CN102142072A - Encryption processing and decryption processing method and device of electronic files - Google Patents

Encryption processing and decryption processing method and device of electronic files Download PDF

Info

Publication number
CN102142072A
CN102142072A CN2010105456192A CN201010545619A CN102142072A CN 102142072 A CN102142072 A CN 102142072A CN 2010105456192 A CN2010105456192 A CN 2010105456192A CN 201010545619 A CN201010545619 A CN 201010545619A CN 102142072 A CN102142072 A CN 102142072A
Authority
CN
China
Prior art keywords
key
file
utilize
document
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105456192A
Other languages
Chinese (zh)
Inventor
王超
戴俊
李晓慧
尧俊利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Huawei Software Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2010105456192A priority Critical patent/CN102142072A/en
Publication of CN102142072A publication Critical patent/CN102142072A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides an encryption processing and decryption processing method and device of electronic files, wherein the encryption processing method comprises the following steps: compressing the original electronic files to generate the compressed electronic files by utilizing a first secret key, writing the first secret key into a first license file and encrypting the first license file by utilizing a second secret key; and the decryption processing method comprises the following steps: decrypting the encrypted first license file to generate the first secret key by utilizing the second secret key and decompressing the compressed original electronic files to generate the original electronic files by utilizing the first secret key.

