CN102355350A - File encryption method applied for mobile intelligent terminal and system thereof - Google Patents

File encryption method applied for mobile intelligent terminal and system thereof Download PDF

Info

Publication number
CN102355350A
CN102355350A CN2011101822118A CN201110182211A CN102355350A CN 102355350 A CN102355350 A CN 102355350A CN 2011101822118 A CN2011101822118 A CN 2011101822118A CN 201110182211 A CN201110182211 A CN 201110182211A CN 102355350 A CN102355350 A CN 102355350A
Authority
CN
China
Prior art keywords
file
encryption
encrypted
key
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101822118A
Other languages
Chinese (zh)
Other versions
CN102355350B (en
Inventor
卞佳丽
张峻明
邝坚
鲁琲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201110182211.8A priority Critical patent/CN102355350B/en
Publication of CN102355350A publication Critical patent/CN102355350A/en
Application granted granted Critical
Publication of CN102355350B publication Critical patent/CN102355350B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a file encryption method applied to the mobile terminal field and a system thereof. The method comprises the following steps: a key generation step, which means that an encryption key corresponded to a protection class is generated; a file encryption step, which means that encryption is carried out on a to-be-encrypted file on the basis of the encryption key so as to obtain an encrypted file; a key encryption step, which means that encryption is carried out on the encrypted encryption key according to a user password; and a write-in step, which means that the encrypted encryption key is written in an appointed location of the encrypted file. According to the method provided in the invention, time that is needed to inquire a key during reading of a file by a user can be saved; security on an encrypted key can be well ensured; and thus, security on the file can be improved.

Description

A kind of file encrypting method and system that is used for mobile intelligent terminal
Technical field
The present invention relates to a kind of file ciphering technology, relate in particular to a kind of graduate file encrypting method and system that is used for mobile intelligent terminal.
Background technology
File encryption is a kind of technology of automatically data that write storage medium being encrypted at operating system layer as requested, through file being encrypted to prevent that fileinfo is stolen.Extensive use along with mobile intelligent terminal; Increasing hacker has aimed at the mobile intelligent terminal user; The phenomenon that user's fileinfo is stolen is more and more, therefore, user's in the mobile intelligent terminal fileinfo effectively encrypted just seems particularly important.
Android (trade mark) operating system is Google company in the title based on the mobile intelligent terminal operating system of increasing income of Linux platform of issue on November 5th, 2007; This platform is made up of operating system, middleware, user interface and application software, and being known as is first real opening of making for portable terminal and complete mobile software.
Encryption method on the existing Android operating system all is the encipher interface that adopts application layer JAVA language to be provided; Use DES or aes algorithm; DES algorithm not only efficient is low but also can not resist differential attack; And key length also has only 56; Though aes algorithm has 128 key length, arithmetic speed is but very slow.
The main mode of storage key is directly key to be stored in lane database on the existing Android operating system; But the Android self database does not but have the excellent protection measure; In case this makes database reveal; A large amount of keys obtain victim, cause user's significant data to leak in a large number.
The BLOWFISH cryptographic algorithm is by a kind of symmetrical block cipher of Bruce Schneier design, has the ability of very strong resisting differential analytical attack, has efficiently, and characteristics such as fail safe, key length are variable have 32 to 448 selectable key lengths.But also there is a kind of potential safety hazard in this algorithm, promptly after producing sub-key in order to improve enciphering rate, and sub-key is kept among the Cache, if make Cache content victim steal like this, just can cause whole encryption subkey to reveal.
Message Digest Algorithm 5 (MD5) is developed by Ronal L.Rivest; By MD2, MD3 and MD4 development; Its effect is that message is generated message digest information; If message is modified in the air; So when receiving terminal recomputates this message digest value and the contrast of former digest value do; Just can find out the difference of digest value, modification take place thereby get outbound message.
Summary of the invention
The object of the invention is to provide a kind of file encrypting method and file encryption system that is used for mobile intelligent terminal; Be intended to solve in the prior art; Since to fail safe ignore or to the ignoring of efficient, and unsafe storage of the mobile terminal document that causes or the slow excessively problem of encryption efficiency.
In order to solve the problems of the technologies described above, the invention provides a kind of file encrypting method that is used for mobile intelligent terminal, it is characterized in that comprise: key generates step, generates the encryption key of corresponding said protection class; File encryption step is encrypted said file to be encrypted according to said encryption key and to be obtained encrypt file; The secret key encryption step is encrypted said encryption key according to said user password; Write step writes the encryption key after encrypting the assigned address of said encrypt file.
Further, this method also comprises: generate in the step at said key, select the protection class of file to be encrypted, different according to said protection class, the length of corresponding said encryption key is different.
Further, this method also comprises: in the said secret key encryption step, use summary information algorithm MD5 to handle the summary info that said user password obtains said user password, use said summary info to encrypt said encryption key.
Further, this method also comprises: before said file encryption step, earlier said file to be encrypted and a transformation matrix are carried out XOR, in said file encryption step, the be-encrypted data behind the XOR is encrypted; Said transformation matrices is encrypted according to said user password, and the encryption key after transformation matrix after in the said write step, will encrypting and the encryption writes the assigned address of said encrypt file in the lump.
Further, this method also comprises: said transformation matrix is a matrix of being made up of random number, generates through system time and a random value.
Further, this method also comprises: said transformation matrix is the matrix that 64 random numbers are formed, and each 64 bit data of reading in the said file to be encrypted is carried out XOR with said 64 random numbers respectively.
The present invention also provides a kind of file encryption system, it is characterized in that, comprises with lower unit: the key generation unit, and it generates the encryption key of corresponding said protection class; The file encryption unit, it is encrypted said file to be encrypted according to said encryption key and obtains encrypt file; The secret key encryption unit, it is encrypted said encryption key according to said user password; Writing unit, the encryption key after it will be encrypted writes the assigned address of said encrypt file.
Further, native system also comprises: said key generation unit is selected the protection class of file to be encrypted, and is different according to said protection class, and the length of corresponding said encryption key is different
Further, native system also comprises: the XOR unit, its generating transformation matrix carries out XOR with said file to be encrypted and this transformation matrix.The transformation matrix ciphering unit, it is encrypted said transformation matrix according to said user password; The said write unit is configured to be used for the transformation matrices after encrypting and the encryption key after encrypting writes the assigned address of encrypt file in the lump.
Further; Native system also comprises: use summary information algorithm MD5 to handle the summary info that said user password obtains said user password; Use said summary info to encrypt said encryption key in said secret key encryption unit, in said transformation matrix ciphering unit, use said summary info to encrypt said transformation matrix.
Compared with prior art, the present invention has the following advantages:
File encrypting method of the present invention and file encryption system obtain summary back encrypt file encryption key to user password with MD5, and the key after encrypting is deposited in the assigned address of source file.The user can directly read fixedly figure place when need read key like this from the assigned address of file; Not only can save the time that needs query key when the user reads file; And well guaranteed the safety of encryption key; If promptly user's password is not lost, the steal files encryption key is very difficult so.
