CN106874776A - A kind of decryption method for encrypting file - Google Patents

A kind of decryption method for encrypting file Download PDF

Info

Publication number
CN106874776A
CN106874776A CN201611262378.4A CN201611262378A CN106874776A CN 106874776 A CN106874776 A CN 106874776A CN 201611262378 A CN201611262378 A CN 201611262378A CN 106874776 A CN106874776 A CN 106874776A
Authority
CN
China
Prior art keywords
file
decryption
database
decryption method
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611262378.4A
Other languages
Chinese (zh)
Other versions
CN106874776B (en
Inventor
涂高元
黄东强
邱志斌
郭永兴
陆云燕
张艳蓉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XIAMEN TIPRAY TECHNOLOGY Co Ltd
Original Assignee
XIAMEN TIPRAY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XIAMEN TIPRAY TECHNOLOGY Co Ltd filed Critical XIAMEN TIPRAY TECHNOLOGY Co Ltd
Priority to CN201611262378.4A priority Critical patent/CN106874776B/en
Publication of CN106874776A publication Critical patent/CN106874776A/en
Application granted granted Critical
Publication of CN106874776B publication Critical patent/CN106874776B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention discloses a kind of decryption method for encrypting file, and step is:According to encryption File header information, encryption file is scanned using recursive fashion, and its complete trails information is stored in database, while, also by under encryption file backup to backup directory, it is consistent that folder path is deposited in position of the encryption file under backup directory with the original of encryption file;When starting scan procedure, mutex is also created, whether detection decryption process is run, and decryption process is then started without operation;Whether there is encrypted file data in reading database, operation is decrypted if this document complete trails is taken out in the presence of if, and decrypted result is stored in database, waited in the absence of then entering;When operation decryption process carries out file decryption, also start nurse dog thread nurse scan procedure, at the end of scan procedure scans completion and decryption process is decrypted, judge whether process exits, journey is entered by force if also existing.This kind of decryption method improves decryption efficiency without manual operations.

