CN103761067A - Processing system and processing method for encryption/decryption of data files - Google Patents

Processing system and processing method for encryption/decryption of data files Download PDF

Info

Publication number
CN103761067A
CN103761067A CN201310682224.0A CN201310682224A CN103761067A CN 103761067 A CN103761067 A CN 103761067A CN 201310682224 A CN201310682224 A CN 201310682224A CN 103761067 A CN103761067 A CN 103761067A
Authority
CN
China
Prior art keywords
file
behalf
module
encrypt
clear text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310682224.0A
Other languages
Chinese (zh)
Inventor
林明政
王博生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunshan Wuchang New Precision Electronic Industry Co Ltd
Original Assignee
Kunshan Wuchang New Precision Electronic Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunshan Wuchang New Precision Electronic Industry Co Ltd filed Critical Kunshan Wuchang New Precision Electronic Industry Co Ltd
Priority to CN201310682224.0A priority Critical patent/CN103761067A/en
Publication of CN103761067A publication Critical patent/CN103761067A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a processing system and a processing method for encryption/decryption of data files. The processing system for encryption/decryption of data files comprises an external device and a host. The host comprises a communication port, a processing unit, a storage unit and a proxy module. The processing unit is coupled with the communication port and the storage unit. The communication port is connected to the external device, the storage unit is used for saving an operating system, and divided into encryption cells, a plurality of encrypted files are stored in the encryption cells, and the processing unit is used for realizing the execution of the operating system and the proxy module, and wherein the proxy module determine whether or not to mount the encryption cells after verifying and identifying information; when the encryption cells are mounted to the operating system, the proxy module encrypts plaintext files written in the encryption cells into encrypted files, or any encrypted file is picked up from the encryption cells, and the proxy module decrypts the encrypted file and outputs the plaintext file.

