CN104504306A - Method and equipment both for encrypting files - Google Patents

Method and equipment both for encrypting files Download PDF

Info

Publication number
CN104504306A
CN104504306A CN201410806415.8A CN201410806415A CN104504306A CN 104504306 A CN104504306 A CN 104504306A CN 201410806415 A CN201410806415 A CN 201410806415A CN 104504306 A CN104504306 A CN 104504306A
Authority
CN
China
Prior art keywords
encryption key
file
file encryption
key
user password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410806415.8A
Other languages
Chinese (zh)
Inventor
邢利振
王文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuanxin Science and Technology Co Ltd
Original Assignee
Beijing Yuanxin Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuanxin Science and Technology Co Ltd filed Critical Beijing Yuanxin Science and Technology Co Ltd
Priority to CN201410806415.8A priority Critical patent/CN104504306A/en
Publication of CN104504306A publication Critical patent/CN104504306A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method for encrypting files. The method comprises the following steps: obtaining an unlocking track generated by touch operation of a user; analyzing the unlocking track into a user command; randomly generating a file encrypting secret key; carrying out encryption processing on the file encrypting secret key by using the user command to generate the encrypted file encrypting secret key, and storing the encrypted file encrypting secret key; and carrying out encryption processing on the encrypted file encrypting secret key. Correspondingly, the invention further provides equipment for encrypting the files. With the adoption of the method and the equipment, the safety of file encryption and the user experiences can be improved.

