CN103455764B - A kind of file encryption based on file division folding and decryption system - Google Patents

A kind of file encryption based on file division folding and decryption system Download PDF

Info

Publication number
CN103455764B
CN103455764B CN201310378893.9A CN201310378893A CN103455764B CN 103455764 B CN103455764 B CN 103455764B CN 201310378893 A CN201310378893 A CN 201310378893A CN 103455764 B CN103455764 B CN 103455764B
Authority
CN
China
Prior art keywords
file
encryption
security
module
folder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310378893.9A
Other languages
Chinese (zh)
Other versions
CN103455764A (en
Inventor
耿振民
宋恒旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Original Assignee
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310378893.9A priority Critical patent/CN103455764B/en
Publication of CN103455764A publication Critical patent/CN103455764A/en
Application granted granted Critical
Publication of CN103455764B publication Critical patent/CN103455764B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

nullThe present invention provides a kind of file encryption based on file division folding and decryption system,Mainly preset level of security and the file matrix of each level of security corresponding of multiple different stage coefficient,Then,A file matrix is set up according to selected level of security,And the file division needing encryption is become the file fragmentation of respective amount part,Again described file fragmentation is respectively stored in set up file matrix,And one key of stochastic generation,This double secret key should link the code name of the All Files fragment of this document that need to encrypt and the store path of the file fragmentation of each code name corresponding,The most quickly and easily complete ciphering process,When needs are deciphered,If the key generated when correctly entering storage this document,All Files fragment can be searched,Then All Files fragment is integrated into a complete original,Deciphering can be rapidly completed,And for normally this document,It is highly suitable for the safety storage of vital document.

