Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An encryption method and device

An encryption method and encryption device technology, applied in the field of communication, can solve the problems of large memory space, low encryption efficiency of large files, etc.

Active Publication Date: 2020-05-19
CHINA MOBILE COMM GRP CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Yet adopt prior art implementation method, owing to along with the development of Android equipment, memory space is more and more large, when the file in the system is larger, the process and time that this file is encrypted will be longer, like this, can Resulting in extremely inefficient encryption of large files
For example, it sometimes takes about 10 minutes to encrypt a 1G video file with the existing technology, which is unacceptable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption method and device
  • An encryption method and device
  • An encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The embodiment of the present invention provides an encryption method, such as figure 1 As shown, the method may include:

[0045] S101. Obtain the unencrypted i-th data block in the first file, the first file is a temporary file that is writing the data of the file to be downloaded during the download process, and the i-th data block is the file to be downloaded with different sizes Continuous data beyond the first preset range, where i≥1.

[0046] The embodiment of the present invention is proposed when the file after data download or loading is to be encrypted in the above-mentioned terminal. The inventive concept is: when a file is downloaded or loaded in the terminal, the downloaded data part is Encryption, that is, the method of using space to replace time to reduce encryption time and improve encryption efficiency.

[0047] Optionally, the terminal in this embodiment of the present invention may be a mobile terminal, specifically, a smart phone, a tablet comput...

Embodiment 2

[0070] The embodiment of the present invention provides an encryption method, such as figure 2 As shown, the method may include:

[0071] S201. When a download instruction is detected, generate a first file and a second file, the first file is a temporary file in which data of the file to be downloaded is being written during the download process, and the second file is a storage file of encrypted data.

[0072] The embodiment of the present invention is proposed when the file after data download or loading is to be encrypted in the above-mentioned terminal. The inventive concept is: when a file is downloaded or loaded in the terminal, the downloaded data part is Encryption, that is, the method of using space to replace time to reduce encryption time and improve encryption efficiency.

[0073] Optionally, the terminal in this embodiment of the present invention may be a mobile terminal, specifically, a smart phone, a tablet computer, etc. that have file loading and storage f...

Embodiment 3

[0112] Such as Figure 4 As shown, the embodiment of the present invention provides a terminal 1, the terminal 1 may include:

[0113] The obtaining unit 10 is used to obtain the unencrypted i-th data block in the first file, the first file is a temporary file that is writing the data of the file to be downloaded during the download process, and the i-th data block is The continuous data whose size does not exceed the first preset range in the file to be downloaded, wherein i≥1.

[0114] An encryption unit 11, configured to encrypt the i-th data block acquired by the acquisition unit 10.

[0115] The writing unit 12 is configured to write the ith data block encrypted by the encryption unit 11 into a second file, and the second file is a storage file of encrypted data.

[0116] The end unit 13 is configured to end the encryption process when there is no unencrypted (i+1)th data block in the first file acquired by the acquisition unit 10 .

[0117] optional, such as Figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an encryption method comprising steps of: obtaining the unencrypted ith data block in a first file, wherein the first file is a temporary file into which the data of a file to be downloaded is being written during a downloading process, the ith data block is continuous data not beyond a first preset range in the file to be downloaded, and i is greater than or equal to 1; encrypting the i-th data block; writing the encrypted ith data block into a second file; and ending the encryption process when the first file does not have unencrypted (i+1)th data block. The embodiment of the present invention also discloses an encryption apparatus.

Description

technical field [0001] The invention relates to data processing technology in the communication field, in particular to an encryption method and device. Background technique [0002] In today's data age, data security has always been a focus of attention in all walks of life. Data encryption is undoubtedly a powerful guarantee for data security. Today, data encryption technology has been widely used in terminals, servers, network communications and other fields, and various encryption algorithms have emerged in an endless stream. For the Android system, the encryption of data in the device mainly includes the following methods in the prior art: [0003] First, the user partition of the Android terminal device is encrypted by using the information of the used data blocks recorded in the file system of the Android terminal device, so as to avoid encrypting invalid data of the user. Second, the existing Android files are encrypted through the method of dynamic link library i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L67/06H04L67/1078
Inventor 袁园
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products