[go: up one dir, main page]

CN101751536A - Transparent file encryption method for increasing file header - Google Patents

Transparent file encryption method for increasing file header Download PDF

Info

Publication number
CN101751536A
CN101751536A CN200910188873A CN200910188873A CN101751536A CN 101751536 A CN101751536 A CN 101751536A CN 200910188873 A CN200910188873 A CN 200910188873A CN 200910188873 A CN200910188873 A CN 200910188873A CN 101751536 A CN101751536 A CN 101751536A
Authority
CN
China
Prior art keywords
file
encryption
data
header
encrypt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910188873A
Other languages
Chinese (zh)
Inventor
胡跃
卓勇
于泳涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd filed Critical SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd
Priority to CN200910188873A priority Critical patent/CN101751536A/en
Publication of CN101751536A publication Critical patent/CN101751536A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a transparent file encryption method for increasing file header, which comprises the following steps: setting a mapping rule for progress and file; scanning a whole hard disk and encrypting the file needing encryption; a kernel module automatically increases one file header and encrypts data behind the file header when discovering a file needing encryption is not encrypted; adding one offset onto all the IO relevant with offset for a designated progress accessing encryption file, reading in the data decryption of an internal memory and writing in the data decryption of a disc.

Description

Increase the file transparent encryption method of file header
Technical field
The present invention is applied to field of data encryption, especially file encryption.Use the method encrypt file of add file head, can under the situation that does not change user's use habit, realize the encryption and the protection of data.The present invention can be applied to data security protecting initiatively and passive data security protecting.
Background technology
Now, be from many-sided for the threat of the security of system on the computing machine, hacker and wooden horse are difficult to estimate to the loss that enterprise brings.Data presentation, China every year is divulged a secret the economic loss that causes up to over ten billion because of network.
The continuous development of infotech day by day highlights the double-edged sword of Internet resources.Come the security threat of automatic network serious day by day, as network data burglar, hacker invasion and attack, virus distribution, even internal system divulges a secret, and made information security become matter of utmost importance in the every profession and trade informatization.
According to the responsible official of state security department, there is 63.6% enterprise customer to be in " height risk " rank, therefore, network security technology more and more receives the concern of industry-by-industry as the field of a uniqueness.
If the network information security can not get effective guarantee, enterprise will face that network can't normally use, file is lost or many-sided threat such as damage, production and management system paralysis, server and the damage of client hardware facility, confidential information and intellecture property be stolen, and these all can bring direct economic loss to enterprise.
In information security field, encrypted sensitive information must become indispensable necessary link of data storage.
Existing solution is, file manually encrypted and at specific process the HOOK module of Application and Development layer, revised file read-write behavior.Manually the defective of encryption method is, does not go manual encryption if the employee forgets manual encryption or employee's malice, will bring the risk of divulging a secret.Application layer HOOK module defective is that compatibility is very poor, can't support the encryption of many programs.
Summary of the invention
The purpose of this invention is to provide a kind of add file head mode, realize general file transparent encryption method.
Technical scheme of the present invention is:
1 at first to the total system initialization:
Setting process matched rule and file matched rule and encryption key;
Use the application layer program scanning overall, increase the logo file head of a fixed size in the file front that needs are encrypted, and with the data encryption behind the file header.
Workflow during 2 operate as normal
Kernel module interception file operation, and whether identification be the file that satisfies process matched rule and file matched rule, is not then to be left intact; If then walk following flow process.
At the file that does not have to encrypt, kernel module replenishes a file header to file, and with the data encryption behind the file header;
At encrypt file, kernel module all is offset a file header size with the IO operation relevant with side-play amount and handles;
At encrypt file, kernel module is to writing the data encryption of disk, to reading in the data decryption of internal memory.
Owing to use the kernel driver module to realize, can be by revising matched rule, the file of the designated suffix type that designated program is visited is encrypted, and does not need the employee manually to encrypt, and compatibility is also good than application layer HOOK.
Because what use is the mode of add file head, encryption indicator can stably be stored in the file, the problem that does not exist power down to cause encryption indicator information to be damaged.
Because what use is that the data mapping that different processes is seen is different according to the cipher mode of process as recognition rule.Decryption process can be seen data decryption, but non-decryption process sees there is not decrypted data.This data isolation mode according to process, the data leak that can stop hacker, wooden horse supervisor to produce.
Description of drawings:
Fig. 1: system initialization flow process
Fig. 2: the flow process when system normally moves
Fig. 3: the concrete diagram of implementing
Embodiment:
As follows based on the software and hardware structure that the file transparent of file header is encrypted:
The transparent encryption software of PC, add file head, windows system.As shown in Figure 3, the operational process of total system is as follows:
Step 1: use " process matching files coupling encryption key is provided with instrument " configuration encryption rule, what file encryption of what process operation.
Step 2: use " process matching files coupling encryption key is provided with instrument ", use the file matched rule of front, travel through whole computing machine, the file that needs are encrypted increases a file header, and to content-encrypt.
Step 3: the user normally used a computer according to former mode.When the process of appointment was opened an encrypt file, kernel module read file header automatically, extracted decryption information, and the key information in the coupling access rule is to reading in the data decryption of internal memory, to writing the data encryption of disk.Open a unencrypted file or new files when (comprising covering) when the process of appointment, kernel module increases file header with the unencrypted file automatically, with content-encrypt; To write the data encryption of disk then, read in the data decryption of internal memory.
Be described below with regard to relevant issues below:
1 file header
Have a mark in the file header, whether file of mark is encrypted, and preserves some other additional information; There is a random key in the file header, is used for enciphered data; User key is encrypted file header.
2 file identification
Use file suffixes, catalogue, or the combination of asterisk wildcard realizes.Support is also supported the file encryption to a type to the encryption of single file, also supports the file encryption under the catalogue.
The identification of 3 processes
Use process name identification or the identification of process complete trails, perhaps the condition code of executable file is discerned.
The deciphering of 4 file headers
After the deciphering, inner mark is consistent with the mark that calculates.
The intercepting and capturing and the processing of 5IO request
The intercepting and capturing of I/O request realize at inner nuclear layer.There are three kinds of situations in request for I/O:
First kind: I/O request (as the inquiry file attribute) is not need to tackle, and for this IO request, directly issues just passable.
Second kind: the IRP (IO Request Packet) for the CACHE mode of file is read and write, directly let slip.
The third: for the IRP (IO Request Packet) that the non-CACHE mode of file is read and write, the position with a file header of read-write deflection will write data encryption, then with the data decryption of reading.
The decrypted state of 6 files and the switching of encrypted state
When a file becomes encryption by deciphering in internal memory, perhaps conversely the time, need to use the mode of clear buffer memorys (CACHE), data in buffer in the internal memory is all flushed on the disk, destroy buffer memory.Allow system rebuild buffer memory then.
7 applications
Reference under the Windows system realizes:
The present invention is successful Application in WINDOWS XP system, and its concrete system is composed as follows: Windows XPProfessional (sp3); User interface program of the present invention and driver.
Process description is as follows:
The present invention has comprised user class under Windows and kernel level is two-layer calls;
The main function that user class is called comprises:
SetPolicyToDriver: be responsible for the rule downloading of process coupling and file coupling is arrived in the driving;
ScanFileAndEncrypt:: be responsible for the scanning DISK to Image, with the file add file head of needs encryption, and encrypted file data.
Operating process is as follows:
Initialization:
Strategy is provided with facility invokes SetPolicyToDriver strategy is set to driving;
Strategy is provided with facility invokes ScanFileAndEncrypt scanning totally, and the file of this encryption is added file header, and data encryption.
Normal operation:
The user operates popular software according to mode in the past.

