Linux file protection system and method
A file system and protection system technology, applied in the direction of digital data protection, etc., can solve problems such as cannot prevent viewing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The system and method of the present invention will be further described in detail below in conjunction with the accompanying drawings and the embodiments of the present invention.
[0044] The basic idea of the present invention is: the mandatory access control based on process authentication is closely combined with Linux-based unified key installation (LUKS, Linux Unify Key Setup) transparent encrypted files, and an independent Linux kernel module is fully responsible for process authentication, access Control and transparently mount and unmount encrypted file systems. This kernel module only allows specified processes to access specified resources (sensitive files), and rejects file access requests that do not comply with the above rules.
[0045]The present invention prevents sensitive data files from being illegally operated by unauthorized processes when reading, modifying and moving protected sensitive files stored in a transparent encrypted file system under a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