Description

The disposal system of the enciphering/deciphering of data file and its method
Technical field
The present invention relates to the System and method for of data enciphering/deciphering, be particularly to a kind of disposal system and its method of enciphering/deciphering of data file.
Background technology
Along with popularizing of computing machine, also drive the quick transmission of information.Because user there is no and protects the access of data file, therefore intentionally personage can see through dishonest method and obtain data file.Although can see through the security that the formality of password or encryption improves access of data files.In the access of carrying out data file, also will click in addition or carry out other programs, such operation is extra burden for user.And the length of password also can affect user's use habit.Too much or long Password Length can cause user memory on not convenient.
Although data file can see through aforesaid mode and protect, the equipment of store data file itself is without corresponding protection.Therefore intentionally personage can see through illegal mode and directly from storage facilities, obtain data file.For example: from object computer, pull out hard disc, hard disc is mounted to other computing machines.So also needing protection of storage facilities itself.
Summary of the invention
The present invention relates to the disposal system that technical matters to be solved is to provide a kind of data file enciphering/deciphering, it is characterized in that data file is during access procedure, to the encryption of data file or decryption processing.
The disposal system that the present invention relates to comprises that host side comprises PORT COM, processing unit, storage element and acts on behalf of module, processing unit couples PORT COM and storage element, PORT COM is connected in external equipment, storage unit stores operating system, in storage element, divide encrypted partition, in encrypted partition, store complex encrypt file, processing unit is carried out operating system and is acted on behalf of module.Wherein, act on behalf of and whether determine carry encrypted partition after module checking identification information, when encrypted partition is by carry during in operating system, act on behalf of module the clear text file that writes encrypted partition is encrypted as to encrypt file, or from encrypted partition, obtain arbitrary encrypt file, act on behalf of module encrypt file is decrypted and exports clear text file.
In order to address the above problem, the present invention relates to the disposal route that has disclosed a kind of data file enciphering/deciphering, it is characterized in that data file is during access procedure, to the encryption of data file or decryption processing.Disposal route of the present invention comprises the following steps: external equipment is connected to host side; When the identification information of acting on behalf of module confirmation external equipment of host side, the operating system carry encrypted partition of host side; Act on behalf of module the clear text file that writes encrypted partition is encrypted as to encrypt file; From encrypted partition, obtain arbitrary encrypt file, act on behalf of module encrypt file is decrypted and exports clear text file.
In addition, the present invention relates to the disposal route of a kind of data file enciphering/deciphering of another proposition, comprises the following steps: external equipment is connected to host side; The module of acting on behalf of that judges host side confirms whether the identification information of external equipment is legal; If when identification information is not connected in host side for illegal or external equipment, act on behalf of module to forbid the access of encrypt file in encryption menu; When identification information is legal, the access kind of judgement to encryption menu; If clear text file is write to encryption menu, act on behalf of module clear text file is encrypted, and be output as encrypt file; If read encrypt file from encryption menu, act on behalf of module encrypt file is decrypted to processing, and be output as clear text file.
Compared with prior art, the present invention can obtain and comprise following technique effect:
The disposal system of data file enciphering/deciphering of the present invention and its method provide the alignment processing of encrypting or deciphering in the access procedure of carrying out data file.And host side can be according to the correctness of external equipment, and then determine whether to start described encryption and decryption and process.Therefore, only have user that correct external equipment is connected in to host side, user could carry out access to data file.
Certainly, implement arbitrary product of the present invention and must not necessarily need to reach above-described all technique effects simultaneously.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms a part of the present invention, and schematic description and description of the present invention is used for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the method flow diagram of the embodiment of the present invention;
Fig. 2 is the schematic diagram of the first application example of the embodiment of the present invention;
Fig. 3 is the schematic diagram of the second use example of the embodiment of the present invention;
Fig. 4 is the schematic diagram of the 3rd use example of the embodiment of the present invention;
