File content hidden storage access method and storage device based on capacity hiding and multi-file system
A storage access and content hiding technology, applied in computer security devices, instruments, computing, etc., can solve problems such as poor robustness, small hidden capacity, and inapplicability to mobile storage devices, and achieve the effect of ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Embodiment one, see figure 1 As shown, a file content hidden storage access method based on capacity hiding and multiple file systems is used for accessing hidden storage data on the periphery of the host, and the storage area of the mobile storage device is divided into ordinary access storage areas and n hidden access storage areas, n The hidden access storage areas are expressed as: hidden access storage area 1, hidden access storage area 2, ..., hidden access storage area n, each access storage area of the storage device is identified by the flag byte of the physical block redundancy area of the storage device area to map logical storage to physical storage. Each file system is established in the corresponding access storage area of the mobile storage device. The access to the hidden storage data specifically includes the following steps:
[0029]Step 1. The host requests to access the capacity of the mobile storage device. The mobile storage device parses t...
Embodiment 2
[0039] Embodiment two, see figure 1 As shown, a file content hidden storage access method based on capacity hiding and multiple file systems is used for accessing hidden storage data on the periphery of the host, and the storage area of the mobile storage device is divided into ordinary access storage areas and n hidden access storage areas, n The hidden access storage areas are expressed as: hidden access storage area 1, hidden access storage area 2, ..., hidden access storage area n, each access storage area of the storage device is identified by the flag byte of the physical block redundancy area of the storage device area, to perform mapping from logical storage to physical storage. Multiple file systems are respectively established in each access storage area of the mobile storage device. The access to the hidden storage data specifically includes the following steps:
[0040] Step 1. The host requests access to the capacity of the mobile storage device. The mobil...
Embodiment 3
[0046] Embodiment three, see figure 2 As shown, a file content hidden storage device based on capacity hiding and multi-file system is set in a mobile storage device for storage and access of ordinary data and hidden data, including a storage access module, an identity authentication module and a data cleaning module, The storage access module includes a storage access monitoring unit, an ordinary storage access unit and a plurality of hidden storage access units; the ordinary storage access unit establishes a file system with ordinary data for storage access of ordinary data; the hidden storage access unit establishes a hidden The file system of the data is used to hide the storage access of data; the storage access monitoring unit is used to determine whether to grant the storage access permission of the corresponding hidden storage access unit according to the host access request and through the identity authentication module, and according to the feedback of the identity a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


