CN106156654B - File encryption apparatus and method - Google Patents

File encryption apparatus and method Download PDF

Info

Publication number
CN106156654B
CN106156654B CN201610778091.0A CN201610778091A CN106156654B CN 106156654 B CN106156654 B CN 106156654B CN 201610778091 A CN201610778091 A CN 201610778091A CN 106156654 B CN106156654 B CN 106156654B
Authority
CN
China
Prior art keywords
picture element
element matrix
key
document
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610778091.0A
Other languages
Chinese (zh)
Other versions
CN106156654A (en
Inventor
邓学洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Hundred Run Hundred Polytron Technologies Inc
Original Assignee
Chengdu Hundred Run Hundred Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Hundred Run Hundred Polytron Technologies Inc filed Critical Chengdu Hundred Run Hundred Polytron Technologies Inc
Priority to CN201610778091.0A priority Critical patent/CN106156654B/en
Publication of CN106156654A publication Critical patent/CN106156654A/en
Application granted granted Critical
Publication of CN106156654B publication Critical patent/CN106156654B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of file enciphering method and devices, are related to electronic document transmission field.The document encryption method and device are by converting document image information for the electronic document of upload in advance, and picture element matrix is converted by document image information, and the first key obtained according to resume image encodes the picture element matrix and carries out first time encryption, since the first key generated using resume image can generate non-linear key space at random, the encryption of the document encryption method is uniformly and more safe and reliable.

