Unlock instant, AI-driven research and patent intelligence for your innovation.

Control method, device, program, storage medium and electronic equipment for transparent encryption and decryption

A technology of transparent encryption and decryption and control methods, which is applied in the field of devices, transparent encryption and decryption control methods, storage media and electronic equipment, and computer programs, and can solve the problems of reduced file efficiency, increased number of file IO operations, increased file leaks, etc.

Active Publication Date: 2021-10-22
北京亿赛通科技发展有限责任公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with this method, the file is restored to the temporary directory when the file is decrypted, and the file is copied to the original file location when the file is encrypted, which greatly increases the number of file IO operations and reduces the efficiency of file opening.
Moreover, the files are stored in plaintext files in the temporary directory during the operation process, which increases the possibility of file leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method, device, program, storage medium and electronic equipment for transparent encryption and decryption
  • Control method, device, program, storage medium and electronic equipment for transparent encryption and decryption
  • Control method, device, program, storage medium and electronic equipment for transparent encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] refer to figure 1 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 1 of the present invention.

[0036] The control method for transparent encryption and decryption of this embodiment includes the following steps:

[0037] Step S102: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program.

[0038] According to an exemplary embodiment of the present invention, in an application scenario where any application program accesses any file, including operations such as reading and writing file data, the transparent encryption and decryption control method can be used to control application program access The file to be operated on. Here, the files stored in the disk are ciphertext file data.

[0039] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier...

Embodiment 2

[0054] refer to figure 2 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 2 of the present invention.

[0055] The control method for transparent encryption and decryption of this embodiment includes the following steps:

[0056] Step S202: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program and the identification of the file to be accessed by the application program.

[0057] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier may be, but not limited to, an application program ID, an application program name, and the like of the application program. The file identifier is used to indicate the information of the file to be accessed by the application program, and the file identifier may be the file name, file path or file suffix of the file to be op...

Embodiment 3

[0079] refer to image 3 , shows a flow chart of steps of a transparent encryption and decryption control method according to Embodiment 3 of the present invention.

[0080] The control method for transparent encryption and decryption of this embodiment includes the following steps:

[0081] Step S302: When it is detected that the application program accesses the file stored in the disk, obtain the program identification of the application program.

[0082] Wherein, the program identifier is used to indicate the information of the application program, and the program identifier may be, but not limited to, an application program ID, an application program name, and the like.

[0083] Step S304: Obtain preset rules for encryption and decryption control.

[0084] In this embodiment, the preset rule includes information about the file to be operated, and may specifically include attribute information of the file to be operated, and information about an application program that i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a transparent encryption and decryption control method, device, computer program, storage medium and electronic equipment. The method for controlling transparent encryption and decryption includes: when it is detected that an application program accesses a file stored in a disk, obtaining a program identification of the application program; obtaining a preset rule for encryption and decryption control; combining the preset rule with the The program identification is matched; according to the matching result, the application program is controlled to access the file data to be operated by reading and writing the plaintext cache or the ciphertext cache, wherein the data interaction between the ciphertext cache and the disk does not perform encryption and decryption operations , the plaintext buffer is generated by copying the content of the ciphertext buffer and performing a decryption operation on the copied content. By adopting the technical scheme of the invention, the transparent encryption and decryption function of the file system can be effectively realized.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, to a transparent encryption and decryption control method, device, computer program, storage medium, and electronic equipment. Background technique [0002] Transparent encryption and decryption technology is a technology for encrypting and decrypting files opened or edited by users without user operation. Since transparent encryption and decryption technology does not change users' operating habits, transparent encryption and decryption technology has been widely used. Systems such as Windows and linux realize the function of transparent encryption and decryption of file reading and writing by adding filter drivers. The premise of adding filter drivers is that the file system supports mounting filter drivers, but Mac OSX systems do not support mounting filter drivers, so OSX systems cannot The transparent encryption and decryption functio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F3/06
CPCG06F3/0656G06F21/602
Inventor 刘莉王松涛董子恒
Owner 北京亿赛通科技发展有限责任公司