CN109299611A - File encrypting method, device, equipment/terminal/server and computer readable storage medium - Google Patents

File encrypting method, device, equipment/terminal/server and computer readable storage medium Download PDF

Info

Publication number
CN109299611A
CN109299611A CN201810978593.7A CN201810978593A CN109299611A CN 109299611 A CN109299611 A CN 109299611A CN 201810978593 A CN201810978593 A CN 201810978593A CN 109299611 A CN109299611 A CN 109299611A
Authority
CN
China
Prior art keywords
file
encryption
encrypted
type
setting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810978593.7A
Other languages
Chinese (zh)
Inventor
姚若旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ucweb Singapore Pte Ltd
Original Assignee
Ucweb Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ucweb Singapore Pte Ltd filed Critical Ucweb Singapore Pte Ltd
Priority to CN201810978593.7A priority Critical patent/CN109299611A/en
Priority to PCT/IB2018/057162 priority patent/WO2020044095A1/en
Publication of CN109299611A publication Critical patent/CN109299611A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides a kind of file encrypting method, device, equipment/terminal/server and computer readable storage medium, wherein, file encrypting method comprises determining that file to be encrypted is not stored under system folder, wherein is stored with privacy of user data in the file to be encrypted;According to setting encryption rule, the data content of the file to be encrypted is encrypted, and setting encryption type is set by the file type of the file to be encrypted after the encryption, wherein, the setting encryption type is corresponding with the setting encryption rule, and the setting encryption type is used to indicate the file to be encrypted and encrypts by the setting encryption rule;According to after encryption the data content and the modified file type, generate encryption file.By the embodiment of the present application, the safety of the privacy of user data of smart machine can be effectively ensured, take precautions against privacy of user leaking data.

Description

File encrypting method, device, equipment/terminal/server and computer-readable storage Medium
Technical field
The invention relates to technical field of data processing more particularly to a kind of file encrypting method, device, equipment/ Terminal/server and computer readable storage medium.
Background technique
Currently, smart machine is more more and more universal in daily life, with universal, the following data of smart machine Safety problem has been attracting more and more attention of people.
A large amount of privacy of user data are preserved in smart machine, e.g., identity data, behavioral data, the medical number of user According to or user's other data to be protected etc., and the problem of data safety that smart machine faces is also varied, for example, There is the threat of the hacker attack for carrying out automatic network, poisoning intrusion etc. bring data safety;Also have in intelligent device management Problem of data safety caused by loophole and the intensity of access right control are inadequate;There are also the management of the storage equipment of high confidential data Brought security risk.
Therefore, safety, the prevention leakage for how protecting the privacy of user data of smart machine, become urgently to be resolved and ask Topic.
Summary of the invention
In view of this, one of the technical issues of the embodiment of the present application is solved is to provide a kind of file encrypting method, dress It sets, equipment/terminal/server and computer readable storage medium, to guarantee the safety of privacy of user data.
According to the embodiment of the present application in a first aspect, providing a kind of file encrypting method, comprising: determine file to be encrypted It is not stored under system folder, wherein be stored with privacy of user data in the file to be encrypted;According to setting encryption rule Then, the data content of the file to be encrypted is encrypted, and by the file to be encrypted after the encryption File type be set as setting encryption type, wherein the setting encryption type is corresponding with the setting encryption rule, institute It states setting encryption type and is used to indicate the file to be encrypted by setting encryption rule encryption;After encryption The data content and the modified file type generate encryption file.
According to the second aspect of the embodiment of the present application, a kind of document encrypting apparatus is additionally provided, comprising: determining module is matched It is set to and determines that file to be encrypted is not stored under system folder, wherein be stored with privacy of user number in the file to be encrypted According to;Encrypting module is configured to that the data content of the file to be encrypted is encrypted according to setting encryption rule, and Setting encryption type is set by the file type of the file to be encrypted after the encryption, wherein the setting adds Close type is corresponding with the setting encryption rule, and the setting encryption type is used to indicate described in the file process to be encrypted Set encryption rule encryption;Generation module is configured to according to the data content and the modified text after encryption Part type generates encryption file.
According to the third aspect of the embodiment of the present application, a kind of equipment/terminal/server is additionally provided, comprising: one or more A processor;Storage device is configured to store one or more programs;When one or more of programs are by one or more A processor executes, so that one or more of processors realize file encrypting method as described in relation to the first aspect.
According to the fourth aspect of the embodiment of the present application, a kind of computer readable storage medium is additionally provided, is stored thereon with Computer program realizes file encrypting method as described in relation to the first aspect when the program is executed by processor.
Pass through file encryption scheme provided by the embodiments of the present application, it is first determined do not save under system folder to be encrypted File is leaked to avoid the file to be encrypted for preserving privacy of user data by system folder;Then, it is encrypted according to setting Rule carries out encryption to the data content of file to be encrypted and sets setting encryption type for its file type, which adds Close type is different from conventional file type, corresponding with setting encryption rule, is used to indicate current file and has passed through setting and adds Close rule encryption, thus, on the one hand, encrypted file is difficult by general procedure identification and reads, and improves secrecy, another Aspect can also understand label encryption rule, to provide information for subsequent decryption;Finally, according to the data content after encryption With modified file type, corresponding encryption file is generated.As it can be seen that passing through file encryption side provided by the embodiments of the present application The safety of the privacy of user data of smart machine can be effectively ensured in case, take precautions against privacy of user leaking data.
