File decryption method and apparatus

A file and key technology, applied in the field of information security, can solve problems such as not being particularly secure

Active Publication Date: 2017-12-01
WUHAN DOUYU NETWORK TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, storing the decryption key in the client software is not particularly secure, especially since it is very easy for hackers to guess

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File decryption method and apparatus
  • File decryption method and apparatus
  • File decryption method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0045] figure 1 It is a flow chart of the file decryption method provided by the embodiment of the present invention. Such as figure 1 As shown, it includes: S11, receiving the request key information sent by the client, the key is located in the Windows service program, and the Windows service program communicates with the client through a named pipe; S12, the key The key is sent to the client for the client to decrypt the encrypted file on the client according to the key.

[0046] Wherein, in S11, the client refers to a program that provides local services for clients. The key is an input parameter in the decryption algorithm, and is a key for decryption. The Window...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file decryption method and apparatus, involving: receiving the information of a request secret key which is transmitted by a client, wherein the secret key is arranged in a Windows service program, and the Windows service program and the client communicate through a named pipe; and transmitting the secret key to the client so as to allow the client to decrypt the file which is encrypted in the client based on the secret key. According to the invention, the method arranges the decrypted secret key to the Windows service program, and the Windows service program and the software which uses the encrypted file are packaged to the client. When the software is started, the Windows service program is initiated. When the software needs to use the encrypted file, the encrypted file is decrypted. The decrypted secret key is acquired from the Windows service program in an Inter-Process Communication, so that the decrypted secret key is secretly hidden, and the encryption effect is enhanced.

Description

technical field [0001] The present invention relates to the field of information security, and more specifically, to a file decryption method and device. Background technique [0002] At present, with the development of information technology, various software emerges as the times require and are widely used in various fields. Information security issues are also becoming increasingly prominent. Ensuring that information resources in information networks are protected from various types of threats, interference and destruction has become a concern of the whole society. [0003] During the process of storing, processing and exchanging information, there are possibilities of leakage or interception, eavesdropping, tampering and forgery, so confidentiality measures need to be taken. For example, during a game live broadcast, the live broadcast software broadcasts the live broadcast by collecting the content of the camera and the content of the computer. When the live broadca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F9/54
CPCG06F9/544H04L63/0428H04L63/06
Inventor 周志刚陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products