CN106156639A - Data partition encryption method and device - Google Patents

Data partition encryption method and device Download PDF

Info

Publication number
CN106156639A
CN106156639A CN201610495829.2A CN201610495829A CN106156639A CN 106156639 A CN106156639 A CN 106156639A CN 201610495829 A CN201610495829 A CN 201610495829A CN 106156639 A CN106156639 A CN 106156639A
Authority
CN
China
Prior art keywords
group
block group
block
encrypted piece
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610495829.2A
Other languages
Chinese (zh)
Inventor
李明浩
伍亮雄
赵建凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610495829.2A priority Critical patent/CN106156639A/en
Publication of CN106156639A publication Critical patent/CN106156639A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure is directed to data partition encryption method and device.The method includes: judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group is non-free block group, encrypts described the most to be encrypted piece of group.Technique scheme, accelerates judgement speed, thus accelerates enciphering rate, save encryption times.

Description

Data partition encryption method and device
Technical field
It relates to encryption technology field, particularly relate to data partition encryption method and device.
Background technology
At present, the document layout system on data partition is as follows: | bootstrap block | block group 0 | ... | block group n.Each Block group information is as follows: | superblock (1) | group descriptor (n) | data block bitmap (1) | index node bitmap (1) | index joint Point table (n) | data block (n).The method of encryption data subregion is as follows at present: read block group number information from superblock, one by one Read each piece of group, when often reading block group: the data block bitmap in traversal block group, in this data block bitmap, each is labeled with block (1 represents that corresponding data block is needed encryption by use to the service condition of the corresponding data block in group, and 0 represents corresponding data block It is not used by need not encryption), often one piece of data used of traversal then encrypt this data block data.
Summary of the invention
Disclosure embodiment provides data partition encryption method and device.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of data partition encryption method, including:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group It is non-free block group, encrypts described the most to be encrypted piece of group.
In one embodiment, the described the most to be encrypted piece of group judged in data partition is the most empty with default block group Before not busy mark, described method also includes:
When initializing the block group in described data partition, in the block group that data block is not used by, write is described The block group idle marker preset.
In one embodiment, described when the block group in described data partition is initialized, data block not by The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and write is pre-in the block group that described data block is not used by If block group idle marker.
In one embodiment, described when the block group in described data partition is initialized, data block not by The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and writes in the block group that described data block is not used by Enter default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group The presupposed information write in symbol.
Second aspect according to disclosure embodiment, it is provided that a kind of data partition encryption device, including:
Judge module, for judging whether the most to be encrypted piece of group in data partition is marked with the default block group free time Will;
First processing module, for when described the most to be encrypted piece of group is with described default block group idle marker, sentencing Settled front to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;
Second processing module, for when described the most to be encrypted piece of group be not with described default block group idle marker, Judge that the most to be encrypted piece of group is non-free block group, encrypt described the most to be encrypted piece of group.
In one embodiment, described device also includes:
Initialize processing module, whether write for the most to be encrypted piece of group judged in data partition at described judge module Before having default block group idle marker, when the block group in described data partition is initialized, do not made in data block Block group in write described default block group idle marker.
In one embodiment, described initialization processing module, including:
First initialization submodule, initializes for the block group being used data block;
Second initialization submodule, initializes for the block group being not used by data block, and in described data block The block group being not used by writes default block group idle marker.
In one embodiment, described initialization processing module, including:
3rd initialization submodule, initializes for the block group being used data block;
Mark write submodule, initializes for the block group abandoning being not used by data block, and in described data The block group that block is not used by writes default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group The presupposed information write in symbol.
The third aspect according to disclosure embodiment, it is provided that a kind of data partition encryption device, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group It is non-free block group, encrypts described the most to be encrypted piece of group.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
Technique scheme, it is only necessary to judge that the most to be encrypted piece of group, whether with default block group idle marker, just may be used Determine whether the most to be encrypted piece of group is free block group, finally whether can encrypt the most to be encrypted piece of group by quick decision, with need The value of the data block bitmap in block group to be traveled through just can determine the prior art whether block group is free block group and compare, above-mentioned side Method accelerates judgement speed, thus accelerates enciphering rate, saves encryption times.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure Example, and for explaining the principle of the disclosure together with description.