Detailed description of the invention
The some specific of the embodiment of the present application is described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter Embodiment.Identical appended drawing reference denotes same or similar part or part in attached drawing.Those skilled in the art should manage Solution, the drawings are not necessarily drawn to scale.In attached drawing:
Fig. 1 is the step flow chart according to a kind of file encrypting method of the embodiment of the present application one;
Fig. 2 is the step flow chart according to a kind of file encrypting method of the embodiment of the present application two;
Fig. 3 is the structural block diagram according to a kind of document encrypting apparatus of the embodiment of the present application three;
Fig. 4 is the structural block diagram according to a kind of document encrypting apparatus of the embodiment of the present application four;
Fig. 5 is the structural schematic diagram according to a kind of equipment/terminal/server of the embodiment of the present application five.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present application, below in conjunction with the application Attached drawing in embodiment, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described reality Applying example only is the embodiment of the present application a part of the embodiment, instead of all the embodiments.Based on the implementation in the embodiment of the present application The range of the embodiment of the present application protection all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
Embodiment one
Referring to Fig.1, a kind of step flow chart of file encrypting method according to the embodiment of the present application one is shown.
The file encrypting method of the present embodiment the following steps are included:
Step S102: determine that file to be encrypted is not stored under system folder.
Wherein, privacy of user data are stored in file to be encrypted.Privacy of user data include but is not limited to the body of user Part data, behavioral data, medical data or user's other data to be protected etc..
For different operating system, it is provided with different system folders, to save associated documents, for example, System media library of android system etc., wherein containing the association attributes etc. of all particular media files in user equipment.
Step S104: according to setting encryption rule, the data content of file to be encrypted is encrypted, and is encrypting Setting encryption type is set by the file type of file to be encrypted after processing.
Wherein, setting encryption type is corresponding with setting encryption rule, and setting encryption type is used to indicate file to be encrypted By setting encryption rule encryption.Different setting encryption rules correspond to different setting encryption types, the setting encryption type Different from conventional file type, can be somebody's turn to do by those skilled in the art's customized any suitable character string characterization as needed Encryption type.
Setting encryption rule can download use from server, can also be used with locally downloading rear load.It will setting Encryption rule is corresponding with setting encryption type, on the one hand, encryption rule can be reflected by encryption type, it can in subsequent decryption Directly acquire or using encryption rule corresponding with encryption type information, with to encryption file quick, accurate decryption offer Foundation;On the other hand, if having updated encryption rule in server end, encryption type is correspondingly also updated, client detects There is new encryption type to generate, that is, can determine that encryption rule is updated, to download new encryption from server end again Rule uses, and improves encryption efficiency and degree of safety.
Step S106: according to after encryption data content and modified file type, generate encryption file.
It is encrypted in the data content to file to be encrypted, and has modified the file type of file to be encrypted Afterwards, that is, final encryption file is produced.
The file encryption scheme provided through this embodiment, it is first determined do not save ciphertext to be added under system folder Part is leaked to avoid the file to be encrypted for preserving privacy of user data by system folder;Then, according to setting encryption rule Then, encryption is carried out to the data content of file to be encrypted and sets setting encryption type, setting encryption for its file type Type is different from conventional file type, corresponding with setting encryption rule, is used to indicate current file and has passed through setting encryption Rule encryption, thus, on the one hand, encrypted file is difficult by general procedure identification and reads, and improves secrecy, another party Face can also understand label encryption rule, to provide information for subsequent decryption;Finally, according to after encryption data content and Modified file type generates corresponding encryption file.It, can be with as it can be seen that the file encryption scheme provided through this embodiment The safety of the privacy of user data of smart machine is effectively ensured, takes precautions against privacy of user leaking data.
The file encrypting method of the present embodiment can be executed by any suitable equipment with data-handling capacity, including But it is not limited to: various terminal equipment or server, e.g., PC machine, tablet computer, mobile terminal etc..
Embodiment two
Referring to Fig. 2, a kind of step flow chart of file encrypting method according to the embodiment of the present application two is shown.
The file encrypting method of the present embodiment the following steps are included:
Step S202: check whether preserve file to be encrypted under system folder;If so, by file to be encrypted from being It is removed under system file, then executes step S204;If it is not, then directly executing step S204.
Wherein, privacy of user data are stored in file to be encrypted.
For example, file to be encrypted is removed (if there is) from system media library, if there is no should be in system media library File is encrypted, then this step can be ignored.First ensure that as a result, file to be encrypted not in system media library, after being encrypted, just Will not occur again in system media library, can avoid privacy of user data and leaked by system media library.
By this step, it can determine whether file to be encrypted is stored under system folder, and when there is preservation by it It removes, executes subsequent step when without saving, to realize the determination not being stored under system folder to file to be encrypted.
Step S204: according to setting encryption rule, the data content of file to be encrypted is encrypted, and is adding Setting encryption type is set by the file type of file to be encrypted after close processing.
Wherein, setting encryption type is corresponding with setting encryption rule, and setting encryption type is used to indicate file to be encrypted By setting encryption rule encryption.
