Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for invisibly storing file in encrypted manner

A technology for encrypted storage and files, applied in the field of invisible encrypted storage methods and systems for files, can solve the problems of lack of encryption and division methods, and cannot prevent illegal reading or modification of data in reserved areas, so as to achieve data security and improve data security. safety effect

Inactive Publication Date: 2013-07-17
SUZHOU CODYY NETWORK SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, people will store files in pre-divided reserved areas. This method improves the security of file storage to a certain extent, but due to the lack of reasonable encryption and division methods when storing files, it still cannot prevent file storage. The data in the area is illegally read or modified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for invisibly storing file in encrypted manner
  • Method and system for invisibly storing file in encrypted manner
  • Method and system for invisibly storing file in encrypted manner

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] figure 1 Shown is a flow chart of the file stealth encryption storage method provided according to a preferred embodiment of the present invention. like figure 1 As shown, the file stealth encrypted storage method provided by the preferred embodiment of the present invention includes steps 101-104.

[0013] Step 101: The file processor receives the file sent by the client, generates an encrypted file according to the first policy, and sends the encrypted file to the controller.

[0014] Specifically, the file processor generates the encrypted file according to the first strategy as follows: the file processor divides the file into blocks according to the preset number of blocks and uses a block algorithm to combine the files; Add a check code to the beginning and end of the file block (defined as: the first data); use the MD5 algorithm to calculate the file signature of the first data (defined as: the second data); combine the primary first data, the backup first data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for invisibly storing a file in an encrypted manner. The method includes the steps: receiving the file transmitted by a client by a file processor, generating an encrypted file according to a first strategy and transmitting the encrypted file to a controller; acquiring the size of residual storage space and the number of clusters of a memory by the controller; acquiring a file assignment table according to a second strategy and transmitting the encrypted file and the file assignment table to a file distributor by the controller if the residual storage space of the memory is larger than or equal to the size of the encrypted file; and storing the encrypted file in the clusters in the residual storage space by the file distributor according to the received file assignment table and the received encrypted file.

Description

technical field [0001] The invention belongs to the field of instant communication, and in particular relates to a method and system for invisible encrypted storage of files. Background technique [0002] With the continuous progress of the networked society, more and more instant messaging tools are applied to work and life, such as Fetion, MSN and some enterprise application software. In practical applications, the security of file storage plays a vital role in the use of video conferencing. In the prior art, people will store files in pre-divided reserved areas. This method improves the security of file storage to a certain extent, but due to the lack of reasonable encryption and division methods when storing files, it still cannot prevent file storage. The data in the area is illegally read or modified. Contents of the invention [0003] The present invention provides a file invisible encryption storage method and system to solve the above problems. [0004] The inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L12/58
Inventor 胡加明刘晓东其他发明人请求不公开姓名
Owner SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products