Description

A kind of method and apparatus that file is encrypted
Technical field
File system technology of the present invention and encryption technology field, particularly relate to a kind of method and apparatus be encrypted file.
Background technology
Along with the function of electronic equipment is become stronger day by day, people get used to using electronic equipment to store all kinds of private data, and along with causing the case of privacy of user leaking data to get more and more after hand-set from stolen or loss, mobile phone data security is more and more subject to people's attention.Although user can arrange screen locking password, when hand-set from stolen or after losing, illegal person still can take out mobile phone hard disk and use other equipment to read hard disk information, thus walks around mobile phone screen locking password reading user private data, causes user profile to reveal.In order to avoid losing due to electronic equipment the private data leakage caused, usually consider to be encrypted private data.
In intelligent operating system at present based on linux kernel, cryptographic services is integrated into the problem that this aspect of file system solves encryption private data by encrypted file system.The content of encrypt file leaves on physical medium with ciphertext form after symmetric key algorithm encryption, even if File lose or be stolen, when file encryption key is not revealed, unauthorized user almost cannot by the plaintext of the reverse acquisition file of ciphertext, thus ensure that high security, meanwhile, authorized user is then very convenient to the access of encrypt file.User by after preliminary examination authentication, to the access of encrypt file and ordinary file as broad as long because encrypted file system has done the work of relevant encryption and decryption automatically on backstage.Because encrypted file system is generally operational in kernel state, common attack is more difficult to prove effective.Described cryptographic keys is stored on the storage medium of electronic equipment usually, if lose the risk that this encryption key of electronic equipment has leakage, consider in prior art that use can be encrypted this encryption key by read password again, but can read password in distress with memory, easily leak equivalent risk.
Summary of the invention
In order to overcome above-mentioned defect of the prior art, the invention provides a kind of method be encrypted file, the method comprises:
Obtain the unblock track generated according to the touch control operation of user;
Described unblock track is resolved to user password;
Stochastic generation file encryption key;
Use described user password to be encrypted the file encryption key after generating encryption to described file encryption key, and store the file encryption key after this encryption;
Described file encryption key is used to be encrypted file.
According to an aspect of the present invention, in the method, described unblock track is resolved to user password to comprise: resolve described unblock track to determine the multiple graphic elements triggered successively according to described touch control operation, wherein graphic element described in each maps at least one character; The character combination that described multiple graphic element is corresponding is respectively described user password.
According to another aspect of the present invention, character described in the method comprises numeral and/or letter; Described graphic element be nine grids unlock graphic in node.
According to another aspect of the present invention, use described user password to be encrypted the file encryption key after generating encryption to described file encryption key in the method to comprise: with described user password for key, symmetric encipherment algorithm or rivest, shamir, adelman are performed to generate the file encryption key after described encryption to described file encryption key.
According to another aspect of the present invention, before the described user password of use is encrypted the file encryption key after generating encryption to described file encryption key, the method also comprises: use irreversible hashing algorithm process and store described user password
According to another aspect of the present invention, file encryption key described in the method is the random number that randomizer generates.
According to another aspect of the present invention, user password described in the method is FEFEK; Described file encryption key is FEK; File encryption key after described encryption is EFEK.
Correspondingly, present invention also offers a kind of equipment be encrypted file, this equipment comprises:
Figure unlocked state, for obtaining the unblock track generated according to the touch control operation of user, and described unblock track resolves to user password;
Key module, for stochastic generation file encryption key, and uses described user password to be encrypted the file encryption key after generating encryption to described file encryption key, and stores the file encryption key after this encryption;
Encrypt file module, is encrypted file for using described file encryption key.
According to an aspect of the present invention, described in this equipment, figure unlocked state comprises: graphic element, for showing multiple graphic element; Unlock record cell, for resolving described unblock track to determine the described multiple graphic element triggered successively according to described touch control operation, wherein graphic element described in each maps at least one character; Password unit is described user password for the character combination that described multiple graphic element is corresponding respectively.
According to another aspect of the present invention, described in this equipment, character comprises numeral and/or letter; Described graphic element be nine grids unlock graphic in node.
According to another aspect of the present invention, key module described in this equipment comprises the first key unit and/or the second key unit; Described first key unit, for described user password for key, symmetric encipherment algorithm is performed to generate the file encryption key after described encryption to described file encryption key; Described second key unit, for described user password for key, rivest, shamir, adelman is performed to generate the file encryption key after described encryption to described file encryption key.
According to another aspect of the present invention, described in this equipment, key module also comprises: password storing unit, for using irreversible hashing algorithm process and storing described user password.
According to another aspect of the present invention, file encryption key described in this equipment is the random number that randomizer generates.
According to another aspect of the present invention, described in this equipment, user password is FEFEK; Described file encryption key is FEK; File encryption key after described encryption is EFEK; Described encrypt file module is ecryptfs.
Provided by the invention by the unblock track of user operation, user password is resolved to the method and apparatus that file is encrypted, and use this user password to be encrypted for key-pair file encryption key, solve file encryption key and be directly stored in the problem that the storage medium of electronic equipment is easily revealed, in addition unlock track and have the advantage being convenient to remember and not easily reveal, improve security and the Consumer's Experience of file encryption.
Accompanying drawing explanation
By reading the detailed description done non-limiting example done with reference to the following drawings, other features, objects and advantages of the present invention will become more obvious:
Fig. 1 is the process flow diagram according to a kind of embodiment to the method that file is encrypted of the present invention;
Fig. 2 is the structural representation according to a kind of embodiment to the equipment that file is encrypted of the present invention;
Fig. 3 is the structural representation of the intelligent terminal for realizing method of the present invention or equipment;
In accompanying drawing, same or analogous Reference numeral represents same or analogous parts.
Embodiment
For a better understanding and interpretation of the present invention, below in conjunction with accompanying drawing, the present invention is described in further detail.
