CN109886047A - File encryption treating method and apparatus - Google Patents
File encryption treating method and apparatus Download PDFInfo
- Publication number
- CN109886047A CN109886047A CN201910218307.1A CN201910218307A CN109886047A CN 109886047 A CN109886047 A CN 109886047A CN 201910218307 A CN201910218307 A CN 201910218307A CN 109886047 A CN109886047 A CN 109886047A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypted
- encryption
- target
- container
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
This application involves a kind of file encryption treating method and apparatus, which comprises obtains file to be encrypted, encrypts to the file to be encrypted, obtain initial encryption file;The attribute information for obtaining the file to be encrypted generates container corresponding with the file to be encrypted using the attribute information;The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the target encryption file is for sorting out the initial encryption file.Scheme provided by the present application may be implemented to encrypt file, and encrypted file is sorted out.
Description
Technical field
It, can more particularly to a kind of file encryption processing method, device, computer this application involves Internet technical field
Read storage medium and computer equipment.
Background technique
With the development of internet technology, there is on-line storage technology.User can be by registration user account to net
Network hard disk is accessed and is managed.For example, user can be by file backup into network hard disc.If user account is stolen,
File in network hard disc will be stolen.Therefore, it is necessary to back up in network hard disc again after encrypting to file.
In conventional manner, original can be encrypted to binary file after encrypting to file.However, binary system
File it is unformatted, cannot recognize that file type during backup, network hard disc can not carry out encrypted file
Sort out.Therefore, how file is encrypted, so that the technology that encrypted file can be classified into need to solve at present
Problem.
Summary of the invention
Based on this, it is necessary to the technical issues of for that can not be sorted out by the encrypted file of conventional cryptography mode, provide
A kind of file encryption processing method, device, computer readable storage medium and computer that encrypted file can be classified
Equipment.
A kind of file encryption processing method, comprising:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted is generated corresponding with the file to be encrypted using the attribute information
Container;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the mesh
Mark encryption file is for sorting out the initial encryption file.
A kind of file encryption processing unit, described device include:
Initial encryption module encrypts the file to be encrypted, obtains initial encryption for obtaining file to be encrypted
File;
Container generation module, for obtaining the attribute information of the file to be encrypted, using the attribute information generate with
The corresponding container of the file to be encrypted;
Target encrypting module generates mesh for the initial encryption file to be stored in the Custom Space in the container
Mark encryption file, the target encryption file is for sorting out the initial encryption file.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor,
So that the processor executes following steps:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted is generated corresponding with the file to be encrypted using the attribute information
Container;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the mesh
Mark encryption file is for sorting out the initial encryption file.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the calculating
When machine program is executed by the processor, so that the processor executes following steps:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted is generated corresponding with the file to be encrypted using the attribute information
Container;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the mesh
Mark encryption file is for sorting out the initial encryption file.
Above-mentioned file encryption processing method, device, computer readable storage medium and computer equipment, by to be encrypted
File is encrypted, and initial encryption file is obtained, it is ensured that the safety of file to be encrypted.Utilize the attribute of file to be encrypted
Information generates corresponding with file to be encrypted container, the attribute information of container with the attribute information of file to be encrypted be it is corresponding,
By the Custom Space of initial encryption file deposit container, after generating target encryption file, target encrypts the attribute information of file
Attribute information with file to be encrypted is also corresponding.Therefore, target encryption file can be sorted out according to attribute information,
To realize that i.e. initial encryption file is sorted out to encrypted file.
A kind of document presentation method, comprising:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
A kind of document presentation device, described device include:
Document analysis module parses target encryption file, is held for obtaining target encryption file
Device;
File extraction module, for extracting initial encryption file in the Custom Space of the container;
File decryption module obtains original for the initial encryption file to be decrypted;
Document presentation module is shown for loading the original by candidate displayed page.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor,
So that the processor executes following steps:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the calculating
When machine program is executed by the processor, so that the processor executes following steps:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
Above-mentioned document presentation method, apparatus, computer readable storage medium and computer equipment, by the mesh got
Mark encryption file is parsed, and container is obtained.Initial encryption file is extracted from the Custom Space of container.To initial encryption text
Part is decrypted, and can just obtain original and be shown, ensure that the safety of original.
A kind of file backup method, comprising:
File to be backed up is obtained, the file to be backed up is carried out according to the file encryption processing method in above-described embodiment
Encryption obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
A kind of file backup device, described device include:
File encryption module, for obtaining file to be backed up, by the file to be backed up according to the text in above-described embodiment
Part cipher processing method is encrypted, and obtains target encryption file;
File backup module is uploaded for the target to be encrypted file by queue, to carry out classification backup.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor,
So that the processor executes following steps:
File to be backed up is obtained, the file to be backed up is carried out according to the file encryption processing method in above-described embodiment
Encryption obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the calculating
When machine program is executed by the processor, so that the processor executes following steps:
File to be backed up is obtained, the file to be backed up is carried out according to the file encryption processing method in above-described embodiment
Encryption obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
Above-mentioned file backup method, device, computer readable storage medium and computer equipment, in the present embodiment, eventually
File to be backed up is encrypted using file encryption processing method for end, and entire ciphering process does not need the participation of user,
The encryption to file to be backed up can be completed in the case where user's unaware.The safety of file to be backed up is effectively guaranteed
Property, while reducing user's operation, keep file backup process more convenient.Using what is obtained after the encryption of file encryption processing method
The attribute information of target encryption file with the attribute information of file to be backed up be it is corresponding, target is encrypted file and is uploaded to by terminal
Server, server can read the file type and file format identical with file to be backed up, to realize service
Device sorts out target encryption file in backup.
