CN103902921A - File encryption method and system - Google Patents
File encryption method and system Download PDFInfo
- Publication number
- CN103902921A CN103902921A CN201210588521.4A CN201210588521A CN103902921A CN 103902921 A CN103902921 A CN 103902921A CN 201210588521 A CN201210588521 A CN 201210588521A CN 103902921 A CN103902921 A CN 103902921A
- Authority
- CN
- China
- Prior art keywords
- password
- data line
- file
- operation result
- usb data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a file encryption method and system. The system comprises a prompting module, a password authentication module and an opening module. The prompting module is used for prompting a user to insert a USB data line into a mobile electronic device when a file in the mobile electronic device is accessed, and a memorizer of the USB data line stores a random number and a first operation result according to the random number. The password authentication module is used for prompting the user to input a password when the USB data line is inserted into the mobile electronic device, receiving the password input by the user, carrying out crossover operation on the password input by the user and the random number to obtain a second operation result and obtaining the first operation result from the memorizer of the USB data line. The opening module is used for opening the file when the first operation result and the second operation result are the same. According to the file encryption method and system, the file in the mobile electronic device is protected in an external hardware encryption mode.
Description
Technical field
The present invention relates to a kind of file encrypting method and system.
Background technology
The software enciphering method of existing electronic apparatus (as mobile phone) file is difficult to guarantee the safety of file, once this electronic apparatus is lost, secret file in electronic apparatus just likely leaks, and this becomes puzzlement electronic apparatus user's a major issue.
Summary of the invention
In view of above content, be necessary to provide a kind of file encrypting method and system.
Described file encrypting method comprises: in the time that a file in electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting; In the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input;
Password and the above-mentioned random number of user's input are carried out to crossing operation, draw the second operation result, and obtain the first operation result from the storer of usb data line; When the first operation result when consistent, is opened this file with the second operation result.
Described file encryption system comprises: reminding module, for in the time that a file of electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting;
Password authentication module, in the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input; Described password authentication module, also, for password and the above-mentioned random number of user's input are carried out to crossing operation, draws the second operation result, and obtain the first operation result from the storer of usb data line; Opening module, for when consistent, opening this file with the second operation result when the first operation result.
The present invention protects the file on electronic apparatus by the mode of external hardware encipher.
Accompanying drawing explanation
Fig. 1 is the running environment figure of the preferred embodiments of file encryption system of the present invention.
Fig. 2 is the functional block diagram of the preferred embodiments of file encryption system of the present invention.
Fig. 3 is the process flow diagram of the preferred embodiments of file encrypting method of the present invention.
Main element symbol description
|
1 |
|
2 |
|
10 |
|
12 |
|
14 |
|
20 |
|
100 |
|
102 |
|
104 |
|
106 |
Following embodiment further illustrates the present invention in connection with above-mentioned accompanying drawing.
Embodiment
As shown in Figure 1, be the running environment figure of the preferred embodiments of file encryption system of the present invention.This file encryption system 10 operates on electronic apparatus 1.This electronic apparatus 1 is supported OTG (On-The-Go) technology, and described OTG technology, in the situation that there is no main frame, realizes the data transmission from equipment room.For example digital camera is directly connected on printer by OTG technology, by the photo printing of taking out.
Described electronic apparatus 1 further comprises first memory 12, processor 14.And in the time of the file that will access on electronic apparatus 1, usb data line 2 is inserted in prompting.
Described usb data line 2 further comprises second memory 20, this second memory 20 is for storing the first operation result, and described the first operation result is the operation result that on the access electronic apparatus 1 that arranges of user, the password of file and the random number crossing operation of generation obtain.This second memory 20 can embed the plug position that is installed on usb data line 2.
Described first memory 12 is for data such as the source program codes of storage file encryption system 10.
