Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

hard disk partition encryption method and system under a K-UX system

A technology of K-UX and hard disk partition, which is applied in the direction of program loading/starting, program control design, instrument, etc. It can solve the problems of low protection level of hard disk partition and high risk of data and file leakage in key partitions, and achieve flexible encryption methods, The effect of flexible authorization methods

Inactive Publication Date: 2019-04-05
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method and system for encrypting hard disk partitions under the K-UX system to solve the problems in the prior art that the protection level of hard disk partitions is low and the risk of data and file leakage of key partitions is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • hard disk partition encryption method and system under a K-UX system
  • hard disk partition encryption method and system under a K-UX system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] see figure 1 , figure 1 It is a schematic flowchart of a method for encrypting hard disk partitions under the K-UX system provided by the embodiment of the present application. Depend on figure 1 As can be seen, the method for hard disk partition encryption under the K-UX system in the present embodiment mainly includes the following processes:

[0048] S1: Create the first partition under the K-UX system, and the password of the first partition is an independent password.

[0049] Wherein, the first partition in this embodiment is an encrypted partition. Specifically, step S1 includes:

[0050] S11: Create a third partition under the K-UX system. Wherein, the third partition is the original blank partition.

[0051] S12: Encrypt the third partition to obtain the first partition.

[0052] It can be known from the above steps S11 and S12 that in this embodiment, a new partition is firstly created for the K-UX system, that is, the third partition, and is encrypted to...

Embodiment 2

[0086] exist figure 1 On the basis of the illustrated embodiment see figure 2 , figure 2 It is a schematic structural diagram of a hard disk partition encryption system under the K-UX system provided by the embodiment of the present application. Depend on figure 2 It can be seen that the system mainly includes a first partition creation module, a mapping module and a mounting module. Wherein, the first partition creation module is used to create the first partition under the K-UX system, and the password of the first partition is an independent password, wherein, the first partition is an encrypted partition; the mapping module is used to utilize the independent password to convert the first The partition is mapped to the mapping directory specified by the K-UX system kernel to obtain the second partition, wherein the second partition is an encrypted partition after mapping; the mounting module is used to mount the second partition.

[0087] Further, the first partition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hard disk partition encryption method and system under a K-UX system, and the method comprises the steps: creating a first partition under the K-UX system, and enabling a password of the first partition to be an independent password; Mapping a first partition to K-by using the independent password Obtaining a second partition under a mapping catalog appointed by the UX system kernel; And mounting the second partition. The system mainly comprises a first partition creating module, a mapping module and a mounting module. According to the method and the system, through aphysical partition level encryption and password matching authorization mode, the use limitation and security reinforcement of the specified hard disk partition under the K-UX system can be realized,and the encryption security can be improved. According to the method and the system, partition dynamic mounting and unloading can be carried out in the starting stage or the normal running stage of the operating system, so that the encryption flexibility can be improved.

Description

technical field [0001] This application relates to the technical field of key application host encryption, in particular to a method and system for encrypting hard disk partitions under the K-UX system. Background technique [0002] Key application hosts are widely used in fields such as banking, telecommunications, transportation, and energy. In these different fields, key application hosts play a very important role. In addition to excluding the possibility of device downtime, it is very important to strengthen the security of these key application hosts, such as actively encrypting some hard disk partitions that store key files, so as to prevent hackers from intruding. [0003] At present, the partition protection scheme in key application hosts usually adopts the default scheme, that is, the partition is not encrypted, but the mounting permission and access permission of files and partitions are controlled by setting partition or directory permission values. [0004] Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F9/445
CPCG06F9/44505G06F21/78
Inventor 杜国峰
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products