CN104615944A - Method and device for encrypting and decrypting files - Google Patents

Method and device for encrypting and decrypting files Download PDF

Info

Publication number
CN104615944A
CN104615944A CN201510013301.2A CN201510013301A CN104615944A CN 104615944 A CN104615944 A CN 104615944A CN 201510013301 A CN201510013301 A CN 201510013301A CN 104615944 A CN104615944 A CN 104615944A
Authority
CN
China
Prior art keywords
file
encrypted
character string
encrypt
encrypt file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510013301.2A
Other languages
Chinese (zh)
Inventor
张新亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TVM Beijing Technology Co Ltd
Original Assignee
TVM Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TVM Beijing Technology Co Ltd filed Critical TVM Beijing Technology Co Ltd
Priority to CN201510013301.2A priority Critical patent/CN104615944A/en
Publication of CN104615944A publication Critical patent/CN104615944A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method and device for encrypting and decrypting files. The method for encrypting the files comprises the steps that according to a first preset encryption algorithm, a sequence number of a TF card with the to-be-encrypted files stored is encrypted to generate a first character string; according to a second preset encryption algorithm, bytes, at the first preset positions of the to-be-coded files, of the preset number are encrypted, and first encrypted files are generated through the to-be-encrypted files; according to a preset synthesis mode, the first character string and the first encrypted files are combined to form second encrypted files. The method for encrypting the files through hardware is provided, that is, the TF card is utilized for encrypting the files, the files are stored in the TF card after being encrypted, due to the fact that file encryption is involved in the TF card for storing the files, the files taken out of the TF card cannot be opened, safety of the files is improved, and the effect on protecting the file version is achieved.

