Data encryption mobile storage management method based on virtual disk

A virtual disk and mobile storage technology, applied in software simulation/interpretation/simulation, internal/peripheral computer component protection, program control devices, etc., can solve problems such as slow speed, data leakage, easy password cracking, etc., to prevent card Pause or wait, simple and convenient to use, high safety and reliability

Active Publication Date: 2013-04-24
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The operating system manages the U disk as a standard disk. For the operating system, the U disk is no different from the hard disk except for hot swapping, which makes the U disk easy to be infected with viruses.
[0006] 2. The password is easy to be cracked, resulting in easy leakage of U disk data
[0007] With the continuous expansion of the use of U disks, there are more and more cracking password software on the market. The loss, scrapping, maintenance and theft of U disks can easily be obtained by others with the help of cracking software to read the U disk. Encrypted information in the file, resulting in data leakage
[0008] 3. Without unit authority management, it is easy to cause internal leaks
Although the risk of internal leaks can be largely reduced through protective measures such as management regulations, access control constraints, and auditing methods, the portability of the U disk itself creates defects for the information to be taken out.
Since this type of U disk has no authority settings between units, once it leaves the internal environment of the unit, it is very likely to leak
[0010] 4. The transparent encryption and decryption of the application layer is not convenient for the upgrade and development of the software version
[0011] Transparent encryption and decryption based on the application layer is started by monitoring the startup of the application. However, due to the version upgrade and development, the application may be renamed and the methods used by different applications when reading and writing files are different, as well as the anti-hook technology in the application. Any application may cause the failure of transparent encryption and decryption
Moreover, this type of transparent encryption and decryption technology is slow when encountering large files
[0012] To sum up, the software encrypted U disk in the prior art is easy to be attacked by viruses, the password is easy to be cracked, and there is no unit authority management, which is easy to cause internal leaks. The transparent encryption and decryption based on the application layer is too closely related to the application program, which is not convenient The upgrade and development of the software version limits the promotion and application of the software encrypted U disk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption mobile storage management method based on virtual disk
  • Data encryption mobile storage management method based on virtual disk
  • Data encryption mobile storage management method based on virtual disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific implementation of the technical solution of the present invention will be described below by taking a USB flash drive as an example of a mobile storage device.

[0044] Such as figure 1 As shown, the implementation steps of the data encryption mobile storage management method based on the virtual disk in this embodiment are as follows:

[0045] 1) Write the encrypted volume logo in the head of the ordinary U disk and create a virtual disk encrypted volume to obtain an encrypted U disk, set the head of the virtual disk encrypted volume to encrypt the virtual disk encrypted volume information header according to the mount password entered by the user , the virtual disk encryption volume information header contains data encryption and decryption keys, management policy information and virtual disk file system information;

[0046] 2) When the U disk is inserted into the specified computer, check whether the encrypted volume ID of the U disk is correct. If the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption mobile storage management method based on a virtual disk. The method includes the following steps: 1) writing an encryption roll identification in the head portion of the mobile storage device and building a virtual magnetic disc encryption roll in the mobile storage device; 2) checking the encryption roll identification when the mobile storage device is inserted in a designated computer and processing as a common mobile storage device if the encryption roll identification is not correct and executing the next step otherwise; 3) checking encryption roll information head of the virtual disc according to a mounting command and executing the next step if the check passes; 4) mounting the encryption roll of the virtual disk, calling virtual disk drive program with an encryption and decryption module to read and write the virtual disk encryption roll, enabling the encryption and decryption module to encrypt and decrypt in real time automatically and finally automatically unloading the virtual disk encryption roll when discharging the mobile storage device. The method has the advantages of being safe and reliable in information storage, flexible in security policy configuration, capable of simply and conveniently managing the portable storage device and high-efficient and transparent in data encryption and decryption processing.

Description

technical field [0001] The invention relates to a data storage and management method of a mobile storage device under a Linux operating system, in particular to a data encryption mobile storage management method based on a virtual disk for automatic encryption and decryption of data by creating a virtual disk encryption volume for an ordinary U disk. Background technique [0002] With the continuous development and deepening of informatization, computers have fully entered people's lives and work, and U-disk, as a plug-and-play USB device, is small, easy to carry, and has a large storage capacity Large size, reliable performance, fast transmission speed and other advantages have become indispensable mobile storage devices in daily life. However, security issues such as data leakage caused by USB flash drives are becoming more and more serious, and have become the focus of many companies and personal information security protection. [0003] In order to solve this problem, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/73G06F9/455
Inventor 马俊余杰唐晓东易晓东张卫华孔金珠戴华东吴庆波彭欢
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products