CN106446715A - File encryption method and device - Google Patents

File encryption method and device Download PDF

Info

Publication number
CN106446715A
CN106446715A CN201610891489.5A CN201610891489A CN106446715A CN 106446715 A CN106446715 A CN 106446715A CN 201610891489 A CN201610891489 A CN 201610891489A CN 106446715 A CN106446715 A CN 106446715A
Authority
CN
China
Prior art keywords
resource file
file
resource
hashed value
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610891489.5A
Other languages
Chinese (zh)
Inventor
周志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201610891489.5A priority Critical patent/CN106446715A/en
Publication of CN106446715A publication Critical patent/CN106446715A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a file encryption method and device. The method includes the steps that a plurality of resource files are sequentially encrypted through the block cipher algorithm to obtain encrypted file packages; initial names of all the resource files in the encrypted file packages are read; a hash value is generated for each resource file, and the harsh values of all the resource files are unique; the initial name of each resource file is modified into the hash value corresponding to the resource file, and the encrypted file packages are updated. The invention further discloses a corresponding file encryption device.

Description

A kind of file encrypting method and device
Technical field
The present invention relates to a kind of file encrypting method and device.
Background technology
Can be using a lot of resource files be arrived, including the picture resource text for using currently for Android application program Part, audio files, animation file and configuration file etc..And these files can all be bundled to the installation of ARIXTRA (Android) at present In bag (APK) file, and issue with APK file.And APK file is substantially a compressed file, anyone takes APK text After part, all of resource file can be obtained by decompressing APK file, and all of resource file can all be put into one and cry In the file of assets (rule that android system specifies).Directly can make if other staff take resource file In their application.And the readability of program development and program code for convenience, programmer can be to resource file The naming rule of filename corresponds to the specifically used implication information of resource file.This article is known that simply by filename The effect of part.For example, by name, background.png, just easily knows that current file is a background picture text Part.
Content of the invention
In view of this, it is an object of the invention to provide a kind of file encrypting method and device, to try hard to solve or extremely Alleviate the problem for existing above less.
In a first aspect, embodiments of the invention provide a kind of file encrypting method, the method includes:
Using block cipher, multiple resource files are encrypted successively, obtain encrypting file bag;
Read the initial title of all of resource file in the encryption file bag;
Hashed value is generated for each resource file, the hashed value of each resource file is unique;
The initial name modifications of each resource file are the corresponding hashed value of each resource file described, update institute State encryption file bag.
Alternatively, in the method according to the invention, multiple resource files are entered by the utilization block cipher successively Row encryption, including:
A random number is generated for each resource file, according to the random number, the resource file is carried out successively plus Close.
Alternatively, in the method according to the invention, it is that each resource file described generates hashed value, including:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
Alternatively, in the method according to the invention, it is that each resource file described generates hashed value, also includes:
Initial title according to each resource file generates hashed value at random.
Alternatively, in the method according to the invention, by the initial name modifications of each resource file for described per The corresponding hashed value of individual resource file, including:
The initial title of the resource file is stored in resource file management table, by each in resource file management table The initial name modifications of resource file are the corresponding hashed value of each resource file.
Second aspect, embodiments of the invention provide a kind of document encrypting apparatus, and the device includes:
First processing module, for being encrypted to multiple resource files successively using block cipher, is encrypted File bag;
Second processing module, for reading the initial title of all of resource file in the encryption file bag;
3rd processing module, for generating hashed value, the hashed value of each resource file for each resource file It is unique;
Fourth processing module, for being each resource file pair described by the initial name modifications of each resource file The hashed value that answers, updates the encryption file bag.
Alternatively, in a device in accordance with the invention, the first processing module is additionally operable to:
A random number is generated for each resource file, according to the random number, the resource file is carried out successively plus Close.
Alternatively, in a device in accordance with the invention, the 3rd processing module is additionally operable to:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
Alternatively, in a device in accordance with the invention, the 3rd processing module is additionally operable to:
Initial title according to each resource file generates hashed value at random.
Alternatively, in a device in accordance with the invention, the fourth processing module is used for:
The initial title of the resource file is stored in resource file management table, by each in resource file management table The initial name modifications of resource file are the corresponding hashed value of each resource file.
Resource file is encrypted by technology according to the present invention scheme by block encryption algorithm, will be every after encryption The initial name modifications of individual resource file are a title without any implication information, can prevent other people from obtaining resource text Part, even if other people get the file that resource file is also after an encryption, also directly cannot use.
For enabling the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by to be used attached needed for embodiment Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, and it is right to be therefore not construed as The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 shows the block diagram of the Example Computing Device 100 of the document encrypting apparatus of the present invention;
The flow chart that Fig. 2 shows a kind of file encrypting method that the embodiment of the present invention is provided;
Fig. 3 shows a kind of structure chart of document encrypting apparatus that the embodiment of the present invention is provided;And
Fig. 4 shows the diagram of the strapping tool application interface provided by the embodiment of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention is clearer, below in conjunction with the embodiment of the present invention Middle accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only It is a part of embodiment of the present invention, rather than whole embodiments.Reality of the present invention generally described and illustrated in accompanying drawing herein The component for applying example can be arranged and be designed with a variety of configurations.Therefore, below to the present invention's that provides in the accompanying drawings The detailed description of embodiment is not intended to limit the scope of claimed invention, but is merely representative of the selected reality of the present invention Apply example.Based on the institute obtained on the premise of creative work is not made by embodiments of the invention, those skilled in the art There is other embodiment, belong to the scope of protection of the invention.
The document encrypting apparatus of the present invention are resided in computing device, and Fig. 1 is arranged as realizing being added according to the file of the present invention The block diagram of the Example Computing Device 100 of close device.In basic configuration 102, computing device 100 typically comprises system storage 106 and one or more processor 104.Memory bus 108 can be used for processor 104 and system storage 106 it Between communication.
Depending on desired configuration, processor 104 can be any kind of process, including but not limited to:Microprocessor ((μ P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor 104 can include all Cache, processor core as one or more rank of on-chip cache 110 and second level cache 112 etc 114 and depositor 116.The processor core 114 of example can include arithmetic and logical unit (ALU), floating-point unit (FPU), Digital signal processing core (DSP core) or any combination of them.The Memory Controller 118 of example can be with processor 104 are used together, or in some implementations, Memory Controller 118 can be an interior section of processor 104.
Depending on desired configuration, system storage 106 can be any type of memorizer, including but not limited to:Easily The property lost memorizer (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.System is stored Device 106 can include operating system 120, one or more application 122 and routine data 124.Routine data 124 can be wrapped Include and can be used for the first printing list as described here and the second printing list.In some embodiments, application 122 can be with cloth It is set to and is operated using routine data 124 on an operating system.
Computing device 100 can also include to contribute to from various interface equipments (for example, outut device 142, Peripheral Interface 144 and communication equipment 146) to basic configuration 102 via the communication of bus/interface controller 130 interface bus 140.Example Outut device 142 include Graphics Processing Unit 148 and audio treatment unit 150.They can be configured to contribute to via One or more A/V port 152 is communicated with the various external equipments of such as display or speaker etc.Outside example If interface 144 can include serial interface controller 154 and parallel interface controller 156, they can be configured to contribute to Via one or more I/O port 158 and such as input equipment (for example, keyboard, mouse, pen, voice-input device, click Input equipment) or the external equipment of other peripheral hardwares (such as printer, scanner etc.) etc communicated.The communication of example sets Standby 146 can include network controller 160, and which can be arranged to be easy to via one or more COM1 164 and Other communications of computing device 162 by network communication link individual or multiple.
Network communication link can be an example of communication media.Communication media can be generally presented as in such as carrier wave Or the computer-readable instruction in the modulated data signal of other transmission mechanisms etc, data structure, program module, and can To include any information delivery media." modulated data signal " can be with such signal, in its data set or many Individual or it change can the mode of coding information in the signal carry out.Used as nonrestrictive example, communication media is permissible Including the wire medium of such as cable network or private line network etc and such as sound, radio frequency (RF), microwave, infrared Or other wireless mediums are in interior various wireless mediums (IR).Term computer-readable medium used herein can include to deposit Both storage media and communication media.
Computing device 100 can be implemented as a part for portable (or mobile) electronic equipment of small size, and these electronics set Standby can be such as personal digital assistant (PDA), wireless network browsing apparatus, application specific equipment or can include above The mixing apparatus of any function.Computing device 100 is also implemented as including desktop computer and notebook computer configuration Personal computer.
The flow chart that Fig. 2 shows a kind of file encrypting method for being provided according to embodiments of the present invention.As shown in Fig. 2 The method is executed in computing device 100, and the method starts from step S210.
In step S210, using block cipher, multiple resource files are encrypted successively, obtain encrypting file Bag.
Consider that the resource file of needs encryption is relatively more, ciphering process is comparatively laborious, in order to not affect Consumer's Experience, this Invention is encrypted to multiple resource files using block cipher (TEA AES).Using TEA algorithm to resource text When part is encrypted, it is that each resource file generates a random number, according to the random number, the resource file is entered successively Row encryption.Wherein, random number is generated according to the initial title of resource file, e.g., TEA_Encrypt (srcFile, FileName), wherein, srcFile is the content of resource file, and Filename is the initial title of resource file.TEA algorithm makes With the clear packets of 64 and the key of 128, it uses Feistel block encryption framework, needs to carry out 64 wheel iteration.Use TEA AES can pretty good enciphering rate, and a key when encrypting, can be used, different keys can cause encryption As a result different.It being understood, however, that TEA AES is schematic, all algorithms that can realize resource file encryption are all Within the scope of the present invention.
In step S220, the initial title of all of resource file in encryption file bag is read.Resource file initial Title can be obtained by strapping tool AAPT, and AAPT instrument interface in actual applications refers to Fig. 4.AAPT is Android Asset Packaging Tool, under the build-tools catalogue of ARIXTRA installation kit (SDK).The instrument is permissible Check, create, updating the document attachment of such as ZIP form, also resource file can be compiled into binary file.Using AAPT it Front needs configure SDK-tools path inside environmental variable, or as aapt-A<Accessory resources path>-S<Resource path >-M<Android application inventory file>-I<The extra bag for adding>The side in And-F file destination path this " path+aapt " Formula enters AAPT.It being understood, however, that the instrument of all initial titles that can obtain resource file is all in the protection of the present invention In the range of.
In step S230, it is that each resource file generates hashed value, the hashed value of each resource file is unique.
The management logic of the resource file name in AAPT instrument in step S220 is the Resource file in source code In, specific function is makeFileResources.Initial title respath of resource file can be obtained by this function, In the form of the resource file name that the function is set up, record has the initial title of resource file, by changing the name in form Claim, realize renaming the initial title of resource file.
According to a kind of embodiment, it is possible to use hashing algorithm generates fixing length according to the initial title of each resource file The hashed value of degree.Hashing algorithm is also called hash algorithm, and the binary value of random length is mapped as shorter fixation by the algorithm The binary value of length, this binary value is referred to as cryptographic Hash or hashed value.It should be appreciated that above-mentioned algorithm is only schematically , all can generate hashed value or the algorithm of cryptographic Hash is all within the scope of the present invention.
According to another embodiment, can be random using random number generator according to the initial title of each resource file Generate hashed value.For example, obtain the title of all resource files using AAPT instrument after, random number generator is each resource text Part generates a hashed value (or random value), and such as 1,2,3 ....
In step S240, the initial name modifications of each resource file are the corresponding hashed value of each resource file, Update encryption file bag.
The initial title of resource file is stored in resource file management table, by each resource in resource file management table The initial name modifications of file are the corresponding hashed value of each resource file.For example, resource file is initially entitled " background.png ", can be modified as " 1.png ", be the equal of with the numeral of no any information replacing.In letter Realize in number makeFileResources the initial name modifications of resource file are as follows for the source code of hashed value:
Wherein, resPath is the initial title of resource file, and newresPath is the hashed value for generating, by above-mentioned code Middle resPath makes newresPath into.
Resource file is encrypted by technology according to the present invention scheme by block encryption algorithm, will be every after encryption The initial name modifications of individual resource file are a title without any implication information, can prevent other people from obtaining resource text Part, even if other people get the file that resource file is also after an encryption, also directly cannot use.
Fig. 3 shows the structure chart of the document encrypting apparatus for being provided according to embodiments of the present invention.As shown in figure 3, Above-mentioned document encrypting apparatus are resided in computing device, and the device includes:First processing module 310, Second processing module 320, 3rd processing module 330 and fourth processing module 340.
First processing module 310 be used for using block cipher, multiple resource files are encrypted successively, obtain plus Ciphertext part bag.Wherein, first processing module 310 generates a random number for each resource file, according to the random number, to institute State resource file to be encrypted successively.
Second processing module 320 reads the initial title of all of resource file in the encryption file bag.
3rd processing module 330 generates hashed value, the hashed value of each resource file for each resource file described It is all unique.Wherein, the 3rd processing module 330 is generated according to the initial title of each resource file using hashing algorithm The hashed value of regular length.Hashed value can also be generated at random according to the initial title of each resource file.
The initial name modifications of each resource file are corresponded to by fourth processing module 340 for each resource file described Hashed value, update described encryption file bag.Wherein, the initial title of resource file is stored in resource file management table, will The initial name modifications of each resource file in resource file management table are the corresponding hashed value of each resource file.
