Android file code box system based on double chaotic hash file control

A technology of file control and lockbox, applied in the field of lockbox system

Active Publication Date: 2021-02-19
JILIN UNIV
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The purpose of the present invention is to propose an effective solution to the problem of effective utilization of user storage space in Android system software design, and to protect the security of stored data and files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android file code box system based on double chaotic hash file control

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0133] Example 1: The user installs and uses the lockbox system for the first time.

[0134] When installing and using the lockbox system for the first time, the user needs to set the password to enter the system, and set the total number of files saved in the lockbox, that is, the number of nodes, and the directory information of the encrypted files stored in the external memory.

[0135] The password set by the user is converted into the parameters cp_1, t[0]_1, cp_2, t[0]_2, Init_Num and RNum of the two Logistic equations through the system conversion function strConver, and through the system function kValue=Hkey(cp_1, t[0 ]_1, cp_2, t[0]_2, Init_Num, RNum) generate a digital certificate for user login verification and store it in the internal memory.

[0136] The user sets the total number of nodes in the system (NumNodes). When the system is installed with an SD card, the system obtains the directory status through the Environment class. In Android 6.0 and above versions...

example 2

[0141] Example 2: The user adds files to the lockbox.

[0142] The user enters the personal password, and the lockbox system uses the conversion function strConver to generate a digital certificate for the current user login verification through the system function kValue=Hkey(). This certificate is compared with the user's original digital certificate stored in the internal memory. If they are consistent, the verification is passed. , the login is successful; otherwise, the authentication error occurs, and the user will not be able to log in to the system.

[0143] The user chooses to browse the folder, finds the file that needs to be added to the lockbox, and after selecting the Add function button, it first needs to compare whether the total number of nodes in the current fast table is less than CB_NNum. If it is greater than or equal to CB_NNum, it means that the lockbox system has reached the upper limit and cannot be stored any more. Encrypted files.

[0144] If there a...

example 3

[0147] Example 3: Expand the lockbox.

[0148] This system can establish the user's digital certificate according to the correct password provided by the user, and rebuild the file directory table FLT. The user needs to back up the file header FH file, and copy the backed up encrypted file to the directory where the encrypted file is stored in the external storage. Open the file header FH, reverse initialize the file directory table FLT, read the content of each node in the file header FH in turn, set the value of Order according to the value of FKey, and initialize Empty, restore the digital certificate according to the FGKC item to generate a digital certificate file .

[0149] When the user provides a wrong password, because the user's current digital certificate is inconsistent with the original digital certificate, the FKey value of the established file directory table FLT is inconsistent with the FKey value of the original file header FH that needs to be restored; there...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an android file code box system based on double chaotic hash file control, which has the functions of reading a system data structure file in an internal memory after successfullogin in an android system, establishing a fast table in the memory, and storing the fast table in the internal memory. Rapid browsing, adding, modifying, deleting, backing up and reconstructing operations on the encrypted file stored in the external memory are realized; When the user exits, the content of the fast table is written back into the data structure file. Mobile phone configuration andpersonal safety requirements of the user are fully considered, the storage space of the user is prevented from being forcibly occupied, and the user can flexibly set different file safety protectionlevels. According to the system, a new data structure file is designed according to the characteristics of the Android system to realize file control, so that the trouble that a user sets different passwords for encrypting a plurality of files is avoided, and a function of protecting copyright files is provided; and through the system reconstruction function, the attack of illegal users is avoided, the security is greatly improved, and the operation speed is higher.

Description

technical field [0001] The present invention relates to the field of computer software systems and information security technologies, in particular to a lockbox system based on Android files controlled by double chaotic hash files. [0002] technical background [0003] Android (Android) system is a free and open source operating system based on Linux, which is mainly used in mobile devices, such as electronic devices such as smart phones and tablet computers. [0004] In October 2003, Andy Rubin and others founded the Android company and formed the Android team. In August 2005, Google acquired and invested in Android and its team. In 2007, in order to compete with the Symbian system and seize the embedded operating system market, Google officially announced the Android operating system and established a global alliance organization to unite major mobile phone manufacturers, software developers, and telecom operators. Merchants and chip manufacturers join in, open the sourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/33
CPCG06F21/6218G06F21/602G06F21/33
Inventor 刘晓夏陈海鹏刘晋汐
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products