Detailed description of the invention
Fig. 1 is the applied environment figure of file cipher processing method in one embodiment;
Fig. 2 is the flow diagram of file cipher processing method in one embodiment;
Fig. 3 is the interface schematic diagram that the setting page of cover control is triggered in one embodiment;
Fig. 4 be one embodiment Central Plains exhibition of paintings be shown as (a), hide be shown as (b), the fuzzy cover for being shown as (c) is shown
The schematic diagram of mode;
Fig. 5 is the schematic diagram that the hiding displaying of mark is added in one embodiment;
Fig. 6 is flow diagram the step of encryption in one embodiment to file to be encrypted;
Fig. 7 is the structural schematic diagram of video file in one embodiment;
Fig. 8 is the flow diagram of file methods of exhibiting in one embodiment;
Fig. 9 is flow diagram the step of initial encryption file is decrypted in one embodiment;
Figure 10 is the interface schematic diagram that the page is decrypted in one embodiment;
Figure 11 is the flow diagram of file backup method in one embodiment;
Figure 12 is the structural block diagram of file cipher processing apparatus in one embodiment;
Figure 13 is the structural block diagram of document presentation device in one embodiment;
Figure 14 is the structural block diagram of file back-up device in one embodiment;
Figure 15 is the structural block diagram of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
Fig. 1 is the applied environment figure of file cipher processing method in one embodiment.Referring to Fig.1, this document encryption
Method is applied to file encryption processing system.This document encryption treatment system includes terminal 110 and server 120.110 He of terminal
Server 120 passes through network connection.Wherein, terminal 110 specifically can be terminal console or mobile terminal, and mobile terminal specifically may be used
With at least one of mobile phone, tablet computer, laptop etc..Server 120 can be either more with independent server
The server cluster of a server composition is realized.
As shown in Fig. 2, in one embodiment, providing a kind of file encryption processing method.The present embodiment is mainly with this
Method is applied to the terminal 110 in above-mentioned Fig. 1 to illustrate.Referring to Fig. 2, this document cipher processing method specifically includes as follows
Step:
S202 obtains file to be encrypted, encrypts to file to be encrypted, obtains initial encryption file.
File to be encrypted can be one of a plurality of types of files.For example, file to be encrypted may include but unlimited
In audio file, video file, document files and image file.Wherein, a variety of in the present embodiment and following embodiments
Refer to two or more.
The available file encryption instruction of terminal, obtains file to be encrypted according to file encryption instruction.File to be encrypted is deposited
In the database of terminal local, terminal can obtain file to be encrypted from local data base for storage, carry out to file to be encrypted
Encryption.Specifically, terminal can obtain file encryption instruction when showing that the encryption control in the page is triggered.File adds
File identification to be encrypted is carried in close instruction, terminal obtains ciphertext to be added according to file identification to be encrypted from local data base
Part.Encryption control can be entity control, be also possible to virtual control.Entity control can be the entity that is arranged in terminal by
Key, virtual control be by terminal generate and display page presentation control, virtual control can by diversified forms and
Show that any position of the page is shown.For example, virtual control can be planar graph, it is also possible to solid figure.Virtual control
Can be at the top of the display page, it can also be in the bottom of the display page.
After terminal gets file to be encrypted, file to be encrypted is encrypted, obtains initial encryption file.Specifically,
Terminal can encrypt file to be encrypted using one of a variety of cipher modes.For example, terminal can be to text to be encrypted
Part carries out asymmetric encryption, can also carry out symmetric cryptography to file to be encrypted.Wherein, asymmetric encryption refers to that terminal generates one
To key, i.e. public-key cryptography and private cipher key, public-key cryptography is corresponding with private cipher key and not identical, when using one of key
After (such as public-key cryptography) encrypts file, corresponding another key (the corresponding private cipher key of public-key cryptography) can only be used
File is decrypted.Symmetric cryptography refers to that terminal generates a key, which can simultaneously be encrypted and decrypted file.
Terminal can also encrypt file using at least one of cipher mode Encryption Algorithm.For example, when terminal is to be encrypted
When file carries out symmetric cryptography, AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm can be used
Symmetric cryptography is carried out to file, obtains initial encryption file.
S204 obtains the attribute information of file to be encrypted, generates container corresponding with file to be encrypted using attribute information.
Terminal reads the attribute information of file to be encrypted, the attribute information that terminal can use file to be encrypted generate with to
Encrypt the corresponding container of file.Wherein, container is corresponding with the attribute information of file to be encrypted and including Custom Space
File.Custom Space in container can be used for storing initial encryption file, so that the attribute information of target encryption file
It is corresponding with the attribute information of file to be encrypted, convenient for classifying to target encryption file.The container of generation follows ISO
14496 standards.14496 standard of ISO corresponds to MPEG-4 standard, is a kind of multimedia Uniform data format standard.For example, holding
The format of device can be MP4, M4V, MOV or 3GP etc. and follow one of MPEG-4 reference format.
Specifically, different types of file to be encrypted possesses different attribute informations.File to be encrypted can be multiple types
One of type file, a plurality of types of files may include video file, audio file, image file and document files.It is right
It answers, when file to be encrypted is video file, corresponding attribute information includes but is not limited to file title, file format, text
The information such as part label, video length, frame width, frame height, frame rate, data rate, audio bit rate, audio channel.When to
When encryption file is audio file, corresponding attribute information includes but is not limited to file title, file format, file mark, sound
The information such as frequency length, port number, bit rate, baud rate.When file to be encrypted is image file, corresponding attribute information includes
But it is not limited to the information such as file title, file format, file mark, pixel, resolution ratio, locating depth, saturation degree.When file to be encrypted
When for document files, corresponding attribute information includes but is not limited to file title, file format, file mark, number of pages, paragraph
The information such as number, number of characters, line number.For example, terminal obtains the attribute letter of video file when file to be encrypted is video file
Breath, can be according to the file format and the corresponding container of video length generation in attribute information, the file format and view of the container
Frequency length is identical as file to be encrypted.
Initial encryption file is stored in the Custom Space in container by S206, is generated target and is encrypted file, target encryption text
Part is for sorting out initial encryption file.
Terminal creates corresponding container using attribute information, which includes Custom Space.Terminal will be encrypted first
Begin to encrypt in the Custom Space of file deposit container.The container that initial encryption file is incorporated in Custom Space is mesh
Mark encryption file.Due to including file format in attribute information, the attribute information of container and the attribute information of file to be encrypted are
It is corresponding.Therefore, the file format of container is identical as the file format of file to be encrypted, the target of generation encryption file format with
The file format of file to be encrypted is also identical.The file format and corresponding file type of target encryption file can be known
Not, convenient for sorting out to initial encryption file.
