Unlock instant, AI-driven research and patent intelligence for your innovation.

A cross-platform data security protection method compatible with bitlocker encrypted disk

A data security, cross-platform technology, applied in the direction of digital data protection, electronic digital data processing, computer security devices, etc., can solve the problems of lack, low solution efficiency, and inability to be highly integrated, and achieve good efficiency and stability.

Active Publication Date: 2021-02-19
成都艾勃科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a cross-platform data security protection method compatible with BitLocker encrypted disks to solve the problem that the current solution based on the FUSE framework is not efficient and cannot be highly integrated in Mac and Linux systems. The present invention is used in Mac systems Encryption and decryption of disk data is realized in real time through the filter driver, which solves the problem of lack of this technology in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cross-platform data security protection method compatible with bitlocker encrypted disk
  • A cross-platform data security protection method compatible with bitlocker encrypted disk
  • A cross-platform data security protection method compatible with bitlocker encrypted disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100]Such asfigure 1 As shown, a cross-platform data security method compatible with BitLocker encrypted disks includes the following steps:

[0101]Step S1. Create an enlightenment request;

[0102]Step S2. Judging whether the file system supports encryption; if the file system does not support encryption, determine the file system to not support the encrypted file system; if the file system supports encryption, continue to determine if the remaining space is greater than or equal to 30% of the total capacity The 30% of here is an estimated value (preset value), encrypted data is larger than the original data, here takes a safe estimation value (preset value), each time according to 30%; actual Different size estimates (preset values) can be set according to the actual situation;

[0103]When the remaining space is less than 30% of the total capacity, the available space is insufficient, and the encryption cannot be completed; if the remaining space is greater than or equal to 30% of the t...

Embodiment 2

[0170]The second embodiment is further optimized on the basis of the first embodiment.

[0171]After the steps of unlocking and mounting the encrypted disk are completed, the encrypted disk can be decrypted, such asfigure 2 As shown, the decryption steps are as follows:

[0172]Step e1. Create a close encryption request;

[0173]Step e2. Determine whether the disk is encrypted. If the disk is not encrypted, the step ends; if the disk is encrypted, read the metadata from the offset Offset3;

[0174]Step e3. Parse metadata;

[0175]Step e4. Read the ciphertext of the FS1 related sector from the offset Offset2 position;

[0176]Step e5. Decrypt sector ciphertext data;

[0177]Step e6. Write back the plaintext to the corresponding sector;

[0178]Step e7. Mark all sectors used by FS2 as unused in the sector usage bitmap of FS1;

[0179]Step e8. Copy the DBR and related data of FS1 from offset Offset2 back to offset Offset1;

[0180]Step e9. Complete decryption.

[0181]Among them, the step of determining whether the di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a cross-platform data security protection method compatible with BitLocker encrypted disks, comprising the following steps: S1. creating a request to enable encryption; S2. judging whether the file system supports encryption; if so, judging whether the remaining space is greater than or equal to the preset Value; S3. If it is less than the preset value, the encryption cannot be completed; if it is greater than or equal to the preset value, then generate metadata; S4. Copy the DBR and related data of FS1 from offset Offset1 to offset Offset2; S5. Access The DBR of FS2 and set up the relevant FAT table; S6. Write the cross-platform decryption program; S7. Mark the unused sectors as used; Mark the sectors actually used by FS2 as used; Write the data to the offset of Offset3; write the BitLocker disk compatibility mark; S9. After reading the sector data, encrypt the plaintext data of the sector and write it back to each sector, that is, complete the encryption. The invention solves the problem that the current solution based on the FUSE framework has low efficiency and cannot be highly integrated in Mac and Linux systems.

Description

Technical field[0001]The invention relates to the field of computer technology, data security protection technology, and decryption encryption technology, and more specifically to a cross-platform data security protection method compatible with BitLocker encrypted disks.Background technique[0002]The most famous cross-platform data security protection solution in the industry is TrueCrypt. TrueCrypt is an open source cross-platform (Windows, Mac, Linux, etc.) data security protection solution. It already supports multiple encryption algorithms and modes. However, it was announced in May 2014 to stop maintenance and updates. Due to security issues, TrueCrypt has recommended Users migrate important encrypted data to Windows BitLocker for storage and use.[0003]Microsoft introduced and highly integrated BitLocker in the Windows Vista system. BitLocker is already a mature, stable and secure disk encryption solution. BitLocker protects all files on this volume by encrypting the entire driv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/80G06F21/60G06F21/62
CPCG06F21/602G06F21/6218G06F21/80G06F2221/2107
Inventor 罗林何翔
Owner 成都艾勃科技有限公司