CN106446715A - File encryption method and device - Google Patents
File encryption method and device Download PDFInfo
- Publication number
- CN106446715A CN106446715A CN201610891489.5A CN201610891489A CN106446715A CN 106446715 A CN106446715 A CN 106446715A CN 201610891489 A CN201610891489 A CN 201610891489A CN 106446715 A CN106446715 A CN 106446715A
- Authority
- CN
- China
- Prior art keywords
- resource file
- file
- resource
- hashed value
- initial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a file encryption method and device. The method includes the steps that a plurality of resource files are sequentially encrypted through the block cipher algorithm to obtain encrypted file packages; initial names of all the resource files in the encrypted file packages are read; a hash value is generated for each resource file, and the harsh values of all the resource files are unique; the initial name of each resource file is modified into the hash value corresponding to the resource file, and the encrypted file packages are updated. The invention further discloses a corresponding file encryption device.
Description
Technical field
The present invention relates to a kind of file encrypting method and device.
Background technology
Can be using a lot of resource files be arrived, including the picture resource text for using currently for Android application program
Part, audio files, animation file and configuration file etc..And these files can all be bundled to the installation of ARIXTRA (Android) at present
In bag (APK) file, and issue with APK file.And APK file is substantially a compressed file, anyone takes APK text
After part, all of resource file can be obtained by decompressing APK file, and all of resource file can all be put into one and cry
In the file of assets (rule that android system specifies).Directly can make if other staff take resource file
In their application.And the readability of program development and program code for convenience, programmer can be to resource file
The naming rule of filename corresponds to the specifically used implication information of resource file.This article is known that simply by filename
The effect of part.For example, by name, background.png, just easily knows that current file is a background picture text
Part.
Content of the invention
In view of this, it is an object of the invention to provide a kind of file encrypting method and device, to try hard to solve or extremely
Alleviate the problem for existing above less.
In a first aspect, embodiments of the invention provide a kind of file encrypting method, the method includes:
Using block cipher, multiple resource files are encrypted successively, obtain encrypting file bag;
Read the initial title of all of resource file in the encryption file bag;
Hashed value is generated for each resource file, the hashed value of each resource file is unique;
The initial name modifications of each resource file are the corresponding hashed value of each resource file described, update institute
State encryption file bag.
Alternatively, in the method according to the invention, multiple resource files are entered by the utilization block cipher successively
Row encryption, including:
A random number is generated for each resource file, according to the random number, the resource file is carried out successively plus
Close.
Alternatively, in the method according to the invention, it is that each resource file described generates hashed value, including:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
Alternatively, in the method according to the invention, it is that each resource file described generates hashed value, also includes:
Initial title according to each resource file generates hashed value at random.
Alternatively, in the method according to the invention, by the initial name modifications of each resource file for described per
The corresponding hashed value of individual resource file, including:
The initial title of the resource file is stored in resource file management table, by each in resource file management table
The initial name modifications of resource file are the corresponding hashed value of each resource file.
Second aspect, embodiments of the invention provide a kind of document encrypting apparatus, and the device includes:
First processing module, for being encrypted to multiple resource files successively using block cipher, is encrypted
File bag;
Second processing module, for reading the initial title of all of resource file in the encryption file bag;
3rd processing module, for generating hashed value, the hashed value of each resource file for each resource file
It is unique;
Fourth processing module, for being each resource file pair described by the initial name modifications of each resource file
The hashed value that answers, updates the encryption file bag.
Alternatively, in a device in accordance with the invention, the first processing module is additionally operable to:
A random number is generated for each resource file, according to the random number, the resource file is carried out successively plus
Close.
Alternatively, in a device in accordance with the invention, the 3rd processing module is additionally operable to:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
Alternatively, in a device in accordance with the invention, the 3rd processing module is additionally operable to:
Initial title according to each resource file generates hashed value at random.
Alternatively, in a device in accordance with the invention, the fourth processing module is used for:
The initial title of the resource file is stored in resource file management table, by each in resource file management table
The initial name modifications of resource file are the corresponding hashed value of each resource file.