In a kind of feasible pattern, this step be may be implemented are as follows: obtain setting encryption rule, wherein setting encryption rule The information of information and encryption type including Encryption Algorithm;According to the Encryption Algorithm that the information of Encryption Algorithm indicates, to be encrypted The data content of file is encrypted;Then, the information that the file type of file to be encrypted is set as encryption type is referred to The encryption type shown.
The data content of file to be encrypted indicates the actual content of file to be encrypted, include but is not limited to be recorded in it is to be encrypted Privacy of user data in file etc..Encryption Algorithm and encryption type can be appropriate according to actual needs by those skilled in the art Setting, with no restriction to this, e.g., Encryption Algorithm can be any suitable symmetric encipherment algorithm, asymmetric to the embodiment of the present application Encryption Algorithm, HASH Encryption Algorithm, etc..
In a kind of feasible pattern, setting setting encryption type for the file type of file to be encrypted may include: pair The file attribute information of file to be encrypted carries out type and handles, wherein type is gone to handle the original for removing file to be encrypted Beginning file type information;After carrying out type processing, setting encryption type is set by the file type of file to be encrypted.It is logical The processing of past type can hide the original file type of file to be encrypted in encryption, be not easy identified and read, improve encryption Degree;And in decryption, and its original file type can be restored with fast resolving, improve decryption oprerations efficiency.Wherein, type is gone Processing includes: to identify the original file type information of file to be encrypted in the file attribute information to file to be encrypted to obscure Operation, alternatively, adding to the original file type information for identifying file to be encrypted in the file attribute information of file to be encrypted It adds and determines character processing.Wherein, the setting character can be appropriately arranged with according to actual needs by those skilled in the art, including But be not limited to: character, number, symbol etc., the embodiment of the present application to this with no restriction.
Obscuring operation is a kind of information protective technology, the character combination expressed the meaning such as title can be replaced with meaningless Character combination.In the embodiment of the present application, carry out obscuring operation, a side by carrying out obscuring operation to original file type information Face can remove the information of the original file type of file to be encrypted, on the other hand, also play data guarantor to a certain extent Shield effect.And by way of addition setting character processing, then it is simple easily to realize, not only reached secrecy purpose, but also reduce reality Ready-made.
For example, there is no after file to be encrypted in determining system media library, to the data content in file to be encrypted into Row encryption, such as local cipher or server for encrypting etc.;Then, the attribute information of file to be encrypted is carried out obscuring operation, It prevents external software from reading, e.g., there is the flag bit of a file type for indicating the file to be encrypted in file to be encrypted, it can be with The flag bit is obscured, or addition character removes original file type mark, it is subsequent in decryption, it can parse again Original file type out.By the process, the file type of file to be encrypted can be set to own private type and (set Determine encryption type), to indicate that the file to be encrypted is encrypted by the setting encryption rule.Own private type can be direct HardCode can also be issued to locally by server, convenient for expanding.Specifically, which can be in ciphertext to be added Own type suffix is added above the file type suffix of part, if cipher mode upgrades, can change this suffix name, The corresponding relationship that different suffix name and cipher mode upgrade can be issued from server.
Step S206: according to after encryption data content and modified file type, generate encryption file.
For example, currently the instruction of setting encryption rule uses des encryption algorithm and xyz encryption type, then it can be first to be added Data file in ciphertext part TEST carries out des encryption algorithm and is encrypted;Then, to the original document of file TEST to be encrypted The corresponding flag bit of type carries out obscuring operation, it is assumed that generates 12qi5 character string;Then, encryption text is produced according to aforesaid operations Part " TEST.12qi5.xyz " file and wherein data content are encrypted.
So far, the encryption to file to be encrypted and private data guard are realized, further, in order to further enhance adding Following optional step can also be performed in close effect.
Step S208: will be under the encryption file hiding of generation to setting hidden folder.
Wherein, setting hidden folder can be appropriately arranged with according to actual needs by those skilled in the art, and the application is real Example is applied to this with no restriction.
For example, hidden folder is set by the file where encrypting file, it optionally, can be with concealed encrypted file To under certain hidden folder of setting.Hereby it is achieved that the basic hiding and classification to encryption file is handled.
Still optionally further, following steps S210 can also be performed, it may be assumed that
Step S210: to hiding, treated encrypts file progress slicing treatment, the multiple encryption files slices of generation;It will be more A encryption file slice carries out out-of-order preservation.
For example, setting one size, then according to the size to encryption file carry out slicing treatment, it is every meet the size after It will be sliced, it is certainly, finally a piece of to be less than the size.
Wherein, in a kind of feasible pattern, it may include: that acquisition is used for that multiple encryption files, which are sliced, and carry out out-of-order save The random ordering rule of out-of-order storage file, is sliced multiple encryption files using random ordering rule and carries out out-of-order preservation.The random ordering Rule can be appropriately arranged with according to actual needs by those skilled in the art, can be stored in local, can also be stored in service Device is downloaded from server end when needed.
By the way that the further slice of file progress and out-of-order preservation will be encrypted, the strong encryption to file to be encrypted is realized.
