CN103902921A - File encryption method and system - Google Patents

File encryption method and system Download PDF

Info

Publication number
CN103902921A
CN103902921A CN201210588521.4A CN201210588521A CN103902921A CN 103902921 A CN103902921 A CN 103902921A CN 201210588521 A CN201210588521 A CN 201210588521A CN 103902921 A CN103902921 A CN 103902921A
Authority
CN
China
Prior art keywords
password
data line
file
operation result
usb data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210588521.4A
Other languages
Chinese (zh)
Inventor
代成平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Futaihong Precision Industry Co Ltd
Chi Mei Communication Systems Inc
Original Assignee
Shenzhen Futaihong Precision Industry Co Ltd
Chi Mei Communication Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Futaihong Precision Industry Co Ltd, Chi Mei Communication Systems Inc filed Critical Shenzhen Futaihong Precision Industry Co Ltd
Priority to CN201210588521.4A priority Critical patent/CN103902921A/en
Publication of CN103902921A publication Critical patent/CN103902921A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a file encryption method and system. The system comprises a prompting module, a password authentication module and an opening module. The prompting module is used for prompting a user to insert a USB data line into a mobile electronic device when a file in the mobile electronic device is accessed, and a memorizer of the USB data line stores a random number and a first operation result according to the random number. The password authentication module is used for prompting the user to input a password when the USB data line is inserted into the mobile electronic device, receiving the password input by the user, carrying out crossover operation on the password input by the user and the random number to obtain a second operation result and obtaining the first operation result from the memorizer of the USB data line. The opening module is used for opening the file when the first operation result and the second operation result are the same. According to the file encryption method and system, the file in the mobile electronic device is protected in an external hardware encryption mode.

