Method for generating and using encrypted tamper-proof file

A tamper-proof, symmetric encryption algorithm technology, applied in the field of embedded industrial control and information security, can solve the problems of large resource consumption of file tampering monitoring, complicated authorization process, inaccurate positioning of tampered content, etc., to facilitate attack analysis and copy. Transfer and resolve the effect of self-recovery

Pending Publication Date: 2021-10-01
NARI TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Purpose of the invention: The purpose of the present invention is to provide a method for generating and using encrypted and tamper-proof files for power secondary equipment data files, through which functions such as file integrity, security, authorized access, and recovery can be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and using encrypted tamper-proof file
  • Method for generating and using encrypted tamper-proof file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific embodiment of the present invention will be further described below in conjunction with accompanying drawing:

[0029] Such as figure 1 As shown, it is a schematic diagram of the generation process of the encrypted tamper-proof file of the present invention, and the specific steps of generating the file are as follows:

[0030]S1: The power secondary equipment application writes files with the authorization information code AuthMsg. The authorization information code is 200 bytes of plaintext data, and the format and content are determined by the application itself;

[0031] S2: After the file system generates the original file, obtain the file size SizeFile (assuming the file size is 4K), open up (SizeFile*2)+(SizeFile / 1K)*32*2+32 byte space to record the final generated encryption Tamper-proof documents;

[0032] S3: Group the original file in units of 1K bytes to obtain four groups A, B, C, and D, and make a copy of the four groups A', B', C', and D'; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating and using an encrypted tamper-proof file, which comprises the following steps of: introducing an authorization information code when an application writes a file, backing up an original file, carrying out grouping encryption on the original file and a backup file, carrying out abstract calculation on encrypted groups, and generating an abstract; and finally, splicing each encrypted group, the abstract and the encrypted authorization information code to form an encrypted tamper-proof file. During use, an application brings in authorization information codes to access a file, a file system encrypts the authorization information codes through a digest algorithm, compares an encryption result with the encrypted authorization information codes of the file, allows access if the encryption result is consistent with the encrypted authorization information codes of the file, denies access if the encryption result is not consistent with the encrypted authorization information codes of the file, performs tamper-proof verification on the double areas in groups if the access is allowed, and if a certain group fails in verification, restoration is performed by a corresponding group passing by verification in an other area. Finally, a group passing verification is decrypted to acquire an original file. The file can realize the functions of file integrity, safety, authorized access and recoverability by themselves.

Description

technical field [0001] The invention relates to the technical field of embedded industrial control and information security, in particular to an encryption and tamper-proof file generation and use method for power secondary equipment data files. Background technique [0002] With the rapid development of information technology, more and more files are stored on computers and servers, and a large amount of important data is stored in the system in the form of files in plain text. However, at the same time, the attack methods against files are also constantly evolving, causing data loss, leakage, system crashes and other problems. How to ensure the safety of important documents is a problem that people have been paying close attention to all the time. [0003] With the rapid development of power grid construction, the system structure of the power grid is becoming more and more complex. The safe and stable operation of the power grid is an important factor related to the nati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64G06F21/60G06F11/14
CPCG06F21/64G06F21/602G06F11/1448G06F11/1458G06F2221/2107
Inventor 李友军周华良丁袁李延新张吉戴欣欣罗华煜饶丹郑奕刘拯张成彬
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products