Optionally, following step S212 can also be performed, it may be assumed that
Step S212: recording of encrypted information saves encryption information to server, alternatively, save to encryption file institute Under the different file of file.
Wherein, the encryption information includes: setting the information of encryption rule, the information of slicing treatment and out-of-order preservation Information.
The information of record setting encryption rule, can solve the encryption file for using the setting encryption rule subsequent Close processing;The information for recording slicing treatment, can restore file in subsequent determining number of sections and accordingly;The out-of-order preservation of record Information, can be in the subsequent arrangement that multiple slices are carried out with correct sequence, to restore file.
For example, the algorithm used a file encryption, slice etc., rule can will all be stored, and and This document is mapped, and different files may possess the combination of different operations.When decryption, adding for inquiry this document can be first gone Then close integrated mode generates decryption combination, is decrypted.
Meanwhile " key " of decryption is stored in another place different from file where encryption file, has prevented plus has solved Confidential information is placed on the leakage of information that a place may cause.User can effectively be encrypted any file, and serviced End only saves (if there is) key (to the cipher mode of this document, slice rule, out-of-order rule etc.), does not save encryption text Part, in addition to the user, nobody can decrypt file." key " must first be taken by needing to decrypt, and take " key " When a variety of verification conditions appropriate can also be set by those skilled in the art, with guarantee can only be legal acquisition.
Through this embodiment, file to be encrypted trace in system is removed first, is then first passed through to data content-encrypt, It receives and modifies the mode that file type, slice, out-of-order preservation etc. re-encrypt again, file to be encrypted is encrypted, it then will be close Key is saved in elsewhere to realize limited reversible paper access control.The privacy of user data of smart machine have been effectively ensured Safety, taken precautions against privacy of user leaking data.
The file encrypting method of the present embodiment can be executed by any suitable equipment with data-handling capacity, including But it is not limited to: various terminal equipment or server, e.g., PC machine, tablet computer, mobile terminal etc..The side of the embodiment of the present application The privacy that case is suitable for the local file of any equipment encrypts scene.
Embodiment three
Referring to Fig. 3, a kind of structural block diagram of document encrypting apparatus according to the embodiment of the present application three is shown.
The document encrypting apparatus of the present embodiment comprises determining that module 302, be configured to determine that file to be encrypted is not stored in be It unites under file, wherein privacy of user data are stored in file to be encrypted;Encrypting module 304 is configured to encrypt according to setting The data content of file to be encrypted is encrypted in rule, and by the file type of file to be encrypted after encryption It is set as setting encryption type, wherein setting encryption type is corresponding with setting encryption rule, and setting encryption type is used to indicate File to be encrypted is by setting encryption rule encryption;Generation module 306 is configured to according to the data content after encryption and repairs File type after changing generates encryption file.
The document encrypting apparatus of the present embodiment for realizing corresponding file encrypting method in aforesaid plurality of embodiment of the method, And the beneficial effect with corresponding embodiment of the method, details are not described herein.
Example IV
Referring to Fig. 4, a kind of structural block diagram of document encrypting apparatus according to the embodiment of the present application four is shown.
The document encrypting apparatus of the present embodiment comprises determining that module 402, be configured to determine that file to be encrypted is not stored in be It unites under file, wherein privacy of user data are stored in file to be encrypted;Encrypting module 404 is configured to encrypt according to setting The data content of file to be encrypted is encrypted in rule, and by the file type of file to be encrypted after encryption It is set as setting encryption type, wherein setting encryption type is corresponding with setting encryption rule, and setting encryption type is used to indicate File to be encrypted is by setting encryption rule encryption;Generation module 406 is configured to according to the data content after encryption and repairs File type after changing generates encryption file.
Optionally, encrypting module 404 includes: to obtain module 4042, is configured to obtain setting encryption rule, wherein setting Encryption rule includes the information of Encryption Algorithm and the information of encryption type;Content processing module 4044 is configured to be calculated according to encryption The Encryption Algorithm of the information instruction of method, is encrypted the data content of file to be encrypted;Type processing module 4046, matches It is set to the encryption type for setting the file type of file to be encrypted to the information instruction of encryption type.
Optionally, type processing module 4046 is configured to carry out at type the file attribute information of file to be encrypted Reason, wherein type is gone to handle the original file type information for removing file to be encrypted;It, will after carrying out type processing The file type of file to be encrypted is set as setting encryption type.
Optionally, going type processing includes: to believe the original file type for identifying file to be encrypted in file attribute information Breath carries out obscuring operation, alternatively, being added to the original file type information for identifying file to be encrypted in file attribute information Set character processing.
Optionally, the present embodiment document encrypting apparatus further include: hidden module 408 is configured to the encryption file that will be generated It hides to setting hidden folder.
Optionally, the document encrypting apparatus of the present embodiment further include: slice module 410, being configured to will in hidden module 408 The encryption file hiding of generation to setting hidden folder under after, to hide treated encryption file carry out slicing treatment, Generate multiple encryption file slices;Out-of-order module 412 is configured to for multiple encryption files to be sliced the out-of-order preservation of progress.
Optionally, out-of-order module 412 is configured to obtain the random ordering rule for out-of-order storage file, uses out-of-order rule Multiple encryption files are sliced and carry out out-of-order preservation.
Optionally, the document encrypting apparatus of the present embodiment further include: logging modle 414 is configured to recording of encrypted information, In, encryption information includes: setting the information of encryption rule, the information of slicing treatment and the out-of-order information saved;By encryption information It saves to server, alternatively, saving to the file different from file where encryption file.
Optionally it is determined that module 402, is configured to check whether preserve file to be encrypted under system folder;If so, File to be encrypted is removed under system folder;It is executed if it is not, then entering encrypting module 404.
The document encrypting apparatus of the present embodiment for realizing corresponding file encrypting method in aforesaid plurality of embodiment of the method, And the beneficial effect with correlation method embodiment, details are not described herein.
Embodiment five
Referring to Fig. 5, a kind of structural schematic diagram of equipment/terminal/server according to the embodiment of the present application five is shown, this Application specific embodiment does not limit the specific implementation of equipment/terminal/server.
As shown in figure 5, equipment/the terminal/server may include: processor (processor) 502, storage device 504。
Wherein:
Processor 502 can specifically execute the correlation in above-mentioned file encrypting method embodiment for executing program 506 Step.
Specifically, program 506 may include program code, which includes computer operation instruction.
Processor 502 may be central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present application Road.The one or more processors that equipment/terminal/server includes can be same type of processor, such as one or more CPU;It is also possible to different types of processor, such as one or more CPU and one or more ASIC.
Storage device 504 is configured to store one or more programs 506.Storage device 504 may be deposited comprising high-speed RAM Reservoir, it is also possible to further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 506 specifically can be used for so that processor 502 executes following operation: determining that file to be encrypted is not stored in is It unites under file, wherein privacy of user data are stored in file to be encrypted;According to setting encryption rule, to file to be encrypted Data content be encrypted, and after encryption by the file type of file to be encrypted be set as setting encryption class Type, wherein setting encryption type is corresponding with setting encryption rule, and setting encryption type is used to indicate file to be encrypted by institute State setting encryption rule encryption;According to after encryption data content and modified file type, generate encryption file.
In a kind of optional embodiment, program 506 be also used to so that processor 502 according to setting encryption rule, The data content of file to be encrypted is encrypted, and sets the file type of file to be encrypted to after encryption When setting encryption type, setting encryption rule is obtained, wherein setting encryption rule includes the information and encryption type of Encryption Algorithm Information;According to the Encryption Algorithm that the information of Encryption Algorithm indicates, the data content of file to be encrypted is encrypted;It will The file type of file to be encrypted is set as the encryption type of the information instruction of encryption type.
In a kind of optional embodiment, program 506 is also used to so that processor 502 is by the file of file to be encrypted When type is set as setting encryption type, type is carried out to the file attribute information of file to be encrypted and is handled, wherein goes type Handle the original file type information for removing file to be encrypted;After carrying out type processing, by the text of file to be encrypted Part type is set as setting encryption type.
In a kind of optional embodiment, going type processing includes: to identifying file to be encrypted in file attribute information Original file type information carry out obscuring operation, alternatively, to the original document for identifying file to be encrypted in file attribute information Type information is added setting character processing.
In a kind of optional embodiment, program 506 is also used to so that processor 502 is by the encryption file hiding of generation To setting hidden folder.
In a kind of optional embodiment, program 506 is also used to so that processor 502 is hidden in the encryption file that will be generated Hiding to setting hidden folder under after, to hide treated encryption file carry out slicing treatment, generate multiple encryption files Slice;Multiple encryption files are sliced and carry out out-of-order preservation.
In a kind of optional embodiment, program 506 is also used to so that processor 502 is sliced by multiple encryption files When carrying out out-of-order save, the random ordering rule for out-of-order storage file is obtained, multiple encryption files are sliced using out-of-order rule Carry out out-of-order preservation.
In a kind of optional embodiment, program 506 is also used to so that 502 recording of encrypted information of processor, wherein adds Confidential information includes: the information for setting encryption rule, the information of slicing treatment and the out-of-order information saved;Encryption information is saved To server, alternatively, saving to the file different from file where encryption file.
In a kind of optional embodiment, program 506 is also used to so that processor 502 is determining that file to be encrypted do not protect When being stored under system folder, check whether preserve file to be encrypted under system folder;If so, by file to be encrypted from It is removed under system folder;If it is not, then executing according to setting encryption rule, the data content of file to be encrypted is carried out at encryption Reason, and set the file type of file to be encrypted to after encryption to set the operation of encryption type.
In program 506 specific implementation of each step may refer to corresponding steps in above-mentioned file encrypting method embodiment and Corresponding description in unit, this will not be repeated here.It is apparent to those skilled in the art that for description convenience and Succinctly, the specific work process of the equipment and module of foregoing description, can refer to corresponding processes in the foregoing method embodiment and retouch It states, details are not described herein.
Equipment/terminal/server through this embodiment, it is first determined do not save ciphertext to be added under system folder Part is leaked to avoid the file to be encrypted for preserving privacy of user data by system folder;Then, according to setting encryption rule Then, encryption is carried out to the data content of file to be encrypted and sets setting encryption type, setting encryption for its file type Type is different from conventional file type, corresponding with setting encryption rule, is used to indicate current file and has passed through setting encryption Rule encryption, thus, on the one hand, encrypted file is difficult by general procedure identification and reads, and improves secrecy, another party Face can also understand label encryption rule, to provide information for subsequent decryption;Finally, according to after encryption data content and Modified file type generates corresponding encryption file.It, can be with as it can be seen that the file encryption scheme provided through this embodiment The safety of the privacy of user data of smart machine is effectively ensured, takes precautions against privacy of user leaking data.