Description

File encrypting method and system
Technical field
The present invention relates to a kind of file encrypting method and system.
Background technology
The software enciphering method of existing electronic apparatus (as mobile phone) file is difficult to guarantee the safety of file, once this electronic apparatus is lost, secret file in electronic apparatus just likely leaks, and this becomes puzzlement electronic apparatus user's a major issue.
Summary of the invention
In view of above content, be necessary to provide a kind of file encrypting method and system.
Described file encrypting method comprises: in the time that a file in electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting; In the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input;
Password and the above-mentioned random number of user's input are carried out to crossing operation, draw the second operation result, and obtain the first operation result from the storer of usb data line; When the first operation result when consistent, is opened this file with the second operation result.
Described file encryption system comprises: reminding module, for in the time that a file of electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting;
Password authentication module, in the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input; Described password authentication module, also, for password and the above-mentioned random number of user's input are carried out to crossing operation, draws the second operation result, and obtain the first operation result from the storer of usb data line; Opening module, for when consistent, opening this file with the second operation result when the first operation result.
The present invention protects the file on electronic apparatus by the mode of external hardware encipher.
Accompanying drawing explanation
Fig. 1 is the running environment figure of the preferred embodiments of file encryption system of the present invention.
Fig. 2 is the functional block diagram of the preferred embodiments of file encryption system of the present invention.
Fig. 3 is the process flow diagram of the preferred embodiments of file encrypting method of the present invention.
Main element symbol description
Electronic apparatus 1
Usb data line 2
File encryption system 10
First memory 12
Processor 14
Second memory 20
Reminding module 100
Password arranges module 102
Password authentication module 104
Opening module 106
Following embodiment further illustrates the present invention in connection with above-mentioned accompanying drawing.
Embodiment
As shown in Figure 1, be the running environment figure of the preferred embodiments of file encryption system of the present invention.This file encryption system 10 operates on electronic apparatus 1.This electronic apparatus 1 is supported OTG (On-The-Go) technology, and described OTG technology, in the situation that there is no main frame, realizes the data transmission from equipment room.For example digital camera is directly connected on printer by OTG technology, by the photo printing of taking out.
Described electronic apparatus 1 further comprises first memory 12, processor 14.And in the time of the file that will access on electronic apparatus 1, usb data line 2 is inserted in prompting.
Described usb data line 2 further comprises second memory 20, this second memory 20 is for storing the first operation result, and described the first operation result is the operation result that on the access electronic apparatus 1 that arranges of user, the password of file and the random number crossing operation of generation obtain.This second memory 20 can embed the plug position that is installed on usb data line 2.
Described first memory 12 is for data such as the source program codes of storage file encryption system 10.
In the present embodiment, described file encryption system 10 can be divided into one or more modules, described one or more module is stored in the first memory 12 of described electronic apparatus 1 and is configured to and carried out by one or more processors (the present embodiment is a processor 14), to complete the present invention.For example, consult shown in Fig. 2, described file encryption system 10 is divided into reminding module 100, and password arranges module 102, password authentication module 104 and opening module 106.The alleged module of the present invention has been the program segment of a specific function, is more suitable in describing the implementation of software in electronic apparatus 1, the description of consulting Fig. 3 about the function of each module than program.
As shown in Figure 3, be the process flow diagram of the preferred embodiment of file encrypting method of the present invention.
Step S10, when access first on electronic apparatus 1 a file time, usb data lines 2 are inserted in reminding module 100 prompting.
Step S11, in the time that usb data line 2 inserts electronic apparatus 1, password arranges module 102 and points out user that new password is set, and receives the new password that user arranges.In present embodiment, password arranges module 102 and points out user to input new password in the mode that ejects password window is set, and receives the new password that user arranges, and described new password can be the user-defined passwords such as the numeral of six or numeral and alphabetical combination.
Step S12, password arranges module 102 and generates a random number, and new password and this random number of above-mentioned user's setting are carried out to crossing operation, draws the first operation result.In present embodiment, described crossing operation can be XOR.
Step S13, password arranges module 102 random number of the first operation result and above-mentioned generation is kept in the second memory 20 of usb data line 2, and takes out usb data line 2.
Step S14, in the time again accessing above-mentioned file, usb data line 2 is inserted in reminding module 100 promptings.
Step S15, in the time that usb data line 2 inserts electronic apparatus 1, password authentication module 104 points out user to input password, and receives the password of user's input.In present embodiment, password authentication module 104 can eject the mode of password authentification window and point out user to input password, and receives the password of user's input.
Step S16, the password of user's input and the random number of above-mentioned generation are carried out above-mentioned crossing operation by password authentication module 104, draws the second operation result.
Step S17, password authentication module 104 is obtained the first operation result from second memory 20.
Step S18, password authentication module 104 judges that whether the first operation result is consistent with the second operation result, if consistent, enter step S19, otherwise returns to step S15.
Step S19, opening module 106 is opened this file.
Described step S10 to S19 protects the file on electronic apparatus 1 by the mode of external hardware encipher.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although the present invention is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not depart from the spirit and scope of technical solution of the present invention.

Claims (10)

1. a file encrypting method, is characterized in that, the method comprises:
In the time that a file in electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting;
In the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input;
Password and the above-mentioned random number of user's input are carried out to crossing operation, draw the second operation result, and obtain the first operation result from the storer of usb data line;
When the first operation result when consistent, is opened this file with the second operation result.
2. file encrypting method according to claim 1, is characterized in that, the method also comprises the step that the first operation result is set, and this step comprises:
In the time that this file is accessed first, usb data line is inserted in prompting;
In the time that usb data line inserts this electronic apparatus, prompting user arranges new password, and receives the new password that user arranges;
Generate a random number, and above-mentioned new password and this random number are carried out to crossing operation, draw the first operation result;
The random number of the first operation result and described generation is kept in the storer of usb data line.
3. file encrypting method according to claim 2, is characterized in that, in the time that usb data line inserts electronic apparatus, the mode that window is set to eject password points out user to input new password, and receives the new password that user arranges.
4. file encrypting method according to claim 2, is characterized in that, described new password is numeral or the digital and alphabetical combination of six.
5. file encrypting method according to claim 1 and 2, is characterized in that, described crossing operation is XOR.
6. a file encryption system, is characterized in that, this system comprises: (corresponding modification)
Reminding module, in the time that a file of electronic apparatus is accessed, usb data line, the first operation result of preserving a random number in the storer of this usb data line and calculating according to this random number are inserted in prompting;
Password authentication module, in the time that usb data line inserts this electronic apparatus, prompting user inputs password, and receives the password of user's input;
Described password authentication module, also, for password and the above-mentioned random number of user's input are carried out to crossing operation, draws the second operation result, and obtain the first operation result from the storer of usb data line;
Opening module, for when consistent, opening this file with the second operation result when the first operation result.
7. file encryption system according to claim 1, is characterized in that, this system also comprises:
Password arranges module, and in the time that this file is accessed first and when usb data line is inserted into, prompting user arranges new password, and receives the new password that user arranges;
Described password arranges module, also for generating a random number, and above-mentioned new password and this random number is carried out to crossing operation, draws the first operation result;
Described password arranges module, also for the random number of the first operation result and described generation being kept to the storer of usb data line.
8. file encryption system according to claim 6, is characterized in that, described password arranges module in the time that usb data line is inserted into, and the mode that window is set to eject password points out user to input new password, and receives the new password that user arranges.
9. file encryption system according to claim 6, is characterized in that, described new password is numeral or the digital and alphabetical combination of six.
10. according to the file encryption system described in claim 6 or 7, it is characterized in that, described crossing operation is XOR.
CN201210588521.4A 2012-12-29 2012-12-29 File encryption method and system Pending CN103902921A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210588521.4A CN103902921A (en) 2012-12-29 2012-12-29 File encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210588521.4A CN103902921A (en) 2012-12-29 2012-12-29 File encryption method and system

