Unlock instant, AI-driven research and patent intelligence for your innovation.

File encryption operation method and file encryption operation system

A technology of file encryption and operation method, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as affecting the efficiency of encrypted files, and achieve the effect of improving security and efficiency

Active Publication Date: 2012-12-12
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on this method, when it is necessary to run or run a file decrypted from the memory, it is necessary to manually enter the password of the file to be run, and run the file after the password verification is correct, which seriously affects the efficiency of running the encrypted file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption operation method and file encryption operation system
  • File encryption operation method and file encryption operation system
  • File encryption operation method and file encryption operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 A schematic flowchart of Embodiment 1 of the file encryption operation method of the present invention is shown in . In this embodiment, only the process of running an encrypted file is taken as an example for illustration.

[0024] Such as figure 1 As shown, the file encryption operation method in the first embodiment includes steps:

[0025] Step S101: receiving a file execution instruction;

[0026] Step S102: call the encrypted target file according to the file operation command, perform memory decryption on the encrypted target file according to the key information corresponding to the encrypted target file, and run the encrypted target file after memory decryption.

[0027] According to the scheme in this embodiment, when it is necessary to run the encrypted target file after encryption, it obtains the key information corresponding to the encrypted target file, and uses the key information in the memory to encrypt the encrypted target file. The file i...

Embodiment 2

[0034] figure 2 A schematic flowchart of Embodiment 2 of the file encryption operation method of the present invention is shown in . In this embodiment, the main difference from the method in the first embodiment above is that the method in this embodiment also combines the description of the file encryption process.

[0035] Such as figure 2 As shown, the method in the second embodiment includes steps:

[0036] Step S201: receiving a file encryption instruction;

[0037] Step S202: Obtain an encrypted target file after encrypting the file to be encrypted, and generate key information corresponding to the encrypted target file;

[0038] Step S203: storing the above-mentioned key information corresponding to the above-mentioned encrypted target file;

[0039] Step S204: receiving a file execution instruction;

[0040] Step S205: call the encrypted target file according to the above-mentioned file operation instruction, perform memory decryption on the encrypted target fi...

Embodiment 3

[0049] image 3 A schematic flowchart of Embodiment 3 of the file encryption operation method of the present invention is shown in . In this embodiment, the main difference from the first embodiment above is that this embodiment is described in conjunction with an identity verification process.

[0050] Such as image 3 As shown, the file encryption operation method in the third embodiment includes steps:

[0051] Step S301: receiving an identity verification instruction, and verifying the user's login identity;

[0052] Step S302: After the identity verification is passed, obtain the encrypted target file list corresponding to the verified identity;

[0053] Step S303: receiving the file execution instruction through the above-mentioned encrypted target file list;

[0054] Step S304: call the encrypted target file according to the above-mentioned file operation instruction, perform memory decryption on the encrypted target file according to the key information correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file encryption operation method and a file encryption operation system. The method comprises the steps of: receiving a file operation instruction; transferring an encrypted target file according to the file operation instruction; carrying out memory decryption on the encrypted target file according to key information corresponding to the encrypted target file, and operating the encrypted target file after memory decryption. According to the scheme disclosed by the invention, the password of the encrypted target file does not need to be manually input; opening and operating of the file can be achieved by decrypting the file without a manual operation, and the operating efficiency of the key information is improved. On the other hand, the encrypted target file is decrypted by the key information in the memory; the decrypted file is stored in the memory, and a permanent file is not generated, therefore, the password is not stolen by the others, and the operating security of the encrypted file is improved.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a file encryption operation method and a file encryption operation system. Background technique [0002] With the increasing development and wide application of computers, mobile phones, and other terminal electronic devices, security issues have been paid more and more attention. One type of security is embodied in the security protection of specific files (including software, etc.). For the protection of this specific file, the current method is to encrypt these files through encryption and decryption software, etc. When the file needs to be run or run, after entering the correct password of the encryption and decryption software, the user can find the encrypted file. After entering the password of the file to be run or run correctly, the file is decrypted, and after the decryption is completed, run or run the file or software after the decrypted memory. Based on thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
CPCH04L9/3268G06F21/00G06F21/6218G06F2221/2107G06F2221/2143
Inventor 李丹华
Owner TENCENT TECH (SHENZHEN) CO LTD