CN103338445A - File encryption and decryption method and system - Google Patents
File encryption and decryption method and system Download PDFInfo
- Publication number
- CN103338445A CN103338445A CN2013102434284A CN201310243428A CN103338445A CN 103338445 A CN103338445 A CN 103338445A CN 2013102434284 A CN2013102434284 A CN 2013102434284A CN 201310243428 A CN201310243428 A CN 201310243428A CN 103338445 A CN103338445 A CN 103338445A
- Authority
- CN
- China
- Prior art keywords
- file
- secret
- decryption
- input
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a file encryption and decryption method and system. The encryption and decryption method comprises encryption steps and decryption steps, wherein the encryption steps are as follows: A, if a private file folder is opened for the first time, a private file folder password for opening the private file folder is set; B, with regard to a file put in the private file folder, the file is encrypted according to a file password input by a user and is hidden according to option of the user. The decryption steps are as follows: (1) when a private file folder is opened, the password of the private file folder is need to be input; if the input password is correct, the step (2) is executed, otherwise the private file folder cannot be opened; (2) the private file folder is opened; (3) the user is prompted to input the password of a file selected by the user; if the input password is correct, the file is opened, otherwise the file cannot be opened. The file encryption and decryption method and system have the benefits that the problem of disclosure of private files, probably existing in the current mobile terminals, is solved through multiple encryptions and file hiding.
Description
Technical field
The present invention relates to the data encrypting and deciphering field, relate in particular to file encryption-decryption method and system.
Background technology
Nowadays our cell-phone function has been deposited various personal informations from strength to strength in the mobile phone.How to take effective measures to protect secret file and private information in the mobile phone, become our common problem.
Technology is with encrypt file and hardware device number binding at present, only could use certain encrypt file on specific equipment.There is a fatal defective in this: just in case the user loses this portable terminal, the secret file in this portable terminal has just been obtained by other people so.Famous " Nude Picture Scandal " event comes to this and takes place.
Summary of the invention
In order to solve the problems of the prior art, the invention provides a kind of file encryption-decryption method.
The invention provides a kind of file encryption-decryption method, comprise encrypting step and decryption step, in described encrypting step, comprise the steps:
A. if combat smuggling close file first, the secret file password of opening the secret file is set so;
B. the file password that the file of putting into the secret file is imported according to the user is encrypted file and according to user's selection file is hidden;
In described decryption step, comprise the steps:
(1). when opening the secret file, need input secret file password, if input is correct, execution in step (2) so, otherwise can't open the secret file;
(2). open the secret file;
(3). the file prompting input file password to the user chooses if input is correct, opens file so, otherwise can't open.
As a further improvement on the present invention, in described step B, what file was encrypted employing is the AES enciphered method.
As a further improvement on the present invention, in described step B, file is carried out Stealth Modus comprise file transfer, file rename and authority setting, described file shifts to file is transferred in the hidden folder of appointment; The filename of described file RNTO file is encrypted to and is saved to the configuration file backup after the ciphertext, then file is removed suffix and with the random letters rename; Described authority is set to the access rights of file are arranged.
As a further improvement on the present invention, in described step B, at first file is encrypted, and then file is hidden.
As a further improvement on the present invention, in described step (3), point out the input file password to the file that the user chooses, if input is correct, so the file decryption of encrypting is produced temporary file, treat that the user closes temporary file after, will delete described temporary file automatically.
The present invention also provides a kind of file encryption-decryption system, comprises ciphering unit and decrypting device, comprises in described ciphering unit:
Secret file encrypting module is used for if combat smuggling close file first the secret file password of opening the secret file being set so;
Document processing module is used for the file of putting into the secret file is encrypted file according to the file password of user's input and according to user's selection file is hidden;
In described decrypting device, comprise:
Secret file deciphering module when being used for opening the secret file, needs input secret file password, if input is correct, carries out so and opens module, otherwise can't open the secret file;
Open module, be used for opening the secret file;
The file decryption module, the file that is used for the user is chosen is pointed out the input file password, if input is correct, opens file so, otherwise can't open.