Description

The method and apparatus of a kind of encrypt file and declassified document
Technical field
The present invention relates to technical field of data processing, more specifically, relates to the method and apparatus of a kind of encrypt file and declassified document.
Background technology
At present, people use electronic equipment to process routine work and record life more and more, and some of them file is private data or the classified papers of user, needs to be protected.
The method of conventional protected file is encrypted file, and such as, arranging password to file is the most frequently used technological means.
But, this technological means utilizing password to be encrypted need user to remember password could be deciphered, and, now the decoding of password is also easily operated, after being easy to be got this file by other people, password is decoded.Therefore, need a kind of method of encrypt file, can protected file better.
Summary of the invention
In view of this, the object of the embodiment of the present invention is the method and apparatus proposing a kind of encrypt file and declassified document, and it can protected file better.
In order to achieve the above object, the embodiment of the present invention proposes a kind of method of encrypt file, comprising:
According to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string;
According to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted, being the first encrypt file by described file generated to be encrypted;
According to default synthesis mode, described first character string and described first encrypt file are synthesized the second encrypt file.
In an embodiment of the present invention, described according to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string, comprises:
According to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
In an embodiment of the present invention, described according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted, comprises:
According to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
In an embodiment of the present invention, described basis presets synthesis mode, described first character string and described first encrypt file is synthesized the second encrypt file, comprising:
By the foremost of described first encrypt file of described first character string write to synthesize the second encrypt file.
The embodiment of the present invention also proposes a kind of method of declassified document, comprises the following steps:
According to default synthesis mode, obtain the first character string in file to be decrypted and the first encrypt file;
According to the first predetermined encryption algorithm, the sequence number of the TF card storing described file to be decrypted is encrypted generation second character string;
Judge that whether described first character string is consistent with described second character string;
When described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
The embodiment of the present invention also proposes a kind of device of encrypt file, comprising:
First encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted;
Second encrypting module, for according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted;
Synthesis module, for according to presetting synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
In an embodiment of the present invention, described first encrypting module also for, according to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
In an embodiment of the present invention, described second encrypting module also for, according to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
In an embodiment of the present invention, described synthesis module also for, by described first character string write described first encrypt file foremost to synthesize the second encrypt file.
The embodiment of the present invention also proposes a kind of device of declassified document, comprising:
Acquisition module, for according to presetting synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file;
3rd encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted;
Judge module, for judging that whether described first character string is consistent with described second character string;
Deciphering module, for when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
The technical scheme that the embodiment of the present invention provides can comprise following beneficial effect:
Provide a kind of hardware that utilizes to the method for file encryption, namely utilize TF card to file encryption, after encryption, this file leaves in this TF card, can read this TF card just can open by the specific client (can perform corresponding decipherment algorithm) in such as android equipment.Encryption due to file relates to the TF card of storing documents, and therefore, the file taken away from TF card all cannot be opened (such as, video file cannot be play), improve the security of file, also play the effect of protected file copyright.
The further feature of the embodiment of the present invention and advantage will be set forth in the following description, and, partly become apparent from instructions, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in write instructions, claims and accompanying drawing and obtain.
Below by drawings and Examples, the technical scheme of the embodiment of the present invention is described in further detail.
Accompanying drawing explanation
Accompanying drawing is used to provide the further understanding to the embodiment of the present invention, and forms a part for instructions, together with embodiments of the present invention for explaining the present invention, does not form the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of the method for encrypt file in one embodiment of the invention.
Fig. 2 is the process flow diagram of the method for encrypt file in one embodiment of the invention.
Fig. 3 is the process flow diagram of the method for declassified document in one embodiment of the invention.
Fig. 4 is the process flow diagram of the method for declassified document in one embodiment of the invention.
Fig. 5 is the structural representation of the device of encrypt file in one embodiment of the invention.
Fig. 6 is the structural representation of the device of declassified document in one embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the embodiment of the present invention, is not intended to limit the present invention embodiment.
Be illustrated in figure 1 the process flow diagram of the method for the encrypt file in the embodiment of the present invention, the method comprises:
Step S11: according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted.
TF card (Trans-flash Card), be otherwise known as Micro SD card, is a kind of superfine little flash memory cards.Often open the sequence number that TF card has oneself.
File to be encrypted can be such as video file, audio file, text, image file etc.
Step S12: according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted.
Step S13: according to default synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
In the embodiment of the present invention, provide a kind of hardware that utilizes to the method for file encryption, namely utilize TF card to file encryption, after encryption, this file leaves in this TF card, can read this TF card just can open by the specific client (can perform corresponding decipherment algorithm) in such as android equipment.Encryption due to file relates to the TF card of storing documents, and therefore, the file taken away from TF card all cannot be opened (such as, video file cannot be play), improve the security of file, also play the effect of protected file copyright.
Be illustrated in figure 2 the process flow diagram of the method for corresponding a kind of declassified document, the method for this declassified document comprises the following steps:
Step S21: according to default synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file.
Step S22: according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted.
Step S23: judge that whether described first character string is consistent with described second character string.
Step S24: when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
In the method for this declassified document, need the sequence number of the TF card of storing documents and corresponding decryption method Sum fanction ability declassified document.Only take file away from TF card, cannot open file, thus improve the security of file, also play the effect of protected file copyright.
Be illustrated in figure 3 another embodiment of the method for the encrypt file proposed in the embodiment of the present invention, in this embodiment, can in advance file to be encrypted be left in TF card, TF card is put into terminal (such as mobile phone), performed the method for this encrypt file by mobile phone (or the application program in mobile phone).This embodiment comprises the following steps:
Step S31: read to deposit and need the sequence number of TF card of encrypt file.
Step S32: according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of reading.
First predetermined encryption algorithm is such as BASE64 cryptographic algorithm.
Step S33: front 50 bytes reading the file to be encrypted in this TF card.
In this embodiment, reading is front 50 bytes of file to be encrypted.In other embodiments of the invention, the byte of the predetermined number of the predeterminated position of file to be encrypted can be read.Such as, the 101 to 200 byte of file to be encrypted can be read.
50 bytes read are encrypted by step S34: according to the second predetermined encryption algorithm.
Second predetermined encryption algorithm is such as affine cipher algorithm.
Step S35: the ciphertext after encryption in step S34 is replaced front 50 bytes of file to be encrypted, being the first encrypt file by file generated to be encrypted.
When being the first encrypt file by file generated to be encrypted, be with encryption after ciphertext replace original byte in file to be encrypted, therefore, obviously, the byte number after the byte of reading being encrypted should be equal with the quantity of the byte read.
Step S36: the foremost the first character string being write the first encrypt file, forms the second encrypt file.
In other embodiments of the invention, the first character string and the first encrypt file are synthesized the second encrypt file and can also adopt other synthesis modes, such as but not limited to:
It should be noted that the first predetermined encryption algorithm in the embodiment of the present invention and the second predetermined encryption algorithm are not limited to BASE64 cryptographic algorithm for example and affine cipher algorithm, other any cryptographic algorithm that can be suitable for can use.
In this TF card file to be encrypted encrypted after be called the second encrypt file, the structure of the second encrypt file is: the remaining data of front 50 bytes+file to be encrypted of the file to be encrypted of the TF card sequence number+encryption of encryption.
Correspond to the method for encrypt file as shown in Figure 3, Fig. 4 shows another embodiment of the method for the declassified document proposed in the embodiment of the present invention, in this embodiment, file to be decrypted leaves in TF card, TF card is put into terminal (such as mobile phone), performed the method for declassified document by mobile phone (or the application program in mobile phone).This embodiment comprises the following steps:
Step S41: read to deposit and need the sequence number of TF card of declassified document.
Step S42: according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of reading.
Step S43: the first character string obtaining foremost in file to be decrypted, and the first encrypt file of removing the first character string.
Step S44: judge that whether the first character string is consistent with the second character string, if so, performs step S45, if not, then terminates.
Step S45: front 50 bytes reading the first encrypt file.
50 bytes read are decrypted by step S46: according to the second predetermined encryption algorithm.
Step S47: remaining file data in the data after deciphering and the first encrypt file is stitched together, the first encrypt file is generated as the file deciphered.
Now, file to be decrypted is decrypted.
As shown in Figure 5, the embodiment of the present invention also proposes a kind of device of encrypt file, comprising:
First encrypting module 501, for according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted.
Second encrypting module 502, for according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted.
Synthesis module 503, for according to presetting synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
Described first encrypting module 501 also for, according to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
Described second encrypting module 502 also for, according to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
Described synthesis module 503 also for, by described first character string write described first encrypt file foremost to synthesize the second encrypt file.
As shown in Figure 6, the embodiment of the present invention also provides a kind of device of declassified document, comprising:
Acquisition module 601, for according to presetting synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file.
3rd encrypting module 602, for according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted.
Judge module 603, for judging that whether described first character string is consistent with described second character string.
Deciphering module 604, for when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (10)