Description

File encryption apparatus and method
Technical field
The present invention relates to electronic document transmission fields, in particular to a kind of file enciphering method and device.
Background technique
Electronic document (Electronic document) refers to what people were formed in social activities, with computer disc, The chemistry magnetic material such as disk and CD is the written material of carrier.Computer system is relied on to access and can pass on a communication network Defeated, it mainly includes electronic document, electronic mail, electronic report forms, electronic drawing etc..But it is related to machine more in order to prevent Content is caused to reveal close or privacy electronic document by other people illegal obtain during transmission, it is therefore desirable in electronics text Electronic document is encrypted before shelves transmission.
It is usually in the prior art the side such as symmetric cryptography, asymmetric encryption and irreversible encryption to file encryption mode Method, the above method are all made of the method for realizing a set of or a few set public key and private key that generate and are encrypted and decrypted, generating Above-mentioned encryption method is all made of linear order realization when key, is being transmitted using the above-mentioned encrypted electronic document of encryption method During still be easy cracked by criminal, safety is low.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of file enciphering method and device, it is above-mentioned to improve The problem of.
In a first aspect, the embodiment of the invention provides a kind of file encryption device, the file encryption device includes:
Document Creator unit, for receiving the electronic document of client upload;
Image conversion unit, for the electronic document of upload to be converted to document image information;
Image processing unit extracts the picture element matrix and to institute for converting picture element matrix for document image information It states picture element matrix to be handled, so that the summation of every column element in the picture element matrix remains 1;
First encryption unit, for obtaining first key according to resume image, and according to the first key got The picture element matrix is encoded and carries out first time encryption;
Described image processing unit is also used to the coding and carries out encrypted picture element matrix for the first time and be converted to number Word image information.
Second aspect, the embodiment of the invention also provides a kind of file enciphering method, the file enciphering method includes:
Receive the electronic document of client upload;
The electronic document of upload is converted into document image information;
Convert picture element matrix for document image information, extract the picture element matrix and to the picture element matrix at Reason, so that the summation of every column element in the picture element matrix remains 1;
First key is obtained according to resume image, and the picture element matrix is encoded according to the first key got And carry out first time encryption;
By the coding and carries out encrypted picture element matrix for the first time and be converted to digital image information.
Compared with prior art, a kind of file enciphering method and device provided in an embodiment of the present invention, by advance will be upper The electronic document of biography is converted into document image information, and converts picture element matrix for document image information, and according to image encryption The first key that algorithm obtains encodes the picture element matrix and carries out first time encryption, due to what is generated using resume image First key can generate non-linear key space at random, therefore the encryption of the document encryption method is uniformly and more safe and reliable.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.Therefore, below to the reality of the invention provided in the accompanying drawings The detailed description for applying example is not intended to limit the range of claimed invention, but is merely representative of selected implementation of the invention Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts Every other embodiment, shall fall within the protection scope of the present invention.
Fig. 1 is the interaction schematic diagram of server provided in an embodiment of the present invention and client;
Fig. 2 is the structural block diagram of server provided in an embodiment of the present invention;
Fig. 3 is the functional unit schematic diagram of file encryption device provided in an embodiment of the present invention;
Fig. 4 is the flow chart of file enciphering method provided in an embodiment of the present invention.
Wherein, the corresponding relationship between appended drawing reference and component names is as follows: client 101, server 102, storage Device 103, storage control 104, processor 105, Peripheral Interface 106, Document Creator list 301, image conversion unit 302, image processing unit 303, the first encryption unit 304, the second Key generating unit 305, the second encryption unit 306, Information transmitting unit 307.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
As shown in Figure 1, being the server 102 that present pre-ferred embodiments provide and the signal that client 101 interacts Figure.The server 102 is communicatively coupled by network or data/address bus with one or more clients, to carry out data Communication or interaction.The server 102 can be network server, database server etc..The server can be individual Computer (personal computer, PC), tablet computer, smart phone, personal digital assistant (personal digital Assistant, PDA) server.
As shown in Fig. 2, being the block diagram of the server 102.The server 102 includes file encryption device 100, memory 103, storage control 104, processor 105, Peripheral Interface 106.
The memory 103, storage control 104, processor 105, each element of Peripheral Interface 106 between each other directly or It is electrically connected indirectly, to realize the transmission or interaction of data.For example, these elements between each other can be logical by one or more It interrogates bus or signal wire is realized and is electrically connected.The file encryption device 100 includes at least one can be with software or firmware (firmware) form is stored in the memory 103 or is solidificated in the operating system of the server 102 Software function module in (operating system, OS).The processor 105 is used to execute to store in memory 103 Executable module, such as software function module or computer program that the file encryption device 100 includes.
Wherein, memory 103 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc.. Wherein, memory 103 is for storing program, and the processor 105 executes described program after receiving and executing instruction, aforementioned Method performed by the server 102 that the stream process that any embodiment of the embodiment of the present invention discloses defines can be applied to processor In 105, or realized by processor 105.
Processor 105 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 105 can To be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), specific integrated circuit (ASIC), Ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hard Part component.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor It can be microprocessor or the processor 105 be also possible to any conventional processor 105 etc..It should be noted that this hair The function of processor 105 provided by a kind of file encryption system that bright embodiment provides, can also be led to by software realization The hardware realization (for example, the integrated circuit (IC) by processor 105 realizes above-mentioned function) for crossing entity, does not limit herein System.
Various input/output devices are couple processor 105 and memory 103 by the Peripheral Interface 106.Some In embodiment, Peripheral Interface 106, processor 105 and storage control 104 can be realized in one single chip.Other one In a little examples, they can be realized by independent chip respectively.
Referring to Fig. 3, the file encryption device 100 is answered the embodiment of the invention provides a kind of file encryption device 100 For the server 101.The file encryption device 100 includes Document Creator list 301, image conversion unit 302302, figure As processing unit 303303, the first encryption unit 304304, the second Key generating unit 305305, the second encryption unit 306306 And information transmitting unit 307307.