Further; The user can select the different protection grade according to own definition to file security; File for the lower security grade can use low-grade protection; Help obtaining very fast enciphering rate like this; File for high safety grade can be selected high-grade protection; Although in time can be slow relatively, but temporal sacrifice be an acceptable for the importance of file.The method of file cascade protection has been avoided the situation of All Files by unified protected mode processing; File to some fail safes are not high is just taked low-grade protection; The user can not spent because needing protection a general file of importance and protect the same time of the higher file of importance; Can not make the higher file of fail safe can not get the protection of high safety grade yet; Thereby when guaranteeing safe class, improved operational efficiency.
Further; The present invention also provides the file encrypting method in a kind of BLOWFISH of can be applicable to algorithm; Promptly, data earlier data are carried out an XOR conversion before being encrypted; Then this matrix of participating in conversion, file encryption key is deposited in the assigned address of file after encrypting; Under this method; Even the assailant has stolen whole encryption subkey, do not obtain the assailant under the situation of transformation matrix, still can't obtain the content of user file.This method can be improved the fail safe of BLOWFISH effectively.
Further,, be used for carrying out XOR, can guarantee that the number average at random that when quick computing, generates is inequality, further strengthened the fail safe of encryption method with file to be encrypted through generating random number as seed with system time and random value.
Other features and advantages of the present invention will be set forth in specification subsequently, and, partly from specification, become apparent, perhaps understand through embodiment of the present invention.The object of the invention can be realized through the structure that in specification, claims and accompanying drawing, is particularly pointed out and obtained with other advantages.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of specification, is used to explain the present invention with embodiments of the invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the flow chart according to the file encrypting method of the embodiment of the invention one;
Fig. 2 is the flow chart according to the file encrypting method of the embodiment of the invention two;
Fig. 3 is the structure chart according to the file encryption system of the embodiment of the invention three;
Fig. 4 is the structure chart according to the file encryption system of the embodiment of the invention four.
Embodiment
Below will combine accompanying drawing and embodiment to describe execution mode of the present invention in detail, how the application technology means solve technical problem to the present invention whereby, and the implementation procedure of reaching technique effect can make much of and implement according to this.Need to prove that only otherwise constitute conflict, each embodiment among the present invention and each characteristic among each embodiment can mutually combine, formed technical scheme is all within protection scope of the present invention.
In addition; Can in computer system, carry out in the step shown in the flow chart of accompanying drawing such as a set of computer-executable instructions, and, though logical order has been shown in flow chart; But in some cases, can carry out step shown or that describe with the order that is different from here.
Embodiment one
Fig. 1 is the flow chart according to the file encrypting method of the embodiment of the invention one, describes each step of this method in detail below in conjunction with Fig. 1:
Step S110 (following omission " step " two words) generates the encryption key of corresponding protection class.
In this step, at first select the file (being called file to be encrypted) of required encryption, the user selects the protection class of its encryption according to the significance level of selected file then.
Preferably; In prompting user select File protection class; This step can be according to the required protection class of user's reality; Select the protection class of file to be encrypted; Generate the file encryption key of different length; Because the fail safe of encryption system is greatly by the key length decision, but long key must cause encrypting result slowly in the ciphering process file.So this step provides a protection interface of available protection class qualitatively to the user, the user can be according to the grade of oneself requirement of file being selected to protect.
S120 treats encrypt file according to encryption key and encrypts and obtain encrypt file.
In this step, treat encrypt file through encryption key and encrypt through predefined cryptographic algorithm, obtain encrypt file.
S130 encrypts encryption key according to user password.
The purpose of this step is in order to strengthen the fail safe of encryption key, to make it be difficult for being stolen.Through user password encryption key is encrypted, can guarantee user password do not lose or the situation of leaking under, encryption key is safer.
Preferably, use MD5 hash function process user password, obtain the summary info of user password.This summary info is 128 a summary info, uses these 128 summary infos to encrypt as new key-encrypting key.
S140 writes the assigned address of encrypt file with the encryption key after encrypting.
Key after the encryption that will in S130, obtain writes the assigned address of file, and this assigned address is predefined.Because the figure place of the encryption key that the process that writes is encrypted is certain; In the time of so just can guaranteeing to read the encryption key of file; Correctly locate position according to the figure place of predefined assigned address and encryption key, thereby draw encryption key through the encryption key of encrypting.Preferably, this assigned address is the end of encrypt file or the position of specifying figure place apart from the end.
Embodiment two
Fig. 2 is the flow chart according to the file encrypting method of the embodiment of the invention two, and embodiment two is on the basis of embodiment one, and further improved encryption method describes each step of this method in detail below in conjunction with Fig. 2:
S210 generates the encryption key of corresponding protection class.
This step is identical with embodiment one S110.Be not described further at this.
S215, the generating transformation matrix carries out XOR with file to be encrypted and this transformation matrix.
Before treating encrypt file and encrypting, earlier its and a transformation matrix are carried out XOR, can under the situation of encryption key leakage, still can guarantee the safety of file.Preferably, this transformation matrix can be the matrix is made up of the random number that system generates, and this matrix adds that with system time a random value generates as seed, can guarantee that the seed that when quick computing, generates is all inequality.Preferably, this random number is 64 random numbers, carries out XOR with 64 bit data of from file to be encrypted, reading successively.
S220 obtains encrypt file according to encryption key to encrypting through the file to be encrypted of XOR.
This step is identical with embodiment one S120.Be not described further at this.
S230 encrypts transformation matrix and encryption key according to user password.
This step according to user password to transformation matrix encrypt with embodiment one in step S130 encryption key is encrypted identical; Preferably; Use MD5 hash function process user password; Obtain the summary info of user password, (128) encrypt transformation matrix and encryption key through this summary info.
S240 writes the assigned address of encrypt file with the encryption key of transformation matrices after encrypting after encrypting.
