Enciphered protection and read write control method for computer data

A data encryption, read-write control technology, applied in computing, electrical digital data processing, digital data processing components and other directions, can solve the problems of data loss, inconvenient operation, inability to protect existing data, etc., to prevent leakage, prevent Destroyed, easy-to-use effects

Inactive Publication Date: 2008-04-02
陆峰
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages: ①The object of encryption is file content data, not all data on the hard disk
②Encrypted files can still be seen, and can still be deleted when there is no corresponding USB-KEY, resulting in data loss
③Because the file filtering technology can only intercept the read and write operations with files as the object, it is impossible to intercept the read and write directly to the sector, such as formatting. The attacker only needs to use the formatting function to store important data completely destroyed
The user puts the files to be encrypted in this virtual partition, and the read and write operations in this virtual partition will be encrypted. If there is no corresponding USB-KEY, it cannot be accessed
Disadvantages: ① Existing data cannot be protected. If you want to protect it, you must first copy it to the virtual partition
②Like HDLOCK, it can only protect data in the form of files ③It can only be operated in the predetermined space size
④Because the virtual partition of Hidden Dragon Token is also a file, the attacker can still delete it or format the partition where it is located without the KEY, resulting in data loss
Disadvantages: ①The cost of the card is higher
②For data security, the card should be unplugged when leaving the computer. Since the card is plugged into the computer motherboard, the computer case must be opened to be plugged in and out. The operation is extremely inconvenient, especially for many notebook computers. There is no place to insert a card at all
③ To encrypt, the entire hard disk must be encrypted. It is not possible to select only one or a group of partitions to encrypt, while the remaining partitions are not encrypted.
[0008] In the prior art, there is no encryption method combined with USB-KEY and sector-level read-write interception, and a method combined with read-write operation control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enciphered protection and read write control method for computer data
  • Enciphered protection and read write control method for computer data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] 1. Sector-level read-write interception

[0055] a) First analyze the starting and ending sector numbers of the partition to be protected.

[0056] We have to analyze the entry parameters of int13h and the hard disk partition table chain.

[0057] The entry parameters of int13h are:

[0058] ah function number

[0059] al the number of sectors to read / write ch cylinder number cl sector number dh head number dl drive number (where 0 is a:, 1 is b:, and 80h is the first hard disk)

[0060] From ah, determine whether it is a write operation and decide whether to intercept it. From dl, you can determine whether it is a floppy disk or a hard disk. The last question is how to determine whether it is a logical c area or a d area, e area... whether they should be write-protected partitions .

[0061] We use debug to enter a short assembler

[0062] mov dl, 80h; drive letter

[0063] mov dh, 0; head number 0

[0064] mov ch, 0; cylinder number 0

[0065] mov cl, 1; sector 1

[0066]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a computer data cipher protection and a read / write control method, which applies a generate method combining a serial bus ciphering dog or software identity certification with the sector stage read / write interception to realize cipher to hard disk data, which utilizes the sector stage read / write interception method to intercept all read / write operations, carries out cipher / decipher conversion in the cipher core under the condition of existing related identity certification to realize the cipher to disk data and read / write control.

Description

Technical field [0001] The present invention relates to an encryption protection of computer data and a related read-write control method, in particular a universal serial bus dongle (USB-KEY), sector-level read-write interception, and an encryption core (the encryption core is responsible for the data Encryption and decryption) and a combination of controlling read and write operations. Background technique: [0002] Authenex’s data encryption product HDLOCK uses a combination of USB-KEY and software encryption core to encrypt data on hard disk files. Its implementation technology is based on the file filtering technology of the operating system, that is, intercept all read and write operations on files, and perform encryption and decryption conversion in the encryption core. This conversion will only be performed when the corresponding USB-KEY exists. If it does not exist, the encrypted file data cannot be read correctly, thus realizing the encryption of the data. Disadvantages...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F1/00
Inventor 付爱香
Owner 陆峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products