CN107426151B - File decryption method and device - Google Patents

File decryption method and device Download PDF

Info

Publication number
CN107426151B
CN107426151B CN201710210488.4A CN201710210488A CN107426151B CN 107426151 B CN107426151 B CN 107426151B CN 201710210488 A CN201710210488 A CN 201710210488A CN 107426151 B CN107426151 B CN 107426151B
Authority
CN
China
Prior art keywords
client
service program
windows service
key
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710210488.4A
Other languages
Chinese (zh)
Other versions
CN107426151A (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Gaohang Intellectual Property Operation Co ltd
Henan Hezhong Xintai Technology Co ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710210488.4A priority Critical patent/CN107426151B/en
Publication of CN107426151A publication Critical patent/CN107426151A/en
Application granted granted Critical
Publication of CN107426151B publication Critical patent/CN107426151B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/544Buffers; Shared memory; Pipes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides a file decryption method and a device, comprising the following steps: receiving information of a request key sent by a client, wherein the key is positioned in a Windows service program, and the Windows service program and the client communicate through a named pipeline; and sending the key to the client side so that the client side can decrypt the encrypted file on the client side according to the key. The invention puts the decrypted key into the Windows service program, and the Windows service program and the software using the encrypted file are packaged and installed on the client side. And when the software is started, starting the Windows service program. And when the software needs to use the encrypted file, decrypting the encrypted file. The decrypted key is obtained from the Windows service program in an interprocess communication mode, so that the decrypted key is hidden more secretly, and the encryption effect is enhanced.