1. a method for encrypt file, is characterized in that, comprises the following steps:
According to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string;
According to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted, being the first encrypt file by described file generated to be encrypted;
According to default synthesis mode, described first character string and described first encrypt file are synthesized the second encrypt file.
2. method according to claim 1, is characterized in that, described according to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string, comprises:
According to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
3. method according to claim 1, is characterized in that, described according to the second predetermined encryption algorithm, is encrypted, comprises the byte of the predetermined number of the first predeterminated position of described file to be encrypted:
According to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
4. method according to claim 1, is characterized in that, described basis presets synthesis mode, described first character string and described first encrypt file is synthesized the second encrypt file, comprising:
By the foremost of described first encrypt file of described first character string write to synthesize the second encrypt file.
5. a method for declassified document, is characterized in that, comprises the following steps:
According to default synthesis mode, obtain the first character string in file to be decrypted and the first encrypt file;
According to the first predetermined encryption algorithm, the sequence number of the TF card storing described file to be decrypted is encrypted generation second character string;
Judge that whether described first character string is consistent with described second character string;
When described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
6. a device for encrypt file, is characterized in that, comprising:
First encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted;
Second encrypting module, for according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted;
Synthesis module, for according to presetting synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
7. device according to claim 6, is characterized in that, described first encrypting module also for,
According to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
8. device according to claim 6, is characterized in that, described second encrypting module also for,
According to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
9. device according to claim 6, is characterized in that, described synthesis module also for,
By the foremost of described first encrypt file of described first character string write to synthesize the second encrypt file.
10. a device for declassified document, is characterized in that, comprising:
Acquisition module, for according to presetting synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file;
3rd encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted;
Judge module, for judging that whether described first character string is consistent with described second character string;
Deciphering module, for when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
CN201510013301.2A 2015-01-09 2015-01-09 Method and device for encrypting and decrypting files Pending CN104615944A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510013301.2A CN104615944A (en) 2015-01-09 2015-01-09 Method and device for encrypting and decrypting files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510013301.2A CN104615944A (en) 2015-01-09 2015-01-09 Method and device for encrypting and decrypting files

