Unlock instant, AI-driven research and patent intelligence for your innovation.

A file encryption method and system for mobile intelligent terminal

A mobile intelligent terminal and file encryption technology, which is applied in the field of file encryption methods and systems, can solve the problems of insecure storage of files in mobile terminals, slow encryption efficiency, etc., and achieve the effects of improving operating efficiency, ensuring security levels, and ensuring security

Inactive Publication Date: 2015-09-02
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a file encryption method and file encryption system for mobile smart terminals, aiming to solve the problem of insecure mobile terminal files caused by ignoring security or ignoring efficiency in the prior art Storage or encryption efficiency is too slow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file encryption method and system for mobile intelligent terminal
  • A file encryption method and system for mobile intelligent terminal
  • A file encryption method and system for mobile intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 It is a flowchart of the file encryption method according to the first embodiment of the present invention. figure 1 Explain in detail the steps of the method:

[0034] In step S110 (the word "step" is omitted below), an encryption key corresponding to the protection level is generated.

[0035] In this step, first select the file to be encrypted (referred to as the file to be encrypted), and then the user selects the protection level of the encrypted file according to the importance of the selected file.

[0036] Preferably, when the user is prompted to select the file protection level, this step can select the protection level of the file to be encrypted according to the protection level actually required by the user, and generate file encryption keys of different lengths. Because the encryption system is very secure Part of it is determined by the length of the key, but a long key will inevitably lead to the result of slow file encryption during the encryption proc...

Embodiment 2

[0045] figure 2 It is a flowchart of the file encryption method according to the second embodiment of the present invention. The second embodiment is a further improved encryption method based on the first embodiment. The following combination figure 2 Explain in detail the steps of the method:

[0046] S210: Generate an encryption key corresponding to the protection level.

[0047] This step is the same as S110 in the first embodiment. I will not go into details here.

[0048] S215: Generate a transformation matrix, and perform an exclusive OR operation on the file to be encrypted and the transformation matrix.

[0049] Before encrypting the file to be encrypted, it is XORed with a transformation matrix, which can still ensure the security of the file even if the encryption key is leaked. Preferably, the transformation matrix may be a matrix composed of random numbers generated by the system, and the matrix is ​​generated by adding a random value as a seed to the system time, whic...

Embodiment 3

[0058] image 3 It is a structural block diagram of a file encryption system according to the third embodiment of the present invention. The following combination image 3 Explain in detail the composition of the file encryption system.

[0059] The file encryption system corresponds to the file encryption method in the first embodiment, and includes the following units:

[0060] The key generation unit generates an encryption key corresponding to the protection level.

[0061] In this unit, first select the file to be encrypted (referred to as the file to be encrypted), and then the user selects the protection level of the encrypted file according to the importance of the selected file.

[0062] Preferably, when the user is prompted to select the file protection level, this unit can select the protection level of the file to be encrypted according to the protection level actually required by the user, and generate file encryption keys of different lengths. Because the encryption syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file encryption method applied to the mobile terminal field and a system thereof. The method comprises the following steps: a key generation step, which means that an encryption key corresponded to a protection class is generated; a file encryption step, which means that encryption is carried out on a to-be-encrypted file on the basis of the encryption key so as to obtain an encrypted file; a key encryption step, which means that encryption is carried out on the encrypted encryption key according to a user password; and a write-in step, which means that the encrypted encryption key is written in an appointed location of the encrypted file. According to the method provided in the invention, time that is needed to inquire a key during reading of a file by a user can be saved; security on an encrypted key can be well ensured; and thus, security on the file can be improved.

Description

Technical field [0001] The present invention relates to a file encryption technology, in particular to a hierarchical file encryption method and system for mobile smart terminals. Background technique [0002] File encryption is a technology that automatically encrypts the data written to the storage medium at the operating system level according to requirements. The file is encrypted to prevent file information from being stolen. With the widespread application of mobile smart terminals, more and more hackers are targeting mobile smart terminal users, and more and more users’ file information is stolen. Therefore, the user’s file information in mobile smart terminals is effectively encrypted. It seems particularly important. [0003] The Android (trademark) operating system is the name of an open source mobile smart terminal operating system based on the Linux platform released by Google on November 5, 2007. The platform is composed of an operating system, middleware, user interf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08
Inventor 卞佳丽张峻明邝坚鲁琲
Owner BEIJING UNIV OF POSTS & TELECOMM