Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for file protection

A technology for protecting systems and files, applied in the fields of instruments, electrical digital data processing, computer security devices, etc., can solve problems such as hidden dangers and insufficient key protection.

Active Publication Date: 2012-12-19
深圳市紫色力腾科技发展有限公司
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing encryption method generally adopts the method of encrypting by the user after use, and decrypting when necessary.
And the encryption and decryption process is carried out in the CPU and memory of the computer, and the encrypted key is also stored in the memory, which not only brings a lot of inconvenience to the use of encrypted files, but also causes serious security risks due to insufficient key protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for file protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0017] like figure 1 As shown, in this embodiment, the mechanism of the present invention is described in detail by taking the operation process of a user using an encrypted doc file as an example.

[0018] Step 1: The user starts the authentication module, and the authentication module allows the connected hardware encryption peripherals to perform authentication.

[0019] Step 2: If the encryption module is not connected, then connect the hardware encryption module, and the authentication module requires input of authentication information.

[0020] Step 3: The user enters the authentication information, and the authentication module and the hardware encryption module perform authentication. If the authentication is passed, the driver will be prompted to start successfully, otherwise it will fail.

[0021] Step 4: After passing the authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for file protection. The system for file protection comprises an authentication module, hardware encryption and decryption peripheral modules, a file filter driving module and a file encryption certificate. The hardware encryption and decryption peripheral modules are connected with a computer through electrical signals, and the file encryption certificate is issued to safety storage space of a hardware encryption peripheral module by legal means. The method and the system for file protection are characterized in that secret files are encrypted forcedly, an encryption key is stored in the hardware encryption peripheral module, encryption is realized by means of hardware in an encryption process, the files are transparently encrypted or decrypted automatically after passing authentication, and no plaintext is remained in disks assuredly, an encryption algorithm is safe, and users can use the files normally after the authentication is passed.

Description

technical field [0001] The invention relates to the field of computer file encryption, in particular to a Chengdu file protection system and method particularly suitable for file protection within enterprises and institutions, between departments and among individuals. Background technique [0002] With the continuous development of enterprise informatization and e-government, more and more application systems are used in people's daily work and life. All kinds of important information are stored electronically, and computer files are the most important information carriers. Every application system will collect, process, output and store a large amount of data, and these data often contain a lot of sensitive information. In order to ensure information security, a large number of classified files are encrypted and stored in the computer. However, the existing encryption method generally adopts the method of encrypting by the user himself after use, and decrypting when nece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
Inventor 吕少铭徐伯星王伟
Owner 深圳市紫色力腾科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products