VIRTUAL DISK MANAGEMENT METHODS
First Claim
Patent Images
1. A virtual disk management method, comprising:
- setting a file space;
setting a first password;
acquiring a first device code;
encrypting the first device code to obtain a disk root key;
encrypting the first password according to the disk root key to obtain a disk encryption key; and
encrypting the file space according to the disk encryption key to obtain an encrypted file, where the encrypted file is used for a virtual disk.
1 Assignment
0 Petitions
Accused Products
Abstract
Virtual disks management methods and systems. First, a file space is set and a first password is set. A first device code is acquired. The file space is encrypted according to the first password and the first device code to obtain an encrypted file. Thereafter, a designation of the encrypted file is received. A second password is received, and a second device code is acquired. It is determined whether the second password conforms to the first password, and whether the second device code conforms to the first device code. If so, the encrypted file is mounted as a virtual disk.
22 Citations
19 Claims
-
1. A virtual disk management method, comprising:
-
setting a file space;
setting a first password;
acquiring a first device code;
encrypting the first device code to obtain a disk root key;
encrypting the first password according to the disk root key to obtain a disk encryption key; and
encrypting the file space according to the disk encryption key to obtain an encrypted file, where the encrypted file is used for a virtual disk. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
8. A virtual disk management method, comprising:
-
setting a file space;
setting a first password;
acquiring a first device code;
encrypting the file space according to the first password and the first device code to obtain an encrypted file;
receiving a designation of the encrypted file;
receiving a second password;
acquiring a second device code;
determining whether the second password conforms to the first password;
determining whether the second device code conforms to the first device code;
if the second device code conforms to the first device code, and the second password conforms to the first password, mounting the encrypted file as a virtual disk. - View Dependent Claims (7, 9, 10, 11, 12, 13)
-
-
14. A virtual disk management method, comprising:
-
receiving a designation of an encrypted file;
receiving a second password;
acquiring a second device code;
decrypting a disk root key corresponding to the encrypted file to obtain a first device code;
determining whether the second device code conforms to the first device code;
decrypting a disk encryption key corresponding to the encrypted file according to the disk root key to obtain a first password;
determining whether the second password conforms to the first password; and
if the second device code conforms to the first device code, and the second password conforms to the first password, mounting the encrypted file as a virtual disk. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification