CN104615944A - Method and device for encrypting and decrypting files - Google Patents
Method and device for encrypting and decrypting files Download PDFInfo
- Publication number
- CN104615944A CN104615944A CN201510013301.2A CN201510013301A CN104615944A CN 104615944 A CN104615944 A CN 104615944A CN 201510013301 A CN201510013301 A CN 201510013301A CN 104615944 A CN104615944 A CN 104615944A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypted
- character string
- encrypt
- encrypt file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method and device for encrypting and decrypting files. The method for encrypting the files comprises the steps that according to a first preset encryption algorithm, a sequence number of a TF card with the to-be-encrypted files stored is encrypted to generate a first character string; according to a second preset encryption algorithm, bytes, at the first preset positions of the to-be-coded files, of the preset number are encrypted, and first encrypted files are generated through the to-be-encrypted files; according to a preset synthesis mode, the first character string and the first encrypted files are combined to form second encrypted files. The method for encrypting the files through hardware is provided, that is, the TF card is utilized for encrypting the files, the files are stored in the TF card after being encrypted, due to the fact that file encryption is involved in the TF card for storing the files, the files taken out of the TF card cannot be opened, safety of the files is improved, and the effect on protecting the file version is achieved.
Description
Technical field
The present invention relates to technical field of data processing, more specifically, relates to the method and apparatus of a kind of encrypt file and declassified document.
Background technology
At present, people use electronic equipment to process routine work and record life more and more, and some of them file is private data or the classified papers of user, needs to be protected.
The method of conventional protected file is encrypted file, and such as, arranging password to file is the most frequently used technological means.
But, this technological means utilizing password to be encrypted need user to remember password could be deciphered, and, now the decoding of password is also easily operated, after being easy to be got this file by other people, password is decoded.Therefore, need a kind of method of encrypt file, can protected file better.
Summary of the invention
In view of this, the object of the embodiment of the present invention is the method and apparatus proposing a kind of encrypt file and declassified document, and it can protected file better.
In order to achieve the above object, the embodiment of the present invention proposes a kind of method of encrypt file, comprising:
According to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string;
According to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted, being the first encrypt file by described file generated to be encrypted;
According to default synthesis mode, described first character string and described first encrypt file are synthesized the second encrypt file.
In an embodiment of the present invention, described according to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string, comprises:
According to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
In an embodiment of the present invention, described according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted, comprises:
According to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
In an embodiment of the present invention, described basis presets synthesis mode, described first character string and described first encrypt file is synthesized the second encrypt file, comprising:
By the foremost of described first encrypt file of described first character string write to synthesize the second encrypt file.
The embodiment of the present invention also proposes a kind of method of declassified document, comprises the following steps:
According to default synthesis mode, obtain the first character string in file to be decrypted and the first encrypt file;
According to the first predetermined encryption algorithm, the sequence number of the TF card storing described file to be decrypted is encrypted generation second character string;
Judge that whether described first character string is consistent with described second character string;
When described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
The embodiment of the present invention also proposes a kind of device of encrypt file, comprising:
First encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted;
Second encrypting module, for according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted;
Synthesis module, for according to presetting synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
In an embodiment of the present invention, described first encrypting module also for, according to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
In an embodiment of the present invention, described second encrypting module also for, according to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
In an embodiment of the present invention, described synthesis module also for, by described first character string write described first encrypt file foremost to synthesize the second encrypt file.
The embodiment of the present invention also proposes a kind of device of declassified document, comprising:
Acquisition module, for according to presetting synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file;
3rd encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted;
Judge module, for judging that whether described first character string is consistent with described second character string;
Deciphering module, for when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
The technical scheme that the embodiment of the present invention provides can comprise following beneficial effect:
Provide a kind of hardware that utilizes to the method for file encryption, namely utilize TF card to file encryption, after encryption, this file leaves in this TF card, can read this TF card just can open by the specific client (can perform corresponding decipherment algorithm) in such as android equipment.Encryption due to file relates to the TF card of storing documents, and therefore, the file taken away from TF card all cannot be opened (such as, video file cannot be play), improve the security of file, also play the effect of protected file copyright.
The further feature of the embodiment of the present invention and advantage will be set forth in the following description, and, partly become apparent from instructions, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in write instructions, claims and accompanying drawing and obtain.
Below by drawings and Examples, the technical scheme of the embodiment of the present invention is described in further detail.
