File encryption method, file decryption method, file encryption device, file decryption device and computer-readable storage medium

A file encryption, computer program technology, applied in secure communication devices, electrical components, key distribution, and can solve problems such as content leakage

Active Publication Date: 2018-02-02
MIGU DIGITAL MEDIA CO LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention expects to provide a file encryption and decryption method, dev

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method, file decryption method, file encryption device, file decryption device and computer-readable storage medium
  • File encryption method, file decryption method, file encryption device, file decryption device and computer-readable storage medium
  • File encryption method, file decryption method, file encryption device, file decryption device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Such as figure 1 As shown, this embodiment takes the terminal side as an example to describe the file encryption method in detail, including the following steps:

[0058] Step 101: Receive and store the file package sent by the server based on the download request.

[0059] Wherein, the file package includes: an object file, and a first application program capable of realizing a first predetermined function after being executed. The target file is a file required by the user; the first predetermined function includes: obtaining terminal identification information, generating an encryption key according to the identification information, and using the encryption key to encrypt the downloaded target file.

[0060] figure 2 In an implementation manner, it is a schematic diagram of a terminal receiving a file package sent by a server. Such as figure 2 As shown, before the terminal receives and stores the file package sent by the server, the terminal sends a download e...

Embodiment 2

[0111] Such as image 3 As shown, this embodiment takes the terminal side as an example to describe the file decryption method in detail, including the following steps:

[0112] Step 301: Receive a second instruction; the second instruction is used to instruct to decrypt the encrypted file.

[0113] The encrypted file is a file encrypted with an encryption key generated from terminal identification information.

[0114] Step 302: In response to the second instruction, execute the first application program in the file package corresponding to the encrypted file to: obtain terminal identification information, generate a decryption key according to the identification information; use the decryption key Decrypt the encrypted file to obtain the decrypted file.

[0115] Wherein, the file package is sent by the server to the terminal based on the download request; the file package includes: a target file and a first application program capable of realizing a second predetermined fu...

Embodiment 3

[0119] In order to implement the method in Embodiment 1, this embodiment provides a file encryption device, which can be set on the terminal, such as Figure 4 As shown, the device includes: a first receiving module 41, an encryption module 42; wherein,

[0120] The first receiving module 41 is configured to receive and store the file package sent by the server based on the download request;

[0121] The encryption module 42 is configured to start the first application program after the download is completed.

[0122] The functions that can be realized by the first application program include: acquiring terminal identification information, and generating an encryption key according to the identification information; using the encryption key to encrypt downloaded files to obtain encrypted files.

[0123] In the embodiment of the present application, the "starting the first application program" mentioned here can put the first application program in the state of being executed,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file encryption method. The file encryption method comprises the steps of: receiving and storing a file package sent by a server based on a downloading request, wherein the file package includes a target file and a first application; after downloading is completed, executing the first application to obtain terminal identification information and generate an encryption keyaccording to the identification information; and, encrypting the downloaded target file by utilizing the encryption key, so that an encrypted file is obtained. The invention further discloses a filedecryption method, a file encryption device, a file decryption device and a computer-readable storage medium.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a file encryption and decryption method, device and computer-readable storage medium. Background technique [0002] At present, smart terminals such as smart phones and tablet computers are more and more widely used, and can be used for various online and offline activities for users. For example, based on the convenience of smart terminals, users can use smart terminals to download the electronic documents they need so that they can be consulted anytime and anywhere. [0003] However, when the user is not paying attention, others may copy the downloaded electronic document to other smart terminals. The electronic document may contain the user's personal private information or business secrets. Once leaked, it may bring immeasurable losses to the user. Contents of the invention [0004] In view of this, the embodiment of the present invention expects to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428H04L67/06H04L67/60
Inventor 佘志强李翼
Owner MIGU DIGITAL MEDIA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products