Transparent encryption and decryption control method and device, program, storage medium and electronic equipment
A technology of transparent encryption and decryption and control methods, which is applied in the fields of transparent encryption and decryption control methods, storage media, electronic equipment, devices, and computer programs, and can solve the problems of increasing the number of file IO operations, reducing file efficiency, increasing file leaks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] refer to figure 1 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 1 of the present invention.
[0036] The control method for transparent encryption and decryption of this embodiment includes the following steps:
[0037] Step S102: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program.
[0038] According to an exemplary embodiment of the present invention, in an application scenario where any application program accesses any file, including operations such as reading and writing file data, the transparent encryption and decryption control method can be used to control application program access The file to be operated on. Here, the files stored in the disk are ciphertext file data.
[0039] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier...
Embodiment 2
[0054] refer to figure 2 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 2 of the present invention.
[0055] The control method for transparent encryption and decryption of this embodiment includes the following steps:
[0056] Step S202: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program and the identification of the file to be accessed by the application program.
[0057] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier may be, but not limited to, an application program ID, an application program name, and the like of the application program. The file identifier is used to indicate the information of the file to be accessed by the application program, and the file identifier may be the file name, file path or file suffix of the file to be op...
Embodiment 3
[0079] refer to image 3 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 3 of the present invention.
[0080] The control method for transparent encryption and decryption of this embodiment includes the following steps:
[0081] Step S302: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program.
[0082] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier may be, but not limited to, an application program ID, an application program name, and the like.
[0083] Step S304: Obtain preset rules for encryption and decryption control.
[0084] In this embodiment, the preset rule includes information about the file to be operated, and may specifically include attribute information of the file to be operated, and information about an application program that i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