Resource file is encrypted by technology according to the present invention scheme by block encryption algorithm, will be every after encryption
The initial name modifications of individual resource file are a title without any implication information, can prevent other people from obtaining resource text
Part, even if other people get the file that resource file is also after an encryption, also directly cannot use.
For enabling the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate
Appended accompanying drawing, is described in detail below.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by to be used attached needed for embodiment
Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, and it is right to be therefore not construed as
The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this
A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 shows the block diagram of the Example Computing Device 100 of the document encrypting apparatus of the present invention;
The flow chart that Fig. 2 shows a kind of file encrypting method that the embodiment of the present invention is provided;
Fig. 3 shows a kind of structure chart of document encrypting apparatus that the embodiment of the present invention is provided;And
Fig. 4 shows the diagram of the strapping tool application interface provided by the embodiment of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention is clearer, below in conjunction with the embodiment of the present invention
Middle accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only
It is a part of embodiment of the present invention, rather than whole embodiments.Reality of the present invention generally described and illustrated in accompanying drawing herein
The component for applying example can be arranged and be designed with a variety of configurations.Therefore, below to the present invention's that provides in the accompanying drawings
The detailed description of embodiment is not intended to limit the scope of claimed invention, but is merely representative of the selected reality of the present invention
Apply example.Based on the institute obtained on the premise of creative work is not made by embodiments of the invention, those skilled in the art
There is other embodiment, belong to the scope of protection of the invention.
The document encrypting apparatus of the present invention are resided in computing device, and Fig. 1 is arranged as realizing being added according to the file of the present invention
The block diagram of the Example Computing Device 100 of close device.In basic configuration 102, computing device 100 typically comprises system storage
106 and one or more processor 104.Memory bus 108 can be used for processor 104 and system storage 106 it
Between communication.
Depending on desired configuration, processor 104 can be any kind of process, including but not limited to:Microprocessor
((μ P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor 104 can include all
Cache, processor core as one or more rank of on-chip cache 110 and second level cache 112 etc
114 and depositor 116.The processor core 114 of example can include arithmetic and logical unit (ALU), floating-point unit (FPU),
Digital signal processing core (DSP core) or any combination of them.The Memory Controller 118 of example can be with processor
104 are used together, or in some implementations, Memory Controller 118 can be an interior section of processor 104.
Depending on desired configuration, system storage 106 can be any type of memorizer, including but not limited to:Easily
The property lost memorizer (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.System is stored
Device 106 can include operating system 120, one or more application 122 and routine data 124.Routine data 124 can be wrapped
Include and can be used for the first printing list as described here and the second printing list.In some embodiments, application 122 can be with cloth
It is set to and is operated using routine data 124 on an operating system.
Computing device 100 can also include to contribute to from various interface equipments (for example, outut device 142, Peripheral Interface
144 and communication equipment 146) to basic configuration 102 via the communication of bus/interface controller 130 interface bus 140.Example
Outut device 142 include Graphics Processing Unit 148 and audio treatment unit 150.They can be configured to contribute to via
One or more A/V port 152 is communicated with the various external equipments of such as display or speaker etc.Outside example
If interface 144 can include serial interface controller 154 and parallel interface controller 156, they can be configured to contribute to
Via one or more I/O port 158 and such as input equipment (for example, keyboard, mouse, pen, voice-input device, click
Input equipment) or the external equipment of other peripheral hardwares (such as printer, scanner etc.) etc communicated.The communication of example sets
Standby 146 can include network controller 160, and which can be arranged to be easy to via one or more COM1 164 and
Other communications of computing device 162 by network communication link individual or multiple.
