Nothing Special   »   [go: up one dir, main page]

CN103067170A - Encrypting file system, encrypting method and deciphering method based on EXT2 file system - Google Patents

Encrypting file system, encrypting method and deciphering method based on EXT2 file system Download PDF

Info

Publication number
CN103067170A
CN103067170A CN2012105436982A CN201210543698A CN103067170A CN 103067170 A CN103067170 A CN 103067170A CN 2012105436982 A CN2012105436982 A CN 2012105436982A CN 201210543698 A CN201210543698 A CN 201210543698A CN 103067170 A CN103067170 A CN 103067170A
Authority
CN
China
Prior art keywords
index node
file system
cipher key
aes
key index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105436982A
Other languages
Chinese (zh)
Other versions
CN103067170B (en
Inventor
陈金强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowei Group Shenzhen Co ltd
Original Assignee
Shenzhen State Micro Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen State Micro Technology Co Ltd filed Critical Shenzhen State Micro Technology Co Ltd
Priority to CN201210543698.2A priority Critical patent/CN103067170B/en
Publication of CN103067170A publication Critical patent/CN103067170A/en
Application granted granted Critical
Publication of CN103067170B publication Critical patent/CN103067170B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an encrypting file system based on an EXT2 file system. The encrypting file system based on the EXT2 file system comprises a plurality of block groups, and each block group comprises memory spaces corresponding to the data of a superblock, a block group description list, a block bitmap, a file and catalogue index node bitmap, a file and catalogue index node list and a plurality of data blocks. A plurality of block group description lists are stored in a memory space corresponding to the block group description list. Each block group further comprises a secret key index node bitmap which is arranged behind the file and catalogue index node list and a memory space corresponding to a secret key index node list. The memory space corresponding to the block group description list is further provided with a file system digital certificate (DC). By means of the encrypting file system based on the EXT2 file system, the security of the EXT2 file system is improved. The invention further provides an encrypting method and a deciphering method based on the EXT2 file system.