As a further improvement on the present invention, in described document processing module, what file was encrypted employing is the AES enciphered method.
As a further improvement on the present invention, in described document processing module, file is carried out Stealth Modus comprise file transfer, file rename and authority setting, described file shifts to file is transferred in the hidden folder of appointment; The filename of described file RNTO file is encrypted to and is saved to the configuration file backup after the ciphertext, then file is removed suffix and with the random letters rename; Described authority is set to the access rights of file are arranged.
As a further improvement on the present invention, in described document processing module, at first file is encrypted, and then file is hidden.
As a further improvement on the present invention, in described file decryption module, point out the input file password to the file that the user chooses, if input is correct, so the file decryption of encrypting is produced temporary file, treat that the user closes temporary file after, will delete described temporary file automatically.
The invention has the beneficial effects as follows: file encryption-decryption method of the present invention and system be through multi-enciphering and to the hiding of file, and solved the problem that secret file that present portable terminal may exist is revealed.
Description of drawings
Fig. 1 is encryption method flow chart of the present invention.
Fig. 2 is decryption method flow chart of the present invention.
Embodiment
As depicted in figs. 1 and 2, the invention discloses a kind of file encryption-decryption method, comprise encrypting step and decryption step, in described encrypting step, comprise the steps:
In step S1, if combat smuggling close file first, the secret file password of opening the secret file is set so; In step S2, the file of putting into the secret file is encrypted file according to the file password of user's input and according to user's selection file is hidden.
In described decryption step, comprise the steps:
In step W1, when opening the secret file, need input secret file password, if input is correct, execution in step W2 so, otherwise can't open the secret file; In step W2, open the secret file; In step W3, the file prompting input file password to the user chooses if input is correct, opens file so, otherwise can't open.
Secret file of the present invention is for the file through encrypting, and in described step S2, what file was encrypted employing is the AES enciphered method.
The AES enciphered method is Advanced Encryption Standard, is celebrated with efficient, safety, and ciphering process is as follows:
File after password+secret file metadata+AES cryptographic algorithm=encryption that the user arranges, the file after this encryption is called the secret file.So, under the situation that does not have the file password, even there is the people to obtain the secret file, also can't crack these secret files (because file is encrypted), obtain file content.
In described step S2, file is carried out Stealth Modus comprise file transfer, file rename and authority setting, described file shifts to file is transferred in the hidden folder of appointment; The filename of described file RNTO file is encrypted to and is saved to the configuration file backup after the ciphertext, then file is removed suffix and with the random letters rename; Described authority is set to the access rights of file are arranged.
In step S2 of the present invention, file is encrypted and file is hidden no sequencing restriction.As the preferred embodiments of the present invention, in described step S2, at first file is encrypted, and then file is hidden.
In described step W3, the file prompting input file password that the user is chosen if input is correct, produces temporary file with the file decryption of encrypting so, treat that the user closes temporary file after, will delete described temporary file automatically.
The present invention also provides a kind of file encryption-decryption system, comprises ciphering unit and decrypting device, comprises in described ciphering unit:
Secret file encrypting module is used for if combat smuggling close file first the secret file password of opening the secret file being set so; Document processing module is used for the file of putting into the secret file is encrypted file according to the file password of user's input and according to user's selection file is hidden.
In described decrypting device, comprise:
Secret file deciphering module when being used for opening the secret file, needs input secret file password, if input is correct, carries out so and opens module, otherwise can't open the secret file; Open module, be used for opening the secret file; The file decryption module, the file that is used for the user is chosen is pointed out the input file password, if input is correct, opens file so, otherwise can't open.
In described document processing module, what file was encrypted employing is the AES enciphered method.
In described document processing module, file is carried out Stealth Modus comprise file transfer, file rename and authority setting, described file shifts to file is transferred in the hidden folder of appointment; The filename of described file RNTO file is encrypted to and is saved to the configuration file backup after the ciphertext, then file is removed suffix and with the random letters rename; Described authority is set to the access rights of file are arranged.
