Generation method and device of encrypted file and computing equipment

A technology for encrypting files and computing devices, used in computing, electrical components, special data processing applications, etc.

Inactive Publication Date: 2015-05-06
深圳市大成天下信息技术有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there is currently no solution that can solve this prob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method and device of encrypted file and computing equipment
  • Generation method and device of encrypted file and computing equipment
  • Generation method and device of encrypted file and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A flowchart of a method for generating an encrypted file according to an embodiment of the present invention is shown, and the method is suitable for being executed in a computing device. refer to figure 1 , the method begins with step S102, and in step S102, the password for encrypting the outgoing file to be sent to the target device and the processing authority of the target user to process the outgoing file on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a generation method of an encrypted file. The method is executed in the computing equipment, and comprises the following steps: acquiring a password for encrypting an outgoing file to be transmitted to target equipment and processing authority for processing the outgoing file on the target equipment by a target user; encrypting the outgoing file by using the password to generate a cipher text content; extracting various processing logics required for decrypting and controlling the cipher text content on the target equipment and packaging into a data set packet; adding the processing authority and the cipher text content into the data set packet to establish an executable file. The invention also discloses a generation device of the encrypted file and the computing equipment comprising the device.

Description

technical field [0001] The invention relates to the fields of computers and the Internet, in particular to a method, device and computing equipment for generating encrypted files. Background technique [0002] With the popularization and development of computer technology and network technology, more and more users transfer files via the network. These files are usually transferred between users in an uncontrolled manner. For example, when a file is sent from one user to another via the network, the original user has no way to control how the new user uses the file. For example, the new user can print the file, copy the content of the file, Send files to other people, etc. [0003] In some cases, especially in some business environments, the file owner wishes to be able to control how the file recipient uses the file after sending the file to the other party. For example, the number of times the file recipient can browse the file, the permissions of the file recipient to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/30
CPCH04L63/0428
Inventor 李景盛
Owner 深圳市大成天下信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products