Fig. 5 is the structure drawing of device of the embodiment of the present invention;
Fig. 6 is the Organization Chart of another enforcement aspect of the present invention;
Fig. 7 is the operation workflow figure of another enforcement aspect of the present invention.
Embodiment
Below coordinate drawings and Examples to describe embodiments of the present invention in detail, whereby the present invention's implementation procedure how application technology means solve technical matters and reach technology effect can be fully understood and be implemented according to this.
Please refer to shown in Fig. 1, it is configuration diagram of the present invention.The disposal system of data file enciphering/deciphering of the present invention comprises external equipment 110 and host side 120.
External equipment 110 store identification information;
Host side 120 comprises PORT COM 121, processing unit 122, storage element 123 and acts on behalf of module 124, processing unit 122 couples PORT COM 121 and storage element 123, PORT COM 121 is connected in external equipment 110, storage element 123 storage operation systems 210, in storage element 123, divide encrypted partition 1231, in encrypted partition 1231, store complex encrypt file 221, processing unit 122 is carried out operating system 210 and is acted on behalf of module 124;
Wherein, act on behalf of and whether determine carry encrypted partition 1231 after module 124 checking identification information, when encrypted partition 1231 is by carry during in operating system 210, act on behalf of the clear text file 222 that module 124 writes encrypted partition 1231 and be encrypted as encrypt file 221, or from encrypted partition, 1231 obtain arbitrary encrypt file 221, act on behalf of 124 pairs of modules encrypt file 221 be decrypted and export clear text file 222.
External equipment 110 can see through PORT COM 121 and be connected in host side 120.PORT COM 121 of the present invention, except the interface that entity connects, can be also the interface of wireless connections (wireless).Described entity interface can be but not be defined as: universal serial bus (universal serial bus is called for short USB), live wire (Fire wire, or title IEEE1394) or SATA(Serial Advanced Technology Attachment).And radio interface may be: bluetooth wireless transmission protocol, Wi-Fi agreement, ZigBee, radio frequency identification (Radio Frequency Identification, be called for short RFID) or near-field communication agreement (Near Field Communication is called for short NFC).
External equipment 110 store identification information 111.Identification information 111 can be to set during by manufacturers produce, also can be set voluntarily by user.User can, when installation agent module 124, also set identification information 111 simultaneously.
Host side 120 of the present invention can be but not be defined as PC, notebook computer or servomechanism, also can be used in action electronic device.Described action electronic device is for example personal digital assistant (Personal Digital Assistant), mobile phone (mobile phone) or panel computer (Tablet).Using PC for convenience of description in the present invention as explanation, can be according to the contained content application of instructions among described electronic installation for this area person.
Processing unit 122 is electrically connected at PORT COM 121, storage element 123.The connecting interface of external equipment 110 is corresponding to the kind of PORT COM 121.Processing unit 122 can see through PORT COM 121 and receive the stored identification information 111 of external equipment 110.Act on behalf of module 124 except can being realized by software, the mode that also can see through hardware realizes.The mode that software is realized: act on behalf of module 124 and can be embedded in operating system 210(Operation System) in, and also related execution when operating system 210 starts.The mode that hardware is realized: act on behalf of module 124 can in be built among the board or certain memory body of host side 120, make the operating system 210 can be according to described position, also agents module 124 in initiating task system 210.
In storage element 123 of the present invention, at least mark off an encrypted partition 1231(encrypt partition), the magnetic disc space outside encrypted partition 1231 (Disk space) is defined as normal subregion 1232.Generally speaking, act on behalf of module 124 and can to magnetic disc space, carry out the management of subregion (partition) through magnetic region supervisory routine.Aforesaid operating system 210 is stored among normal subregion 1232.Encrypted partition 1231 is in order to store encrypt file 221(encryption file).In the present invention, through the data file of encrypting, be not referred to as clear text file 222(plaintext file).Data file after encrypting is defined as encrypt file 221(encrypt file).For clearly demonstrating the present invention in the process of installation and use, therefore two processes are respectively at below listing.Please refer to shown in Fig. 2, it is installation procedure schematic diagram of the present invention.Installation procedure of the present invention comprises the following steps:
Step S210: installation agent module in host side;
Step S220: act on behalf of module and divide encrypted partition in host side;
Step S230: user is connected to host side external equipment; And
