Supercharge Your Innovation With Domain-Expert AI Agents!

File encryption-decryption method of USB removable storage device

A mobile storage device and storage device technology, applied in the field of information security, can solve the problems of non-real-time encryption and decryption, time-consuming and inconvenient, and achieve the effects of security performance assurance, good functional characteristics, and improved transmission rate

Inactive Publication Date: 2010-01-20
SOUTHEAST UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally speaking, such a system has several shortcomings. First, it is not real-time encryption and decryption. You must use the device before and after each use of the U disk, and then encrypt and decrypt it before using it; Encryption and decryption are time-consuming and inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption-decryption method of USB removable storage device
  • File encryption-decryption method of USB removable storage device
  • File encryption-decryption method of USB removable storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The file encryption and decryption method of the USB removable storage device of the present invention is respectively connected to the computer and the USB storage device through two USB interfaces, and the analysis and filtering of the USB data stream on one of the USB interfaces identifies the file data cluster of the FAT file system ; At the same time, by opening up a cache, using the direct mapping method to map with the address of the USB storage device, and temporarily storing the data that has been read and written recently; then use the encryption and decryption algorithm for the identified file data, and replace the encryption The data before decryption is finally returned to the physical layer and sent out from another USB interface. The key can be obtained from the key generation module through a reserved port.

[0025] Concrete steps that the present invention comprises are as follows:

[0026] 1. Analysis of USB data stream:

[0027] The analysis of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a file encryption-decryption method of a USB removable storage device, which is characterized in that two USB interfaces are respectively connected to a computer and a USB storage device, and a file data cluster of a FAT file system is identified by analyzing and filtering USB data stream of one of the USB interfaces; recentaly read and written data are stored temporarily in such a way that a buffer memory is set up and is mapped with an address of the USB storage device by a direct mapping method; then the identified file data are processed by encryption-decryption algorithm, replace data before, and finally are sent from another USB interface after returning to a physical layer; and a key can be obtained from a key generation module via a preset port.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a novel file-level encryption and decryption method for data stored in or read from a USB removable storage device such as a U disk. Background technique [0002] Usually, when there is no network environment, when the network is physically isolated, or when the transfer file is large, it is necessary to use a USB mobile storage device for convenient data transfer. Most of the USB mobile storage devices seen on the market do not have any security functions, and the file data of the computer is directly stored in the medium of the USB mobile storage device in the form of plain text through the USB port. In many occasions, people are not aware of the security of data stored in USB mobile storage devices, and the only thing that can be done is to try to ensure that the U disk will not be lost. In general, the data stored in the lost USB mobile storage devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F12/14G06F13/38
Inventor 胡爱群顾任亮范鹏飞
Owner SOUTHEAST UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More