Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Folder encryption method and device for Unix-like operating system

An operating system and folder technology, applied in the direction of digital data protection, etc., can solve problems such as insufficient confidentiality

Inactive Publication Date: 2013-12-04
亚太宝龙科技(湖南)有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Because the directory in the existing operating system is usually implemented by means of indexing, etc., so common encrypted file storage adopts the encryption of a single file and the corresponding type of open tool. Encryption of the entire disk or partition, or encryption through the loopback device file, the confidentiality is not enough, therefore, a new folder encryption method or system is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Folder encryption method and device for Unix-like operating system
  • Folder encryption method and device for Unix-like operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0021] Unix-like systems (Unix-like) refer to various traditional Unix systems, such as FreeBSD, OpenBSD, Solaris of SUN, and various systems similar to traditional Unix, such as Minix, Linux, QNX, etc., which have inherited to a considerable extent The characteristics of the original UNIX have many similarities, and they all comply with the POSIX specification to a certain extent.

[0022] figure 1 It is a schematic diagram of an embodiment of the folder encryption method of the Unix-like operating system of the present invention. Such as figure 1 Shown:

[0023] Step 101, create an encrypted file system with the name of the encrypted folder as a parameter in the directory where the encrypted folder is located.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a folder encryption method and device for a Unix-like operating system. An encrypted file system is created in a catalog where an encrypted folder is located, wherein the name of the encrypted folder is used as a parameter of the encrypted file system; files in the encrypted folder are copied to the encrypted file system, the encrypted folder is deleted, and a routine shortcut with the same name as the encrypted folder is created; when a user double clicks a shortcut icon to enable a start routine of the encrypted file system, a password input by the user is verified, a temporary catalogue is created after the verification succeeds, and the encrypted file system is mounted to the temporary catalogue. The folder encryption method and device for the Unix-like operating system can encrypt folders and achieve the effect that encrypted files can be in a protection state under both a dynamic condition and a static condition by loading and unloading the encrypted file system.

Description

technical field [0001] The invention relates to the technical field of file security, in particular to a folder encryption method and device for a Unix-like operating system. Background technique [0002] At present, with the wide application of personal computers and office automation, the security of stored files has become a hot issue of concern. Due to the need for file sharing and other aspects, the same file may be accessed by multiple people, which increases the possibility of data leakage. [0003] Because the directory in the existing operating system is usually implemented by means of indexing, etc., so common encrypted file storage adopts the encryption of a single file and the corresponding type of open tool. The encryption of the entire disk or partition, or the encryption of the file through the loopback device, has insufficient confidentiality. Therefore, a new folder encryption method or system is needed. Contents of the invention [0004] In view of this...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
Inventor 邓庆华
Owner 亚太宝龙科技(湖南)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products