Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File encryption method combined with access deflection

A file encryption and file technology, which is applied in the field of file encryption combined with access deflection, can solve the problem of complex policy configuration, achieve the effect of simple policy configuration and ensure information security

Inactive Publication Date: 2010-06-30
深圳市虹安信息技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to overcome the problem of complex policy configuration in the current document encryption method, the present invention proposes a document encryption method combined with access deflection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method combined with access deflection
  • File encryption method combined with access deflection
  • File encryption method combined with access deflection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The access deflection module described in the present invention is a file microfilter driver under Windows, which needs to be used in combination with a transparent encryption module. The system framework is as follows: Figure 5 shown.

[0036] The access deflection module intercepts and processes various file operations at the bottom layer, mainly including the following file operations: open and create (IRP_MJ_CREATE), directory query (IRP_MJ_DIRECTORY_CONTROL), and delete and rename (IRP_MJ_SET_INFORMATION).

[0037] 1 Open and create processing (IRP_MJ_CREATE)

[0038] In the process of file opening and creation, deflection processing is mainly performed, and the logic is relatively simple, such as Image 6 shown. First obtain the file name and judge whether deflection is needed according to the file name; for the file that needs to be deflected, further judge whether to perform a modification operation; if it is a modification operation, perform copying or direc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file encryption method combined with access deflection, which is applied in information safety field. The method uses an access deflection module converts file rename into a combination of duplication and deletion operation, and deflects operations like simultaneous open and establishment. The problem of complex strategy allocation caused by rename can be solved when the access deflection module is coordinately used with a transparent encryption module; and when a user performs the operation of Save Copy As which is possible to result in divulging secrets, the invention can automatically deflect and encrypt, thus avoiding the possibility of divulging secretes. The invention has the advantages of simple strategy, wide application range and the like.

Description

technical field [0001] The invention relates to a method for encrypting and decrypting files by using a computer, especially a method for configuring encryption and decryption strategies. Background technique [0002] Encrypting documents is a common means of ensuring information security, which can effectively prevent unauthorized third parties from obtaining information. Currently, there are various file encryption methods, such as manually encrypting files at the application layer, or automatically encrypting at the driver layer (that is, transparent encryption), and the like. Among them, the transparent encryption method has been widely used because it does not require user intervention and does not change the user's operating habits. [0003] According to the needs of actual use, transparent encryption generally provides flexible policy setting methods, such as setting the specified process to only encrypt specific suffixes (for example, Word only encrypts doc, not txt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/60
Inventor 胡跃李新卓勇
Owner 深圳市虹安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products