File encryption and decryption method and terminal

A file encryption and file technology, applied in the direction of digital data protection, etc., can solve the problem of low file security, and achieve the effect of avoiding low security, improving difficulty and improving security.

Inactive Publication Date: 2018-07-27
HUAWEI TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows for securely transmitting data between devices over an internet connection without compromising its privacy or integrity during transmission. By assigning unique identifiers (ID) based on their corresponding cryptographic operations, these techniques help prevent unauthorized access from accessing sensitive areas within the device's memory. Additionally, this approach ensures consistently high levels of protection against attacks such as man-invasive code injection attackers.

Problems solved by technology

This patented technical problem addressed in this patents relates to improving the safety level when storing data on remote servers (cloud) during times where it may be vulnerable or even potentially harmful due to malware attacks from external sources such as viruses or worms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption and decryption method and terminal
  • File encryption and decryption method and terminal
  • File encryption and decryption method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to clearly describe the technical solutions of the embodiments of the present invention, in the embodiments of the present invention, words such as "first" and "second" are used to distinguish the same or similar items with basically the same functions and functions. Those skilled in the art can understand that words such as "first" and "second" do not limit the quantity and execution order.

[0070] In the specific implementation process, the terminal in the embodiment of the present invention can be a mobile phone, a mobile computer, a tablet computer, a personal digital assistant (Personal Digital Assistant, PDA), a media player, a smart TV, a smart wearable device (such as a smart watch, Smart glasses and smart bracelets, etc.), electronic readers, handheld game consoles, vehicle-mounted electronic devices or cloud servers, etc., the terminal has the function of encrypting or decrypting files.

[0071] In the traditional cloud server storage technology, aft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a file encryption and decryption method and a terminal, and relates to the field of mobile communication. The file encryption and decryption method and the terminal are used for solving the problem that in the prior art, the safety of files is low by adopting a same encryption scheme for file encryption. The method comprises the steps of receiving i sequentially-input keys, wherein i is an integer greater than or equal to 1; determining encryption operators of the i keys according to the i sequentially-input keys, wherein each encryption operator corresponds to one encryption function; calling the encryption operators of all the keys for file encryption according to a preset encryption policy, and obtaining encryption files. The file encryption anddecryption method and the terminal are applied to file encryption/decryption scenes.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products