Data encrypting method, data encrypting device, data deciphering method and data deciphering device

A data encryption and data technology, which is applied in the field of data processing, can solve complex problems, affect system performance, and cumbersome problems, and achieve the effect of effective data encryption

Active Publication Date: 2015-07-22
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of this direct encryption is: manual decryption before each use of the file, and manual encryption after use, which is very dependent on manual operation, which is more complicated and cumbersome
However, this file transparent encryption has the following disadvantages: since the Windows filter driver used is on top of the Windows file system driver, a large-scale filter operation is required for all file operations after using the Windows filter driver, which seriously affects system performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encrypting method, data encrypting device, data deciphering method and data deciphering device
  • Data encrypting method, data encrypting device, data deciphering method and data deciphering device
  • Data encrypting method, data encrypting device, data deciphering method and data deciphering device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Embodiment 1 describes the data encryption method based on the virtual disk described above.

[0052] see figure 2 , figure 2 The basic flowchart provided for Embodiment 1 of the present invention. Such as figure 2 As shown, the process may include the following steps:

[0053] Step 201, the virtual disk receives a write request from the file system, and encrypts the data carried in the write request.

[0054] Step 202, the virtual disk notifies the file system to write the encrypted data to the corresponding physical disk, so that the file system writes the encrypted data to the corresponding physical disk after receiving the notification from the virtual disk.

[0055] To make figure 2 The flow shown is more clear, and the following passes image 3 right figure 2 The flow shown is described in detail:

[0056] see image 3 , image 3 The detailed flowchart provided for Embodiment 1 of the present invention. Such as image 3 As shown, the process may inc...

Embodiment 2

[0089] Embodiment 2 is described below:

[0090] Example 2:

[0091] Embodiment 2 describes the data encryption method based on the virtual disk described above.

[0092] see Figure 5 , Figure 5 The basic flowchart provided for Embodiment 2 of the present invention. Such as Figure 5 As shown, the process may include the following steps:

[0093] Step 501, the virtual disk redirects the received read request from the file system to the physical disk, so that the file system obtains the data requested by the read request from the physical disk.

[0094] Step 502, the virtual disk receives the data acquired by the file system from the physical disk, decrypts the received data, sends the decrypted data to the file system, and the file system provides the decrypted data to the client.

[0095] To make Figure 5 The flow shown is more clear, and the following passes Figure 6 right Figure 5 The flow shown is described in detail:

[0096] see Figure 6 , Figure 6 The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention publishes a file encrypting method and apparatus, and a file decrypting method and apparatus. The file encrypting method includes the following steps: creating a virtual disk; the virtual disk receiving a writing request from a file system, encrypting data in the writing request; and notifying the file system to write the encrypted data into a corresponding physical disk, so that the file system writes the encrypted data into the corresponding physical disk after receiving a notification from the virtual disk. The methods and apparatuses provided by this invention employ the virtual disk to encrypt data in the writing request and decrypt the data required by the reading request, and this manner achieves highly-reliable, secure and effective file encrypting..

Description

technical field [0001] The invention relates to data processing technology, in particular to a data encryption method and device, and a data decryption method and device. Background technique [0002] At present, the more commonly used encryption technologies mainly include: direct encryption, file transparent encryption and system built-in encryption. Although these three encryption technologies can achieve encryption, they all have their own shortcomings, which are described below: [0003] Direct encryption, which is used to directly encrypt files in the disk, and the representative software is WinRar. However, the disadvantage of this direct encryption is that the manual decryption is performed before each use of the file, and the manual encryption is performed after use, which is very dependent on manual operation, which is complicated and cumbersome. [0004] File transparent encryption, which uses Windows filter driver to dynamically encrypt and decrypt files, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F21/78G06F2221/2113G06F2221/2107G06F21/6209G11B20/0021
Inventor 毕廷礼
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products