Claims (6)

1. increase the file transparent encryption method of file header, it is characterized in that comprising following steps:
During initialization, the matched rule of process and file is set;
During initialization, scan DISK to Image, will need the file encryption of encrypting according to the file matched rule;
During normal operation, kernel module at a process file of visit of finding appointment but this file do not encrypt, increase a file header automatically, and with the data encryption behind the file header;
During normal the operation, the process of kernel module discovery appointment is opened an encrypt file, the legitimacy of service marking verification file head;
During normal the operation, kernel module is for encrypt file, and the IO action need relevant with side-play amount adds a side-play amount;
During normal the operation, kernel module reads in the data decryption of internal memory for encrypt file, writes the data encryption of disk.
2. the method for the increase file header that requires according to right 1 is characterized in that:
When using for the first time, the file of user's appointment scanned encrypt all files that need encrypt, need the add file head;
In the normal use of user,, increase file header automatically by driving for the file that does not have in the past to encrypt;
For the file of having encrypted, kernel module uses the data in the file header to do the legitimacy verification.
3. according to the method for right 1 described IO operation skew, it is characterized in that:
All need skew for the IO that writes disk, side-play amount is a file header size;
For not being the IO that writes disk, then do not need skew;
For the file size that application program need be seen, need cut a file header size.
4. described based on encryption method according to right 1, it is characterized in that:
For the data that write disk, increase a file header displacement after, data encryption is write disk;
For the data of reading from disk, increase a file displacement after, data are read and are deciphered.
5. based on the method for right 1 described kill file, it is characterized in that:
Use asterisk wildcard identification filename.
6. based on the method for right 1 described filter course, it is characterized in that:
Use the condition code of the executable program file of the asterisk wildcard coupling process name or the process of use to come the identification process.
CN200910188873A 2009-12-16 2009-12-16 Transparent file encryption method for increasing file header Pending CN101751536A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910188873A CN101751536A (en) 2009-12-16 2009-12-16 Transparent file encryption method for increasing file header