Accompanying drawing explanation
Accompanying drawing is used to provide the further understanding to the embodiment of the present invention, and forms a part for instructions, together with embodiments of the present invention for explaining the present invention, does not form the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of the method for encrypt file in one embodiment of the invention.
Fig. 2 is the process flow diagram of the method for encrypt file in one embodiment of the invention.
Fig. 3 is the process flow diagram of the method for declassified document in one embodiment of the invention.
Fig. 4 is the process flow diagram of the method for declassified document in one embodiment of the invention.
Fig. 5 is the structural representation of the device of encrypt file in one embodiment of the invention.
Fig. 6 is the structural representation of the device of declassified document in one embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the embodiment of the present invention, is not intended to limit the present invention embodiment.
Be illustrated in figure 1 the process flow diagram of the method for the encrypt file in the embodiment of the present invention, the method comprises:
Step S11: according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted.
TF card (Trans-flash Card), be otherwise known as Micro SD card, is a kind of superfine little flash memory cards.Often open the sequence number that TF card has oneself.
File to be encrypted can be such as video file, audio file, text, image file etc.
Step S12: according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted.
Step S13: according to default synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
In the embodiment of the present invention, provide a kind of hardware that utilizes to the method for file encryption, namely utilize TF card to file encryption, after encryption, this file leaves in this TF card, can read this TF card just can open by the specific client (can perform corresponding decipherment algorithm) in such as android equipment.Encryption due to file relates to the TF card of storing documents, and therefore, the file taken away from TF card all cannot be opened (such as, video file cannot be play), improve the security of file, also play the effect of protected file copyright.
Be illustrated in figure 2 the process flow diagram of the method for corresponding a kind of declassified document, the method for this declassified document comprises the following steps:
Step S21: according to default synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file.
Step S22: according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted.
Step S23: judge that whether described first character string is consistent with described second character string.
Step S24: when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
In the method for this declassified document, need the sequence number of the TF card of storing documents and corresponding decryption method Sum fanction ability declassified document.Only take file away from TF card, cannot open file, thus improve the security of file, also play the effect of protected file copyright.
Be illustrated in figure 3 another embodiment of the method for the encrypt file proposed in the embodiment of the present invention, in this embodiment, can in advance file to be encrypted be left in TF card, TF card is put into terminal (such as mobile phone), performed the method for this encrypt file by mobile phone (or the application program in mobile phone).This embodiment comprises the following steps:
Step S31: read to deposit and need the sequence number of TF card of encrypt file.
Step S32: according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of reading.
First predetermined encryption algorithm is such as BASE64 cryptographic algorithm.
Step S33: front 50 bytes reading the file to be encrypted in this TF card.
In this embodiment, reading is front 50 bytes of file to be encrypted.In other embodiments of the invention, the byte of the predetermined number of the predeterminated position of file to be encrypted can be read.Such as, the 101 to 200 byte of file to be encrypted can be read.
50 bytes read are encrypted by step S34: according to the second predetermined encryption algorithm.
Second predetermined encryption algorithm is such as affine cipher algorithm.
Step S35: the ciphertext after encryption in step S34 is replaced front 50 bytes of file to be encrypted, being the first encrypt file by file generated to be encrypted.
When being the first encrypt file by file generated to be encrypted, be with encryption after ciphertext replace original byte in file to be encrypted, therefore, obviously, the byte number after the byte of reading being encrypted should be equal with the quantity of the byte read.
Step S36: the foremost the first character string being write the first encrypt file, forms the second encrypt file.
In other embodiments of the invention, the first character string and the first encrypt file are synthesized the second encrypt file and can also adopt other synthesis modes, such as but not limited to:
It should be noted that the first predetermined encryption algorithm in the embodiment of the present invention and the second predetermined encryption algorithm are not limited to BASE64 cryptographic algorithm for example and affine cipher algorithm, other any cryptographic algorithm that can be suitable for can use.
In this TF card file to be encrypted encrypted after be called the second encrypt file, the structure of the second encrypt file is: the remaining data of front 50 bytes+file to be encrypted of the file to be encrypted of the TF card sequence number+encryption of encryption.
Correspond to the method for encrypt file as shown in Figure 3, Fig. 4 shows another embodiment of the method for the declassified document proposed in the embodiment of the present invention, in this embodiment, file to be decrypted leaves in TF card, TF card is put into terminal (such as mobile phone), performed the method for declassified document by mobile phone (or the application program in mobile phone).This embodiment comprises the following steps:
Step S41: read to deposit and need the sequence number of TF card of declassified document.