Step S240: act on behalf of module the use of external equipment identification information is logined to acting on behalf of in module.
First, acting on behalf of module 124, be mounted in host side 120.Act on behalf of module 124 selects existing subregion or new subregion to come as encrypted partition 1231 from magnetic disc according to user.Then, acting on behalf of module 124 can require user that external equipment 110 is connected to host side 120.And the mode connecting can connect with entity or wireless mode as mentioned before.When first connection external equipment 110, act on behalf of the identification information 111 that module 124 can record this external equipment 110, whether the external equipment 110 connecting in order to identification has been recorded among host side 120.After completing said procedure, act on behalf of module 124 and can whether also be connected in the situation of host side 120 and then the visual attribute of decision encrypted partition 1231 according to external equipment 110.If external equipment 110 interrupts linking with host side 120, acting on behalf of module 124 can be set as encrypted partition 1231 to hide.
After completing the program of installation, then please refer to shown in Fig. 3, it is operation workflow schematic diagram of the present invention.The present invention processes and comprises the following steps for the encryption and decryption of data file:
Step S310: act on behalf of module continue detecting external equipment whether with host side in connection breaking;
Step S320: if external equipment is connected in host side, acts on behalf of module and confirm that whether the identification information of external equipment is legal;
Step S330: if identification information is legal, acts on behalf of module and drive operating system carry encrypted partition;
Step S340: act on behalf of module according to operational order, encrypted partition is carried out to the access of data file; And
Step S350: if connection breaking or while being illegal in external equipment is acted on behalf of module and encrypted partition is made as hiding, or end the associative operation to the encrypt file of encrypted partition now.
First, user is connected in host side 120 external equipment 110.Act on behalf of module 124 and identify except meeting whether external equipment 110 is legal, act on behalf of module 124 and also can receive the operational order 310 that user assigns.Address in the preceding article, act on behalf of module 124 and can record corresponding external equipment 110.Therefore, act on behalf of in module 124 unwritten external equipment 110 and can be regarded as illegally, it is legal for the external equipment 110 that has record, can be regarded as.If the external equipment connecting 110 is illegal, act on behalf of the hiding setting that module 124 can not removed encrypted partition 1231.
If legal external equipment 110, acts on behalf of module 124 and encrypted partition 1231 can be switched to visual state from hiding state.Thus, user can see by the encrypted partition 1231 of carry from operating system 210.Act on behalf of module 124 and can whether be connected in host side 120 by lasting monitoring external equipment 110.If user removes external equipment 110 midway, act on behalf of module 124 can be at once encrypted partition 1231 is unloaded and is stopped existing to the associative operation of encrypt file 221.Or illegal external equipment 110 is connected to host side 120, acts on behalf of module 124 and can not carry out any processing to hiding encrypted partition 1231.
The present invention more proposes following protected mode for the operational order 310 of encrypt file 221.And can divide into for described operational order 310: write operation instruction, read operation instruction, executable operations instruction or deletion action instruction.Please refer to shown in Fig. 4 A its operation workflow figure that is operational order of the present invention.Operations instruction 310 of the present invention comprises the following steps:
Step S341: if operational order is write operation, acts on behalf of module the clear text file that writes encrypted partition is encrypted as to encrypt file;
Step S342: act on behalf of module encrypt file is added to recognition feature;
Step S343: if operational order is read operation, obtain arbitrary encrypt file from encrypted partition, act on behalf of module encrypt file is removed to identification information, then encrypt file is decrypted; And
Step S344: if operational order is executable operations, acts on behalf of module encrypt file is removed to identification information, then encrypt file is decrypted, according to the kind of clear text file, and call corresponding application program in order to carry out clear text file by operating system.
Please coordinate Fig. 4 B, what it was recognition feature of the present invention adds schematic diagram.When carrying out write operation, acting on behalf of module 124 can be encrypted clear text file 222, and exports encrypt file 221.For instance, act on behalf of the clear text file 222 that 124 pairs of names of module are called " Image_0001_.JPG " and be encrypted, and output name is called the encrypt file 221 of " encry_file_001 ".Then, act on behalf of module 124 to adding one group of recognition feature 410 in the encrypt file 221 of " encry_file_001 ".Because clear text file 222 can crested in data file information after encryption.For allowing user can select corresponding encrypt file 221 from data file menu, so meeting of the present invention is more adding recognition feature 410 in encrypt file 221.Except can, to adding recognition feature 410 in the title of encrypt file 221, also can adding recognition feature 410 in encrypt file 221.