The invention provides a kind of method be encrypted file, please refer to Fig. 1, Fig. 1 is the process flow diagram according to a kind of embodiment to the method that file is encrypted of the present invention, and the method comprises:
Step S100, obtains the unblock track generated according to the touch control operation of user;
Step S200, resolves to user password by described unblock track;
Step S300, stochastic generation file encryption key;
Step S400, uses described user password to be encrypted the file encryption key after generating encryption to described file encryption key, and stores the file encryption key after this encryption;
Step S500, uses described file encryption key to be encrypted file.
Particularly, the method be encrypted file provided by the invention is applicable to the scene to having file that the electronic equipment of touch screen stores and being encrypted.Described electronic equipment comprises arbitrary or its combination in smart mobile phone, panel computer, intelligent television and wearable smart machine.Typically, described smart mobile phone or panel computer include but not limited to smart mobile phone or the panel computer of having installed the terminal operating systems such as Syber OS, iOS, Android, Symbian, WindowsMobile, Maemo, WebOS, Palm OS or Blackberry OS; Described intelligent television includes but not limited to the intelligent television having installed above-mentioned terminal operating system; Described wearable smart machine is such as the wrist-intelligent watch having installed above-mentioned terminal operating system.In the step s 100, described touch control operation is that touch screen described in user operation carries out finger unblock slip and formed, and the unblock that described finger unlocks adaptive described touch-control screen display of sliding is graphic, and correspondingly, this touch control operation generates described unblock track.Typically, described unblock track record user finger slip over described unblock graphic in multiple graphic element and sequencing.
In step s 200, described unblock track is resolved to user password by described electronic equipment, its concrete grammar comprises: resolve described unblock track to determine the multiple graphic elements triggered successively according to described touch control operation, wherein graphic element described in each maps at least one character; The character combination that described multiple graphic element is corresponding is respectively described user password.Typically, the unblock of this unblock track adaptation is graphic is nine grids unlock graphic, described graphic element be nine grids unlock graphic in node, these nine grids unlock graphic at least one character of each node mapping, this character comprises numeral and/or letter.The final described user password parsed according to described unblock track in step s 200 can be the character string containing multiple numeral, also can be the character string containing multiple letter, can also be the character string containing multiple numeral and multiple letter mixing arrangement.
In step S300, stochastic generation file encryption key, in order to ensure the security of file encryption, specifically referring to described file encryption key is stochastic generation, and typically this file encryption key is the random number that randomizer generates.Described randomizer is such as the integrated hardware random number generator of described electronic equipment.It should be noted that, in other examples, step S300 can perform before step S100 and step S200, might not in strict accordance with the order shown in Fig. 1.
In step S400, described user password is used to be encrypted the file encryption key after generating encryption to described file encryption key, its concrete grammar comprises: with described user password for key, performs symmetric encipherment algorithm or rivest, shamir, adelman to generate the file encryption key after described encryption to described file encryption key.Further, the file encryption key after this encryption is stored.The file encryption key stored after this encryption is to can normally perform follow-up file decryption.In described file decryption, with described user password for key, process is decrypted to obtain described file encryption key to the file encryption key after described encryption, then with described file encryption key, file is decrypted.Preferably, before step S400 performs, method provided by the invention also comprises the steps (not shown in figure 1): use irreversible hashing algorithm process and store described user password.
In step S500, use described file encryption key to be encrypted file, its concrete grammar uses described file encryption key to be encrypted described file, with the form being encrypted as ciphertext from form expressly by described file.
Typically, linux kernel encrypted file system ecyptfs (EnterpriseCryptographic Filesystem) can be combined and realize the step S100 shown in Fig. 1 to step S500, wherein said user password is FEFEK (File Encryption Key Encryption Key), and described file encryption key is FEK (File Encryption Key); File encryption key after described encryption is EFEK (EncryptedFile Encryption Key).Especially use ecyptfs realizes the encryption to file in step S500.
It should be noted that, in other examples, step S400 and step S500 can change execution sequence, might not in strict accordance with the order shown in Fig. 1.
It should be noted that, although describe the operation of the inventive method in the accompanying drawings with particular order, but this is not that requirement or hint must perform these operations according to this particular order, or must perform the result that all shown operation could realize expectation.On the contrary, the step described in process flow diagram can change execution sequence.Additionally or alternatively, some step can be omitted, multiple step be merged into a step and perform, and/or a step is decomposed into multiple step and perform.
Correspondingly, present invention also offers a kind of equipment be encrypted file, please refer to Fig. 2, Fig. 2 is the structural representation according to a kind of embodiment to the equipment that file is encrypted of the present invention, and this equipment 100 comprises:
Figure unlocked state 110, for obtaining the unblock track generated according to the touch control operation of user, and described unblock track resolves to user password;
Key module 120, for stochastic generation file encryption key, and uses described user password to be encrypted the file encryption key after generating encryption to described file encryption key, and stores the file encryption key after this encryption;
Encrypt file module 130, is encrypted file for using described file encryption key.
Particularly, equipment 100 comprises arbitrary or its combination in smart mobile phone, panel computer, intelligent television and wearable smart machine.Typically, described smart mobile phone or panel computer include but not limited to smart mobile phone or the panel computer of having installed the terminal operating systems such as Syber OS, iOS, Android, Symbian, Windows Mobile, Maemo, WebOS, Palm OS or Blackberry OS; Described intelligent television includes but not limited to the intelligent television having installed above-mentioned terminal operating system; Described wearable smart machine is such as the wrist-intelligent watch having installed above-mentioned terminal operating system.Described touch control operation is that touch screen described in user operation carries out finger unblock slip and formed, and the unblock that described finger unlocks adaptive described touch-control screen display of sliding is graphic, and correspondingly, this touch control operation generates described unblock track.Typically, described unblock track record user finger slip over described unblock graphic in multiple graphic element and sequencing.
Preferably, figure unlocked state comprises: graphic element 111, for showing multiple graphic element; Unlock record cell 112, for resolving described unblock track to determine the described multiple graphic element triggered successively according to described touch control operation, wherein graphic element described in each maps at least one character; Password unit 113 is described user password for the character combination that described multiple graphic element is corresponding respectively.Wherein, described character comprises numeral and/or letter; Described graphic element be nine grids unlock graphic in node.Correspondingly, described user password can be the character string containing multiple numeral, also can be the character string containing multiple letter, can also be the character string containing multiple numeral and multiple letter mixing arrangement.
Particularly, described key module 120 comprises the first key unit 121 and/or the second key unit 122; Described first key unit 121, for described user password for key, symmetric encipherment algorithm is performed to generate the file encryption key after described encryption to described file encryption key; Described second key unit 122, for described user password for key, rivest, shamir, adelman is performed to generate the file encryption key after described encryption to described file encryption key.Alternatively, this key module 120 also comprises password storing unit 123, for using irreversible hashing algorithm process and storing described user password.Described file encryption key be randomizer generate random number, this randomizer is integrated in key module 120, or the generation result of this randomizer can call by key module 120.This randomizer is the integrated hardware random number generator of equipment 100 in certain embodiments.
Typically, can realize the function of encrypt file module 130 with linux kernel encrypted file system ecyptfs, correspondingly, described user password is FEFEK (File Encryption Key Encryption Key); Described file encryption key is FEK (File Encryption Key); File encryption key after described encryption is EFEK (Encrypted File Encryption Key).
Term and noun that this part occurs with above in identical term or noun there is consistent implication, such as described " user password ", " touch control operation " and " unblock track " etc., above-mentioned term or noun and the principle of work that relates to thereof all can with reference to the description of relevant portion in above and explanations, in order to not repeat them here for simplicity.
Fig. 3 is the structural representation of the intelligent terminal for realizing method of the present invention or equipment.Fig. 3 schematically shows the common structure of described intelligent terminal, is described the intraware of common intelligent terminal, software and protocol architecture with reference to figure 3.
This intelligent terminal has processor 510, it is responsible for the integrated operation of mobile terminal, and any business can be utilized can to obtain the realization of CPU (central processing unit) (CPU), digital signal processor (DSP) or any other electronic programmable logic device (PLD).The related storer 520 of processor 510 tool, this storer 520 includes but not limited to RAM storer, ROM storer, eeprom memory, flash memory or its combination.Storer 520 controls for various object by processor 510, and one of them is as software stored program instruction various in intelligent terminal and data.
The software view of this intelligent terminal comprises real time operating system 540, driver for man-machine interface 560, application processor 550 and various application.Described application examples is text editor 551, handwriting recognition application 552 and other multimedia application 553 in this way, and typically these other multimedia application comprise such as audio call application, video call application, send and reception Short Message Service (SMS) messages application, multimedia information service (MMS) application or e-mail applications, web browser, instant message transrecieving application, book applications, calendar application, control panel application, camera application, one or more video-game, notepad appli-cation etc.Two or more that it should be noted that above-mentioned application can perform as same application.
Described intelligent terminal also comprises one or more hardware control, for together with the driver of man-machine interface 560 with display device 561, physical button 562, microphone 563 and various I/O equipment (such as loudspeaker, Vib., Ring Generator, LED indicator etc.) cooperate, to realize the man-machine interaction of described intelligent terminal.Those skilled in the art are to be understood that user can carry out operating mobile terminal by the man-machine interface 560 formed like this.
The software view of this intelligent terminal can also comprise the logic relevant to communication such as various module, protocol stack, driver, be summarized as communication interface 570 as shown in Figure 3, for for wireless radio interface 571 and alternatively for blue tooth interface 572 and/or infrared interface 573 provide communication service (such as transmit, network and connectedness), to realize interconnecting of described intelligent terminal.Wireless radio interface 571 comprises inside or exterior antenna and the proper circuit for setting up and safeguard the wireless link towards base station.As known to the skilled person, described circuit comprises a series of analog-and digital-electronic package, and it forms radio receiver and transmitter together.These assemblies such as comprise bandpass filter, amplifier, frequency mixer, local oscillator, low-pass filter, ad/da converter etc.
This intelligent terminal can also comprise reader device 530, and this reader device 530 is for reading the information of SIM card and the network that provides of cooperation wireless radio interface 571 access carrier of taking this as a foundation.
Provided by the inventionly can use programmable logic device (PLD) to realize to the method that file is encrypted, also may be embodied as computer program, this program product makes computing machine perform for demonstrated method.Described computer program comprises computer-readable recording medium, this medium comprises computer program logic or code section, for realizing each step of said method.Described computer-readable recording medium can be the built-in medium be mounted in a computer or the removable medium (such as hot-pluggable memory device) can dismantled from basic computer.Described built-in medium includes but not limited to rewritable nonvolatile memory, such as RAM, ROM and hard disk.Described removable medium includes but not limited to: optical storage media (such as CD-ROM and DVD), magneto-optic storage media (such as MO), magnetic recording medium (such as tape or portable hard drive), have the media (such as storage card) of built-in rewritable nonvolatile memory and have the media (such as ROM box) of built-in ROM.
It will be appreciated by those skilled in the art that any computer system with suitable programmer can both perform all steps of the method for the present invention be included in computer program.Although the most embodiments described in this instructions all lay particular emphasis on software program, realize the alternate embodiment of method provided by the invention in hardware equally within the scope of protection of present invention.
To those skilled in the art, obviously the invention is not restricted to the details of above-mentioned one exemplary embodiment, and when not deviating from spirit of the present invention or essential characteristic, the present invention can be realized in other specific forms.Therefore, should regard embodiment as exemplary, and be nonrestrictive, scope of the present invention is limited by claims instead of above-mentioned explanation, and all changes in the implication and scope of the equivalency of claim are all included in the present invention.Any Reference numeral in claim should be considered as the claim involved by limiting.In addition, obviously " comprising " one word do not get rid of miscellaneous part, unit or step, odd number does not get rid of plural number.Multiple parts, unit or the device of stating in claim also can be realized by software or hardware by parts, unit or a device.
Provided by the invention by the unblock track of user operation, user password is resolved to the method and apparatus that file is encrypted, and use this user password to be encrypted for key-pair file encryption key, solve file encryption key and be directly stored in the problem that the storage medium of electronic equipment is easily revealed, in addition unlock track and have the advantage being convenient to remember and not easily reveal, improve security and the Consumer's Experience of file encryption.
Disclosedly above be only preferred embodiments more of the present invention, can not limit the interest field of the present invention with this, the equivalent variations done according to the claims in the present invention, still belongs to the scope that the present invention is contained.