This step is similar with embodiment one step S140, and this assigned address is predefined.Preferably, this assigned address is the end of encrypt file or the position of specifying figure place apart from the end.
The method of present embodiment can be used for the BLOWFISH algorithm, is used to improve its fail safe.
Embodiment three
Fig. 3 is the structured flowchart according to the file encryption system of the embodiment of the invention three, describes the composition of this document encryption system in detail below in conjunction with Fig. 3.
This document encryption system is corresponding with the file encrypting method of embodiment one, comprises with lower unit:
The key generation unit, it generates the encryption key of corresponding protection class.
In this unit, at first select the file (being called file to be encrypted) of required encryption, the user selects the protection class of its encryption according to the significance level of selected file then.
Preferably; In prompting user select File protection class; This unit can be according to the required protection class of user's reality; Select the protection class of file to be encrypted; Generate the file encryption key of different length; Because the fail safe of encryption system is greatly by the key length decision, but long key must cause encrypting result slowly in the ciphering process file.So this unit provides a protection interface of available protection class qualitatively to the user, the user can be according to the grade of oneself requirement of file being selected to protect.
The file encryption unit, it is encrypted this file to be encrypted according to this encryption key and obtains encrypt file.
In this unit, treat encrypt file through encryption key and encrypt through predefined cryptographic algorithm, obtain encrypt file.
The secret key encryption unit, it is encrypted encryption key according to user password.
The effect of this unit is in order to strengthen the fail safe of encryption key, to make it be difficult for being stolen.Through user password encryption key is encrypted, can guarantee user password do not lose or the situation of leaking under, encryption key is safer.
Preferably, use MD5 hash function process user password, obtain the summary info of user password.This summary info is 128 a summary info, uses these 128 summary infos as new key encryption key to be encrypted.
Writing unit, the encryption key after it will be encrypted writes the assigned address of encrypt file.
Key after the encryption that will in the secret key encryption unit, obtain writes the assigned address of file, and this assigned address is predefined.Because the figure place of the encryption key that the process that writes is encrypted is certain; In the time of so just can guaranteeing to read the encryption key of file; Correctly locate position according to the figure place of predefined assigned address and encryption key, thereby draw encryption key through the encryption key of encrypting.Preferably, this assigned address is the end of encrypt file or the position of specifying figure place apart from the end.
Embodiment four
Fig. 4 is the flow chart according to the file encrypting method of the embodiment of the invention four; Embodiment four is on the basis of embodiment three; Further improved encryption system, corresponding with the file encrypting method of embodiment three, describe each unit of this method in detail below in conjunction with Fig. 2.
This document secret system comprises with lower unit:
The key generation unit, it generates the encryption key of corresponding protection class.
This element is identical with embodiment two.Be not described further at this.
The XOR unit, its generating transformation matrix carries out XOR with file to be encrypted and this transformation matrix.
Before treating encrypt file and encrypting, earlier its and a transformation matrix are carried out XOR, can under the situation of encryption key leakage, still can guarantee the safety of file.Preferably, this transformation matrix can be the matrix is made up of the random number that system generates, and this random number adds that with system time a random value generates as seed, can guarantee that the seed that when quick computing, generates is all inequality.Preferably, this matrix carries out XOR by being 64 matrixes that random number is formed with 64 bit data of from file to be encrypted, reading successively.
The file encryption unit, it obtains encrypt file according to encryption key to encrypting through the file to be encrypted of XOR.
This element is identical with embodiment three.Be not described further at this.
The transformation matrix ciphering unit, it is encrypted transformation matrix and encryption key according to user password.
This unit according to user password to transformation matrix encrypt with embodiment one in 130 pairs of encryption keys of cell S encrypt identical; Preferably; Use MD5 hash function process user password; Obtain the summary info of user password, (128) encrypt transformation matrix and encryption key through this summary info.
Writing unit, the encryption key of the transformation matrices after it will be encrypted after encrypting writes the assigned address of encrypt file.
The writing unit of this unit and embodiment three is similar, and this assigned address is predefined.Preferably, this assigned address is the end of encrypt file or the position of specifying figure place apart from the end.
Preferably, what the transformation matrix after encrypting write assigned address is the encryption key (realizing through the secret key encryption unit, not shown in Figure 4) after encrypting through user password, and its cipher mode is identical with transformation matrix.
File encrypting method of the present invention and file encryption system have higher efficient.Make the microprocessor at 32bit, can reach the speed of per 18 clock cycle encryption 1Byte data, the time is 1/10th of DES and AES approximately, has improved the efficient of encrypting to a great extent.
File encrypting method provided by the invention and file encryption system can be applied in computer installation and the mobile intelligent terminal, can select safe class to come configuring cipher key according to the user, when guaranteeing fail safe, have improved encryption efficiency.Through user password the encryption key of file is encrypted, further improved the reliability and the fail safe of file encryption.Through before encryption, file being carried out XOR,, avoided owing to key leaks the loss that brings for file provides further safety guarantee.
Those skilled in the art should be understood that; Above-mentioned each module of the present invention or each step can realize with the general calculation device; They can concentrate on the single calculation element; Perhaps be distributed on the network that a plurality of calculation element forms; Alternatively; They can be realized with the executable program code of calculation element; Thereby; They can be stored in the storage device and carry out by calculation element; Perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Though the execution mode that the present invention disclosed as above, the execution mode that described content just adopts for the ease of understanding the present invention is not in order to limit the present invention.Technical staff under any the present invention in the technical field; Under the prerequisite of the spirit and scope that do not break away from the present invention and disclosed; Can do any modification and variation what implement in form and on the details; But scope of patent protection of the present invention still must be as the criterion with the scope that appending claims was defined.