In the present embodiment, by encrypting to file to be encrypted, initial encryption file is obtained, it is ensured that be encrypted
The safety of file.Container corresponding with file to be encrypted, the attribute letter of container are generated using the attribute information of file to be encrypted
It is corresponding for ceasing with the attribute information of file to be encrypted, by the Custom Space of initial encryption file deposit container, generates target
After encrypting file, the attribute information of target encryption file is also corresponding with the attribute information of file to be encrypted.Therefore, Ke Yigen
Target encryption file is sorted out according to attribute information, to realize that i.e. initial encryption file is returned to encrypted file
Class.
In one embodiment, terminal can also automatically be encrypted file to be encrypted.Terminal can be from local
File to be encrypted is searched in database, and the file to be encrypted found is encrypted.Specifically, terminal can be according to connecing
The user instruction received stores file into default file folder.Default file folder can be used for storing file to be encrypted.Terminal
The file that unencryption is searched in can pressing from both sides from default file, is encrypted the file of unencryption as file to be encrypted.
Terminal can also be according to the user instruction received to file mark mark to be encrypted.Terminal recognition mark to be encrypted
Corresponding file is encrypted using the corresponding file of mark to be encrypted as file to be encrypted.
In the present embodiment, terminal is stored or is marked to file to be encrypted according to user instructions, and terminal can be certainly
Dynamic that file to be encrypted is encrypted, entire ciphering process does not need the operation that user triggers encryption file, to make text
Part encryption is more convenient.
In one embodiment, terminal encrypts file to be encrypted, can also be right after obtained initial encryption file
Initial encryption file is compressed, and compressed file is obtained.Terminal can be using one of a variety of compress modes to initial encryption
File carries out compression processing.Specifically, terminal can be using one of lossy compression and lossless compression compress mode to initial
It encrypts file and carries out compression processing, to obtain compressed file.Wherein, the compressed format of compressed file can be " .zip " or
One of a variety of compressed formats such as " .rar ".Compressed compressed file can be stored in the customized sky in container by terminal
Between, it generates target and encrypts file.Terminal obtains compressed file, compressed file is deposited by compressing to initial encryption file
Enter in the Custom Space of container, reduces the corresponding memory space of initial encryption file, effectively save storage resource.
In one embodiment, above-mentioned file encryption processing method further include: cover control is triggered by the setting page, is obtained
The corresponding cover exhibition method of extracting container;Obtain the corresponding cover of file to be encrypted;Pass through candidate exhibition according to cover exhibition method
Show page presentation cover.
As shown in figure 3, terminal can be in the corresponding a variety of cover exhibition methods of setting page presentation container, for user's root
Cover exhibition method is selected according to demand.Wherein, cover exhibition method includes but is not limited to fuzzy displaying, original painting is shown and hiding exhibition
Show.Cover control is equipped in the setting page of terminal, terminal can obtain the corresponding cover displaying side of container by cover control
Formula.
Terminal obtains the corresponding cover of file to be encrypted, using the corresponding cover of file to be encrypted as the cover of container.?
In one embodiment, when file to be encrypted is video file, terminal can be made with a frame picture of selecting video content
For the cover of container.Terminal can pass through candidate displayed page according to the corresponding cover exhibition method of container and show corresponding envelope
Face.Wherein, candidate displayed page refers to displayed page when terminal display container or target encrypt file, for user's browsing
Container or target encrypt file.Candidate displayed page can be the corresponding displaying of terminal for carrying out file encryption processing to be encrypted
The page is also possible to the corresponding displayed page of terminal of other browsing containers or target encryption file.
Terminal can carry out corresponding pretreatment to cover according to the corresponding cover exhibition method of container.Specifically, such as Fig. 4
Shown, cover exhibition method may include that original painting shows, hides displaying and fuzzy displaying.When the cover displaying side that terminal is got
When formula is that original painting is shown, terminal can not be pre-processed cover, i.e., by the corresponding cover of file to be encrypted directly as appearance
Device cover is shown by candidate displayed page.Shown in cover such as Fig. 4 (a) that original painting is shown when showing.When terminal is got
Cover exhibition method be when hiding to show, terminal is hidden processing to cover, i.e., logical using blank cover as container cover
Candidate displayed page is crossed to be shown.It hides shown in the cover such as Fig. 4 (b) shown when showing.When the cover exhibition that terminal is got
When showing that mode is fuzzy shows, terminal carries out Fuzzy Processing to cover.Specifically, terminal can use multi-Fuzzy processing mode
One of to cover carry out Fuzzy Processing.For example, terminal can carry out Fuzzy Processing to cover by the way of gaussian filtering,
Fuzzy Processing can also be carried out to cover by the way of mean filter.Terminal is sealed the cover after Fuzzy Processing as container
Face is shown by candidate displayed page.Shown in the cover such as Fig. 4 (c) shown when fuzzy displaying.
In the present embodiment, terminal is by obtaining the corresponding cover exhibition method of container, in candidate displayed page with cover
Exhibition method shows the corresponding cover of file to be encrypted, in order to user is clear, efficiently identify file encryption to be encrypted after it is right
Container or target the encryption file answered.Terminal can modify cover document according to different degree, protect to cover document
It is close, effectively raise the safety of target encryption file.
In one embodiment, when the cover exhibition method that terminal is got is to hide to show, terminal carries out cover
After hiding processing, visible mark can also be added in blank cover.Wherein, visible mark can be the file with file to be encrypted
The corresponding character mark of the attribute informations such as format or file type.For example, as shown in figure 5, when file to be encrypted is video text
When part, the corresponding visible mark of video file can be added in blank cover, such as " encrypted video ".
In the present embodiment, when cover exhibition method is to hide to show, addition and file to be encrypted in blank cover
Corresponding visible mark, so as to it is clear in blank cover, explicitly show file type, in order to identify cover for sky
The corresponding file type of the file of white cover.
As shown in fig. 6, in one embodiment, the step of encrypting to file to be encrypted, includes:
S602 obtains user identifier, carries out the first transform operation at least once to user identifier, obtains corresponding first
Value.
S604 carries out the second transform operation at least once to user identifier, obtains corresponding second value.
First value is spliced with second value, obtains key by S606.
S608 is encrypted using key pair file to be encrypted.
The available corresponding user identifier of user for carrying out file encryption of terminal.Wherein, user identifier may include using
Family ID (Identification, identity number), such as user account.Terminal using user identifier to file to be encrypted into
Row encryption, to effectively raise the safety of target encryption file.
After terminal gets user identifier, the first transform operation is carried out to user identifier.Terminal can to user identifier into
Capable first transform operation at least once, obtains corresponding first value.First transform operation can using multiple encryption algorithms to
Family mark is encrypted.For example, terminal can encrypt user identifier using hashing algorithm, terminal can use hash and calculate
MD5 (Message-Digest Algorithm, Message Digest 5) in method converts user identifier, obtains corresponding
First value.
Terminal can also carry out the second transform operation to user identifier.Terminal can carry out at least once the to user identifier
Two transform operations obtain corresponding second value.Second transform operation can also carry out user identifier using multiple encryption algorithms
Encryption.For example, terminal can be encrypted user identifier using hash function, corresponding hashed value is obtained, as the
Two-value.Wherein, the first transform operation is the transform operation of two kinds of different encryptions from the second transform operation.
The first value that terminal obtains transform operation is spliced with second value, regard spliced value as key.Terminal
It can use key pair file to be encrypted to be encrypted.Wherein, terminal can splice the first value and the using a variety of connecting methods
Two-value.For example, terminal can splice the first value in preceding, second value after, key is obtained.Terminal can also be by second value
Spliced after in preceding, the first value, obtains key.First value can also be mixed splicing with second value by terminal, obtain key.
Terminal can use key pair file to be encrypted and be encrypted, for example, terminal can use AES (Advanced
Encryption Standard, Advanced Encryption Standard) symmetric cryptography is carried out to file to be encrypted.
In the present embodiment, after terminal gets user identifier, the first transform operation at least once is carried out to user identifier
Second transform operation at least once respectively obtains the first value and second value, using the splicing result of the first value and second value as
Key, substantially increases the complexity of key, and key is not easy to be cracked.It is encrypted, is had using key pair file to be encrypted
The safety for improving file encryption of effect.
In one embodiment, terminal can also receive customized key by the setting page, utilize customized key pair
File to be encrypted is encrypted.Specifically, terminal can show customized key reception entrance by the way that the page is arranged.Wherein, certainly
Defining key reception entrance can be a floating-page, the customized key inputted for receiving user by input equipment.
Customized key reception entrance can be the individual page in the setting page, be also possible to the subpage frame being arranged in the page.User
Customized key can be inputted by the input equipment of diversified forms.Input equipment can be physical input device, such as entity
Keyboard.It can also be virtual input device, such as dummy keyboard.Terminal can be obtained and be used by the input control of the setting page
The customized key that family is inputted by input equipment, customized key can be by the groups such as number, letter, symbol at least
The character string of one composition.Terminal can use customized key pair file to be encrypted and be encrypted.
In the present embodiment, terminal obtains customized key by the setting page, and customized key has privacy, utilizes
Customized key pair file to be encrypted is encrypted, and the safety of file encryption can be effectively improved.
In one embodiment, terminal can use one or more values and generate key.For example, terminal individually can incite somebody to action oneself
Key is defined as key, individually using the first value as key, individually using second value as key, the first value and second value are spelled
It connects as key, the first value and customized key is subjected to splicing as key, second value and customized key are spliced
As key, the first value, second value and customized key are subjected to splicing as key.Wherein, customized key, the first value,
Second value and connecting method are referred to the description in the embodiment of above-mentioned file encryption processing method, therefore no longer superfluous herein
It states.
In the present embodiment, key can be spliced by different values and be formed, and improved the complexity of key composition, passed through
Complicated key pair file to be encrypted is encrypted, and the safety of file encryption is effectively raised.
In one embodiment, initial encryption file is stored in the Custom Space in container, generates target and encrypts file
The step of include: to obtain Custom Space storage location in a reservoir;According to storage location by initial encryption file be stored in
Custom Space generates target and encrypts file.
It include Custom Space in the container that terminal generates, Custom Space can be used for free storage file.Terminal can
To obtain the storage location of Custom Space in a reservoir.Terminal deposits the initial encryption file that encryption obtains according to storage location
Enter into Custom Space, generates target and encrypt file.For example, terminal can be generated when file to be encrypted is video file
The corresponding container of video file.The format of container can be one of various video format.Container includes multiple spaces
(box), space can be used for the information of storage file.The information of each space storage includes head information (Header) and data
It (Date), include multiple fields in data.Wherein, data can be clear data, can also be made of at least one subspace.Eventually
Initial encryption file can be stored in Custom Space by end, a field in space can also be chosen, by the field mark
It is denoted as identifier, for being identified to target encryption file.For example, wyfs field mark can be identifier by terminal.Such as
Shown in Fig. 7, here by taking the file of " .MOV " format as an example.The subspace udta in the space Moov is the customized sky of container
Between, the initial encryption file obtained after encryption is stored in empty to udta by the storage location of the available subspace udta of terminal
Between in.
In the present embodiment, terminal obtains the storage location of Custom Space, according to storage location by initial encryption file
Deposit into Custom Space, generate target encrypt file, the attribute information of the initial encryption file encrypted may be with
The attribute information of file to be encrypted does not correspond to, and initial encryption file is stored in the Custom Space of container by terminal, so that generating
Target encryption file include initial encryption file data content, and attribute information is corresponding with file to be encrypted, in order to right
Target encryption file is sorted out.
Meanwhile target encryption file in add identifier so that terminal can be determined by identifier file whether be
Target encrypts file, does not need to be downloaded file and parse to judge whether file is target encryption file, effectively
Resource is saved.
As shown in figure 8, in one embodiment, providing a kind of document presentation method.The present embodiment is mainly in this way
It is illustrated applied to the terminal 110 in above-mentioned Fig. 1.Referring to Fig. 8, this document methods of exhibiting specifically comprises the following steps:
S802 obtains target and encrypts file, parses to target encryption file, obtains container.
S804 extracts initial encryption file in the Custom Space of container.
Initial encryption file is decrypted, obtains original by S806.
S808 loads original, is shown by candidate displayed page.
Terminal can obtain target encryption file in several ways, for example, target encryption file can be stored in end
End local, terminal obtains target encryption file from local data base.Target encryption file is also possible to be stored in server
Database in, terminal obtained from server target encryption file.Specifically, terminal can be from the database of server
It downloads target and encrypts file, terminal can also receive the target encryption file that server issues.
It is the file obtained after being encrypted by file encryption processing method to original, original that target, which encrypts file,
It is corresponding with the file to be encrypted in file encryption processing method.Terminal can encrypt file to target and parse, and obtain container.
Container includes Custom Space, and the attribute information of container and the attribute information of original are corresponding.Container follows the mark of ISO 14496
It is quasi-.14496 standard of ISO corresponds to MPEG-4 standard, is a kind of multimedia Uniform data format standard.For example, the format of container
It can be MP4, M4V, MOV or 3GP etc. and follow one of MPEG-4 reference format.Terminal is mentioned from the Custom Space of container
Initial encryption file is taken, initial encryption file is the file obtained after encrypting to original.Wherein, file encryption processing side
Method is referred to the description in the corresponding embodiment of above-mentioned file encryption processing method.
Initial encryption file is decrypted terminal, specifically, terminal obtains the corresponding key of initial encryption file, utilizes
Key pair initial encryption file is decrypted, and obtains original.Original can be one of a plurality of types of files, example
Such as, original can include but is not limited to audio file, video file, document files and image file.
Terminal loads original shows original by candidate displayed page.Wherein, candidate displayed page refers to terminal exhibition
Show displayed page when original, so that user browses original.Candidate displayed page, which can be, carries out original encryption
The corresponding displayed page of terminal, be also possible to other browsing originals the corresponding displayed page of terminal.
In the present embodiment, it is parsed by encrypting file to the target got, obtains container.From making by oneself for container
Initial encryption file is extracted in adopted space.Initial encryption file is decrypted, original can be just obtained and is shown, is guaranteed
The safety of original.
During the displaying to original, terminal can find initial encryption file from the Custom Space of container,
And directly initial encryption file is decrypted using corresponding key, entire document presentation process does not need the participation of user,
Original after can showing decryption in the case where user's unaware, reduces user's operation, makes document presentation process more
It is convenient.
In one embodiment, above-mentioned document presentation method further include: obtain the operation for acting on candidate displayed page, root
Object is shown according to operation selection target;The corresponding backup information of intended display object is pulled, well-behaved information includes backup address;Benefit
It whether is encryption file with the corresponding file of backup information identification intended display object;When the corresponding file of intended display object is
When encrypting file, target corresponding with intended display object is downloaded according to backup address and encrypts file.
Terminal can show object in candidate displayed page.Wherein, terminal can take various forms displaying and show
Object.For example, terminal, which can use, shows that the corresponding character mark of object shows object, terminal also can use displaying pair
As corresponding image identification displaying displaying object, terminal can also show displaying pair using the combination of character mark and image identification
As.Terminal obtains the operation that user acts on candidate displayed page, and operation is used to indicate terminal selection and shows object, by selection
Object is shown as intended display object, i.e. intended display object is at least one shown in object that candidate displayed page is shown
It is a.
Terminal pulls the corresponding backup information of intended display object from server, and backup information is in terminal by target exhibition
Show and be formed and stored in server when object is uploaded to server backup, includes that intended display object is corresponding in backup information
Backup address.
Whether terminal is encryption file using the corresponding file of backup information identification intended display object.Specifically, file
It is equipped with identifier after encryption, identifier is for identifying file as encryption file.Terminal can identify that intended display object is corresponding
Backup information in whether there is identifier, when in the corresponding backup information of intended display object there are when identifier, then target
Show that the corresponding file of object is target encryption file.When there is no identifiers in the corresponding backup information of intended display object
When, then the corresponding file of intended display object is not target encryption file.
When the corresponding file of intended display object is that target encrypts file, terminal can be according to backup address, i.e. file
Corresponding storage address when backup downloads target encryption text corresponding with intended display object from the database of server
Part.Terminal can use document presentation method described in above-described embodiment and target encryption file be decrypted and shown.
In the present embodiment, terminal shows object, benefit by the operation selection target that user acts on candidate displayed page
It may determine that whether the corresponding file of intended display object is target encryption file with the corresponding backup information of intended display object,
When being target encryption file, then encrypted according to the corresponding target of backup address downloading intended display object in backup information
File.When not being target encryption file, then the corresponding file of downloading intended display object is not needed.Terminal can pass through backup
Information directly judges whether the corresponding file of intended display object is target encryption file, does not need intended display object is corresponding
Data downloading after judge whether it is again target encryption file, effectively save the data transmission resources of terminal, reduce into
This.
As shown in figure 9, in one embodiment, the step of initial encryption file is decrypted, includes:
S902 obtains user identifier, carries out the first transform operation at least once to user identifier, obtains corresponding first
Value.
S904 carries out the second transform operation at least once to user identifier, obtains corresponding second value.
First value is spliced with second value, obtains key by S906.
S908 is decrypted using key pair initial encryption file.
The available corresponding user identifier of user for carrying out document presentation of terminal.Wherein, user identifier may include using
Family ID (Identification, identity number), such as user account.Terminal using user identifier to file to be encrypted into
Row decryption, to effectively raise the safety of target encryption file.
After terminal gets user identifier, the first transform operation is carried out to user identifier.Terminal can to user identifier into
Capable first transform operation at least once, obtains corresponding first value.First transform operation can using multiple encryption algorithms to
Family mark is encrypted.For example, terminal can encrypt user identifier using hashing algorithm, terminal can use hash and calculate
MD5 (Message-Digest Algorithm, Message Digest 5) in method converts user identifier, obtains corresponding
First value.
Terminal can also carry out the second transform operation to user identifier.Terminal can carry out at least once the to user identifier
Two transform operations obtain corresponding second value.Second transform operation can also carry out user identifier using multiple encryption algorithms
Encryption.For example, terminal can be encrypted user identifier using hash function, corresponding hashed value is obtained, as the
Two-value.Wherein, the first transform operation is the transform operation of two kinds of different encryptions from the second transform operation.
The first value that terminal obtains transform operation is spliced with second value, regard spliced value as key.Terminal
It is decrypted using the key pair initial encryption file.Wherein, terminal can splice the first value and the using a variety of connecting methods
Two-value.For example, terminal can splice the first value in preceding, second value after, key is obtained.Terminal can also be by second value
Spliced after in preceding, the first value, obtains key.First value can also be mixed splicing with second value by terminal, obtain key.
In the present embodiment, after terminal gets user identifier, the first transform operation at least once is carried out to user identifier
Second transform operation at least once respectively obtains the first value and second value, splices the first value and second value to obtain key, greatly
The complexity for improving key greatly, is decrypted using the key pair initial encryption file, effectively raises target encryption text
The safety of part.Meanwhile key, from user identifier transformation, terminal can obtain key by transform operation.Entire decryption
Process does not need user's participation, as long as user identifier is corresponding with target encryption file, so that it may realize to initial encryption file
Decryption, the original after decryption can be shown in the case where user's unaware, reduces user's operation, to effectively improve
User experience.
In one embodiment, terminal can also be encrypted in ciphering process using customized key pair original,
It is corresponding, terminal can receive user by decryption the page input customized key, using customized key pair original into
Row decryption.Specifically, as shown in Figure 10, terminal can show customized key reception entrance by decrypting the page.Wherein, it makes by oneself
Adopted key reception entrance can be a floating-page, the customized key inputted for receiving user by input equipment.From
Defining key reception entrance can be the individual page decrypted in the page, be also possible to decrypt the subpage frame in the page.Terminal can
By the input control of the decryption page, to obtain the customized key that inputs by input equipment of user, customized key can be with
By at least one character string formed in the groups such as number, letter, symbol.It is initial that terminal can use customized key pair
Encryption file is decrypted.
In the present embodiment, terminal obtains the customized key of user's input by the decryption page, and customized key has
Privacy could be decrypted initial encryption file using customized key, can effectively improve target encryption file
Safety.
In one embodiment, the corresponding key generating mode of the available target encryption file of terminal, it is raw according to key
Key is generated at mode.Terminal generates key according to key generating mode, is decrypted using key pair initial encryption file.Tool
Body, the corresponding key generating mode of terminal available target encryption file, key generating mode be terminal to original into
The generating mode of key is generated when row encryption.For example, terminal can be individually using customized key as key, individually by the first value
As key, individually using second value as key, regard the first value and second value splicing as key, by the first value with it is customized close
Key carries out splicing as key, and second value and customized key are carried out splicing as key, and the first value and is made by oneself second value
Adopted key carries out splicing as key.Wherein, customized key, the first value, second value and connecting method are referred to above-mentioned
Description in the embodiment of file encryption processing method, therefore details are not described herein.
In the present embodiment, terminal can generate key according to key generating mode, and key can be worth by one or more
Composition, improves the complexity of key, effectively raises the safety of target encryption file.
In one embodiment, the step of initial encryption file is extracted in the Custom Space of container includes: to be obtained from
The storage location of definition space in a reservoir;Initial encryption file is extracted from the Custom Space of container according to storage location.
It include Custom Space in container, Custom Space can be used for free storage file.Terminal is available to be made by oneself
The storage location of adopted space in a reservoir.The initial encryption file in Custom Space is found according to storage location, will initially be added
Ciphertext part is extracted from Custom Space.
In the present embodiment, by obtaining Custom Space storage location in a reservoir, according to storage location from container
Custom Space in extract initial encryption file, so that initial encryption file be decrypted, obtained original is carried out
It shows.Initial encryption file stores in Custom Space, and terminal can use target encryption file and carry out to initial encryption file
Sort out, initial encryption file is sorted out to realize.
As shown in figure 11, in one embodiment, a kind of file backup method is provided.The present embodiment is mainly in this way
It is illustrated applied to the terminal 110 in above-mentioned Fig. 1.Referring to Fig.1 1, this document backup method specifically comprises the following steps:
S1102 obtains file to be backed up, and file to be backed up is encrypted according to file encryption processing method, is obtained
File is encrypted to target.
Target is encrypted file and is uploaded by queue, to carry out classification backup by S1104.
Terminal is referred to the file encryption processing side provided in above-described embodiment when receiving file backup instruction
File to be backed up is encrypted in method, obtains target encryption file.Wherein, it is close to can use user identifier generation for terminal
Key is encrypted using key pair file to be backed up, to obtain target encryption file, entire ciphering process does not need to use
Family participates in.Target encryption file is uploaded to server by queue by terminal, so that server returns target encryption file
Class backup.
In the present embodiment, file to be backed up is encrypted using file encryption processing method for terminal, entire to add
Close process does not need the participation of user, and the encryption to file to be backed up can be completed in the case where user's unaware.Effectively
It ensure that the safety of file to be backed up, while reducing user's operation, keep file backup process more convenient.
Using the attribute information and file to be backed up of the target encryption file obtained after the encryption of file encryption processing method
Attribute information be it is corresponding, terminal by target encryption file be uploaded to server, server can be read and file to be backed up
Identical file type and file format sorts out target encryption file in backup to realize server.
In one embodiment, above-mentioned file backup method further include: obtain the corresponding cover of file to be backed up;By setting
Page triggering cover control is set, the corresponding cover exhibition method of container is obtained, so that cover is standby according to the progress of cover exhibition method
Part.
Terminal obtains the corresponding cover of file to be encrypted, using the corresponding cover of file to be encrypted as the cover of container.?
In one embodiment, when file to be encrypted is video file, terminal can be made with a frame picture of selecting video content
For the cover of container.
Terminal can be in the corresponding a variety of cover exhibition methods of setting page presentation container.Wherein, cover exhibition method packet
It includes but is not limited to fuzzy displaying, original painting is shown and hides displaying.Cover control is equipped in the setting page of terminal, cover control can
For selecting the corresponding cover exhibition method of container.The cover control that terminal can be triggered by the setting page obtains container pair
The cover exhibition method answered.
Terminal can carry out corresponding pretreatment to cover according to the corresponding cover exhibition method of container.Specifically, when eventually
When the cover exhibition method got being held to show for original painting, terminal can not be pre-processed cover, i.e., by file to be encrypted
Corresponding cover is directly as container cover.When the cover exhibition method that terminal is got is to hide to show, terminal is to cover
It is hidden processing, i.e., using blank cover as container cover.When the cover exhibition method that terminal is got is fuzzy shows,
Terminal carries out Fuzzy Processing to cover.Specifically, terminal can carry out cover using one of multi-Fuzzy processing mode
Fuzzy Processing.For example, terminal can carry out Fuzzy Processing to cover by the way of gaussian filtering, mean filter can also be used
Mode to cover carry out Fuzzy Processing.Terminal is using the cover after Fuzzy Processing as container cover.
