Method for disordering, splitting, storing, combining and mutually validating files

A file and random order technology, applied in the direction of digital data protection, etc., can solve the problems of forged secret information, secret leakage, lack of file integrity detection and mutual integrity detection, etc., to achieve high security performance and high security effects

Active Publication Date: 2015-07-08
韩萧 +3
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this improves the security of confidential files to a certain extent, there is a fatal problem in this measure, that is, because the files are divided sequentially, although the attacker may only obtain a part of the divided files, when the attack After the attacker cracks this part of the file, the secrets contained in this part of the file will still be revealed
[0004] In addition, when a part of the split file is maliciously modified, none of the existing products will alarm and notify the user that the file has been modified, that is, the lack of self-integrity detection and mutual integrity detection of the file, which will lead to the final synthesis In more serious cases, the attacker may forge secret information and make a wrong decision, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for disordering, splitting, storing, combining and mutually validating files
  • Method for disordering, splitting, storing, combining and mutually validating files
  • Method for disordering, splitting, storing, combining and mutually validating files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0115] To further illustrate the present invention, specific examples are given as follows. But the content of the present invention is not limited to the content involved in the embodiment.

[0116] Explanation 1: For the sake of illustration, it is assumed that the object to be processed is a text file (a file storage format), its file name is example.txt, its length is 44 bytes, and its content is "ABCDEFGH12345678IJKLMNOP87654321QRSTUVWX90YZ" 44 characters.

[0117] Explanation 2: Put the file into a 16-column matrix in units of characters, and fill in 0 for the insufficient elements in the last row. See the attached file for the storage format figure 1 .

[0118] Explanation 3: Assume that the user needs to divide the file example.txt into three parts to generate three random magic squares M 1 , M 2 , M 3 , see attached figure 2 , attached image 3 , attached Figure 4 .

[0119] An example of magic square mixing in the file example.txt.

[0120]Process 1: Accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for disordering, splitting, storing, combining and mutually validating files. The method is characterized in that the method includes the following steps: A. file disordering; B. magic square encryption; C. file restoration and mutual validation. The method has good security and high efficiency, and is provided with the function of mutual validation. The method has the following advantages: the disorder of split files, the high security of the magic square encryption algorithm and the validation of self integrity and mutual integrity of combined files.

Description

technical field [0001] The invention relates to a method for distributed safe storage of computer files, in particular to a method for mixing, dividing, encrypting, distributed storing, mutual verification, decryption, synthesis and restoration of computer files. technical background [0002] With the continuous development and progress of modern technology, the security of computer information, especially the security of computer file information is becoming more and more prominent. Leakage of computer file information can easily cause immeasurable losses, and the existing computer file storage technology has serious defects, making it difficult to achieve the goal of keeping computer files confidential. Therefore, it is necessary to solve the problem of safe storage of computer files. The commonly used computer file protection measures are to directly encrypt and store the files in the computer or mobile storage device, but when the device containing the confidential files...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64
Inventor 韩萧马代武王启萱王钰水谢涛韩维峰肖屈瑶李若豫马博张燕王雨桃王丽王丽宾
Owner 韩萧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products