Encryption method and device

An encryption method and encryption device technology, applied in the field of communication, can solve problems such as unreadable data, data confusion, severe information security, etc., and achieve the effect of improving management efficiency and ensuring security

Active Publication Date: 2014-11-05
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, information is more easily leaked, and the security of information becomes more severe
In order to ensure the security of information and data, the existing solution is to encrypt and protect the files, even if the files are leaked, others cannot read the data in the files
[0003] However, when the existing te

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device
  • Encryption method and device
  • Encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] See figure 1 , The first embodiment of the encryption method of the present invention is proposed. The encryption method includes the following steps:

[0029] Step S101: Define at least two encryption levels

[0030] For example, three levels of encryption can be defined, namely primary encryption, secondary encryption, and tertiary encryption. The primary encryption only encrypts the file header, the secondary encryption encrypts the file content, and the tertiary encryption simultaneously encrypts the file. The header and file contents are encrypted. Or, primary encryption uses general key encryption, which can be decrypted by users with general authority; secondary encryption uses intermediate key encryption, and users with intermediate authority can decrypt; level three encryption uses advanced key encryption, and users with advanced authority can decrypt. Of course, you can define more encryption levels as needed.

[0031] Step S102: Establish a correspondence between ...

no. 2 example

[0039] See figure 2 , The second embodiment of the encryption method of the present invention is proposed. The encryption method includes the following steps:

[0040] Step S201: Define at least two encryption levels

[0041] Step S202: Establish the correspondence between the file name and the encryption level

[0042] This embodiment uses the file name in the file attribute to establish a correspondence with the encryption level.

[0043] Specifically, it can be the specific characters "#1", "#2", and "#3" in the file name, corresponding to primary encryption, secondary encryption, and tertiary encryption, respectively; or, the keyword "important" in the file name "," "very important" and "very important" correspond to level 1 to level 3 encryption respectively.

[0044] Step S203: Obtain the name of the file when encrypting the file

[0045] Step S204: Obtain the corresponding encryption level according to the correspondence between the file name and the encryption level

[0046] Ste...

no. 3 example

[0048] See image 3 , The third embodiment of the encryption method of the present invention is proposed. The encryption method includes the following steps:

[0049] Step S301: Define at least two encryption levels

[0050] Step S302: Establish the correspondence between the file type and the encryption level

[0051] This embodiment uses the file type in the file attribute to establish a corresponding relationship with the encryption level. The file type includes text files, multimedia files, application files, etc., among which text files can be subdivided into txt files, doc files, pdf files, etc. Files can be subdivided into graphic files, audio files, video files, etc.

[0052] Specifically, you can set text files to correspond to primary encryption, application files to correspond to secondary encryption, and multimedia files to correspond to tertiary encryption; or, doc files in text files correspond to primary encryption, and audio files in multimedia files correspond to Cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method and device. The encryption method includes the steps that at least two encryption levels are defined, and corresponding relations between file attributes and the encryption levels are established; when files are encrypted, the attributes of the files are obtained, and the files are encrypted according to the corresponding relations between the file attributes and the encryption levels and the corresponding encryption levels. According to the encryption method, the encryption levels and the corresponding relations between the file attributes and the encryption levels are preset, and therefore the files with different attributes can be encrypted at different levels, enciphered data can be managed in a classified mode, management efficiency is improved, data safety is guaranteed.

Description

Technical field [0001] The present invention relates to the field of communication technology, in particular to an encryption method and device. Background technique [0002] With the rapid development of communication technology, the transmission of information and data is becoming more convenient and faster, and the ways and scope for people to obtain information are becoming wider and wider. At the same time, information is easier to leak, and the security of information becomes more severe. In order to ensure the security of information and data, the existing solution is to encrypt and protect the files, even if the files are leaked, others cannot read the data in the files. [0003] However, when files are encrypted in the prior art, all encrypted files are unified into one encryption level. At present, more and more data are stored in the terminal, and their importance is different. If an encryption level is used uniformly, it will cause data confusion, low management effic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/6209G06F2221/2107
Inventor 苏磊
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products