Unlock instant, AI-driven research and patent intelligence for your innovation.

File content hidden storage access method and storage device based on capacity hiding and multi-file system

A storage access and content hiding technology, applied in computer security devices, instruments, computing, etc., can solve problems such as poor robustness, small hidden capacity, and inapplicability to mobile storage devices, and achieve the effect of ensuring security.

Active Publication Date: 2020-03-03
THE PLA INFORMATION ENG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of hosting the file in the host file is easily affected by the operation of the host file, and the robustness is too poor; while the method of using the characteristics of the memory chip to hide the file has better hiding strength, but the hiding capacity is not large, and it is easy to affect the bad block of the chip Management; the method of using the redundant area of ​​the file to hide the file has strong concealment, but its robustness is poor, the hidden capacity is small, and it is easily affected by the file operation; several other methods are based on the host-side technology, such as Filter driver, modify file attributes, reconstruct FAT table, etc.
In addition, existing file hiding methods rely on operating system implementation and are not suitable for mobile storage devices
The above file hiding methods have two main disadvantages: (1) the imperceptibility of hidden files is not considered, that is, it is easy for attackers to know the existence of hidden files, thereby stealing hidden files; (2) hidden files are easily affected by file operations, as formatted device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File content hidden storage access method and storage device based on capacity hiding and multi-file system
  • File content hidden storage access method and storage device based on capacity hiding and multi-file system
  • File content hidden storage access method and storage device based on capacity hiding and multi-file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Embodiment one, see figure 1 As shown, a file content hidden storage access method based on capacity hiding and multiple file systems is used for accessing hidden storage data on the periphery of the host, and the storage area of ​​the mobile storage device is divided into ordinary access storage areas and n hidden access storage areas, n The hidden access storage areas are expressed as: hidden access storage area 1, hidden access storage area 2, ..., hidden access storage area n, each access storage area of ​​the storage device is identified by the flag byte of the physical block redundancy area of ​​the storage device area to map logical storage to physical storage. Each file system is established in the corresponding access storage area of ​​the mobile storage device. The access to the hidden storage data specifically includes the following steps:

[0029]Step 1. The host requests to access the capacity of the mobile storage device. The mobile storage device parses t...

Embodiment 2

[0039] Embodiment two, see figure 1 As shown, a file content hidden storage access method based on capacity hiding and multiple file systems is used for accessing hidden storage data on the periphery of the host, and the storage area of ​​the mobile storage device is divided into ordinary access storage areas and n hidden access storage areas, n The hidden access storage areas are expressed as: hidden access storage area 1, hidden access storage area 2, ..., hidden access storage area n, each access storage area of ​​the storage device is identified by the flag byte of the physical block redundancy area of ​​the storage device area, to perform mapping from logical storage to physical storage. Multiple file systems are respectively established in each access storage area of ​​the mobile storage device. The access to the hidden storage data specifically includes the following steps:

[0040] Step 1. The host requests access to the capacity of the mobile storage device. The mobil...

Embodiment 3

[0046] Embodiment three, see figure 2 As shown, a file content hidden storage device based on capacity hiding and multi-file system is set in a mobile storage device for storage and access of ordinary data and hidden data, including a storage access module, an identity authentication module and a data cleaning module, The storage access module includes a storage access monitoring unit, an ordinary storage access unit and a plurality of hidden storage access units; the ordinary storage access unit establishes a file system with ordinary data for storage access of ordinary data; the hidden storage access unit establishes a hidden The file system of the data is used to hide the storage access of data; the storage access monitoring unit is used to determine whether to grant the storage access permission of the corresponding hidden storage access unit according to the host access request and through the identity authentication module, and according to the feedback of the identity a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a file content hidden storage access method based on capacity hiding and a multi-file system and a device of the method. The method comprises the specific steps that first, a capacity request command sent by a master device is monitored through a monitoring unit in a slave device, and the slave device end analyzes a master device access command; if the master device access command is for normal access to a storage area, capacity identification information for normal access to the storage area is fed back to the master device; if the received master device access command is for hidden access to the storage area, identity recognition is needed, and corresponding capacity identification information for hidden access to the storage area i is fed back to the master device after identity recognition is passed; a data elimination function is also provided, wherein when the hidden system is attempted to be cracked, a self-destruction module of a mobile storage device will be triggered to thoroughly eliminate secret files in the hidden area. Through the method, the problems that the stability of the hidden files is affected by an operating system and the hidden files are destroyed by attackers can be effectively solved, and therefore the security of hidden storage file data is effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of mobile storage security, in particular to a file content hidden storage access method based on capacity hiding and multi-file system and a storage device thereof. Background technique [0002] Mobile storage devices with USB interface are more and more widely used, such as U disk, which has become a transfer station for data transmission and plays an important role in data exchange between computers. At the same time, data security issues have become increasingly prominent. Personal important file information is often stolen or destroyed, and hidden storage of file content is often used as an important method to protect sensitive data information. Research in security is booming. [0003] The existing file hiding technologies mainly include the following types: modify the registry so that users cannot see hidden files through ordinary file operations; use images, videos and other files as host files to h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6218G06F2221/2141
Inventor 李清宝张平曾光裕陈志锋蔡国民王康王烨
Owner THE PLA INFORMATION ENG UNIV