Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File encryption system based on shadow file

A shadow file and file encryption technology, applied in the field of information security, can solve the problems of low memory utilization and file access efficiency, improve memory utilization and file access efficiency, and avoid frequently emptying the cache

Active Publication Date: 2016-03-23
嘉兴古奥基因科技有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problems of such a multi-FCB encrypted file system are: 1) When multiple processes access a file at the same time, the memory utilization rate and file access efficiency are low; 2) The way the operating system manages file data and file operations is changed, for example, The operating system thinks that the same file should have only one FCB and cache, and the change of this file data management method may encounter unexpected problems; 3) There is a big difference from the development of the usual file system driver

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption system based on shadow file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific implementation of the present invention will be described below. figure 1 It is a system structure diagram of the present invention.

[0033] The file encryption filter driver can be developed by using Windows file filter driver (filterdriver) or micro-filter driver (mini-filterdriver) technology.

[0034] It is a mature technology to judge trusted process and untrusted process by using Windows file filter driver or minifilter driver, so it will not be described here.

[0035] For file redirection, you can use the reparsepoint function of Windows file I / O (see the simrep.c code in the WDK).

[0036] A technical scheme that can be adopted for the file path of the shadow real image file is: temporary file directory name\file path of the original file. Here, the file path of the original file is the complete path of the original file to be opened or created by the program process, including the file where the file is located. Disk (Here, the file disk indica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a file encryption system based on a shadow file. The system comprises: a file encryption filter driver. When a file is opened or created by a trusted process, if the file to open or create is an encryption file or a file located in a security file directory or a security file disk, the file encryption filter driver redirects a file opening or creating operation to a temporary file directory. Then the file encryption filter driver converts an I / O operation of the trusted process to the shadow file into an I / O operation to an original file of the shadow file, and during the operation, decrypts read encryption data and encrypts plain data to be written, and keeps file information and cache data of the shadow file in file control blocks to be consistent with the file information and cache data of the original file in file control blocks. However, an untrusted process directly performs the I / O operation on the encryption file. Because the trusted process and the untrusted process have respective data caches, the problem of frequent purging a cache is avoided.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a file encryption system based on shadow files. Background technique [0002] The file encryption system based on the bridge file system based on the file filter driver (FileFilterDriver) can automatically realize the encryption and decryption of files without affecting the user's usage habits, and is an important technical means to ensure data security. However, the current transparent file encryption technology based on the file filter driver generally has the following problems. [0003] The current file system (such as the Windows file system) is a file system with a cache, that is, when an application reads the data of a file, the file system first checks whether the content to be read by the application is cached in the memory. , then directly return the data cached in the memory, otherwise, the file system reads a certain amount of file data (usually several ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209G06F2221/2107G06F2221/2149
Inventor 龙毅宏
Owner 嘉兴古奥基因科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products