Wherein, the kind that described enciphering/deciphering is processed can be but not be defined as Triple DES(Triple Data Encryption Standard), Blowfish, IDEA, RC4, RC5, RC6, RSA, ECC, Diffie-Hellman, El Gamal or AES(Advanced Encryption Standard).Generally speaking, act on behalf of module 124 and can determine corresponding enciphering/deciphering processing according to the arithmetic capability of host side 120.
Accept example, Agent can be added to the encrypt file 221 of " encry_file_001 " recognition feature 410 of attachment " .jpg " by name.So, through aforesaid encryption with add after recognition feature 410,221 of encrypt files are " encry_file_001.jpg ".Or Agent also can add recognition feature 410 in the gauge outfit (head) of the encrypt file 221 of " encry_file_001 ".
Write operation relatively, the present invention also has corresponding processing mode for read operation.When acting on behalf of module 124 and obtain the operation of reading encrypt file 221, act on behalf of module 124 and can be first the recognition feature 410 in encrypt file 221 be removed.Then, act on behalf of the processing that encrypt file 221 that 124 pairs of modules have removed recognition feature 410 is decrypted again.Accept above-mentioned example, act on behalf of the recognition feature 410 that encrypt file 221 that 124 pairs of names of module are called " encry_file_001.jpg " first removes " .jpg ".Then, act on behalf of the processing that module 124 can be decrypted the encrypt file 221 of " encry_file_001 ", and the clear text file 222 of output " Image_0001_.JPG ".
In addition,, when acting on behalf of module 124 and receive the operational order 310 to encrypt file 221, act on behalf of module 124 and can carry out following processing to selected encrypt file 221.Acting on behalf of 124 pairs of selected encrypt files 221 of module removes recognition feature 410 and is decrypted.Then, by operating system 210, according to the kind of clear text file 222, call corresponding application program 231, and open clear text file 222 by application program 231.This still previous example as explanation, suppose that user selects name to be called the encrypt file 221 of " encry_file_001.jpg " from encrypted partition 1231.Act on behalf of module 124 handles to the processing that encrypt file 221 removes recognition feature 410 and is decrypted, and the clear text file 222 of output " Image_0001_.JPG ".Then, act on behalf of module 124 and to operating system 210, send the requirement of unlatching " Image_0001_.JPG ".Operating system 210 is called corresponding application program 231 according to the kind of clear text file 222.Clear text file 222 is image data file in the present example, so operating system 210 can be called relevant image software and carries out the processing of turn-on data file.
During unlatching clear text file 222, if external equipment 110 interrupts and the line of host side 120, the relevant treatment that Agent can be encrypted the clear text file 222 in now just processing.Agent restores to encrypt file 221 in encrypted partition 1231 again.And deposit after encrypt file 221 in completing back, Agent is set as hiding state encrypted partition 1231.
The present invention, except being applied in host side 120, also can be applied in the storage facilities of far-end.Far-end magnetic disc can see through networking and be connected in host side 120.Because the line of 120 of far-end magnetic disc and host side exists the situation that continues line, so the present invention proposes the another kind of guard method for far-end magnetic disc.Please refer to shown in Fig. 5, it is that another kind of the present invention is for the operation workflow figure of the guard method of far-end magnetic disc.
Step S510: act on behalf of module continue detecting external equipment whether with host side in connection breaking;
Step S520: if external equipment is connected in host side, acts on behalf of module and confirm that whether the identification information of external equipment is legal;
Step S530: if identification information is legal, acts on behalf of module and drive operating system carry encrypted partition;
Step S540: whether sensing far-end magnetic disc is connected in host side;
Step S550: if far-end magnetic disc is not connected in host side, act on behalf of module according to operational order, encrypted partition is carried out to the access of data file;
Step S560: if far-end magnetic disc is connected in host side, act on behalf of module according to operational order, encrypted partition is carried out to the access of data file, and selected encrypt file is copied to far-end magnetic disc from encrypted partition; And
Step S570: if connection breaking or while being illegal in external equipment is acted on behalf of module and encrypted partition is made as hiding, or end the associative operation to the encrypt file of encrypted partition now.
