Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File security protection method and apparatus

A security protection and file technology, applied in the protection of internal/peripheral computer components, digital data protection, etc., can solve the problems of high programming language requirements, inconvenience, and inability to effectively protect files, and achieve the effect of flexible and simple debugging

Inactive Publication Date: 2017-03-29
BEIJING ERENEBEN INFORMATION TECH
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the ARM TrustZone technology uses the s bit on the central processing unit (Central Processing Unit, CPU) to manage the security zone and the non-security zone, and the security zone is configured in the ROM (Read-Only Memory, read-only memory) of the CPU. Due to the limited storage space of the ROM of the CPU, limited by the space of the ROM, the operating system in the security zone is usually a very simplified system with limited functions, and some large files cannot be effectively protected by storing them in the ROM of the CPU.
In addition, because the security zone established based on the CPU has high requirements for programming languages, the programming in this security zone is all using C language, which has many restrictions in use, which is very inconvenient and troublesome to debug, and is not suitable for large-scale applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security protection method and apparatus
  • File security protection method and apparatus
  • File security protection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0046] see figure 1 , the first embodiment of the present invention provides a file security protection method, the method comprising:

[0047] Step S101, initialize the kernel controller in the Linux kernel, load the first virtual operating system and the second virtual operating system;

[0048] After the mobile terminal starts, first load the Linux kernel (Kernel), then initialize the kernel controller (namespace monitor) in the Linux kernel, then load the first virtual operating system and the second virtual operating system one by one on the Linux kernel, and make the first virtual operating system A virtual operating system is in an active state, and a second virtual operating system is in a suspended state. The above-mentioned first virtual operating system and the second virtual operating system are installed in independent storages, such as the internal memory of the mobile terminal. In addition, the first virtual operating system and the second virtual operating sy...

no. 2 example

[0062] see image 3 , the second embodiment of the present invention provides a file security protection method, the method comprising:

[0063] Step S201, establish a first virtual operating system and a second virtual operating system independent of each other on the Linux kernel, allocate corresponding first storage space for the first virtual operating system, and allocate corresponding storage space for the second virtual operating system. a second storage space, the first storage space is used to store the description information of the private file, and the second storage space is used to store the private file;

[0064] Based on the Namespace (namespace) technology of the Linux kernel, two virtual operating systems with different namespaces independent of each other are established on the Linux kernel. The first virtual operating system and the second virtual operating system are installed in independent memories, such as mobile in the terminal's memory. The above tw...

no. 3 example

[0089] see Figure 4 , the third embodiment of the present invention provides a file security protection device, which can be applied to a mobile terminal. As the execution subject of the file security protection method provided in the above embodiment, it may be a mobile terminal or a module in the mobile terminal. Such as Figure 4 As shown, the device mainly includes: an initialization module 301, a system switching module 302 and an opening module 303, and the functions realized by each module are as follows:

[0090] The initialization module 301 is used to initialize the kernel controller in the Linux kernel, and load the first virtual operating system and the second virtual operating system one by one;

[0091] The system switching module 302 is configured to switch the current operating system to the second virtual operating system through the kernel controller and suspend the first virtual operating system when the first virtual operating system receives an instructi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file security protection method and apparatus. The method comprises the steps of initializing a kernel controller in a Linux kernel, and loading a first virtual operation system and a second virtual operation system one by one; when the first virtual operation system receives a private file opening instruction triggered by a user, switching the current operation system to the second virtual operation system through the kernel controller, and halting the first virtual operation system, wherein the private file opening instruction is triggered based on description information of a private file stored in a first storage space; and opening the private file stored in a second storage space and associated with the description information in the second virtual operation system, wherein the first storage space and the second storage space are invisible for each other. According to the method and the apparatus, the private file can be effectively prevented from being stolen by a malicious program in a viewing process, so that the security of the private file is improved.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a file security protection method and device. Background technique [0002] With the development of mobile communication technology, mobile terminals such as mobile phones are more and more widely used in people's life. However, with the proliferation of malicious software and Trojan horse viruses, the problems of user information security and privacy protection are becoming increasingly prominent. Users' personal information on mobile terminals is often stolen maliciously, such as private pictures being screenshotted, input passwords being stolen by keyloggers, etc. With the rise of services such as mobile payment, it is necessary to prevent passwords, user bank account numbers and other personal information from being maliciously stolen The problem of theft is even more imminent. [0003] In the prior art, in order to solve the above problems, the ARM TrustZone te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/74
CPCG06F21/62G06F21/74
Inventor 陈家楠朱少杰周佳杜国楹
Owner BEIJING ERENEBEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products