Description

A kind of file encryption based on file division folding and decryption system
Technical field
The present invention relates to a kind of information security field, particularly relate to a kind of file encryption based on file division and folding with And decryption system.
Background technology
It is the aspect that the electronic information tide indicated has covered social life with computer, network and movable storage device Face, has liberated the productivity greatly, speed that the information that improves is mutual and effectiveness, informationization bring easily with Time, incident is informationalized safety problem, and this brings certain puzzlement, especially information to enterprise and is illegally abused, Selling rival including employee by document, file is illegally stolen.
Therefore, consider based on information security, it is necessary to a kind of file encryption that can quickly and simply perform file encryption-decryption is provided And decryption system, and then guarantee the safe handling of file.
Summary of the invention
The shortcoming of prior art in view of the above, it is an object of the invention to provide one and can quickly and simply perform file and add The file encryption of deciphering and decryption system, and then guarantee the safe handling of file.
For achieving the above object and other relevant purposes, the present invention provide a kind of file encryption based on file division folding with And decryption system, it is applied in a data processing platform, it is characterised in that described file encryption system includes: setting module, It is for setting level of security and the file matrix of each level of security corresponding of multiple different stage coefficient, wherein, institute State file matrix and include multiple root folder and the multiple sub-folders being distributed in each root folder, and described safe level Other classification coefficient is different, and the corresponding root folder in file matrix is the most different from the quantity of sub-folder;Encryption trigger mode Block, the file encryption request that it sends in order to respond described data processing platform, and the selection merit of described different level of security is provided Can, when selecting the level of security of one of them, i.e. set up the file matrix of corresponding described level of security, and send an encryption Trigger signal;File division module, it is used to receive the encryption that described encryption trigger module sent when triggering signal, according to In the file matrix set up, the quantity of all sub-folders, becomes the file fragmentation of respective amount by the file division that need to encrypt, And specify one code name of each file fragmentation according to file fragmentation precedence in original, and give record;And deposit Storage module, it is in order to be respectively stored in, by the file fragmentation that described file division module is split, the literary composition that described trigger module is set up Part folder matrix each root folder under sub-folder in, and record each code name file fragmentation store path, and Stochastic generation one key simultaneously, and the code name of the All Files fragment of file that the link of described random key correspondence need to be encrypted and right Answer the store path of the file fragmentation of each code name.
Wherein, described root folder is to be determined by the classification coefficient of corresponding level of security with the quantity of described sub-folder, level Other coefficient is the highest, and corresponding described root folder is the most with the quantity of described sub-folder.The file encryption system of the present invention is to take Connect in the system program running on this data processing platform.This data processing platform can for example, desktop computer, notebook computer, PDA(Personal Digital Assistant) or mobile phone.
Additionally, the present invention also provides for a kind of file decryption system, it is applied in described data processing platform, it is characterised in that Described file decryption system includes: deciphering trigger module, the file decryption request that it sends in order to respond described data processing platform, And provide a key inputting interface, and judge whether the key inputted is that described file encryption system institute applied by the file that need to decipher The key generated, the most then send a deciphering and trigger signal, if it is not, then prompting decoding request failure;File fine module, It is used to receive the deciphering triggering signal that described deciphering trigger module is sent, then according to described key, the literary composition that locking need to be deciphered The code name of the All Files fragment of part and the store path of the file fragmentation of each code name corresponding, and then search All Files Fragment;And file synthesis module, described file fine module, in order to the code name according to each file fragmentation, is searched by it All Files fragment carry out synthesis process, and then All Files fragment is reverted to complete original.
Wherein, during the file decryption system of the present invention is the system program that overlap joint runs on this data processing platform.And at this data Platform can for example, desktop computer, notebook computer, personal digital assistant or mobile phone.
As it has been described above, the file encryption based on file division folding of the present invention and decryption system, mainly preset The level of security of multiple different stage coefficients and the file matrix of each level of security corresponding, then, according to selected peace Full rank sets up a file matrix, and the file fragmentation that the file division encrypted will be needed to become respective amount part, then by described literary composition Part fragment is respectively stored in set up file matrix, and one key of stochastic generation, and this double secret key should link need to be encrypted The code name of the All Files fragment of this document and the store path of the file fragmentation of each code name corresponding, the completeest Become ciphering process, and key randomly generates, as long as user remembers this key, additionally, because of key not by making User's sets itself, but randomly generate, key does not has certain regularity, and the probability that the person of being illegally used steals is significantly Reduce;And, when needs are deciphered, as long as the key generated when correctly entering encryption storage this document, can search all File fragmentation, is then integrated into a complete original by All Files fragment, can be rapidly completed deciphering, and for normally making Use this document.
Accompanying drawing explanation
Fig. 1 is shown as the file encryption of the present invention and the block schematic diagram of decryption system.
Element numbers explanation
1 file encryption system
10 setting modules
12 encryption trigger modules
14 file division modules
16 memory modules
2 file decryption systems
20 deciphering trigger modules
22 file fine modules
24 file synthesis modules
3 data processing platforms
Detailed description of the invention
Below by way of specific instantiation, embodiments of the present invention being described, those skilled in the art can be by disclosed by this specification Content understand other advantages and effect of the present invention easily.The present invention can also be added by the most different detailed description of the invention To implement or application, the every details in this specification can also be based on different viewpoints and application, in the essence without departing from the present invention Various modification or change is carried out under god.