Description

A kind of encrypted file system based on the EXT2 file system, encryption method and decryption method
Technical field
The present invention relates to file system storage Technology On Data Encryption, relate in particular to a kind of encrypted file system based on the EXT2 file system, encryption method and decryption method.
Background technology
File system is the method for a kind of storage and constituent act and data, and it is to its access with search and become easy.File system is used SD card, USB flash disk, hard disk, SPI FLASH, the such memory device of NOR FLASH, NANDFLASH usually, and the physical location of maintenance documentation in equipment.At present a lot of file system only have management document and data function, do not have file and data security protecting function.Use the transparent file system such as fruit product, lose when product, valuable data might illegally be used in the product.
Such as, the EXT2 file system that is usually used in built-in field provides storage and constituent act and data management, and file and data transparency mode are stored, and it can not be encrypted file, causes its Information Security not high.
Therefore, how to solve the problem of the data security in the EXT2 file system, become one of technical problem of current urgent need solution.
Summary of the invention
The purpose of this invention is to provide a kind of encrypted file system based on the EXT2 file system.
For solving technical problem of the present invention, the present invention discloses a kind of encrypted file system based on the EXT2 file system, it comprises a plurality of groups, and each piece group comprises the memory space that following data are corresponding: superblock, piece group description list, bitmap block, file and directory index node bitmap, file and directory index node table and a plurality of data block; Organize for described and have a plurality of group description lists in memory space corresponding to description list; Wherein, described group further comprises cipher key index node bitmap and memory space corresponding to cipher key index node table that is positioned at after file and the directory index node table, further has the file system digital certificate in memory space corresponding to described group description list.
Wherein, further comprise " encryption indicator " and " cipher key index numbering " data item in described file or the directory index node list item, whether " encryption indicator " expression file or catalogue encrypt, if encrypt, can find according to the value of " cipher key index node serial number " to have file or catalogue deciphering relevant information in corresponding " cipher key index node list item ", " the cipher key index node list item ".
Wherein, cipher key index node bitmap is used for the operating position of management, tracking cipher key index node table.
Wherein, described cipher key index node table is comprised of cipher key index node table item array, and each cipher key index node list item is comprised of plaintext summary, reservation position (filling zero), the random number filler of magic number, version number, AES pattern, digest algorithm pattern, AES key, AES initial vector, encrypted content.
The present invention also discloses a kind of encryption method based on the EXT2 file system, and it comprises:
Step S11: first according to AES key and AES initial vector create-rule algorithm, generate AES key and AES initial vector;
Step S12: according to user's configuration excerpt algorithm pattern, the summary of calculation document or directory content;
Step S13: dispose the AES pattern according to AES key, AES initial vector, user, encrypt file or catalogue;
Step S14: the information combination of the plaintext of magic number, version number, AES pattern, digest algorithm pattern, AES key, AES initial vector, encrypted content summary is become expressly " cipher key index node list item ";
Step S15: from the file system memory device, read " file system digital certificate " in internal memory, the validity of checking " file system digital certificate "; If " file system digital certificate " is effective, then extract the public key information in " file system digital certificate ";
Step S16: the plaintext of step S14 " cipher key index node list item " is encrypted to ciphertext " cipher key index node list item " with PKI in the RSA cryptographic algorithms mode;
Step S17: according to a free time of " cipher key index node bitmap " information searching " cipher key index node list item ", obtain corresponding " cipher key index numbering " information;
Step S18: upgrade the data of " encryption indicator " and " cipher key index node serial number " in " file or directory index node list item ", according to " cipher key index node serial number " ciphertext in the internal memory " cipher key index node list item " is write in the file system memory device.
Among the step S11, the value that the beginning of 128 keys of AES is 8 is 0x53, and rear 120 are passed through the generation of random number module; The value that the beginning of 128 initial vectors of AES is 8 is 0x4D, and rear 120 are passed through the generation of random number module.
Among the step S12, user's configuration excerpt algorithm pattern adopts SHA1 or SHA256.
Among the step S13, be electronic codebook mode (ECB) pattern when the user disposes the AES pattern, with AES key file or catalogue be blocked into 128 bit data and encrypt respectively; Be password packet train (CBC) pattern when the user disposes the AES pattern, with AES key, AES initial vector file or catalogue be blocked into 128 bit data and encrypt in the packet train mode.