Step S42: according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of reading.
Step S43: the first character string obtaining foremost in file to be decrypted, and the first encrypt file of removing the first character string.
Step S44: judge that whether the first character string is consistent with the second character string, if so, performs step S45, if not, then terminates.
Step S45: front 50 bytes reading the first encrypt file.
50 bytes read are decrypted by step S46: according to the second predetermined encryption algorithm.
Step S47: remaining file data in the data after deciphering and the first encrypt file is stitched together, the first encrypt file is generated as the file deciphered.
Now, file to be decrypted is decrypted.
As shown in Figure 5, the embodiment of the present invention also proposes a kind of device of encrypt file, comprising:
First encrypting module 501, for according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted.
Second encrypting module 502, for according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted.
Synthesis module 503, for according to presetting synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
Described first encrypting module 501 also for, according to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
Described second encrypting module 502 also for, according to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
Described synthesis module 503 also for, by described first character string write described first encrypt file foremost to synthesize the second encrypt file.
As shown in Figure 6, the embodiment of the present invention also provides a kind of device of declassified document, comprising:
Acquisition module 601, for according to presetting synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file.
3rd encrypting module 602, for according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted.
Judge module 603, for judging that whether described first character string is consistent with described second character string.
Deciphering module 604, for when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.
Claims (10)
1. a method for encrypt file, is characterized in that, comprises the following steps:
According to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string;
According to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted, being the first encrypt file by described file generated to be encrypted;
According to default synthesis mode, described first character string and described first encrypt file are synthesized the second encrypt file.
2. method according to claim 1, is characterized in that, described according to the first predetermined encryption algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string, comprises:
According to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
3. method according to claim 1, is characterized in that, described according to the second predetermined encryption algorithm, is encrypted, comprises the byte of the predetermined number of the first predeterminated position of described file to be encrypted:
According to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
4. method according to claim 1, is characterized in that, described basis presets synthesis mode, described first character string and described first encrypt file is synthesized the second encrypt file, comprising:
By the foremost of described first encrypt file of described first character string write to synthesize the second encrypt file.
5. a method for declassified document, is characterized in that, comprises the following steps:
According to default synthesis mode, obtain the first character string in file to be decrypted and the first encrypt file;
According to the first predetermined encryption algorithm, the sequence number of the TF card storing described file to be decrypted is encrypted generation second character string;
Judge that whether described first character string is consistent with described second character string;
When described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
6. a device for encrypt file, is characterized in that, comprising:
First encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation first character string by the sequence number of the TF card storing file to be encrypted;
Second encrypting module, for according to the second predetermined encryption algorithm, is encrypted the byte of the predetermined number of the first predeterminated position of described file to be encrypted, being the first encrypt file by described file generated to be encrypted;
Synthesis module, for according to presetting synthesis mode, synthesizes the second encrypt file by described first character string and described first encrypt file.
7. device according to claim 6, is characterized in that, described first encrypting module also for,
According to BASE64 cryptographic algorithm, the sequence number of the TF card storing file to be encrypted is encrypted generation first character string.
8. device according to claim 6, is characterized in that, described second encrypting module also for,
According to affine cipher algorithm, the byte of the predetermined number of the first predeterminated position of described file to be encrypted is encrypted.
9. device according to claim 6, is characterized in that, described synthesis module also for,
By the foremost of described first encrypt file of described first character string write to synthesize the second encrypt file.