Description

The encryption of e-file, decipher processing method and device
Technical field
The embodiment of the invention relates to the information processing technology, relates in particular to a kind of encryption, decipher processing method and device of e-file.
Background technology
In the mobile reading business, file commonly used can comprise text (Text, abbreviation TXT) e-files such as file, electronic publication (Electronic Publication is called for short ePud) file and Portable Document format (Portable Document Format is called for short PDF) file.Above-mentioned e-file and other paper documents are similar, also relate to the problem of copyright.In the prior art, can utilize cryptographic algorithm to encrypt to e-file, then that above-mentioned encryption is used key writes license file, utilizes cryptographic algorithm to encrypt to this license file more at last, thereby has realized the copyright protection to e-file.When portable terminal gets access to through the license file of e-file of encrypting and process encryption, can utilize the key information that obtains in advance, generate the key of encrypted permission file, utilize the above-mentioned key that generates the encrypted electronic file through the license file of encrypting of this secret key decryption, utilize the above-mentioned e-file generation e-file of this secret key decryption, read for this mobile terminal user through encrypting.
Because cryptographic algorithm and decipherment algorithm are that unit handles with the byte, operation is complicated, and the size of e-file is generally bigger, caused utilizing cryptographic algorithm to carry out encryption and longer, thereby reduced the encryption efficient and the deciphering treatment effeciency of e-file utilize decipherment algorithm to be decrypted processing time of processing through the e-file of encrypting to e-file.
Summary of the invention
The embodiment of the invention provides a kind of encryption, decipher processing method and device of e-file; in order to realize copyright protection to e-file; minimizing is carried out the processing time of encryption and/or to be decrypted the processing time of processing through the e-file of encrypting, is improved the encryption efficient and/or the decryption processing efficient of e-file e-file.
The embodiment of the invention provides a kind of cipher processing method of e-file, comprising:
Utilize first key, original e-document is compressed generation compression of electronic file;
Described first key is write first license file;
Utilize second key, described first license file is encrypted.
The embodiment of the invention provides the decipher processing method of another kind of e-file, comprising:
Utilize second key, generate first key being decrypted through first license file of encrypting;
Utilize described first key, to the generation original e-document that decompresses of the original e-document through overcompression.
The embodiment of the invention also provides a kind of cipher processing apparatus of e-file, comprising:
Compression module is used to utilize first key, original e-document is compressed generate the compression of electronic file;
Processing module is used for described first key is write first license file;
Encrypting module is used to utilize second key, and described first license file is encrypted.
The embodiment of the invention also provides the decryption device of another kind of e-file, comprising:
Deciphering module is used to utilize second key, generates first key to being decrypted through first license file of encrypting;
Decompression module is used to utilize described first key, to the generation original e-document that decompresses of the original e-document through overcompression.
As shown from the above technical solution, the embodiment of the invention is by utilizing first key, original e-document is compressed generation compression of electronic file, described first key is write first license file, utilize second key, described first license file is encrypted, realized copyright protection e-file, reduce the processing time of original e-document being carried out encryption, thereby improved the encryption efficient of e-file; Correspondingly; can be by utilizing second key; generate first key to being decrypted through first license file of encrypting; utilize described first key; to the generation original e-document that decompresses of the original e-document through overcompression; realized to utilize second key that obtains to obtain the e-file that carries out copyright protection, reduced that the original e-document through encryption is decrypted the processing time of processing, thereby improved the decryption processing efficient of e-file.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The schematic flow sheet of the cipher processing method of the e-file that Fig. 1 provides for the embodiment of the invention one;
The schematic flow sheet of the cipher processing method of the e-file that Fig. 2 provides for the embodiment of the invention two;
The schematic flow sheet of the decipher processing method of the e-file that Fig. 3 provides for the embodiment of the invention three;
The structural representation of the cipher processing apparatus of the e-file that Fig. 4 provides for the embodiment of the invention four;
A structural representation of the decryption device of the e-file that Fig. 5 provides for the embodiment of the invention five;
Another structural representation of the decryption device of the e-file that Fig. 6 provides for the embodiment of the invention five.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The schematic flow sheet of the cipher processing method of the e-file that Fig. 1 provides for the embodiment of the invention one, as shown in Figure 1, the cipher processing method of the e-file of present embodiment can may further comprise the steps:
Step 101, utilize first key, original e-document is compressed generate the compression of electronic file;
Particularly, can utilize first key, the original e-document that obtains is compressed, that is to say, to the compression of original e-document with key.
Step 102, above-mentioned first key is write first license file;
Step 103, utilize second key, above-mentioned first license file is encrypted.
Wherein, the form of above-mentioned original e-document/compression of electronic file can include but not limited to TXT, ePud and PDF.
Wherein, above-mentioned encryption can be used but be not limited to following algorithm: Advanced Encryption Standard (Advanced Encryption Standard, abbreviation AES) cryptographic algorithm, data encryption standards (Data Encryption Standard, vehicle economy S) cryptographic algorithm, Secure Hash Algorithm (Secure Hash Algorithm is called for short SHA) cryptographic algorithm.
Because the embodiment of the invention is to encrypt at the compression key (i.e. first key) of compression original e-document, irrelevant with the size of original e-document, its processing time is a fixed numbers, is not subjected to the influence of original e-document size.Because the compression key is compared size with original e-document can be little a lot, so the time of ciphered compressed key is shorter, and the compression time of original e-document is far smaller than its encryption time, so the embodiment of the invention is shorter to the processing time that original e-document carries out encryption.And because original e-document has passed through compression, and its size can reduce, so, in transmission course, can also reduce network traffics.
Present embodiment is by to the compression of original e-document with key; and encrypt compressing employed compression key; realized copyright protection to e-file; because the compression time of original e-document is far smaller than its encryption time; and the size of compression key is far smaller than the size of original e-document; so avoided original e-document is carried out the long defective of processing time of the encryption that encryption caused; reduce the processing time of e-file being carried out encryption, thereby improved the encryption efficient of e-file.
The schematic flow sheet of the cipher processing method of the e-file that Fig. 2 provides for the embodiment of the invention two as shown in Figure 2, is compared with a last embodiment, and the cipher processing method of the e-file of present embodiment can further include following steps:
Step 201, above-mentioned second key is write in second license file;
Step 202, utilize the 3rd key, above-mentioned second license file is encrypted.
In the present embodiment; by compression key (i.e. first key) is carried out encryption; make and decipher after second license file; can not directly obtain the compression key; also need further to decipher first license file; thereby realized the purpose of the further protection of compression key has further been realized the copyright protection to e-file.
The schematic flow sheet of the decipher processing method of the e-file that Fig. 3 provides for the embodiment of the invention three, present embodiment is applicable to original e-document (compression of electronic file) and the license file through encrypting that gets access to through overcompression, and comprises the scene of the compression key that compresses original e-document in the license file.As shown in Figure 3, the decipher processing method of the e-file of present embodiment can may further comprise the steps:
Step 301, utilize second key, generate first key being decrypted through first license file of encrypting;
