Encryption method and decryption method for file, and encryption and decryption system
An encryption method and file key technology, applied in the field of information security, can solve the problems of inconvenient management, insufficient security, and encrypted files are vulnerable to attacks, and achieve the effects of easy management, improved security, and avoidance of physical junk files.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0026] The inventors of the present invention found that, if the file is encrypted by the existing encryption method, if the file needs to be completely deleted under certain circumstances, the encrypted encrypted file and the corresponding metadata file need to be cleared at the same time, which is cumbersome and tedious. Prone to errors, leading to inconvenience in document management.
[0027] Moreover, due to the existence of the separated metadata file, it is clearly pointed out that the corresponding fi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com