The present invention also provides a kind of decryption method based on the EXT2 file system, it is characterized in that comprising:
Step S21: the data according to " encryption indicator " and " cipher key index node serial number " in the access " file or directory index node list item ", read corresponding ciphertext " cipher key index node list item " data in internal memory;
Step S22, the ciphertext in the internal memory " cipher key index node list item " data are decrypted into expressly " cipher key index node list item " with private key in RSA decipherment algorithm mode;
Step S23, according to AES key, AES initial vector, AES pattern information declassified document or catalogue in expressly " cipher key index node list item ".
Described decryption method based on the EXT2 file system further comprises:
Step S24: according to digest algorithm type in the plaintext " cipher key index node list item ", recomputate the file of the rear plaintext of deciphering or the summary of catalogue;
Step S25: whether the summary that recalculates among the comparison step S24 is consistent with the digest value in the plaintext " cipher key index node list item ", if comparative result is consistent, illustrate that then decrypting process is correct, if comparative result is inconsistent, the failure of declassified document or directory process then is described, prompting is unusual.
Compared with prior art, because the encrypted file system based on the EXT2 file system of the present invention has increased file system digital certificate, cipher key index node bitmap and cipher key index node table on the basis of EXT2 file system, adopt file provided by the invention and encrypted directory and decryption method to be encrypted or to decipher file or catalogue, improved the fail safe of EXT2 file system.
Description of drawings
Fig. 1 is EXT2 file system structure figure.
Fig. 2 is the encrypted file system structure chart based on the EXT2 file system of the present invention.
Fig. 3 is cipher key index list structure figure.
Fig. 4 is file system encryption flow figure.
Fig. 5 is AES key generating structure figure.
Fig. 6 is AES initial vector generating structure figure.
Fig. 7 is file or directory content digest calculations structure chart.
Fig. 8 is file or directory content cryptographic structure figure.
Fig. 9 is file system deciphering flow chart.
Figure 10 is file or directory content deciphering structure chart.
Embodiment
As shown in Figure 1, be the structure chart of EXT2 file system organising data on memory device.When format, divide a plurality of groups according to capacity of memory device first, then comprise independently superblock, piece group description list, bitmap block, file and directory index node bitmap, file and directory index node table and a plurality of data block in each piece group.
The placement data block address of the content record file of file or directory index node list item or the attribute of catalogue and file or catalogue real data.Physical record information is: the time that access mode, owner and group, amount of capacity, establishment or state change, the last time of reading, the time of revising recently etc.
As shown in Figure 2, be the structure chart of the encrypted file system organising data on memory device based on the EXT2 file system of the present invention.It increases safety encipher deciphering relevant information in each piece group.In piece group description list, increase " file system digital certificate "; After file and directory index node table, increase " cipher key index node bitmap ", " cipher key index node table ".In order to satisfy PKIX based on safety requirements, the file system digital certificate uses the form of general digital certificate, is convenient to verify the validity of digital certificate.
The data structure of each list item in " cipher key index node table ", as shown in Figure 3, its content has the plaintext summary of magic number, version number, AES pattern, digest algorithm pattern, AES key, AES initial vector, encrypted content, and total length is 2048.
In file or directory index node list item, increase " encryption indicator " and " cipher key index node serial number " data item.Whether " encryption indicator " expression file or catalogue encrypt, if encrypt, can find corresponding " cipher key index node list item " according to the value of " cipher key index node serial number ".Has file or catalogue deciphering relevant information in " cipher key index node list item ".
EXT2 encrypted file system encrypt file or directory process, as shown in Figure 4.
Concrete steps are as follows:
Step S11, need to encrypt when file or catalogue, first according to AES key and AES initial vector create-rule algorithm, generation AES key and AES initial vector.128 keys of AES: the value that begins 8 is 0x53 (ASCII character of S in the State word is as the symmetric key identifying information), and rear 120 are passed through the generation of random number module, as shown in Figure 5.128 initial vectors of AES: the value that begins 8 is 0x4D (ASCII character of M in the Micro word is as the initial vector identifying information), and rear 120 are passed through the generation of random number module, as shown in Figure 6.
