CN106874776A - A kind of decryption method for encrypting file - Google Patents
A kind of decryption method for encrypting file Download PDFInfo
- Publication number
- CN106874776A CN106874776A CN201611262378.4A CN201611262378A CN106874776A CN 106874776 A CN106874776 A CN 106874776A CN 201611262378 A CN201611262378 A CN 201611262378A CN 106874776 A CN106874776 A CN 106874776A
- Authority
- CN
- China
- Prior art keywords
- file
- decryption
- database
- decryption method
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention discloses a kind of decryption method for encrypting file, and step is:According to encryption File header information, encryption file is scanned using recursive fashion, and its complete trails information is stored in database, while, also by under encryption file backup to backup directory, it is consistent that folder path is deposited in position of the encryption file under backup directory with the original of encryption file;When starting scan procedure, mutex is also created, whether detection decryption process is run, and decryption process is then started without operation;Whether there is encrypted file data in reading database, operation is decrypted if this document complete trails is taken out in the presence of if, and decrypted result is stored in database, waited in the absence of then entering;When operation decryption process carries out file decryption, also start nurse dog thread nurse scan procedure, at the end of scan procedure scans completion and decryption process is decrypted, judge whether process exits, journey is entered by force if also existing.This kind of decryption method improves decryption efficiency without manual operations.
Description
Technical field
The invention belongs to encryption and decryption technique field, more particularly to a kind of automatic decryption method for encryption file.
Background technology
With the fast development of network, people can run through internet and obtain desired information, and this is greatly facilitated
Daily life, improves the efficiency of work.However, while offering convenience, substantial amounts of information is in exposed cyberspace
In, there is the risk being compromised constantly.Present fail-safe software, major part be all by the way of " active safety defence ",
File is encrypted, so as to prevent outflow of document.
When needing to read encryption file, first have to decrypt it, be generally at present that user finds out and adds in person by the way of usinging
Ciphertext part, then using professional tool, or superior sends decoding request.When user needs to be decrypted totally, then use
General mode is decrypted, and workload is unpredictable, and existing manner of decryption has decryption when heap file is processed
The infull problem of inefficiency, decryption, has much room for improvement.
The content of the invention
The purpose of the present invention, is to provide a kind of decryption method for encrypting file, and it improves decryption effect without manual operations
Rate,
In order to reach above-mentioned purpose, solution of the invention is:
A kind of decryption method for encrypting file, comprises the following steps:
Step 1, according to encryption File header information, scans encryption file, and its complete trails information is stored in into database;
Step 2, reads encryption file full path footpath information from database, carries out file decryption and decrypted result is stored in into number
According to storehouse.
In above-mentioned steps 1, when starting scan procedure, mutex is also created, whether detection decryption process runs, without operation
Then start decryption process.
In above-mentioned steps 1, each drive of database has independent db files.
In above-mentioned steps 1, recursive fashion is used during scanning.
In above-mentioned steps 1, the encryption file of scanning, will also encryption text while its complete trails information is stored in into database
Part is backuped under backup directory.
Position of the above-mentioned encryption file under backup directory is consistent with the former storage folder path of encryption file.
In above-mentioned steps 2, encrypted file data is whether there is in reading database, if taking-up this document complete trails in the presence of if
Operation is decrypted, is waited in the absence of then entering.
In above-mentioned steps 2, when operation decryption process carries out file decryption, also start the thread nurse of nurse dog and be scanned into
Journey, at the end of scan procedure is scanned and completes and decrypt process decryption, judges whether process exits, and is entered by force if also existing
Journey.
After such scheme, the present invention scans all encryption files according to encryption File header information, and automatically turns on
Decryption process is decrypted, and solves the problems, such as that, file decryption low to heap file decryption efficiency be not complete.When user issues automatic solution
Close order, entirely encryption file processes, without manual operations, so both improve efficiency for decryption, and program judges to add by file header
Ciphertext part, can avoid encrypting the problem that file is not decrypted again.
Brief description of the drawings
Fig. 1 is flow chart of the invention.
Specific embodiment
Below with reference to accompanying drawing, technical scheme is described in detail.
As shown in figure 1, the present invention provides a kind of decryption method for encrypting file, comprise the following steps:
Step 1, scan procedure
File header information is encrypted according to configuration file, recursive scanning specified path scans encryption file, and file is complete
The status informations such as path are stored in database;
When implementing, user's transmitting order to lower levels starts scan procedure, and scan procedure starts itself and creates a mutex
Guarantee process single-instance, and start nurse dog thread, for detecting that whether decryption process, in operation, solution is then started without operation
Close process;Scan procedure starts to be scanned according to given path, and scanning file uses recursive fashion, when scanning is to file
Whether the encryption file header multilevel iudge this document for taking out file header and configuration is encryption file, is to be stored in database, and will
The encryption file backup mainly prevent decryption and unsuccessfully caused file corruption under the backup directory specified, being backed up, mainly
For giving for change for file, position of the file under backup directory is consistent with the folder path that original is deposited;Wherein, database
For storing encryption fileinfo, and each drive is owned by independent db files, the raising efficiency by the way of point storehouse;
Step 2, decryption process
During operation decryption process, encrypted file data is whether there is in reading database, there is then taking-up this document system-wide
Footpath is decrypted operation, and decrypted result is stored in into database, and whether decryption process starts a decryption thread pool database
There are data, waited in the absence of then entering;When decryption thread pool database, it is 0 to inquire about number of files to be decrypted, and is scanned
Path scanned completion then interpretation for decryption at the end of, automatically exit from process;
When decryption process runs, while starting nurse dog thread, nurse scan procedure is carried out, when decryption process has been decrypted
Cheng Shihui writes completion status value in profile parameters:5, and automatically exit from, when the scan procedure reading configuration file parameter
Be worth for 5 when, scan procedure is automatically exited from.