Publications (1)

Publication Number Publication Date
CN104615944A true CN104615944A (en) 2015-05-13

Family

ID=53150383

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510013301.2A Pending CN104615944A (en) 2015-01-09 2015-01-09 Method and device for encrypting and decrypting files

Country Status (1)

Country Link
CN (1) CN104615944A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062292A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 File storage, read method and device
CN108197940A (en) * 2018-01-17 2018-06-22 武汉轻工大学 Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1627275A (en) * 2003-12-11 2005-06-15 甘国工 Method and system for storing divided files and restoring treatment
US20060143212A1 (en) * 2004-12-15 2006-06-29 Noboru Hamada Information processing apparatus, information processing method, program, and storage medium
CN102129532A (en) * 2011-03-23 2011-07-20 阮晓迅 Method and system for digital copyright protection
CN102567690A (en) * 2011-12-27 2012-07-11 四川长虹电器股份有限公司 Method for encrypting flash video (FLV) file
CN103003824A (en) * 2010-07-14 2013-03-27 桑迪士克科技股份有限公司 Storage device and method for providing a partially-encrypted content file to a host device
CN103294961A (en) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 Method and device for file encrypting/decrypting

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1627275A (en) * 2003-12-11 2005-06-15 甘国工 Method and system for storing divided files and restoring treatment
US20060143212A1 (en) * 2004-12-15 2006-06-29 Noboru Hamada Information processing apparatus, information processing method, program, and storage medium
CN103003824A (en) * 2010-07-14 2013-03-27 桑迪士克科技股份有限公司 Storage device and method for providing a partially-encrypted content file to a host device
CN102129532A (en) * 2011-03-23 2011-07-20 阮晓迅 Method and system for digital copyright protection
CN102567690A (en) * 2011-12-27 2012-07-11 四川长虹电器股份有限公司 Method for encrypting flash video (FLV) file
CN103294961A (en) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 Method and device for file encrypting/decrypting

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062292A (en) * 2016-11-09 2018-05-22 北京国双科技有限公司 File storage, read method and device
CN108197940A (en) * 2018-01-17 2018-06-22 武汉轻工大学 Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
US8571220B2 (en) Method and apparatus for securing data in a memory device
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN102156843B (en) Data encryption method and system as well as data decryption method
CN111385084A (en) Key management method and device for digital assets and computer readable storage medium
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN102063598A (en) Data encryption and decryption methods and devices
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
KR20170097509A (en) Operation method based on white-box cryptography and security apparatus for performing the method
CN107092816A (en) A kind of Android application programs reinforcement means
CN107533613A (en) Transplant document format file custom field
WO2007066039A3 (en) Recovery of obsolete decryption keys
CN102142072A (en) Encryption processing and decryption processing method and device of electronic files
JP2016046799A (en) Agent for providing security cloud service, security key device for security cloud service
CN101174941A (en) Off-line digital copyright protection method and device for mobile terminal document
CN101539979B (en) Method for controlling and protecting electronic document and device thereof
CN104615944A (en) Method and device for encrypting and decrypting files
KR101783281B1 (en) Electronic terminal device for safe storage of identification data and operating method thereof
CN103491384B (en) Encrypting method and device of video and decrypting method and device of video
CN102426637B (en) A kind of embedded database cryptographic storage method
CN102883039A (en) Method for encrypting multimedia private diary of mobile phone
KR20140025146A (en) Method, apparatus and computer-readable storage for encrypting data file
KR102319699B1 (en) White box cryptographic encoding device and method using anti-inversion function
CN107688729B (en) Application program protection system and method based on trusted host
CN110516468A (en) A kind of method and apparatus of virutal machine memory snapshot encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150513

RJ01 Rejection of invention patent application after publication