Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File protection system and implement method thereof

A technology for protecting systems and files, applied in the field of data security, can solve problems such as systemic file security reduction, and achieve the effect of simple system and good system compatibility

Inactive Publication Date: 2013-11-13
BEIJING SUCIZ SCI & TECH DEV
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a file transparent encryption / decryption method and its implementation system that are encrypted and decrypted by independent encryption hardware, which solves the problem that the key will be transferred to the driver in the existing driver layer transparent encryption method, and the system causes the file security to decrease.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection system and implement method thereof
  • File protection system and implement method thereof
  • File protection system and implement method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] figure 1 , image 3 , Figure 4 , Figure 7 Shown is the first embodiment of the file protection system and its method of the present invention, its structure is as follows figure 1 Shown include:

[0070] The upper-level user interface application program 10 is used to implement encryption policy setting and other computer interactions, that is, to receive input operation instructions and send messages to the I / O manager 20;

[0071] The I / O manager 20 is configured to receive a request message from the upper layer user interface application program 10, and distribute the data in the form of a request packet;

[0072] The file filtering driver 30 is used to intercept the request packet from the I / O manager 20, and judge the data therein, then forward the data to be processed that meets the conditions, and release if the data does not meet the conditions;

[0073] The independent encryption hardware 40 integrates encryption / decryption algorithms and keys inside, an...

Embodiment 2

[0104] figure 2 , Figure 5 , Figure 6 and Figure 8 It is the second embodiment of the file protection system and method of the present invention, and its structural difference from the first embodiment lies in:

[0105] The independent encryption hardware 40 also has the function of sending the processed data to the file filter driver 30, and the file filter driver 30 forwards the processed data to the corresponding storage device for storage.

[0106] When the independent encryption hardware 40 sends the processed data to the file filter driver 30, the file filter driver 30 forwards it to the corresponding storage device for storage. In this technical solution, the system may also include:

[0107] The file driver 50 is used to receive and process the data from the file filter driver 30 and forward it;

[0108] The storage device driver 60 is used to receive the data from the file driver 50 and forward it;

[0109] The physical storage device 70 is configured to rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file protection system and an implement method thereof. The file protection system structurally comprises an upper layer user interface application program, an I / O manager, a file filter driver and independent encryption hardware, wherein the upper layer user interface application program is configured to realize encryption policy setting and other man-machine interaction; the I / O manager is configured to receive request information from the upper layer user interface application program and to distribute data in a request packet form; the file filter driver is configured to intercept request packets from the I / O manager, judge the data in the request packets and transmit eligible to-be-processed data; and an encryption / decryption algorithm and a secret key are stored in the independent encryption hardware and act on the file filter driver, and the independent encryption hardware is configured to receive and process the to-be-processed data from the file filter driver. According to the file protection system and the implement method thereof, the encryption and decryption processes are both completed in the independent encryption hardware, the secret key cannot come out of the encryption hardware in the whole encryption / decryption process, and the safety of files is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a file protection system and its implementation method. Background technique [0002] With the development of society, computers have become an indispensable part of people's life and work. At the same time, with the continuous development of information technology, various security issues are becoming more and more prominent. Among these existing security problems, people tend to pay more attention to network security issues, various software and hardware firewalls, and various system protections emerge in endlessly. However, people tend to ignore file security issues, and malicious copying and leakage of confidential files will often bring very serious losses to various users. [0003] Information security is not a new issue in China. During the "Seventh Five-Year Plan" and "Eighth Five-Year Plan" period, my country has conducted research on information encryption, decryption, k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/71
Inventor 李峻
Owner BEIJING SUCIZ SCI & TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products