Description

File decryption method and device
Technical Field
The present invention relates to the field of information security, and in particular, to a file decryption method and apparatus.
Background
At present, with the development of information technology, various kinds of software are produced and widely applied to various fields. Information security issues are also becoming more prominent. Ensuring that information resources in an information network are protected from various types of threats, interference, and corruption is a problem of social concern.
Information is subject to the possibility of leakage or interception, eavesdropping, tampering and forgery during storage, processing and exchange, thus requiring security measures. For example, in the game live broadcast, live broadcast software carries out live broadcast by acquiring the content of a camera and the content of a computer. The live program is run using resource files such as picture files, script files, animation files, sound files, and the like. Resource files are typically encrypted in order to protect intellectual property, and decrypted when they are used. Thereby playing a role in protecting the resource files.
In the prior art, a key required for decryption is usually stored in a client code during decryption. However, it is not particularly secure to store the decrypted key in the client software, especially if it is very easy for a hacker to guess.
Disclosure of Invention
In order to overcome the problem that the decrypted key is not safely stored in the client software or at least partially solve the problem, the invention provides a file decryption method and a file decryption device.
According to a first aspect of the present invention, there is provided a file decryption method, comprising:
receiving information of a request key sent by a client, wherein the key is positioned in a Windows service program, and the Windows service program and the client communicate through a named pipeline;
and sending the key to the client side so that the client side can decrypt the encrypted file on the client side according to the key.
Specifically, the Windows service program and the client communicate through a named pipe, including:
creating the named pipe;
waiting for the client to connect the named pipe;
reading the information of the request key sent by the client through the named pipeline;
writing the key in the named pipe.
Specifically, before receiving the information of the request key sent by the client, the method further includes:
the existence of a process of client software is monitored.
Specifically, the process of monitoring whether the client software exists includes:
a thread is created to monitor whether a process of the client software exists.
Specifically, the monitoring whether the process of the client software exists includes:
acquiring a process name list in a system;
and inquiring whether the process name of the client software exists in the process name list.
Specifically, the monitoring whether the process of the client software exists includes:
and if the process of the client software does not exist, monitoring whether the process of the client software exists again every preset time.
According to a second aspect of the present invention, there is provided a file decryption method, comprising:
sending information of a request key to a Windows service program, wherein the key is positioned in the Windows service program, and the Windows service program and a client communicate through a named pipeline;
receiving a key sent by the Windows service program;
and decrypting the encrypted file on the client according to the key.
Specifically, the communication between the Windows service program and the client through the named pipe includes:
connecting the named pipelines created by the Windows service program;
waiting for the response of the Windows service program;
writing information of a request key into the named pipeline;
and reading the key sent by the Windows service program from the named pipeline.
According to a third aspect of the present invention, there is provided a file decryption apparatus comprising:
the system comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving information of a request key sent by a client, the key is positioned in a Windows service program, and the Windows service program and the client communicate through a named pipeline;
and the first sending unit is used for sending the key to the client so that the client can decrypt the encrypted file on the client according to the key.
According to a fourth aspect of the present invention, there is provided a file decryption apparatus comprising:
the second sending unit is used for sending the information of the request key to a Windows service program, the key is positioned in the Windows service program, and the Windows service program and the client communicate through a named pipeline;
the second receiving unit is used for receiving the key sent by the Windows service program;
and the decryption unit is used for decrypting the encrypted file on the client according to the key.
The invention puts the decrypted key into the Windows service program, and the Windows service program and the software using the encrypted file are packaged and installed on the client side. And when the client software is started, starting the Windows service program. And when the software needs to use the encrypted file, decrypting the encrypted file. The decrypted key is obtained from the Windows service program in an interprocess communication mode, so that the decrypted key is hidden more secretly, and the encryption effect is enhanced.
Drawings
FIG. 1 is a flowchart of a file decryption method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a file decryption method according to another embodiment of the present invention;
FIG. 3 is a block diagram of a file decryption apparatus according to an embodiment of the present invention;