10. a device for declassified document, is characterized in that, comprising:
Acquisition module, for according to presetting synthesis mode, obtains the first character string in file to be decrypted and the first encrypt file;
3rd encrypting module, for according to the first predetermined encryption algorithm, is encrypted generation second character string by the sequence number of the TF card storing described file to be decrypted;
Judge module, for judging that whether described first character string is consistent with described second character string;
Deciphering module, for when described first character string is consistent with described second character string, according to the second predetermined encryption algorithm, the byte of the predetermined number of the first predeterminated position in described first encrypt file is decrypted, so that described first encrypt file is generated as the file deciphered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510013301.2A CN104615944A (en) | 2015-01-09 | 2015-01-09 | Method and device for encrypting and decrypting files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510013301.2A CN104615944A (en) | 2015-01-09 | 2015-01-09 | Method and device for encrypting and decrypting files |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104615944A true CN104615944A (en) | 2015-05-13 |
Family
ID=53150383
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510013301.2A Pending CN104615944A (en) | 2015-01-09 | 2015-01-09 | Method and device for encrypting and decrypting files |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104615944A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108062292A (en) * | 2016-11-09 | 2018-05-22 | 北京国双科技有限公司 | File storage, read method and device |
CN108197940A (en) * | 2018-01-17 | 2018-06-22 | 武汉轻工大学 | Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1627275A (en) * | 2003-12-11 | 2005-06-15 | 甘国工 | Method and system for storing divided files and restoring treatment |
US20060143212A1 (en) * | 2004-12-15 | 2006-06-29 | Noboru Hamada | Information processing apparatus, information processing method, program, and storage medium |
CN102129532A (en) * | 2011-03-23 | 2011-07-20 | 阮晓迅 | Method and system for digital copyright protection |
CN102567690A (en) * | 2011-12-27 | 2012-07-11 | 四川长虹电器股份有限公司 | Method for encrypting flash video (FLV) file |
CN103003824A (en) * | 2010-07-14 | 2013-03-27 | 桑迪士克科技股份有限公司 | Storage device and method for providing a partially-encrypted content file to a host device |
CN103294961A (en) * | 2013-06-07 | 2013-09-11 | 北京奇虎科技有限公司 | Method and device for file encrypting/decrypting |
-
2015
- 2015-01-09 CN CN201510013301.2A patent/CN104615944A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1627275A (en) * | 2003-12-11 | 2005-06-15 | 甘国工 | Method and system for storing divided files and restoring treatment |
US20060143212A1 (en) * | 2004-12-15 | 2006-06-29 | Noboru Hamada | Information processing apparatus, information processing method, program, and storage medium |
CN103003824A (en) * | 2010-07-14 | 2013-03-27 | 桑迪士克科技股份有限公司 | Storage device and method for providing a partially-encrypted content file to a host device |
CN102129532A (en) * | 2011-03-23 | 2011-07-20 | 阮晓迅 | Method and system for digital copyright protection |
CN102567690A (en) * | 2011-12-27 | 2012-07-11 | 四川长虹电器股份有限公司 | Method for encrypting flash video (FLV) file |
CN103294961A (en) * | 2013-06-07 | 2013-09-11 | 北京奇虎科技有限公司 | Method and device for file encrypting/decrypting |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108062292A (en) * | 2016-11-09 | 2018-05-22 | 北京国双科技有限公司 | File storage, read method and device |
CN108197940A (en) * | 2018-01-17 | 2018-06-22 | 武汉轻工大学 | Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040090B (en) | A kind of data ciphering method and device | |
US8571220B2 (en) | Method and apparatus for securing data in a memory device | |
US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
CN102156843B (en) | Data encryption method and system as well as data decryption method | |
CN111385084A (en) | Key management method and device for digital assets and computer readable storage medium | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN102063598A (en) | Data encryption and decryption methods and devices | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
KR20170097509A (en) | Operation method based on white-box cryptography and security apparatus for performing the method | |
CN107092816A (en) | A kind of Android application programs reinforcement means | |
CN107533613A (en) | Transplant document format file custom field | |
WO2007066039A3 (en) | Recovery of obsolete decryption keys | |
CN102142072A (en) | Encryption processing and decryption processing method and device of electronic files | |
JP2016046799A (en) | Agent for providing security cloud service, security key device for security cloud service | |
CN101174941A (en) | Off-line digital copyright protection method and device for mobile terminal document | |
CN101539979B (en) | Method for controlling and protecting electronic document and device thereof | |
CN104615944A (en) | Method and device for encrypting and decrypting files | |
KR101783281B1 (en) | Electronic terminal device for safe storage of identification data and operating method thereof | |
CN103491384B (en) | Encrypting method and device of video and decrypting method and device of video | |
CN102426637B (en) | A kind of embedded database cryptographic storage method | |
CN102883039A (en) | Method for encrypting multimedia private diary of mobile phone | |
KR20140025146A (en) | Method, apparatus and computer-readable storage for encrypting data file | |
KR102319699B1 (en) | White box cryptographic encoding device and method using anti-inversion function | |
CN107688729B (en) | Application program protection system and method based on trusted host | |
CN110516468A (en) | A kind of method and apparatus of virutal machine memory snapshot encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150513 |
|
RJ01 | Rejection of invention patent application after publication |