In the present embodiment, act on behalf of module 124 and can whether be connected in host side 120 by other sensing far-end magnetic disc 610.When far-end magnetic disc 610 is not connected in host side 120, acts on behalf of module 124 and can clear text file 222 be processed and is stored in encrypted partition 1231 according to aforesaid mode.When if far-end magnetic disc 610 is connected in host side 120, act on behalf of the encrypt file 221 that module 124 can select according to user from encrypted partition 1231 and carry out aforesaid associative operation instruction 310, and the encrypt file 221 of complete operation is copied to portion in far-end magnetic disc 610.If far-end magnetic disc 610 occur to interrupt line in during operation, host side 120 is understood encrypt file 221 is first stored in encrypted partition 1231.
Except aforesaid enforcement aspect, the present invention also can be applied among encryption menu (folder).Please refer to shown in Fig. 6 and Fig. 7 its Organization Chart that is another aspect of the present invention and operation workflow figure.This enforcement aspect comprises external equipment 110 and host side 120.Host side 120 comprises PORT COM 121, processing unit 122, storage element 123 and acts on behalf of module 124.Processing unit 122 is electrically connected at PORT COM 121, storage element 123 and acts on behalf of module 124.In this enforcement aspect, storage element 123 can be stored clear text file 222, encrypt file 221 and encryption menu 240.In this enforcement aspect, for storing the catalogue of encrypt file 221, be defined as encryption menu 240.For encryption menu 240 and the associative operation of encrypt file 221, comprise the following steps:
Step S710: external equipment is connected to host side;
Step S720: the module of acting on behalf of that judges host side confirms whether the identification information of external equipment is legal;
Step S730: if when identification information is not connected in host side for illegal or external equipment, act on behalf of module forbid in encryption menu encrypt file be decrypted;
Step S740: when identification information is legal, the access kind of judgement to encryption menu;
Step S750: if clear text file is write to encryption menu, act on behalf of module clear text file is encrypted, and be output as encrypt file; And
Step S760: if read encrypt file from encryption menu, act on behalf of module encrypt file is decrypted to processing, and be output as clear text file.
First, external equipment 110 is connected in to host side 120.Module 124 meetings of acting on behalf of in host side 120 confirm whether the identification information 111 of external equipment 110 is legal.When if identification information 111 is legal, acts on behalf of module 124 and can lasting monitoring user whether to depositing the encryption menu 240 of encrypt file 221, carry out access.When user is when depositing that the encryption menu 240 of encrypt file 221 has carried out access, act on behalf of the operation species that module 124 can see through 210 pairs of accesses of operating system and monitor.Acting on behalf of module 124 can judge whether user is stored to clear text file 222 in encryption menu 240, or from encryption menu 240, reads encrypt file 221.
When user writes to encryption menu 240 clear text file 222, act on behalf of module 124 clear text file 222 and be encrypted and be output into encrypt file 221 to encryption menu 240.If user wants to read any encrypt file 221 from encryption menu 240, acting on behalf of module 124 can be decrypted selected encrypt file 221 to process and be output as corresponding clear text file 222, and is stored among the position that user determines.If user's wish is carried out the encrypt file 221 in encryption menu 240, act on behalf of module 124 and can be decrypted processing to selected encrypt file 221, and by operating system 210, call corresponding application program 231 and open the raw data file after deciphering.
In the process of access of data files, external equipment 110 disconnections are connected with host side 120, act on behalf of module 124 and process for completing existing enciphering/deciphering.Then, acting on behalf of module 124 can the access of the person of banning use of to the encrypt file 221 of encryption menu 240.In like manner, if when identification information 111 is illegal, acting on behalf of module 124 also can the access of the person of banning use of to any encrypt file 221 in encryption menu 240.
The disposal system of data file enciphering/deciphering of the present invention and its method provide the alignment processing of encrypting or deciphering in the access procedure of carrying out data file.And host side 120 is understood according to the correctness of external equipment 110, and then determine whether start described encryption and decryption processing.Therefore, only have user that correct external equipment 110 is connected in to host side 120, user could carry out access to data file.
Described device is corresponding with aforesaid method flow description, and weak point, with reference to the narration of said method flow process, repeats no longer one by one.
Above-mentioned explanation illustrates and has described some preferred embodiments of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to disclosed form herein, should not regard the eliminating to other embodiment as, and can be used for various other combinations, modification and environment, and can, in invention contemplated scope described herein, by technology or the knowledge of above-mentioned instruction or association area, change.And the change that those skilled in the art carry out and variation do not depart from the spirit and scope of the present invention, all should be in the protection domain of claims of the present invention.