fig. 4 is a structural diagram of a file decryption apparatus according to another embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Fig. 1 is a flowchart of a file decryption method according to an embodiment of the present invention. As shown in fig. 1, includes: s11, receiving the information of the request key sent by the client, wherein the key is located in the Windows service program, and the Windows service program and the client communicate through a named pipeline; and S12, sending the key to the client, so that the client can decrypt the encrypted file on the client according to the key.
In S11, the client is a program for providing local service to the client. The key is a parameter input in a decryption algorithm and is a decrypted key. The Windows service program is used for storing the decrypted key. The Windows service program and the client communicate through a named pipe. But is not limited in this manner. The named pipeline completes the communication between the processes through the network, shields the details of the underlying network protocol, and only needs to be connected through a corresponding communication port in the process, thereby realizing the direct communication between the Windows service program and the client software. In S12, the file may be a picture file, a script file, an animation file, a sound file, or the like. The file needs to be encrypted before decryption. The file process may be encrypted using a public key generated by the RSA algorithm and the file may be decrypted using a private key generated by the RSA algorithm, but is not limited to such encryption algorithms. And the Windows service program receives the information of the request key sent by the client, and the key is positioned in the Windows service program. And the Windows service program receives the information of the request key sent by the client, encrypts the key and then sends the encrypted key to the client so that the client can decrypt the encrypted file on the client according to the key.
The method comprises the steps of firstly defining a SERVICE forwarding table structure, namely SERVICE _ TAB L E _ ENTRY SERVICE table, SERVICE table [0] lpServiceName ═ T (SERVICE _ NAME), SERVICE table [0] lpServiceProc ═ L PSERVICE _ MAIN _ FUNCTION) SERVICE _ MAIN, wherein the SERVICE forwarding table structure is SERVICE _ TAB L E _ ENTRY, defined variables are SERVICE table, the SERVICE forwarding table structure has 2 attributes, namely a SERVICE NAME and a callback FUNCTION, the SERVICE NAME is the NAME of the created Windows SERVICE, the callback FUNCTION points to an ENTRY FUNCTION of the Windows SERVICE, and the SERVICE API FUNCTION StartDictcher is called, parameters in the SERVICE forwarding table are written into the created SERVICE forwarding table, and the corresponding relation between the SERVICE NAME and the ENTRY FUNCTION is created.
Firstly, reading the file to a memory, namely FI L E file (foxen, rb), wherein fopen is a system library function, xxx is a file name of the file, and rb is a read file, moving a file pointer to the tail of the file, acquiring the size of the file, namely fseek (file,0, SEEK _ END), uint file (ftell) (file), calling a read function to read the whole file to the memory, and storing the whole file in a cache buf, namely, the read (1, file), and calling an RSA algorithm to decrypt the file, namely, RSA.
In this embodiment, the decrypted key is put into a Windows service program, and the Windows service program and the client software are packaged and installed to the client. And when the client software is started, starting the Windows service. And when the client software needs to use the file, decrypting the file. The decrypted key is obtained from the Windows service program in an interprocess communication mode, so that the decrypted key is hidden more secretly, and the encryption effect is enhanced.
On the basis of the foregoing embodiments, in this embodiment, the communicating between the Windows service program and the client via a named pipe includes: creating the named pipe; waiting for the client to connect the named pipe; reading the information of the request key sent by the client through the named pipeline; writing the key in the named pipe.
Specifically, the Windows service program establishes communication connection with the client in a form of constructing a named pipe. Firstly, the Windows service program calls the Windows api function CreateNamedPipe to create a named pipe, and it should be noted that the name of the named pipe can be set at will as long as it is not renamed with the pipe of other processes of the system. And then waits for the connection of the client by calling the function ConnectNamedPipe. The Windows service program calls a function ReadFile to read the information sent by the client and writes the key into the named pipeline by calling a function WriteFile, wherein the key can be encrypted, so that the key is sent to the client so that the client can decrypt the encrypted file on the client according to the key.
In this embodiment, the data communication between the Windows service and the client is realized by constructing a named pipe, and a bottom network protocol is shielded, so that the direct communication between the Windows service program and the client is realized, but not limited to this communication manner.
On the basis of the above embodiments, before receiving the information of the request key sent by the client, a process of monitoring whether client software exists is further included.
And packaging the written Windows service program and the client software into an installation program together before decryption. The Windows service program creates a thread to monitor whether a process of the client software exists. And if the process of the client software does not exist, monitoring whether the process of the client software exists again every preset time. When the client software is started, the thread monitors the progress of the client software, and the Windows service is also started. And when the Windows service is stopped, stopping the execution of the thread and releasing the thread, thereby finishing the cleaning work of the Windows service, such as releasing resources and the like.
