CN106156639A - Data partition encryption method and device - Google Patents
Data partition encryption method and device Download PDFInfo
- Publication number
- CN106156639A CN106156639A CN201610495829.2A CN201610495829A CN106156639A CN 106156639 A CN106156639 A CN 106156639A CN 201610495829 A CN201610495829 A CN 201610495829A CN 106156639 A CN106156639 A CN 106156639A
- Authority
- CN
- China
- Prior art keywords
- group
- block group
- block
- encrypted piece
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure is directed to data partition encryption method and device.The method includes: judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group is non-free block group, encrypts described the most to be encrypted piece of group.Technique scheme, accelerates judgement speed, thus accelerates enciphering rate, save encryption times.
Description
Technical field
It relates to encryption technology field, particularly relate to data partition encryption method and device.
Background technology
At present, the document layout system on data partition is as follows: | bootstrap block | block group 0 | ... | block group n.Each
Block group information is as follows: | superblock (1) | group descriptor (n) | data block bitmap (1) | index node bitmap (1) | index joint
Point table (n) | data block (n).The method of encryption data subregion is as follows at present: read block group number information from superblock, one by one
Read each piece of group, when often reading block group: the data block bitmap in traversal block group, in this data block bitmap, each is labeled with block
(1 represents that corresponding data block is needed encryption by use to the service condition of the corresponding data block in group, and 0 represents corresponding data block
It is not used by need not encryption), often one piece of data used of traversal then encrypt this data block data.
Summary of the invention
Disclosure embodiment provides data partition encryption method and device.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of data partition encryption method, including:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is
Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group
It is non-free block group, encrypts described the most to be encrypted piece of group.
In one embodiment, the described the most to be encrypted piece of group judged in data partition is the most empty with default block group
Before not busy mark, described method also includes:
When initializing the block group in described data partition, in the block group that data block is not used by, write is described
The block group idle marker preset.
In one embodiment, described when the block group in described data partition is initialized, data block not by
The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and write is pre-in the block group that described data block is not used by
If block group idle marker.
In one embodiment, described when the block group in described data partition is initialized, data block not by
The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and writes in the block group that described data block is not used by
Enter default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group
The presupposed information write in symbol.
Second aspect according to disclosure embodiment, it is provided that a kind of data partition encryption device, including:
Judge module, for judging whether the most to be encrypted piece of group in data partition is marked with the default block group free time
Will;
First processing module, for when described the most to be encrypted piece of group is with described default block group idle marker, sentencing
Settled front to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;
Second processing module, for when described the most to be encrypted piece of group be not with described default block group idle marker,
Judge that the most to be encrypted piece of group is non-free block group, encrypt described the most to be encrypted piece of group.
In one embodiment, described device also includes:
Initialize processing module, whether write for the most to be encrypted piece of group judged in data partition at described judge module
Before having default block group idle marker, when the block group in described data partition is initialized, do not made in data block
Block group in write described default block group idle marker.
In one embodiment, described initialization processing module, including:
First initialization submodule, initializes for the block group being used data block;
Second initialization submodule, initializes for the block group being not used by data block, and in described data block
The block group being not used by writes default block group idle marker.
In one embodiment, described initialization processing module, including:
3rd initialization submodule, initializes for the block group being used data block;
Mark write submodule, initializes for the block group abandoning being not used by data block, and in described data
The block group that block is not used by writes default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group
The presupposed information write in symbol.
The third aspect according to disclosure embodiment, it is provided that a kind of data partition encryption device, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is
Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group
It is non-free block group, encrypts described the most to be encrypted piece of group.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
Technique scheme, it is only necessary to judge that the most to be encrypted piece of group, whether with default block group idle marker, just may be used
Determine whether the most to be encrypted piece of group is free block group, finally whether can encrypt the most to be encrypted piece of group by quick decision, with need
The value of the data block bitmap in block group to be traveled through just can determine the prior art whether block group is free block group and compare, above-mentioned side
Method accelerates judgement speed, thus accelerates enciphering rate, saves encryption times.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure
Example, and for explaining the principle of the disclosure together with description.