A kind of document encrypting apparatus that the embodiment of the present invention is provided can be the specific hardware on equipment or be installed on Software or firmware on equipment etc..The device provided by the embodiment of the present invention, which realizes the technique effect of principle and generation and front State embodiment of the method identical, be brief description, device embodiment part does not refer to part, refers to phase in preceding method embodiment Answer content.Those skilled in the art can be understood that, for convenience and simplicity of description, system described above, Device and the specific work process of unit, all may be referred to the corresponding process in said method embodiment, will not be described here.
In embodiment provided by the present invention, it should be understood that disclosed apparatus and method, other sides can be passed through Formula is realized.Device embodiment described above is only that schematically for example, the division of the unit, only one kind are patrolled The division of volume function, can have an other dividing mode when actually realizing, and for example, multiple units or component can in conjunction with or can To be integrated into another system, or some features can be ignored, or not execute.Another, shown or discussed each other Coupling direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some communication interfaces Connect, can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in the embodiment that the present invention is provided can be integrated in a processing unit, also may be used To be that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function realized using in the form of SFU software functional unit and as independent production marketing or use when, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execute each embodiment methods described of the present invention all or part of step. And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
It should be noted that:Similar label and letter represent similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined in individual accompanying drawing, then which need not be defined further and explain in subsequent accompanying drawing, additionally, term " the One ", " second ", " the 3rd " etc. are only used for distinguishing description, and it is not intended that indicating or hint relative importance.
Finally it should be noted that:The specific embodiment of embodiment described above, the only present invention, in order to illustrate the present invention Technical scheme, rather than a limitation, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this Bright be described in detail, it will be understood by those within the art that:Any those familiar with the art The invention discloses technical scope in, which still can be modified to the technical scheme described in previous embodiment or can be light Change is readily conceivable that, or equivalent is carried out to which part technical characteristic;And these modifications, change or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of embodiment of the present invention technical scheme.The protection in the present invention should all be covered Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of file encrypting method, it is characterised in that the method includes:
Using block cipher, multiple resource files are encrypted successively, obtain encrypting file bag;
Read the initial title of all of resource file in the encryption file bag;
Hashed value is generated for each resource file, the hashed value of each resource file is unique;
The initial name modifications of each resource file are the corresponding hashed value of each resource file described, update described adding Ciphertext part bag.
2. the method for claim 1, it is characterised in that the utilization block cipher is by multiple resource files successively It is encrypted, including:
A random number is generated for each resource file, according to the random number, the resource file is encrypted successively.
3. the method for claim 1, it is characterised in that described generate hashed value for each resource file described, including:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
4. the method for claim 1, it is characterised in that described generate hashed value for each resource file described, also wrap Include:
Initial title according to each resource file generates hashed value at random.
5. the method for claim 1, it is characterised in that described by the initial name modifications of each resource file be The corresponding hashed value of described each resource file, including:
The initial title of the resource file is stored in resource file management table, by each resource in resource file management table The initial name modifications of file are the corresponding hashed value of each resource file.
6. a kind of document encrypting apparatus, it is characterised in that the device includes:
First processing module, for being encrypted multiple resource files successively using block cipher, obtains encrypting file Bag;
Second processing module, for reading the initial title of all of resource file in the encryption file bag;
3rd processing module, for generating hashed value for each resource file, the hashed value of each resource file be only One;
Fourth processing module, for being that each resource file described is corresponding by the initial name modifications of each resource file Hashed value, updates the encryption file bag.
7. device as claimed in claim 6, it is characterised in that the first processing module is additionally operable to:
A random number is generated for each resource file, according to the random number, the resource file is encrypted successively.
8. device as claimed in claim 6, it is characterised in that the 3rd processing module is additionally operable to:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
9. device as claimed in claim 6, it is characterised in that the 3rd processing module is additionally operable to:
Initial title according to each resource file generates hashed value at random.
10. device as claimed in claim 6, it is characterised in that the fourth processing module is used for:
The initial title of the resource file is stored in resource file management table, by each resource in resource file management table The initial name modifications of file are the corresponding hashed value of each resource file.
CN201610891489.5A 2016-10-11 2016-10-11 File encryption method and device Pending CN106446715A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610891489.5A CN106446715A (en) 2016-10-11 2016-10-11 File encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610891489.5A CN106446715A (en) 2016-10-11 2016-10-11 File encryption method and device