In described document processing module, at first file is encrypted, and then file is hidden.
In described file decryption module, the file prompting input file password that the user is chosen if input is correct, produces temporary file with the file decryption of encrypting so, treat that the user closes temporary file after, will delete described temporary file automatically.
File encryption-decryption method of the present invention and system are applicable to portable terminal, especially are applicable to smart mobile phone, have solved the problem that secret file that present portable terminal may exist is revealed.
Above content be in conjunction with concrete preferred implementation to further describing that the present invention does, can not assert that concrete enforcement of the present invention is confined to these explanations.For the general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, can also make some simple deduction or replace, all should be considered as belonging to protection scope of the present invention.
Claims (10)
1. a file encryption-decryption method is characterized in that, comprises encrypting step and decryption step, comprises the steps: in described encrypting step
A. if combat smuggling close file first, the secret file password of opening the secret file is set so;
B. the file password that the file of putting into the secret file is imported according to the user is encrypted file and according to user's selection file is hidden;
In described decryption step, comprise the steps:
(1). when opening the secret file, need input secret file password, if input is correct, execution in step (2) so, otherwise can't open the secret file;
(2). open the secret file;
(3). the file prompting input file password to the user chooses if input is correct, opens file so, otherwise can't open.
2. file encryption-decryption method according to claim 1 is characterized in that, in described step B, what file was encrypted employing is the AES enciphered method.
3. file encryption-decryption method according to claim 1, it is characterized in that, in described step B, file is carried out Stealth Modus comprise file transfer, file rename and authority setting, described file shifts to file is transferred in the hidden folder of appointment; The filename of described file RNTO file is encrypted to and is saved to the configuration file backup after the ciphertext, then file is removed suffix and with the random letters rename; Described authority is set to the access rights of file are arranged.
4. according to each described file encryption-decryption method of claim 1 to 3, it is characterized in that, in described step B, at first file is encrypted, and then file is hidden.
5. file encryption-decryption method according to claim 4, it is characterized in that, in described step (3), point out the input file password to the file that the user chooses, if input is correct, so the file decryption of encrypting is produced temporary file, treat that the user closes temporary file after, will delete described temporary file automatically.
6. a file encryption-decryption system is characterized in that, comprises ciphering unit and decrypting device, comprises in described ciphering unit:
Secret file encrypting module is used for if combat smuggling close file first the secret file password of opening the secret file being set so;
Document processing module is used for the file of putting into the secret file is encrypted file according to the file password of user's input and according to user's selection file is hidden;
In described decrypting device, comprise:
Secret file deciphering module when being used for opening the secret file, needs input secret file password, if input is correct, carries out so and opens module, otherwise can't open the secret file;
Open module, be used for opening the secret file;
The file decryption module, the file that is used for the user is chosen is pointed out the input file password, if input is correct, opens file so, otherwise can't open.
7. file encryption-decryption according to claim 6 system is characterized in that, in described document processing module, what file was encrypted employing is the AES enciphered method.
8. file encryption-decryption according to claim 6 system, it is characterized in that, in described document processing module, file is carried out Stealth Modus comprise file transfer, file rename and authority setting, described file shifts to file is transferred in the hidden folder of appointment; The filename of described file RNTO file is encrypted to and is saved to the configuration file backup after the ciphertext, then file is removed suffix and with the random letters rename; Described authority is set to the access rights of file are arranged.
9. according to each described file encryption-decryption system of claim 6 to 8, it is characterized in that, in described document processing module, at first file is encrypted, and then file is hidden.