Figure 1A is the flow chart according to a kind of data partition encryption method shown in an exemplary embodiment;
Figure 1B is the flow chart according to the another kind of data partition encryption method shown in an exemplary embodiment;
Fig. 2 is the flow chart according to another the data partition encryption method shown in an exemplary embodiment;
Fig. 3 is the flow chart according to another the data partition encryption method shown in an exemplary embodiment;
Fig. 4 is the block diagram according to a kind of data partition encryption device shown in an exemplary embodiment;
Fig. 5 A is the block diagram according to the another kind of data partition encryption device shown in an exemplary embodiment;
Fig. 5 B is the block diagram according to another the data partition encryption device shown in an exemplary embodiment;
Fig. 6 is the block diagram according to another the data partition encryption device shown in an exemplary embodiment;
Fig. 7 is the block diagram according to another the data partition encryption device shown in an exemplary embodiment;
Fig. 8 is according to the block diagram being applicable to data partition encryption device shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended
The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Disclosure embodiment provides a kind of data partition encryption method, as shown in Figure 1A, including step S11-S13:
In step s 11, it is judged that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
If it is, judge that the most to be encrypted piece of group is free block group, perform step S12;Otherwise judge the most to be encrypted piece of group right and wrong
Free block group, performs step S13.
In step s 12, when above-mentioned the most to be encrypted piece of group is with default block group idle marker, it is determined that the most to be added
Close piece of group is free block group, abandons encrypting the most to be encrypted piece of group.Free block group in disclosure embodiment refers to that data block is not
The block group used.
In step s 13, when above-mentioned the most to be encrypted piece of group be not with default block group idle marker, it is determined that currently treat
Cryptographic block group is non-free block group, encrypts the most to be encrypted piece of group.Busy piece of group in disclosure embodiment refers to data block
The block group used.
The said method that disclosure embodiment provides, it is only necessary to judge that whether the most to be encrypted piece of group be with default block group
Idle marker, just can determine that out whether the most to be encrypted piece of group is free block group, and finally whether energy quick decision is encrypted and currently treated
Cryptographic block group, the existing skill that whether block group is free block group with needing the value traveling through the data block bitmap in block group just can determine
Art is compared, and said method accelerates judgement speed, thus accelerates enciphering rate, saves encryption times.
In one embodiment, such as Figure 1B, before performing step S11, said method can include step S10:
In step slo, when the block group in data partition initializes, write in the block group that data block is not used by
Enter above-mentioned default block group idle marker.
In one embodiment, as in figure 2 it is shown, above-mentioned steps S10 includes step S21-S22:
In the step s 21, the block group used data block initializes;The data block that will be used is in data block
Correspondence position in bitmap is 1;
In step S22, the block group being not used by data block initializes, and the block group being not used by data block
The block group idle marker that middle write is preset;In this operation, can write in the group descriptor of this block group that data block is not used by
Presupposed information;Specifically, EXT4_BG_BLOCK_UNINIT can be write in group descriptor indicate as idle marker.
In another embodiment, as it is shown on figure 3, above-mentioned steps S10 includes step S31-S32:
In step S31, the block group being used data block initializes;The data block that will be used is in data block
Correspondence position in bitmap is 1;
In step s 32, the block group abandoning being not used by data block initializes, and is not made in described data block
Block group in write default block group idle marker;In this operation, can describe in the group of this block group that data block is not used by
Symbol writes presupposed information;Specifically, EXT4_BG_BLOCK_UNINIT mark can be write in group descriptor as idle mark
Will.
The block group abandoning being not used by data block initializes, and also can accelerate initialization process, when saving initialization
Between.
Actual test shows, 64GB is formatted as to the data partition of ext4, a total of 396 of block group, wherein, if
Busy piece of group has 40, and free block group has 356, then, use the said method that disclosure embodiment provides to these data
Subregion is encrypted, and enciphering rate can be promoted about 9 times at its best.
Below as a example by a data partition to be encrypted, the said method that disclosure embodiment provides completely is described
Implementation process.As shown in Figure 4, during being somebody's turn to do, process the block group in data partition one by one, often process a block group and include following step
Rapid:
In step S41, it is judged that whether this block group is with default block group idle marker;If it is, judge this close piece
Group is free block group, performs step S42;Otherwise judge that this block group is non-free block group, perform step S43.
Wherein, abovementioned steps S21-S22 or step S31-S32 can be performed before step S41.
In step S42, when this block group is free block group, abandon encrypting this block group, continue to read next block group, and
Next block group is processed according to method shown in step S41-S43.