Network communication link can be an example of communication media.Communication media can be generally presented as in such as carrier wave
Or the computer-readable instruction in the modulated data signal of other transmission mechanisms etc, data structure, program module, and can
To include any information delivery media." modulated data signal " can be with such signal, in its data set or many
Individual or it change can the mode of coding information in the signal carry out.Used as nonrestrictive example, communication media is permissible
Including the wire medium of such as cable network or private line network etc and such as sound, radio frequency (RF), microwave, infrared
Or other wireless mediums are in interior various wireless mediums (IR).Term computer-readable medium used herein can include to deposit
Both storage media and communication media.
Computing device 100 can be implemented as a part for portable (or mobile) electronic equipment of small size, and these electronics set
Standby can be such as personal digital assistant (PDA), wireless network browsing apparatus, application specific equipment or can include above
The mixing apparatus of any function.Computing device 100 is also implemented as including desktop computer and notebook computer configuration
Personal computer.
The flow chart that Fig. 2 shows a kind of file encrypting method for being provided according to embodiments of the present invention.As shown in Fig. 2
The method is executed in computing device 100, and the method starts from step S210.
In step S210, using block cipher, multiple resource files are encrypted successively, obtain encrypting file
Bag.
Consider that the resource file of needs encryption is relatively more, ciphering process is comparatively laborious, in order to not affect Consumer's Experience, this
Invention is encrypted to multiple resource files using block cipher (TEA AES).Using TEA algorithm to resource text
When part is encrypted, it is that each resource file generates a random number, according to the random number, the resource file is entered successively
Row encryption.Wherein, random number is generated according to the initial title of resource file, e.g., TEA_Encrypt (srcFile,
FileName), wherein, srcFile is the content of resource file, and Filename is the initial title of resource file.TEA algorithm makes
With the clear packets of 64 and the key of 128, it uses Feistel block encryption framework, needs to carry out 64 wheel iteration.Use
TEA AES can pretty good enciphering rate, and a key when encrypting, can be used, different keys can cause encryption
As a result different.It being understood, however, that TEA AES is schematic, all algorithms that can realize resource file encryption are all
Within the scope of the present invention.
In step S220, the initial title of all of resource file in encryption file bag is read.Resource file initial
Title can be obtained by strapping tool AAPT, and AAPT instrument interface in actual applications refers to Fig. 4.AAPT is
Android Asset Packaging Tool, under the build-tools catalogue of ARIXTRA installation kit (SDK).The instrument is permissible
Check, create, updating the document attachment of such as ZIP form, also resource file can be compiled into binary file.Using AAPT it
Front needs configure SDK-tools path inside environmental variable, or as aapt-A<Accessory resources path>-S<Resource path
>-M<Android application inventory file>-I<The extra bag for adding>The side in And-F file destination path this " path+aapt "
Formula enters AAPT.It being understood, however, that the instrument of all initial titles that can obtain resource file is all in the protection of the present invention
In the range of.
In step S230, it is that each resource file generates hashed value, the hashed value of each resource file is unique.
The management logic of the resource file name in AAPT instrument in step S220 is the Resource file in source code
In, specific function is makeFileResources.Initial title respath of resource file can be obtained by this function,
In the form of the resource file name that the function is set up, record has the initial title of resource file, by changing the name in form
Claim, realize renaming the initial title of resource file.
According to a kind of embodiment, it is possible to use hashing algorithm generates fixing length according to the initial title of each resource file
The hashed value of degree.Hashing algorithm is also called hash algorithm, and the binary value of random length is mapped as shorter fixation by the algorithm
The binary value of length, this binary value is referred to as cryptographic Hash or hashed value.It should be appreciated that above-mentioned algorithm is only schematically
, all can generate hashed value or the algorithm of cryptographic Hash is all within the scope of the present invention.
According to another embodiment, can be random using random number generator according to the initial title of each resource file
Generate hashed value.For example, obtain the title of all resource files using AAPT instrument after, random number generator is each resource text
Part generates a hashed value (or random value), and such as 1,2,3 ....
In step S240, the initial name modifications of each resource file are the corresponding hashed value of each resource file,
Update encryption file bag.
