Encrypted file system mounting method and device

An encrypted file system and mounting technology, applied in computer security devices, instruments, electronic digital data processing, etc., can solve problems such as data security, and achieve the effect of reducing operating costs and ensuring data security.

Inactive Publication Date: 2018-12-18
深圳虚觅者科技有限公司
View PDF8 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides an encrypted file system mounting method and device to solve the data security problem on the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted file system mounting method and device
  • Encrypted file system mounting method and device
  • Encrypted file system mounting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Please refer to figure 1 , the embodiment of the present application proposes a method for mounting an encrypted file system, including:

[0030] S10. After starting the system, extract the prestored environment parameters from the stored configuration file.

[0031] In this embodiment, the encrypted file system includes encrypted core data and non-encrypted data. Among them, core data includes but not limited to confidential data and core code; non-encrypted data includes configuration files. The above configuration file includes the recorded pre-stored environment parameters and the encrypted first key. The environment parameter refers to a set of verification data generated according to the hardware environment information and / or software environment information acquired by the system. In particular, the set of check data may only contain one check value. The pre-stored environment parameters refer to the verification data generated according to the hardware envi...

Embodiment 2

[0083] Please refer to figure 2 , the present invention also proposes an encrypted file system mounting device, comprising:

[0084] An extracting module 10, configured to extract the prestored environmental parameters from the stored configuration file after starting the system;

[0085] A judging module 20, configured to judge whether the environmental parameters for starting the system match the pre-stored environmental parameters;

[0086] The first decryption module 30 is configured to decrypt the first key if it matches the pre-stored environment parameter;

[0087] The second decryption module 40 is configured to decrypt and mount the encrypted file system according to the first key.

[0088] Optionally, the encrypted file system mount device also includes:

[0089] A monitoring module for monitoring real-time equipment operation input;

[0090] an input judging module, configured to judge whether the real-time device operation input matches the preset device opera...

Embodiment 3

[0115] image 3 It is a schematic diagram of a terminal device provided by an embodiment of the present application. like image 3 As shown, the terminal device 3 of this embodiment includes: a processor 33, a memory 31, and a computer program 32 stored in the memory 31 and operable on the processor 33, such as an encrypted file system mounting program. When the processor 33 executes the computer program 32, the steps in the above-mentioned embodiments of the encrypted file system mounting method are implemented, for example figure 1 Steps S10 to S40 are shown. Alternatively, when the processor 33 executes the computer program 32, it realizes the functions of the modules / units in the above-mentioned device embodiments, for example figure 2 Functions of modules 10 to 40 shown.

[0116] Exemplarily, the computer program 32 can be divided into one or more modules / units, and the one or more modules / units are stored in the memory 31 and executed by the processor 33 to complete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of file mounting and provides an encrypted file system mounting method and device. The method includes extracting pre-stored environment parameters from a stored configuration file after starting that system; judging whether an environmental parameter of the starting system matches with the pre-stored environmental parameter; decrypting the first key if it matches the pre-stored environment parameter; decrypting and mounting the encrypted file system according to the first key. The application can protect the data security of the encrypted file system, meanwhile ensure the normal operation of the encrypted file system without artificial interference, and reduce the operation cost.

Description

technical field [0001] The application belongs to the field of file mounting, and in particular relates to a method for mounting an encrypted file system, a device for mounting an encrypted file system, a terminal device, and a computer-readable storage medium. Background technique [0002] Some existing business operation data is installed on third-party servers. However, the security of this data is entirely provided by third parties. Security is overly reliant on third parties. In particular, when the system has a conflict of interest with the supplier, the core files or core codes stored in the system will have a high risk of leakage. [0003] Existing encrypted file systems include systems that encrypt the entire hard disk or partition, such as LUKS (Linux Unified Key Setup, Linux Unified Key Configuration), BitLocker (a disk encryption tool), etc., or cover the file system with encryption for directories, Such as Encfs (free, open source, GPL-based, FUSE-level encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6218
Inventor 张绍伟
Owner 深圳虚觅者科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products