Wherein, the obtain manner of above-mentioned second key can include but not limited to following several mode:
A, directly obtain second key from server;
The key information that B, basis are obtained from server generates second key;
The key information that C, basis are obtained from server generates the 3rd key, utilizes above-mentioned the 3rd key, second key that another license file (i.e. second license file) through encrypting that deciphering is obtained generates:
Because original e-document is when carrying out encryption; compression key (i.e. first key) has been carried out encryption; make and to generate the key (i.e. second key) of encrypting first license file by another license file of deciphering (i.e. second license file); can utilize this secret key decryption to generate the compression key of compression original e-document through first license file of encrypting; thereby realized the purpose of the further protection of compression key has further been realized the copyright protection to e-file.
Particularly, can utilize second key that generates that obtain from server or local, first license file that the process that deciphering is obtained is encrypted generates the compression key (i.e. first key) of compression original e-document.
Step 302, utilize described first key, to the generation original e-document that decompresses of the original e-document through overcompression.
Wherein, the form of above-mentioned original e-document can include but not limited to TXT, ePud and PDF.
Particularly, can utilize above-mentioned first key of generation, the compression of electronic file that obtains that decompresses generates original e-document.
Wherein, above-mentioned deciphering can be used but be not limited to following algorithm: high level decryption standard (Advanced Encryption Standard, abbreviation AES) decipherment algorithm, data decryption standard (Data Encryption Standard, vehicle economy S) decipherment algorithm, Secure Hash Algorithm (Secure Hash Algorithm is called for short SHA) decipherment algorithm.
In the present embodiment, when the original e-document and first license file that get access to through overcompression through encrypting, and when comprising the compression key that compresses original e-document in first license file, can utilize second key that obtains, deciphering generates the compression key (i.e. first key) of compression original e-document through first license file of encrypting, then utilize above-mentioned first key that generates, the compression of electronic file that obtains that decompresses generates original e-document.
Because the embodiment of the invention is to be decrypted at the compression key (i.e. first key) that compresses original e-document, irrelevant with the size of original e-document, its processing time is a fixed numbers, is not subjected to the influence of original e-document size.Because the compression key is compared size with original e-document can be little a lot, so the time of deciphering compression key is shorter, and the decompression time of original e-document is far smaller than its deciphering time, so the embodiment of the invention is shorter to the processing time that the original e-document through the compression of band key is decrypted processing.And because original e-document has passed through compression, and its size can reduce, so, in transmission course, can also reduce network traffics.
Present embodiment is because to the compression of original e-document with key; and encrypt compressing employed compression key; therefore; when deciphering, can utilize second key; generate first key to being decrypted through first license file of encrypting; then utilize this first key; to the generation original e-document that decompresses of the original e-document through overcompression; read for the user; realized to utilize second key that obtains to obtain the original e-document that carries out copyright protection; so avoided to be decrypted the long defective of processing time of the decryption processing that processing causes through the original e-document of encrypting; reduced that the original e-document through encryption is decrypted the processing time of processing, thereby improved the decryption processing efficient of e-file.
Need to prove: for aforesaid each method embodiment, for simple description, so it all is expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not subjected to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in the instructions all belongs to preferred embodiment, and related action and module might not be that the present invention is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, do not have the part that describes in detail among certain embodiment, can be referring to the associated description of other embodiment.
The structural representation of the cipher processing apparatus of the e-file that Fig. 4 provides for the embodiment of the invention four, as shown in Figure 4, the cipher processing apparatus of the e-file of present embodiment can comprise compression module 41, processing module 42 and encrypting module 43.Wherein, compression module 41 utilizes first key, original e-document is compressed generate the compression of electronic file, and processing module 42 writes first license file with above-mentioned first key, and encrypting module 43 utilizes second key, and above-mentioned first license file is encrypted.
The cipher processing apparatus of the e-file that the function of method all can be provided by the embodiment of the invention in the foregoing description one, two is realized.
In the present embodiment; by compression module to the compression of original e-document with key; and processing module and encrypting module are encrypted compressing employed compression key; realized copyright protection to e-file; because the compression time of original e-document is far smaller than its encryption time; and the size of compression key is far smaller than the size of original e-document; so avoided original e-document is carried out the long defective of processing time of the encryption that encryption caused; reduce the processing time of e-file being carried out encryption, thereby improved the encryption efficient of e-file.
Further; encrypting module 43 in the present embodiment can also further write above-mentioned second key in second license file; utilize the 3rd key; above-mentioned second license file is encrypted; by encrypting module compression key (i.e. first key) is carried out encryption; make and decipher after second license file; can not directly obtain the compression key; also need further to decipher first license file; thereby realized the purpose of the further protection of compression key has further been realized the copyright protection to e-file.
A structural representation of the decryption device of the e-file that Fig. 5 provides for the embodiment of the invention five, as shown in Figure 5, the decryption device of the e-file of present embodiment can comprise deciphering module 51 and decompression module 52.Wherein, deciphering module 51 utilizes second key, generate first key to being decrypted through first license file of encrypting, above-mentioned first key that decompression module 52 utilizes deciphering module 51 to generate is to the generation original e-document that decompresses of the original e-document through overcompression.
The decryption device of the e-file that the function of method can be provided by the embodiment of the invention in the foregoing description three is realized.
In the present embodiment; owing to get access to original e-document through the compression of band key; and the employed compression key of compression (i.e. first license file through encrypting) through encrypting; therefore; when deciphering, can utilize second key by deciphering module; generate first key to being decrypted through first license file of encrypting; then decompression module utilizes this first key; to the generation original e-document that decompresses of the original e-document through overcompression; read for the user; realized to utilize second key that obtains to obtain the original e-document that carries out copyright protection; so avoided to be decrypted the long defective of processing time of the decryption processing that processing causes through the original e-document of encrypting; reduced that the original e-document through encryption is decrypted the processing time of processing, thereby improved the decryption processing efficient of e-file.
Further, as shown in Figure 6, the decryption device of the e-file that present embodiment provides can further include key production module 61, can generate second key according to key information.
Replacedly, key production module 61 can also generate the 3rd key according to key information, utilizes above-mentioned the 3rd key, and deciphering generates second key through second license file of encrypting.Because original e-document is when carrying out encryption; compression key (i.e. first key) has been carried out encryption; make key production module 61 to generate the key (i.e. second key) of encrypting first license file by another license file of deciphering (i.e. second license file); can utilize this secret key decryption to generate the compression key of compression original e-document through first license file of encrypting; thereby realized the purpose of the further protection of compression key has further been realized the copyright protection to e-file.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of programmed instruction, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (11)

