装置和终端
EP3312758B1 (en) Encrypted capabilities stored in global memory
KR20240097595A (ko) 전체 디스크 암호화를 위한 암호화 키 관리 방법
JP2023161883A (ja) メモリシステム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14904826

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014904826

Country of ref document: EP