Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38 results about "Encrypting file system" patented technology

The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption.The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.. EFS is available in all versions of Windows except the home versions (see Supported operating systems below ...

Method for protecting linux operation system on loongson hardware platform

The invention discloses a method for protecting a linux operation system on a loongson hardware platform. According to the method for protecting linux operation system on the loongson hardware platform, a core encryption method and a file system encryption method are used. Core encryption is implemented by encrypting a Linux initial RAM (random-access memory) magnetic disk. The core encryption method comprises the following steps of encrypting the Linux initial RAM magnetic disk at a core generation stage; and decoding the Linux initial RAM magnetic disk when the system is started. File system encryption is implemented by using a linux equipment mapping technology, after file system encryption is implemented, file system mounting cannot be carried out directly, an encrypted file system requires to be mapped, and data of the file system can be read or written after mounting the mapped file system. By the method for protecting the linux operation system on the loongson hardware platform, a Linux core process is improved, and the inner operation mechanism, the procedure principle and key data of the Linux core process are protected fundamentally. The method not only can be used for preventing software copyright infringement and protecting intellectual property rights in a business environment, but also can be used for an environment requiring encryption such as defense and military, and has an anti-cracking function and an information leakage preventing function.
Owner:SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD

Single-device information security processing and interaction method and interaction system thereof

The invention relates to a single-device information security processing and interaction method and an interaction system thereof. The system comprises a display screen and an operating system, an encrypted file system, a function calling interception plug-in module and an encryption module are arranged in the operating system, a user or an application (interface) sends a dynamic ciphertext culture security information request to the operating system, and the file system requests the encryption module to perform encoding encryption or ciphertext conversion to generate a new information ciphertext. The operating system puts forward a ciphertext coding conversion request to the encryption module. The encryption module carries out ciphertext coding conversion and returns the ciphertext codingconversion to the operation system. The operation system intercepts the image and/or text information to be displayed. The encryption module carries out code conversion on the ciphertext of the information processing result and returns the ciphertext to the operation system. The operating system fuses the intercepted information with the ciphertext of the converted information processing result,and a display screen of single equipment displays or an application (interface) processes the information processing ciphertext result. According to the invention, the security of the processed and used information in the operating system is effectively protected.
Owner:浙江智贝信息科技有限公司

Single-device code safe execution and interaction method and interaction system thereof

The invention relates to a single-device code safe execution and interaction method and an interaction system thereof. The system comprises a display and an operating system, an encrypted file system.An encryption module and a function call interception plug-in module are arranged in the operating system, a user sends a code dynamic ciphertext culture security execution request to the operating system, and the file system requests the encryption module to perform code encryption to generate a code ciphertext. The file system proposes a ciphertext coding conversion request to the encryption module. The encryption module carries out ciphertext coding conversion and returns the ciphertext coding conversion to the operation system. The encryption module performs ciphertext coding conversion on the ciphertext of the code operation result and returns the ciphertext to the operation system. The operating system fuses the ciphertext of the unconverted code running result with the ciphertext of the displayable or interface-processable code running result, the fusion result is sent to a display or a processing interface, and the display or the processing interface processes the running result corresponding to the code request. The security of codes in the operating system is effectively protected.
Owner:浙江智贝信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products