File encryption operation method and file encryption operation system
A technology of file encryption and operation method, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as affecting the efficiency of encrypted files, and achieve the effect of improving security and efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] figure 1 A schematic flowchart of Embodiment 1 of the file encryption operation method of the present invention is shown in . In this embodiment, only the process of running an encrypted file is taken as an example for illustration.
[0024] Such as figure 1 As shown, the file encryption operation method in the first embodiment includes steps:
[0025] Step S101: receiving a file execution instruction;
[0026] Step S102: call the encrypted target file according to the file operation command, perform memory decryption on the encrypted target file according to the key information corresponding to the encrypted target file, and run the encrypted target file after memory decryption.
[0027] According to the scheme in this embodiment, when it is necessary to run the encrypted target file after encryption, it obtains the key information corresponding to the encrypted target file, and uses the key information in the memory to encrypt the encrypted target file. The file i...
Embodiment 2
[0034] figure 2 A schematic flowchart of Embodiment 2 of the file encryption operation method of the present invention is shown in . In this embodiment, the main difference from the method in the first embodiment above is that the method in this embodiment also combines the description of the file encryption process.
[0035] Such as figure 2 As shown, the method in the second embodiment includes steps:
[0036] Step S201: receiving a file encryption instruction;
[0037] Step S202: Obtain an encrypted target file after encrypting the file to be encrypted, and generate key information corresponding to the encrypted target file;
[0038] Step S203: storing the above-mentioned key information corresponding to the above-mentioned encrypted target file;
[0039] Step S204: receiving a file execution instruction;
[0040] Step S205: call the encrypted target file according to the above-mentioned file operation instruction, perform memory decryption on the encrypted target fi...
Embodiment 3
[0049] image 3 A schematic flowchart of Embodiment 3 of the file encryption operation method of the present invention is shown in . In this embodiment, the main difference from the first embodiment above is that this embodiment is described in conjunction with an identity verification process.
[0050] Such as image 3 As shown, the file encryption operation method in the third embodiment includes steps:
[0051] Step S301: receiving an identity verification instruction, and verifying the user's login identity;
[0052] Step S302: After the identity verification is passed, obtain the encrypted target file list corresponding to the verified identity;
[0053] Step S303: receiving the file execution instruction through the above-mentioned encrypted target file list;
[0054] Step S304: call the encrypted target file according to the above-mentioned file operation instruction, perform memory decryption on the encrypted target file according to the key information correspondi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 