CN103455764B - A kind of file encryption based on file division folding and decryption system - Google Patents
A kind of file encryption based on file division folding and decryption system Download PDFInfo
- Publication number
- CN103455764B CN103455764B CN201310378893.9A CN201310378893A CN103455764B CN 103455764 B CN103455764 B CN 103455764B CN 201310378893 A CN201310378893 A CN 201310378893A CN 103455764 B CN103455764 B CN 103455764B
- Authority
- CN
- China
- Prior art keywords
- file
- encryption
- security
- module
- folder
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
nullThe present invention provides a kind of file encryption based on file division folding and decryption system,Mainly preset level of security and the file matrix of each level of security corresponding of multiple different stage coefficient,Then,A file matrix is set up according to selected level of security,And the file division needing encryption is become the file fragmentation of respective amount part,Again described file fragmentation is respectively stored in set up file matrix,And one key of stochastic generation,This double secret key should link the code name of the All Files fragment of this document that need to encrypt and the store path of the file fragmentation of each code name corresponding,The most quickly and easily complete ciphering process,When needs are deciphered,If the key generated when correctly entering storage this document,All Files fragment can be searched,Then All Files fragment is integrated into a complete original,Deciphering can be rapidly completed,And for normally this document,It is highly suitable for the safety storage of vital document.
Description
Technical field
The present invention relates to a kind of information security field, particularly relate to a kind of file encryption based on file division and folding with
And decryption system.
Background technology
It is the aspect that the electronic information tide indicated has covered social life with computer, network and movable storage device
Face, has liberated the productivity greatly, speed that the information that improves is mutual and effectiveness, informationization bring easily with
Time, incident is informationalized safety problem, and this brings certain puzzlement, especially information to enterprise and is illegally abused,
Selling rival including employee by document, file is illegally stolen.
Therefore, consider based on information security, it is necessary to a kind of file encryption that can quickly and simply perform file encryption-decryption is provided
And decryption system, and then guarantee the safe handling of file.
Summary of the invention
The shortcoming of prior art in view of the above, it is an object of the invention to provide one and can quickly and simply perform file and add
The file encryption of deciphering and decryption system, and then guarantee the safe handling of file.
For achieving the above object and other relevant purposes, the present invention provide a kind of file encryption based on file division folding with
And decryption system, it is applied in a data processing platform, it is characterised in that described file encryption system includes: setting module,
It is for setting level of security and the file matrix of each level of security corresponding of multiple different stage coefficient, wherein, institute
State file matrix and include multiple root folder and the multiple sub-folders being distributed in each root folder, and described safe level
Other classification coefficient is different, and the corresponding root folder in file matrix is the most different from the quantity of sub-folder;Encryption trigger mode
Block, the file encryption request that it sends in order to respond described data processing platform, and the selection merit of described different level of security is provided
Can, when selecting the level of security of one of them, i.e. set up the file matrix of corresponding described level of security, and send an encryption
Trigger signal;File division module, it is used to receive the encryption that described encryption trigger module sent when triggering signal, according to
In the file matrix set up, the quantity of all sub-folders, becomes the file fragmentation of respective amount by the file division that need to encrypt,
And specify one code name of each file fragmentation according to file fragmentation precedence in original, and give record;And deposit
Storage module, it is in order to be respectively stored in, by the file fragmentation that described file division module is split, the literary composition that described trigger module is set up
Part folder matrix each root folder under sub-folder in, and record each code name file fragmentation store path, and
Stochastic generation one key simultaneously, and the code name of the All Files fragment of file that the link of described random key correspondence need to be encrypted and right
Answer the store path of the file fragmentation of each code name.
Wherein, described root folder is to be determined by the classification coefficient of corresponding level of security with the quantity of described sub-folder, level
Other coefficient is the highest, and corresponding described root folder is the most with the quantity of described sub-folder.The file encryption system of the present invention is to take
Connect in the system program running on this data processing platform.This data processing platform can for example, desktop computer, notebook computer,
PDA(Personal Digital Assistant) or mobile phone.
Additionally, the present invention also provides for a kind of file decryption system, it is applied in described data processing platform, it is characterised in that
Described file decryption system includes: deciphering trigger module, the file decryption request that it sends in order to respond described data processing platform,
And provide a key inputting interface, and judge whether the key inputted is that described file encryption system institute applied by the file that need to decipher
The key generated, the most then send a deciphering and trigger signal, if it is not, then prompting decoding request failure;File fine module,
It is used to receive the deciphering triggering signal that described deciphering trigger module is sent, then according to described key, the literary composition that locking need to be deciphered
The code name of the All Files fragment of part and the store path of the file fragmentation of each code name corresponding, and then search All Files
Fragment;And file synthesis module, described file fine module, in order to the code name according to each file fragmentation, is searched by it
All Files fragment carry out synthesis process, and then All Files fragment is reverted to complete original.