Description

A kind of decryption method for encrypting file
Technical field
The invention belongs to encryption and decryption technique field, more particularly to a kind of automatic decryption method for encryption file.
Background technology
With the fast development of network, people can run through internet and obtain desired information, and this is greatly facilitated Daily life, improves the efficiency of work.However, while offering convenience, substantial amounts of information is in exposed cyberspace In, there is the risk being compromised constantly.Present fail-safe software, major part be all by the way of " active safety defence ", File is encrypted, so as to prevent outflow of document.
When needing to read encryption file, first have to decrypt it, be generally at present that user finds out and adds in person by the way of usinging Ciphertext part, then using professional tool, or superior sends decoding request.When user needs to be decrypted totally, then use General mode is decrypted, and workload is unpredictable, and existing manner of decryption has decryption when heap file is processed The infull problem of inefficiency, decryption, has much room for improvement.
The content of the invention
The purpose of the present invention, is to provide a kind of decryption method for encrypting file, and it improves decryption effect without manual operations Rate,
In order to reach above-mentioned purpose, solution of the invention is:
A kind of decryption method for encrypting file, comprises the following steps:
Step 1, according to encryption File header information, scans encryption file, and its complete trails information is stored in into database;
Step 2, reads encryption file full path footpath information from database, carries out file decryption and decrypted result is stored in into number According to storehouse.
In above-mentioned steps 1, when starting scan procedure, mutex is also created, whether detection decryption process runs, without operation Then start decryption process.
In above-mentioned steps 1, each drive of database has independent db files.
In above-mentioned steps 1, recursive fashion is used during scanning.
In above-mentioned steps 1, the encryption file of scanning, will also encryption text while its complete trails information is stored in into database Part is backuped under backup directory.
Position of the above-mentioned encryption file under backup directory is consistent with the former storage folder path of encryption file.
In above-mentioned steps 2, encrypted file data is whether there is in reading database, if taking-up this document complete trails in the presence of if Operation is decrypted, is waited in the absence of then entering.
In above-mentioned steps 2, when operation decryption process carries out file decryption, also start the thread nurse of nurse dog and be scanned into Journey, at the end of scan procedure is scanned and completes and decrypt process decryption, judges whether process exits, and is entered by force if also existing Journey.
After such scheme, the present invention scans all encryption files according to encryption File header information, and automatically turns on Decryption process is decrypted, and solves the problems, such as that, file decryption low to heap file decryption efficiency be not complete.When user issues automatic solution Close order, entirely encryption file processes, without manual operations, so both improve efficiency for decryption, and program judges to add by file header Ciphertext part, can avoid encrypting the problem that file is not decrypted again.
Brief description of the drawings
Fig. 1 is flow chart of the invention.
Specific embodiment
Below with reference to accompanying drawing, technical scheme is described in detail.
As shown in figure 1, the present invention provides a kind of decryption method for encrypting file, comprise the following steps:
Step 1, scan procedure
File header information is encrypted according to configuration file, recursive scanning specified path scans encryption file, and file is complete The status informations such as path are stored in database;
When implementing, user's transmitting order to lower levels starts scan procedure, and scan procedure starts itself and creates a mutex Guarantee process single-instance, and start nurse dog thread, for detecting that whether decryption process, in operation, solution is then started without operation Close process;Scan procedure starts to be scanned according to given path, and scanning file uses recursive fashion, when scanning is to file Whether the encryption file header multilevel iudge this document for taking out file header and configuration is encryption file, is to be stored in database, and will The encryption file backup mainly prevent decryption and unsuccessfully caused file corruption under the backup directory specified, being backed up, mainly For giving for change for file, position of the file under backup directory is consistent with the folder path that original is deposited;Wherein, database For storing encryption fileinfo, and each drive is owned by independent db files, the raising efficiency by the way of point storehouse;
Step 2, decryption process
During operation decryption process, encrypted file data is whether there is in reading database, there is then taking-up this document system-wide Footpath is decrypted operation, and decrypted result is stored in into database, and whether decryption process starts a decryption thread pool database There are data, waited in the absence of then entering;When decryption thread pool database, it is 0 to inquire about number of files to be decrypted, and is scanned Path scanned completion then interpretation for decryption at the end of, automatically exit from process;
When decryption process runs, while starting nurse dog thread, nurse scan procedure is carried out, when decryption process has been decrypted Cheng Shihui writes completion status value in profile parameters:5, and automatically exit from, when the scan procedure reading configuration file parameter Be worth for 5 when, scan procedure is automatically exited from.
A kind of summary, decryption method for encrypting file of the present invention, has the characteristics that:
(1) when heap file decryption is carried out, without manually clicking on one by one, the path is directly specified to start automatic solution It is close;
(2) existing scheme need it is artificial search encryption file, and the present invention can automatically scanning file, according to encryption file Head determines whether encryption file and is stored in database;
(3) automatic decryption encryption file, improves efficiency.
Above example is only explanation technological thought of the invention, it is impossible to limit protection scope of the present invention with this, every According to technological thought proposed by the present invention, any change done on the basis of technical scheme each falls within the scope of the present invention Within.

Claims (8)

