Unlock instant, AI-driven research and patent intelligence for your innovation.

File encryption/decryption method, mobile terminal and device with storage function

A technology for encryption, decryption, and files, which is applied in the direction of computer security devices, instruments, and electrical digital data processing, etc., can solve problems such as low security, affecting convenience, and encrypted files being cracked, and achieve high security effects

Active Publication Date: 2018-03-30
JRD COMM (SHENZHEN) LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One is a security scheme based on a software password algorithm that encrypts a file based on the input of a password. When the password is stolen, the encrypted file is easily cracked, and the security is not high; the other is based on the system Separately set the security scheme of the trusted execution environment, but when the encrypted file is migrated to other mobile phones, it cannot be opened, which affects the convenience of use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption/decryption method, mobile terminal and device with storage function
  • File encryption/decryption method, mobile terminal and device with storage function
  • File encryption/decryption method, mobile terminal and device with storage function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0016] see figure 1 , figure 1 It is a schematic flow chart of an embodiment of a file encryption and decryption method based on a SIM (Subscriber Identity Module, Subscriber Identity Module) card of the present invention, comprising the following steps:

[0017] S101: Receive an encryption / decryption request for a file to be encrypted and decrypted.

[0018] Wherein, the files to be encrypted and decrypted in the present invention may be text or picture files, audio and video files, or various application program files, and of course it is not limited thereto.

[0019] S102: Encrypt / decrypt the file to be encrypted and decrypted by using a cryptographic algorithm application program in the SIM card.

[0020] In this embodiment, when the user needs to encrypt / decrypt the files in his mobile terminal, he can encrypt / decrypt the files to be encrypted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SIM card-based file encryption / decryption method, a mobile terminal and a device with a storage function. The method comprises the following steps of: receiving an encryption / decryption request for a to-be-encrypted / decrypted file; and carrying out encryption / decryption on the to-be-encrypted / decrypted file through a password algorithm application program in an SIM card.Through above method, effective protection can be formed for to-be-encrypted / decrypted files, so that the safety is high.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a file encryption and decryption method, a mobile terminal and a device with a storage function. Background technique [0002] Mobile terminals are becoming more and more popular in people's daily life. In order to prevent users' privacy from being obtained by a third party and ensure the security of file data, existing file encryption schemes are mainly divided into two categories. One is a security scheme based on a software password algorithm that encrypts a file based on the input of a password. When the password is stolen, the encrypted file is easily cracked, and the security is not high; the other is based on the system Separately set up a security solution for the trusted execution environment, but when the encrypted file is migrated to another mobile phone, it cannot be opened, which affects the convenience of use. Contents of the invention [0003] The technical prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 陈东持涂斌健郑嘉斌
Owner JRD COMM (SHENZHEN) LTD