File breaking encryption-based file security protection method

A technology of security protection and encryption algorithm, applied in the field of document security protection based on file fragmentation and encryption, it can solve the problems of encryption algorithm restoration, illegal acquisition of document keys, etc., and achieve the effect of solving leakage.

Active Publication Date: 2013-10-09
BEIJING CHERILEAD TECH
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a document security protection method based on file fragmentation and encryption. Through document fragmentation, reorganization, distributed storage and other technologies, it solves the problems of exhaustive enumeration of documents, illegal acquisition of keys, and restoration of encryption algorithms after being cracked. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File breaking encryption-based file security protection method
  • File breaking encryption-based file security protection method
  • File breaking encryption-based file security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The main innovation in the file security protection method based on file fragmentation encryption provided by the present invention is the document fragmentation and reorganization technology: traditional encryption systems use keys and encryption algorithm strengths to ensure the security of encrypted data. Based on the traditional encryption method, the present invention introduces "ciphertext fragmentation" technology to further enhance the security of file access. The basic idea of ​​"ciphertext fragmentation" technology is: use the document fragmentation algorithm to fragment the original file A into file header A0 and multiple ciphertext fragments A1, A2...An, and store A1, A2...An in the user terminal and the dedicated server respectively superior. No matter which fragment is obtained, it is very difficult to restore the original information from it. When the user opens the file and clicks the file header A0 on the user terminal, the system authenticates the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a file breaking encryption-based file security protection method. The method comprises the following steps: breaking an original file into a plurality of fragments with variable lengths by a filter driver according to a specific broken algorithm; carrying out transparent encryption processing on all the fragments by using an encryption algorithm according an encryption strategy; and then storing cryptograph fragments into a fragment cloud storage server. According to the invention, the beneficial effects of the method are as follows: because any original file in any mode including an encrypted mode or an unencrypted mode does not exist locally, the possibility of restoring of the original file from incomplete cryptograph fragments is almost zero, thereby solving a problem of leaking at a client fundamentally.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a file security protection method based on file fragmentation and encryption. Background technique [0002] Document security technology is generally divided into two types: one is access control, which restricts only users with specific permissions to read and write electronic documents under the relevant permissions through software and hardware, but once an illegal intruder obtains this permission, it can also be used as Normal users can also obtain confidential files on the computer; the other is data encryption, which encrypts confidential data into ciphertext by certain means, so that even if it is obtained by illegal intruders, the real content of the file cannot be read. The message is protected. Encryption software has been widely used in major enterprises and institutions to protect internal confidential files, but traditional encryption software ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 丁凯
Owner BEIJING CHERILEAD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products