Claims (14)

1., to the method that file is encrypted, the method comprises:
Obtain the unblock track generated according to the touch control operation of user;
Described unblock track is resolved to user password;
Stochastic generation file encryption key;
Use described user password to be encrypted the file encryption key after generating encryption to described file encryption key, and store the file encryption key after this encryption;
Described file encryption key is used to be encrypted file.
2. method according to claim 1, wherein, resolves to user password by described unblock track and comprises:
Resolve described unblock track to determine the multiple graphic elements triggered successively according to described touch control operation, wherein graphic element described in each maps at least one character;
The character combination that described multiple graphic element is corresponding is respectively described user password.
3. method according to claim 2, wherein:
Described character comprises numeral and/or letter;
Described graphic element be nine grids unlock graphic in node.
4. method according to claim 1, wherein, uses described user password to be encrypted the file encryption key after generating encryption to described file encryption key and comprises:
With described user password for key, symmetric encipherment algorithm or rivest, shamir, adelman are performed to generate the file encryption key after described encryption to described file encryption key.
5. method according to claim 1, before the described user password of use is encrypted the file encryption key after generating encryption to described file encryption key, the method also comprises:
Use irreversible hashing algorithm process and store described user password.
6. method according to claim 1, wherein:
Described file encryption key is the random number that randomizer generates.
7. the method according to any one of claim 1 to 6, wherein:
Described user password is FEFEK;
Described file encryption key is FEK;
File encryption key after described encryption is EFEK.
8., to the equipment that file is encrypted, this equipment comprises:
Figure unlocked state, for obtaining the unblock track generated according to the touch control operation of user, and described unblock track resolves to user password;
Key module, for stochastic generation file encryption key, and uses described user password to be encrypted the file encryption key after generating encryption to described file encryption key, and stores the file encryption key after this encryption;
Encrypt file module, is encrypted file for using described file encryption key.
9. equipment according to claim 8, wherein, described figure unlocked state comprises:
Graphic element, for showing multiple graphic element;
Unlock record cell, for resolving described unblock track to determine the described multiple graphic element triggered successively according to described touch control operation, wherein graphic element described in each maps at least one character;
Password unit is described user password for the character combination that described multiple graphic element is corresponding respectively.
10. equipment according to claim 9, wherein:
Described character comprises numeral and/or letter;
Described graphic element be nine grids unlock graphic in node.
11. equipment according to claim 8, wherein:
Described key module comprises the first key unit and/or the second key unit;
Described first key unit, for described user password for key, symmetric encipherment algorithm is performed to generate the file encryption key after described encryption to described file encryption key;
Described second key unit, for described user password for key, rivest, shamir, adelman is performed to generate the file encryption key after described encryption to described file encryption key.
12. equipment according to claim 11, wherein, described key module also comprises:
Password storing unit, for using irreversible hashing algorithm process and storing described user password.
13. equipment according to claim 8, wherein:
Described file encryption key is the random number that randomizer generates.
Equipment described in 14. any one of according to Claim 8 to 13, wherein:
Described user password is FEFEK;
Described file encryption key is FEK;
File encryption key after described encryption is EFEK;
Described encrypt file module is ecryptfs.
CN201410806415.8A 2014-12-22 2014-12-22 Method and equipment both for encrypting files Pending CN104504306A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410806415.8A CN104504306A (en) 2014-12-22 2014-12-22 Method and equipment both for encrypting files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410806415.8A CN104504306A (en) 2014-12-22 2014-12-22 Method and equipment both for encrypting files