1. it is a kind of encrypt file decryption method, it is characterised in that comprise the following steps:
Step 1, according to encryption File header information, scans encryption file, and its complete trails information is stored in into database;
Step 2, reads encryption file full path footpath information from database, carries out file decryption and decrypted result is stored in into data Storehouse.
2. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, start scanning During process, mutex is also created, whether detection decryption process is run, and decryption process is then started without operation.
3. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, database Each drive has independent db files.
4. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, adopted during scanning Use recursive fashion.
5. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 1, scanning plus Ciphertext part while its complete trails information is stored in into database, will also encryption file backup under backup directory.
6. a kind of decryption method for encrypting file as claimed in claim 5, it is characterised in that:The encryption file is in backup mesh Position under record is consistent with the former storage folder path of encryption file.
7. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 2, data are read In storehouse whether there is encrypted file data, if in the presence of if take out this document complete trails be decrypted operation, in the absence of then into etc. Treat.
8. a kind of decryption method for encrypting file as claimed in claim 1, it is characterised in that:In the step 2, solved in operation When close process carries out file decryption, also start nurse dog thread nurse scan procedure, when scan procedure scan complete and decrypt into At the end of Cheng Xiemi, judge whether process exits, journey is entered by force if also existing.
CN201611262378.4A 2016-12-30 2016-12-30 Decryption method of encrypted file Active CN106874776B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611262378.4A CN106874776B (en) 2016-12-30 2016-12-30 Decryption method of encrypted file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611262378.4A CN106874776B (en) 2016-12-30 2016-12-30 Decryption method of encrypted file

Publications (2)

Publication Number Publication Date
CN106874776A true CN106874776A (en) 2017-06-20
CN106874776B CN106874776B (en) 2020-06-09

Family

ID=59164209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611262378.4A Active CN106874776B (en) 2016-12-30 2016-12-30 Decryption method of encrypted file

Country Status (1)

Country Link
CN (1) CN106874776B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143291A (en) * 2019-11-19 2020-05-12 厦门天锐科技股份有限公司 Encrypted file searching method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763394A (en) * 2009-12-31 2010-06-30 傅如毅 Method for searching secret-related files in computer system
CN105656889A (en) * 2015-12-30 2016-06-08 东软集团股份有限公司 WebApp issuing method, server and client
CN106055363A (en) * 2016-05-31 2016-10-26 广东欧珀移动通信有限公司 Method for identifying file and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763394A (en) * 2009-12-31 2010-06-30 傅如毅 Method for searching secret-related files in computer system
CN105656889A (en) * 2015-12-30 2016-06-08 东软集团股份有限公司 WebApp issuing method, server and client
CN106055363A (en) * 2016-05-31 2016-10-26 广东欧珀移动通信有限公司 Method for identifying file and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143291A (en) * 2019-11-19 2020-05-12 厦门天锐科技股份有限公司 Encrypted file searching method and device and electronic equipment

Also Published As

Publication number Publication date
CN106874776B (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN101854392B (en) Personal data management method based on cloud computing environment
CN1288591C (en) Portable information recording medium
US9027154B2 (en) Method, apparatus and system for managing document rights
CN105556532A (en) Digital protection that travels with data
US9037620B2 (en) File system active symbolic link
JP2007213405A (en) Method and apparatus for managing tally information
CN1975683A (en) Computer network datarecovering method
JP2009253783A (en) Mobile terminal, data protection method and program for data protection
US9154506B1 (en) System and method for secure data generation and transmission
CN106874776A (en) A kind of decryption method for encrypting file
JP6164508B2 (en) Data processing system security apparatus and security method
CN1812477A (en) Data forming device and data safety management method
CN102436567B (en) Information processing device, password diagnosing method
US20120284535A1 (en) Information processing apparatus capable of reducing labor for data management operation, and data management method and storage medium therefor
TWI497342B (en) Policy group based file protection system, file protection method thereof, and computer readable medium
US10380353B2 (en) Document security in enterprise content management systems
CN102902933A (en) File fragmentization processing based method for saving files
CN107797774A (en) Information processor and method
JP4506647B2 (en) Computer system
CN105095796A (en) Data storage system employing iris encryption
JP2002175210A (en) Method of transferring and copying, and enciphering and deciphering data
CN102665201A (en) Mobile terminal and user information encryption method for same
JP3400480B2 (en) Program analysis prevention device
JP2009110215A (en) Thin client system, data editing method therefor, and data editing program
CN105069338A (en) Information storage method adopting iris authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant