CN101398824A - Method for implementing data storage by virtual file systems technology after processing - Google Patents
Method for implementing data storage by virtual file systems technology after processing Download PDFInfo
- Publication number
- CN101398824A CN101398824A CNA2007101224495A CN200710122449A CN101398824A CN 101398824 A CN101398824 A CN 101398824A CN A2007101224495 A CNA2007101224495 A CN A2007101224495A CN 200710122449 A CN200710122449 A CN 200710122449A CN 101398824 A CN101398824 A CN 101398824A
- Authority
- CN
- China
- Prior art keywords
- data
- virtual file
- file system
- virtual
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a method which achieves the memory of the data after data processing by the technique of a virtual file system, belonging to the field of data memory technique; the method utilizes a virtual file system software and fabricates one or more memory drivers in a workstation operation system; data connection is established between the virtual memory driver, the upper application software and a practical memory medium; when data is written in, the virtual memory driver encrypts or compresses the data and stores the data to the practical memory medium; when date is read, the virtual memory driver encrypts or compresses the data and returns the data to the upper layer application software. The method improves the security of the medium memory and simplifies the system operation at the same time.
Description
Technical field
The invention belongs to technical field of data storage, be specifically related to a kind of method of utilizing virtual file system technique to realize and storing after the data processing.This method can be applied to the industry that any data confidentiality is had relatively high expectations, and can be applied to the compression storing data field.
Background technology
In the data confidentiality field, people's sight focuses on the restricting user access authority mostly at present, but the also few of an important link consideration arranged, and is exactly that medium is lost.There have been some producers data on considering storage medium to encrypt at present from hardware, such as the hard disk that has producer's release band encryption chip, RAID card etc., but these all need the user that original hardware device is upgraded just to achieve the goal, these cryptographic means all are at small-sized storage simultaneously, store for enterprise-level, wanting to prevent that medium from losing divulging a secret of causing, can only be to consider still do not have what good solution in case medium is lost from the security aspect at present.
In addition, data compression algorithm is a lot of at present, popular compressed software is also a lot, performance is also all good, but the file that compressed all needs just can use through this operation that decompresses, very inconvenient, though the NTFS of Microsoft supports the storage of compression back, but this is the technology of a sealing, compress algorithm and rank are all fixed, and only limit to Windows operating system and can use, still out of reach for other the network storage, how this mode of windows being expanded comes is user-friendly to is to need the problem that solves at present.
Summary of the invention
The objective of the invention is to provides a kind of method of utilizing virtual file system technique to realize and storing after the data processing at existing problem in present data encryption or the compression storage, thereby when improving data security, the simplified system operation.
Technical scheme of the present invention is as follows: a kind of method of utilizing virtual file system technique to realize and storing after the data processing, this method is used Virtual File System software, in workstation operating system, fictionalize one or more memory drivers, setting up data between virtual store driver and upper application software and the actual storage medium is connected, when writing data, by the virtual store driver data are encrypted or compress after store in the actual storage medium, when reading of data, by the virtual store driver data are decrypted or decompress after data are returned to upper application software.
The aforesaid method of utilizing virtual file system technique to realize and storing after the data processing wherein, in the unit memory module, is carried out password setting to data during encryption, and the user could access associated data after inputing correct password.
The aforesaid method of utilizing virtual file system technique to realize and to store after the data processing wherein, in network storage pattern, is carried out account and control of authority by storage control server, and the focusing on of data.
The aforesaid method of utilizing virtual file system technique to realize and storing after the data processing, wherein, in network storage pattern, if do not need data are focused on, then the processing of data is finished by the data processing middle layer on the workstation.
Beneficial effect of the present invention is as follows: the present invention will handle and compression and decompression are handled to be placed in the Virtual File System and carried out the encryption and decryption of data, with the data storage after handling in the storage medium of reality, thereby improved the confidentiality of medium memory; And the user does not need to carry out the repeatable operation of compression and decompression yet, and is convenient for users to use.
Description of drawings
Fig. 1 is a principle schematic of the present invention.
Fig. 2 is the realization schematic diagram of network storage pattern of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.
Method provided by the present invention is to use Virtual File System software to fictionalize one or more memory drivers in workstation operating system, setting up data between virtual store driver and upper application software and the actual storage medium is connected, when writing data, by the virtual store driver data are encrypted or compress after store in the actual storage medium, when reading of data, by the virtual store driver data are decrypted or decompress after data are returned to upper application software.Its principle as shown in Figure 1.
Realization of the present invention to the restriction of operating system, on implementation pattern, does not mainly contain two kinds: single cpu mode, network storage pattern.
1. single cpu mode
Single cpu mode is simple relatively, crucial to realize a virtual hard exactly, and on this driver, realize oneself a file system, this Virtual File System also will dock with the storage medium of a reality, and the data of storage store in the actual medium after handling by Virtual File System.In concrete application, to encrypt still slightly differently with compression, this is mainly reflected on the access code, uses for encrypting, after the user loads a medium, could correct visit after at first needing the user to input correct password.
In concrete realization, consider other data processing operation of different cryptographic algorithm, compression algorithm and some, need come out data processing section is abstract separately, realize in the mode of plug-in unit.Can realize some expanded application easily like this.
2. network storage pattern
Network storage pattern relative complex some, but also flexible relatively, mainly be that data processing section both can have been considered to use independent server to handle, also can consider on each workstation, to finish.Use for encrypting in addition, just can not be as single cpu mode, a simple password is just passable, under network storage pattern, needs to introduce account's notion, and different accounts can be provided with the different access control authority.Fig. 2 is the realization schematic diagram of network storage pattern.
Among the figure, virtually connect wiring and represent communication between VFS and the storage control server, information transmitted mainly is contents such as account verification, access control, if system thinks that when implementing concentrated data processing can bring bigger benefit, Chuan Shu data have also comprised raw data so, if think that data volume is too big, focus on and can bring excessive pressure to storage control server, the processing of data is finished by " the data processing middle layer " that be deployed on the common workstation so." data processing middle layer " is the realization part of data processing among the present invention, when writing data, upper layer application writes actual memory device again after this software processes of process, otherwise the data that upper layer application reads also have only through after this intermediate layer handles just can obtain original data.The used algorithm in data processing middle layer on each workstation should be the same with processing mode, otherwise the data on the network storage equipment can not be shared between each workstation.In the specific implementation process, be to be called by virtual drive software in the mode of software package, the data of the virtual drive of flowing through are handled.The typical processing has: based on the data encryption of multiple algorithm, based on the data compression of multiple algorithm etc., can write different plug-in units according to different algorithms and call for virtual drive software.
Real connecting line is represented the data after the transmission process, need use independent server to handle to data as system, and what effect this reality connecting line does not have.
Storage control server significant feature among the figure has: the focusing on of account and control of authority, data.Whether data need to focus on can be considered from the following aspects:
(1) transmission course safety whether: if transmission link is unsafe, and this application is the problem that will solve data security, transmission again after on each workstation data being handled is adopted in suggestion so, the data that can guarantee like this to transmit have strengthened safety of transmission through encrypting.
(2) performance of workstation and job specification: if the workstation poor-performing, and superincumbent application to the resource occupation such as CPU of workstation than higher, so just can consider to use the mode that focuses on that data are handled.After it should be noted that employing focuses on, the data of transmission are raw data, and this is inappropriate for safety requirements than higher occasion.
Consider the description of this invention disclosed herein and special embodiment, other embodiment of the present invention are conspicuous for a person skilled in the art.These explanations and embodiment only consider as an example that they all belong to by within the indicated protection scope of the present invention and spirit of claims.
Claims (4)
1. one kind is utilized the method for storing after the virtual file system technique realization data processing, it is characterized in that: this method is used Virtual File System software, in workstation operating system, fictionalize one or more memory drivers, setting up data between virtual store driver and upper application software and the actual storage medium is connected, when writing data, by the virtual store driver data are encrypted or compress after store in the actual storage medium, when reading of data, by the virtual store driver data are decrypted or decompress after data are returned to upper application software.
2. the method for utilizing virtual file system technique to realize and storing after the data processing as claimed in claim 1, it is characterized in that: in the unit memory module, during encryption data are carried out password setting, the user could access associated data after inputing correct password.
3. the method for utilizing virtual file system technique to realize and to store after the data processing as claimed in claim 1 is characterized in that: in network storage pattern, carry out account and control of authority by storage control server, and the focusing on of data.
