Unlock instant, AI-driven research and patent intelligence for your innovation.

File processing method and device

A file processing and salt processing technology, applied in the field of communication, can solve the problems of user data security risks, loss, data leakage, etc., and achieve the effect of improving information security

Inactive Publication Date: 2017-05-03
BEIJING QIHOO TECH CO LTD +1
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventor found in the process of implementing the present invention that the existing cloud server usually adopts a unified encryption algorithm to encrypt and store the data in the cloud server. Once the unified encryption algorithm is cracked, all the data in the cloud server will be destroyed. Facing the risk of leakage or loss, bringing security risks to user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File processing method and device
  • File processing method and device
  • File processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] refer to figure 1 , shows a flow chart of the steps of a file processing method according to an embodiment of the present invention, which may specifically include the following steps:

[0066]Step 101, generating seed information corresponding to the original file;

[0067] The embodiment of the present invention can be applied to the application scenario of the cloud server, and the cloud server can receive the original file uploaded by the user through the client, and encrypt and store the original file; When an access request is made for the encrypted file, the encrypted file can be decrypted to obtain the original file and returned to the user. It can be understood that the above application scenario of the cloud server is only an application example, and in fact, the embodiment of the present invention does not limit the specific application scenario.

[0068] The original file may include any type of data file, such as picture, video and so on. The embodiment ...

Embodiment 2

[0092] In order to further improve the information security of the cloud server, the embodiments of the present invention can also be applied to cloud proxy servers, such as Nginx servers and the like. refer to figure 2 , shows a schematic diagram of a network structure including a cloud proxy server according to the present invention, and the cloud proxy server 202 is connected between the client 201 and the cloud server 203 .

[0093] refer to image 3 , shows a flow chart of the steps of a file processing method according to an embodiment of the present invention, which may specifically include the following steps:

[0094] Step 301, generating seed information corresponding to the original file;

[0095] Step 302, encrypting the original file according to the seed information to obtain an encrypted file corresponding to the original file;

[0096] Step 303, encapsulating the seed information in the message header of the encrypted file;

[0097] Step 304, sending the e...

Embodiment 3

[0102] This embodiment is applied to a cloud proxy server, and the original file uploaded by the user is encrypted and encapsulated, and stored in the cloud proxy server, and data interaction is performed with the user through the cloud proxy server. refer to Figure 4 , shows a flow chart of the steps of a file processing method according to an embodiment of the present invention, which may specifically include the following steps:

[0103] Step 401, generating seed information corresponding to the original file;

[0104] Step 402, encrypting the original file according to the seed information to obtain an encrypted file corresponding to the original file;

[0105] Step 403, encapsulating the seed information in the header of the encrypted file, and storing the encapsulated encrypted file;

[0106] Step 404, analyzing the encrypted file to obtain the seed information corresponding to the encrypted file;

[0107] In an optional embodiment of the present invention, the step of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a file processing method and a file processing device. The method specifically comprises the steps of generating seed information corresponding to an original file; encrypting the original file according to the seed information, thus acquiring an encrypted file corresponding to the original file; and packaging the seed information into a message header of the encrypted file, and storing the packaged encrypted file. According to the method and device provided by the invention, the encrypted file is independent, even one encrypted file is cracked, the other encrypted files cannot be cracked according to a cracking mode of the encrypted file, and thus information security of a cloud server can be improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a file processing method and device. Background technique [0002] With the rapid development of network technology, users can upload local data in personal computers, mobile terminals and other devices to cloud servers, use cloud servers to store personal data, and users can browse data stored in cloud servers through the network anytime and anywhere , downloading, modifying and other operations bring great convenience to users. [0003] At present, some illegal users attack the interface of the cloud server in order to illegally obtain data in the cloud server, and once the interface of the cloud server is attacked, the user data stored in the cloud server will be leaked or lost. Therefore, in order to ensure the confidentiality and security of user data, the cloud server will encrypt and store the data uploaded by users. [0004] The inventor found in the process of i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/08H04L29/06H04L29/08
CPCG06F21/602G06F21/6209H04L9/0869H04L63/0428H04L67/1097
Inventor 白敏吕玉超高雪峰
Owner BEIJING QIHOO TECH CO LTD