Claims (10)

1. a disposal system for data file enciphering/deciphering, is characterized in that data file is during access procedure, and to the encryption of data file or decryption processing, this disposal system comprises:
One external equipment, stores an identification information; And
One host side, it comprises that a PORT COM, a processing unit, a storage element and act on behalf of module, this processing unit couples this PORT COM and this storage element, this PORT COM is connected in this external equipment, this storage unit stores one operating system, in this storage element, divide an encrypted partition, store complex encrypt file in this encrypted partition, this processing unit is carried out this operating system and this acts on behalf of module;
Wherein, this is acted on behalf of module and verifies and whether determine this encrypted partition of carry after this identification information, when this encrypted partition is by carry during in this operating system, this is acted on behalf of module a clear text file that writes this encrypted partition is encrypted as to this encrypt file, or from this encrypted partition, obtain arbitrary this encrypt file, this act on behalf of module to this encrypt file be decrypted and export this clear text file.
2. the disposal system of data file enciphering/deciphering as claimed in claim 1, is characterized in that: described storage element is the another normal subregion of dividing outside this encrypted partition, and this normal subregion stores this operating system and those clear text file.
3. the disposal system of data file enciphering/deciphering as claimed in claim 1, it is characterized in that: after described clear text file is encrypted, this is acted on behalf of module one recognition feature is added to this encrypt file, and before to this, encrypt file has been decrypted, this is acted on behalf of module and removes this this recognition feature in encrypt file.
4. the disposal system of data file enciphering/deciphering as claimed in claim 1, is characterized in that: described operating system is according to an application program corresponding to the type call of this output data file and carry out this output data file by this application program.
5. the disposal system of data file enciphering/deciphering as claimed in claim 1, it is characterized in that: described disposal system further comprises a far-end magnetic disc, this host side is connected in this far-end magnetic disc, this act on behalf of module selected this encrypt file be replicated in this far-end magnetic disc.
6. a disposal route for data file enciphering/deciphering, is characterized in that: a data file is during access procedure, and to the encryption of this data file or decryption processing, this disposal route comprises:
One external equipment is connected to a host side;
When one of this host side is acted on behalf of identification information, operating system carry one encrypted partition of this host side that module is confirmed this external equipment;
This is acted on behalf of module a clear text file that writes this encrypted partition is encrypted as to this encrypt file;
From this encrypted partition, obtain arbitrary this encrypt file, this act on behalf of module to this encrypt file be decrypted and export this clear text file; And
When this host side is not correctly identified this identification information, this is acted on behalf of module and stops identification and again detect having or not other this external equipments accesses.
7. the disposal route of data file enciphering/deciphering as claimed in claim 1, is characterized in that after the step of encrypt file, more comprising described clear text file being encrypted as to this: described act on behalf of module to this encrypt file add a recognition feature.
8. the disposal route of data file enciphering/deciphering as claimed in claim 1, is characterized in that more comprising before to this step that encrypt file deciphering has been this clear text file: described act on behalf of module to this encrypt file remove this identification information.
9. the disposal route of data file enciphering/deciphering as claimed in claim 1, is characterized in that when this, acting on behalf of module receives this operational order of encrypt file, and this is acted on behalf of module and carries out following steps:
This identification information of encrypt file described in removing;
To this encrypt file be decrypted, and export this clear text file;
Call out this operating system; And
By this operating system, according to the kind of this clear text file, and call a corresponding application program in order to carry out this clear text file.
10. a disposal route for data file enciphering/deciphering, is characterized in that comprising the following steps:
One external equipment is connected to a host side;
Judge one of this host side act on behalf of module confirm this external equipment one identification information whether be legal;
When if this identification information is not connected in this host side for illegal or this external equipment, this act on behalf of module forbid in an encryption menu one encrypt file be decrypted;
When this identification information is legal, the access kind of judgement to this encryption menu;
If a clear text file is write to this encryption menu, this is acted on behalf of module this clear text file is encrypted, and is output as this encrypt file; And
If read this encrypt file from this encryption menu, this act on behalf of module this encrypt file be decrypted processing, and be output as this clear text file.
CN201310682224.0A 2013-12-13 2013-12-13 Processing system and processing method for encryption/decryption of data files Pending CN103761067A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310682224.0A CN103761067A (en) 2013-12-13 2013-12-13 Processing system and processing method for encryption/decryption of data files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310682224.0A CN103761067A (en) 2013-12-13 2013-12-13 Processing system and processing method for encryption/decryption of data files