4. the method for utilizing virtual file system technique to realize and storing after the data processing as claimed in claim 1, it is characterized in that: in network storage pattern, if do not need data are focused on, then the processing of data is finished by the data processing middle layer on the workstation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101224495A CN101398824A (en) | 2007-09-26 | 2007-09-26 | Method for implementing data storage by virtual file systems technology after processing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101224495A CN101398824A (en) | 2007-09-26 | 2007-09-26 | Method for implementing data storage by virtual file systems technology after processing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101398824A true CN101398824A (en) | 2009-04-01 |
Family
ID=40517387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101224495A Pending CN101398824A (en) | 2007-09-26 | 2007-09-26 | Method for implementing data storage by virtual file systems technology after processing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101398824A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831081A (en) * | 2012-09-03 | 2012-12-19 | 郑州信大捷安信息技术股份有限公司 | Transparent encryption and decryption secure digital memory card (SD card) and implementation method thereof |
WO2013040915A1 (en) * | 2011-09-22 | 2013-03-28 | 腾讯科技(深圳)有限公司 | File encryption method and device, file decryption method and device |
CN103020199A (en) * | 2012-12-05 | 2013-04-03 | 上海创图网络科技发展有限公司 | Virtual file system suitable for different operating system platforms and application thereof |
CN105069091A (en) * | 2015-08-05 | 2015-11-18 | 北京思特奇信息技术股份有限公司 | HBASE based virtual file system and realization method therefor |
CN105205094A (en) * | 2015-08-12 | 2015-12-30 | 浪潮(北京)电子信息产业有限公司 | Multi-control share storage system |
CN109690465A (en) * | 2016-12-07 | 2019-04-26 | 华为技术有限公司 | A kind of storage device management method and user terminal |
CN111149337A (en) * | 2017-10-19 | 2020-05-12 | 国际商业机器公司 | Secure access management of tools within a secure environment |
-
2007
- 2007-09-26 CN CNA2007101224495A patent/CN101398824A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013040915A1 (en) * | 2011-09-22 | 2013-03-28 | 腾讯科技(深圳)有限公司 | File encryption method and device, file decryption method and device |
CN103020537A (en) * | 2011-09-22 | 2013-04-03 | 腾讯科技(深圳)有限公司 | Data encrypting method, data encrypting device, data deciphering method and data deciphering device |
US9224002B2 (en) | 2011-09-22 | 2015-12-29 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for file encryption/decryption |
CN102831081A (en) * | 2012-09-03 | 2012-12-19 | 郑州信大捷安信息技术股份有限公司 | Transparent encryption and decryption secure digital memory card (SD card) and implementation method thereof |
CN103020199A (en) * | 2012-12-05 | 2013-04-03 | 上海创图网络科技发展有限公司 | Virtual file system suitable for different operating system platforms and application thereof |
CN105069091A (en) * | 2015-08-05 | 2015-11-18 | 北京思特奇信息技术股份有限公司 | HBASE based virtual file system and realization method therefor |
CN105069091B (en) * | 2015-08-05 | 2018-09-11 | 北京思特奇信息技术股份有限公司 | A kind of Virtual File System and its implementation based on HBASE |
CN105205094A (en) * | 2015-08-12 | 2015-12-30 | 浪潮(北京)电子信息产业有限公司 | Multi-control share storage system |
CN109690465A (en) * | 2016-12-07 | 2019-04-26 | 华为技术有限公司 | A kind of storage device management method and user terminal |
CN109690465B (en) * | 2016-12-07 | 2020-10-09 | 华为技术有限公司 | Storage device management method and user terminal |
CN111149337A (en) * | 2017-10-19 | 2020-05-12 | 国际商业机器公司 | Secure access management of tools within a secure environment |
US11799861B2 (en) | 2017-10-19 | 2023-10-24 | International Business Machines Corporation | Secure access management for tools within a secure environment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106169041B (en) | A kind of safety encryption mobile hard disk and its data transmission method based on USBKEY authentication | |
CN1983227B (en) | Removable computer with mass storage | |
US10769311B2 (en) | Encrypting portable media system and method of operation thereof | |
US8321659B2 (en) | Data encryption apparatus, data decryption apparatus, data encryption method, data decryption method, and data transfer controlling apparatus | |
CN102947836B (en) | Memory device, main process equipment and use dual encryption scheme transmit the method for password between the first and second memory devices | |
US7350717B2 (en) | High speed smart card with flash memory | |
CN101398824A (en) | Method for implementing data storage by virtual file systems technology after processing | |
CN101739758B (en) | Method for encrypting and decrypting smart card, system and reader-writer | |
CN1889426B (en) | Method and system for realizing network safety storing and accessing | |
CN100454321C (en) | USB device with data memory and intelligent secret key and control method thereof | |
CN101881997B (en) | Trusted safe mobile storage device | |
US20050015609A1 (en) | Storage apparatus and access system | |
CN105243344A (en) | Chipset with hard disk encryption function and host computer controller | |
CN101308475A (en) | Safe mobile storage system and method of use thereof | |
CN101551784A (en) | Method and device for encrypting data in ATA memory device with USB interface | |
KR100954649B1 (en) | Data encryption apparatus, data decryption apparatus and data encryption method | |
US20120066518A1 (en) | Canister-based storage system security | |
CN101561751A (en) | USB encryption and decryption bridging chip | |
CN104834873A (en) | U disk for cloud data information encryption and decryption, and realization method | |
CN201590091U (en) | Encryption type memory card read/write device based on password authentication | |
CN105095945A (en) | SD card capable of securely storing data | |
CN105389526B (en) | Encrypted area and the mobile hard disk and its date storage method of non-encrypted area integration | |
CN101540191A (en) | Real-time encrypted U disk and high speed encryption-decryption method | |
CN101349999A (en) | Safe adapter apparatus for mobile storage and operation method thereof | |
CN101883357A (en) | Method, device and system for mutual authentication between terminal and intelligent card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20090401 |