Disk data protection method and system

A technology for protecting systems and data, applied in the field of communication, can solve problems such as the inability to prevent malicious program attacks, the inability to meet privacy protection, and the inability to encrypt process control, etc., to reduce the threat of privacy leakage, reduce security threats, and improve security Effect

Inactive Publication Date: 2015-11-11
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users have no control over their encryption process
It shows that in many cases it will not be able to meet the requirements of privacy protection, and at the same time, this method has no ability to prevent malicious program attacks in the running state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk data protection method and system
  • Disk data protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0032] figure 1 It shows a schematic flowchart of a method for protecting disk data provided by an embodiment of the present invention, as shown in figure 1 As shown, the method includes the following steps:

[0033] 101. When the encryption guardian service module receives the decryption request message sent by the terminal through the interactive program module, it obtains the address of the physical partition to be decrypted corresponding to the request message by querying the preset encryption partition list;

[0034] 102. The encryption guardian service module receives the decryption information sent by the terminal through the interactive program module, and after ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a disk data protection method and system. The method comprises: when an encryption guard service module receiving a decryption request message sent by a terminal through an interaction program module, acquiring a to-be-decrypted physical partition address corresponding to the request message by querying a preset encryption partition list; the encryption guard service module receiving decryption information sent by the terminal through the interaction program module, decrypting the physical partition address after the decryption information is verified to be correct, and mapping the content of the physical partition address to a newly created folder; and while the terminal performing operation on the content in the newly created folder, the encryption guard service module mapping the operated content in the newly created folder to the physical partition address, deleting the newly created folder after the operation is completed, and performing encryption on the physical partition address. The security of specific partitions is ensured and effective protection of partition data is realized.

Description

technical field [0001] The invention relates to the communication field, in particular to a disk data protection method and system. Background technique [0002] At present, smartphones have become the carrier of various information for users and store a large amount of important information, so they have also become the first choice for malicious attacks. A large part of the security threats of smart phones comes from leaks related to personal privacy and various malicious chargeback software. First of all, when the mobile phone is lost or stolen, it is easy to recover the user's sensitive data. Although the Android platform provides a full-disk encryption solution, there are still security holes in it. When the Android phone is started, the full disk encryption will be completely decrypted after the system starts. Malicious programs can easily steal personal privacy and confidential data from the running Android platform. [0003] When the user starts, it will ask to en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/80
CPCG06F21/80
Inventor 朱大立范哲铭庞娜
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products