File encryption and decryption method

An encryption method and file encryption technology, which is applied in the field of general file encryption and decryption, can solve problems such as complex encryption algorithms, inability to guarantee file security, and slow computing speed of mobile terminals.

Inactive Publication Date: 2012-04-04
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional encryption algorithms are generally more complicated, and the operation speed on mobile terminals is relatively slow
At the same time, the current operating systems of most mobile terminals do not provide a file-based security access mechanism, and cannot guarantee the security of files during transmission and access (especially some malicious applications)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption and decryption method
  • File encryption and decryption method
  • File encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] At first, explain the basis of the present invention:

[0039] (1) The design of the whole algorithm: according to the size of the file, the file is divided into several sections, and then a certain amount of information is selected from the divided sections for encryption operation, and the required relevant information is stored in a data structure designed by oneself; The method is simple and efficient, and has good security, which is very suitable for systems and equipment that require high efficiency, making the user experience better;

[0040] (2) Design of encryption algorithm: First, use the pseudo-random number generation algorithm designed by yourself to generate a pseudo-random array for auxiliary key generation, and then use the algorithm designed by yourself to generate a non-repetitive pseudo-random array and user password. After the random sequence, the generated key and the content of the message are encrypted.

[0041] Second, the realization of specif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a file encryption and decryption method. An encryption method comprises the following steps that: a file is wholly divided into more than one subsections, and the subsection information is stored; the starting and ending positions of the data to be encrypted in each subsection are determined by a randomized algorithm, and the encryption position information is stored; an encryption key is generated according to a password, the data to be encrypted are encrypted by the encryption key, and the original data to be encrypted are replaced at an equal length to obtain an encrypted data part; the password, the total number of subsections, the encryption position information of each section, encrypted data head identification marks, and the length of an encrypted data head are packaged into an encrypted data head; the encrypted data head is put in front of the encrypted data part, and is combined with the encrypted data part to generate an encrypted file. A decryption method is a reverse process of the encryption method. The file encryption and decryption method can be quickly executed at a mobile terminal and is relatively safe.

Description

technical field [0001] The invention relates to a general file encryption and decryption method, which is especially suitable for mobile terminals. Background technique [0002] At present, more and more attention is paid to the information security of mobile terminals, and file encryption is an effective way to ensure information security. Traditional encryption algorithms are generally more complicated, and the calculation speed on mobile terminals is relatively slow. At the same time, the current operating systems of most mobile terminals do not provide a file-based security access mechanism, and cannot guarantee the security of files during transmission and access (especially some malicious applications). Contents of the invention [0003] The technical problem to be solved in the present invention is how to provide a file encryption and decryption method that can be quickly executed on a mobile terminal and is relatively safe. [0004] First technical problem of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F21/60
Inventor 曾元清
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products