Publications (1)

Publication Number Publication Date
CN103902921A true CN103902921A (en) 2014-07-02

Family

ID=50994234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210588521.4A Pending CN103902921A (en) 2012-12-29 2012-12-29 File encryption method and system

Country Status (1)

Country Link
CN (1) CN103902921A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426774A (en) * 2015-11-03 2016-03-23 王爱华 USB apparatus and realization method for smart phone data information encryption/decryption
CN108401068A (en) * 2018-02-08 2018-08-14 西安易朴通讯技术有限公司 Data line, data processing method and electronic equipment
CN111428232A (en) * 2020-03-17 2020-07-17 德施曼机电(中国)有限公司 Password processing method and device for encrypted input and intelligent lock

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426774A (en) * 2015-11-03 2016-03-23 王爱华 USB apparatus and realization method for smart phone data information encryption/decryption
CN108401068A (en) * 2018-02-08 2018-08-14 西安易朴通讯技术有限公司 Data line, data processing method and electronic equipment
CN111428232A (en) * 2020-03-17 2020-07-17 德施曼机电(中国)有限公司 Password processing method and device for encrypted input and intelligent lock

Similar Documents

Publication Publication Date Title
CN110324143B (en) Data transmission method, electronic device and storage medium
CN108345806B (en) Hardware encryption card and encryption method
US9118662B2 (en) Method and system for distributed off-line logon using one-time passwords
US10659226B2 (en) Data encryption method, decryption method, apparatus, and system
US11134377B2 (en) Encrypting/decrypting data on mobile terminal
CN110100422B (en) Data writing method and device based on block chain intelligent contract and storage medium
US20160117262A1 (en) Hybrid Cryptographic Key Derivation
US20130185569A1 (en) Data protection system and method based on cloud storage
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN103684786A (en) Method and system for storing digital certificate and binding digital certificate to hardware carrier
CN104615929A (en) Security key device for secure cloud services, and system and method of providing security cloud services
CN102163267A (en) Solid state disk as well as method and device for secure access control thereof
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
US20200044838A1 (en) Data encryption method and system using device authentication key
CN111628863B (en) Data signature method and device, electronic equipment and storage medium
CN106790243A (en) A kind of password remapping method of safe U disc
CN103902921A (en) File encryption method and system
US20120243678A1 (en) Data protection using distributed security key
CN105574429A (en) File data encryption and decryption method and device and terminal
CN103873245B (en) Dummy machine system data ciphering method and equipment
US9270649B1 (en) Secure software authenticator data transfer between processing devices
US9203607B2 (en) Keyless challenge and response system
CN109543367B (en) Quantum encryption-based software authorization method and device and storage medium
CN106209381A (en) A kind of photo encipher-decipher method and system thereof
CN202217265U (en) Encryption storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140702