Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Linux operating system file read-write transparent encryption and decryption method

A technology of transparent encryption and decryption and operating system, which is applied in the field of transparent encryption and decryption of file reading and writing, and can solve problems such as high code complexity and incompatibility with the Arm platform

Inactive Publication Date: 2018-12-14
浙江华途信息安全技术股份有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But such method cannot be compatible with Arm platform (chip), and the code complexity is higher; The market needs a kind of method that can be applicable to Arm platform and the file read-write transparent encryption and decryption with simple code; The present invention solves such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linux operating system file read-write transparent encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be specifically introduced below in conjunction with the accompanying drawings and specific embodiments.

[0028] The method for reading and writing transparent encryption and decryption of files in the Linux operating system comprises the following steps:

[0029] Step 1, find the address of the sys_close function; as an embodiment, the address of the sys_close function includes: 0xffffffff811eb720 on the ubuntu14.04 system, 0xffffffffb5840370 on the ubuntu16.04 system, and 0xffffffff803338c8 on the winning Kylin system.

[0030] Step 2: Start from the starting address of the memory, read the data in the memory, and perform matching. If the content is the address of the system call sys_close, the matching is successful, and the next step is performed; if not, the matching fails, and the next block of memory is read in the data and match it.

[0031] Step 3: After the matching is successful, the system calls open, read, write, mmap, and msync...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Linux operating system file read-write transparent encryption and decryption method, comprising the following steps: 1, finding the address of a sys_close function; 2, starting from the starting address of the memory, reading the data in the memory and matching; and if the content is the address of the system call sys_close, determining that the matching is successful, and carrying out the next step; If not, determining that the matching fails, and reading the data in the next memory and performing matching; 3, after the matching is successful, calling the open, read,write, mmap and msync functions on the hook system to encrypt and decrypt the data; 4, achieving the function of file encryption protection. The method has the advantages of simple process and wide platform compatibility, and is not only suitable for Mips processors, but also suitable for Arm processors. The search method is simple; the code is simple and understandable.

Description

technical field [0001] The invention relates to the field of Linux operating systems, in particular to a method for transparently encrypting and decrypting files in the Linux operating system for reading and writing. Background technique [0002] The Linux operating system on the X86 platform can hook system call functions (open, read, write, mmap, msync) by accessing specific registers, so as to achieve the effect of transparent encryption and decryption. [0003] Most of the prior art adopts the following method: the system call hook technology of the Linux operating system of the X86 platform is based on the unique structure of the X86 platform (chip)---interrupt descriptor table (IDT)---to find the system call table , find the system call table, you can hook the system call function, so as to intercept the data flow in the open, read, write, mmap, msync system call, and perform encryption and decryption. [0004] But such method can't be compatible with Arm platform (ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107
Inventor 刘轶斌谢永胜
Owner 浙江华途信息安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products