Publications (1)

Publication Number Publication Date
CN104504306A true CN104504306A (en) 2015-04-08

Family

ID=52945703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410806415.8A Pending CN104504306A (en) 2014-12-22 2014-12-22 Method and equipment both for encrypting files

Country Status (1)

Country Link
CN (1) CN104504306A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105116997A (en) * 2015-07-28 2015-12-02 广东欧珀移动通信有限公司 Data encryption and decryption method and smart watch
CN106355088A (en) * 2015-07-15 2017-01-25 纬创资通股份有限公司 Account management application strengthening method and device using same

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141463A (en) * 2006-09-07 2008-03-12 国际商业机器公司 Storing encrypted data keys to a tape to allow a transport mechanism
CN103077342A (en) * 2011-10-25 2013-05-01 成都谛听科技有限公司 Method for inputting graphic random passwords
CN103914666A (en) * 2013-09-17 2014-07-09 亚欧宝龙信息安全技术(湖南)有限公司 File encryption and decryption method and device on the basis of partitions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141463A (en) * 2006-09-07 2008-03-12 国际商业机器公司 Storing encrypted data keys to a tape to allow a transport mechanism
CN103077342A (en) * 2011-10-25 2013-05-01 成都谛听科技有限公司 Method for inputting graphic random passwords
CN103914666A (en) * 2013-09-17 2014-07-09 亚欧宝龙信息安全技术(湖南)有限公司 File encryption and decryption method and device on the basis of partitions

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355088A (en) * 2015-07-15 2017-01-25 纬创资通股份有限公司 Account management application strengthening method and device using same
CN106355088B (en) * 2015-07-15 2019-10-18 纬创资通股份有限公司 Account management application strengthening method and device using same
CN105116997A (en) * 2015-07-28 2015-12-02 广东欧珀移动通信有限公司 Data encryption and decryption method and smart watch
CN105116997B (en) * 2015-07-28 2018-05-29 广东欧珀移动通信有限公司 A kind of data encryption, the method for decryption and smartwatch

Similar Documents

Publication Publication Date Title
CN103279411B (en) Enter the method and system of application program based on fingerprint recognition
CN101281578B (en) Method and apparatus for protecting digital contents stored in USB mass storage device
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN102156843B (en) Data encryption method and system as well as data decryption method
CN104573551A (en) File processing method and mobile terminal
CN101685425A (en) Mobile storage device and method of encrypting same
CN103984904A (en) Method and device for preventing screen locking code of mobile terminal from being cracked
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN106778225A (en) The method and apparatus for processing password
CN104363087A (en) Encryption and decryption method and device
CN104915583A (en) Interface decryption processing method and mobile terminal
CN112887297B (en) Privacy-protecting differential data determining method, device, equipment and system
CN104751028A (en) Application encrypting and decrypting method and device
CN107124407B (en) Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system
CN104504306A (en) Method and equipment both for encrypting files
CN103458101A (en) Hardware encryption storage method and system of mobile phone private contacts
CN103177224A (en) Data protection method and device used for terminal external storage card
CN107135074B (en) Advanced security method and device
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN105389319A (en) Database operation method and device
CN202014304U (en) Mobile phone privacy protection system based on code authentication
CN103684740A (en) Encrypting method and system, decrypting method and system, encryption and decryption method and system for photo album of mobile terminal
CN101355740A (en) Method and system for protecting smart card data
CN102831360B (en) Personal electronic document safety management system and management method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150408