Unlock instant, AI-driven research and patent intelligence for your innovation.

Transparent encryption and decryption control method and device, program, storage medium and electronic equipment

A technology of transparent encryption and decryption and control methods, which is applied in the fields of transparent encryption and decryption control methods, storage media, electronic equipment, devices, and computer programs, and can solve the problems of increasing the number of file IO operations, reducing file efficiency, increasing file leaks, etc.

Active Publication Date: 2018-06-29
北京亿赛通科技发展有限责任公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with this method, the file is restored to the temporary directory when the file is decrypted, and the file is copied to the original file location when the file is encrypted, which greatly increases the number of file IO operations and reduces the efficiency of file opening.
Moreover, the files are stored in plaintext files in the temporary directory during the operation process, which increases the possibility of file leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transparent encryption and decryption control method and device, program, storage medium and electronic equipment
  • Transparent encryption and decryption control method and device, program, storage medium and electronic equipment
  • Transparent encryption and decryption control method and device, program, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] refer to figure 1 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 1 of the present invention.

[0036] The control method for transparent encryption and decryption of this embodiment includes the following steps:

[0037] Step S102: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program.

[0038] According to an exemplary embodiment of the present invention, in an application scenario where any application program accesses any file, including operations such as reading and writing file data, the transparent encryption and decryption control method can be used to control application program access The file to be operated on. Here, the files stored in the disk are ciphertext file data.

[0039] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier...

Embodiment 2

[0054] refer to figure 2 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 2 of the present invention.

[0055] The control method for transparent encryption and decryption of this embodiment includes the following steps:

[0056] Step S202: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program and the identification of the file to be accessed by the application program.

[0057] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier may be, but not limited to, an application program ID, an application program name, and the like of the application program. The file identifier is used to indicate the information of the file to be accessed by the application program, and the file identifier may be the file name, file path or file suffix of the file to be op...

Embodiment 3

[0079] refer to image 3 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 3 of the present invention.

[0080] The control method for transparent encryption and decryption of this embodiment includes the following steps:

[0081] Step S302: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program.

[0082] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier may be, but not limited to, an application program ID, an application program name, and the like.

[0083] Step S304: Obtain preset rules for encryption and decryption control.

[0084] In this embodiment, the preset rule includes information about the file to be operated, and may specifically include attribute information of the file to be operated, and information about an application program that i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a transparent encryption and decryption control method and device, a computer program, a storage medium and electronic equipment. The transparent encryption and decryption control method includes the steps of obtaining a program identifier of the application program when it is detected that the application program accesses a file stored in a disk; obtaininga preset rule for encryption and decryption control; matching the preset rule with the program identifier; according to a matching result, controlling the application program to access file data to be operated by reading and writing a plaintext cache area or a ciphertext cache area, wherein encryption and decryption operations are not conducted on data interaction between the ciphertext cache area and the disk, and the plaintext cache area is generated by coping content of the ciphertext cache area and conducting the decryption operation on the copied content. By means of the technical scheme, the transparent encryption and decryption function of a file system can be effectively achieved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, to a transparent encryption and decryption control method, device, computer program, storage medium, and electronic equipment. Background technique [0002] Transparent encryption and decryption technology is a technology for encrypting and decrypting files opened or edited by users without user operation. Since transparent encryption and decryption technology does not change users' operating habits, transparent encryption and decryption technology has been widely used. Systems such as Windows and linux realize the function of transparent encryption and decryption of file reading and writing by adding filter drivers. The premise of adding filter drivers is that the file system supports mounting filter drivers, but Mac OSX systems do not support mounting filter drivers, so OSX systems cannot The transparent encryption and decryption functio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F3/06
CPCG06F3/0656G06F21/602
Inventor 刘莉王松涛董子恒
Owner 北京亿赛通科技发展有限责任公司