The initial title of resource file is stored in resource file management table, by each resource in resource file management table
The initial name modifications of file are the corresponding hashed value of each resource file.For example, resource file is initially entitled
" background.png ", can be modified as " 1.png ", be the equal of with the numeral of no any information replacing.In letter
Realize in number makeFileResources the initial name modifications of resource file are as follows for the source code of hashed value:
Wherein, resPath is the initial title of resource file, and newresPath is the hashed value for generating, by above-mentioned code
Middle resPath makes newresPath into.
Resource file is encrypted by technology according to the present invention scheme by block encryption algorithm, will be every after encryption
The initial name modifications of individual resource file are a title without any implication information, can prevent other people from obtaining resource text
Part, even if other people get the file that resource file is also after an encryption, also directly cannot use.
Fig. 3 shows the structure chart of the document encrypting apparatus for being provided according to embodiments of the present invention.As shown in figure 3,
Above-mentioned document encrypting apparatus are resided in computing device, and the device includes:First processing module 310, Second processing module 320,
3rd processing module 330 and fourth processing module 340.
First processing module 310 be used for using block cipher, multiple resource files are encrypted successively, obtain plus
Ciphertext part bag.Wherein, first processing module 310 generates a random number for each resource file, according to the random number, to institute
State resource file to be encrypted successively.
Second processing module 320 reads the initial title of all of resource file in the encryption file bag.
3rd processing module 330 generates hashed value, the hashed value of each resource file for each resource file described
It is all unique.Wherein, the 3rd processing module 330 is generated according to the initial title of each resource file using hashing algorithm
The hashed value of regular length.Hashed value can also be generated at random according to the initial title of each resource file.
The initial name modifications of each resource file are corresponded to by fourth processing module 340 for each resource file described
Hashed value, update described encryption file bag.Wherein, the initial title of resource file is stored in resource file management table, will
The initial name modifications of each resource file in resource file management table are the corresponding hashed value of each resource file.
A kind of document encrypting apparatus that the embodiment of the present invention is provided can be the specific hardware on equipment or be installed on
Software or firmware on equipment etc..The device provided by the embodiment of the present invention, which realizes the technique effect of principle and generation and front
State embodiment of the method identical, be brief description, device embodiment part does not refer to part, refers to phase in preceding method embodiment
Answer content.Those skilled in the art can be understood that, for convenience and simplicity of description, system described above,
Device and the specific work process of unit, all may be referred to the corresponding process in said method embodiment, will not be described here.
In embodiment provided by the present invention, it should be understood that disclosed apparatus and method, other sides can be passed through
Formula is realized.Device embodiment described above is only that schematically for example, the division of the unit, only one kind are patrolled
The division of volume function, can have an other dividing mode when actually realizing, and for example, multiple units or component can in conjunction with or can
To be integrated into another system, or some features can be ignored, or not execute.Another, shown or discussed each other
Coupling direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some communication interfaces
Connect, can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit
The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in the embodiment that the present invention is provided can be integrated in a processing unit, also may be used
To be that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function realized using in the form of SFU software functional unit and as independent production marketing or use when, permissible
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) execute each embodiment methods described of the present invention all or part of step.
And aforesaid storage medium includes:USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
It should be noted that:Similar label and letter represent similar terms in following accompanying drawing, therefore, once a certain Xiang Yi
It is defined in individual accompanying drawing, then which need not be defined further and explain in subsequent accompanying drawing, additionally, term " the
One ", " second ", " the 3rd " etc. are only used for distinguishing description, and it is not intended that indicating or hint relative importance.
Finally it should be noted that:The specific embodiment of embodiment described above, the only present invention, in order to illustrate the present invention
Technical scheme, rather than a limitation, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this
Bright be described in detail, it will be understood by those within the art that:Any those familiar with the art
The invention discloses technical scope in, which still can be modified to the technical scheme described in previous embodiment or can be light
Change is readily conceivable that, or equivalent is carried out to which part technical characteristic;And these modifications, change or replacement, do not make
The essence of appropriate technical solution departs from the spirit and scope of embodiment of the present invention technical scheme.The protection in the present invention should all be covered
Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.
