File encryption method and device
A file encryption and encrypted file technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of high decryption complexity and low file encryption security, and achieve the effect of speeding up encryption and decryption and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a computer terminal of a file encryption method according to an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more ( figure 1 Only one is shown in ) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. figure 2 It is a block diagram of the hardware structure of the computer terminal of another file encryption method of the embodiment of the present invention, as figure 2 As shown, in an exemplary embodiment, the above-mentioned computer terminal may further include a transmission device 106 and an input and o...
Embodiment 2
[0050] In this embodiment, a file encryption device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the terms 'module' and 'unit' may be a combination of software and / or hardware that realize a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0051] Figure 4 is a structural block diagram of a file encryption device according to an embodiment of the present invention, such as Figure 4 As shown, the device includes a first acquisition module 20 , a selection module 30 , an interception module 40 and a first splicing module 50 .
[0052] The first obtaining module 20 is used to obtain the first encrypted file after encryption and compression;
[0053] A selection modul...
Embodiment 3
[0064] In order to facilitate the understanding of the technical solutions provided by the present invention, the following will describe in detail in conjunction with embodiments of specific scenarios.
[0065] The embodiment of this patent is a file encryption scheme for random bit interception and storage, which can be based on password encryption and compression such as zip and rar settings, and intercept random-length binary at random positions in the encrypted compressed file binary, and intercept the binary content and The location mark is stored in the database. When it needs to be decrypted, it is necessary to extract the binary corresponding to the file in the database and fill it back to the position of the corresponding mark to restore it to an encrypted file. When decompressing, the password is used to decompress.
[0066] In this embodiment, double encryption is set for encrypted files, and the randomly intercepted binary is stored in the database. The database ha...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com