Unlock instant, AI-driven research and patent intelligence for your innovation.

Virtual disk managing method

A technology of virtual disk and management method, which is applied in the field of virtual disk management with authority control mechanism, and can solve problems such as inability to provide different users with access flexibility, inability to identify encrypted file hosts, password cracking, etc.

Active Publication Date: 2009-06-03
VIA TECH INC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The password is very likely to be cracked by others, so that the encrypted file can be used by others
In addition, since the known virtual disk management does not have any authority control mechanism, it cannot provide access flexibility for different users
In addition, since the known virtual disk management mechanism cannot identify the host to which the encrypted file belongs, the encrypted file may also be copied to other hosts for use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual disk managing method
  • Virtual disk managing method
  • Virtual disk managing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] image 3 A virtual disk management system according to an embodiment of the present invention is shown.

[0029] As shown in the figure, the virtual disk management system 300 according to the embodiment of the present invention includes at least an encryption device application 310 and a storage device 320 . The encryption device application program 310 can receive a password from the user, and encrypt the file space in the storage device 320 according to the virtual disk management method of the present invention to become an encrypted file 321 . The storage device 320 has a device code 322 . The device code is used to identify the storage device, which may be a code defined by humans, or an identification code of components in the storage device. For example, it may be a Universal Unique Identifier (UUID) of a hard disk of the storage device 320 or a UUID of a central processing unit (not shown) of the storage device 320 . In addition, the storage device 320 may a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a virtual magnetic disk management method and system, comprising: firstly, setting file space and the first code; obtaining the first device code; getting the encrypted file by encrypting file space according to the first code and the first apparatus code; then, accepting the appointment of the encrypted file; receiving the second code; obtaining the second apparatus code; deciding whether the second code according for the first code, and deciding whether the second apparatus code according for the first apparatus code; if the second code according for the first code and the second apparatus code according for the first apparatus code, suspending the encrypted file to be virtual magnetic disk.

Description

technical field [0001] The present invention relates to a virtual disk (Virtual Disk) management method and system, and in particular to a virtual disk management method and system with an authority control mechanism, wherein a specific user / group can be assigned to a specific host on a specific host The encrypted device is mounted (Mount). Background technique [0002] In a computer system, some applications, such as Encrypted Device Application (EDA), can encrypt a specific file space and attach the encrypted file as a virtual disk. Virtual disks can use different encryption algorithms to save user information to avoid malicious attacks by viruses or hackers. [0003] Knownly, in the process of creating an encrypted file, the encryption device application program encrypts the file according to the password set by the user. During the process of attaching the encrypted file, the encryption device application program also judges whether the password is correct to determine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00G06F21/62
Inventor 陈瑞华
Owner VIA TECH INC