Publications (1)

Publication Number Publication Date
CN106446715A true CN106446715A (en) 2017-02-22

Family

ID=58173681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610891489.5A Pending CN106446715A (en) 2016-10-11 2016-10-11 File encryption method and device

Country Status (1)

Country Link
CN (1) CN106446715A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107087004A (en) * 2017-05-17 2017-08-22 深圳乐信软件技术有限公司 Source file processing method and processing device, source file acquisition methods and device
CN110532129A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the storage medium of file encryption storage
CN110945507A (en) * 2017-08-22 2020-03-31 罗伯特·博世有限公司 Method and apparatus for protecting a device
CN111611440A (en) * 2020-05-01 2020-09-01 山东同智伟业软件股份有限公司 Method for rapidly improving OFD signature, signature and verification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040221163A1 (en) * 2003-05-02 2004-11-04 Jorgensen Jimi T. Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
CN104123359A (en) * 2014-07-17 2014-10-29 江苏省邮电规划设计院有限责任公司 Resource management method of distributed object storage system
CN104281504A (en) * 2014-10-30 2015-01-14 广东欧珀移动通信有限公司 MD5-code-based method and system applied to backup and reduction of application program data
CN104601548A (en) * 2014-12-24 2015-05-06 深圳市大成天下信息技术有限公司 Generation method and device of encrypted file and computing equipment
CN105095785A (en) * 2014-05-22 2015-11-25 中兴通讯股份有限公司 File access processing method, and file access method and device of distributed file system
CN105205359A (en) * 2015-10-12 2015-12-30 厦门飞信网络科技有限公司 Method and device for protecting JavaScript codes

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040221163A1 (en) * 2003-05-02 2004-11-04 Jorgensen Jimi T. Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
CN105095785A (en) * 2014-05-22 2015-11-25 中兴通讯股份有限公司 File access processing method, and file access method and device of distributed file system
CN104123359A (en) * 2014-07-17 2014-10-29 江苏省邮电规划设计院有限责任公司 Resource management method of distributed object storage system
CN104281504A (en) * 2014-10-30 2015-01-14 广东欧珀移动通信有限公司 MD5-code-based method and system applied to backup and reduction of application program data
CN104601548A (en) * 2014-12-24 2015-05-06 深圳市大成天下信息技术有限公司 Generation method and device of encrypted file and computing equipment
CN105205359A (en) * 2015-10-12 2015-12-30 厦门飞信网络科技有限公司 Method and device for protecting JavaScript codes

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107087004A (en) * 2017-05-17 2017-08-22 深圳乐信软件技术有限公司 Source file processing method and processing device, source file acquisition methods and device
CN110945507A (en) * 2017-08-22 2020-03-31 罗伯特·博世有限公司 Method and apparatus for protecting a device
CN110532129A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 A kind of method, apparatus, equipment and the storage medium of file encryption storage
CN111611440A (en) * 2020-05-01 2020-09-01 山东同智伟业软件股份有限公司 Method for rapidly improving OFD signature, signature and verification

Similar Documents

Publication Publication Date Title
Jiang et al. Quantum image encryption based on Henon mapping
JP5629823B2 (en) Asymmetric chaos encryption
TWI642294B (en) Computer program product , system and method of cipher message with authentication instruction
CN105205359B (en) A kind of JavaScript code guard method and device
CN106446715A (en) File encryption method and device
CN107579813A (en) information encryption and decryption method and device
CN106850221A (en) Information encryption and decryption method and device
CN110061840A (en) Data ciphering method, device, computer equipment and storage medium
CN109491727A (en) Object serialization method, terminal device and computer readable storage medium
CN104735471A (en) Techniques For Secure Provisioning Of Digital Content Protection Scheme
CN107222759A (en) Method, system, equipment and the medium of media file encryption and decryption
CN108880812A (en) The method and system of data encryption
CN107103211A (en) SDK is sent, using issue, using operation method and device
US20240104224A1 (en) Privacy-preserving search using homomorphic encryption
CN112256275A (en) Code obfuscation method, device, electronic device and medium
CN104601548A (en) Generation method and device of encrypted file and computing equipment
Ukwuoma et al. Post-quantum cryptography-driven security framework for cloud computing
CN110210591A (en) A kind of wiring method, computer installation and the computer readable storage medium of intellective IC card personal data
CN106548049A (en) A kind of code process method and apparatus
CN117932685A (en) Privacy data processing method and related equipment based on longitudinal federal learning
WO2024061052A1 (en) Model processing method and device, and model-based data processing method and device
US9124422B2 (en) System and method for digital rights management with secure application-content binding
CN113726501A (en) Method and device for preserving format encrypted data, electronic equipment and storage medium
CN110149633B (en) Safe multi-party authentication method and system supporting batch verification
CN115225367A (en) Data processing method, device, computer equipment, storage medium and product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication