Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File encryption and decryption methods and devices

A file encryption and encryption algorithm technology, applied in the field of information security, to achieve the effect of improving user experience, simple decryption method, and convenient decryption

Inactive Publication Date: 2015-09-16
NUBIA TECHNOLOGY CO LTD
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a file encryption and decryption method and device, aiming to solve the technical problem of how to ensure that the encrypted file is not easily opened by others, and the user can also easily and quickly decrypt it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption and decryption methods and devices
  • File encryption and decryption methods and devices
  • File encryption and decryption methods and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only to facilitate description of the present invention and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0046] Mobile terminals may be implemented in various forms. For example, terminals described in the present invention may include devices such as mobile phones, smart phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablet Computers), PMPs (Portable Multimedia Players), navigation devices, etc. mobile terminals and fixed terminals such as digital TVs, desktop comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses file encryption and decryption methods and devices. The file encryption method comprises the following steps of acquiring an original file to be encrypted; acquiring a pressure encryption parameter according to the pressing operation of a user over a mobile terminal; encrypting the original file to generate an encrypted file according to the pressure encryption parameter and a preset encryption algorithm. According to the methods and the devices, the original file is encrypted according to the pressure encryption parameter, and the encryption level is moderate, so that the original file can be prevented from being easily opened, convenience is brought to the encrypted file decryption of the user, and user experiences are improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a file encryption and decryption method and device. Background technique [0002] Nowadays, there are more and more users using mobile terminal devices, and at the same time, mobile terminal devices have become more and more integrated into users' lives, such as taking pictures, chatting, online shopping, etc., which will correspondingly generate privacy and security issues for user information. The existing file encryption methods usually use character passwords. Although the encryption level of this type of method is relatively high, the higher the encryption level, the more and more complex the corresponding character passwords, which makes it inconvenient for users to decrypt. , and if the character password is set too simple, it is too easy for others to crack, especially for the encryption of some content with a low confidentiality level, such as some applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209G06F2221/2107
Inventor 吴玲玲魏宇星
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products