Wherein, during the file decryption system of the present invention is the system program that overlap joint runs on this data processing platform.And at this data
Platform can for example, desktop computer, notebook computer, personal digital assistant or mobile phone.
As it has been described above, the file encryption based on file division folding of the present invention and decryption system, mainly preset
The level of security of multiple different stage coefficients and the file matrix of each level of security corresponding, then, according to selected peace
Full rank sets up a file matrix, and the file fragmentation that the file division encrypted will be needed to become respective amount part, then by described literary composition
Part fragment is respectively stored in set up file matrix, and one key of stochastic generation, and this double secret key should link need to be encrypted
The code name of the All Files fragment of this document and the store path of the file fragmentation of each code name corresponding, the completeest
Become ciphering process, and key randomly generates, as long as user remembers this key, additionally, because of key not by making
User's sets itself, but randomly generate, key does not has certain regularity, and the probability that the person of being illegally used steals is significantly
Reduce;And, when needs are deciphered, as long as the key generated when correctly entering encryption storage this document, can search all
File fragmentation, is then integrated into a complete original by All Files fragment, can be rapidly completed deciphering, and for normally making
Use this document.
Accompanying drawing explanation
Fig. 1 is shown as the file encryption of the present invention and the block schematic diagram of decryption system.
Element numbers explanation
1 file encryption system
10 setting modules
12 encryption trigger modules
14 file division modules
16 memory modules
2 file decryption systems
20 deciphering trigger modules
22 file fine modules
24 file synthesis modules
3 data processing platforms
Detailed description of the invention
Below by way of specific instantiation, embodiments of the present invention being described, those skilled in the art can be by disclosed by this specification
Content understand other advantages and effect of the present invention easily.The present invention can also be added by the most different detailed description of the invention
To implement or application, the every details in this specification can also be based on different viewpoints and application, in the essence without departing from the present invention
Various modification or change is carried out under god.
Refer to Fig. 1, be the block schematic diagram of file encryption and the decryption system showing the present invention.The file encryption of the present invention
And decryption system is in the system program that overlap joint runs on data processing platform 3, in order to provide the quick encryption and decryption functions of file.
Wherein, this data processing platform can for example, desktop computer, notebook computer, personal digital assistant and intelligent mobile phone fill
Put etc. and there is data process function, and group is provided with input block (such as keyboard, mouse or pointer etc.) and output unit (such as liquid crystal
Display screen curtain etc.) electronic equipment.Below i.e. to the file encryption of the present invention and being described in detail of decryption system.
As it is shown in figure 1, the file encryption system based on file division folding 1 of the present invention includes setting module 10, encryption
Trigger module 12, file division module 14 and memory module 16.
Wherein, this setting module 10 is for setting the level of security of multiple different stage coefficient and each level of security corresponding
File matrix, wherein, described file matrix include multiple root folder and be distributed in each root folder multiple
Sub-folder, and the classification coefficient of described level of security is different, the corresponding root folder in file matrix and sub-folder
Quantity is the most different.Described root folder is to be determined by the classification coefficient of corresponding level of security with the quantity of described sub-folder,
Classification coefficient is the highest, and corresponding described root folder is the most with the quantity of described sub-folder.For example, classification coefficient is relatively low
File matrix corresponding to level of security can be very simple, as comprised two root folders 1,2, both of these documents underedge simultaneously
Face comprises 2 sub-folders, i.e. sub-folder 11,12 and 21,22 the most respectively;If the level of security pair that classification coefficient is the highest
The file matrix answered, then include and also comprise many height in several root folder 1,2 ..., n, and each root folder
File, such as sub-folder 1 ... 1 ..., 1 ... m;2……1、…、2……m;…;n……1、…、n……m
Etc., by that analogy.
This encryption trigger module 12 is to respond the file encryption request that described data processing platform 3 sends, and described in offer not
With the selection function of level of security, when selecting the level of security of one of them, i.e. set up the file of corresponding described level of security
Matrix, and send an encryption triggering signal.
