File encryption method and device

A file encryption and encrypted file technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of high decryption complexity and low file encryption security, and achieve the effect of speeding up encryption and decryption and improving security.

Pending Publication Date: 2020-08-18
SHANGHAI MININGLAMP ARTIFICIAL INTELLIGENCE GRP CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a file encryption method and device to at least so

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method and device
  • File encryption method and device
  • File encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a computer terminal of a file encryption method according to an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more ( figure 1 Only one is shown in ) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. figure 2 It is a block diagram of the hardware structure of the computer terminal of another file encryption method of the embodiment of the present invention, as figure 2 As shown, in an exemplary embodiment, the above-mentioned computer terminal may further include a transmission device 106 and an input and o...

Embodiment 2

[0050] In this embodiment, a file encryption device is also provided, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the terms 'module' and 'unit' may be a combination of software and / or hardware that realize a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0051] Figure 4 is a structural block diagram of a file encryption device according to an embodiment of the present invention, such as Figure 4 As shown, the device includes a first acquisition module 20 , a selection module 30 , an interception module 40 and a first splicing module 50 .

[0052] The first obtaining module 20 is used to obtain the first encrypted file after encryption and compression;

[0053] A selection modul...

Embodiment 3

[0064] In order to facilitate the understanding of the technical solutions provided by the present invention, the following will describe in detail in conjunction with embodiments of specific scenarios.

[0065] The embodiment of this patent is a file encryption scheme for random bit interception and storage, which can be based on password encryption and compression such as zip and rar settings, and intercept random-length binary at random positions in the encrypted compressed file binary, and intercept the binary content and The location mark is stored in the database. When it needs to be decrypted, it is necessary to extract the binary corresponding to the file in the database and fill it back to the position of the corresponding mark to restore it to an encrypted file. When decompressing, the password is used to decompress.

[0066] In this embodiment, double encryption is set for encrypted files, and the randomly intercepted binary is stored in the database. The database ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a file encryption method and device. The method comprises the steps of obtaining an encrypted and compressed first encrypted file; selecting an interception position of a binary file of the first encrypted file; intercepting a binary file of the first encrypted file according to the interception position, and storing interception position information and intercepted binary content into a database; and splicing the remaining binary files after the first encrypted file is intercepted to generate a second encrypted file. According to the embodiment of the invention, the binary file of the first encrypted file is subjected to position interception and storage, so that the problem of relatively low file encryption security in related technologies can be solved, and the effect of improving the security of the encrypted file is achieved.

Description

technical field [0001] Embodiments of the present invention relate to the field of data encryption, and in particular, to a file encryption method and device. Background technique [0002] Common file encryption methods in the industry, such as zip, rar, etc., are encrypted and compressed by setting a password, but the cracking technology for zip and rar encrypted compressed files is becoming more and more mature, resulting in a gradual decline in the file encryption security. [0003] The related technology generally adopts a file encryption method with a chaotic characteristic. This method is based on the irrational number DES algorithm, which divides files into groups and performs encryption operations on each block in a loop. The amount of data to be processed is relatively large, especially for large files, the complexity and calculation amount of decryption are also relatively high, and the performance is relatively poor. Contents of the invention [0004] Embodimen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/60G06F21/62
CPCG06F21/31G06F21/602G06F21/6218
Inventor 吴光需梁志婷徐浩
Owner SHANGHAI MININGLAMP ARTIFICIAL INTELLIGENCE GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products