A file encryption and decryption method based on linux operating system
An operating system, encryption and decryption technology, applied in the field of Linux terminal security, can solve security problems and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0038] work process:
[0039] Step 1: Install the file safe module on the computer and restart the computer;
[0040] Step 2: Use the USBKey to log in to the computer with the file safe module installed; when the computer passes the USBKey verification, open the file safe module;
[0041] Step 3: If the file safe module detects that there is no file safe in the file safe, the file safe module creates a file safe; otherwise, execute step 4;
[0042] Step 4: The file safe module loads the existing file safe, and the corresponding virtual disk appears on the computer desktop;
[0043] Step 5: Open the virtual disk and perform file operations on the virtual disk;
[0044] The process of creating a file safe: follow the prompts to enter the name of the file safe to be created. After clicking OK, the file safe module will generate a directory corresponding to the name of the file safe in the specified directory, and at the same time mark the newly created file safe directory infor...
Embodiment 2
[0046] Embodiment 2: the step 3 further includes deleting, uninstalling, moving and restoring the file safe.
[0047] The specific process of deletion is: when the computer passes the USBKey verification, open the file safe module, and then select the file safe module to be deleted, the lunix operating system will delete the file safe module (this step is similar to the process of deleting ordinary files in the lunix operating system, the method is same).
[0048] The loading process is: select the file safe to be loaded and load it. The file safe module has multiple file safes.
[0049]Uninstallation process: Select the file safe to be uninstalled, and the corresponding virtual disk will disappear. Or directly unplug the USBKey plugged into the computer, the virtual disk will disappear automatically (the file safe module detects whether the USBKey exists in real time, if the USBKey is unplugged, the file safe module simulates the uninstallation process to realize automatic ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com