Android file lockbox system based on double chaotic hash file control

A file control and password box technology, which is applied in the field of password box systems to avoid the occupation of effective space, realize data management, and strengthen security management.

Active Publication Date: 2022-04-29
JILIN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The purpose of the present invention is to propose a method to effectively solve the problem of effective utilization of user storage space in the software design of the Android system, as well as the security problem of protecting stored data and files.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android file lockbox system based on double chaotic hash file control

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0133] Example 1: The user installs and uses the lockbox system for the first time.

[0134] When installing and using the lockbox system for the first time, the user needs to set the password to enter the system, and set the total number of files saved in the lockbox, that is, the number of nodes, and the directory information of the encrypted files stored in the external memory.

[0135] The password set by the user is converted into the parameters cp_1, t[0]_1, cp_2, t[0]_2, Init_Num and RNum of the two Logistic equations through the system conversion function strConver, and through the system function kValue=Hkey(cp_1, t[0 ]_1, cp_2, t[0]_2, Init_Num, RNum) generate a digital certificate for user login verification and store it in the internal memory.

[0136] The user sets the total number of nodes in the system (NumNodes). When the system is installed with an SD card, the system obtains the directory status through the Environment class. In Android 6.0 and above, the per...

example 2

[0141] Example 2: The user adds files to the lockbox.

[0142] The user enters the personal password, and the lockbox system uses the conversion function strConver to generate a digital certificate for the current user login verification through the system function kValue=Hkey(). This certificate is compared with the user's original digital certificate stored in the internal memory. If they are consistent, the verification is passed. , the login is successful; otherwise, the authentication error occurs, and the user will not be able to log in to the system.

[0143] The user chooses to browse the folder, finds the file that needs to be added to the lockbox, and after selecting the Add function button, it first needs to compare whether the total number of nodes in the current fast table is less than CB_NNum. If it is greater than or equal to CB_NNum, it means that the lockbox system has reached the upper limit and cannot be stored any more. Encrypted files.

[0144] If there a...

example 3

[0147] Example 3: Expand the lockbox.

[0148] This system can establish the user's digital certificate according to the correct password provided by the user, and rebuild the file directory table FLT. The user needs to back up the file header FH file, and copy the backed up encrypted file to the directory where the encrypted file is stored in the external storage. Open the file header FH, reverse initialize the file directory table FLT, read the content of each node in the file header FH in turn, set the value of Order according to the value of FKey, and initialize Empty, restore the digital certificate according to the FGKC item to generate a digital certificate file .

[0149] When the user provides a wrong password, because the user's current digital certificate is inconsistent with the original digital certificate, the FKey value of the established file directory table FLT is inconsistent with the FKey value of the original file header FH that needs to be restored; there...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an Android file password box system based on double chaotic hash file control. Quick browse, add, modify, delete, backup and rebuild operations of encrypted files in the external storage; when the user exits, the content of the fast table is written back to the data structure file. The invention fully considers the user's mobile phone configuration and personal security requirements, avoids mandatory occupation of the user's storage space, and the user can flexibly set different file security protection levels. According to the characteristics of the Android system, this system designs a new data structure file to realize the control of the file, avoids the trouble of users setting different passwords for encrypting multiple files, and provides the function of protecting copyright files; and the system reconstruction function avoids illegal users. The attack greatly improves security and runs faster.

Description

technical field [0001] The invention relates to the technical fields of computer software systems and information security, in particular to a lockbox system for Android files based on double chaotic hash file control. [0002] technical background [0003] The Android (Android) system is a free and open-source operating system based on Linux, which is mainly used in mobile devices, such as electronic devices such as smart phones and tablet computers. [0004] In October 2003, Andy Rubin and others created the Android company and formed the Android team. In August 2005, Google acquired and invested in Android and its team. In 2007, in order to compete with the Symbian system and seize the embedded operating system market, Google officially announced the Android operating system and established a global alliance organization to unite major mobile phone manufacturers, software developers, and telecom operators. Merchants and chip manufacturers join in, open the source code of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/33
CPCG06F21/6218G06F21/602G06F21/33
Inventor 刘晓夏陈海鹏刘晋汐
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products