Open file encrypting method without distinguishing file types

A transparent file encryption and file type technology, applied in the field of information security, can solve file renaming and other problems, and achieve the effect of solving system vulnerabilities

Inactive Publication Date: 2011-04-20
HANGZHOU ZHENGLONG DIGITAL SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to overcome the essential weakness of the traditional transparent file encryption system, that is, it is necessary to bind a specific file type to determine whether encryption is required, thereby causing the inherent unavoidable loophole problem of this type of system, and further affecting the security and confidentiality requirements of this type of system The promotion of higher units provides a transparent file encryption method that does not distinguish between file types. Applying this method can completely solve the problems related to file extension restrictions such as file renaming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Open file encrypting method without distinguishing file types
  • Open file encrypting method without distinguishing file types
  • Open file encrypting method without distinguishing file types

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0026] The architecture of the transparent file encryption system is as follows: figure 1 , the encryption system is composed of an encryption client program, an encrypted file driver, a server program, and an authorization console. All computers within the authorized range are installed with transparent file encryption drivers and clients. With these drivers and clients, authorized computers in the group can access documents in the group without any business process changes. Documents can be transmitted within the group by email or QQ transmission. These documents are actually encrypted, but visitors in the group can directly access them, because they are decrypted and can be accessed directly by applications while opening them. to plaintext.

[0027] The location of the driver of the transparent file encryption system, such as figure 2 As shown, the tra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an open file encrypting method without distinguishing file types, comprising the steps as follows: determining whether the file is confidential by the file opening manner; using the files opened in read-write or write manner as confidential file when opened during the confidential process, and adding marks marking whether the file is encrypted; using the file as non-confidential file if the file is opened in a write manner; determining the process of the access file in an access control layer and making a decision; setting the confidential file as to-be-decrypted filewhen the confidential file is read in the confidential process; setting the file as to-be-encrypted file when the confidential file is written in the confidential process; and setting the confidentialfile as non-decrypted file when the confidential file or non-confidential file is read and written in the non-confidential process. In the invention, trivial determination of the extended file name is avoided, and all written sensitive files are encrypted in the process just by binding special process without affecting the normal operation of the process.

Description

technical field [0001] The invention mainly relates to the field of information security, mainly a transparent file encryption method that does not distinguish file types, and an automatic protection encryption method for preventing information from being copied out of a safe computer system environment without authorization. Background technique [0002] Information encryption technology has gone through two stages: traditional encryption technology and transparent encryption technology. [0003] Traditional encryption technology is man-made active encryption. For example, RAR with password compression, using the NTFS file system of Windows operating system and doing EFS encryption, using encrypted directories, encrypted hard disks, encrypted folders, etc., all require the operator to operate the encryption by himself. This type of encryption method can effectively prevent data loss and theft such as loss of portable devices and hard drives, but traditional encryption tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/62
Inventor 戴坚锋方燕川洪鹏王伟
Owner HANGZHOU ZHENGLONG DIGITAL SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products