Refer to Fig. 1, be the block schematic diagram of file encryption and the decryption system showing the present invention.The file encryption of the present invention And decryption system is in the system program that overlap joint runs on data processing platform 3, in order to provide the quick encryption and decryption functions of file. Wherein, this data processing platform can for example, desktop computer, notebook computer, personal digital assistant and intelligent mobile phone fill Put etc. and there is data process function, and group is provided with input block (such as keyboard, mouse or pointer etc.) and output unit (such as liquid crystal Display screen curtain etc.) electronic equipment.Below i.e. to the file encryption of the present invention and being described in detail of decryption system.
As it is shown in figure 1, the file encryption system based on file division folding 1 of the present invention includes setting module 10, encryption Trigger module 12, file division module 14 and memory module 16.
Wherein, this setting module 10 is for setting the level of security of multiple different stage coefficient and each level of security corresponding File matrix, wherein, described file matrix include multiple root folder and be distributed in each root folder multiple Sub-folder, and the classification coefficient of described level of security is different, the corresponding root folder in file matrix and sub-folder Quantity is the most different.Described root folder is to be determined by the classification coefficient of corresponding level of security with the quantity of described sub-folder, Classification coefficient is the highest, and corresponding described root folder is the most with the quantity of described sub-folder.For example, classification coefficient is relatively low File matrix corresponding to level of security can be very simple, as comprised two root folders 1,2, both of these documents underedge simultaneously Face comprises 2 sub-folders, i.e. sub-folder 11,12 and 21,22 the most respectively;If the level of security pair that classification coefficient is the highest The file matrix answered, then include and also comprise many height in several root folder 1,2 ..., n, and each root folder File, such as sub-folder 1 ... 1 ..., 1 ... m;2……1、…、2……m;…;n……1、…、n……m Etc., by that analogy.
This encryption trigger module 12 is to respond the file encryption request that described data processing platform 3 sends, and described in offer not With the selection function of level of security, when selecting the level of security of one of them, i.e. set up the file of corresponding described level of security Matrix, and send an encryption triggering signal.
This document segmentation module 14 is to be used to receive the encryption that described encryption trigger module 12 sent when triggering signal, according to In the file matrix set up, the quantity of all sub-folders, becomes the file fragmentation of respective amount by the file division that need to encrypt, And specify the corresponding code name of each file fragmentation according to file fragmentation precedence in original, and give record.
This memory module 16 is in order to the file fragmentation that described file division module 14 is split is respectively stored in described trigger mode In sub-folder under each root folder of the file matrix that block 12 is set up, and record the file fragmentation of each code name Store path, and simultaneously stochastic generation one key, and the All Files of the file that the link of described random key correspondence need to be encrypted is broken The code name of sheet and the store path of the file fragmentation of each code name corresponding.Now, i.e. complete the file encryption request of user, Quickly and simply achieve the encryption of file, and key randomly generates, as long as user remembers this key, this Outward, because of key not by user sets itself, but randomly generating, key does not has certain rule, the person of being illegally used The probability stolen is substantially reduced.
Additionally, when user need to use the file encrypted via above-mentioned file encryption system 1, then can be by the literary composition of the present invention Part decryption system 2 is achieved.In more detail, as it is shown in figure 1, the file decryption system 2 of the present invention includes that deciphering triggers Module 20, file fine module 22 and file synthesis module 24.
This deciphering trigger module 20 is to respond the file decryption request that described data processing platform 3 sends, and provides a key Inputting interface, and judge whether the key inputted is that the memory module in above-mentioned file encryption system 1 applied by the file that need to decipher 16 keys generated, the most then send a deciphering and trigger signal, if it is not, then prompting decoding request failure, need to re-enter New key carries out verification step again.
This document search module 22 is to be used to receive deciphering triggering signal, the then foundation that described deciphering trigger module 20 is sent Described key, the code name of the All Files fragment of the file that locking need to be deciphered and the storage of the file fragmentation of each code name corresponding Path, and then search All Files fragment.
This document synthesis module 24 is in order to the code name according to each file fragmentation, described file fine module 22 is searched All Files fragment carry out synthesis process, and then All Files fragment is reverted to complete original, normal for user Use this document.
In sum, the file encryption of the present invention and decryption system mainly preset the safe level of multiple different stage coefficient The file matrix of each level of security other and corresponding, then, sets up a file matrix according to selected level of security, And will need the file division of encryption to become the file fragmentation of respective amount part, more described file fragmentation is respectively stored in is set up In file matrix, and one key of stochastic generation, this double secret key should link the generation of the All Files fragment of this document that need to encrypt Number and the store path of file fragmentation of each code name corresponding, the most quickly and easily complete ciphering process, and key be with Machine produces, as long as user remembers this key, additionally, because of key not by user sets itself, but at random Producing, key does not has certain regularity, and the probability that the person of being illegally used steals is substantially reduced;And, when needs are deciphered, As long as the key generated when correctly entering encryption storage this document, All Files fragment can be searched, then that All Files is broken Sheet is integrated into a complete original, can be rapidly completed deciphering, and for normally this document, be highly suitable for important literary composition The safety storage of part.
The principle of above-described embodiment only illustrative present invention and effect thereof, not for limiting the present invention.Any it is familiar with this skill Above-described embodiment all can be modified under the spirit and the scope of the present invention or change by the personage of art.Therefore, such as All that in art, tool usually intellectual is completed under without departing from disclosed spirit and technological thought etc. Effect is modified or changes, and must be contained by the claim of the present invention.

Claims (7)

1. a file encryption system based on file division folding, it is applied in a data processing platform, it is characterised in that Described file encryption system includes:
Setting module, it is for setting level of security and the literary composition of each level of security corresponding of multiple different stage coefficient Part folder matrix, wherein, described file matrix includes multiple root folder and the many height being distributed in each root folder File, and the classification coefficient of described level of security is different, the corresponding root folder in file matrix and sub-folder Quantity is the most different;
Encryption trigger module, the file encryption request that it sends in order to respond described data processing platform, and described in offer not With the selection function of level of security, when selecting the level of security of one of them, i.e. set up the file of corresponding described level of security Folder matrix, and send an encryption triggering signal;
File division module, it is used to receive the encryption that described encryption trigger module sent when triggering signal, according to institute In the file matrix set up, the quantity of all sub-folders, becomes the file fragmentation of respective amount by the file division that need to encrypt, And specify one code name of each file fragmentation according to file fragmentation precedence in original, and give record;And
Memory module, it is in order to be respectively stored in described trigger module by the file fragmentation that described file division module is split In sub-folder under each root folder of the file matrix set up, and record each code name file fragmentation Store path, and stochastic generation one key simultaneously, and the All Files of the file that the link of described random key correspondence need to be encrypted is broken The code name of sheet and the store path of the file fragmentation of each code name corresponding.
File encryption system based on file division folding the most according to claim 1, it is characterised in that: described file Pressing from both sides with the quantity of described sub-folder is to be determined by the classification coefficient of corresponding level of security, and classification coefficient is the highest, corresponding Described root folder is the most with the quantity of described sub-folder.
File encryption system based on file division folding the most according to claim 1, it is characterised in that: this document is encrypted System is in the system program that overlap joint runs on this data processing platform.
File encryption system based on file division folding the most according to claim 1, it is characterised in that: this data processes Platform is desktop computer, notebook computer, personal digital assistant or mobile phone.
5. coordinating a file decryption system for file encryption system described in claim 1, it is applied to described data processing platform In, it is characterised in that described file decryption system includes:
Deciphering trigger module, the file decryption request that it sends in order to respond described data processing platform, and a key is provided Inputting interface, and judge the key that inputted whether by the file that need to decipher apply that described file encryption system generated close Key, the most then send a deciphering and trigger signal, if it is not, then prompting decoding request failure;
File fine module, it is used to receive the deciphering triggering signal that described deciphering trigger module is sent, then according to institute State key, the code name of the All Files fragment of the file that locking need to be deciphered and the storage of the file fragmentation of each code name corresponding Path, and then search All Files fragment;And
File synthesis module, described file fine module, in order to the code name according to each file fragmentation, is searched by it All Files fragment carries out synthesis process, and then All Files fragment is reverted to complete original.
File decryption system the most according to claim 5, it is characterised in that: this document decryption system is that overlap joint runs on this data In the system program of processing platform.
File decryption system the most according to claim 5, it is characterised in that: this data processing platform is desktop computer, notes type Computer, personal digital assistant or mobile phone.
CN201310378893.9A 2013-08-27 2013-08-27 A kind of file encryption based on file division folding and decryption system Expired - Fee Related CN103455764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310378893.9A CN103455764B (en) 2013-08-27 2013-08-27 A kind of file encryption based on file division folding and decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310378893.9A CN103455764B (en) 2013-08-27 2013-08-27 A kind of file encryption based on file division folding and decryption system

Publications (2)

Publication Number Publication Date
CN103455764A CN103455764A (en) 2013-12-18
CN103455764B true CN103455764B (en) 2016-09-14

Family

ID=49738113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310378893.9A Expired - Fee Related CN103455764B (en) 2013-08-27 2013-08-27 A kind of file encryption based on file division folding and decryption system

Country Status (1)

