File encryption method

A file encryption and file technology, applied in the field of encryption, can solve the problems of reducing the security and reliability of encrypted packaged files, and achieve the effect of increasing difficulty and improving security and reliability

Inactive Publication Date: 2013-09-04
HUBEI NORMAL UNIV
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in related technologies, in order to obtain the file content in the encrypted package file, an illegal user bypasses the key of the encrypted file and directly extracts the content in the encrypted package file, which greatly reduces the security and reliability of the encrypted package file encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method
  • File encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Embodiment 1 of the present invention provides a file encryption method, such as figure 1 As shown, the main processing steps include:

[0020] Step S11: Determine the target storage method of the encrypted package file according to the instruction;

[0021] Step S12: If it is determined that the target storage mode of the file to be encrypted is the local basic storage mode, then determine the feature information of the file to be encrypted;

[0022] Step S13: cutting the file to be encrypted and packaged according to the feature information to form file blocks;

[0023] Step S14: Shuffle the order of the blocks of the files and combine them into a random file;

[0024] Step S15: Pack and package the out-of-sequence files to form a package file.

[0025] If an illegal user wants to bypass the feature information to extract the files in the packaged file, even if the feature information of the packaged file is bypassed, they can only extract out-of-order files formed...

Embodiment 2

[0061] Embodiment 2 provides a file encryption method, the main processing steps include:

[0062] Step S21: Determine the target storage method of the file to be encrypted and packaged according to the instruction;

[0063] Step S22: If it is determined that the target storage mode of the file to be encrypted and packaged is a local read-only storage mode, then convert the packaged file to be encrypted into a streaming media data frame;

[0064] Step S23: Determine the characteristic information of the streaming media data frame;

[0065] Step S24: According to the feature information, the stream media data frames are scrambled and combined into a scrambled file;

[0066] Step S25: Pack and package the out-of-sequence files to form a package file.

[0067] Preferably, when the packaged file to be encrypted is a document file, such as a word file, a text document or an electronic form, the information in the document file is not only easy to be identified and read, but also ...

Embodiment 3

[0097] Step S31: Determine the target storage method of the encrypted packaged file according to the instruction;

[0098] Step S32: When it is determined that the target storage method of the file to be encrypted and packaged is a cloud storage method, after storing the packaged file to be encrypted in the cloud server, the cloud server sends cloud link information;

[0099] Step S33: Determine the feature information of the cloud link information;

[0100] Step S34: Segment the cloud link information according to the feature information to form link information segments;

[0101] Step S35: Shuffle the sequence of the link information segments and combine them into a random file;

[0102] Step S36: Pack and package the out-of-sequence files to form a package file.

[0103] The feature information set in this embodiment may include one or more of time stamp information, predetermined opening location information, verification password information, predetermined opening user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of encryption, in particular to a file encryption method which comprises the steps that a target storing mode of a packed file to be encrypted is determined according to an instruction; if the determined target storing mode of the packed file to be encrypted is a local basic storing mode, the feature information of the packed file to be encrypted is determined; the packed file to be encrypted is cut according to the feature information to form file blocks; the sequence of the file blocks is disorganized, then the file blocks form an out-of-order file; the out-of-order file is packed and packaged to form a packaged file. According to the file encryption method, obtaining the packed file to be encrypted in the packaged file is complex, the difficult of the process of obtaining file content in the packaged file is increased, and accordingly safety and reliability of encryption of the encrypted packaged file can be improved.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a file encryption method. Background technique [0002] To prevent information leakage, files need to be encrypted. [0003] In related technologies, the method for encrypting files is: write a key for the file to be encrypted and packaged; save the written key in the packaged file generated, and when the user needs to read the packaged file to be encrypted in the packaged file, Just enter the correct key. [0004] However, in related technologies, in order to obtain the file content in the encrypted package file, an illegal user bypasses the key of the encrypted file and directly extracts the content in the encrypted package file, which greatly reduces the security and reliability of the encryption of the encrypted package file. Contents of the invention [0005] The object of the present invention is to provide a file encryption method to solve the above problems. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10
Inventor 付弦
Owner HUBEI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products