In the present embodiment, described file encryption system 10 can be divided into one or more modules, described one or more module is stored in the first memory 12 of described electronic apparatus 1 and is configured to and carried out by one or more processors (the present embodiment is a processor 14), to complete the present invention.For example, consult shown in Fig. 2, described file encryption system 10 is divided into reminding module 100, and password arranges module 102, password authentication module 104 and opening module 106.The alleged module of the present invention has been the program segment of a specific function, is more suitable in describing the implementation of software in electronic apparatus 1, the description of consulting Fig. 3 about the function of each module than program.
As shown in Figure 3, be the process flow diagram of the preferred embodiment of file encrypting method of the present invention.
Step S10, when access first on electronic apparatus 1 a file time, usb data lines 2 are inserted in reminding module 100 prompting.
Step S11, in the time that usb data line 2 inserts electronic apparatus 1, password arranges module 102 and points out user that new password is set, and receives the new password that user arranges.In present embodiment, password arranges module 102 and points out user to input new password in the mode that ejects password window is set, and receives the new password that user arranges, and described new password can be the user-defined passwords such as the numeral of six or numeral and alphabetical combination.
Step S12, password arranges module 102 and generates a random number, and new password and this random number of above-mentioned user's setting are carried out to crossing operation, draws the first operation result.In present embodiment, described crossing operation can be XOR.
Step S13, password arranges module 102 random number of the first operation result and above-mentioned generation is kept in the second memory 20 of usb data line 2, and takes out usb data line 2.
Step S14, in the time again accessing above-mentioned file, usb data line 2 is inserted in reminding module 100 promptings.
Step S15, in the time that usb data line 2 inserts electronic apparatus 1, password authentication module 104 points out user to input password, and receives the password of user's input.In present embodiment, password authentication module 104 can eject the mode of password authentification window and point out user to input password, and receives the password of user's input.
Step S16, the password of user's input and the random number of above-mentioned generation are carried out above-mentioned crossing operation by password authentication module 104, draws the second operation result.
Step S17, password authentication module 104 is obtained the first operation result from second memory 20.
Step S18, password authentication module 104 judges that whether the first operation result is consistent with the second operation result, if consistent, enter step S19, otherwise returns to step S15.
Step S19, opening module 106 is opened this file.
Described step S10 to S19 protects the file on electronic apparatus 1 by the mode of external hardware encipher.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although the present invention is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not depart from the spirit and scope of technical solution of the present invention.
Claims (10)
1. a file encrypting method, is characterized in that, the method comprises:
In the time that a file in electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting;
In the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input;
Password and the above-mentioned random number of user's input are carried out to crossing operation, draw the second operation result, and obtain the first operation result from the storer of usb data line;
When the first operation result when consistent, is opened this file with the second operation result.
2. file encrypting method according to claim 1, is characterized in that, the method also comprises the step that the first operation result is set, and this step comprises:
In the time that this file is accessed first, usb data line is inserted in prompting;
In the time that usb data line inserts this electronic apparatus, prompting user arranges new password, and receives the new password that user arranges;
Generate a random number, and above-mentioned new password and this random number are carried out to crossing operation, draw the first operation result;
The random number of the first operation result and described generation is kept in the storer of usb data line.
3. file encrypting method according to claim 2, is characterized in that, in the time that usb data line inserts electronic apparatus, the mode that window is set to eject password points out user to input new password, and receives the new password that user arranges.
4. file encrypting method according to claim 2, is characterized in that, described new password is numeral or the digital and alphabetical combination of six.
5. file encrypting method according to claim 1 and 2, is characterized in that, described crossing operation is XOR.
6. a file encryption system, is characterized in that, this system comprises: (corresponding modification)
Reminding module, in the time that a file of electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting;
Password authentication module, in the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input;
Described password authentication module, also, for password and the above-mentioned random number of user's input are carried out to crossing operation, draws the second operation result, and obtain the first operation result from the storer of usb data line;
Opening module, for when consistent, opening this file with the second operation result when the first operation result.