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910188873A CN101751536A (en) 2009-12-16 2009-12-16 Transparent file encryption method for increasing file header

Publications (1)

Publication Number Publication Date
CN101751536A true CN101751536A (en) 2010-06-23

Family

ID=42478506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910188873A Pending CN101751536A (en) 2009-12-16 2009-12-16 Transparent file encryption method for increasing file header

Country Status (1)

Country Link
CN (1) CN101751536A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314579A (en) * 2010-07-01 2012-01-11 成都市华为赛门铁克科技有限公司 File filter protecting method, drive device and client end
CN102945342A (en) * 2012-09-29 2013-02-27 北京奇虎科技有限公司 Method, device and terminal equipment for progress identification
CN103065082A (en) * 2012-07-04 2013-04-24 北京京航计算通讯研究所 Software security protection method based on Linux system
CN106060084A (en) * 2016-07-18 2016-10-26 青岛大学 Transparent file encryption technology
CN113792319A (en) * 2021-09-18 2021-12-14 深圳须弥云图空间科技有限公司 File encryption method and device, storage medium and electronic equipment
CN115438358A (en) * 2022-09-05 2022-12-06 长江量子(武汉)科技有限公司 Controlled file encryption method and electronic equipment

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314579A (en) * 2010-07-01 2012-01-11 成都市华为赛门铁克科技有限公司 File filter protecting method, drive device and client end
CN102314579B (en) * 2010-07-01 2014-06-04 华为数字技术(成都)有限公司 File filter protecting method, drive device and client end
CN103065082A (en) * 2012-07-04 2013-04-24 北京京航计算通讯研究所 Software security protection method based on Linux system
CN102945342A (en) * 2012-09-29 2013-02-27 北京奇虎科技有限公司 Method, device and terminal equipment for progress identification
CN102945342B (en) * 2012-09-29 2015-08-05 北京奇虎科技有限公司 Progress recognizing method, device and terminal device
CN106060084A (en) * 2016-07-18 2016-10-26 青岛大学 Transparent file encryption technology
CN113792319A (en) * 2021-09-18 2021-12-14 深圳须弥云图空间科技有限公司 File encryption method and device, storage medium and electronic equipment
CN113792319B (en) * 2021-09-18 2024-06-18 深圳须弥云图空间科技有限公司 File encryption method, device, storage medium and electronic equipment
CN115438358A (en) * 2022-09-05 2022-12-06 长江量子(武汉)科技有限公司 Controlled file encryption method and electronic equipment
CN115438358B (en) * 2022-09-05 2023-07-14 长江量子(武汉)科技有限公司 Controlled file encryption method and electronic equipment

Similar Documents

Publication Publication Date Title
CN102945355B (en) Fast Data Encipherment strategy based on sector map is deferred to
Halcrow eCryptfs: An enterprise-class encrypted filesystem for linux
JP4759513B2 (en) Data object management in dynamic, distributed and collaborative environments
US8204233B2 (en) Administration of data encryption in enterprise computer systems
JP5643318B2 (en) Temporary confidential secure storage method
Squicciarini et al. Preventing information leakage from indexing in the cloud
CN102855452B (en) Fast Data Encipherment strategy based on encryption chunk is deferred to
CN102999732B (en) Multi-stage domain protection method and system based on information security level identifiers
KR101613146B1 (en) Method for encrypting database
CN109923548A (en) Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process
US20030208686A1 (en) Method of data protection
EP1365306A2 (en) Data protection system
CN110990851B (en) Static data encryption protection method and system
US7962492B2 (en) Data management apparatus, data management method, data processing method, and program
JP4167476B2 (en) Data protection / storage method / server
CN106682521B (en) File transparent encryption and decryption system and method based on driver layer
CN102831359A (en) Encryption file system of portable mobile storage device
CN115329389B (en) File protection system and method based on data sandbox
CN101751536A (en) Transparent file encryption method for increasing file header
KR100440037B1 (en) Document security system
CN103532712B (en) digital media file protection method, system and client
Aissaoui et al. Survey on data remanence in Cloud Computing environment
Virvilis et al. A cloud provider-agnostic secure storage protocol
KR20100106110A (en) Secure boot data total management system, methods for generating and verifying a verity of matadata for managing secure boot data, computer-readable recording medium storing program for executing any of such methods
JP2008035449A (en) Data distributing method using self-decryption file and information processing system using the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Hu Yangbin

Document name: Notification of Publication of the Application for Invention

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100623