Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data safety method preventing encrypted data from being exposed by table-board search tools

A data and tool technology, applied in the field of data security to avoid the exposure of encrypted data by desktop search tools, and can solve problems such as stealing secrets

Active Publication Date: 2008-04-16
EGIS TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The second case is that the user decrypts an encrypted file for normal editing in the plaintext state. Before the file is re-encrypted, the file being edited is indexed by the desktop search tool and the content is stored in its database. , leading to people who want to use the content stored in the database to steal secrets
[0010] The third case occurs when the virtual private disk is used
However, this method still requires the user to manually add the data that does not want to be indexed to the file exclusion index list, and the indexed data before being added to the file exclusion index list remains in the database of the desktop search tool just like the backup data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety method preventing encrypted data from being exposed by table-board search tools
  • Data safety method preventing encrypted data from being exposed by table-board search tools
  • Data safety method preventing encrypted data from being exposed by table-board search tools

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, below in conjunction with the accompanying drawings and its preferred embodiments, the specific implementation of the data security method proposed according to the present invention to prevent desktop search tools from exposing encrypted data Ways, methods, steps, features and effects thereof are described in detail below.

[0072] Before the present invention is described in detail, it should be noted that in the following description, similar elements are denoted by the same reference numerals.

[0073] Please refer to FIG. 4 , which is a schematic block diagram of a first preferred embodiment of the data security system for preventing desktop search tools from exposing encrypted data in the present invention. The first preferred embodiment of the data security system for preventing desktop search tools from exposing encrypted data in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data safety method which prevents exposure of encryption data by desktop searching tool and includes the following steps: (A) a data safety system with secure disk function is provided; (B) when receiving a control instruction, the data safety system judges whether the control instruction is transmitted by the desktop searching tool; if the control instruction is not transmitted by the desktop searching tool, the operation of the data safety system is still controlled by the control instruction; if the control instruction is transmitted by the desktop searching tool, a reject instruction is transmitted to be stored in the desktop searching tool. When a virtual secure disk receives a control instruction, the invention judges whether the control instruction is transmitted from the desktop searching tool at first; if the judgment is 'NO', the operation of the secure disk is still controlled by the control instruction; if the judgment is 'YES', the operation is stopped to prevent the index of the virtual secure disk by the desktop searching tool, thereby reaching the efficacy of ensuring data safety and privacy.

Description

technical field [0001] The invention relates to a data security method related to encrypted data, in particular to a data security method for preventing desktop search tools from exposing encrypted data. Background technique [0002] With the popularity of computers and high-capacity storage devices, users often store a large amount of digital data in computer storage devices. However, as the amount of digitized data accumulated in the computer gradually increases, the user may not be able to quickly and accurately find the location where the data is stored, and may even forget that the data for a specific piece of content is stored in that file. Desktop Search Tool (DesktopSearch Tool) is a tool born in response to this need, such as Google Desktop Search Tool, Microsoft Windows Desktop Search, Yahoo Desktop Search and AOL Desktop Search, etc. Users can install such desktop search tools on their personal computers , use keyword search to quickly find files or items of rela...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F12/14G06F17/30G06F21/62
CPCG06F21/6245
Inventor 赵锡炜何钰威吴嘉倡
Owner EGIS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products