A cross-platform data security protection method compatible with bitlocker encrypted disk
A data security, cross-platform technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of lack, low solution efficiency, and inability to be highly integrated, and achieve good efficiency and stability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0100]Such asfigure 1 As shown, a cross-platform data security method compatible with BitLocker encrypted disks includes the following steps:
[0101]Step S1. Create an enlightenment request;
[0102]Step S2. Judging whether the file system supports encryption; if the file system does not support encryption, determine the file system to not support the encrypted file system; if the file system supports encryption, continue to determine if the remaining space is greater than or equal to 30% of the total capacity The 30% of here is an estimated value (preset value), encrypted data is larger than the original data, here takes a safe estimation value (preset value), each time according to 30%; actual Different size estimates (preset values) can be set according to the actual situation;
[0103]When the remaining space is less than 30% of the total capacity, the available space is insufficient, and the encryption cannot be completed; if the remaining space is greater than or equal to 30% of the t...
Embodiment 2
[0170]The second embodiment is further optimized on the basis of the first embodiment.
[0171]After the steps of unlocking and mounting the encrypted disk are completed, the encrypted disk can be decrypted, such asfigure 2 As shown, the decryption steps are as follows:
[0172]Step e1. Create a close encryption request;
[0173]Step e2. Determine whether the disk is encrypted. If the disk is not encrypted, the step ends; if the disk is encrypted, read the metadata from the offset Offset3;
[0174]Step e3. Parse metadata;
[0175]Step e4. Read the ciphertext of the FS1 related sector from the offset Offset2 position;
[0176]Step e5. Decrypt sector ciphertext data;
[0177]Step e6. Write back the plaintext to the corresponding sector;
[0178]Step e7. Mark all sectors used by FS2 as unused in the sector usage bitmap of FS1;
[0179]Step e8. Copy the DBR and related data of FS1 from offset Offset2 back to offset Offset1;
[0180]Step e9. Complete decryption.
[0181]Among them, the step of determining whether the di...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


