Supercharge Your Innovation With Domain-Expert AI Agents!

File decryption method, file encryption method, file management system and storage medium

A file encryption and file technology, applied in the field of encryption and decryption, can solve the problems of loss, low file confidentiality, and easy decryption or forgery of the decryption method, so as to improve confidentiality and meet the needs of privacy and security.

Active Publication Date: 2019-12-27
GREE ELECTRIC APPLIANCES INC
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption methods of many electronic information are very easy to cause loss or fail to satisfy the user's confidentiality of information. For example, when encrypting files in mobile phones, the existing method is usually to use a string of digital passwords or preset pattern passwords to encrypt files. Encryption, the corresponding decryption method is easy to be cracked or forged, resulting in a low degree of confidentiality of the file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File decryption method, file encryption method, file management system and storage medium
  • File decryption method, file encryption method, file management system and storage medium
  • File decryption method, file encryption method, file management system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0055] figure 2 A schematic flowchart of a file decryption method provided in Example 1 of the present application is shown. Such as figure 2 As shown, another file decryption method provided by this application includes steps S201 to S205.

[0056] In step S201, multiple biometric features to be verified are acquired.

[0057] In step S202, it is judged whether the time interval between the acquisition time of every two biometric features to be verified among the multiple biometric features to be verified is within the preset verification time threshold, and if so, the acquired multiple biometric features to be verified If it is valid, step S203 is executed; if not, the acquired biometric features to be verified are invalid.

[0058] Wherein, the preset verification time threshold can be set according to the degree of file security requirements and the performance of the corresponding biological feature collection device to be verified in the actual application process. ...

example 2

[0068] image 3 A schematic flowchart of a file decryption method provided in Example 2 of the present application is shown. Such as image 3 As shown, a file decryption method provided by the present application includes steps S301 to S304.

[0069] In step S301, a plurality of same type of biological feature acquisition devices are used to acquire the same type of biological features to be verified of multiple users.

[0070] This step may be, using multiple same type of biological feature collection devices communicatively connected to the same terminal to acquire the same type of biological features to be verified of multiple users. As a specific example, when the files on the mobile phone are encrypted using the features of two faces, correspondingly, the cameras on the left and right screens of the folding screen mobile phone can be used to simultaneously capture the files of two different users. facial features as the biometrics to be verified. When the folding scre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file decryption method, a file encryption method, a file management system and a storage medium. The method comprises the following steps: acquiring a plurality of to-be-verified biological characteristics, and executing the following verification steps on each to-be-verified biological characteristic: decoding the to-be-verified biological characteristics to generate corresponding decryption characteristic data; and judging whether the decryption feature data is matched with the encryption feature data stored in the encryption file or not, and if so, judging that theto-be-verified biological feature corresponding to the decryption feature data passes the verification; and when the plurality of to-be-verified biological characteristics pass the verification, decrypting the encrypted file. According to the decryption method, the encrypted file can be decrypted only when the to-be-verified biological characteristics of a plurality of users pass verification atthe same time, so that the confidentiality and the security of the file are improved, and the privacy security requirements of the users are met.

Description

technical field [0001] The invention relates to the field of encryption and decryption, in particular to a file decryption method, a file encryption method, a file management system and a storage medium. Background technique [0002] In today's information age, information security has become an issue that people pay more and more attention to. The encryption methods of many electronic information are very easy to cause loss or fail to satisfy the user's confidentiality of information. For example, when encrypting files in mobile phones, the existing method is usually to use a string of digital passwords or preset pattern passwords to encrypt files. Encryption, the corresponding decryption method is easy to be cracked or forged, resulting in a low degree of confidentiality of the file. Contents of the invention [0003] The technical problem to be solved by the present invention is: the decryption method in the prior art is easy to be cracked or forged, resulting in a low...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/32
CPCG06F21/32G06F21/602
Inventor 余民族
Owner GREE ELECTRIC APPLIANCES INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More