In step S43, when this block group is busy piece of group, encrypt this block group, after encryption, continue to read next block
Group, and process next block group according to method shown in step S41-S43.
The said method that disclosure embodiment provides, it is only necessary to judge that whether the most to be encrypted piece of group be with default block group
Idle marker, just can determine that out whether the most to be encrypted piece of group is free block group, and finally whether energy quick decision is encrypted and currently treated
Cryptographic block group, the existing skill that whether block group is free block group with needing the value traveling through the data block bitmap in block group just can determine
Art is compared, and said method accelerates judgement speed, thus accelerates enciphering rate, saves encryption times.
The said method that corresponding disclosure embodiment provides, disclosure embodiment provides a kind of data partition encryption device,
As shown in Figure 5A, including:
Judge module 51, the most to be encrypted piece of group being configured to judge in data partition is the most empty with default block group
Not busy mark;
First processing module 52, is configured as described the most to be encrypted piece of group with described default block group idle marker
Time, it is determined that the most to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;
Second processing module 53, is configured as described the most to be encrypted piece of group not with described default block group free time mark
During will, it is determined that the most to be encrypted piece of group is non-free block group, encrypt described the most to be encrypted piece of group.
In one embodiment, as shown in Figure 5 B, said apparatus may also include that
Initialize processing module 54, whether write for the most to be encrypted piece of group judged in data partition at judge module 51
Before having default block group idle marker, when the block group in data partition is initialized, it is not used by data block
Block group writes default block group idle marker.
In one embodiment, as shown in Figure 6, above-mentioned initialization processing module 54 comprises the steps that
First initialization submodule 61, the block group being configured to be used data block initializes;
Second initialization submodule 62, the block group being configured to be not used by data block initializes, and described
The block group that data block is not used by writes default block group idle marker.
In one embodiment, as it is shown in fig. 7, above-mentioned initialization processing module 54 device may also include that
3rd initialization submodule 71, the block group being configured to be used data block initializes;
Mark write submodule 72, the block group being configured to abandon being not used by data block initializes, and in institute
State and the block group that data block is not used by writes default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group
The presupposed information write in symbol.
The said method that corresponding disclosure embodiment provides, disclosure embodiment also provides for a kind of data partition encryption dress
Put, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is
Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group
It is non-free block group, encrypts described the most to be encrypted piece of group.
In one embodiment, described processor is also configured to:
Before whether the described the most to be encrypted piece of group judged in data partition be with default block group idle marker, described
Method also includes:
When initializing the block group in described data partition, in the block group that data block is not used by, write is described
The block group idle marker preset.
In one embodiment, described processor is also configured to:
Described when the block group in described data partition is initialized, write in the block group that data block is not used by
Described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and write is pre-in the block group that described data block is not used by
If block group idle marker.
In one embodiment, described processor is also configured to:
Described when the block group in described data partition is initialized, write in the block group that data block is not used by
Described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and writes in the block group that described data block is not used by
Enter default block group idle marker.
In one embodiment, described processor is also configured to:
Described default block group idle marker be included in described the most to be encrypted piece group group descriptor in write preset
Information.
Fig. 8 is the block diagram according to a kind of device 800 for data partition encryption shown in an exemplary embodiment.Example
As, device 800 can be mobile device, and such as mobile phone, computer, digital broadcast terminal, messaging devices, game controls
Platform, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Fig. 8, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply
Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and
Communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase
The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just
Mutual in process between assembly 802 and other assemblies.Such as, processing component 802 can include multi-media module, many to facilitate
Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data
Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile
Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash
Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between device 800 and user.Real at some
Executing in example, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can
To be implemented as touch screen, to receive the input signal from user.Touch panel include one or more touch sensor with
Gesture on sensing touch, slip and touch panel.Touch sensor can not only sense touch or the border of sliding action, and
And also detect and touch or persistent period that slide is relevant and pressure.In certain embodiments, multimedia groupware 808 includes
One front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during such as screening-mode or video mode, front
Put photographic head and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can
To be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined
It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800
Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as assembly
For display and the keypad of device 800, sensor cluster 814 can also detect device 800 or the position of 800 1 assemblies of device
Put change, the presence or absence that user contacts, device 800 orientation or acceleration/deceleration and the temperature of device 800 with device 800
Change.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact near detection
The existence of object.Sensor cluster 814 can also include optical sensor, and such as CMOS or ccd image sensor, being used for should in imaging
Use middle use.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensor, magnetic
Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device
800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement
In example, communication component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel.
