A file encryption method and system for mobile intelligent terminal
A mobile intelligent terminal and file encryption technology, which is applied in the field of file encryption methods and systems, can solve the problems of insecure storage of files in mobile terminals, slow encryption efficiency, etc., and achieve the effects of improving operating efficiency, ensuring security levels, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] figure 1 It is a flowchart of the file encryption method according to the first embodiment of the present invention. figure 1 Explain in detail the steps of the method:
[0034] In step S110 (the word "step" is omitted below), an encryption key corresponding to the protection level is generated.
[0035] In this step, first select the file to be encrypted (referred to as the file to be encrypted), and then the user selects the protection level of the encrypted file according to the importance of the selected file.
[0036] Preferably, when the user is prompted to select the file protection level, this step can select the protection level of the file to be encrypted according to the protection level actually required by the user, and generate file encryption keys of different lengths. Because the encryption system is very secure Part of it is determined by the length of the key, but a long key will inevitably lead to the result of slow file encryption during the encryption proc...
Embodiment 2
[0045] figure 2 It is a flowchart of the file encryption method according to the second embodiment of the present invention. The second embodiment is a further improved encryption method based on the first embodiment. The following combination figure 2 Explain in detail the steps of the method:
[0046] S210: Generate an encryption key corresponding to the protection level.
[0047] This step is the same as S110 in the first embodiment. I will not go into details here.
[0048] S215: Generate a transformation matrix, and perform an exclusive OR operation on the file to be encrypted and the transformation matrix.
[0049] Before encrypting the file to be encrypted, it is XORed with a transformation matrix, which can still ensure the security of the file even if the encryption key is leaked. Preferably, the transformation matrix may be a matrix composed of random numbers generated by the system, and the matrix is generated by adding a random value as a seed to the system time, whic...
Embodiment 3
[0058] image 3 It is a structural block diagram of a file encryption system according to the third embodiment of the present invention. The following combination image 3 Explain in detail the composition of the file encryption system.
[0059] The file encryption system corresponds to the file encryption method in the first embodiment, and includes the following units:
[0060] The key generation unit generates an encryption key corresponding to the protection level.
[0061] In this unit, first select the file to be encrypted (referred to as the file to be encrypted), and then the user selects the protection level of the encrypted file according to the importance of the selected file.
[0062] Preferably, when the user is prompted to select the file protection level, this unit can select the protection level of the file to be encrypted according to the protection level actually required by the user, and generate file encryption keys of different lengths. Because the encryption syste...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 