CN103914666A - File encryption and decryption method and device on the basis of partitions - Google Patents

File encryption and decryption method and device on the basis of partitions Download PDF

Info

Publication number
CN103914666A
CN103914666A CN201310425533.XA CN201310425533A CN103914666A CN 103914666 A CN103914666 A CN 103914666A CN 201310425533 A CN201310425533 A CN 201310425533A CN 103914666 A CN103914666 A CN 103914666A
Authority
CN
China
Prior art keywords
file
subregion
key
user
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310425533.XA
Other languages
Chinese (zh)
Inventor
杨志坚
成连
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eurasian Baolong Information Security Technology (hunan) Co Ltd
Original Assignee
Eurasian Baolong Information Security Technology (hunan) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eurasian Baolong Information Security Technology (hunan) Co Ltd filed Critical Eurasian Baolong Information Security Technology (hunan) Co Ltd
Priority to CN201310425533.XA priority Critical patent/CN103914666A/en
Publication of CN103914666A publication Critical patent/CN103914666A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file encryption method and device on the basis of partitions. The method includes that file encryption partitions which are protected by user password and/or key file are established; firstly, one of partitions is selected, which comprises a partition head, a file area and an idle area; then a random number is generated and stored as a salt figure in a first part of the partition head, and a file encryption key is generated to encrypt file data of the file area; the password and/or the key file set by a user are/is read, a user encryption key is generated by the password and/or the key file and the salt figure, and the file encryption key is encrypted according to the generated user encryption key to be stored on a tail portion of the partition head; a file encryption partition is loaded, which includes that a drive is distributed to the file encryption partition; after the use of the encryption partition is finished, the file encryption partition is unloaded, which includes that the drive of the file encryption partition is released. Thereby, by means of the method and the device, strength and encryption strength of the file password can be improved.

Description

A kind of file encryption-decryption method and device based on subregion
Technical field
The present invention relates to field of information security technology, refer to especially a kind of file encryption-decryption method and device based on subregion.
Background technology
Network universal allows obtaining, sharing of information and transmission become easily simple, also increased the risk that important information is revealed simultaneously, and therefore various file encrypting methods and instrument emerge in an endless stream.The attribute that has some Encryption Tools to utilize operating system to change file (folder) reaches the object of encryption, this mode is not to encrypt strictly speaking, say at most a kind of method of maintaining secrecy, because file (folder) is not carried out to real cryptographic operation, and this method depends on concrete operating system, once file (folder) has left original operating system, just can be shown by other system.Some file editors itself are integrated Encryption Tool, as editing machines such as PDF, WORD, EXCEL, the encryption function of these editing machines is more weak in fact, file is usually cracked by some decoding tools, reason is because encryption mechanism is too simple on the one hand, and another very important reason is that encryption key is simple.
Summary of the invention
In view of this, the object of the invention is to propose a kind of file encryption-decryption method and device based on subregion, can improve intensity and the encryption and decryption intensity of file password.
Based on the above-mentioned purpose file encrypting method based on subregion provided by the invention, comprise step:
Select the subregion for storing file to be encrypted;
Generate random number and deposit in the subregion head stem of described subregion as salt figure, spanned file encryption key is also encrypted the file data in this subregion;
Read user's password and/or key file, utilize this password and/or key file and described salt figure to generate user encryption key;
According to the described user encryption key generating, described file encryption key is encrypted;
File encryption key after encrypting is deposited in to the afterbody of subregion head.
Alternatively, described file encryption key generates one group of character by random number generator in internal memory and obtains;
Described file data in this subregion is encrypted as utilizing this group of character to carry out once the file data of file area storage or once above repeatedly encryption.
Further, described utilization in the process that file encryption key is encrypted the file data of storage, the cryptographic algorithm of choosing any one kind of them, or select several cryptographic algorithm to be used in combination; And/or in the process being encrypted according to the user encryption key-pair file encryption key generating, the cryptographic algorithm of employing is automated randomized selection cryptographic algorithm, or cryptographic algorithm is all offered to user, allow user oneself select.
Further, the described file encrypting method based on subregion also comprises generating fills random number, uses described file encryption key to be encrypted it, and writes the free area of described subregion.
Based on above-mentioned purpose, the present invention also provides the method for the file decryption based on subregion, comprises step:
Read password and/or the key file of user's input;
Find the encrypted partition matching with described password and/or key file obtaining by encryption method described above;
Extract the salt figure of described encrypted partition, utilize this password and/or key file and described salt figure to generate user's decruption key;
According to described user's decruption key, the file encryption key of the described encryption of depositing in subregion head-tail is decrypted, obtains file decryption key;
Utilize described file decryption key to be decrypted the file data of encrypting, obtain file data in this subregion.
Alternatively, the salt figure of the described encrypted partition of described extraction comprises: password and/or the key file of user's input are converted into a decruption key, cryptographic algorithm described in the decruption key utilization obtaining is decrypted to computing to subregion head, if the salt figure that can obtain setting in advance, password and/or the key file of authenticated input are correct; If can not obtain salt figure, subregion head can not be decrypted, shows input error, and prompting user re-enters password and/or key file.
Based on above-mentioned purpose, the present invention also provides the document encrypting apparatus based on subregion, comprising:
Encrypted partition selected cell, for selecting the subregion for storing file to be encrypted;
File data ciphering unit, is connected with described encrypted partition selected cell, deposits in the subregion head stem of described subregion for generating random number as salt figure, and spanned file encryption key is also encrypted the file data in this subregion;
File encryption key ciphering unit, is connected with described file data ciphering unit, for reading user's password and/or key file, utilizes this password and/or key file and described salt figure to generate user encryption key; According to the described user encryption key generating, described file encryption key is encrypted; File encryption key after encrypting is deposited in to the afterbody of subregion head.
Alternatively, described file encryption key ciphering unit is in the process being encrypted according to the user encryption key-pair file encryption key generating, the cryptographic algorithm adopting is automated randomized selection cryptographic algorithm, or cryptographic algorithm is all offered to user, allows user oneself select.
Further, described file data ciphering unit also comprises generating fills random number, uses described file encryption key to be encrypted it, and writes the free area of described subregion.
Based on above-mentioned purpose, the present invention also provides the file deciphering device based on subregion, comprising:
Reading unit, for reading password and/or the key file of user's input;
User's decruption key generation unit, is connected with described reading unit, for finding the encrypted partition matching with described password and/or key file obtaining by encryption device described above;
File decryption key generation unit, is connected with described user's decruption key generation unit, for according to described user's decruption key, the file encryption key of the described encryption of depositing in subregion head-tail being decrypted, obtains file decryption key;
