Unlock instant, AI-driven research and patent intelligence for your innovation.

A file encryption and decryption method

A file encryption and file technology, applied in the field of data processing, can solve the problems of information security and integrity damage, file password cracking, etc., to achieve the effect of improving information security and preventing threats

Active Publication Date: 2022-02-18
HEFEI LCFC INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are many ways to encrypt files, but with the proliferation of Trojan horses, file passwords are easily cracked by remote Trojan horse software. In addition, when file passwords are stolen by others, files can also be accessed in other places.
[0003] It is known that a Chinese patent document (publication number: CN201610892459.6A) discloses an embedded terminal encryption system and encryption method combining software and hardware, and (publication number: CN201110080951.0) discloses an account for network login authentication Binding system, the above two schemes double-encrypt files through wireless communication and network services, and increase the threat from malware in the network environment. Once the malware is downloaded, information security and integrity may be compromised. destroy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file encryption and decryption method
  • A file encryption and decryption method
  • A file encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0039] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0040] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0041] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a file encryption and decryption method. The file encryption method includes: obtaining user identity information; performing first processing on the file through the user identity information according to preset conditions to obtain a pre-processed file; judging whether the file needs to be Encrypting, if yes, encrypting the preprocessed file. This solution can also encrypt and decrypt files by writing user information in the hardware device according to the preset conditions in the disconnected state, preventing threats in the network environment, and the encryption is set according to the preset conditions Yes, remote malware is difficult to crack, improving information security.

Description

technical field [0001] This application relates to the field of data processing, in particular to a file encryption and decryption method. Background technique [0002] At present, there are many ways to encrypt files, but with the proliferation of Trojan horses, file passwords are easily cracked by remote Trojan horse software. In addition, when file passwords are stolen by others, files can also be accessed in other places. [0003] It is known that a Chinese patent document (publication number: CN201610892459.6A) discloses an embedded terminal encryption system and encryption method combining software and hardware, and (publication number: CN201110080951.0) discloses an account for network login authentication Binding system, the above two schemes double-encrypt files through wireless communication and network services, and increase the threat from malware in the network environment. Once the malware is downloaded, information security and integrity may be compromised. d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218G06F2221/2107
Inventor 张良如
Owner HEFEI LCFC INFORMATION TECH