1. the cipher processing method of an e-file is characterized in that, comprising:
Utilize first key, original e-document is compressed generation compression of electronic file;
Described first key is write first license file;
Utilize second key, described first license file is encrypted.
2. method according to claim 1 is characterized in that, described method also comprises:
Described second key is write in second license file;
Utilize the 3rd key, described second license file is encrypted.
3. method according to claim 1 and 2 is characterized in that, described encryption comprises and utilizes the AES cryptographic algorithm to encrypt; Perhaps
Utilize the des encryption algorithm for encryption; Perhaps
Utilize the SHA cryptographic algorithm to encrypt.
4. the decipher processing method of an e-file is characterized in that, comprising:
Utilize second key, generate first key being decrypted through first license file of encrypting;
Utilize described first key, to the generation original e-document that decompresses of the original e-document through overcompression.
5. method according to claim 4 is characterized in that, described second key that utilizes also comprised before being decrypted generation first key through first license file of encrypting:
Generate second key according to key information.
6. method according to claim 4 is characterized in that, described second key that utilizes also comprised before being decrypted generation first key through first license file of encrypting:
Generate the 3rd key according to key information;
Utilize described the 3rd key, deciphering generates second key through second license file of encrypting.
7. according to claim 4,5 or 6 described methods, it is characterized in that described deciphering comprises:
Utilize the deciphering of AES decipherment algorithm; Perhaps
Utilize the deciphering of DES decipherment algorithm; Perhaps
Utilize the deciphering of SHA decipherment algorithm.
8. the cipher processing apparatus of an e-file is characterized in that, comprising:
Compression module is used to utilize first key, original e-document is compressed generate the compression of electronic file;
Processing module is used for described first key is write first license file;
Encrypting module is used to utilize second key, and described first license file is encrypted.
9. device according to claim 8 is characterized in that described encrypting module also is used for
Described second key is write in second license file, utilize the 3rd key, described second license file is encrypted.
10. the decryption device of an e-file is characterized in that, comprising:
Deciphering module is used to utilize second key, generates first key to being decrypted through first license file of encrypting;
Decompression module is used to utilize described first key, to the generation original e-document that decompresses of the original e-document through overcompression.
11. device according to claim 10 is characterized in that, also comprises key production module, is used for generating second key according to key information; Perhaps
Generate the 3rd key according to key information, utilize described the 3rd key, deciphering generates second key through second license file of encrypting.
CN2010105456192A 2010-11-15 2010-11-15 Encryption processing and decryption processing method and device of electronic files Pending CN102142072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105456192A CN102142072A (en) 2010-11-15 2010-11-15 Encryption processing and decryption processing method and device of electronic files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105456192A CN102142072A (en) 2010-11-15 2010-11-15 Encryption processing and decryption processing method and device of electronic files