It may be noted that all parts/step described in the embodiment of the present application can be split as more according to the needs of implementation The part operation of two or more components/steps or components/steps can also be combined into new component/step by multi-part/step Suddenly, to realize the purpose of the embodiment of the present application.
Particularly, according to the embodiment of the present application, above with reference to the process of flow chart description, to may be implemented as computer soft Part program.For example, the embodiment of the present application includes a kind of computer program product comprising carry on a computer-readable medium Computer program, the computer program include the program code for executing method shown in multiple embodiments of the method above. In such embodiments, which can be downloaded and installed from network by communications portion, and/or from removable Medium is unloaded to be mounted.When the computer program is executed by central processing unit (CPU), the side shown in the embodiment of the present application is executed The above-mentioned function of being limited in method.It should be noted that computer-readable medium described herein can be computer-readable letter Number medium or computer readable storage medium either the two any combination.Computer readable storage medium for example may be used To be, but be not limited to, electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above group It closes.The more specific example of computer readable storage medium can include but is not limited to: have being electrically connected for one or more conducting wires It connects, portable computer diskette, hard disk, random access memory device (RAM), read-only memory device (ROM), erasable type may be programmed Read-only memory device (EPROM or flash memory), optical fiber, portable compact disc read-only memory device (CD-ROM), light storage device Part, magnetic memory apparatus part or above-mentioned any appropriate combination.In this application, computer readable storage medium can be It is any to include or the tangible medium of storage program, the program can be commanded execution system, device or device using or with It is used in combination.And in this application, computer-readable signal media may include in a base band or as carrier wave one Divide the data-signal propagated, wherein carrying computer-readable program code.The data-signal of this propagation can use more Kind form, including but not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media It can also be any computer-readable medium other than computer readable storage medium, which can send, It propagates or transmits for by the use of instruction execution system, device or device or program in connection.Computer The program code for including on readable medium can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof Machine program code, described program design language --- --- such as Java that includes object oriented program language, Smalltalk, C++, further include conventional procedural programming language --- --- such as " C " language or similar programming Language.Program code can be executed fully on the user computer, partly execute on the user computer, be only as one Vertical software package executes, part executes on the remote computer or completely in remote computer on the user computer for part Or it is executed on server.In situations involving remote computers, remote computer can pass through the net of any kind Network --- --- it is connected to subscriber computer including local area network (LAN) or wide area network (WAN) --- ---, or, it may be connected to it is outer Portion's computer (such as being connected using ISP by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described unit also can be set in the processor, for example, can be described as: a kind of processor packet Include determination unit, encryption unit and generation unit.Wherein, the title of these units is not constituted under certain conditions to the list The restriction of member itself, for example, determination unit is also described as " determining that file to be encrypted is not stored under system folder Unit ".
As on the other hand, present invention also provides a kind of computer readable storage mediums, are stored thereon with computer journey Sequence realizes the method as described in above-mentioned any embodiment when the program is executed by processor.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in device described in above-described embodiment;It is also possible to individualism, and without in the supplying device.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the device, so that should Device: determine that file to be encrypted is not stored under system folder, wherein privacy of user data are stored in file to be encrypted; According to setting encryption rule, the data content of file to be encrypted is encrypted, and by ciphertext to be added after encryption The file type of part is set as setting encryption type, wherein setting encryption type is corresponding with setting encryption rule, setting encryption Type is used to indicate file to be encrypted and encrypts by the setting encryption rule;According to after encryption data content and modification File type afterwards generates encryption file.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (20)

1. a kind of file encrypting method, comprising:
Determine that file to be encrypted is not stored under system folder, wherein be stored with privacy of user number in the file to be encrypted According to;
According to setting encryption rule, the data content of the file to be encrypted is encrypted, and in the encryption Setting encryption type is set by the file type of the file to be encrypted afterwards, wherein the setting encryption type is set with described It is corresponding to determine encryption rule, the setting encryption type is used to indicate the file to be encrypted and adds by the setting encryption rule It is close;
According to after encryption the data content and the modified file type, generate encryption file.
2. it is described according to setting encryption rule according to the method described in claim 1, wherein, to the number of the file to be encrypted It is encrypted according to content, and sets setting encryption class for the file type of the file to be encrypted after encryption Type, comprising:
Obtain setting encryption rule, wherein the setting encryption rule includes the information of Encryption Algorithm and the information of encryption type;
According to the Encryption Algorithm that the information of the Encryption Algorithm indicates, the data content of the file to be encrypted is carried out at encryption Reason;
Set the file type of the file to be encrypted to the encryption type of the information instruction of the encryption type.
3. method according to claim 1 or 2, wherein the file type by the file to be encrypted is set as Determine encryption type, comprising:
It carries out type to the file attribute information of the file to be encrypted to handle, wherein described to go type processing for removing The original file type information of the file to be encrypted;
After going described in the progress type to handle, the setting encryption type is set by the file type of the file to be encrypted.
4. according to the method described in claim 3, wherein, described to go type processing include: to get the bid to the file attribute information The original file type information for knowing the file to be encrypted carries out obscuring operation, alternatively, to identifying in the file attribute information The original file type information of the file to be encrypted is added setting character processing.
5. method according to claim 1-4, wherein the method also includes:
It will be under the encryption file hiding of generation to setting hidden folder.
6. according to the method described in claim 5, wherein, hiding text in the encryption file hiding by generation to setting After part folder is lower, the method also includes:
To hiding that treated, the encryption file carries out slicing treatment, generates multiple encryption files and is sliced;
The multiple encryption file is sliced and carries out out-of-order preservation.
7. according to the method described in claim 6, wherein, described be sliced the multiple encryption file carries out out-of-order preservation, packet It includes:
The random ordering rule for out-of-order storage file is obtained, the multiple encryption file is sliced using the out-of-order rule and is carried out Random ordering saves.
8. according to the described in any item methods of claim 5-7, wherein the method also includes:
Recording of encrypted information, wherein the encryption information includes: information, the slicing treatment of the setting encryption rule Information and the out-of-order information saved;
The encryption information is saved to server, alternatively, saving to the file different from file where the encryption file Under folder.
9. method according to claim 1-8, wherein the determination file to be encrypted is not stored in system file Under folder, comprising:
It checks and whether preserves the file to be encrypted under system folder;
If so, the file to be encrypted is removed under the system folder;If it is not, then executing described according to setting encryption The data content of the file to be encrypted is encrypted in rule, and by the ciphertext to be added after the encryption The file type of part is set as the step of setting encryption type.
10. a kind of document encrypting apparatus, comprising:
Determining module is configured to determine that file to be encrypted is not stored under system folder, wherein deposit in the file to be encrypted Contain privacy of user data;
Encrypting module is configured to that the data content of the file to be encrypted is encrypted according to setting encryption rule, and Setting encryption type is set by the file type of the file to be encrypted after the encryption, wherein the setting adds Close type is corresponding with the setting encryption rule, and the setting encryption type is used to indicate described in the file process to be encrypted Set encryption rule encryption;
Generation module, be configured to according to after encryption the data content and the modified file type, generate plus Ciphertext part.
11. device according to claim 10, wherein the encrypting module includes:
Obtain module, be configured to obtain setting encryption rule, wherein it is described setting encryption rule include Encryption Algorithm information and The information of encryption type;
Content processing module is configured to the Encryption Algorithm indicated according to the information of the Encryption Algorithm, to the file to be encrypted Data content be encrypted;
Type processing module is configured to set the file type of the file to be encrypted to the information instruction of the encryption type Encryption type.
12. device described in 0 or 11 according to claim 1, wherein the type processing module is configured to described to be encrypted The file attribute information of file carries out type and handles, wherein described to go type processing for removing the file to be encrypted Original file type information;After going described in the progress type to handle, set described for the file type of the file to be encrypted Set encryption type.
13. device according to claim 12, wherein it is described go type processing include: in the file attribute information The original file type information for identifying the file to be encrypted carries out obscuring operation, alternatively, getting the bid to the file attribute information The original file type information for knowing the file to be encrypted is added setting character processing.
14. the described in any item devices of 0-13 according to claim 1, wherein described device further include:
Hidden module is configured under the encryption file hiding that will be generated to setting hidden folder.
15. device according to claim 14, wherein described device further include:
Be sliced module, be configured to the hidden module by the encryption file hiding of generation to setting hidden folder under it Afterwards, to hiding that treated, the encryption file carries out slicing treatment, generates multiple encryption files and is sliced;
Out-of-order module is configured to for the multiple encryption file to be sliced the out-of-order preservation of progress.
16. device according to claim 15, wherein the random ordering module is configured to obtain for out-of-order storage file Random ordering rule, random ordering preservation is carried out to the multiple encryption file slice using the out-of-order rule.
17. the described in any item devices of 4-16 according to claim 1, wherein described device further include:
Logging modle is configured to recording of encrypted information, wherein the encryption information includes: the information of the setting encryption rule, The information of the slicing treatment and the out-of-order information saved;The encryption information is saved to server, alternatively, saving To the file different from file where the encryption file.
18. the described in any item devices of 0-17 according to claim 1, wherein the determining module is configured to check system file Whether the to be encrypted file is preserved under folder;If so, the file to be encrypted is removed under the system folder;If It is no, then enter the encrypting module and executes.
19. a kind of equipment/terminal/server, comprising:
One or more processors;
Storage device is configured to store one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-9.
20. a kind of computer readable storage medium, is stored thereon with computer program, realized such as when which is executed by processor Any method in claim 1-9.
