File protection method and device

A file and starting location technology, applied in digital data protection, secure communication devices, computer security devices, etc., can solve problems such as key confusion processing, reduce the risk of leakage, reduce workload, and improve randomness

Pending Publication Date: 2021-03-19
厦门天锐科技股份有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a file protection method to solve the problems in the prior art that the key information is not obfuscated, and it is easy to obtain the key in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and device
  • File protection method and device
  • File protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0067] The exemplary embodiments and descriptions of the application are used to explain the application, but not to limit the application. In addition, elements / members with the same or similar numbers used in the drawings and embodiments are used to represent the same or similar parts.

[0068] It should be understood that the "first", "second", etc. used in this application do not specifically refer to the meaning of sequence or order, nor are they used to limit thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a file protection method and device. The file protection method comprises the steps of randomly selecting one number from a plurality of preset numbers as a random number, carrying out the encryption processing of a first password set by a user, acquiring an encrypted first password, splicing an encryption date and the encrypted first password, so as to obtain a spliced first sequence, encrypting the spliced first sequence and the random number to obtain a key sequence, counting the key sequence and the random number to determine an encryption starting position of the key sequence, and encrypting a to-be-encrypted file by using the key sequence based on the encryption starting position to obtain an encrypted file. The key sequence is not fixed and random, so that the flexibility and the unpredictability of the key sequence can be improved, the safety and the reliability of the encrypted file can be greatly improved, and the risk that file data isleaked can be reduced.

Description

technical field [0001] The embodiments of the present application relate to the technical field of data protection, and in particular, to a file protection method and device. Background technique [0002] With the development of electronic information technology, most of the information is stored on permanent storage media in the form of electronic files and disseminated through permanent storage media or networks. Most of the existing methods of encrypting files are to generate a string of keys based on some fixed content, store the keys directly in the file, and then use one or more encryption algorithms with the key to encrypt the plaintext file; decrypt The key is extracted from the encrypted file, and the encrypted file is decrypted using the corresponding algorithm. However, although this method can guarantee the security of the file to a certain extent, it still does not obfuscate the key, and it is easy to obtain the key information from the encrypted file or obtain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L29/06G06F21/62G06F21/60
CPCG06F21/602G06F21/62H04L9/0643H04L9/0861H04L9/0869H04L9/0872H04L63/0428
Inventor 涂高元邱志斌郭永兴陆云燕吴炜斌蓝济楠
Owner 厦门天锐科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products