USB (Universal Serial Bus) flash disk secure storage method based on virtual file system

A virtual file system and secure storage technology, which is applied in the field of U disk security storage with multi-level confidentiality mechanism, can solve the problems of lack of mobility, key leakage, encrypted file cracking, etc., and reduce the possibility of key leakage or cracking performance, improve safety, and protect safety

Inactive Publication Date: 2014-07-30
NORTHWESTERN POLYTECHNICAL UNIV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, the files in the USB flash drive can be used on any computer. If the user loses the USB flash drive, there is a high possibility that the encrypted files will be cracked
Finally, the key management scheme is not perfect, and the possibility of key leakage is high
In addition, there are currently many secure storage technologies based on virtual file systems, but these technologies have certain deficiencies and limitations
Firstly, most of these technologies are applied to computers and lack mobility; secondly, only hardware binding technologies are provided, without the function of unbinding, so that such software can only be used on bound computers, which limits The scope of use is limited; there is no copy protection function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB (Universal Serial Bus) flash disk secure storage method based on virtual file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] After the user obtains the encrypted USB flash drive, the process of using the client to open the virtual disk is as follows:

[0056] 1) Insert the U disk and open the disk management software;

[0057] 2) Select the loaded virtual disk;

[0058] 3) Enter the user key UserKey;

[0059] 4) Obtain the hardware fingerprint HardID bound to the virtual disk and the unique identifier UID of the U disk;

[0060] 5) Get the Key from "Key=UserKey+UID+HardID";

[0061] 6) Perform MD5 hash on the plaintext key Key to obtain the disk key Key_U;

[0062] 7) Traverse all the decryption algorithms in the encryption module, and use the generated disk key Key1_U to decrypt the super block of the virtual disk until the super block can be recognized by the virtual file system;

[0063] 8) If the super block cannot be recognized after all the decryption algorithms are tried, the user key is wrong and the key needs to be re-entered; otherwise, the user key is correct and the virtual di...

Embodiment 2

[0065] After the virtual disk is bound to the computer hardware, if you want to use it on other computers, the process of unbinding the computer hardware information is as follows:

[0066] 1) Insert the U disk and open the disk management software;

[0067] 2) Follow the steps in Example 1 to open the virtual disk;

[0068] 3) Choose to unbind the computer hardware;

[0069] 4) Obtain the unique identifier UID and user key UserKey of the U disk;

[0070] 5) Calculate the plaintext key Key1, Key1=UserKey+UID+HardID (HardID is empty);

[0071] 6) Perform MD5 hash on the plaintext key Key1 to obtain the disk key Key1_U;

[0072] 7) Decrypt the virtual disk data block with the old disk key Key_U, and re-encrypt the data block with the newly generated disk key Key1_U.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention puts forward a USB (Universal Serial Bus) flash disk secure storage method based on the virtual file system, which constructs a virtual disk in a USB flash disk on the basis of the virtual file system and adopts a multi-level security measure to protect data, so that the storage and use of the USB flash disk are safer and more reliable. The technical scheme is as follows: a secure partition is allocated in the USB flash disk and formatted into the virtual file system as a virtual disk which exists in the form of a file but actually is a file system; on the basis of the unique identifier of the USB flash disk, the USB flash disk is bounded with the virtual disk to prevent copy; entering the virtual disk requires a user to input a key, and the key inputted by the user is protected by a specific generating algorithm and a key management mechanism; the virtual disk is encrypted and decrypted; the user also can bind a computer using the virtual disk in order to control access to the virtual disk.

Description

technical field [0001] The invention belongs to the technical field of mobile storage, and relates to a safe storage method of a U disk based on a virtual file system, in particular to a safe storage method of a U disk based on a multi-level security mechanism of a virtual file system. Background technique [0002] With the continuous improvement of social informatization, people's requirements for information storage are getting higher and higher, and there are more and more digital files such as electronic documents, music, movies, pictures, software, etc. U disk is the main medium for disseminating digital files. It is easy to carry and use, and flexible to copy and spread. [0003] But this feature also brings challenges to data security. Ordinary USB flash drives will bring serious data loss and leakage risks to individuals or enterprises in the case of improper use, theft or loss. Whether it is personal privacy, company confidential documents, or even state secrets, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80
CPCG06F21/79G06F21/6209G06F21/6245
Inventor 谷建华周兴社赵天海王涛王云岚李秀春侯正雄赵利民王依寒王建伟
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products