Claims (10)
1. a kind of file encrypting method, it is characterised in that the method includes:
Using block cipher, multiple resource files are encrypted successively, obtain encrypting file bag;
Read the initial title of all of resource file in the encryption file bag;
Hashed value is generated for each resource file, the hashed value of each resource file is unique;
The initial name modifications of each resource file are the corresponding hashed value of each resource file described, update described adding
Ciphertext part bag.
2. the method for claim 1, it is characterised in that the utilization block cipher is by multiple resource files successively
It is encrypted, including:
A random number is generated for each resource file, according to the random number, the resource file is encrypted successively.
3. the method for claim 1, it is characterised in that described generate hashed value for each resource file described, including:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
4. the method for claim 1, it is characterised in that described generate hashed value for each resource file described, also wrap
Include:
Initial title according to each resource file generates hashed value at random.
5. the method for claim 1, it is characterised in that described by the initial name modifications of each resource file be
The corresponding hashed value of described each resource file, including:
The initial title of the resource file is stored in resource file management table, by each resource in resource file management table
The initial name modifications of file are the corresponding hashed value of each resource file.
6. a kind of document encrypting apparatus, it is characterised in that the device includes:
First processing module, for being encrypted multiple resource files successively using block cipher, obtains encrypting file
Bag;
Second processing module, for reading the initial title of all of resource file in the encryption file bag;
3rd processing module, for generating hashed value for each resource file, the hashed value of each resource file be only
One;
Fourth processing module, for being that each resource file described is corresponding by the initial name modifications of each resource file
Hashed value, updates the encryption file bag.
7. device as claimed in claim 6, it is characterised in that the first processing module is additionally operable to:
A random number is generated for each resource file, according to the random number, the resource file is encrypted successively.
8. device as claimed in claim 6, it is characterised in that the 3rd processing module is additionally operable to:
The hashed value of regular length is generated according to the initial title of each resource file using hashing algorithm.
9. device as claimed in claim 6, it is characterised in that the 3rd processing module is additionally operable to:
Initial title according to each resource file generates hashed value at random.
10. device as claimed in claim 6, it is characterised in that the fourth processing module is used for:
The initial title of the resource file is stored in resource file management table, by each resource in resource file management table
The initial name modifications of file are the corresponding hashed value of each resource file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610891489.5A CN106446715A (en) | 2016-10-11 | 2016-10-11 | File encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610891489.5A CN106446715A (en) | 2016-10-11 | 2016-10-11 | File encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106446715A true CN106446715A (en) | 2017-02-22 |
Family
ID=58173681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610891489.5A Pending CN106446715A (en) | 2016-10-11 | 2016-10-11 | File encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106446715A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107087004A (en) * | 2017-05-17 | 2017-08-22 | 深圳乐信软件技术有限公司 | Source file processing method and processing device, source file acquisition methods and device |
CN110532129A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | A kind of method, apparatus, equipment and the storage medium of file encryption storage |
CN110945507A (en) * | 2017-08-22 | 2020-03-31 | 罗伯特·博世有限公司 | Method and apparatus for protecting a device |
CN111611440A (en) * | 2020-05-01 | 2020-09-01 | 山东同智伟业软件股份有限公司 | Method for rapidly improving OFD signature, signature and verification |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040221163A1 (en) * | 2003-05-02 | 2004-11-04 | Jorgensen Jimi T. | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN104123359A (en) * | 2014-07-17 | 2014-10-29 | 江苏省邮电规划设计院有限责任公司 | Resource management method of distributed object storage system |