CN201810978593.7A 2018-08-27 2018-08-27 File encrypting method, device, equipment/terminal/server and computer readable storage medium Pending CN109299611A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810978593.7A CN109299611A (en) 2018-08-27 2018-08-27 File encrypting method, device, equipment/terminal/server and computer readable storage medium
PCT/IB2018/057162 WO2020044095A1 (en) 2018-08-27 2018-09-18 File encryption method and apparatus, device, terminal, server, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810978593.7A CN109299611A (en) 2018-08-27 2018-08-27 File encrypting method, device, equipment/terminal/server and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109299611A true CN109299611A (en) 2019-02-01

Family

ID=65165476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810978593.7A Pending CN109299611A (en) 2018-08-27 2018-08-27 File encrypting method, device, equipment/terminal/server and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN109299611A (en)
WO (1) WO2020044095A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031353A (en) * 2019-12-11 2020-04-17 上海乐相科技有限公司 Video encryption method and device
CN111259432A (en) * 2020-02-18 2020-06-09 福州瑞芯微电子股份有限公司 Model data protection method and readable computer storage medium
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN111984941A (en) * 2020-06-29 2020-11-24 深圳亿络科技有限公司 File processing method and device, terminal equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198261A (en) * 2012-01-09 2013-07-10 鸿富锦精密工业(深圳)有限公司 Method and system for protecting file content security
CN104134046A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Encryption method and device
CN104573535A (en) * 2015-01-04 2015-04-29 深圳市中兴移动通信有限公司 Mobile terminal, and method and device for improving encryption efficiency
CN105022936A (en) * 2014-04-30 2015-11-04 北京畅游天下网络技术有限公司 Class file encryption and decryption method and class file encryption and decryption device
CN105100186A (en) * 2015-04-27 2015-11-25 深圳市美贝壳科技有限公司 Rapid encryption and decryption method of family cloud photos
CN105763525A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Identification code generation method, device, identification code decryption method and device
CN106250781A (en) * 2016-07-31 2016-12-21 山东大学 A kind of user profile guard method based on virtual machine increment mirror image
CN108197485A (en) * 2018-01-29 2018-06-22 世纪龙信息网络有限责任公司 terminal data encryption method and system, terminal data decryption method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198261A (en) * 2012-01-09 2013-07-10 鸿富锦精密工业(深圳)有限公司 Method and system for protecting file content security
CN105022936A (en) * 2014-04-30 2015-11-04 北京畅游天下网络技术有限公司 Class file encryption and decryption method and class file encryption and decryption device
CN104134046A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Encryption method and device
CN105763525A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Identification code generation method, device, identification code decryption method and device
CN104573535A (en) * 2015-01-04 2015-04-29 深圳市中兴移动通信有限公司 Mobile terminal, and method and device for improving encryption efficiency
CN105100186A (en) * 2015-04-27 2015-11-25 深圳市美贝壳科技有限公司 Rapid encryption and decryption method of family cloud photos
CN106250781A (en) * 2016-07-31 2016-12-21 山东大学 A kind of user profile guard method based on virtual machine increment mirror image
CN108197485A (en) * 2018-01-29 2018-06-22 世纪龙信息网络有限责任公司 terminal data encryption method and system, terminal data decryption method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031353A (en) * 2019-12-11 2020-04-17 上海乐相科技有限公司 Video encryption method and device
CN111031353B (en) * 2019-12-11 2022-08-23 上海乐相科技有限公司 Video encryption method and device
CN111259432A (en) * 2020-02-18 2020-06-09 福州瑞芯微电子股份有限公司 Model data protection method and readable computer storage medium
CN111259432B (en) * 2020-02-18 2023-09-12 瑞芯微电子股份有限公司 Model data protection method and readable computer storage medium
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device
CN111984941A (en) * 2020-06-29 2020-11-24 深圳亿络科技有限公司 File processing method and device, terminal equipment and readable storage medium

Also Published As

Publication number Publication date
WO2020044095A1 (en) 2020-03-05

Similar Documents

Publication Publication Date Title
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN109299611A (en) File encrypting method, device, equipment/terminal/server and computer readable storage medium
US9020149B1 (en) Protected storage for cryptographic materials
US8811612B2 (en) Using file metadata for data obfuscation
CN106022154B (en) Database encryption method and database server
CN104579689B (en) A kind of soft cipher key system and implementation method
US20110060915A1 (en) Managing Encryption of Data
CN104794388B (en) application program access protection method and application program access protection device
CN106022155A (en) Method and server for security management in database
CN107533613B (en) Storage medium product, cloud printing system and PDF file access method
CN108259171A (en) The guard method of Shader files and device
CN205901794U (en) System for it encrypts to carry out selectivity to big data content
CN101465727A (en) Method for ensuring communication safety, network appliance, device and communication system
JP2004171207A (en) Data protection/storage method and server
US10572635B2 (en) Automatic correction of cryptographic application program interfaces
CN109510702A (en) A method of it key storage based on computer characteristic code and uses
CN113127895A (en) Cloud data protection method based on distributed storage
CN107094075A (en) A kind of data block dynamic operation method based on convergent encryption
CN108540486A (en) The generation of cloud key and application method
CN105743906A (en) Picture file encryption and decryption method and system based on content-associated secret key
KR101553986B1 (en) System and method of distrubuted data storage, restoration
US10380353B2 (en) Document security in enterprise content management systems
CN104182691B (en) data encryption method and device
CN103379133A (en) Safe and reliable cloud storage system
KR101497067B1 (en) Electric document transfer method and apparatus based digital forensic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190201

RJ01 Rejection of invention patent application after publication