File encryption and decryption method and device on the basis of partitions

A file encryption and partitioning technology, applied in the field of information security, can solve the problems of weak encryption function, simple encryption key, and too simple encryption mechanism, so as to ensure the security and improve the complexity.

Inactive Publication Date: 2014-07-09
ASIA EURO BOLOD INFORMATION SECURITY TECHHUNAN
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some file editors integrate encryption tools themselves, such as PDF, WORD, EXCEL and other editors. In fact, the encryption functions of these

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption and decryption method and device on the basis of partitions
  • File encryption and decryption method and device on the basis of partitions
  • File encryption and decryption method and device on the basis of partitions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0038] refer to figure 1 As shown, it is a schematic flow chart of the partition-based file encryption method according to the embodiment of the present invention. The described partition-based file encryption method comprises:

[0039] Step 101, select a partition for storing files to be encrypted, including partition header, file area and free area (such as figure 2 Schematic diagram of the structure of the encrypted partition shown in ).

[0040] Step 102, generate a random number and store it in the header of the partition as the salt value of the encrypted partition. Among them, the so-called salt value is to ensure that the hash values ​​of any two user passwords are different, and before encrypting the password...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file encryption method and device on the basis of partitions. The method includes that file encryption partitions which are protected by user password and/or key file are established; firstly, one of partitions is selected, which comprises a partition head, a file area and an idle area; then a random number is generated and stored as a salt figure in a first part of the partition head, and a file encryption key is generated to encrypt file data of the file area; the password and/or the key file set by a user are/is read, a user encryption key is generated by the password and/or the key file and the salt figure, and the file encryption key is encrypted according to the generated user encryption key to be stored on a tail portion of the partition head; a file encryption partition is loaded, which includes that a drive is distributed to the file encryption partition; after the use of the encryption partition is finished, the file encryption partition is unloaded, which includes that the drive of the file encryption partition is released. Thereby, by means of the method and the device, strength and encryption strength of the file password can be improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a partition-based file encryption and decryption method and device. Background technique [0002] The popularity of the Internet has made it easy to obtain, share and transmit information, but it also increases the risk of important information leakage, so various file encryption methods and tools emerge in endlessly. Some encryption tools use the operating system to change the attributes of files (folders) to achieve the purpose of encryption. Strictly speaking, this method is not encryption, at best it is a method of keeping secrets, because no real encryption operation is performed on files (folders). And this method depends on the specific operating system. Once the file (folder) leaves the original operating system, it can be displayed by other systems. Some file editors integrate encryption tools themselves, such as PDF, WORD, EXCEL and other editors. In fact,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78
CPCG06F21/6209G06F2221/2107
Inventor 杨志坚成连
Owner ASIA EURO BOLOD INFORMATION SECURITY TECHHUNAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products