Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for file transparent encryption and decryption of Android platform

A transparent encryption and decryption, file technology, applied in the field of information security, can solve the problems such as permissions cannot protect specific directories, system integration is low and vulnerable, and cannot protect SD card files, etc., to enhance encryption and decryption efficiency, and reduce user operation interference. , the effect of enhancing system security

Active Publication Date: 2014-12-31
SUQIAN XINCHAO INFORMATION TECH CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These file protection systems frequently require users to enter passwords and choose to encrypt and decrypt files, which reduces the convenience of the device
On the other hand, the existing transparent encryption and decryption system reduces the impact on user operating habits, but the protection work is not comprehensive: for example, due to permission issues, it cannot protect a specific directory, and cannot protect files on the SD card (while the official user data of the SD card important storage location); or it can only protect files in a specified format; or it is vulnerable to system integration; or it has low compatibility and scalability, for example, it can only support some specific versions of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for file transparent encryption and decryption of Android platform
  • Method and system for file transparent encryption and decryption of Android platform
  • Method and system for file transparent encryption and decryption of Android platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0029] A method for transparent encryption and decryption of files on an Android platform, comprising the following steps:

[0030] Step 1. Select the path of the folder where the file to be protected is located and set a password;

[0031] Step 2, according to the path and password input by the user, respectively generate an encrypted path directory table and an identity verification file;

[0032] Step 3. Scan the encryption path directory table. If the operating system is started for the first time, the protected file will be initialized and encrypted for the first time according to the table item, and then proceed to the next step;

[0033] Step 4. When the user triggers the unlock screen event, accept the passphrase entered by the user, perform a hash algorithm on the passphrase and compare it with the authentication file generated in step 2:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for file transparent encryption and decryption of the Android platform. The method includes the steps: selecting a route of a folder where a file needed to be protected is positioned, and setting passwords; respectively generating an encrypted route dictionary list and an authentication file according to the route and the passwords input by a user; scanning the encrypted route dictionary list, if an operating system is started for the first time, subjecting the protected file to first-time initialization encryption according to list items, and then carrying out the next step; when the user triggers a screen unlocking event, receiving a passphrase input by the user, comparing the passphrase subjected to hash algorithm with the authentication file generated at the step two, and if the passphrase is not matched with the authentication file, judging that unlocking fails; if the passphrase is matched with the authentication file, subjecting the passphrase to sha 1 algorithm to generate a secret key, and storing the secret key; calling the secret key for encryption and decryption of the file. The invention further discloses a system for file transparent encryption and decryption of the Android platform. File protection is realized on the premise of small interferences to user operations.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a file transparent encryption and decryption system and method for an Android platform. Background technique [0002] With the rapid development of the information age, the Internet continues to penetrate into all aspects of people's lives and work, becoming an indispensable part. With the popularization of computer applications and the development of the Internet and mobile storage devices, the previous paper documents are gradually transformed into electronic documents. Electronic documents have many advantages such as small size and convenient viewing. Seriously affected the security of electronic file storage and communication. [0003] Transparent encryption technology is a file encryption technology that has developed rapidly in recent years. The so-called transparency means that for authorized users, the encryption and decryption process is automatically com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F3/0484G06F21/46G06F21/602G06F21/6218G06F2221/2107G06F2221/2141G06F2221/2149
Inventor 王金伟张正宇赵波徐凌云周宇
Owner SUQIAN XINCHAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products