Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy data protection method and system

A technology of privacy data and storage space, which is applied in the computer field, can solve the problems of privacy leakage and inability to protect sensitive information of equipment well, and achieve the effect of ensuring high security

Active Publication Date: 2018-04-20
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these tools and protection methods provide a strong guarantee for the security of private data, however, due to the mobility and volatility of smart phones, the existing protection measures cannot well protect the sensitive information stored in the device.
[0004] For example, attackers can crack the lock screen password of mobile devices through brute force cracking, taint attacks, etc., resulting in privacy leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy data protection method and system
  • Privacy data protection method and system
  • Privacy data protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0033] figure 1 is a flow chart of a private data protection method provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0034] S1. Mount the hidden volume to a preset directory for users to store private data into the hidden volume through the directory. The hidden volume is a virtual disk created based on the dm-crypt technology of the Linux kernel. A storage data volume that is mapped at the end of the storage space and does not occupy the displayed capacity of the storage space;

[0035] S2. Detect the inactive duration and remaining storage space of the hidden volume in real time, and if the inactive duration and / or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy data protection method and system. The method comprises the steps of S1, mounting a hidden volume to a preset directory, thereby enabling a user to store privacy datain the hidden volume through the directory, wherein the hidden volume is a data storage volume which is created by mapping a virtual disk created based on a dm-crypt technology of a Linux kernel to the tail end of a storage space and does not occupy display capacity of the storage space; and S2, detecting a no-operation duration and a residual storage space of the hidden volume in real time, and if the no-operation duration and / or the residual storage space of the hidden volume meets a preset condition, uninstalling the hidden volume from the directory, thereby enabling the hidden volume not to be displayed in the directory. According to the privacy data protection method and system provided by the invention, deniable encryption of the privacy data is realized.

Description

technical field [0001] The present invention relates to the field of computers, and more specifically, to a privacy data protection method and system. Background technique [0002] With the rapid development of science and technology, the ownership of smart phones has grown exponentially. In particular, the rapid development of semiconductor technology has greatly improved the computing power and storage capacity of smart phones, and users can execute some programs on mobile phones that could only be run on PCs in the past. Moreover, with the rapid development of the mobile application market, smart phones have become an indispensable communication and entertainment tool in people's lives. This also results in a large amount of user privacy data stored in the smartphone. In addition, with the rapid development of mobile Internet and cloud computing technology, mobile office has become a new way of working for major companies. These methods all cause a large amount of sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60G06F21/78G06F9/455
CPCG06F9/45558G06F21/602G06F21/6245G06F21/78G06F2009/45562
Inventor 刘传昌程渤郭杰洪双喜冯温迪任兵飞
Owner BEIJING UNIV OF POSTS & TELECOMM