This document segmentation module 14 is to be used to receive the encryption that described encryption trigger module 12 sent when triggering signal, according to
In the file matrix set up, the quantity of all sub-folders, becomes the file fragmentation of respective amount by the file division that need to encrypt,
And specify the corresponding code name of each file fragmentation according to file fragmentation precedence in original, and give record.
This memory module 16 is in order to the file fragmentation that described file division module 14 is split is respectively stored in described trigger mode
In sub-folder under each root folder of the file matrix that block 12 is set up, and record the file fragmentation of each code name
Store path, and simultaneously stochastic generation one key, and the All Files of the file that the link of described random key correspondence need to be encrypted is broken
The code name of sheet and the store path of the file fragmentation of each code name corresponding.Now, i.e. complete the file encryption request of user,
Quickly and simply achieve the encryption of file, and key randomly generates, as long as user remembers this key, this
Outward, because of key not by user sets itself, but randomly generating, key does not has certain rule, the person of being illegally used
The probability stolen is substantially reduced.
Additionally, when user need to use the file encrypted via above-mentioned file encryption system 1, then can be by the literary composition of the present invention
Part decryption system 2 is achieved.In more detail, as it is shown in figure 1, the file decryption system 2 of the present invention includes that deciphering triggers
Module 20, file fine module 22 and file synthesis module 24.
This deciphering trigger module 20 is to respond the file decryption request that described data processing platform 3 sends, and provides a key
Inputting interface, and judge whether the key inputted is that the memory module in above-mentioned file encryption system 1 applied by the file that need to decipher
16 keys generated, the most then send a deciphering and trigger signal, if it is not, then prompting decoding request failure, need to re-enter
New key carries out verification step again.
This document search module 22 is to be used to receive deciphering triggering signal, the then foundation that described deciphering trigger module 20 is sent
Described key, the code name of the All Files fragment of the file that locking need to be deciphered and the storage of the file fragmentation of each code name corresponding
Path, and then search All Files fragment.
This document synthesis module 24 is in order to the code name according to each file fragmentation, described file fine module 22 is searched
All Files fragment carry out synthesis process, and then All Files fragment is reverted to complete original, normal for user
Use this document.
In sum, the file encryption of the present invention and decryption system mainly preset the safe level of multiple different stage coefficient
The file matrix of each level of security other and corresponding, then, sets up a file matrix according to selected level of security,
And will need the file division of encryption to become the file fragmentation of respective amount part, more described file fragmentation is respectively stored in is set up
In file matrix, and one key of stochastic generation, this double secret key should link the generation of the All Files fragment of this document that need to encrypt
Number and the store path of file fragmentation of each code name corresponding, the most quickly and easily complete ciphering process, and key be with
Machine produces, as long as user remembers this key, additionally, because of key not by user sets itself, but at random
Producing, key does not has certain regularity, and the probability that the person of being illegally used steals is substantially reduced;And, when needs are deciphered,
As long as the key generated when correctly entering encryption storage this document, All Files fragment can be searched, then that All Files is broken
Sheet is integrated into a complete original, can be rapidly completed deciphering, and for normally this document, be highly suitable for important literary composition
The safety storage of part.
The principle of above-described embodiment only illustrative present invention and effect thereof, not for limiting the present invention.Any it is familiar with this skill
Above-described embodiment all can be modified under the spirit and the scope of the present invention or change by the personage of art.Therefore, such as
All that in art, tool usually intellectual is completed under without departing from disclosed spirit and technological thought etc.
Effect is modified or changes, and must be contained by the claim of the present invention.
Claims (7)
1. a file encryption system based on file division folding, it is applied in a data processing platform, it is characterised in that
Described file encryption system includes:
Setting module, it is for setting level of security and the literary composition of each level of security corresponding of multiple different stage coefficient
Part folder matrix, wherein, described file matrix includes multiple root folder and the many height being distributed in each root folder
File, and the classification coefficient of described level of security is different, the corresponding root folder in file matrix and sub-folder
Quantity is the most different;
Encryption trigger module, the file encryption request that it sends in order to respond described data processing platform, and described in offer not
With the selection function of level of security, when selecting the level of security of one of them, i.e. set up the file of corresponding described level of security
Folder matrix, and send an encryption triggering signal;
File division module, it is used to receive the encryption that described encryption trigger module sent when triggering signal, according to institute
In the file matrix set up, the quantity of all sub-folders, becomes the file fragmentation of respective amount by the file division that need to encrypt,
And specify one code name of each file fragmentation according to file fragmentation precedence in original, and give record;And
Memory module, it is in order to be respectively stored in described trigger module by the file fragmentation that described file division module is split
In sub-folder under each root folder of the file matrix set up, and record each code name file fragmentation
Store path, and stochastic generation one key simultaneously, and the All Files of the file that the link of described random key correspondence need to be encrypted is broken
The code name of sheet and the store path of the file fragmentation of each code name corresponding.
File encryption system based on file division folding the most according to claim 1, it is characterised in that: described file
Pressing from both sides with the quantity of described sub-folder is to be determined by the classification coefficient of corresponding level of security, and classification coefficient is the highest, corresponding
Described root folder is the most with the quantity of described sub-folder.
File encryption system based on file division folding the most according to claim 1, it is characterised in that: this document is encrypted
System is in the system program that overlap joint runs on this data processing platform.
File encryption system based on file division folding the most according to claim 1, it is characterised in that: this data processes
Platform is desktop computer, notebook computer, personal digital assistant or mobile phone.
5. coordinating a file decryption system for file encryption system described in claim 1, it is applied to described data processing platform
In, it is characterised in that described file decryption system includes:
Deciphering trigger module, the file decryption request that it sends in order to respond described data processing platform, and a key is provided
Inputting interface, and judge the key that inputted whether by the file that need to decipher apply that described file encryption system generated close
Key, the most then send a deciphering and trigger signal, if it is not, then prompting decoding request failure;
File fine module, it is used to receive the deciphering triggering signal that described deciphering trigger module is sent, then according to institute
State key, the code name of the All Files fragment of the file that locking need to be deciphered and the storage of the file fragmentation of each code name corresponding
Path, and then search All Files fragment;And
File synthesis module, described file fine module, in order to the code name according to each file fragmentation, is searched by it
All Files fragment carries out synthesis process, and then All Files fragment is reverted to complete original.
File decryption system the most according to claim 5, it is characterised in that: this document decryption system is that overlap joint runs on this data
In the system program of processing platform.
File decryption system the most according to claim 5, it is characterised in that: this data processing platform is desktop computer, notes type
Computer, personal digital assistant or mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310378893.9A CN103455764B (en) | 2013-08-27 | 2013-08-27 | A kind of file encryption based on file division folding and decryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310378893.9A CN103455764B (en) | 2013-08-27 | 2013-08-27 | A kind of file encryption based on file division folding and decryption system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103455764A CN103455764A (en) | 2013-12-18 |
CN103455764B true CN103455764B (en) | 2016-09-14 |
Family
ID=49738113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310378893.9A Expired - Fee Related CN103455764B (en) | 2013-08-27 | 2013-08-27 | A kind of file encryption based on file division folding and decryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103455764B (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10127244B2 (en) * | 2014-06-04 | 2018-11-13 | Harris Corporation | Systems and methods for dynamic data storage |
CN104615954B (en) * | 2014-06-30 | 2018-09-11 | 腾讯科技(深圳)有限公司 | Password storage method and apparatus |
CN104182697B (en) * | 2014-08-15 | 2017-07-28 | 小米科技有限责任公司 | File encrypting method and device |
CN104462885A (en) * | 2014-12-30 | 2015-03-25 | 大连楼兰科技股份有限公司 | Method for preventing original code from being acquired |
CN104732163B (en) * | 2015-04-03 | 2017-11-03 | 宁波工程学院 | A kind of folder encryption method and encryption file application method |
CN104794408B (en) * | 2015-04-27 | 2017-12-08 | 上海青橙实业有限公司 | File encrypting method and terminal system |
CN104796292B (en) * | 2015-04-27 | 2018-05-04 | 上海青橙实业有限公司 | Terminal management method and terminal system |
WO2016175334A1 (en) * | 2015-04-30 | 2016-11-03 | 真旭 徳山 | Terminal device and computer program |
CN105141428A (en) * | 2015-08-19 | 2015-12-09 | 深圳密无痕智能科技有限公司 | System and method for authentication and identification based on fuzzy fault and one-time password |
CN105260668B (en) * | 2015-10-10 | 2018-07-24 | 北京搜狗科技发展有限公司 | A kind of file encrypting method and electronic equipment |
CN105975877B (en) * | 2016-07-01 | 2019-06-21 | 中国联合网络通信有限公司重庆市分公司 | A kind of sensitive document secure storage method |
