File processing method and device
A file processing and salt processing technology, applied in the field of communication, can solve the problems of user data security risks, loss, data leakage, etc., and achieve the effect of improving information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0065] refer to figure 1 , shows a flow chart of the steps of a file processing method according to an embodiment of the present invention, which may specifically include the following steps:
[0066]Step 101, generating seed information corresponding to the original file;
[0067] The embodiment of the present invention can be applied to the application scenario of the cloud server, and the cloud server can receive the original file uploaded by the user through the client, and encrypt and store the original file; When an access request is made for the encrypted file, the encrypted file can be decrypted to obtain the original file and returned to the user. It can be understood that the above application scenario of the cloud server is only an application example, and in fact, the embodiment of the present invention does not limit the specific application scenario.
[0068] The original file may include any type of data file, such as picture, video and so on. The embodiment ...
Embodiment 2
[0092] In order to further improve the information security of the cloud server, the embodiments of the present invention can also be applied to cloud proxy servers, such as Nginx servers and the like. refer to figure 2 , shows a schematic diagram of a network structure including a cloud proxy server according to the present invention, and the cloud proxy server 202 is connected between the client 201 and the cloud server 203 .
[0093] refer to image 3 , shows a flow chart of the steps of a file processing method according to an embodiment of the present invention, which may specifically include the following steps:
[0094] Step 301, generating seed information corresponding to the original file;
[0095] Step 302, encrypting the original file according to the seed information to obtain an encrypted file corresponding to the original file;
[0096] Step 303, encapsulating the seed information in the message header of the encrypted file;
[0097] Step 304, sending the e...
Embodiment 3
[0102] This embodiment is applied to a cloud proxy server, and the original file uploaded by the user is encrypted and encapsulated, and stored in the cloud proxy server, and data interaction is performed with the user through the cloud proxy server. refer to Figure 4 , shows a flow chart of the steps of a file processing method according to an embodiment of the present invention, which may specifically include the following steps:
[0103] Step 401, generating seed information corresponding to the original file;
[0104] Step 402, encrypting the original file according to the seed information to obtain an encrypted file corresponding to the original file;
[0105] Step 403, encapsulating the seed information in the header of the encrypted file, and storing the encapsulated encrypted file;
[0106] Step 404, analyzing the encrypted file to obtain the seed information corresponding to the encrypted file;
[0107] In an optional embodiment of the present invention, the step of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