A kind of summary, decryption method for encrypting file of the present invention, has the characteristics that:
(1) when heap file decryption is carried out, without manually clicking on one by one, the path is directly specified to start automatic solution
It is close;
(2) existing scheme need it is artificial search encryption file, and the present invention can automatically scanning file, according to encryption file
Head determines whether encryption file and is stored in database;
(3) automatic decryption encryption file, improves efficiency.
Above example is only explanation technological thought of the invention, it is impossible to limit protection scope of the present invention with this, every
According to technological thought proposed by the present invention, any change done on the basis of technical scheme each falls within the scope of the present invention
Within.
Claims (8)
1. it is a kind of encrypt file decryption method, it is characterised in that comprise the following steps:
Step 1, according to encryption File header information, scans encryption file, and its complete trails information is stored in into database;
Step 2, reads encryption file full path footpath information from database, carries out file decryption and decrypted result is stored in into data
Storehouse.
2. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, start scanning
During process, mutex is also created, whether detection decryption process is run, and decryption process is then started without operation.
3. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, database
Each drive has independent db files.
4. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, adopted during scanning
Use recursive fashion.
5. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, scanning plus
Ciphertext part while its complete trails information is stored in into database, will also encryption file backup under backup directory.
6. a kind of decryption method for encrypting file as claimed in claim 5, it is characterised in that:The encryption file is in backup mesh
Position under record is consistent with the former storage folder path of encryption file.
7. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 2, data are read
In storehouse whether there is encrypted file data, if in the presence of if take out this document complete trails be decrypted operation, in the absence of then into etc.
Treat.
8. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 2, solved in operation
When close process carries out file decryption, also start nurse dog thread nurse scan procedure, when scan procedure scan complete and decrypt into
At the end of Cheng Xiemi, judge whether process exits, journey is entered by force if also existing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611262378.4A CN106874776B (en) | 2016-12-30 | 2016-12-30 | Decryption method of encrypted file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611262378.4A CN106874776B (en) | 2016-12-30 | 2016-12-30 | Decryption method of encrypted file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106874776A true CN106874776A (en) | 2017-06-20 |
CN106874776B CN106874776B (en) | 2020-06-09 |
Family
ID=59164209
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611262378.4A Active CN106874776B (en) | 2016-12-30 | 2016-12-30 | Decryption method of encrypted file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874776B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111143291A (en) * | 2019-11-19 | 2020-05-12 | 厦门天锐科技股份有限公司 | Encrypted file searching method and device and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101763394A (en) * | 2009-12-31 | 2010-06-30 | 傅如毅 | Method for searching secret-related files in computer system |
CN105656889A (en) * | 2015-12-30 | 2016-06-08 | 东软集团股份有限公司 | WebApp issuing method, server and client |
CN106055363A (en) * | 2016-05-31 | 2016-10-26 | 广东欧珀移动通信有限公司 | Method for identifying file and mobile terminal |
-
2016
- 2016-12-30 CN CN201611262378.4A patent/CN106874776B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101763394A (en) * | 2009-12-31 | 2010-06-30 | 傅如毅 | Method for searching secret-related files in computer system |
CN105656889A (en) * | 2015-12-30 | 2016-06-08 | 东软集团股份有限公司 | WebApp issuing method, server and client |
CN106055363A (en) * | 2016-05-31 | 2016-10-26 | 广东欧珀移动通信有限公司 | Method for identifying file and mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111143291A (en) * | 2019-11-19 | 2020-05-12 | 厦门天锐科技股份有限公司 | Encrypted file searching method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106874776B (en) | 2020-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1288591C (en) | Portable information recording medium | |
US20140281520A1 (en) | Secure cloud data sharing | |
US9027154B2 (en) | Method, apparatus and system for managing document rights | |
CN105556532A (en) | Digital protection that travels with data | |
KR101369251B1 (en) | Apparatus, method, terminal and system for recovery protection of system files | |
US9037620B2 (en) | File system active symbolic link | |
JP2007213405A (en) | Method and apparatus for managing tally information | |
CN1975683A (en) | Computer network datarecovering method | |
JP2009253783A (en) | Mobile terminal, data protection method and program for data protection | |
US9154506B1 (en) | System and method for secure data generation and transmission | |
CN106874776A (en) | A kind of decryption method for encrypting file | |
JP6164508B2 (en) | Data processing system security apparatus and security method | |
CN1812477A (en) | Data forming device and data safety management method | |
CN107797774A (en) | Information processor and method | |
US20120284535A1 (en) | Information processing apparatus capable of reducing labor for data management operation, and data management method and storage medium therefor | |
TWI497342B (en) | Policy group based file protection system, file protection method thereof, and computer readable medium | |
US10380353B2 (en) | Document security in enterprise content management systems | |
CN102436567A (en) | Information processing device, password diagnosing method | |
CN102902933A (en) | File fragmentization processing based method for saving files | |
JP4506647B2 (en) | Computer system | |
CN105095796A (en) | Data storage system employing iris encryption | |
JP2009110215A (en) | Thin client system, data editing method therefor, and data editing program | |
CN104182706B (en) | A kind of time slot scrambling, device and the mobile terminal of mobile terminal storage card | |
US11379610B2 (en) | Methods and devices for automatically encrypting files | |
JP5466277B1 (en) | Portable storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |