Method and system of data hidden storage

A data hiding and data technology, applied in the direction of digital transmission system, transmission system, digital data protection, etc., can solve the problems of unable to prevent illegal reading or modification of data in the reserved area, lack of encryption and division methods, etc., to achieve data security sexual effect

Inactive Publication Date: 2013-07-24
SUZHOU CODYY NETWORK SCI & TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, people will store files in pre-divided reserved areas. This method improves the security of file storage to a certain extent, but due to the lack of reasonable encryption and division methods when storing files, it still cannot prevent file storage. The data in the area is illegally read or modified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of data hidden storage
  • Method and system of data hidden storage
  • Method and system of data hidden storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] figure 1 Shown is a flow chart of a data hiding storage method provided according to a preferred embodiment of the present invention. like figure 1 As shown, the data hidden storage method provided by the preferred embodiment of the present invention includes steps 101-104.

[0013] Step 101: the client generates an encrypted file from the file to be stored according to the first policy and sends the encrypted file to the controller.

[0014] Specifically, according to the first strategy, the client generates an encrypted file from the file to be stored as follows: the client divides the file to be stored into blocks through a block algorithm according to the preset number of blocks, and then combines them; Add a check code (defined as: first data) to the beginning and end of the combined file block; use the MD5 algorithm to calculate the file signature of the first data (defined as: second data); combine primary first data, backup first The data and the second data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system of data hidden storage. The method comprises the following steps: a client end enables a file to be stored to generate an encryption file and sends the encryption file to a controller according to a first strategy; the controller acquires the size of the remaining memory space of a memorizer and the number of clusters; if the size of the remaining memory space of the memorizer is larger than or equal to the size of the encryption file, the controller obtains a file allocation table and sends the encryption file and the file allocation table to a file allocator according to a second strategy; and the file allocator stores the encode file to the clusters in the remaining memory space of the memorizer according to the received file allocation table and the encryption file.

Description

technical field [0001] The invention belongs to the field of instant communication, and in particular relates to a method and system for hiding and storing data. Background technique [0002] With the continuous progress of the networked society, more and more instant messaging tools are applied to work and life, such as Fetion, MSN and some enterprise application software. In practical applications, the security of file storage plays a vital role in the use of video conferencing. In the prior art, people will store files in pre-divided reserved areas. This method improves the security of file storage to a certain extent, but due to the lack of reasonable encryption and division methods when storing files, it still cannot prevent file storage. The data in the area is illegally read or modified. Contents of the invention [0003] The present invention provides a method and system for data hidden storage to solve the above problems. [0004] The invention provides a metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06
CPCG06F17/40G06F21/62
Inventor 胡加明刘晓东其他发明人请求不公开姓名
Owner SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products