The method comprises the steps of writing a callback FUNCTION of the Windows SERVICE STOP in an entry FUNCTION of the Windows SERVICE, and simultaneously creating a thread to monitor whether a process of the client software exists, wherein a FUNCTION RegisterServiceCtrLHandler is used for registering a callback FUNCTION of the Windows SERVICE, the FUNCTION prototype of which is SERVICE _ STATUS _ HAND L E WINDOW API RegisterServictCtrLHandler (L PCTSTRlpServiceName, &lTtTtranslation = L "& &gggTtTtTtTtTtTtPHTtPHR L ER _ FUNCTIONlpHandProc), wherein the L PCTR laceName represents a SERVICE name, the TS L PHTRYPREJFUNCTIONlpHandProc represents a FUNCTION of the SERVICE, the callback FUNCTION pointing to the API FUNCTION of the Windows SERVICE STOP, namely pSpStuceServiceName (pSTRVItJNV _ Controll), the call is used for controlling the execution of the Windows SERVICE STOP call, and the call of the Windows SERVICE call is called by the Windows thread call entry FUNCTION of the Windows SERVICE STOP program, wherein the DWORD SERVICE call control thread TYPROD (DWORD _ NUT _ PAStWINDOW _ PASTRORD) FUNCTION is used for monitoring the call, the call when the call of the Windows SERVICE STOP FUNCTION of the Windows SERVICE exists, the Windows SERVICE call of the Windows SERVICE STOP FUNCTION of the Windows thread call of the Windows thread of the Windows SERVICE STOP type of the Windows thread of the Windows SERVICE STOP FUNCTION of the Windows thread of the Windows SERVICE STOP type.
In this embodiment, the server monitors whether the client software is started by creating a thread. When the client software is started, the services of the Windows are also started. When the Windows service is stopped, the execution of the thread is stopped and the thread is released. The Windows service is started for decryption when the client software is started, and the effect of confidentiality is enhanced. And when the Windows service is stopped, stopping the thread, releasing the resources and reducing the waste of the resources.
On the basis of the foregoing embodiments, in this embodiment, monitoring whether a process of the client software exists includes acquiring a process name list in a system; and inquiring whether the process name of the client software exists in the process name list.
The Windows service program acquires a snapshot of a process name list in a system and then acquires a first process name in the snapshot of the process name list. And acquiring other process names in the system according to the first process name, thereby acquiring a process name list of the process currently running. The process names are the process names of all threads currently running. And inquiring whether the process name of the client software exists in the process name list, namely monitoring whether the process of the client software exists in the current process. And if the process name of the client software exists, starting the Windows service. And if the process name of the client software does not exist, acquiring a process name list in the system again at intervals of preset time, and then inquiring whether the process name of the client software exists in the process name list. And if the process name list does not exist, continuing to wait for the preset time length and then acquiring the process name list in the system again. And if so, starting the Windows service.
Specifically, the Windows service program First obtains a Snapshot of a Process name list in the system by calling a system API function CreateToolhelp32 snaphot (TH32CS _ snap LL, 0), wherein TH32 _ snap represents that a Snapshot of the Process name list is obtained, and then obtains a First Process name from the Snapshot of the Process name list by calling a system API function Process32First, that is, a Process32First (hsnshot, & proctry 32), wherein a First parameter hsnshel is a handle of the obtained Snapshot, and & proctrey 32 is used for returning information of the obtained Process, and an attribute szeefile of the proctrey 32 is a Process name, that is, a Process 32. szecheny service program obtains a Process name in a Process name list, that is, a Process name of a Process name list, and then, if the Process name list is obtained by calling a procedure API function call command, the Process name list is obtained by calling a procedure server API function call, and if the Process name of the Process name list is found in the procedure server call, the procedure server call procedure name list is obtained by calling a procedure server API function netpage name, and then, the procedure call server call a procedure name of the procedure call server API function call, wherein the Process name of a procedure call is found in the procedure name list of a procedure 5932 Process name of a procedure server name of a procedure found in the Process name of a procedure found in the procedure server.
In this embodiment, a process name list in the system is obtained, and whether a process name of the client software exists is queried in the process name list, so that the client software is monitored for starting. When the software is monitored to be started, the Windows service is started, the file is decrypted, and the security effect is enhanced.
Fig. 2 is a flowchart of a file decryption method according to an embodiment of the present invention. As shown in fig. 2, includes: s21, sending the information of the request key to a Windows service program, wherein the key is located in the Windows service program, and the Windows service program and the client communicate through a named pipeline; s22, receiving the key sent by the Windows service program; and S23, decrypting the encrypted file on the client according to the key.