10. file encryption-decryption according to claim 9 system, it is characterized in that, in described file decryption module, point out the input file password to the file that the user chooses, if input is correct, so the file decryption of encrypting is produced temporary file, treat that the user closes temporary file after, will delete described temporary file automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102434284A CN103338445A (en) | 2013-06-19 | 2013-06-19 | File encryption and decryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102434284A CN103338445A (en) | 2013-06-19 | 2013-06-19 | File encryption and decryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103338445A true CN103338445A (en) | 2013-10-02 |
Family
ID=49246527
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013102434284A Pending CN103338445A (en) | 2013-06-19 | 2013-06-19 | File encryption and decryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103338445A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793663A (en) * | 2013-12-26 | 2014-05-14 | 北京奇虎科技有限公司 | Folder locking and unlocking methods and folder locking and unlocking devices |
CN105574423A (en) * | 2014-10-09 | 2016-05-11 | 中兴通讯股份有限公司 | Terminal device and file management method thereof |
CN105653924A (en) * | 2015-12-30 | 2016-06-08 | 魅族科技(中国)有限公司 | Touch screen operation method and device |
CN105912947A (en) * | 2016-03-31 | 2016-08-31 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and device based on external equipment |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
CN106156562A (en) * | 2016-06-28 | 2016-11-23 | 努比亚技术有限公司 | A kind of private space protection device, mobile terminal and method |
CN106250072A (en) * | 2016-07-26 | 2016-12-21 | 北京明朝万达科技股份有限公司 | A kind of mobile terminal safety Method of printing and system |
CN106599700A (en) * | 2016-11-18 | 2017-04-26 | 北京奇虎科技有限公司 | Method for processing application file and mobile communication terminal |
CN106709852A (en) * | 2015-08-13 | 2017-05-24 | 新人类资讯科技股份有限公司 | Method for generating watermark file and electronic device |
CN106778295A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | File storage, display methods, device and terminal |
WO2018171503A1 (en) * | 2017-03-24 | 2018-09-27 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN109284628A (en) * | 2018-09-10 | 2019-01-29 | 珠海格力电器股份有限公司 | A kind of file encryption storage reading system, method and mobile terminal based on fingerprint |
CN109492417A (en) * | 2018-11-13 | 2019-03-19 | 熊予舒 | Data ciphering method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2854676Y (en) * | 2005-12-19 | 2007-01-03 | 清华紫光股份有限公司 | File binder encipher device based on universal serial bus interface |
CN101382981A (en) * | 2008-09-23 | 2009-03-11 | 宇龙计算机通信科技(深圳)有限公司 | File encrypting and decrypting method and apparatus and mobile terminal |
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
CN101763399A (en) * | 2009-12-31 | 2010-06-30 | 上海量科电子科技有限公司 | Document module with folder function |
CN101833625A (en) * | 2010-05-11 | 2010-09-15 | 上海众烁信息科技有限公司 | File and folder safety protection method based on dynamic password and system thereof |
CN102142074A (en) * | 2011-03-31 | 2011-08-03 | 东北大学 | Chaos based universal electronic file encryption and decryption method |
CN102196422A (en) * | 2010-03-11 | 2011-09-21 | 北京明朝万达科技有限公司 | Method for preventing leakage of lost file of handheld communication terminal |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103077357A (en) * | 2013-01-18 | 2013-05-01 | 浙江长天信息技术有限公司 | Method for storing private files |
-
2013
- 2013-06-19 CN CN2013102434284A patent/CN103338445A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2854676Y (en) * | 2005-12-19 | 2007-01-03 | 清华紫光股份有限公司 | File binder encipher device based on universal serial bus interface |
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
CN101382981A (en) * | 2008-09-23 | 2009-03-11 | 宇龙计算机通信科技(深圳)有限公司 | File encrypting and decrypting method and apparatus and mobile terminal |
CN101763399A (en) * | 2009-12-31 | 2010-06-30 | 上海量科电子科技有限公司 | Document module with folder function |
CN102196422A (en) * | 2010-03-11 | 2011-09-21 | 北京明朝万达科技有限公司 | Method for preventing leakage of lost file of handheld communication terminal |
CN101833625A (en) * | 2010-05-11 | 2010-09-15 | 上海众烁信息科技有限公司 | File and folder safety protection method based on dynamic password and system thereof |