Claims (10)

1. a file encrypting method that is used for mobile intelligent terminal is characterized in that, comprising:
Key generates step, generates the encryption key of corresponding said protection class;
File encryption step is encrypted said file to be encrypted according to said encryption key and to be obtained encrypt file;
The secret key encryption step is encrypted said encryption key according to said user password;
Write step writes the encryption key after encrypting the assigned address of said encrypt file.
2. encryption method according to claim 1 is characterized in that, generates in the step at said key, selects the protection class of file to be encrypted, and is different according to said protection class, and the length of corresponding said encryption key is different.
3. encryption method according to claim 1 is characterized in that, in the said secret key encryption step, uses summary information algorithm MD5 to handle the summary info that said user password obtains said user password, uses said summary info to encrypt said encryption key.
4. according to each described encryption method of claim 1 to 3; It is characterized in that; Before said file encryption step, earlier said file to be encrypted and a transformation matrix are carried out XOR, in said file encryption step, the be-encrypted data behind the XOR is encrypted;
Said transformation matrices is encrypted according to said user password, and the encryption key after transformation matrix after in the said write step, will encrypting and the encryption writes the assigned address of said encrypt file in the lump.
5. encryption method according to claim 4 is characterized in that, said transformation matrix is a matrix of being made up of random number, generates through system time and a random value.
6. encryption method according to claim 5 is characterized in that, said transformation matrix is the matrix that 64 random numbers are formed, and each 64 bit data of reading successively in the said file to be encrypted is carried out XOR with said 64 random numbers respectively.
7. a file encryption system that is used for mobile intelligent terminal is characterized in that, comprises with lower unit:
The key generation unit, it generates the encryption key of corresponding said protection class;
The file encryption unit, it is encrypted said file to be encrypted according to said encryption key and obtains encrypt file;
The secret key encryption unit, it is encrypted said encryption key according to said user password;
Writing unit, the encryption key after it will be encrypted writes the assigned address of said encrypt file.
8. encryption system according to claim 7 is characterized in that said key generation unit is selected the protection class of file to be encrypted, and is different according to said protection class, and the length of corresponding said encryption key is different.
9. encryption system according to claim 8 is characterized in that, also comprises:
The XOR unit, its generating transformation matrix carries out XOR with said file to be encrypted and this transformation matrix.
The transformation matrix ciphering unit, it is encrypted said transformation matrix according to said user password;
The said write unit is configured to be used for the transformation matrices after encrypting and the encryption key after encrypting writes the assigned address of encrypt file in the lump.
10. according to each described encryption system of claim 9; It is characterized in that; Use summary information algorithm MD5 to handle the summary info that said user password obtains said user password; Use said summary info to encrypt said encryption key in said secret key encryption unit, in said transformation matrix ciphering unit, use said summary info to encrypt said transformation matrix.
CN201110182211.8A 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system Expired - Fee Related CN102355350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110182211.8A CN102355350B (en) 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110182211.8A CN102355350B (en) 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system