In S21, the Windows service program is used as a server. The key is a parameter input in a decryption algorithm and is a decrypted key. The Windows service program is used for storing the decrypted key. The Windows service program and the client communicate through a named pipe. But is not limited in this manner. The named pipeline completes the communication between the processes through the network, shields the details of the underlying network protocol, and only needs to be connected through a corresponding communication port in the process, thereby realizing the direct communication between the Windows service program and the client software. In S22, the file may be a picture file, a script file, an animation file, a sound file, or the like. In S23, the decryption may be performed by calling a corresponding function according to an encryption algorithm. The key is located in the Windows service program. When the software on the client needs to use the file, if the file is encrypted, the client sends the information of the request key to the Windows service program. And after receiving the encrypted key sent by the Windows service program, the client reads the resource file into the memory, and transmits the key as a parameter to the called decryption function, so that the resource is decrypted.
In this embodiment, the decrypted key is put into a Windows service program, and the Windows service program and the client software are packaged and installed to the client. And when the client software is started, starting the Windows service program. And when the client software needs to use the file, decrypting the file. The decrypted key is obtained from the Windows service program in an interprocess communication mode, so that the decrypted key is hidden more secretly, and the encryption effect is enhanced.
On the basis of the foregoing embodiment, in this embodiment, the communicating between the Windows service program and the client through the named pipe includes: connecting the named pipelines created by the Windows service program; waiting for the response of the Windows service program; writing information of a request key into the named pipeline; and reading the key sent by the Windows service program from the named pipeline.
Specifically, the client connects the named pipes by calling a function CreateFile. And calling a function ConnectNamedPipe to wait for the response of the Windows service program, and calling a function WriteFile to write the information of the request key into the named pipeline after the client receives the response of the Windows service program through the named pipeline. The client calls the function ReadFile to read the key sent by the Windows service program from the pipe, and the key may be encrypted. And the client decrypts the key to obtain an original value, so that the file is decrypted.
In this embodiment, the data communication between the Windows service and the client is realized by constructing a named pipe, and a bottom network protocol is shielded, so that the direct communication between the Windows service program and the client is realized, but not limited to this communication manner.
Fig. 3 is a structural diagram of a file decryption apparatus according to an embodiment of the present invention, as shown in fig. 3, including a first receiving unit 11 and a second sending unit 12, where: the first receiving unit 11 is configured to receive information of a request key sent by a client, where the key is located in a Windows service program, and the Windows service program and the client communicate through a named pipe; the first sending unit 12 is configured to send the key to the client, so that the client decrypts the encrypted file on the client according to the key.
Specifically, the client refers to a program for providing local services for the client. The key is a parameter input in a decryption algorithm and is a decrypted key. The Windows service program is used for storing the decrypted key. The file may be a picture file, a script file, an animation file, a sound file, etc. The file needs to be encrypted before decryption. The file process may be encrypted using a public key generated by the RSA algorithm and the file may be decrypted using a private key generated by the RSA algorithm, but is not limited to such encryption algorithms. And the Windows service program receives the information of the request key sent by the client, and the key is positioned in the Windows service program. The Windows service program and the client communicate through a named pipe. But is not limited in this manner. After the receiving unit 11 receives the information of the request key sent by the client, the sending unit 12 encrypts the key and sends the encrypted key to the client, so that the client can decrypt the encrypted file on the client according to the key.
In this embodiment, the decrypted key is put into a Windows service program, and the Windows service program and the client software are packaged and installed to the client. And when the client software is started, starting the Windows service. And when the client software needs to use the file, decrypting the file. The decrypted key is obtained from the Windows service program in an interprocess communication mode, so that the decrypted key is hidden more secretly, and the encryption effect is enhanced.
Fig. 4 is a structural diagram of a file decryption apparatus according to an embodiment of the present invention, as shown in fig. 4, including a second sending unit 21, a second receiving unit 22, and a decryption unit 23, where: the second sending unit 21 is configured to send information of a request key to a Windows service program, where the key is located in the Windows service program, and the Windows service program communicates with a client through a named pipe; the second receiving unit 22 is configured to receive a key sent by the Windows service program; the decryption unit 23 is configured to decrypt the encrypted file on the client according to the key.