CN104281504A (en) * | 2014-10-30 | 2015-01-14 | 广东欧珀移动通信有限公司 | MD5-code-based method and system applied to backup and reduction of application program data |
CN104601548A (en) * | 2014-12-24 | 2015-05-06 | 深圳市大成天下信息技术有限公司 | Generation method and device of encrypted file and computing equipment |
CN105095785A (en) * | 2014-05-22 | 2015-11-25 | 中兴通讯股份有限公司 | File access processing method, and file access method and device of distributed file system |
CN105205359A (en) * | 2015-10-12 | 2015-12-30 | 厦门飞信网络科技有限公司 | Method and device for protecting JavaScript codes |
-
2016
- 2016-10-11 CN CN201610891489.5A patent/CN106446715A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040221163A1 (en) * | 2003-05-02 | 2004-11-04 | Jorgensen Jimi T. | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN105095785A (en) * | 2014-05-22 | 2015-11-25 | 中兴通讯股份有限公司 | File access processing method, and file access method and device of distributed file system |
CN104123359A (en) * | 2014-07-17 | 2014-10-29 | 江苏省邮电规划设计院有限责任公司 | Resource management method of distributed object storage system |
CN104281504A (en) * | 2014-10-30 | 2015-01-14 | 广东欧珀移动通信有限公司 | MD5-code-based method and system applied to backup and reduction of application program data |
CN104601548A (en) * | 2014-12-24 | 2015-05-06 | 深圳市大成天下信息技术有限公司 | Generation method and device of encrypted file and computing equipment |
CN105205359A (en) * | 2015-10-12 | 2015-12-30 | 厦门飞信网络科技有限公司 | Method and device for protecting JavaScript codes |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107087004A (en) * | 2017-05-17 | 2017-08-22 | 深圳乐信软件技术有限公司 | Source file processing method and processing device, source file acquisition methods and device |
CN110945507A (en) * | 2017-08-22 | 2020-03-31 | 罗伯特·博世有限公司 | Method and apparatus for protecting a device |
CN110532129A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | A kind of method, apparatus, equipment and the storage medium of file encryption storage |
CN111611440A (en) * | 2020-05-01 | 2020-09-01 | 山东同智伟业软件股份有限公司 | Method for rapidly improving OFD signature, signature and verification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang et al. | Quantum image encryption based on Henon mapping | |
JP5629823B2 (en) | Asymmetric chaos encryption | |
TWI642294B (en) | Computer program product , system and method of cipher message with authentication instruction | |
CN105205359B (en) | A kind of JavaScript code guard method and device | |
CN106446715A (en) | File encryption method and device | |
CN107579813A (en) | information encryption and decryption method and device | |
CN106850221A (en) | Information encryption and decryption method and device | |
CN110061840A (en) | Data ciphering method, device, computer equipment and storage medium | |
CN109491727A (en) | Object serialization method, terminal device and computer readable storage medium | |
CN104735471A (en) | Techniques For Secure Provisioning Of Digital Content Protection Scheme | |
CN107222759A (en) | Method, system, equipment and the medium of media file encryption and decryption | |
CN108880812A (en) | The method and system of data encryption | |
CN107103211A (en) | SDK is sent, using issue, using operation method and device | |
US20240104224A1 (en) | Privacy-preserving search using homomorphic encryption | |
CN112256275A (en) | Code obfuscation method, device, electronic device and medium | |
CN104601548A (en) | Generation method and device of encrypted file and computing equipment | |
Ukwuoma et al. | Post-quantum cryptography-driven security framework for cloud computing | |
CN110210591A (en) | A kind of wiring method, computer installation and the computer readable storage medium of intellective IC card personal data | |
CN106548049A (en) | A kind of code process method and apparatus | |
CN117932685A (en) | Privacy data processing method and related equipment based on longitudinal federal learning | |
WO2024061052A1 (en) | Model processing method and device, and model-based data processing method and device | |
US9124422B2 (en) | System and method for digital rights management with secure application-content binding | |
CN113726501A (en) | Method and device for preserving format encrypted data, electronic equipment and storage medium | |
CN110149633B (en) | Safe multi-party authentication method and system supporting batch verification | |
CN115225367A (en) | Data processing method, device, computer equipment, storage medium and product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |
|
RJ01 | Rejection of invention patent application after publication |