The Document Creator unit 301 is used to receive the electronic document of a client 102 upload, subscriber identity information, end Hold identity information and document markup information.
In the present embodiment, subscriber identity information is using user name, terminal identity information collecting computer name, document markup letter Breath uses Document Title.
Specifically, user can open browser in a client 102, and input account page info, can be obtained browsing Electronic document in device uploads the page.Specific operating procedure can be such that 1. click electronic documents upload " opening literary for the page Shelves " button, browser prompts user selects local file to open at this time, loads the electronic document of selection, and user can click Document preview button, the electronic document that can be selected in browser online browse.And " saving document " button can be also clicked, by this Electronic document function separately exists under selected path.In preview electronic document and after confirming that electronic document is errorless, user at this time " sending document " button can be clicked in browser page, the electronic document that user uploads is sent to server by browser at this time 101, so as to subsequent operation.
Described image converting unit 302 is used to the electronic document of upload being converted to document image information.
Described image processing unit 303 is used to convert picture element matrix for document image information, extracts the picture element matrix And the picture element matrix is handled, so that the summation of every column element in the picture element matrix remains 1.
Specifically, image processing unit 303 described in the present embodiment is used to convert picture element matrix for document image information, And each column greatest measure qj of the picture element matrix is extracted, according to formula mij*=(qj-mij)/∑I=qj-mijIt will be in picture element matrix The greatest member of every column element and this column make the difference, and calculate ratio so that the summation of every column element in the picture element matrix is protected Hold is 1, wherein mij is the element in picture element matrix.
First encryption unit 304 is used to obtain first key according to resume image, and according to the got Picture element matrix described in one key pair encodes and carries out first time encryption.
In the present embodiment, resume image uses scattered date Encryption Algorithm, and scattered date Encryption Algorithm produces non- Linear order is to generate the first key of digital picture.
Second Key generating unit 305 is used for according to the subscriber identity information, terminal identity information and document Mark information generates the second key.
If in view of the key of an electronic document is only for a user, and the user can use the key not Digital document is repeatedly downloaded in same client 102, there is no limit so as to cause electricity for the download time and downloading place to user The equity loss of the supplier or copyright owner of subdocument are serious, therefore according to the subscriber identity information, terminal identity Information and document markup information, which generate the second key, may make the primary downloading dynamic of electronic document that can all generate a key, To realize each user in different times, place need obtain a new key, document could be downloaded.
Second encryption unit 306 be used for using the second key pair for getting for the first time encrypted picture element matrix, The first key and decryption side communication mode carry out second and encrypt.
Specifically, second Key generating unit 305 be used for according to the subscriber identity information, terminal identity information with And the character of document markup information composition generates the second key.
By that can lead to encrypted picture element matrix, the first key and decryption side for the first time to using the second key Letter mode carries out second of encryption, can be encrypted twice to electronic document, easy to operate, highly-safe.
In the present embodiment, decryption communication mode includes in the telephone number, mailbox and immediate communication tool of decryption side.
The information transmitting unit 307 is used to send described second to decryption side according to the decryption side communication mode close Key.
Described image processing unit 303 is also used to the coding and carries out encrypted picture element matrix for the first time and be converted to Digital image information.
Referring to Fig. 4, the present invention implements a kind of file enciphering method provided, it should be noted that the embodiment of the present invention The technical effect of provided file enciphering method, basic principle and generation is identical with above-described embodiment, to briefly describe, this Embodiment part does not refer to place, can refer to corresponding contents in the above embodiments.The file enciphering method includes:
Step S401: electronic document, subscriber identity information, terminal identity information and text that client 102 uploads are received Shelves mark information.
Step S402: the electronic document of upload is converted into document image information.
Step S403: converting picture element matrix for document image information, extracts the picture element matrix and to the pixel square Battle array is handled, so that the summation of every column element in the picture element matrix remains 1.
Specifically, step S403 includes converting document image information to picture element matrix, and extract the picture element matrix Each column greatest measure qj, according to formula mij*=(qj-mij)/ΣI=qj-mijMost with this column by every column element in picture element matrix Big element makes the difference, and calculates ratio so that the summation of every column element in the picture element matrix remains 1, wherein mij is pixel Element in matrix.
Step S404: first key is obtained according to resume image, and according to the first key got to the picture Prime matrix encodes and carries out first time encryption.
Step S405: it is close that second is generated according to the subscriber identity information, terminal identity information and document markup information Key.
Specifically, step S405 can be for using according to the subscriber identity information, terminal identity information and document mark Remember that the character of information composition generates the second key.
Step S406: using the second key pair for getting for the first time encrypted picture element matrix, the first key with And decryption side communication mode carries out second and encrypts.
Step S407: second key is sent to decryption side according to the decryption side communication mode.
Step S408: it by the coding and carries out encrypted picture element matrix for the first time and is converted to digital image information.
To sum up, the embodiment of the invention provides a kind of file enciphering method and devices, by advance by the electronics of upload Document is converted into document image information, and converts picture element matrix for document image information, and obtain according to resume image First key to the picture element matrix encode carry out first time encryption, due to using resume image generate first key Non-linear key space can be generated at random, therefore the encryption of the document encryption method is uniformly and more safe and reliable;Other second Electronic document after layer encryption includes corresponding decryption communication mode, so that even if receiving different electronic documents, It is sent to different decryption sides with corresponding communication mode by the second key, that is, may make decryption side according to receiving the second key When used communication mode be sent to different decryption sides, decryption side is according to communication party used when receiving the second key The corresponding relationship of the communication mode of the decryption side carried in formula and file by second encryption is decrypted, and decryption side with Outer user due to not having the corresponding relationship of above-mentioned communication mode, also just can not deciphering electric document file, to realize specified File is decrypted in user, further enhances the secret protection to electronic document.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.