Step S12, according to user's configuration excerpt algorithm pattern, the summary of calculation document or directory content.As shown in Figure 7, when user's configuration excerpt algorithm pattern was SHA1, summary as a result length was 160 (forward alignment, the not enough zero paddings in back).When user's configuration excerpt algorithm pattern was SHA256, summary as a result length was 256.
Step S13, dispose the AES pattern according to AES key, AES initial vector, user, encrypt file or catalogue, as shown in Figure 8.Be electronic codebook mode (ECB) pattern when the user disposes the AES pattern, with AES key file or catalogue be blocked into 128 bit data and encrypt respectively.Be password packet train (CBC) pattern when the user disposes the AES pattern, with AES key, AES initial vector file or catalogue be blocked into 128 bit data and encrypt in the packet train mode.When not being 128 integral multiple for the length of file or catalogue, last piece mantissa according to this expressly form directly add last group of ciphertext back.
Step S14, the information combination that the plaintext of magic number, version number, AES pattern, digest algorithm pattern, AES key, AES initial vector, encrypted content is made a summary become expressly " cipher key index node list item ".The structure of " cipher key index node list item ", as shown in Figure 3.
Step S15, from the file system memory device, read " file system digital certificate " in internal memory, the validity of checking " file system digital certificate ".The inspection aspect of concrete validity: the authentication certificate trust chain, confirm that certificate is effective; Verification book revocation list CRL(Certificate Revocation List), claims again blacklist, check whether certificate is revoked.If " file system digital certificate " is invalid, newspaper is unusual, stops the operation of subsequent file system.If " file system digital certificate " is effective, extract public key information in " file system digital certificate ".Improve operational efficiency, during the load document system, carry out once.
Step S16, the plaintext of step S14 " cipher key index node list item " is encrypted to ciphertext " cipher key index node list item " with PKI in the RSA cryptographic algorithms mode.
Step S17, basis " cipher key index node bitmap " free time of information searching " cipher key index node list item ".If do not find, " cipher key index node list item " is finished, and newspaper is unusual, current encrypt file or directory process failure.If find, obtain corresponding " cipher key index numbering " information.
The data of " encryption indicator " and " cipher key index node serial number " in step S18, the renewal " file or directory index node list item ".According to " cipher key index node serial number " ciphertext in the internal memory " cipher key index node list item " is write in the file system memory device.
EXT2 encrypted file system declassified document or directory process, as shown in Figure 9.
Concrete steps are as follows:
Step S21, according to the data of " encryption indicator " and " cipher key index node serial number " in the access " file or directory index node list item ", read corresponding ciphertext " cipher key index node list item " data in internal memory.
Step S22, be ready in the internal memory, ciphertext " cipher key index node list item " data are decrypted into expressly " cipher key index node list item " with private key in RSA decipherment algorithm mode.Whether magic number is effective for checking plaintext " cipher key index node list item ", if magic number is invalid, possible private key data has problem; Newspaper is unusual, stops the file system decrypting process.If magic number is effective, expressly the data of " cipher key index node list item " also are effective.
Step S23, according to AES key, AES initial vector, AES pattern information declassified document or catalogue in expressly " cipher key index node list item ", as shown in figure 10.When the AES pattern is electronic codebook mode (ECB) pattern, with AES key file or catalogue is blocked into 128 bit data and deciphers respectively.When the AES pattern is password packet train (CBC) pattern, with AES key, AES initial vector file or catalogue is blocked into 128 bit data and deciphers in the packet train mode.When not being 128 integral multiple for the length of file or catalogue, last piece mantissa does not need processing according to being exactly expressly.
Step S24, according to digest algorithm type in expressly " cipher key index node list item ", recomputate after the deciphering expressly file or the summary of catalogue, as shown in Figure 7.When the digest algorithm pattern was SHA1, summary as a result length was 160.When the digest algorithm pattern was SHA256, summary as a result length was 256.
Step S25, comparison step S24 recalculate summary and expressly more whether " cipher key index node list item " middle digest value is consistent.If comparative result is consistent, then decrypting process is correct; If comparative result is inconsistent, then declassified document or directory process failure, newspaper is unusual, and data may be destroyed.
In sum, because the encrypted file system based on the EXT2 file system of the present invention has increased file system digital certificate, cipher key index node bitmap and cipher key index node table on the basis of EXT2 file system, adopt file provided by the invention and encrypted directory and decryption method to be encrypted or to decipher file or catalogue, improved the fail safe of EXT2 file system.

