Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for encrypting files by adopting encryption sandbox

A file encryption and sandbox technology, applied in the direction of instruments, electronic digital data processing, platform integrity maintenance, etc., can solve the problems of transparent encryption, difficult to stabilize policy settings, complexity, etc., to achieve no risk of leakage, easy solution, simple policy configuration Effect

Inactive Publication Date: 2010-09-29
深圳市虹安信息技术有限公司
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to overcome the problems that the current transparent encryption is difficult to stabilize and the policy settings are complicated, the present invention proposes sandbox encryption technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting files by adopting encryption sandbox
  • Method for encrypting files by adopting encryption sandbox
  • Method for encrypting files by adopting encryption sandbox

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The virtual disk system described in the present invention, the redirection module and the transparent encryption module are all the underlying drivers of the system, and the relationship between them is as follows: image 3 As shown, the schematic diagram of the file encryption and decryption process, such as Figure 4 .

[0031] 1 virtual disk system

[0032] Virtual disks are used to store redirected file data, which can be implemented using file virtual disks and memory virtual disks. For file virtual disks, the operation process is as follows Figure 5 shown. First, the correct key must be set, otherwise the loading is refused; after the device object is created, in order to prevent application programs from accessing, no further symbolic links (that is, drive letters) are created. After the device is created, first clear the original data, and then mainly process the reading and writing of the virtual disk: encrypt according to the key when writing, and decryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting files by adopting an encryption sandbox, which borrows ideas from the sandbox principle. When opened, a filed is copied and reoriented to a virtual disk, and all editing operations are performed in the virtual disk; when closed (or every once in a while), the file is encrypted and copied and covers the original file to achieve the effect of encryption. All files stored in the virtual disk are temporary files which can be deleted, but the deletion can not influence a system, which is just like a sandbox. With the method, the stability of encryption and decryption can be improved and the policy setting can be simplified.

Description

technical field [0001] The file encryption method using the encryption sandbox involves file encryption and decryption technology, especially how to ensure the stability of encryption and decryption and simplify policy settings. Background technique [0002] Encrypting files on your computer is an effective means of preventing data breaches. The currently commonly used encryption method is transparent encryption, which has the advantages of not changing the user's operating habits and requiring no user intervention. In order to further protect information security, most of the encryption schemes adopt the method related to the file process, and the specified process can be set to encrypt only the files with a specific suffix, while other files are not encrypted. This greatly improves the flexibility of encryption and decryption, but inevitably causes some problems. [0003] First of all, the operating system has a caching mechanism. When a process opens a file, the operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/53G06F21/60
Inventor 胡跃李新卓勇
Owner 深圳市虹安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products