Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for stealth processing of files

A file processing and file technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of illegal reading or modification of data in the reserved area, lack of encryption and division methods, etc., to achieve data security. Effect

Inactive Publication Date: 2015-09-30
SUZHOU CODYY NETWORK SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, people will store files in pre-divided reserved areas. This method improves the security of file storage to a certain extent, but due to the lack of reasonable encryption and division methods when storing files, it still cannot prevent file storage. The data in the area is illegally read or modified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for stealth processing of files
  • A method and system for stealth processing of files
  • A method and system for stealth processing of files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0024] figure 1 Shown is a flow chart of the method for file concealment processing provided according to the first preferred embodiment of the present invention. Figure 9 Shown is a schematic diagram of a parabola provided according to a preferred embodiment of the present invention. figure 2 Shown is a schematic diagram of the file concealment processing system provided according to the first preferred embodiment of the present invention. Please also refer to figure 1 , figure 2 and Figure 9 . Such as figure 1 As shown, the method for invisible file processing provided by the first preferred embodiment of the present invention includes steps 101-104.

[0025] Step 101: The file processo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for file invisibility processing and a system for the file invisibility processing. The method comprises the following steps: a file sent by a client terminal is received by a file processor; according to a first strategy, an encrypted file is generated and sent to a controller. The size of free storage space of a strategy execution server and the number of clusters are obtained by the controller. If the size of the free storage space of the strategy execution server is larger than or equal to the size of the encrypted file, a file allocation table is obtained and the encrypted file and the file allocation table are sent to the strategy execution server by the controller according to a second strategy. The encrypted file is stored in the clusters in the free storage space of the strategy execution server according to the received file allocation table and the received encrypted file through the strategy execution server.

Description

technical field [0001] The invention belongs to the field of instant communication, and in particular relates to a method and system for stealth processing of files. Background technique [0002] With the continuous progress of the networked society, more and more instant messaging tools are applied to work and life, such as Fetion, MSN and some enterprise application software. In practical applications, the security of file storage plays a vital role in the use of video conferencing. In the prior art, people will store files in pre-divided reserved areas. This method improves the security of file storage to a certain extent, but due to the lack of reasonable encryption and division methods when storing files, it still cannot prevent file storage. The data in the area is illegally read or modified. Contents of the invention [0003] The present invention provides a method and system for file invisible processing to solve the above problems. [0004] The invention provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58G06F21/60
Inventor 胡加明刘晓东
Owner SUZHOU CODYY NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products