Terminal pre-processes cover, the cover that obtains that treated, and treated cover with target is encrypted file one
It rises and is uploaded to server, cover is backed up so that server is according to treated, and cover shows that target adds so that treated
Ciphertext part.
In the present embodiment, terminal is by obtaining the corresponding cover exhibition method of container, according to cover exhibition method to envelope
Face is pre-processed.Server backs up together with treated cover when backup target encrypts file, and with treated envelope
Face shows that target encrypts file, in order to which clear, efficiently identification target encrypts file.Terminal can also be according to different degree
Cover document is modified, is maintained secrecy to cover document, the safety of target encryption file is effectively raised.
In one embodiment, when the cover exhibition method that terminal is got is to hide to show, terminal carries out cover
After hiding processing, default mark can also be added in blank cover.Wherein, default mark can be the file with file to be encrypted
The corresponding character mark of the attribute informations such as format or file type.For example, as shown in figure 5, when file to be encrypted is video text
When part, the corresponding character mark of video file can be added in blank cover, such as " encrypted video ".
In the present embodiment, when cover exhibition method is to hide to show, addition and file to be encrypted in blank cover
Corresponding default mark, so as to it is clear in blank cover, explicitly show file type, in order to identify cover for sky
The corresponding file type of the file of white cover.
Fig. 2, Fig. 6, Fig. 8, Fig. 9, Figure 11 are the flow diagram in embodiment.Although should be understood that Fig. 2, Fig. 6,
Each step in the flow chart of Fig. 8, Fig. 9, Figure 11 is successively shown according to the instruction of arrow, but these steps are not certainty
It is successively executed according to the sequence that arrow indicates.Unless expressly stating otherwise herein, there is no stringent for the execution of these steps
Sequence limits, these steps can execute in other order.Moreover, at least part in Fig. 2, Fig. 6, Fig. 8, Fig. 9, Figure 11
Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out,
But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
As shown in figure 12, in one embodiment, a kind of file encryption processing unit is provided, which includes initial add
Close module 1202, container generation module 1204 and target encrypting module 1206, in which:
Initial encryption module 1202 encrypts file to be encrypted, obtains initial encryption for obtaining file to be encrypted
File.
Container generation module 1204, for obtaining the attribute information of file to be encrypted, using attribute information generate with it is to be added
The corresponding container of ciphertext part.
Target encrypting module 1206, the Custom Space for being stored in initial encryption file in container, generates target and adds
Ciphertext part, target encryption file is for sorting out initial encryption file.
Above-mentioned file encryption processing unit obtains initial encryption file, Ke Yibao by encrypting to file to be encrypted
Demonstrate,prove the safety of file to be encrypted.Container corresponding with file to be encrypted, container are generated using the attribute information of file to be encrypted
Attribute information with the attribute information of file to be encrypted be it is corresponding, by the Custom Space of initial encryption file deposit container,
After generating target encryption file, the attribute information of target encryption file is also corresponding with the attribute information of file to be encrypted.Cause
This, can sort out target encryption file according to attribute information, to reach the effect sorted out to encrypted file
Fruit.
In one embodiment, above-mentioned file encryption processing unit further includes cover display module, for passing through setting page
Cover control is triggered in face, obtains the corresponding cover exhibition method of container;Obtain the corresponding cover of file to be encrypted;According to cover exhibition
Show that mode passes through candidate displayed page and shows cover.
In one embodiment, initial encryption module 1202 is also used to obtain user identifier, carries out at least to user identifier
First transform operation obtains corresponding first value;Second transform operation at least once is carried out to user identifier, is corresponded to
Second value;First value is spliced with second value, obtains key;It is encrypted using key pair file to be encrypted.
In one embodiment, target encrypting module 1206 is also used to obtain the storage position of Custom Space in a reservoir
It sets;Initial encryption file is stored in Custom Space according to storage location, target is generated and encrypts file.
As shown in figure 13, in one embodiment, a kind of document presentation device is provided, which includes document analysis mould
Block 1302, file extraction module 1304, file decryption module 1306 and document presentation module 1308, in which:
Document analysis module 1302 parses target encryption file, is held for obtaining target encryption file
Device.
File extraction module 1304, for extracting initial encryption file in the Custom Space of container.
File decryption module 1306 obtains original for initial encryption file to be decrypted.
Document presentation module 1308 is shown for loading original by candidate displayed page.
Above-mentioned document presentation device is parsed by encrypting file to the target got, obtains container.From container
Initial encryption file is extracted in Custom Space.Initial encryption file is decrypted, original can be just obtained and is shown,
It ensure that the safety of original.
During the displaying to original, terminal can find initial encryption file from the Custom Space of container,
And directly initial encryption file is decrypted using corresponding key, entire document presentation process does not need the participation of user,
Original after can showing decryption in the case where user's unaware, reduces user's operation, makes document presentation process more
It is convenient.
In one embodiment, above-mentioned document presentation device further includes file download module, acts on candidate for obtaining
The operation of displayed page shows object according to operation selection target;Pull the corresponding backup information of intended display object, backup letter
Breath includes backup address;It whether is encryption file using the corresponding file of backup information identification intended display object;When target exhibition
When showing the corresponding file of object to encrypt file, target corresponding with intended display object is downloaded according to backup address and encrypts text
Part.
In one embodiment, file decryption module 1306 is also used to obtain user identifier, carries out at least to user identifier
First transform operation obtains corresponding first value;Second transform operation at least once is carried out to user identifier, is corresponded to
Second value;First value is spliced with second value, obtains key;It is decrypted using key pair initial encryption file.
In one embodiment, file extraction module 1304 is also used to obtain the storage position of Custom Space in a reservoir
It sets;Initial encryption file is extracted from the Custom Space of container according to storage location.
As shown in figure 14, in one embodiment, a kind of file backup device is provided, which includes file encryption mould
Block 1402 and file backup module 1404, in which:
File encryption module 1402, for obtaining file to be backed up, by file to be backed up according to being described in above-described embodiment
File encryption processing method be encrypted, obtain target encryption file.