Publications (1)

Publication Number Publication Date
CN102142072A true CN102142072A (en) 2011-08-03

Family

ID=44409574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105456192A Pending CN102142072A (en) 2010-11-15 2010-11-15 Encryption processing and decryption processing method and device of electronic files

Country Status (1)

Country Link
CN (1) CN102142072A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708336A (en) * 2012-05-02 2012-10-03 四川建设网有限责任公司 Method and system for electronic document processing based on separation of key data from customized template
CN103971034A (en) * 2014-04-24 2014-08-06 福建联迪商用设备有限公司 Method and device for protecting Java software
WO2015117437A1 (en) * 2014-07-22 2015-08-13 中兴通讯股份有限公司 File encryption/decryption method and device
CN105095783A (en) * 2014-05-20 2015-11-25 中兴通讯股份有限公司 File encryption method and apparatus, encrypted file reading method and apparatus and terminal
CN106209359A (en) * 2016-07-14 2016-12-07 北京白鹭时代信息技术有限公司 A kind of decoding and the method and device decompressing encrypted lottery bag
CN113918968A (en) * 2021-09-27 2022-01-11 山东浪潮通软信息科技有限公司 File encryption method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002072875A (en) * 2000-08-28 2002-03-12 Sangikyou:Kk Digital signature method
CN1478347A (en) * 2000-11-28 2004-02-25 ˹ά�ּ������޹�˾ Secure file transfer method and system
CN1710505A (en) * 2005-07-08 2005-12-21 北京影立驰技术有限公司 Digital copyright protection method and system
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据系统有限公司 Encryption and decryption method and device of digital media file
US20100054468A1 (en) * 2008-08-29 2010-03-04 James Paul Schneider Validating compressed archive keys

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002072875A (en) * 2000-08-28 2002-03-12 Sangikyou:Kk Digital signature method
CN1478347A (en) * 2000-11-28 2004-02-25 ˹ά�ּ������޹�˾ Secure file transfer method and system
CN1710505A (en) * 2005-07-08 2005-12-21 北京影立驰技术有限公司 Digital copyright protection method and system
CN101271501A (en) * 2008-04-30 2008-09-24 北京握奇数据系统有限公司 Encryption and decryption method and device of digital media file
US20100054468A1 (en) * 2008-08-29 2010-03-04 James Paul Schneider Validating compressed archive keys

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708336A (en) * 2012-05-02 2012-10-03 四川建设网有限责任公司 Method and system for electronic document processing based on separation of key data from customized template
CN102708336B (en) * 2012-05-02 2015-04-22 四川建设网有限责任公司 Method and system for electronic document processing based on separation of key data from customized template
CN103971034A (en) * 2014-04-24 2014-08-06 福建联迪商用设备有限公司 Method and device for protecting Java software
CN105095783A (en) * 2014-05-20 2015-11-25 中兴通讯股份有限公司 File encryption method and apparatus, encrypted file reading method and apparatus and terminal
WO2015176394A1 (en) * 2014-05-20 2015-11-26 中兴通讯股份有限公司 File encryption method and device, and encrypted file reading method, device and terminal
WO2015117437A1 (en) * 2014-07-22 2015-08-13 中兴通讯股份有限公司 File encryption/decryption method and device
CN105281897A (en) * 2014-07-22 2016-01-27 中兴通讯股份有限公司 File encryption method and device and file decryption method and device
CN106209359A (en) * 2016-07-14 2016-12-07 北京白鹭时代信息技术有限公司 A kind of decoding and the method and device decompressing encrypted lottery bag
CN113918968A (en) * 2021-09-27 2022-01-11 山东浪潮通软信息科技有限公司 File encryption method and device

Similar Documents

Publication Publication Date Title
CN102334124B (en) File protection method and device
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
US8571220B2 (en) Method and apparatus for securing data in a memory device
CN100393027C (en) Digital data recording apparatus, storage apparatus and using device
US20120269340A1 (en) Hierarchical encryption/decryption device and method thereof
CN101646168B (en) Data encryption method, decryption method and mobile terminal
CN1263305A (en) Digital data file scrambler and its method
CN102142072A (en) Encryption processing and decryption processing method and device of electronic files
CN102377564A (en) Method and device for encrypting private key
CN101272238A (en) Performing AES encryption or decryption in multiple modes with a single instruction
CN101262332A (en) Method and system for mutual authentication between mobile and host devices
WO2014007296A1 (en) Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
CN103237010B (en) The server end of digital content is cryptographically provided
CN104063672A (en) Data security storage method
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
JP2002351742A (en) Data protecting device
Lalitha et al. An efficient data encryption through image via prime order symmetric key and bit shuffle technique
WO2020044095A1 (en) File encryption method and apparatus, device, terminal, server, and computer-readable storage medium
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
CN106100829B (en) Method and device for encrypted storage
JP2001142396A (en) Ciphering device, its method, ciphering/deciphering device, its method and communication system
CN103491384A (en) Encrypting method and device of video and decrypting method and device of video
CN106454409A (en) Encrypting method and device of multimedia document
CN104615944A (en) Method and device for encrypting and decrypting files
CN1722052A (en) Digital data file scrambler and its method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110803