Specifically, the Windows service program is used as a server. The key is a parameter input in a decryption algorithm and is a decrypted key. The Windows service program is used for storing the decrypted key. The file may be a picture file, a script file, an animation file, a sound file, etc. The decryption may be performed by calling a corresponding function according to an encryption algorithm. The key is located in the Windows service program. The Windows service program and the client communicate through a named pipe. But is not limited in this manner. When the software on the client needs to use the file, if the file is encrypted, the second sending unit 21 sends the information requesting the key to the Windows service program. After the second receiving unit 22 receives the encrypted key sent by the Windows service program, the decryption unit 23 reads the resource file into the memory, and transfers the key as a parameter to the called decryption function, thereby implementing decryption of the resource.
In this embodiment, the decrypted key is put into a Windows service program, and the Windows service program and the client software are packaged and installed to the client. And when the client software is started, starting the Windows service program. And when the client software needs to use the file, decrypting the file. The decrypted key is obtained from the Windows service program in an interprocess communication mode, so that the decrypted key is hidden more secretly, and the encryption effect is enhanced.
Finally, the method of the present application is only a preferred embodiment and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method for decrypting a file, comprising:
receiving information of a request key sent by a client, wherein the key is positioned in a Windows service program, the Windows service program and the client communicate through a named pipeline, and the Windows service program and software on the client are packaged and installed on the client;
sending the key to the client side so that the client side can decrypt the encrypted file on the client side according to the key;
before the receiving the information of the request key sent by the client, the method further comprises the following steps:
the Windows service program creating thread monitors whether a process of client software exists or not; if the process of the client software is judged to exist, starting the Windows service program; and when the Windows service program is stopped, stopping the execution of the thread and releasing the thread.
2. The file decryption method of claim 1, wherein the Windows service program and the client communicate via a named pipe, comprising:
creating the named pipe;
waiting for the client to connect the named pipe;
reading the information of the request key sent by the client through the named pipeline;
writing the key in the named pipe.
3. The file decryption method according to claim 1 or 2, wherein the process of monitoring whether the client software exists comprises:
acquiring a process name list in a system;
and inquiring whether the process name of the client software exists in the process name list.
4. The file decryption method according to claim 1 or 2, wherein the process of monitoring whether the client software exists comprises:
and if the process of the client software does not exist, monitoring whether the process of the client software exists again every preset time.
5. A method for decrypting a file, comprising:
sending information of a request key to a Windows service program, wherein the key is positioned in the Windows service program, the Windows service program and a client communicate through a named pipeline, and the Windows service program and software on the client are packaged and installed on the client;
receiving a key sent by the Windows service program;
and decrypting the encrypted file on the client according to the key.
6. The file decryption method of claim 5, wherein the Windows service program and the client communicate through a named pipe, comprising:
connecting the named pipelines created by the Windows service program;
waiting for the response of the Windows service program;
writing information of a request key into the named pipeline;
and reading the key sent by the Windows service program from the named pipeline.
7. A file decryption apparatus, comprising:
the system comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving information of a request key sent by a client, the key is positioned in a Windows service program, the Windows service program and the client communicate through a named pipeline, and the Windows service program and software on the client are packaged and installed on the client;
the first sending unit is used for sending the key to the client so that the client can decrypt the encrypted file on the client according to the key;
the monitoring unit is used for establishing a thread to monitor whether a process of the client software exists or not; if the process of the client software is judged to exist, starting the Windows service program; and when the Windows service program is stopped, stopping the execution of the thread and releasing the thread.
8. A file decryption apparatus, comprising:
the second sending unit is used for sending the information of the request key to a Windows service program, the key is positioned in the Windows service program, the Windows service program and the client side communicate through a named pipeline, and the Windows service program and the software on the client side are packaged and installed on the client side;
the second receiving unit is used for receiving the key sent by the Windows service program;
and the decryption unit is used for decrypting the encrypted file on the client according to the key.
CN201710210488.4A 2017-03-31 2017-03-31 File decryption method and device Active CN107426151B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710210488.4A CN107426151B (en) 2017-03-31 2017-03-31 File decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710210488.4A CN107426151B (en) 2017-03-31 2017-03-31 File decryption method and device