Country Link
CN (1) CN103455764B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10127244B2 (en) * 2014-06-04 2018-11-13 Harris Corporation Systems and methods for dynamic data storage
CN104615954B (en) * 2014-06-30 2018-09-11 腾讯科技(深圳)有限公司 Password storage method and apparatus
CN104182697B (en) * 2014-08-15 2017-07-28 小米科技有限责任公司 File encrypting method and device
CN104462885A (en) * 2014-12-30 2015-03-25 大连楼兰科技股份有限公司 Method for preventing original code from being acquired
CN104732163B (en) * 2015-04-03 2017-11-03 宁波工程学院 A kind of folder encryption method and encryption file application method
CN104794408B (en) * 2015-04-27 2017-12-08 上海青橙实业有限公司 File encrypting method and terminal system
CN104796292B (en) * 2015-04-27 2018-05-04 上海青橙实业有限公司 Terminal management method and terminal system
WO2016175334A1 (en) * 2015-04-30 2016-11-03 真旭 徳山 Terminal device and computer program
CN105141428A (en) * 2015-08-19 2015-12-09 深圳密无痕智能科技有限公司 System and method for authentication and identification based on fuzzy fault and one-time password
CN105260668B (en) * 2015-10-10 2018-07-24 北京搜狗科技发展有限公司 A kind of file encrypting method and electronic equipment
CN105975877B (en) * 2016-07-01 2019-06-21 中国联合网络通信有限公司重庆市分公司 A kind of sensitive document secure storage method
CN106709366A (en) * 2016-12-05 2017-05-24 国云科技股份有限公司 Method for improving data security based on object storage
CN107070656B (en) * 2017-03-31 2020-02-07 武汉斗鱼网络科技有限公司 Method and system for encrypting and decrypting so file in application program
CN107679405A (en) * 2017-08-25 2018-02-09 芜湖市振华戎科智能科技有限公司 Secret unit file encryption transmission system
CN107579985B (en) * 2017-09-19 2020-04-28 杭州安恒信息技术股份有限公司 Large file transmission protection method based on fragment encryption
CN109933994B (en) * 2017-12-18 2024-03-29 北京三快在线科技有限公司 Data hierarchical storage method and device and computing equipment
CN109936546B (en) * 2017-12-18 2021-01-26 北京三快在线科技有限公司 Data encryption storage method and device and computing equipment
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN108959941A (en) * 2018-06-21 2018-12-07 Oppo(重庆)智能科技有限公司 Data ciphering method, device and electronic device
CN110245502A (en) * 2019-05-16 2019-09-17 深圳市百思智能科技有限公司 A kind of robot wireless transmission information encryption method
CN110795702A (en) * 2019-10-12 2020-02-14 山东英信计算机技术有限公司 Software anti-cracking method, device, equipment and medium
CN111917720A (en) * 2020-06-28 2020-11-10 中科物缘科技(杭州)有限公司 File fragmentization encryption storage method, file fragmentization encryption acquisition method and file fragmentization encryption storage system based on block chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320356A (en) * 2008-07-14 2008-12-10 曹乃承 Data storage method and device
CN102902933A (en) * 2012-09-21 2013-01-30 四川长虹电器股份有限公司 File fragmentization processing based method for saving files

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003134106A (en) * 2001-10-22 2003-05-09 Victor Co Of Japan Ltd Encryption method, decoding method and apparatus, and information recording medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320356A (en) * 2008-07-14 2008-12-10 曹乃承 Data storage method and device
CN102902933A (en) * 2012-09-21 2013-01-30 四川长虹电器股份有限公司 File fragmentization processing based method for saving files

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《一种文件分段加密方法及应用》;刘靖等;《指挥信息系统与技术》;20100831;第1卷(第4期);第64-67页 *

Also Published As

Publication number Publication date
CN103455764A (en) 2013-12-18

Similar Documents

Publication Publication Date Title
CN103455764B (en) A kind of file encryption based on file division folding and decryption system
US11743041B2 (en) Technologies for private key recovery in distributed ledger systems
US10536445B1 (en) Discrete blockchain and blockchain communications
US11650955B2 (en) Systems and methods for distributed data storage and delivery using blockchain
US9876646B2 (en) User identification management system and method
US9946895B1 (en) Data obfuscation
CN106663175B (en) Method, computing device and computer-readable storage medium for creating documents in a collaborative manner
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
CN102609640B (en) Secure data parser method and system
CN105117635B (en) A kind of safety system and method for local data
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
CN102891876B (en) Distributed data encryption method and system under cloud computing environment
CN103748827A (en) System and method for wireless data protection
CN105960775A (en) Pneumatic ore charging
CN103455744A (en) Vein identification technology-based data security protection method and system
CN110140336A (en) Consecutive password technology
CN108075888A (en) Dynamic URL generation methods and device
CN101833625A (en) File and folder safety protection method based on dynamic password and system thereof
CN104067286A (en) Detection of invalid escrow keys
Bond Understanding Security APIs
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN112822010B (en) Removable storage medium management method based on quantum key and block chain
CN111291412B (en) Block chain-based on-chain data storage and reading method and system
CN103795547A (en) User data encryption method and device
Coles et al. Expert SQL server 2008 encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160914

Termination date: 20190827