Obtain file data unit, be connected with described file decryption key generation unit, for utilizing described file decryption key to be decrypted the file data of encrypting, obtain file data in this subregion.
As can be seen from above, file encryption-decryption method and device based on subregion provided by the invention, by write the random number of random generation on subregion, and random spanned file encryption key is encrypted file data, finally utilize the password and/or the key file that read user's setting to be encrypted file encryption key.Therefore, the present invention has obviously improved the complicacy to file data encryption and decryption, has guaranteed the security of file data.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the file encrypting method of the embodiment of the present invention based on subregion;
Fig. 2 is the structural representation of the encrypted partition of the file encrypting method of the embodiment of the present invention based on subregion;
Fig. 3 is the structural representation of the document encrypting apparatus of the embodiment of the present invention based on subregion;
Fig. 4 is the structural representation of the file deciphering device of the embodiment of the present invention based on subregion.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with specific embodiment, and with reference to accompanying drawing, the present invention is described in more detail.
Consulting shown in Fig. 1, is the schematic flow sheet of the file encrypting method of the embodiment of the present invention based on subregion.The described file encrypting method based on subregion comprises:
Step 101, selects one for storing the subregion of file to be encrypted, comprises subregion head, file area and free area (structural representation of encrypted partition as shown in Figure 2).
Step 102, generates random number, deposits in the stem of subregion head as the salt figure of encrypted partition.Wherein, so-called salt figure is not identical in order to ensure the hashed value of any two user ciphers, before Crypted password, and a unique value of adding in each user's password.Preferably, generate random number by random number generator in internal memory.
Step 103, spanned file encryption key, encrypts the file data of file area storage.
As an embodiment, the generation of file encryption key is to obtain by one of random number generator generation or one group of character in internal memory.Preferably, if what produce is one group of character, just can repeatedly encrypt the file data of file area storage, improve the complexity of encryption, make to crack impossible on coming true of file.Utilize file encryption key in the process that is encrypted of file data of storage, user's cryptographic algorithm of can choosing any one kind of them, or select several cryptographic algorithm to be used in combination.Preferably, described file data cryptographic algorithm can be DES, 3DES, RC2, RC4, RC5, AES, Blowfish, Twofish, Rijndael, AES-256, Serpent one or a combination set of.
It should be noted that, as embodiments of the invention, while carrying out the file encryption based on subregion, step 102 and step 103 can be carried out according to above-mentioned order, also can first carry out steps 103, then carry out steps 102.In another embodiment of the present invention, also can carry out step 102 and 103 simultaneously.
Step 104: read password and/or key file that user arranges, utilize this password and/or key file and described salt figure to generate user encryption key, and be encrypted according to the described user encryption key-pair file encryption key generating, the file encryption key after encrypting deposited in to the afterbody of subregion head simultaneously.
In one embodiment of the invention, user can arrange password or key file, and password and key file also can be set simultaneously.Generating in the process of user encryption key, can generate according to PBKDF2 algorithm.
Preferably, DK=PBKDF2 (P, S, C, dkLen), wherein DK is final encryption key of deriving.Parameter P is password and/or the key file that user inputs, if that user's input is the front 1KB that key file is only got for example key file of a part of described key file conventionally; If user inputs password and key file simultaneously, conventionally need first password and key file to be carried out to such as xor operation of pre-service.Parameter S is to encrypt " salt figure ", and parameters C is the number of times that cryptographic hash is repeated to Hash iteration.Parameter d kLen is the length of key derivation, and length range is 64-256.In addition, the hash algorithm that PBKDF2 algorithm adopts can be: HMAC-SHA-512, HMAC-RIPEMD-160, MD4, MD5, SHA, RIPEMD, Whirlpool, HMAC-etc., user can choose any one kind of them.So-called hash algorithm is the less binary value that the binary value of random length is mapped as to regular length, and this little binary value is called cryptographic hash.Cryptographic hash is the unique and extremely compact numeric representation form of one piece of data.If one section of plaintext of hash and even only change a letter of this paragraph, Hash subsequently all will produce different values.Finding hash is two different inputs of same value, on calculating, is impossible, so the integrality that the cryptographic hash of data can check data.
In another embodiment of the present invention, be encrypted according to the user encryption key-pair file encryption key generating, the cryptographic algorithm of employing can be automated randomized selection cryptographic algorithm, also cryptographic algorithm all can be offered to user, allows user oneself select.
In addition, the described file encrypting method based on subregion can also generate filling random number, then uses described file encryption key to be encrypted described filling random number, and writes the free area of subregion.There is the content of encryption file area and free area like this, cannot distinguish the boundary of file area and free area, thereby can prevent the file area in subregion to survey.Wherein, described filling random number can generate by the random generator in internal memory.
Further, the present invention has illustrated that the encrypted partition that the file encrypting method based on subregion described above is obtained is decrypted, and first reads password and/or the key file of user's input; Find the encrypted partition matching with described password and/or key file obtaining by encryption method described above; Extract the salt figure of described encrypted partition, utilize this password and/or key file and described salt figure to generate user's decruption key; According to user's decruption key, the file encryption key of the described encryption of depositing in subregion head-tail is decrypted, obtains file decryption key; Utilize file decryption key to be decrypted the file data of encrypting, obtain file data in this subregion.
As one embodiment of the present of invention, password and/or the key file of user's input are converted into a decruption key, cryptographic algorithm described in the decruption key utilization obtaining is decrypted to computing to subregion head, if the salt figure that can obtain setting in advance, password and/or the key file of authenticated input are correct; If can not obtain salt figure, subregion head can not be decrypted, shows input error, and prompting user re-enters password and/or key file.
Consulting shown in Fig. 3, is the structural representation of the document encrypting apparatus of the embodiment of the present invention based on subregion.The described document encrypting apparatus based on subregion comprises:
Encrypted partition selected cell 301, selects one for storing the subregion of file to be encrypted, comprises subregion head, file area and free area (structural representation of encrypted partition as shown in Figure 2).
File data ciphering unit 302, is connected with encrypted partition selected cell 301, and its major function comprises:
1) generate random number, deposit in the stem of subregion head as the salt figure of encrypted partition.Wherein, so-called salt figure is not identical in order to ensure the hashed value of any two user ciphers, before Crypted password, and a unique value of adding in each user's password.Preferably, generate random number by random number generator in internal memory.
2) spanned file encryption key, encrypts the file data of file area storage: as an embodiment, the generation of file encryption key is to obtain by one of random number generator generation or one group of character in internal memory.Preferably, if what produce is one group of character, just can repeatedly encrypt the file data of storage, improve the complexity of encryption, make to crack impossible on coming true of file.Utilize file encryption key in the process that is encrypted of file data of storage, user's cryptographic algorithm of can choosing any one kind of them, or select several cryptographic algorithm to be used in combination.Preferably, described file data cryptographic algorithm can be DES, 3DES, RC2, RC4, RC5, AES, Blowfish, Twofish, Rijndael, AES-256, Serpent one or a combination set of.
3) can also generate filling random number, then use described file encryption key to be encrypted described filling random number, and write the free area of subregion.There is the content of encryption file area and free area like this, cannot distinguish the boundary of file area and free area, thereby can prevent the file area in subregion to survey.Wherein, described filling random number can generate by the random generator in internal memory.
File encryption key ciphering unit 303, is connected with file data ciphering unit 302, and its major function comprises:
Read password and/or key file that user arranges, utilize this password and/or key file and described salt figure to generate user encryption key, and be encrypted according to the described user encryption key-pair file encryption key generating, the file encryption key after encrypting deposited in to the afterbody of subregion head simultaneously.
In one embodiment of the invention, user can arrange password or key file, and password and key file also can be set simultaneously.Generating in the process of user encryption key, can generate according to PBKDF2 algorithm.
Preferably, DK=PBKDF2 (P, S, C, dkLen), wherein DK is final encryption key of deriving.Parameter P is password and/or the key file that user inputs, if that user's input is the front 1KB that key file is only got for example key file of a part of described key file conventionally; If user inputs password and key file simultaneously, conventionally need first password and key file to be carried out to such as xor operation of pre-service.Parameter S is to encrypt " salt figure ", and parameters C is the number of times that cryptographic hash is repeated to Hash iteration.Parameter d kLen is the length of key derivation, and length range is 64-256.In addition, the hash algorithm that PBKDF2 algorithm adopts can be: HMAC-SHA-512, HMAC-RIPEMD-160, MD4, MD5, SHA, RIPEMD, Whirlpool, HMAC-etc., user can choose any one kind of them.So-called hash algorithm is the less binary value that the binary value of random length is mapped as to regular length, and this little binary value is called cryptographic hash.Cryptographic hash is the unique and extremely compact numeric representation form of one piece of data.If one section of plaintext of hash and even only change a letter of this paragraph, Hash subsequently all will produce different values.Finding hash is two different inputs of same value, on calculating, is impossible, so the integrality that the cryptographic hash of data can check data.
In another embodiment of the present invention, be encrypted according to the user encryption key-pair file encryption key generating, the cryptographic algorithm of employing can be automated randomized selection cryptographic algorithm, also cryptographic algorithm all can be offered to user, allows user oneself select.
In addition, in the time loading described file encryption subregion, distribute a drive to described file encryption subregion.Can also be provided with encryption servo programe, in monitoring encrypted partition, file calls state, in real time file is encrypted.
In the time of the described file encryption subregion of unloading, receive user's unloading order, detect and whether have the file of not preserving, as do not have, unload encrypted partition, discharge the drive of described file encryption subregion; If any, prompting user selects forced unloading or waits for unloading, receive and wait for unloading order, and question paper unloads after preserving again, receives forced unloading order, and forced unloading encrypted partition discharges the drive of described file encryption subregion.
Consult shown in Fig. 4, for the structural representation of the file deciphering device of the embodiment of the present invention based on subregion, the described file deciphering device based on subregion comprises connected successively reading unit 401, user's decruption key generation unit 402, file decryption key generation unit 403 and obtains file data unit 404.
In an embodiment, reading unit 401 reads password and/or the key file of user's input, and user's decruption key generation unit 402 finds the encrypted partition matching with password and/or key file reading unit 401 that obtain by encryption device described above.File decryption key generation unit 403 is decrypted the file encryption key of the described encryption of depositing in subregion head-tail according to user's decruption key, obtains file decryption key.Finally, obtain file data unit 404 and utilize file decryption key to be decrypted the file data of encrypting, obtain file data in this subregion.
As an alternative embodiment of the invention, password and/or the key file of user's input are converted into a decruption key by user's decruption key generation unit 402, cryptographic algorithm described in the decruption key utilization obtaining is decrypted to computing to subregion head, if the salt figure that can obtain setting in advance, password and/or the key file of authenticated input are correct; If can not obtain salt figure, subregion head can not be decrypted, shows input error, and prompting user re-enters password and/or key file.
According to describing ground above, the file encryption-decryption method based on subregion and device that the present invention proposes, creationary random generation random number and the file encryption key of having proposed, the password and/or key file and the described random number generation user encryption key thereof that utilize user to arrange, and described file encryption key is encrypted; File data has been carried out to complicated encrypted work, and the generation of file encryption key in ciphering process and user encryption key is also more random, complicated, thereby the security that has improved to a great extent file data; Utilize expeditiously internal memory random number generator, made it generate random number and file encryption key; And, generate and fill random number, utilize file encryption key to be encrypted and to write free area to described filling random number, further improve Cipher Strength; Meanwhile, user can choose any one kind of them or several algorithm carries out file encryption, can also generate user encryption key by optional any one hash algorithm, makes the encryption of file data more flexible, cracks also more difficult; Finally, the whole described file encryption-decryption method based on subregion and device are easy, compact, are easy to realize.
Those of ordinary skill in the field are to be understood that: the foregoing is only specific embodiments of the invention; be not limited to the present invention; within the spirit and principles in the present invention all, any amendment of making, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. the file encrypting method based on subregion, is characterized in that, comprises step:
Establishment is subject to the file encryption subregion of user cipher or/and key file protection: first select a subregion, comprise subregion head, file area and free area; Then generate random number and deposit in the stem of subregion head as salt figure, spanned file encryption key is encrypted the file data of file area; Read password or/and key file that user arranges, utilize this password or/and key file and described salt figure to generate user encryption key, and be encrypted according to the described user encryption key-pair file encryption key generating, deposit in the afterbody of subregion head simultaneously;
Load document encrypted partition: distribute a drive to described file encryption subregion;
After encrypted partition uses, uninstall file encrypted partition: the drive that discharges described file encryption subregion.
2. method according to claim 1, is characterized in that, described file encryption key generates one group of character by random number generator in internal memory and obtains, and utilizes this group of character repeatedly to encrypt the file data of file area storage.
3. method according to claim 1, is characterized in that, generate in the process of user encryption key at the password that utilizes user to arrange or/and key file and described salt figure, and be to generate user encryption key according to PBKDF2 algorithm.
4. method according to claim 3, it is characterized in that, in the process being encrypted according to the user encryption key-pair file encryption key generating, the cryptographic algorithm of employing is automated randomized selection cryptographic algorithm, or cryptographic algorithm is all offered to user, allow user oneself select.
5. method according to claim 1, is characterized in that, in the time of described load document encrypted partition, is also provided with encryption servo programe, and in monitoring encrypted partition, file calls state, in real time file is encrypted.
6. according to the method described in claim 1 to 5 any one; it is characterized in that, in the time that establishment is subject to the file encryption subregion of user cipher or/and key file protection, also comprises generating and fill random number; use described file encryption key to be encrypted it, and write the free area of described subregion.
7. the document encrypting apparatus based on subregion, is characterized in that, comprising:
Encrypted partition creating unit, for selecting a subregion, comprises subregion head, file area and free area; Then generate random number and deposit in the stem of subregion head as salt figure, spanned file encryption key is encrypted the file data of file area; Read password or/and key file that user arranges, utilize this password or/and key file and described salt figure to generate user encryption key, and be encrypted according to the described user encryption key-pair file encryption key generating, deposit in the afterbody of subregion head simultaneously;
Encrypted partition loading unit, is connected with encrypted partition creating unit, for distributing a drive to described file encryption subregion;
Encrypted partition unloading unit, is connected with encrypted partition loading unit, after using, discharges the drive of described file encryption subregion for encrypted partition.
8. device according to claim 7, is characterized in that, described encrypted partition creating unit, generating in the process of user encryption key, is to generate user encryption key according to PBKDF2 algorithm.
9. device according to claim 8, is characterized in that, described encrypted partition creating unit also comprises generating fills random number, uses described file encryption key to be encrypted it, and writes the free area of described subregion.
10. according to the device described in claim 7 to 9 any one, it is characterized in that, described encrypted partition loading unit is also provided with encryption servo programe, and in monitoring encrypted partition, file calls state, in real time file is encrypted.
CN201310425533.XA 2013-09-17 2013-09-17 File encryption and decryption method and device on the basis of partitions Pending CN103914666A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310425533.XA CN103914666A (en) 2013-09-17 2013-09-17 File encryption and decryption method and device on the basis of partitions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310425533.XA CN103914666A (en) 2013-09-17 2013-09-17 File encryption and decryption method and device on the basis of partitions

Publications (1)

Publication Number Publication Date
CN103914666A true CN103914666A (en) 2014-07-09

Family

ID=51040338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310425533.XA Pending CN103914666A (en) 2013-09-17 2013-09-17 File encryption and decryption method and device on the basis of partitions

Country Status (1)

Country Link
CN (1) CN103914666A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504306A (en) * 2014-12-22 2015-04-08 北京元心科技有限公司 Method and equipment both for encrypting files
CN105357003A (en) * 2015-11-19 2016-02-24 广东小天才科技有限公司 Data encryption method and apparatus
CN106503592A (en) * 2016-11-09 2017-03-15 深圳市德名利电子有限公司 Encryption method and system based on PLD
CN106656476A (en) * 2017-01-18 2017-05-10 腾讯科技(深圳)有限公司 Password protecting method and device
CN107315966A (en) * 2017-06-22 2017-11-03 湖南国科微电子股份有限公司 Solid state hard disc data ciphering method and system
CN107563211A (en) * 2017-09-06 2018-01-09 荷花科技(北京)有限公司 Safe encryption method and system
CN108334785A (en) * 2017-01-20 2018-07-27 华为技术有限公司 A kind of file encrypting method, decryption method and terminal
CN109981285A (en) * 2019-03-11 2019-07-05 北京纬百科技有限公司 A kind of password protection method, password method of calibration and system
CN110519300A (en) * 2019-09-24 2019-11-29 杭州字节信息技术有限公司 Client key method for secure storing based on password bidirectional authentication
CN111131130A (en) * 2018-10-30 2020-05-08 北京忆芯科技有限公司 Key management method and system
CN112069263A (en) * 2020-09-09 2020-12-11 上海万向区块链股份公司 Process data auditing method, system and medium based on block chain
CN112948773A (en) * 2021-02-07 2021-06-11 深圳市大梦龙途文化传播有限公司 Script encryption and decryption method, terminal device and readable storage medium
CN112948773B (en) * 2021-02-07 2024-05-24 深圳市大梦龙途文化传播有限公司 Script encryption and decryption method, terminal equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060262927A1 (en) * 2005-05-17 2006-11-23 Rutkowski Matt F System and method for managing encrypted content using logical partitions
CN101692266A (en) * 2009-09-25 2010-04-07 天津大学 Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
CN102624522A (en) * 2012-03-30 2012-08-01 华中科技大学 Key encryption method based on file attribution

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060262927A1 (en) * 2005-05-17 2006-11-23 Rutkowski Matt F System and method for managing encrypted content using logical partitions
CN101692266A (en) * 2009-09-25 2010-04-07 天津大学 Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
CN102624522A (en) * 2012-03-30 2012-08-01 华中科技大学 Key encryption method based on file attribution