Publications (2)

Publication Number Publication Date
CN107426151A CN107426151A (en) 2017-12-01
CN107426151B true CN107426151B (en) 2020-07-31

Family

ID=60423546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710210488.4A Active CN107426151B (en) 2017-03-31 2017-03-31 File decryption method and device

Country Status (1)

Country Link
CN (1) CN107426151B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055356B (en) * 2018-01-08 2021-03-16 武汉斗鱼网络科技有限公司 Information processing method, server, client and readable storage medium
CN111182010B (en) * 2018-11-09 2023-04-07 杭州海康威视数字技术股份有限公司 Local service providing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831346A (en) * 2012-07-31 2012-12-19 深圳市紫色力腾科技发展有限公司 Method and system for file protection
CN104601579A (en) * 2015-01-20 2015-05-06 成都市酷岳科技有限公司 Computer system for ensuring information security and method thereof

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098224B (en) * 2006-06-28 2010-08-25 中色科技股份有限公司 Method for encrypting/deciphering dynamically data file
CN100449560C (en) * 2006-09-26 2009-01-07 南京擎天科技有限公司 Computer data security protective method
WO2010071843A1 (en) * 2008-12-19 2010-06-24 Privatetree, Llc. Systems and methods for facilitating relationship management
CN102004890B (en) * 2010-12-07 2013-04-03 武汉大学 Network environment-based universal digital copyright protection method
US9742559B2 (en) * 2013-01-22 2017-08-22 Qualcomm Incorporated Inter-module authentication for securing application execution integrity within a computing device
CN104573554A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method for loading safety key storage hardware and browser client device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831346A (en) * 2012-07-31 2012-12-19 深圳市紫色力腾科技发展有限公司 Method and system for file protection
CN104601579A (en) * 2015-01-20 2015-05-06 成都市酷岳科技有限公司 Computer system for ensuring information security and method thereof

Also Published As

Publication number Publication date
CN107426151A (en) 2017-12-01

Similar Documents

Publication Publication Date Title
CN108733455B (en) Container isolation enhancing system based on ARM TrustZone
US20140096230A1 (en) Method and system for sharing vpn connections between applications
CN105227565B (en) The method and apparatus that anti-reversing for Android system cracks shared object file
CN111339543B (en) File processing method and device, equipment and storage medium
KR20120050742A (en) Apparatus and method for managing digital rights through hooking process of kernel native api
CN111274611A (en) Data desensitization method, device and computer readable storage medium
KR20170142672A (en) Computing apparatus based on trusted execution environment
CN110519203B (en) Data encryption transmission method and device
CN107426151B (en) File decryption method and device
CN110807191B (en) Safe operation method and device of application program
CN117992993B (en) Data management and control method and system based on trusted execution environment
JP2010282242A (en) Access control system, access control method, and access control program
CN112751866B (en) Network data transmission method and system
CN112115500A (en) Method, device and system for accessing file
CN111814084A (en) Data access management method, device and system
US10140431B2 (en) File management system and user terminal in file management system
US10284586B1 (en) Data loss prevention techniques for applications with save to web functionality
WO2024000988A1 (en) Blockchain monitoring method and apparatus, device, and storage medium
CN110768990A (en) Data transmission method, system, equipment and computer readable storage medium
CN110020533B (en) Safety protection method for VR resources and terminal
CN115514757A (en) Data security processing method and device
CN104954223B (en) Data processing method and device based on Virtual Private Network
CN110417638B (en) Communication data processing method and device, storage medium and electronic device
CN109246085B (en) Anonymous network access method, client, system, server and medium
JP5835022B2 (en) Distribution apparatus, distribution processing method and program, information processing apparatus, information processing method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230616

Address after: 510000 2414-2416 of the main building 371, five mountain road, Tianhe District, Guangzhou, Guangdong.

Patentee after: GUANGDONG GAOHANG INTELLECTUAL PROPERTY OPERATION Co.,Ltd.

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.

Effective date of registration: 20230616

Address after: No. 0901, 9th Floor, Building 9, Business Inner Ring Road, Zhengzhou Area (Zhengdong), Zhengzhou Pilot Free Trade Zone, 450000 Henan Province

Patentee after: Henan Hezhong Xintai Technology Co.,Ltd.

Address before: 510000 2414-2416 of the main building 371, five mountain road, Tianhe District, Guangzhou, Guangdong.

Patentee before: GUANGDONG GAOHANG INTELLECTUAL PROPERTY OPERATION Co.,Ltd.