CN102142074A (en) * | 2011-03-31 | 2011-08-03 | 东北大学 | Chaos based universal electronic file encryption and decryption method |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103077357A (en) * | 2013-01-18 | 2013-05-01 | 浙江长天信息技术有限公司 | Method for storing private files |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793663A (en) * | 2013-12-26 | 2014-05-14 | 北京奇虎科技有限公司 | Folder locking and unlocking methods and folder locking and unlocking devices |
CN105574423A (en) * | 2014-10-09 | 2016-05-11 | 中兴通讯股份有限公司 | Terminal device and file management method thereof |
CN105574423B (en) * | 2014-10-09 | 2021-05-04 | 中兴通讯股份有限公司 | Terminal equipment and file management method thereof |
CN106709852A (en) * | 2015-08-13 | 2017-05-24 | 新人类资讯科技股份有限公司 | Method for generating watermark file and electronic device |
CN105653924A (en) * | 2015-12-30 | 2016-06-08 | 魅族科技(中国)有限公司 | Touch screen operation method and device |
CN105912947A (en) * | 2016-03-31 | 2016-08-31 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and device based on external equipment |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
CN106156562B (en) * | 2016-06-28 | 2019-01-15 | 努比亚技术有限公司 | A kind of private space protective device, mobile terminal and method |
CN106156562A (en) * | 2016-06-28 | 2016-11-23 | 努比亚技术有限公司 | A kind of private space protection device, mobile terminal and method |
CN106250072A (en) * | 2016-07-26 | 2016-12-21 | 北京明朝万达科技股份有限公司 | A kind of mobile terminal safety Method of printing and system |
CN106599700A (en) * | 2016-11-18 | 2017-04-26 | 北京奇虎科技有限公司 | Method for processing application file and mobile communication terminal |
CN106599700B (en) * | 2016-11-18 | 2020-11-06 | 北京安云世纪科技有限公司 | Method for processing application file and mobile communication terminal |
CN106778295A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | File storage, display methods, device and terminal |
CN106778295B (en) * | 2016-11-30 | 2020-04-10 | Oppo广东移动通信有限公司 | File storage method, file display method, file storage device, file display device and terminal |
WO2018171503A1 (en) * | 2017-03-24 | 2018-09-27 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN109284628A (en) * | 2018-09-10 | 2019-01-29 | 珠海格力电器股份有限公司 | A kind of file encryption storage reading system, method and mobile terminal based on fingerprint |
CN109492417A (en) * | 2018-11-13 | 2019-03-19 | 熊予舒 | Data ciphering method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103338445A (en) | File encryption and decryption method and system | |
GB2538052B (en) | Encoder, decoder, encryption system, encryption key wallet and method | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN103595721A (en) | Safe sharing method, sharing device and sharing system for files of network disk | |
CN103763091B (en) | A kind of application program encryption and decryption method and encryption, decryption device | |
CN105812332A (en) | Data protection method | |
CN104573551A (en) | File processing method and mobile terminal | |
CN102819702A (en) | File encryption operation method and file encryption operation system | |
CN101674575A (en) | Method for protecting security of mobile communication terminal data and device thereof | |
CN102868826B (en) | Terminal and terminal data protection method | |
CN105653986A (en) | Micro SD card-based data protection method and device | |
CN103440463A (en) | Electronic file protection method based on label | |
CN106357678A (en) | Cloud encryption storage method for intelligent terminal and intelligent terminal | |
CN102368850A (en) | Method for carrying out encryption and decryption on video file on mobile phone | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
CN109510702A (en) | A method of it key storage based on computer characteristic code and uses | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN103207976B (en) | Mobile storage file prevents the method for divulging a secret and the secret USB flash disk based on the method | |
CN1819590A (en) | Enciphering method of computer electronic documents | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
CN104732134B (en) | Information safety devices and its authentication method with software protection function | |
CN103002117A (en) | Phone information encryption method and phone information encryption system | |
CN105282738A (en) | Security authentication method for mobile terminal | |
CN101009878A (en) | Data secrecy system and method | |
CN103491384A (en) | Encrypting method and device of video and decrypting method and device of video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20131002 |