Check patentability & draft patents in minutes with Patsnap Eureka AI!

A file encryption and decryption method based on linux operating system

An operating system, encryption and decryption technology, applied in the field of Linux terminal security, can solve security problems and other problems

Active Publication Date: 2017-09-22
成都卫士通信息安全技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the lunix operating system, if the private data and important data in user files are stored in plain text, there are problems with their security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] work process:

[0039] Step 1: Install the file safe module on the computer and restart the computer;

[0040] Step 2: Use the USBKey to log in to the computer with the file safe module installed; when the computer passes the USBKey verification, open the file safe module;

[0041] Step 3: If the file safe module detects that there is no file safe in the file safe, the file safe module creates a file safe; otherwise, execute step 4;

[0042] Step 4: The file safe module loads the existing file safe, and the corresponding virtual disk appears on the computer desktop;

[0043] Step 5: Open the virtual disk and perform file operations on the virtual disk;

[0044] The process of creating a file safe: follow the prompts to enter the name of the file safe to be created. After clicking OK, the file safe module will generate a directory corresponding to the name of the file safe in the specified directory, and at the same time mark the newly created file safe directory infor...

Embodiment 2

[0046] Embodiment 2: the step 3 further includes deleting, uninstalling, moving and restoring the file safe.

[0047] The specific process of deletion is: when the computer passes the USBKey verification, open the file safe module, and then select the file safe module to be deleted, the lunix operating system will delete the file safe module (this step is similar to the process of deleting ordinary files in the lunix operating system, the method is same).

[0048] The loading process is: select the file safe to be loaded and load it. The file safe module has multiple file safes.

[0049]Uninstallation process: Select the file safe to be uninstalled, and the corresponding virtual disk will disappear. Or directly unplug the USBKey plugged into the computer, the virtual disk will disappear automatically (the file safe module detects whether the USBKey exists in real time, if the USBKey is unplugged, the file safe module simulates the uninstallation process to realize automatic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of Linux terminal security and particularly relates to a file encryption and decryption method based on a Linux operating system. The method is as follows: virtualizing a special disk space in a Linux system by use of a virtual disc technology and in combination with an individual certificate in a USB (Universal Serial Bus) Key, automatically encrypting and decrypting files in a virtual space, protecting the privacy and security of user data and preventing disclosure of important information. The method comprises the following steps: arranging a file safe box module on a computer; then logging on the computer correspondingly provided with the file safe box by use of a USB (Universal Serial Bus) Key; when the computer passes USB Key verification, starting the file safe box module; if the file safe box is not provided with a file safe box, creating one file safe box; otherwise, loading the existent file safe box and displaying a corresponding virtual disc on the tabletop of the computer; opening the virtual disc and performing file operation on the virtual disc.

Description

technical field [0001] The invention belongs to the field of Linux terminal security, in particular to a file encryption and decryption method based on a Linux operating system. Background technique [0002] The file system is an important part of a general-purpose operating system. Traditionally, operating systems provide support for file systems at the kernel level. Usually, the code in the kernel mode is difficult to debug and the productivity is low. The user space file system is a concept in the operating system, which refers to a file system that is completely implemented in user mode. Linux supports this through kernel modules. [0003] Implementing a file system in user space greatly simplifies the workload of providing a new file system for the operating system, and is especially suitable for various virtual file systems. Provide a private file system without changing the kernel code. However, in the lunix operating system, if the private data and important dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/34
CPCG06F21/34G06F21/6218G06F21/6245G06F21/80G06F2221/2107G06F2221/2141
Inventor 彭景段银超宋文科杨天平唐晓兰杨伟伟
Owner 成都卫士通信息安全技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More