Claims (10)

1. encrypted file system based on the EXT2 file system, it comprises a plurality of groups, and each piece group comprises the memory space that following data are corresponding: superblock, piece group description list, bitmap block, file and directory index node bitmap, file and directory index node table and a plurality of data block; Organize for described and have a plurality of group description lists in memory space corresponding to description list;
It is characterized in that, described group further comprises cipher key index node bitmap and memory space corresponding to cipher key index node table that is positioned at after file and the directory index node table, further has the file system digital certificate in memory space corresponding to described group description list.
2. the encrypted file system based on the EXT2 file system according to claim 1, it is characterized in that, further comprise " encryption indicator " and " cipher key index numbering " data item in described file or the directory index node list item, whether " encryption indicator " expression file or catalogue encrypt, if encrypt, can find according to the value of " cipher key index node serial number " to have file or catalogue deciphering relevant information in corresponding " cipher key index node list item ", " the cipher key index node list item ".
3. the encrypted file system based on the EXT2 file system according to claim 1 is characterized in that, the operating position that cipher key index node bitmap is used for management, follows the tracks of the cipher key index node table.
4. the encrypted file system based on the EXT2 file system according to claim 1, it is characterized in that, described cipher key index node table is comprised of cipher key index node table item array, and each cipher key index node list item is comprised of plaintext summary, reservation position (filling zero), the random number filler of magic number, version number, AES pattern, digest algorithm pattern, AES key, AES initial vector, encrypted content.
5. encryption method based on the EXT2 file system is characterized in that comprising:
Step S11: first according to AES key and AES initial vector create-rule algorithm, generate AES key and AES initial vector;
Step S12: according to user's configuration excerpt algorithm pattern, the summary of calculation document or directory content;
Step S13: dispose the AES pattern according to AES key, AES initial vector, user, encrypt file or catalogue;
Step S14: the information combination of the plaintext of magic number, version number, AES pattern, digest algorithm pattern, AES key, AES initial vector, encrypted content summary is become expressly " cipher key index node list item ";
Step S15: from the file system memory device, read " file system digital certificate " in internal memory, the validity of checking " file system digital certificate "; If " file system digital certificate " is effective, then extract the public key information in " file system digital certificate ";
Step S16: the plaintext of step S14 " cipher key index node list item " is encrypted to ciphertext " cipher key index node list item " with PKI in the RSA cryptographic algorithms mode;
Step S17: according to a free time of " cipher key index node bitmap " information searching " cipher key index node list item ", obtain corresponding " cipher key index numbering " information;
Step S18: upgrade the data of " encryption indicator " and " cipher key index node serial number " in " file or directory index node list item ", according to " cipher key index node serial number " ciphertext in the internal memory " cipher key index node list item " is write in the file system memory device.
6. the encryption method based on the EXT2 file system according to claim 5 is characterized in that, among the step S11, the value that the beginning of 128 keys of AES is 8 is 0x53, and rear 120 are passed through the generation of random number module; The value that the beginning of 128 initial vectors of AES is 8 is 0x4D, and rear 120 are passed through the generation of random number module.
7. the encryption method based on the EXT2 file system according to claim 5 is characterized in that, among the step S12, user's configuration excerpt algorithm pattern adopts SHA1 or SHA256.
8. the encryption method based on the EXT2 file system according to claim 5 is characterized in that, among the step S13, is electronic codebook mode (ECB) pattern when the user disposes the AES pattern, with AES key file or catalogue is blocked into 128 bit data and encrypts respectively; Be password packet train (CBC) pattern when the user disposes the AES pattern, with AES key, AES initial vector file or catalogue be blocked into 128 bit data and encrypt in the packet train mode.
9. decryption method based on the EXT2 file system is characterized in that comprising:
Step S21: the data according to " encryption indicator " and " cipher key index node serial number " in the access " file or directory index node list item ", read corresponding ciphertext " cipher key index node list item " data in internal memory;
Step S22, the ciphertext in the internal memory " cipher key index node list item " data are decrypted into expressly " cipher key index node list item " with private key in RSA decipherment algorithm mode;
Step S23, according to AES key, AES initial vector, AES pattern information declassified document or catalogue in expressly " cipher key index node list item ".
10. the decryption method based on the EXT2 file system according to claim 9 is characterized in that, further comprises:
Step S24: according to digest algorithm type in the plaintext " cipher key index node list item ", recomputate the file of the rear plaintext of deciphering or the summary of catalogue;
Step S25: whether the summary that recalculates among the comparison step S24 is consistent with the digest value in the plaintext " cipher key index node list item ", if comparative result is consistent, illustrate that then decrypting process is correct, if comparative result is inconsistent, the failure of declassified document or directory process then is described, prompting is unusual.
CN201210543698.2A 2012-12-14 2012-12-14 encrypting method based on EXT2 file system Expired - Fee Related CN103067170B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210543698.2A CN103067170B (en) 2012-12-14 2012-12-14 encrypting method based on EXT2 file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210543698.2A CN103067170B (en) 2012-12-14 2012-12-14 encrypting method based on EXT2 file system

