Method for encrypted storage, reading and deletion of files of mobile terminal

A technology of mobile terminal and encrypted storage, which is applied in the direction of file system, file access structure, data processing input/output process, etc. It can solve the problems of system security reduction, acquisition or tampering, and data without security protection, etc., to ensure Stability, increased security effect

Inactive Publication Date: 2018-02-06
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If you want to meet strict security requirements, such as financial data, confidential files, etc., you can only build better protection measures in the application. If the local data is not protected, it is likely to be obtained or tampered with by attackers, resulting in Serious consequences
At present, the traditional file encryption system on the market only encrypts the file content itself. This method has the possibility of being cracked by the corresponding decryption algorithm; This file has a certain association, resulting in a decrease in system security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypted storage, reading and deletion of files of mobile terminal
  • Method for encrypted storage, reading and deletion of files of mobile terminal
  • Method for encrypted storage, reading and deletion of files of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings of the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] Such as figure 1 The encrypted storage method of a mobile terminal file provided by the illustrated embodiment includes the following steps:

[0031] Build an index table: build an index table for the file to be encrypted;

[0032] File Fragmentation: Divide the file to be encrypted into multiple pieces;

[0033] Fragmented file mark: Add a piece of information mark to the fragmented file;

[0034] Fragmented file encryption: encrypt the tagged fragmented...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypted storage, reading and deletion of files of a mobile terminal. The encrypted storage process comprises the following steps of establishing an index table,wherein the index table is established for the files to be encrypted; fragmenting the files, wherein the files to be encrypted are divided into multiple fragments; marking the fragmented files, wherein information marks are added on the fragmented files; encrypting the fragmented files, wherein the fragmented files added with the marks are encrypted; archiving the encrypted files, wherein the encrypted files are archived and stored. By means of the method, file data of an application of the mobile terminal can be effectively and safely protected, and the important file data information of theapplication cannot be disclosed or tampered.

Description

technical field [0001] The invention relates to the field of mobile terminal file management, in particular to a technique for encrypted storage, reading and deletion of mobile terminal files. Background technique [0002] While mobile terminal devices bring convenience to people's lives, they also create many problems that need to be solved, such as privacy leaks, mobile phone viruses, spyware, etc. The biggest risk users face is that the device is lost or stolen. Anyone who owns the device can get the information stored on the device. The data of mobile device applications is usually stored locally in local files or local databases, which largely depends on the protection provided by the application on the device for the stored data. If you want to meet strict security requirements, such as financial data, confidential files, etc., you can only build better protection measures in the application. If the local data is not protected, it is likely to be obtained or tampere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F3/06G06F17/30
CPCG06F3/0622G06F3/0623G06F3/0637G06F3/0643G06F3/0652G06F3/0676G06F16/13G06F16/148G06F16/162G06F16/172G06F21/602G06F2221/2107
Inventor 刘蛟赵小云刘旭郑红邓佳川李伟光
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products