Publications (1)

Publication Number Publication Date
CN103761067A true CN103761067A (en) 2014-04-30

Family

ID=50528312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310682224.0A Pending CN103761067A (en) 2013-12-13 2013-12-13 Processing system and processing method for encryption/decryption of data files

Country Status (1)

Country Link
CN (1) CN103761067A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182692A (en) * 2014-09-04 2014-12-03 昆山五昌新精密电子工业有限公司 File encryption/decryption wireless processing system and method
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
CN109190385A (en) * 2018-07-27 2019-01-11 广东九联科技股份有限公司 A kind of file encrypting method of law-enforcing recorder

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725196A (en) * 2005-06-06 2006-01-25 付爱香 Enciphered protection and read write control method for computer data
CN1776563A (en) * 2005-12-19 2006-05-24 清华紫光股份有限公司 File encrypting device based on USB interface
CN1928881A (en) * 2006-09-26 2007-03-14 南京擎天科技有限公司 Computer data security protective method
CN101258507A (en) * 2005-07-08 2008-09-03 桑迪士克股份有限公司 Mass storage device with automated credentials loading
US20110307695A1 (en) * 2010-06-14 2011-12-15 Salesforce.Com, Inc. Methods and systems for providing a secure online feed in a multi-tenant database environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725196A (en) * 2005-06-06 2006-01-25 付爱香 Enciphered protection and read write control method for computer data
CN101258507A (en) * 2005-07-08 2008-09-03 桑迪士克股份有限公司 Mass storage device with automated credentials loading
CN1776563A (en) * 2005-12-19 2006-05-24 清华紫光股份有限公司 File encrypting device based on USB interface
CN1928881A (en) * 2006-09-26 2007-03-14 南京擎天科技有限公司 Computer data security protective method
US20110307695A1 (en) * 2010-06-14 2011-12-15 Salesforce.Com, Inc. Methods and systems for providing a secure online feed in a multi-tenant database environment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182692A (en) * 2014-09-04 2014-12-03 昆山五昌新精密电子工业有限公司 File encryption/decryption wireless processing system and method
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
WO2017166884A1 (en) * 2016-03-31 2017-10-05 宇龙计算机通信科技(深圳)有限公司 File processing method and apparatus employing external device
CN109190385A (en) * 2018-07-27 2019-01-11 广东九联科技股份有限公司 A kind of file encrypting method of law-enforcing recorder

Similar Documents

Publication Publication Date Title
US20210192090A1 (en) Secure data storage device with security function implemented in a data security bridge
US10078599B2 (en) Application access control method and electronic apparatus implementing the same
CN103748592B (en) For controlling the system and method to the access of protected content
CN102945355A (en) Sector map-based rapid data encryption policy compliance
US10027660B2 (en) Computer program, method, and system for secure data management
CN102855452A (en) Method for following quick data encryption strategy based on encryption piece
CN108139984A (en) Secure subsystem
US20100175128A1 (en) Authentication information management apparatus, authentication information management program and method thereof, authentication apparatus, and authentication program and method thereof
US20150319147A1 (en) System and method for file encrypting and decrypting
KR102180529B1 (en) Application access control method and electronic device implementing the same
US20100243736A1 (en) Storage device management systems and methods
CN105653969A (en) Data processing method, apparatus and electronic equipment
CN108763401A (en) A kind of reading/writing method and equipment of file
CN103761067A (en) Processing system and processing method for encryption/decryption of data files
WO2020073916A1 (en) Encryption method and apparatus for storage device, and storage medium
JP2010238031A (en) External storage device, method for processing data stored in external storage device, program, and information processing device
CN110932853B (en) Key management device and key management method based on trusted module
CN106663158A (en) Managing user data for software services
CN204087190U (en) The disposal system of the enciphering/deciphering of data file
CN107085900B (en) Data processing method, device, system and POS terminal
JP2012118805A (en) Information processing apparatus, removable storage device, information processing method and information processing system
CN109902453A (en) A kind of software enciphering method
CN106453335B (en) Data transmission method and device
CN115982708A (en) Image processing method, device, equipment and storage medium
CN103413098A (en) Method, system and device for hardware encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140430