7. file encryption system according to claim 1, is characterized in that, this system also comprises:
Password arranges module, and in the time that this file is accessed first and when usb data line is inserted into, prompting user arranges new password, and receives the new password that user arranges;
Described password arranges module, also for generating a random number, and above-mentioned new password and this random number is carried out to crossing operation, draws the first operation result;
Described password arranges module, also for the random number of the first operation result and described generation being kept to the storer of usb data line.
8. file encryption system according to claim 6, is characterized in that, described password arranges module in the time that usb data line is inserted into, and the mode that window is set to eject password points out user to input new password, and receives the new password that user arranges.
9. file encryption system according to claim 6, is characterized in that, described new password is numeral or the digital and alphabetical combination of six.
10. according to the file encryption system described in claim 6 or 7, it is characterized in that, described crossing operation is XOR.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210588521.4A CN103902921A (en) | 2012-12-29 | 2012-12-29 | File encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210588521.4A CN103902921A (en) | 2012-12-29 | 2012-12-29 | File encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103902921A true CN103902921A (en) | 2014-07-02 |
Family
ID=50994234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210588521.4A Pending CN103902921A (en) | 2012-12-29 | 2012-12-29 | File encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103902921A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426774A (en) * | 2015-11-03 | 2016-03-23 | 王爱华 | USB apparatus and realization method for smart phone data information encryption/decryption |
CN108401068A (en) * | 2018-02-08 | 2018-08-14 | 西安易朴通讯技术有限公司 | Data line, data processing method and electronic equipment |
CN111428232A (en) * | 2020-03-17 | 2020-07-17 | 德施曼机电(中国)有限公司 | Password processing method and device for encrypted input and intelligent lock |
-
2012
- 2012-12-29 CN CN201210588521.4A patent/CN103902921A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426774A (en) * | 2015-11-03 | 2016-03-23 | 王爱华 | USB apparatus and realization method for smart phone data information encryption/decryption |
CN108401068A (en) * | 2018-02-08 | 2018-08-14 | 西安易朴通讯技术有限公司 | Data line, data processing method and electronic equipment |
CN111428232A (en) * | 2020-03-17 | 2020-07-17 | 德施曼机电(中国)有限公司 | Password processing method and device for encrypted input and intelligent lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110324143B (en) | Data transmission method, electronic device and storage medium | |
CN108345806B (en) | Hardware encryption card and encryption method | |
US9118662B2 (en) | Method and system for distributed off-line logon using one-time passwords | |
US10659226B2 (en) | Data encryption method, decryption method, apparatus, and system | |
US11134377B2 (en) | Encrypting/decrypting data on mobile terminal | |
CN110100422B (en) | Data writing method and device based on block chain intelligent contract and storage medium | |
US20160117262A1 (en) | Hybrid Cryptographic Key Derivation | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN103684786A (en) | Method and system for storing digital certificate and binding digital certificate to hardware carrier | |
CN104615929A (en) | Security key device for secure cloud services, and system and method of providing security cloud services | |
CN102163267A (en) | Solid state disk as well as method and device for secure access control thereof | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
US20200044838A1 (en) | Data encryption method and system using device authentication key | |
CN111628863B (en) | Data signature method and device, electronic equipment and storage medium | |
CN106790243A (en) | A kind of password remapping method of safe U disc | |
CN103902921A (en) | File encryption method and system | |
US20120243678A1 (en) | Data protection using distributed security key | |
CN105574429A (en) | File data encryption and decryption method and device and terminal | |
CN103873245B (en) | Dummy machine system data ciphering method and equipment | |
US9270649B1 (en) | Secure software authenticator data transfer between processing devices | |
US9203607B2 (en) | Keyless challenge and response system | |
CN109543367B (en) | Quantum encryption-based software authorization method and device and storage medium | |
CN106209381A (en) | A kind of photo encipher-decipher method and system thereof | |
CN202217265U (en) | Encryption storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140702 |