Publications (2)

Publication Number Publication Date
CN103067170A true CN103067170A (en) 2013-04-24
CN103067170B CN103067170B (en) 2015-04-15

Family

ID=48109641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210543698.2A Expired - Fee Related CN103067170B (en) 2012-12-14 2012-12-14 encrypting method based on EXT2 file system

Country Status (1)

Country Link
CN (1) CN103067170B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761487A (en) * 2014-01-27 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Hiding method and device of files
CN103955654A (en) * 2014-04-02 2014-07-30 西北工业大学 USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN105183401A (en) * 2015-10-30 2015-12-23 深圳市泽云科技有限公司 Method, device and system for recovering data in solid state disk
TWI554073B (en) * 2014-07-28 2016-10-11 柯呈翰 A multiple encrypting method and system for encrypting a file and/or a protocol
CN106021466A (en) * 2016-05-17 2016-10-12 浙江大华技术股份有限公司 Data storage method and apparatus
CN106156639A (en) * 2016-06-28 2016-11-23 北京小米移动软件有限公司 Data partition encryption method and device
CN106709380A (en) * 2015-07-20 2017-05-24 中国科学院声学研究所 Encryption and decryption method and system capable of aiming at disk data memory area
CN108228647A (en) * 2016-12-21 2018-06-29 伊姆西Ip控股有限责任公司 For the method and apparatus of data copy
CN109274663A (en) * 2018-09-07 2019-01-25 西安莫贝克半导体科技有限公司 Communication means based on SM2 dynamic key exchange and SM4 data encryption
CN109657497A (en) * 2018-12-21 2019-04-19 北京思源互联科技有限公司 Secure file system and its method
CN110557680A (en) * 2019-07-30 2019-12-10 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN112106323A (en) * 2018-07-12 2020-12-18 塞克罗斯股份有限公司 Method for establishing a secure hierarchical reference system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020069324A1 (en) * 1999-12-07 2002-06-06 Gerasimov Dennis V. Scalable storage architecture
CN101159556A (en) * 2007-11-09 2008-04-09 清华大学 Group key server based key management method in sharing encryption file system
CN101247506A (en) * 2007-02-14 2008-08-20 中国科学院声学研究所 File enciphering method and enciphered file structure in digital media broadcasting system
CN102129532A (en) * 2011-03-23 2011-07-20 阮晓迅 Method and system for digital copyright protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020069324A1 (en) * 1999-12-07 2002-06-06 Gerasimov Dennis V. Scalable storage architecture
CN101247506A (en) * 2007-02-14 2008-08-20 中国科学院声学研究所 File enciphering method and enciphered file structure in digital media broadcasting system
CN101159556A (en) * 2007-11-09 2008-04-09 清华大学 Group key server based key management method in sharing encryption file system
CN102129532A (en) * 2011-03-23 2011-07-20 阮晓迅 Method and system for digital copyright protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
易飞: "基于滚动加密在Linux文件系统下的安全存储技术", 《中国优秀硕士学位论文全文数据库》, 15 October 2010 (2010-10-15) *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761487A (en) * 2014-01-27 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Hiding method and device of files
CN103761487B (en) * 2014-01-27 2017-03-15 宇龙计算机通信科技(深圳)有限公司 The hidden method and device of file
CN103955654A (en) * 2014-04-02 2014-07-30 西北工业大学 USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
TWI554073B (en) * 2014-07-28 2016-10-11 柯呈翰 A multiple encrypting method and system for encrypting a file and/or a protocol
CN106709380A (en) * 2015-07-20 2017-05-24 中国科学院声学研究所 Encryption and decryption method and system capable of aiming at disk data memory area
CN105183401A (en) * 2015-10-30 2015-12-23 深圳市泽云科技有限公司 Method, device and system for recovering data in solid state disk
CN106021466A (en) * 2016-05-17 2016-10-12 浙江大华技术股份有限公司 Data storage method and apparatus
CN106156639A (en) * 2016-06-28 2016-11-23 北京小米移动软件有限公司 Data partition encryption method and device
CN108228647A (en) * 2016-12-21 2018-06-29 伊姆西Ip控股有限责任公司 For the method and apparatus of data copy
CN112106323A (en) * 2018-07-12 2020-12-18 塞克罗斯股份有限公司 Method for establishing a secure hierarchical reference system
CN112106323B (en) * 2018-07-12 2024-03-22 塞克罗斯股份有限公司 Method for storing and reading data on a storage device in an untrusted environment
CN109274663A (en) * 2018-09-07 2019-01-25 西安莫贝克半导体科技有限公司 Communication means based on SM2 dynamic key exchange and SM4 data encryption
CN109657497A (en) * 2018-12-21 2019-04-19 北京思源互联科技有限公司 Secure file system and its method
CN109657497B (en) * 2018-12-21 2023-06-13 北京思源理想控股集团有限公司 Secure file system and method thereof
CN110557680A (en) * 2019-07-30 2019-12-10 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN110557680B (en) * 2019-07-30 2020-11-27 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system