Claims (8)

1. a kind of file encryption device, which is characterized in that the file encryption device includes:
Document Creator unit, for receiving the electronic document of client upload;
Image conversion unit, for the electronic document of upload to be converted to document image information;
Image processing unit extracts the picture element matrix and to the picture for converting picture element matrix for document image information Prime matrix is handled, so that the summation of every column element in the picture element matrix remains 1;
First encryption unit, for obtaining first key according to resume image, and according to the first key got to institute Picture element matrix is stated to encode and carry out first time encryption;
Described image processing unit is also used to the coding and carries out encrypted picture element matrix for the first time and be converted to digitized map As information;
Second encryption unit, for utilizing the second key pair for getting encrypted picture element matrix, described first close for the first time Key and decryption side communication mode carry out second and encrypt;
Information transmitting unit, for sending second key to decryption side according to the decryption side communication mode.
2. file encryption device according to claim 1, which is characterized in that the Document Creator unit is for receiving a visitor Electronic document, subscriber identity information, terminal identity information and the document markup information that family end uploads;
The file encryption device further include:
Second Key generating unit, for raw according to the subscriber identity information, terminal identity information and document markup information At the second key.
3. file encryption device according to claim 2, which is characterized in that second Key generating unit is used for foundation The character of the subscriber identity information, terminal identity information and document markup information composition generates the second key.
4. file encryption device according to claim 1, which is characterized in that described image processing unit is used for document map As information is converted into picture element matrix, and each column greatest measure qj of the picture element matrix is extracted, according to formula mij*=(qj- mij)/∑I=qj-mijThe greatest member of every column element and this column in picture element matrix is made the difference, and calculates ratio so that the pixel The summation of every column element in matrix remains 1, wherein mij is the element in picture element matrix.
5. a kind of file enciphering method, which is characterized in that the file enciphering method includes:
Receive the electronic document of client upload;
The electronic document of upload is converted into document image information;
Picture element matrix is converted by document image information, extract the picture element matrix and the picture element matrix is handled, with The summation of every column element in the picture element matrix is set to remain 1;
First key is obtained according to resume image, and is gone forward side by side according to the first key got to picture element matrix coding Row encrypts for the first time;
By the coding and carries out encrypted picture element matrix for the first time and be converted to digital image information;
Described by the coding and before carrying out the step of encrypted picture element matrix is converted to digital image information for the first time, The file enciphering method further include:
Utilize the second key pair first time encrypted picture element matrix, the first key and the decryption side communication party got Formula carries out second and encrypts;
Second key is sent to decryption side according to the decryption side communication mode.
6. file enciphering method according to claim 5, which is characterized in that the electronics text for receiving a client and uploading The step of shelves includes: that the Document Creator unit is used to receive the electronic document of client upload, subscriber identity information, terminal Identity information and document markup information;
In the second key pair first time encrypted picture element matrix, the first key and the decryption side that the utilization is got Before the step of communication mode encrypt for second, the method also includes: according to the subscriber identity information, terminal identity Information and document markup information generate the second key.
7. file enciphering method according to claim 6, which is characterized in that described according to the subscriber identity information, end The step of holding identity information and document markup information to generate the second key includes: according to the subscriber identity information, terminal body The character of part information and document markup information composition generates the second key.
8. file enciphering method according to claim 5, which is characterized in that described to convert pixel for document image information Matrix extracts the picture element matrix and handles the picture element matrix, so that every column element in the picture element matrix The step of summation remains 1 includes: to convert picture element matrix for document image information, and extract each column of the picture element matrix most Big numerical value qj, according to formula mij*=(qj-mij)/∑I=qj-mijBy the greatest member of every column element and this column in picture element matrix It makes the difference, and calculates ratio so that the summation of every column element in the picture element matrix remains 1, wherein mij is in picture element matrix Element.
CN201610778091.0A 2016-08-30 2016-08-30 File encryption apparatus and method Active CN106156654B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610778091.0A CN106156654B (en) 2016-08-30 2016-08-30 File encryption apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610778091.0A CN106156654B (en) 2016-08-30 2016-08-30 File encryption apparatus and method