Figure 1A is the flow chart according to a kind of data partition encryption method shown in an exemplary embodiment;
Figure 1B is the flow chart according to the another kind of data partition encryption method shown in an exemplary embodiment;
Fig. 2 is the flow chart according to another the data partition encryption method shown in an exemplary embodiment;
Fig. 3 is the flow chart according to another the data partition encryption method shown in an exemplary embodiment;
Fig. 4 is the block diagram according to a kind of data partition encryption device shown in an exemplary embodiment;
Fig. 5 A is the block diagram according to the another kind of data partition encryption device shown in an exemplary embodiment;
Fig. 5 B is the block diagram according to another the data partition encryption device shown in an exemplary embodiment;
Fig. 6 is the block diagram according to another the data partition encryption device shown in an exemplary embodiment;
Fig. 7 is the block diagram according to another the data partition encryption device shown in an exemplary embodiment;
Fig. 8 is according to the block diagram being applicable to data partition encryption device shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Disclosure embodiment provides a kind of data partition encryption method, as shown in Figure 1A, including step S11-S13:
In step s 11, it is judged that whether the most to be encrypted piece of group in data partition be with default block group idle marker; If it is, judge that the most to be encrypted piece of group is free block group, perform step S12;Otherwise judge the most to be encrypted piece of group right and wrong Free block group, performs step S13.
In step s 12, when above-mentioned the most to be encrypted piece of group is with default block group idle marker, it is determined that the most to be added Close piece of group is free block group, abandons encrypting the most to be encrypted piece of group.Free block group in disclosure embodiment refers to that data block is not The block group used.
In step s 13, when above-mentioned the most to be encrypted piece of group be not with default block group idle marker, it is determined that currently treat Cryptographic block group is non-free block group, encrypts the most to be encrypted piece of group.Busy piece of group in disclosure embodiment refers to data block The block group used.
The said method that disclosure embodiment provides, it is only necessary to judge that whether the most to be encrypted piece of group be with default block group Idle marker, just can determine that out whether the most to be encrypted piece of group is free block group, and finally whether energy quick decision is encrypted and currently treated Cryptographic block group, the existing skill that whether block group is free block group with needing the value traveling through the data block bitmap in block group just can determine Art is compared, and said method accelerates judgement speed, thus accelerates enciphering rate, saves encryption times.
In one embodiment, such as Figure 1B, before performing step S11, said method can include step S10:
In step slo, when the block group in data partition initializes, write in the block group that data block is not used by Enter above-mentioned default block group idle marker.
In one embodiment, as in figure 2 it is shown, above-mentioned steps S10 includes step S21-S22:
In the step s 21, the block group used data block initializes;The data block that will be used is in data block Correspondence position in bitmap is 1;
In step S22, the block group being not used by data block initializes, and the block group being not used by data block The block group idle marker that middle write is preset;In this operation, can write in the group descriptor of this block group that data block is not used by Presupposed information;Specifically, EXT4_BG_BLOCK_UNINIT can be write in group descriptor indicate as idle marker.
In another embodiment, as it is shown on figure 3, above-mentioned steps S10 includes step S31-S32:
In step S31, the block group being used data block initializes;The data block that will be used is in data block Correspondence position in bitmap is 1;
In step s 32, the block group abandoning being not used by data block initializes, and is not made in described data block Block group in write default block group idle marker;In this operation, can describe in the group of this block group that data block is not used by Symbol writes presupposed information;Specifically, EXT4_BG_BLOCK_UNINIT mark can be write in group descriptor as idle mark Will.
The block group abandoning being not used by data block initializes, and also can accelerate initialization process, when saving initialization Between.
Actual test shows, 64GB is formatted as to the data partition of ext4, a total of 396 of block group, wherein, if Busy piece of group has 40, and free block group has 356, then, use the said method that disclosure embodiment provides to these data Subregion is encrypted, and enciphering rate can be promoted about 9 times at its best.
Below as a example by a data partition to be encrypted, the said method that disclosure embodiment provides completely is described Implementation process.As shown in Figure 4, during being somebody's turn to do, process the block group in data partition one by one, often process a block group and include following step Rapid:
In step S41, it is judged that whether this block group is with default block group idle marker;If it is, judge this close piece Group is free block group, performs step S42;Otherwise judge that this block group is non-free block group, perform step S43.
Wherein, abovementioned steps S21-S22 or step S31-S32 can be performed before step S41.
In step S42, when this block group is free block group, abandon encrypting this block group, continue to read next block group, and Next block group is processed according to method shown in step S41-S43.
In step S43, when this block group is busy piece of group, encrypt this block group, after encryption, continue to read next block Group, and process next block group according to method shown in step S41-S43.
The said method that disclosure embodiment provides, it is only necessary to judge that whether the most to be encrypted piece of group be with default block group Idle marker, just can determine that out whether the most to be encrypted piece of group is free block group, and finally whether energy quick decision is encrypted and currently treated Cryptographic block group, the existing skill that whether block group is free block group with needing the value traveling through the data block bitmap in block group just can determine Art is compared, and said method accelerates judgement speed, thus accelerates enciphering rate, saves encryption times.
The said method that corresponding disclosure embodiment provides, disclosure embodiment provides a kind of data partition encryption device, As shown in Figure 5A, including:
Judge module 51, the most to be encrypted piece of group being configured to judge in data partition is the most empty with default block group Not busy mark;
First processing module 52, is configured as described the most to be encrypted piece of group with described default block group idle marker Time, it is determined that the most to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;
Second processing module 53, is configured as described the most to be encrypted piece of group not with described default block group free time mark During will, it is determined that the most to be encrypted piece of group is non-free block group, encrypt described the most to be encrypted piece of group.
In one embodiment, as shown in Figure 5 B, said apparatus may also include that
Initialize processing module 54, whether write for the most to be encrypted piece of group judged in data partition at judge module 51 Before having default block group idle marker, when the block group in data partition is initialized, it is not used by data block Block group writes default block group idle marker.
In one embodiment, as shown in Figure 6, above-mentioned initialization processing module 54 comprises the steps that
First initialization submodule 61, the block group being configured to be used data block initializes;
Second initialization submodule 62, the block group being configured to be not used by data block initializes, and described The block group that data block is not used by writes default block group idle marker.
In one embodiment, as it is shown in fig. 7, above-mentioned initialization processing module 54 device may also include that
3rd initialization submodule 71, the block group being configured to be used data block initializes;
Mark write submodule 72, the block group being configured to abandon being not used by data block initializes, and in institute State and the block group that data block is not used by writes default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group The presupposed information write in symbol.
The said method that corresponding disclosure embodiment provides, disclosure embodiment also provides for a kind of data partition encryption dress Put, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group It is non-free block group, encrypts described the most to be encrypted piece of group.
In one embodiment, described processor is also configured to:
Before whether the described the most to be encrypted piece of group judged in data partition be with default block group idle marker, described Method also includes:
When initializing the block group in described data partition, in the block group that data block is not used by, write is described The block group idle marker preset.
In one embodiment, described processor is also configured to:
Described when the block group in described data partition is initialized, write in the block group that data block is not used by Described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and write is pre-in the block group that described data block is not used by If block group idle marker.
In one embodiment, described processor is also configured to:
Described when the block group in described data partition is initialized, write in the block group that data block is not used by Described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and writes in the block group that described data block is not used by Enter default block group idle marker.
In one embodiment, described processor is also configured to:
Described default block group idle marker be included in described the most to be encrypted piece group group descriptor in write preset Information.
Fig. 8 is the block diagram according to a kind of device 800 for data partition encryption shown in an exemplary embodiment.Example As, device 800 can be mobile device, and such as mobile phone, computer, digital broadcast terminal, messaging devices, game controls Platform, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Fig. 8, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and Communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just Mutual in process between assembly 802 and other assemblies.Such as, processing component 802 can include multi-media module, many to facilitate Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between device 800 and user.Real at some Executing in example, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can To be implemented as touch screen, to receive the input signal from user.Touch panel include one or more touch sensor with Gesture on sensing touch, slip and touch panel.Touch sensor can not only sense touch or the border of sliding action, and And also detect and touch or persistent period that slide is relevant and pressure.In certain embodiments, multimedia groupware 808 includes One front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during such as screening-mode or video mode, front Put photographic head and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can To be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800 Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as assembly For display and the keypad of device 800, sensor cluster 814 can also detect device 800 or the position of 800 1 assemblies of device Put change, the presence or absence that user contacts, device 800 orientation or acceleration/deceleration and the temperature of device 800 with device 800 Change.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact near detection The existence of object.Sensor cluster 814 can also include optical sensor, and such as CMOS or ccd image sensor, being used for should in imaging Use middle use.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensor, magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device 800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement In example, communication component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel. In one exemplary embodiment, communication component 816 also includes near-field communication (NFC) module, to promote junction service.Such as, Can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as, Non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light Data storage device etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of mobile terminal During row so that mobile terminal is able to carry out a kind of data partition encryption method, including:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group It is non-free block group, encrypts described the most to be encrypted piece of group.
In one embodiment, the described the most to be encrypted piece of group judged in data partition is the most empty with default block group Before not busy mark, described method also includes:
When initializing the block group in described data partition, in the block group that data block is not used by, write is described The block group idle marker preset.
In one embodiment, described when the block group in described data partition is initialized, data block not by The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and write is pre-in the block group that described data block is not used by If block group idle marker.
In one embodiment, described when the block group in described data partition is initialized, data block not by The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and writes in the block group that described data block is not used by Enter default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group The presupposed information write in symbol.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. a data partition encryption method, it is characterised in that including:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is idle Block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group right and wrong Free block group, encrypts described the most to be encrypted piece of group.
2. the method for claim 1, it is characterised in that whether the described the most to be encrypted piece of group judged in data partition Before default block group idle marker, described method also includes:
When the block group in described data partition is initialized, the block group that data block is not used by writes described presetting Block group idle marker.
3. method as claimed in claim 2, it is characterised in that described block group in described data partition is being initialized Time, the block group that data block is not used by writes described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and in the block group that described data block is not used by write preset Block group idle marker.
4. method as claimed in claim 2, it is characterised in that described block group in described data partition is being initialized Time, the block group that data block is not used by writes described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and write is pre-in the block group that described data block is not used by If block group idle marker.
5. the method as described in arbitrary in Claims 1-4, it is characterised in that
Described default block group idle marker is included in the group descriptor of described the most to be encrypted piece of group the presupposed information write.
6. a data partition encryption device, it is characterised in that including:
Judge module, for judging that whether the most to be encrypted piece in data partition organized with default block group idle marker;
First processing module, for when described the most to be encrypted piece of group is with described default block group idle marker, it is determined that when Front to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;
Second processing module, for when described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that The most to be encrypted piece of group is non-free block group, encrypts described the most to be encrypted piece of group.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Initialize processing module, for judging that whether the most to be encrypted piece in data partition is organized with in advance at described judge module If block group idle marker before, when the block group in described data partition is initialized, be not used by data block Block group writes described default block group idle marker.
8. device as claimed in claim 7, it is characterised in that described initialization processing module, including:
First initialization submodule, initializes for the block group being used data block;
Second initialization submodule, initializes for the block group that is not used by data block, and described data block not by The block group used writes default block group idle marker.
9. device as claimed in claim 7, it is characterised in that described initialization processing module, including:
3rd initialization submodule, initializes for the block group being used data block;
Mark write submodule, initializes for the block group abandoning being not used by data block, and in described data block not The block group used writes default block group idle marker.
10. the device as described in arbitrary in claim 6 to 9, it is characterised in that
Described default block group idle marker is included in the group descriptor of described the most to be encrypted piece of group the presupposed information write.
11. 1 kinds of data partition encryption devices, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is idle Block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group right and wrong Free block group, encrypts described the most to be encrypted piece of group.
CN201610495829.2A 2016-06-28 2016-06-28 Data partition encryption method and device Pending CN106156639A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610495829.2A CN106156639A (en) 2016-06-28 2016-06-28 Data partition encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610495829.2A CN106156639A (en) 2016-06-28 2016-06-28 Data partition encryption method and device

