Encryption method and decryption method for file, and encryption and decryption system

An encryption method and file key technology, applied in the field of information security, can solve the problems of inconvenient management, insufficient security, and encrypted files are vulnerable to attacks, and achieve the effects of easy management, improved security, and avoidance of physical junk files.

Inactive Publication Date: 2015-12-23
BEIJING YUANXIN SCI & TECH
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventors of the present invention have found that after the existing encryption method encrypts files, the encrypted files are vulnerable to attacks, and there is a problem of insufficient security; moreover, there is also the problem of inconvenient management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and decryption method for file, and encryption and decryption system
  • Encryption method and decryption method for file, and encryption and decryption system
  • Encryption method and decryption method for file, and encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] The inventors of the present invention found that, if the file is encrypted by the existing encryption method, if the file needs to be completely deleted under certain circumstances, the encrypted encrypted file and the corresponding metadata file need to be cleared at the same time, which is cumbersome and tedious. Prone to errors, leading to inconvenience in document management.

[0027] Moreover, due to the existence of the separated metadata file, it is clearly pointed out that the corresponding fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption method and a decryption method for a file, and an encryption and decryption system. The encryption method comprises the following steps of storing a file key of an original file into a created metadata block for the unencrypted original file; utilizing an appointed metadata encryption key to encrypt the metadata block; and utilizing the file key to encrypt content data of the original file to obtain an encrypted file, wherein a file header of the encrypted file includes the encrypted metadata block. Through applying the invention, management of the encrypted file is facilitated, and security of the file is improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, the present invention relates to a file encryption and decryption method and an encryption and decryption system. Background technique [0002] With the improvement of terminal intelligence and the increase of storage capacity, people are more and more fond of saving some important information, such as commercial confidential information and personal privacy information, in the terminal in the form of files. The accompanying file security issues are also gradually being paid attention to. Therefore, in order to ensure the security of files stored in the terminal, it is often necessary to encrypt, decrypt, and other processes on the files. [0003] At present, when encrypting a file in the prior art, an encryption algorithm can be selected, a file key is generated by the selected encryption algorithm, and the file is encrypted using the generated file key to for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 孙国峰
Owner BEIJING YUANXIN SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products