Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for accessing to virtual disk

A virtual disk, drive letter technology, applied in the field of data security, can solve the problems of tampering, easy to be discovered and accessed, unable to improve the data security threshold, etc., to achieve the effect of improving security and realizing process isolation

Active Publication Date: 2016-05-04
FUJIAN LANDI COMML EQUIP CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for some important files, the data security cannot be guaranteed, or the data security threshold cannot be raised
Specifically, the data is exposed under the disk corresponding to the virtual drive letter, which is easy to be discovered and accessed, or even tampered with; process isolation cannot be performed, and all processes can access the disk, and data security cannot be guaranteed after the system is infected with a virus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for accessing to virtual disk
  • Method and system for accessing to virtual disk
  • Method and system for accessing to virtual disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to describe the technical content, achieved goals and effects of the present invention in detail, the following descriptions will be made in conjunction with the embodiments and accompanying drawings.

[0019] The most critical idea of ​​the present invention is: a virtual disk method implemented based on the application layer, through API interception technology, API relocation for disk access, drive letter registration to the virtual disk, and user-defined file location by calling the system API The path of the drive letter, the process can normally access the required data.

[0020] Please refer to figure 1 , Embodiment 1 of the present invention provides a method for accessing a virtual disk, including:

[0021] S1: Start the project, load the virtual disk module, and register the drive letter corresponding to the path of the virtual disk;

[0022] S2: Intercept API functions related to the process of accessing the virtual disk, so that the system first p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for accessing to a virtual disk. The method comprises the following steps: starting a project, loading a virtual disk module, and registering a drive corresponding to a virtual disk path; intercepting to access an API function related to a virtual disk process to ensure that the system firstly process a file operation analogue function of the virtual disk module when calling the API function; and returning the analogue function processing result to a system API function and outputting result parameters. Through the manner, the data required for normal access can be integrated and process isolation can be realized at the same time, so that the safety of the virtual disk is improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a method and system for accessing a virtual disk. Background technique [0002] In the current project, to decrypt an encrypted file, the file is relatively small and can be directly decrypted in the memory and stored in the string memory; when the file is relatively large and the number of files is large, it is usually compressed into one file and then Encryption, in the process of decryption, they are directly placed in a relatively hidden folder that is not easily found by users. These two methods are either cumbersome in management or problematic in security. [0003] figure 1 It is a conventional access process processing method in the prior art. Although the virtual disk can save data, it also faces the same problem in terms of security. Since the virtual disk is implemented by reading and writing specified files through the driver layer IO, taking WINDOWS as an e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/56
Inventor 张维超
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products