Publications (1)

Publication Number Publication Date
CN106156639A true CN106156639A (en) 2016-11-23

Family

ID=57349687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610495829.2A Pending CN106156639A (en) 2016-06-28 2016-06-28 Data partition encryption method and device

Country Status (1)

Country Link
CN (1) CN106156639A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789070A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The decryption method of data, device and terminal
CN107333261A (en) * 2017-06-21 2017-11-07 努比亚技术有限公司 Method, storage medium and the mobile terminal of encryption data
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1963788A (en) * 2005-11-08 2007-05-16 中兴通讯股份有限公司 A managing method for EMS memory
CN103067170A (en) * 2012-12-14 2013-04-24 深圳国微技术有限公司 Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN103473157A (en) * 2012-06-06 2013-12-25 百度在线网络技术(北京)有限公司 Processing method and processing device for hard disk failure
CN103778964A (en) * 2013-12-30 2014-05-07 上海晨思电子科技有限公司 Processing and using method, device and system for NAND Flash programmed data,
CN105389232A (en) * 2015-10-28 2016-03-09 武汉噢易云计算有限公司 Valid data analysis method for EXT file system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1963788A (en) * 2005-11-08 2007-05-16 中兴通讯股份有限公司 A managing method for EMS memory
CN103473157A (en) * 2012-06-06 2013-12-25 百度在线网络技术(北京)有限公司 Processing method and processing device for hard disk failure
CN103067170A (en) * 2012-12-14 2013-04-24 深圳国微技术有限公司 Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN103778964A (en) * 2013-12-30 2014-05-07 上海晨思电子科技有限公司 Processing and using method, device and system for NAND Flash programmed data,
CN105389232A (en) * 2015-10-28 2016-03-09 武汉噢易云计算有限公司 Valid data analysis method for EXT file system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
易飞: ""基于滚动加密在Linux文件***下的安全存储技术"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789070A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The decryption method of data, device and terminal
CN107333261A (en) * 2017-06-21 2017-11-07 努比亚技术有限公司 Method, storage medium and the mobile terminal of encryption data
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal

Similar Documents

Publication Publication Date Title
CN104391870B (en) Logistics information acquisition methods and device
CN105117033A (en) Connection method and device of external equipment
CN105607805A (en) Corner mark processing method and apparatus for application icon
CN104869569A (en) Network permission control method and apparatus of application program
CN105975156A (en) Application interface display method and device
CN105808050A (en) Information search method and device
CN104537380A (en) Clustering method and device
CN106126025A (en) Replicate the exchange method and device pasted
CN105843503A (en) Application starting method and device as well as terminal equipment
CN105095868A (en) Picture matching method and apparatus
CN106254646A (en) Network flux statistical method and device
CN106201108A (en) Glove control mode touch mode control method and device and electronic equipment
CN106156639A (en) Data partition encryption method and device
CN104281368A (en) Interface display method and device and terminal device
CN104850643A (en) Image comparison method and device
CN104715007A (en) User identification method and device
CN107423378A (en) Image display method and device
CN106201250A (en) Account changing method and device
CN105704322A (en) Weather information obtaining method and apparatus
CN105551047A (en) Picture content detecting method and device
CN105204712A (en) Method and device for displaying icons of folder
CN104240274A (en) Face image processing method and device
CN107239771A (en) Fingerprint calibration method and device
CN104219360A (en) Information processing method and device
CN106778198A (en) Perform the safety certifying method and device of operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123