Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for accessing virtual disk

A virtual disk and file system technology, applied in the field of data security, can solve problems such as tampering, easy discovery and access, and data security cannot be guaranteed, achieving the effect of process isolation and improved security

Active Publication Date: 2018-08-14
FUJIAN LANDI COMML EQUIP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for some important files, the data security cannot be guaranteed, or the data security threshold cannot be raised
Specifically, the data is exposed under the disk corresponding to the virtual drive letter, which is easy to be discovered and accessed, or even tampered with; process isolation cannot be performed, and all processes can access the disk, and data security cannot be guaranteed after the system is infected with a virus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for accessing virtual disk
  • Method and system for accessing virtual disk
  • Method and system for accessing virtual disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to describe the technical content, achieved goals and effects of the present invention in detail, the following descriptions will be made in conjunction with the embodiments and accompanying drawings.

[0019] The most critical idea of ​​the present invention is: a kind of virtual disk method that realizes based on application layer, through API interception technology, carry out API repositioning to disk access, register drive letter to virtual disk, by calling system API to specify file location custom The path of the drive letter, the process can normally access the required data.

[0020] Please refer to figure 2 , Embodiment 1 of the present invention provides a method for accessing a virtual disk, including:

[0021] S1: Start the project, load the virtual disk module, and register the drive letter corresponding to the path of the virtual disk;

[0022] S2: Intercept API functions related to the process of accessing the virtual disk, so that the system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for accessing a virtual magnetic disk. The method comprises: starting a project, loading a virtual magnetic disk module, and registering a drive letter corresponding to a virtual magnetic disk path (S1); intercepting a related API function accessing a virtual magnetic disk process, so that a system firstly processes a file operation analog function of the virtual magnetic disk module when the API function is called (S2); and returning the analog function processing result to a system API function, and outputting a result parameter (S3). In this way, required data can be normally accessed and process isolation can be implemented at the same time, thereby improving the security of a virtual magnetic disk.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and system for accessing a virtual disk. Background technique [0002] In the current project, to decrypt an encrypted file, the file is relatively small and can be directly decrypted in the memory and stored in the string memory; when the file is relatively large and the number of files is large, it is usually compressed into one file and then Encryption, in the process of decryption, they are directly placed in a relatively hidden folder that is not easily found by users. These two methods are either cumbersome in management or problematic in security. [0003] figure 1 It is a conventional access process processing method in the prior art. Although the virtual disk can save data, it also faces the same problem in terms of security. Since the virtual disk is implemented by reading and writing specified files through the driver layer IO, taking WINDOWS as an e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 张维超
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products