A file encryption and decryption method and device

A file encryption and file technology, applied in the field of information security, can solve problems such as high consumption of terminal systems, inability to strictly distinguish file sensitivity, waste of terminal system resources, etc., and achieve the effect of narrowing the scope of monitoring

Active Publication Date: 2020-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the research and practice of the existing technology, the inventors of the present invention found that the existing transparent encryption scheme needs to monitor the read and write operations of all specified files of the terminal. Since the specified files are scattered, the monitoring range of transparent encryption is relatively wide, and the terminal system It consumes a lot. At the same time, because it cannot strictly distinguish the sensitivity of files, it encrypts and protects files with no risk or low risk, which will cause waste of terminal system resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file encryption and decryption method and device
  • A file encryption and decryption method and device
  • A file encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment will be described from the perspective of an encryption device. Specifically, the encryption device may be integrated in a terminal or other devices that need to encrypt files.

[0044] There are many ways that the encryption device is integrated on the terminal, for example, it is installed in the terminal in the form of a client or other software.

[0045] A file encryption method, characterized in that it includes: receiving a storage request for a file, the storage request indicating a target file directory where the file needs to be stored, obtaining a key corresponding to the target file directory according to the storage request, and using the key The file is encrypted to obtain an encrypted file, and the encrypted file is stored in the target file directory.

[0046] Such as figure 1 As shown, the specific process of this file encryption can be as follows:

[0047] 101. Receive a file storage request, where the storage request indicates a targe...

Embodiment 2

[0092] Correspondingly, this embodiment provides a file decryption method. This embodiment will describe the method from the perspective of a decryption device. The decryption device may be integrated into a terminal or other devices that need to decrypt files.

[0093] There are many ways that the decryption device is integrated on the terminal, for example, it is installed in the terminal in the form of a client or other software.

[0094] Such as Figure 4 As shown, the specific flow of the file encryption method can be as follows:

[0095] 401. Receive a read request of an encrypted file, where the read request carries encryption attribute information corresponding to the encrypted file.

[0096] The decryption device can be integrated in the encryption terminal that forms the encrypted file, for example, the terminal that encrypts the file to form the encrypted file using the method described in Embodiment 1, or it can also be integrated in other non-encrypted terminals,...

Embodiment 3

[0137] In order to better implement the above method, the embodiment of the present invention also provides a file encryption device, such as Figure 7a As shown, the identity verification device may also include a receiving module 701, a key acquisition module 702, an encryption module 703 and a storage module 704, as follows:

[0138] The receiving module 701 is configured to receive a storage request of a file, and the storage request indicates a target file directory where the file needs to be stored;

[0139] A key acquisition module 702, configured to acquire the key corresponding to the target file directory according to the storage request;

[0140] An encryption module 703, configured to encrypt the file using the key to obtain an encrypted file;

[0141] The storage module 704 is configured to store the encrypted file in the target file directory.

[0142] For example, refer to Figure 7b , the implementation of the file encryption device can also include a creation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose a file encryption method and apparatus, and a file decryption method and apparatus. The file encryption method comprises the steps of receiving a storage request of a file, wherein the storage request indicates a target file directory in which the file needs to be stored; then, obtaining a key corresponding to the target file directory according to the storage request; encrypting the file by adopting the key to obtain an encrypted file; and storing the encrypted file in the target file directory. According to the scheme, only the target file directory is monitored, and the file is encrypted when the file is stored in the target file directory, so that all specified files do not need to be monitored and a monitoring range of transparent encryption is reduced; and compared with the prior art, the consumption of a terminal system can be reduced and the resources of the terminal system can be saved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a file encryption and decryption method and device. Background technique [0002] Transparent encryption technology is a file encryption technology that has emerged in recent years to meet the needs of enterprise file confidentiality. At present, transparent encryption technology has become an important means of protecting sensitive documents and data in the industry. [0003] In the prior art, the so-called transparency means that it is unknown to the user. The transparent encryption scheme is specifically: monitor the read and write operations of all specified files on the terminal, when the user opens or edits the specified file, the system will automatically encrypt the unencrypted file and automatically decrypt the encrypted file. Applying this transparent encryption scheme can make files in ciphertext on the hard disk and plaintext in memory; once the file le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6209G06F2221/2107H04L63/0428H04L63/06H04L63/0892
Inventor 马立伟蔡晨车世华贺啸
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products