Publications (2)

Publication Number Publication Date
CN102355350A true CN102355350A (en) 2012-02-15
CN102355350B CN102355350B (en) 2015-09-02

Family

ID=45578849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110182211.8A Expired - Fee Related CN102355350B (en) 2011-06-30 2011-06-30 A kind of file encrypting method for mobile intelligent terminal and system

Country Status (1)

Country Link
CN (1) CN102355350B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968588A (en) * 2012-12-20 2013-03-13 四川长虹电器股份有限公司 Intelligent terminal system
CN103491384A (en) * 2013-09-09 2014-01-01 天脉聚源(北京)传媒科技有限公司 Encrypting method and device of video and decrypting method and device of video
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
WO2015127772A1 (en) * 2014-02-27 2015-09-03 中国科学院数据与通信保护研究教育中心 Key protecting method and apparatus
CN105760764A (en) * 2014-12-18 2016-07-13 中兴通讯股份有限公司 Encryption and decryption methods and devices for embedded storage device file and terminal
WO2017000726A1 (en) * 2015-07-02 2017-01-05 中兴通讯股份有限公司 Key transformation method, apparatus, and terminal
CN108155993A (en) * 2017-12-29 2018-06-12 北京树米网络科技有限公司 The data ciphering method and device of VSIM cards
CN108540426A (en) * 2017-03-02 2018-09-14 珠海金山办公软件有限公司 A kind of method, apparatus and server for realizing data processing
CN108616537A (en) * 2018-04-28 2018-10-02 湖南麒麟信安科技有限公司 A kind of conventional data encryption and decryption method and system of lower coupling
CN108833347A (en) * 2018-05-07 2018-11-16 陕西东沃物流信息服务有限公司 A method of improving logistics information privacy
CN109948363A (en) * 2019-03-12 2019-06-28 天固信息安全系统(深圳)有限责任公司 A kind of distributed document encryption method based on credible base
CN111147430A (en) * 2018-11-06 2020-05-12 中移(杭州)信息技术有限公司 Encryption method and device applied to intelligent home gateway

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1324028A (en) * 2000-05-11 2001-11-28 松下电器产业株式会社 Document managing device
CN1633070A (en) * 2004-10-29 2005-06-29 徐子杰 A data encryption/decryption method and encryption/decryption apparatus
CN101192919A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 Method for realizing user-defined security level

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1324028A (en) * 2000-05-11 2001-11-28 松下电器产业株式会社 Document managing device
CN1633070A (en) * 2004-10-29 2005-06-29 徐子杰 A data encryption/decryption method and encryption/decryption apparatus
CN101192919A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 Method for realizing user-defined security level

