Supercharge Your Innovation With Domain-Expert AI Agents!

A File Encryption System Based on Bridge File System

A file system and file encryption technology, which is applied in the field of information security, can solve problems such as complex technical solutions, complex technical solutions, and inability of users and programs to operate directly.

Active Publication Date: 2018-04-20
WUHAN UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The double buffering scheme changes the operation and processing of file I / O at the kernel layer, trying to make the trusted process and the untrusted process read different cached data, but the technical solution is complicated
The multi-FCB scheme (such as SEFS based on LayerFSD technology, see the SEFS transparent encryption platform technology white paper based on LayerFSD technology) actually introduces a new file system, which enables each process to have its own FCB and cache, and develops a Of course, the new file system is a very complicated matter, and the memory utilization rate and the problem of repeatedly reading data exist. The biggest problem with this solution is that users and programs cannot directly operate on the original file system, but in the new file system. Operate on the imported file system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A File Encryption System Based on Bridge File System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific implementation of the present invention will be described below in conjunction with the accompanying drawings.

[0030] The structure and principle diagram of the system of the present invention under Windows are as figure 1 As shown, wherein, the development of the file encryption filter driver can be developed using Windows file filter driver (filter driver) or micro-filter driver (mini-filter driver) technology. Utilizing the Windows file filter driver or minifilter driver to implement the encryption function and to judge trusted processes and untrusted processes is a mature technology, which will not be described here. For file redirection, you can use the reparse point function of Windows file I / O (see simrep.c code); it should be noted that, in addition to redirecting the file path in the open or create file operation (IRP_MJ_CREATE), for The rename file path in the file rename operation (IRP_MJ_SET_INFORMATION+FileRenameInformation) also needs to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a document encryption system based on a bridge document system. The system comprises a document encryption filter drive and the bridge document system, wherein when a trusted process opens or establishes an encrypted document or opens or establishes a secure document catalog or one document in a secure document disk, the document encryption filter drive will reorient the operation of document opening or establishment to a virtual document disk or a document in a virtual document catalog mapped by or corresponding to the bridge document system; the bridge document system converts all the operations of the trusted process aiming at the reoriented document into operations aiming at an original document before reorientation; document data read by the trusted process through the bridge document system is unencrypted data, and data directly read by a non-trusted process from the document is encrypted data; and the trusted process and the non-trusted process of the same document are opened simultaneously by different document FCBs and buffers, so that problems about violent buffer clearance or buffer refreshing can be avoided, and the buffered unencrypted data and the encrypted data are avoided from being mixed.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a file encryption system based on a bridge file system. Background technique [0002] The transparent file encryption system based on the file filter driver (File Filter Driver) can automatically realize the encryption and decryption of files without affecting the user's usage habits, and is an important technical means to ensure data security. However, the current transparent file encryption technology based on the file filter driver generally has the following problems. [0003] The current file system (such as the Windows file system) is a file system with a cache, that is, when a program process reads the data of a file, the file system first checks whether there is data to be read by the program process cached in the memory. If yes, directly return the data cached in the memory; otherwise, the file system reads a certain amount of file data (usually several pag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107
Inventor 龙毅宏
Owner WUHAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More