Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Realization method of data encryption in hard disk

A data encryption and realization method technology, applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve problems such as poor product compatibility, inaccessible data, troubles, etc., to save equipment use costs, reduce learning costs, Ease of use

Inactive Publication Date: 2011-05-11
许燕
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because some operations are not disclosed, the stability of the product is poor
[0005] 2: When the operating system is upgraded, the file system is often optimized, and these optimizations often cause the product to be unusable, resulting in poor product compatibility
[0006] 3: All data in the space in the protected directory is encrypted, including the directory structure. Once the directory is accessible, the data can be accessed, so data backup is more troublesome
[0008] 1: The disk file is an ordinary data file, and there is a risk of accidental damage. Once the file is damaged, all data will be inaccessible
[0009] 2: The appearance and disappearance of the disk cannot be automated, and the user needs to manually start and uninstall, which is troublesome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method of data encryption in hard disk
  • Realization method of data encryption in hard disk
  • Realization method of data encryption in hard disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to describe in detail the structure of the present invention and the effect achieved, the following preferred embodiments are now given and described as follows in conjunction with the accompanying drawings:

[0035] figure 1 In , applications and user operations interact with the system file interface, and the system file interface converts the request into a kernel state file service request. These requests are first sent to the file system driver, the file system driver transfers the request to the file system filter driver, and the filter driver filters the file request, the unauthorized file request will be directly rejected, and then the authorized request is distributed to the corresponding disk Device driver; after the virtual disk receives the access request, it maps the request and then transfers it to the actual disk driver; the filter driver and the virtual disk driver operate according to the current state of the HID USB Key. If the Key does not e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a realization method of data encryption in a hard disk, comprising the following steps: monitoring the status of a USB (universal serial bus) Key in real time, performing identity authentication by using an authorized USB Key and obtaining a secret key; storing the protected data in a protected catalog, mapping the space of the protected catalog into a virtual disc when the authorized authentication is successful, encrypting the data written into the disc and deciphering the data read from the disc; using an unprotected catalog as the common disc catalog; and hiding the virtual disc to prevent the access of the protected catalog and the protected data when the authorized USB Key is absent. The data stored in the virtual disc storage area of the protected catalog is encrypted forever, and is automatically decrypted in a memory when being used by a user. The method provided by the invention has the advantages that various discs and various file system can be supported, the traditional data use habit and application program behavior are not changed, and users do not need to purchase new disc devices.

Description

Technical field [0001] The invention relates to a method for realizing encryption of hard disk data, mainly realizing automatic encryption and decryption protection of user hard disk data. Enable users to achieve automatic encryption and decryption of hard disk data without adding new system hardware facilities and changing traditional data usage habits, improve information security, prevent information leakage, and achieve For safe storage purposes. The method obtains the key from the USB Key and performs identity authentication, uses virtual disk technology to realize real-time transparent encryption and decryption of data; uses file filtering driver technology to realize virtual disk storage file protection; this method specifies a protected directory on the hard disk, and this directory The user cannot access it arbitrarily; when the USB Key exists, use the virtual disk technology to map the virtual disk storage files in the directory space to a disk for the user to use, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F17/30
Inventor 不公告发明人
Owner 许燕
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products