Also Published As

Publication number Publication date
CN103067170B (en) 2015-04-15

Similar Documents

Publication Publication Date Title
CN103067170B (en) encrypting method based on EXT2 file system
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN201181472Y (en) Hardware key device and movable memory system
CN101149768B (en) Special processor software encryption and decryption method
CN103701757B (en) Identity authentication method and system for service access
CN112560058B (en) SSD partition encryption storage system based on intelligent password key and implementation method thereof
US20100005318A1 (en) Process for securing data in a storage unit
CN110490008B (en) Security device and security chip
CN102355352B (en) Data confidentiality and integrity protection method
CN103003824A (en) Storage device and method for providing a partially-encrypted content file to a host device
CN103748827A (en) System and method for wireless data protection
CN102236756A (en) File encryption method based on TCM (trusted cryptography module) and USBkey
WO2010057423A1 (en) Encryption and decryption method and system for ic card and the reader device
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN103544453A (en) USB (universal serial bus) KEY based virtual desktop file protection method and device
CN104901810A (en) Data encryption storage method based on domestic cryptographic algorithm
CN103198264A (en) Method and device for recovering encrypted file system data
CN102811124B (en) Based on the system Authentication method of two card trigram technology
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
CN107911221B (en) Key management method for secure storage of solid-state disk data
CN102612025A (en) Protective system and protective method for mobile phone documents
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
JP5296220B2 (en) Signature data server and user terminal
CN101539890A (en) Data processing system, cryptogram management method and data reading and writing method
CN202600714U (en) Embedded terminal based on SD (Secure Digital) trusted computing module

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 518000 Guangdong Province Shenzhen Nanshan District High-tech Industrial Park South District High-tech Nandao National Micro-R&D Building 1 Floor West Part, 2 Floors

Patentee after: GUOWEI GROUP (SHENZHEN) Co.,Ltd.

Address before: 518000 2F, Shenzhen new high tech Industrial Park, Guangdong, China.

Patentee before: SHENZHEN STATE MICRO TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150415

Termination date: 20211214

CF01 Termination of patent right due to non-payment of annual fee