Publications (2)

Publication Number Publication Date
CN106156654A CN106156654A (en) 2016-11-23
CN106156654B true CN106156654B (en) 2019-06-11

Family

ID=57344438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610778091.0A Active CN106156654B (en) 2016-08-30 2016-08-30 File encryption apparatus and method

Country Status (1)

Country Link
CN (1) CN106156654B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483432A (en) * 2017-08-10 2017-12-15 广州杰之良软件有限公司 File encryption processing method and processing device
CN108154354A (en) * 2018-03-13 2018-06-12 南京审计大学 Rural area three provides audit and supervision system
CN108133416A (en) * 2018-03-13 2018-06-08 南京审计大学 Audit negotiating system
WO2020158540A1 (en) * 2019-01-30 2020-08-06 ソニー株式会社 Sensor device and encryption method
CN111444525B (en) * 2020-03-27 2020-11-10 南宁职业技术学院 Document encryption method based on cloud computing
CN112948857A (en) * 2021-03-03 2021-06-11 珠海金山办公软件有限公司 Document processing method and device
CN113132080A (en) * 2021-04-19 2021-07-16 青岛冠成软件有限公司 Image processing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101344960A (en) * 2008-08-20 2009-01-14 回静 Chaos digital image encryption method
CN101540823A (en) * 2008-03-21 2009-09-23 富士通株式会社 Image processing apparatus and image processing system and method
CN102415087A (en) * 2009-05-11 2012-04-11 富士通株式会社 Image encryption/decoding device, method, and program
CN105488426A (en) * 2015-11-30 2016-04-13 西安闻泰电子科技有限公司 Mobile platform image encryption method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8886942B2 (en) * 2012-12-07 2014-11-11 At&T Intellectual Property I, L.P. Augmented reality based privacy and decryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540823A (en) * 2008-03-21 2009-09-23 富士通株式会社 Image processing apparatus and image processing system and method
CN101344960A (en) * 2008-08-20 2009-01-14 回静 Chaos digital image encryption method
CN102415087A (en) * 2009-05-11 2012-04-11 富士通株式会社 Image encryption/decoding device, method, and program
CN105488426A (en) * 2015-11-30 2016-04-13 西安闻泰电子科技有限公司 Mobile platform image encryption method

Also Published As

Publication number Publication date
CN106156654A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
CN106156654B (en) File encryption apparatus and method
US10506428B2 (en) Wireless network connection method, apparatus, and system
US8572369B2 (en) Security for collaboration services
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
US20140281520A1 (en) Secure cloud data sharing
CN108009440A (en) Date storage method, querying method, device, storage medium and computer equipment
CN104618334A (en) Method and system for generating and verifying dynamic two-dimensional code
CN105450395A (en) Information encryption and decryption processing method and system
CN102684877A (en) Method and device for carrying out user information processing
CN105323064A (en) System and method for on-line adding of instant file dynamic label and on-line encryption
CN106022035A (en) Method and system for electronic signature
CN102833244A (en) Communication method for authentication by fingerprint information
CN104243149A (en) Encrypting and decrypting method, device and server
CN111131282B (en) Request encryption method and device, electronic equipment and storage medium
CN105450413A (en) Password-setting method, device, and system
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN110912682A (en) Data processing method, device and system
CA3066701A1 (en) Controlling access to data
CN109039997B (en) Secret key obtaining method, device and system
Tandon et al. QR Code based secure OTP distribution scheme for Authentication in Net-Banking
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
CN115081540A (en) Data privacy protectable classification method and system based on integrated decision learning
CN106411888B (en) Signature document encryption device and method
CN102238150A (en) Form registration method and server
CN103532958A (en) Method for encrypting website resources

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant