Application-layer file hiding method on Windows operating system

Application-layer file hiding method on Windows operating system

  • CN 104,036,201 A
  • Filed: 06/25/2014
  • Published: 09/10/2014
  • Est. Priority Date: 06/25/2014
  • Status: Active Application
First Claim
Patent Images

1. the application layer file hiding method under Windows operating system, is characterized in that, the method for reading data that comprises data-hiding method and recover for hiding data, and wherein, the concrete steps of described file hiding method are:

  • Step a1;

    the disk partition table under traversal Windows operating system, find the start sector number of each subregion and finish sector number, find the sector number of sector, disk end;

    Step a2;

    the partition information finding according to step a1, calculates utilizable subregion gap and available sector, end;

    Step a3;

    scattered the utilized sector that tissue gets, forms complete a utilized space;

    Step a4;

    initialization is carried out in the space obtaining in step a3, corresponding data structures is set, the relevant information of minute book small files system;

    Step a5;

    file that will be hiding is saved in the middle of corresponding space after by corresponding regular compress-encrypt, log file relevant information;

    The concrete steps of method for reading data are;

    Step b1;

    the disk partition table under traversal Windows operating system, find the start sector number of each subregion and finish sector number, find the sector number of sector, disk end;

    Step b2;

    the partition information finding according to step b1, calculates the sector number at the system head place of the small files system of this programme design;

    Step b3;

    according to the sector number at this small files system place obtaining in step b2, read relevant information, obtain the relevant information of the file in space;

    Step b4;

    according to the fileinfo obtaining in step b3, specified file is read, deciphering is saved in the middle of operating system after decompressing.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×