File encryption system

A file encryption and file system technology, applied in the field of information security, can solve problems such as sensitive information leakage, and achieve the effect of avoiding sensitive information leakage

Active Publication Date: 2014-01-01
WUHAN UNIV OF TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to solve the problem in the non-transparent file encryption technology that when the encrypted file in the encrypted folder is opened by double-clicking, there is a temporary file in clear text on the permanent storage medium, which causes the leakage of sensitive information. A file encryption system combining file encryption and non-transparent file encryption technology to overcome the deficiencies of existing technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0047] The specific implementation of the file encryption system is related to the operating system run by the file encryption system. The following uses the Windows operating system as an example to illustrate.

[0048] For the implementation of the secure folder, you can design the internal structure of the file on the basis of Windows ordinary files to make it a structured file with internal file directories and file organization structures; or use Windows' compound file (Compound File) technology , where the Storage storage structure corresponds to the file directory, and the Stream storage structure is used to store files.

[0049] For the development of the file encryption program, any Windows desktop program development technology (development language and development environment) can be used on the basis of the secure folder implementation sche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a file encryption system, comprising a safety folder, a file encryption program and a file encryption filter. The file encryption program generates a temporary file, namely an encrypted temporary file, corresponding to an opened file on a permanent storage medium of a computer in a form of a ciphertext when a user opens a currently browsed file in currently browsed safety folder by using a cursor through a human-computer interface of the file encryption program in a double-click manner; a new temporary file, namely an encrypted temporary file, which relates to file content of the selected opened file and is generated in the process that a file application program processes the opened file, also exists in the form of the ciphertext; the file encryption filter automatically carries out corresponding decryption and encryption treatment on the file content when the file application program carries out reading and writing operations on the encrypted temporary files. Thus, leakage of sensitive information due to the fact that the file content of the opened file exists on the permanent storage medium in a form of a cleartext is avoided.

Description

technical field [0001] The invention belongs to the technical field of information security, and is a file encryption system using both transparent and non-transparent file encryption technologies. Background technique [0002] Carrying out security protection to the files stored on the computer is a problem that people are very concerned about, and carrying out security encryption to files is the most effective technical means to file security protection. File security encryption technology can be divided into two categories, transparent file encryption and non-transparent file encryption. The so-called transparent file encryption means that users and applications do not feel that the files are encrypted when using encrypted files. Programs (file handlers) handle encrypted files in the same way as non-encrypted files, including creating, opening, reading, and writing files. The so-called non-transparent file encryption means that the user feels that the file being used is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/6209G06F21/6218G06F2221/2107
Inventor 龙毅宏明磊
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products