Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for securely processing data files

A data file and security processing technology, applied in the information field, can solve data file security processing and other issues

Inactive Publication Date: 2020-10-27
BEIJING QIHOO TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method and system for safely processing data files to solve the problem of how to safely process data files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for securely processing data files
  • A method and system for securely processing data files
  • A method and system for securely processing data files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0078] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method for performing security processing on a data file. The method comprises: receiving an encrypted data access request for a data file, the data file comprising a plurality of file blocks; decrypting the encrypted data access request, and obtaining a link address related to the requested data file, wherein the link address comprises security processing information; if a security identifier in the security processing information indicates that it is necessary to perform security processing on the data file before responding to the data access request, resorting, according to a security parameter in the security processing information, at least a part of the file blocks of the data file, so as to obtain the data file having undergone security processing; and generating a data access response for the data access request on the basis of the data file having undergone security processing.

Description

technical field [0001] The present invention relates to the field of information technology, and more specifically, to a method and system for safely processing data files. Background technique [0002] More and more users download data files through the network. In the process of downloading data files of popular applications, the business service provider often provides download link channels. The service provider wants to push the modified application data to users. , usually hijacks the download request of popular application data. Generally, after the hijacking party recognizes the user's download request for the application, it will provide the modified application data to the user. Therefore, the user will obtain the modified application. [0003] For example, the user requests to download the APK data file of the application through a third-party browser, and the third-party browser uses the feature of HPPT segmented download, and the third-party browser samples som...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0435H04L67/06
Inventor 尹俊李强刘贵荣曾明王兴刚田野陈浩
Owner BEIJING QIHOO TECH CO LTD