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504306A (en) * 2014-12-22 2015-04-08 北京元心科技有限公司 Method and equipment both for encrypting files
CN105357003A (en) * 2015-11-19 2016-02-24 广东小天才科技有限公司 Data encryption method and apparatus
CN105357003B (en) * 2015-11-19 2018-10-16 广东小天才科技有限公司 A kind of method and device of encryption data
CN106503592A (en) * 2016-11-09 2017-03-15 深圳市德名利电子有限公司 Encryption method and system based on PLD
CN106503592B (en) * 2016-11-09 2021-07-09 深圳市德明利技术股份有限公司 Encryption method and system based on programmable logic device
CN106656476A (en) * 2017-01-18 2017-05-10 腾讯科技(深圳)有限公司 Password protecting method and device
WO2018133686A1 (en) * 2017-01-18 2018-07-26 腾讯科技(深圳)有限公司 Method and device for password protection, and storage medium
CN108334785A (en) * 2017-01-20 2018-07-27 华为技术有限公司 A kind of file encrypting method, decryption method and terminal
CN107315966B (en) * 2017-06-22 2020-10-23 湖南国科微电子股份有限公司 Solid state disk data encryption method and system
CN107315966A (en) * 2017-06-22 2017-11-03 湖南国科微电子股份有限公司 Solid state hard disc data ciphering method and system
CN107563211A (en) * 2017-09-06 2018-01-09 荷花科技(北京)有限公司 Safe encryption method and system
CN111131130A (en) * 2018-10-30 2020-05-08 北京忆芯科技有限公司 Key management method and system
CN111131130B (en) * 2018-10-30 2022-04-22 北京忆芯科技有限公司 Key management method and system
CN109981285A (en) * 2019-03-11 2019-07-05 北京纬百科技有限公司 A kind of password protection method, password method of calibration and system
CN110519300A (en) * 2019-09-24 2019-11-29 杭州字节信息技术有限公司 Client key method for secure storing based on password bidirectional authentication
CN110519300B (en) * 2019-09-24 2021-08-06 杭州字节信息技术有限公司 Client-side secret key safe storage method based on password bidirectional authentication
CN112069263A (en) * 2020-09-09 2020-12-11 上海万向区块链股份公司 Process data auditing method, system and medium based on block chain
CN112069263B (en) * 2020-09-09 2023-08-25 上海万向区块链股份公司 Flow data auditing method, system and medium based on block chain
CN112948773A (en) * 2021-02-07 2021-06-11 深圳市大梦龙途文化传播有限公司 Script encryption and decryption method, terminal device and readable storage medium
CN112948773B (en) * 2021-02-07 2024-05-24 深圳市大梦龙途文化传播有限公司 Script encryption and decryption method, terminal equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN103914666A (en) File encryption and decryption method and device on the basis of partitions
JP2019502211A5 (en)
EP3190543A1 (en) Method of dynamically encrypting fingerprint data and related fingerprint sensor
CN102693398B (en) Data encryption method and system
CN103345609B (en) A kind of text encipher-decipher method and encryption and decryption equipment
TWI496024B (en) An encryption calculation means, a memory means, and an encryption calculation method
CN108599930A (en) Firmware encrypting and deciphering system and method
CN102819716A (en) Method, device and system for encrypting and decrypting picture
KR102397579B1 (en) Method and apparatus for white-box cryptography for protecting against side channel analysis
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN102437910A (en) Data encryption/decryption checking method and system
CN109889333B (en) Firmware data encryption method and device, computer equipment and storage medium
TWI559168B (en) Data encryption system and method
GB2520778A (en) Block encryption/decryption and method
CN103916477A (en) Data storage method and device and data downloading method and device for cloud environment
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
CN107409046A (en) Apparatus and method for generating key in programmable hardware module
JP2017017378A5 (en)
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
JP6273226B2 (en) Encryption system, authentication system, encryption device, decryption device, authenticator generation device, verification device, encryption method, authentication method
US8774402B2 (en) Encryption/decryption apparatus and method using AES rijndael algorithm
CN105281915A (en) Ciphertext generating method of password keyboard
CN110932853B (en) Key management device and key management method based on trusted module
CN108256343A (en) Encryption method, device and the decryption method of Shader files, device
CN104954362A (en) Serial number encryption-decryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140709

RJ01 Rejection of invention patent application after publication