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968588B (en) * 2012-12-20 2015-07-29 四川长虹电器股份有限公司 Intelligent terminal system
CN102968588A (en) * 2012-12-20 2013-03-13 四川长虹电器股份有限公司 Intelligent terminal system
CN103491384B (en) * 2013-09-09 2017-01-18 天脉聚源(北京)传媒科技有限公司 Encrypting method and device of video and decrypting method and device of video
CN103491384A (en) * 2013-09-09 2014-01-01 天脉聚源(北京)传媒科技有限公司 Encrypting method and device of video and decrypting method and device of video
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
WO2015127772A1 (en) * 2014-02-27 2015-09-03 中国科学院数据与通信保护研究教育中心 Key protecting method and apparatus
US10313111B2 (en) 2014-02-27 2019-06-04 Data Assurance And Communication Security Research Center, Chinese Academy Of Sciences Key protecting method and apparatus
CN105760764A (en) * 2014-12-18 2016-07-13 中兴通讯股份有限公司 Encryption and decryption methods and devices for embedded storage device file and terminal
CN105760764B (en) * 2014-12-18 2020-03-17 中兴通讯股份有限公司 Encryption and decryption method and device for embedded storage device file and terminal
CN106330435A (en) * 2015-07-02 2017-01-11 中兴通讯股份有限公司 Key transformation method and device, and terminal
WO2017000726A1 (en) * 2015-07-02 2017-01-05 中兴通讯股份有限公司 Key transformation method, apparatus, and terminal
CN108540426A (en) * 2017-03-02 2018-09-14 珠海金山办公软件有限公司 A kind of method, apparatus and server for realizing data processing
CN108155993A (en) * 2017-12-29 2018-06-12 北京树米网络科技有限公司 The data ciphering method and device of VSIM cards
CN108155993B (en) * 2017-12-29 2021-12-17 北京树米网络科技有限公司 Data encryption method and device for VSIM card
CN108616537A (en) * 2018-04-28 2018-10-02 湖南麒麟信安科技有限公司 A kind of conventional data encryption and decryption method and system of lower coupling
CN108616537B (en) * 2018-04-28 2021-11-30 湖南麒麟信安科技股份有限公司 Low-coupling general data encryption and decryption method and system
CN108833347A (en) * 2018-05-07 2018-11-16 陕西东沃物流信息服务有限公司 A method of improving logistics information privacy
CN111147430A (en) * 2018-11-06 2020-05-12 中移(杭州)信息技术有限公司 Encryption method and device applied to intelligent home gateway
CN109948363A (en) * 2019-03-12 2019-06-28 天固信息安全系统(深圳)有限责任公司 A kind of distributed document encryption method based on credible base

Also Published As

Publication number Publication date
CN102355350B (en) 2015-09-02

Similar Documents

Publication Publication Date Title
CN102355350B (en) A kind of file encrypting method for mobile intelligent terminal and system
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN105450620A (en) Information processing method and device
US20180287789A1 (en) Encryption using multi-level encryption key derivation
US9053346B2 (en) Low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection
CN103414682A (en) Method for cloud storage of data and system
CN102904712A (en) Information encrypting method
CN110138795B (en) Multi-step mixed encryption and decryption method in communication process
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN111314050B (en) Encryption and decryption method and device
CN109005184A (en) File encrypting method and device, storage medium, terminal
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
CN113326518A (en) Data processing method and device
Hu et al. Taming energy cost of disk encryption software on data-intensive mobile devices
CN116594567A (en) Information management method and device and electronic equipment
CN110457924A (en) Storing data guard method and device
Gong [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management
CN114553557B (en) Key calling method, device, computer equipment and storage medium
Wu et al. Research of the Database Encryption Technique Based on Hybrid Cryptography
CN107872312B (en) Method, device, equipment and system for dynamically generating symmetric key
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium
CN115396190A (en) Data encryption method, decryption method and device
KR101812311B1 (en) User terminal and data sharing method of user terminal based on attributed re-encryption
CN113642041A (en) Data processing and storing method for realizing contract privacy
CN114036541A (en) Application method for compositely encrypting and storing user private content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150902

Termination date: 20210630

CF01 Termination of patent right due to non-payment of annual fee