Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrypted file searching method and device and electronic equipment

A technology for encrypting files and searching methods, applied in the computer field, can solve problems such as time-consuming and energy-consuming, low file processing efficiency, cumbersome operations, etc., and achieve the effects of reducing time and energy, providing operating experience, and simplifying the operation process

Pending Publication Date: 2020-05-12
厦门天锐科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the file encryption system product is to be replaced or the file encryption system product is no longer in use, it becomes a problem to search and decrypt the files encrypted by the file encryption system product. Only by manually searching and confirming them one by one can they be processed Decryption and other operations
To sum up, the file search process of the existing file encryption system is cumbersome and requires a lot of time and effort, and because the current encryption system uses transparent encryption and decryption technology, for example, some files are automatically encrypted after being opened and edited, and manual confirmation is easy to cause The file is not confirmed, so that the file cannot be opened or retrieved without an encryption system environment
In addition, in case of a compressed package file, it is necessary to manually decompress the compressed package, and then judge the file, and the file processing efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted file searching method and device and electronic equipment
  • Encrypted file searching method and device and electronic equipment
  • Encrypted file searching method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments of the present application. It should be understood that the present application is not limited by the exemplary embodiments described here.

[0029] exemplary method

[0030] figure 1 It is a schematic flowchart of an encrypted file search method provided by an exemplary embodiment of the present application.

[0031] In this embodiment of the application, the encrypted file may include a file header and encrypted content, where the file header may include an encryption identifier. The encryption mark can add the encryption mark in the file header when the file is input into the file encryption system for encryption.

[0032] This embodiment can be applied to electronic equipment, such as fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted file searching method and device and electronic equipment, an encrypted file comprises a file header and encrypted content, the file header comprises an encryptionidentifier, and the method comprises the following steps: receiving a to-be-searched encrypted file directory; traversing an encrypted file of the encrypted file directory; for all the encrypted files of the encrypted file directory, obtaining file headers of the encrypted files to determine whether the file headers of the encrypted files contain encryption identifiers or not; if it is determinedthat the file header of any encrypted file contains the encryption identifier, recording a storage path of the encrypted file; and feeding back the storage path to a user, so that the user acquires the encrypted file based on the storage path. In the process of searching and decrypting a large number of files, the operation process of searching is simplified, the user operation experience is provided, the time and energy consumed by manual confirmation are reduced, the accuracy of search determination is improved, and the problem that the files cannot be opened due to missing search and missing decryption of encrypted files is solved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a search method, device and electronic equipment for encrypted files. Background technique [0002] "File encryption system" refers to computer encryption control software that uses computer, network communication, and password encryption technologies to encrypt various files that need to be encrypted to prevent illegal leaks. Files that need to be encrypted, such as red-headed files, confidential files, meeting minutes, drawings, technical data, financial statements, business data, etc. [0003] As companies pay more and more attention to information security, many companies will use file encryption system products to protect corporate confidential files from being leaked. However, when the file encryption system product is to be replaced or the file encryption system product is no longer in use, it becomes a problem to search and decrypt the files encrypted by the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/14
CPCG06F16/148Y02D10/00
Inventor 涂高元邱志斌郭永兴陆云燕王慧东
Owner 厦门天锐科技股份有限公司