In one exemplary embodiment, communication component 816 also includes near-field communication (NFC) module, to promote junction service.Such as,
Can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth
(BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as,
Non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light
Data storage device etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of mobile terminal
During row so that mobile terminal is able to carry out a kind of data partition encryption method, including:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is
Free block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group
It is non-free block group, encrypts described the most to be encrypted piece of group.
In one embodiment, the described the most to be encrypted piece of group judged in data partition is the most empty with default block group
Before not busy mark, described method also includes:
When initializing the block group in described data partition, in the block group that data block is not used by, write is described
The block group idle marker preset.
In one embodiment, described when the block group in described data partition is initialized, data block not by
The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and write is pre-in the block group that described data block is not used by
If block group idle marker.
In one embodiment, described when the block group in described data partition is initialized, data block not by
The block group used writes described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and writes in the block group that described data block is not used by
Enter default block group idle marker.
In one embodiment, described default block group idle marker is included in the group description of described the most to be encrypted piece of group
The presupposed information write in symbol.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or
Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (11)
1. a data partition encryption method, it is characterised in that including:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is idle
Block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group right and wrong
Free block group, encrypts described the most to be encrypted piece of group.
2. the method for claim 1, it is characterised in that whether the described the most to be encrypted piece of group judged in data partition
Before default block group idle marker, described method also includes:
When the block group in described data partition is initialized, the block group that data block is not used by writes described presetting
Block group idle marker.
3. method as claimed in claim 2, it is characterised in that described block group in described data partition is being initialized
Time, the block group that data block is not used by writes described default block group idle marker, including:
The block group being used data block initializes;
The block group being not used by data block initializes, and in the block group that described data block is not used by write preset
Block group idle marker.
4. method as claimed in claim 2, it is characterised in that described block group in described data partition is being initialized
Time, the block group that data block is not used by writes described default block group idle marker, including:
The block group being used data block initializes;
The block group abandoning being not used by data block initializes, and write is pre-in the block group that described data block is not used by
If block group idle marker.
5. the method as described in arbitrary in Claims 1-4, it is characterised in that
Described default block group idle marker is included in the group descriptor of described the most to be encrypted piece of group the presupposed information write.
6. a data partition encryption device, it is characterised in that including:
Judge module, for judging that whether the most to be encrypted piece in data partition organized with default block group idle marker;
First processing module, for when described the most to be encrypted piece of group is with described default block group idle marker, it is determined that when
Front to be encrypted piece of group is free block group, abandons encrypting described the most to be encrypted piece of group;
Second processing module, for when described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that
The most to be encrypted piece of group is non-free block group, encrypts described the most to be encrypted piece of group.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Initialize processing module, for judging that whether the most to be encrypted piece in data partition is organized with in advance at described judge module
If block group idle marker before, when the block group in described data partition is initialized, be not used by data block
Block group writes described default block group idle marker.
8. device as claimed in claim 7, it is characterised in that described initialization processing module, including:
First initialization submodule, initializes for the block group being used data block;
Second initialization submodule, initializes for the block group that is not used by data block, and described data block not by
The block group used writes default block group idle marker.
9. device as claimed in claim 7, it is characterised in that described initialization processing module, including:
3rd initialization submodule, initializes for the block group being used data block;
Mark write submodule, initializes for the block group abandoning being not used by data block, and in described data block not
The block group used writes default block group idle marker.
10. the device as described in arbitrary in claim 6 to 9, it is characterised in that
Described default block group idle marker is included in the group descriptor of described the most to be encrypted piece of group the presupposed information write.
