Access control method and device of file encrypting system on the basis of partitions

A file encryption and access control technology, applied in the field of information security, can solve problems such as complex installation and setting, replay attacks, guessing, etc., and achieve the effect of low cost, improved level, and simple operation

Inactive Publication Date: 2014-07-09
ASIA EURO BOLOD INFORMATION SECURITY TECHHUNAN
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This also leads to the security shortcomings of static passwords, such as being easy to peek, guess, dictionary attack, brute force cracking, stealing, monitoring, replay attack, Trojan horse attack, etc.
Users frequently change passwords for a long time, which also brings problems in password management, such as too many passwords, often forgetting the correct password
At the same time, traditional authentication lacks post-processing of the original account number and password, which makes it vulnerable to brute force cracking
Even if the current popular dynamic password or biometric technology is adopted, the implementation cost is relatively high and the installation and settings are relatively complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device of file encrypting system on the basis of partitions
  • Access control method and device of file encrypting system on the basis of partitions
  • Access control method and device of file encrypting system on the basis of partitions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0035] refer to figure 1 As shown, it is a schematic flowchart of an access control method for a partition-based file encryption system according to an embodiment of the present invention. The access control method of the described partition-based file encryption system comprises the following steps:

[0036] Step 101, read the password or / and key file input by the user, and judge whether there is an encrypted partition; if there is an encrypted partition, go to step 103; if there is no encrypted partition, go to step 102.

[0037] Step 102, read the password or / and key file set by the user, and create an encrypted partition protected by the user password or / and key file. refer to figure 2 As shown, the specific imple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method and device of a file encrypting system on the basis of partitions. The method includes that a password and/or a key file input by a user are/is read to determine whether an encrypting partition exists or not; if the encrypting partition does not exist, the user sets the password and/or the key file which are/is read so as to establish the encrypting partition which is protected by the user password and/or key file, and then the password and/or the key file input by the user are/is read to determine whether the encrypting partition exists or not; if the encrypting partition exists, a decryption key is generated by a possible algorithm according to the password and/or the key file input by the user, and a verification value and a checking value are obtained through the decryption key by the possible algorithm; whether the verification value and the checking value obtained after decryption are consistent to set verification value and checking value or not is determined respectively; if the verification value and the checking value obtained after decryption are consistent to the set verification value and checking value, identity verification passes to obtain file data; otherwise, the password and/or the key file are/or incorrect. Thereby, by means of the access control method and device of the file encrypting system on the basis of the partitions, identity verification grade of the file encrypting system can be improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an access control method and device for a partition-based file encryption system. Background technique [0002] The "account + password" authentication method of the traditional file encryption system is a string of static data set by the user himself, which will remain unchanged unless the user changes it. This also leads to the security shortcomings of static passwords, such as being easy to peek, guess, dictionary attack, brute force cracking, stealing, monitoring, replay attack, Trojan horse attack, etc. Users frequently change passwords for a long time, which also brings problems in password management, such as too many passwords, and often forget the correct passwords. At the same time, traditional identity verification lacks post-processing of the original account number and password, which makes it vulnerable to brute force cracking. Even if the current popular dynam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/32
CPCG06F21/6209G06F21/74H04L9/32
Inventor 杨志坚成连
Owner ASIA EURO BOLOD INFORMATION SECURITY TECHHUNAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products