Enciphered protection and read write control method for computer data

A data encryption, read-write control technology, applied in computing, electrical digital data processing, digital data processing components and other directions, can solve the problems of data loss, inconvenient operation, high cost, prevent data damage, easy to use, prevent external the effect of leaking

Inactive Publication Date: 2006-01-25
陆峰
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages: ①The object of encryption is file content data, not all data on the hard disk
②Encrypted files can still be seen, and can still be deleted when there is no corresponding USB-KEY, resulting in data loss
③Because the file filtering technology can only intercept the read and write operations with files as the object, it is impossible to intercept the read and write directly to the sector, such as formatting. The attacker only needs to use the formatting function to store important data completely destroyed
The user puts the files to be encrypted in this virtual partition, and the read and write operations in this virtual partition will be encrypted. If there is no corresponding USB-KEY, it cannot be accessed
Disadvantages: ① Existing data cannot be protected. If you want to protect it, you must first copy it to the virtual partition
②Like HDLOCK, it can only protect data in the form of files ③It can only be operated in the predetermined space size
④Because the virtual partition of Hidden Dragon Token is also a file, the attacker can still delete it or format the partition where it is located without the KEY, resulting in data loss
Disadvantages: ①The cost of the card is higher
②For data safety, the card should be unplugged when leaving the computer, and since the card is inserted on the computer motherboard, the computer case must be opened to be plugged in and out, which is extremely inconvenient to operate, especially for many notebook computers. There is no place to insert a card in the case
③ To encrypt, the entire hard disk must be encrypted. It is not possible to select only one or a group of partitions to encrypt, while the remaining partitions are not encrypted.
[0008] In the prior art, there is no encryption method combined with USB-KEY and sector-level read-write interception, and a method combined with read-write operation control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enciphered protection and read write control method for computer data
  • Enciphered protection and read write control method for computer data
  • Enciphered protection and read write control method for computer data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] 1. Sector-level read and write interception

[0056] a) First analyze the starting and ending sector numbers of the partition to be protected.

[0057] We have to analyze the entry parameters of int13h and the hard disk partition table chain.

[0058] The entry parameters of int13h are:

[0059] ah function number

[0060] al number of sectors to be read / written ch cylinder number cl sector number dh head number dl drive number (where 0 is a:, 1 is b:, 80h is the first hard disk)

[0061] Judging from ah whether it is a write operation and deciding whether to intercept it, you can judge whether it is a floppy disk or a hard disk from dl, and the last question is how to judge whether it is logical c area, d area, e area... whether they should be write-protected partitions .

[0062] We use debug to enter a small piece of assembler

[0063] mov dl, 80h; drive letter

[0064] mov dh, 0; head number 0

[0065] mov ch, 0; cylinder number 0

[0066] mov cl, 1; sector ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a computer data cipher protection and a read / write control method, which applies a generate method combining a serial bus ciphering dog or software identity certification with the sector stage read / write interception to realize cipher to hard disk data, which utilizes the sector stage read / write interception method to intercept all read / write operations, carries out cipher / decipher conversion in the cipher core under the condition of existing related identity certification to realize the cipher to disk data and read / write control.

Description

technical field [0001] The invention relates to an encryption protection of computer data and a related read-write control method, in particular to a universal serial bus dongle (referred to as USB-KEY), sector-level read-write interception, and an encryption core (the encryption core is responsible for Encryption and decryption) and control of read and write operations. Background technique: [0002] Authenex's data encryption product, HDLOCK, uses a combination of USB-KEY and software encryption core to encrypt data on hard disk files. Its implementation technology is based on the file filtering technology of the operating system, that is, intercepting all read and write operations on files, and performing encryption and decryption conversion in the encryption core. This conversion will only be performed when the corresponding USB-KEY exists. If it does not exist, the encrypted file data cannot be read correctly, thus realizing the encryption of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F1/00
Inventor 付爱香
Owner 陆峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products