11. 1 kinds of data partition encryption devices, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Judge that whether the most to be encrypted piece of group in data partition be with default block group idle marker;
When described the most to be encrypted piece of group is with described default block group idle marker, it is determined that the most to be encrypted piece of group is idle
Block group, abandons encrypting described the most to be encrypted piece of group;
When described the most to be encrypted piece of group be not with described default block group idle marker, it is determined that the most to be encrypted piece of group right and wrong
Free block group, encrypts described the most to be encrypted piece of group.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610495829.2A CN106156639A (en) | 2016-06-28 | 2016-06-28 | Data partition encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610495829.2A CN106156639A (en) | 2016-06-28 | 2016-06-28 | Data partition encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106156639A true CN106156639A (en) | 2016-11-23 |
Family
ID=57349687
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610495829.2A Pending CN106156639A (en) | 2016-06-28 | 2016-06-28 | Data partition encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106156639A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789070A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The decryption method of data, device and terminal |
CN107333261A (en) * | 2017-06-21 | 2017-11-07 | 努比亚技术有限公司 | Method, storage medium and the mobile terminal of encryption data |
CN108985104A (en) * | 2018-07-20 | 2018-12-11 | 南昌黑鲨科技有限公司 | The encryption method and intelligent terminal of intelligent terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1963788A (en) * | 2005-11-08 | 2007-05-16 | 中兴通讯股份有限公司 | A managing method for EMS memory |
CN103067170A (en) * | 2012-12-14 | 2013-04-24 | 深圳国微技术有限公司 | Encrypting file system, encrypting method and deciphering method based on EXT2 file system |
CN103473157A (en) * | 2012-06-06 | 2013-12-25 | 百度在线网络技术(北京)有限公司 | Processing method and processing device for hard disk failure |
CN103778964A (en) * | 2013-12-30 | 2014-05-07 | 上海晨思电子科技有限公司 | Processing and using method, device and system for NAND Flash programmed data, |
CN105389232A (en) * | 2015-10-28 | 2016-03-09 | 武汉噢易云计算有限公司 | Valid data analysis method for EXT file system |
-
2016
- 2016-06-28 CN CN201610495829.2A patent/CN106156639A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1963788A (en) * | 2005-11-08 | 2007-05-16 | 中兴通讯股份有限公司 | A managing method for EMS memory |
CN103473157A (en) * | 2012-06-06 | 2013-12-25 | 百度在线网络技术(北京)有限公司 | Processing method and processing device for hard disk failure |
CN103067170A (en) * | 2012-12-14 | 2013-04-24 | 深圳国微技术有限公司 | Encrypting file system, encrypting method and deciphering method based on EXT2 file system |
CN103778964A (en) * | 2013-12-30 | 2014-05-07 | 上海晨思电子科技有限公司 | Processing and using method, device and system for NAND Flash programmed data, |
CN105389232A (en) * | 2015-10-28 | 2016-03-09 | 武汉噢易云计算有限公司 | Valid data analysis method for EXT file system |
Non-Patent Citations (1)
Title |
---|
易飞: ""基于滚动加密在Linux文件***下的安全存储技术"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789070A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The decryption method of data, device and terminal |
CN107333261A (en) * | 2017-06-21 | 2017-11-07 | 努比亚技术有限公司 | Method, storage medium and the mobile terminal of encryption data |
CN108985104A (en) * | 2018-07-20 | 2018-12-11 | 南昌黑鲨科技有限公司 | The encryption method and intelligent terminal of intelligent terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104391870B (en) | Logistics information acquisition methods and device | |
CN105117033A (en) | Connection method and device of external equipment | |
CN105607805A (en) | Corner mark processing method and apparatus for application icon | |
CN104869569A (en) | Network permission control method and apparatus of application program | |
CN105975156A (en) | Application interface display method and device | |
CN105808050A (en) | Information search method and device | |
CN104537380A (en) | Clustering method and device | |
CN106126025A (en) | Replicate the exchange method and device pasted | |
CN105843503A (en) | Application starting method and device as well as terminal equipment | |
CN105095868A (en) | Picture matching method and apparatus | |
CN106254646A (en) | Network flux statistical method and device | |
CN106201108A (en) | Glove control mode touch mode control method and device and electronic equipment | |
CN106156639A (en) | Data partition encryption method and device | |
CN104281368A (en) | Interface display method and device and terminal device | |
CN104850643A (en) | Image comparison method and device | |
CN104715007A (en) | User identification method and device | |
CN107423378A (en) | Image display method and device | |
CN106201250A (en) | Account changing method and device | |
CN105704322A (en) | Weather information obtaining method and apparatus | |
CN105551047A (en) | Picture content detecting method and device | |
CN105204712A (en) | Method and device for displaying icons of folder | |
CN104240274A (en) | Face image processing method and device | |
CN107239771A (en) | Fingerprint calibration method and device | |
CN104219360A (en) | Information processing method and device | |
CN106778198A (en) | Perform the safety certifying method and device of operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161123 |