CN106709366A (en) * | 2016-12-05 | 2017-05-24 | 国云科技股份有限公司 | Method for improving data security based on object storage |
CN107070656B (en) * | 2017-03-31 | 2020-02-07 | 武汉斗鱼网络科技有限公司 | Method and system for encrypting and decrypting so file in application program |
CN107679405A (en) * | 2017-08-25 | 2018-02-09 | 芜湖市振华戎科智能科技有限公司 | Secret unit file encryption transmission system |
CN107579985B (en) * | 2017-09-19 | 2020-04-28 | 杭州安恒信息技术股份有限公司 | Large file transmission protection method based on fragment encryption |
CN109933994B (en) * | 2017-12-18 | 2024-03-29 | 北京三快在线科技有限公司 | Data hierarchical storage method and device and computing equipment |
CN109936546B (en) * | 2017-12-18 | 2021-01-26 | 北京三快在线科技有限公司 | Data encryption storage method and device and computing equipment |
US11321471B2 (en) | 2017-12-18 | 2022-05-03 | Beijing Sankuai Online Technology Co., Ltd | Encrypted storage of data |
CN108959941A (en) * | 2018-06-21 | 2018-12-07 | Oppo(重庆)智能科技有限公司 | Data ciphering method, device and electronic device |
CN110245502A (en) * | 2019-05-16 | 2019-09-17 | 深圳市百思智能科技有限公司 | A kind of robot wireless transmission information encryption method |
CN110795702A (en) * | 2019-10-12 | 2020-02-14 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, equipment and medium |
CN111917720A (en) * | 2020-06-28 | 2020-11-10 | 中科物缘科技(杭州)有限公司 | File fragmentization encryption storage method, file fragmentization encryption acquisition method and file fragmentization encryption storage system based on block chain |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101320356A (en) * | 2008-07-14 | 2008-12-10 | 曹乃承 | Data storage method and device |
CN102902933A (en) * | 2012-09-21 | 2013-01-30 | 四川长虹电器股份有限公司 | File fragmentization processing based method for saving files |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003134106A (en) * | 2001-10-22 | 2003-05-09 | Victor Co Of Japan Ltd | Encryption method, decoding method and apparatus, and information recording medium |
-
2013
- 2013-08-27 CN CN201310378893.9A patent/CN103455764B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101320356A (en) * | 2008-07-14 | 2008-12-10 | 曹乃承 | Data storage method and device |
CN102902933A (en) * | 2012-09-21 | 2013-01-30 | 四川长虹电器股份有限公司 | File fragmentization processing based method for saving files |
Non-Patent Citations (1)
Title |
---|
《一种文件分段加密方法及应用》;刘靖等;《指挥信息系统与技术》;20100831;第1卷(第4期);第64-67页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103455764A (en) | 2013-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103455764B (en) | A kind of file encryption based on file division folding and decryption system | |
US11743041B2 (en) | Technologies for private key recovery in distributed ledger systems | |
US10536445B1 (en) | Discrete blockchain and blockchain communications | |
US11650955B2 (en) | Systems and methods for distributed data storage and delivery using blockchain | |
US9876646B2 (en) | User identification management system and method | |
US9946895B1 (en) | Data obfuscation | |
CN106663175B (en) | Method, computing device and computer-readable storage medium for creating documents in a collaborative manner | |
US20170277774A1 (en) | Systems and methods for secure storage of user information in a user profile | |
CN102609640B (en) | Secure data parser method and system | |
CN105117635B (en) | A kind of safety system and method for local data | |
CN111314069B (en) | Block chain-based shaking system and method, electronic device and storage medium | |
CN102891876B (en) | Distributed data encryption method and system under cloud computing environment | |
CN103748827A (en) | System and method for wireless data protection | |
CN105960775A (en) | Pneumatic ore charging | |
CN103455744A (en) | Vein identification technology-based data security protection method and system | |
CN110140336A (en) | Consecutive password technology | |
CN108075888A (en) | Dynamic URL generation methods and device | |
CN101833625A (en) | File and folder safety protection method based on dynamic password and system thereof | |
CN104067286A (en) | Detection of invalid escrow keys | |
Bond | Understanding Security APIs | |
Park et al. | A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system | |
CN112822010B (en) | Removable storage medium management method based on quantum key and block chain | |
CN111291412B (en) | Block chain-based on-chain data storage and reading method and system | |
CN103795547A (en) | User data encryption method and device | |
Coles et al. | Expert SQL server 2008 encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160914 Termination date: 20190827 |