File backup module 1404 is uploaded for target to be encrypted file by queue, to carry out classification backup.
Above-mentioned file backup device, in the present embodiment, terminal to file to be backed up using file encryption processing method into
Row encryption, entire ciphering process do not need the participation of user, can complete in the case where user's unaware to be backed up
The encryption of file.The safety of file to be backed up is effectively guaranteed, while reducing user's operation, makes file backup more just
It is prompt.Believed using the attribute information of target encryption file and the attribute of file to be backed up that are obtained after the encryption of file encryption processing method
Breath be it is corresponding, terminal by target encryption file be uploaded to server, server can read identical with file to be backed up
File type and file format, thus realize server backup when to target encryption file sort out.
In one embodiment, above-mentioned file backup device further includes cover backup module, for obtaining file to be backed up
Corresponding cover;Cover control is triggered by the setting page, the corresponding cover exhibition method of container is obtained, so that cover is according to envelope
Face exhibition method is backed up.
Figure 15 shows the internal structure chart of computer equipment in one embodiment.The computer equipment specifically can be figure
Terminal 110 in 1.As shown in figure 15, it includes the place connected by system bus which, which includes the computer equipment,
Manage device, memory, network interface, input unit and display screen.Wherein, memory includes non-volatile memory medium and interior storage
Device.The non-volatile memory medium of the computer equipment is stored with operating system, can also be stored with computer program, the computer
When program is executed by processor, processor may make to realize file encryption processing method, document presentation method or file backup side
Method.Computer program can also be stored in the built-in storage, when which is executed by processor, processor may make to hold
Style of writing part cipher processing method, document presentation method or file backup method.The display screen of computer equipment can be liquid crystal
Display screen or electric ink display screen, the input unit of computer equipment can be the touch layer covered on display screen, can also be with
It is the key being arranged on computer equipment shell, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse
Deng.
It will be understood by those skilled in the art that structure shown in Figure 15, only part relevant to application scheme
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, file encryption processing unit provided by the present application, document presentation device or file backup dress
The form that can be implemented as a kind of computer program is set, computer program can be run in computer equipment as shown in figure 15.
Composition this document cipher processing apparatus, document presentation device or file backup device can be stored in the memory of computer equipment
Each program module, for example, initial encryption module 1202, container generation module 1204 shown in Figure 12 and target encrypting module
Document analysis module 1302, file extraction module 1304 shown in 1206, Figure 13, file decryption module 1306 and document presentation mould
Block 1308, file encryption module 1402 and file backup module 1404 shown in Figure 14.The computer that each program module is constituted
Program makes processor execute the file encryption processing method of each embodiment of the application described in this specification, document presentation
Step in method or file backup method.
For example, computer equipment shown in figure 15 can be by initial in file encryption processing unit as shown in figure 12
Encrypting module 1202, which executes, obtains file to be encrypted, encrypts to file to be encrypted, obtains initial encryption file.Computer is set
It is standby that the attribute information for obtaining file to be encrypted can be executed by container generation module 1204, using attribute information generate with it is to be encrypted
The corresponding container of file.Computer equipment can be executed by target encrypting module 1206 and initial encryption file is stored in container
Custom Space generates target and encrypts file, and target encryption file is for sorting out initial encryption file.
For example, computer equipment shown in figure 15 can pass through the document analysis in document presentation device as shown in fig. 13 that
Module 1302, which executes, obtains target encryption file, parses to target encryption file, obtains container.Computer equipment can pass through
File extraction module 1304 is executed extracts initial encryption file in the Custom Space of container.Computer equipment can pass through file
Initial encryption file is decrypted the execution of deciphering module 1306, obtains original.Computer equipment can pass through document presentation mould
Block 1308 executes load original, is shown by candidate displayed page.
For example, computer equipment shown in figure 15 can pass through the file encryption in file backup device as shown in figure 14
Module 1402, which executes, obtains file to be backed up, and file to be backed up is encrypted according to file encryption processing method, is obtained
Target encrypts file.Computer equipment can be executed by file backup module 1404 uploads target encryption file by queue,
To carry out classification backup.
In one embodiment, a kind of computer equipment, including memory and processor are provided, memory is stored with meter
Calculation machine program, when computer program is executed by processor, so that processor executes above-mentioned file encryption processing method, document presentation
The step of method or file backup method.The step of file encryption processing method, document presentation method or file backup method herein
Suddenly it can be the step in the file encryption processing method, document presentation method or file backup method of above-mentioned each embodiment.
In one embodiment, a kind of computer readable storage medium is provided, computer program, computer journey are stored with
When sequence is executed by processor, so that processor executes above-mentioned file encryption processing method, document presentation method or file backup side
The step of method.The step of file encryption processing method, document presentation method or file backup method can be above-mentioned each herein
Step in the file encryption processing method of embodiment, document presentation method or file backup method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read
In storage medium, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, provided herein
Each embodiment used in any reference to memory, storage, database or other media, may each comprise non-volatile
And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled
Journey ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory
(RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM
(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application
Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (13)
1. a kind of file encryption processing method, comprising:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted generates appearance corresponding with the file to be encrypted using the attribute information
Device;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the target adds
Ciphertext part is for sorting out the initial encryption file.
2. the method according to claim 1, wherein the method also includes:
Cover control is triggered by the setting page, obtains the corresponding cover exhibition method of the container;
Obtain the corresponding cover of the file to be encrypted;
Pass through candidate displayed page according to the cover exhibition method and shows the cover.
3. the method according to claim 1, wherein it is described to the file to be encrypted carry out encryption include:
User identifier is obtained, the first transform operation at least once is carried out to the user identifier, obtains corresponding first value;
Second transform operation at least once is carried out to the user identifier, obtains corresponding second value;
First value is spliced with the second value, obtains key;
It is encrypted using file to be encrypted described in the key pair.
4. method according to any one of claims 1 to 3, which is characterized in that described to be stored in the initial encryption file
Custom Space in the container, generating target encryption file includes:
Obtain the storage location of the Custom Space in the above-described container;
The initial encryption file is stored in the Custom Space according to the storage location, target is generated and encrypts file.
5. a kind of document presentation method, comprising:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
The operation for acting on the candidate displayed page is obtained, object is shown according to the operation selection target;
The corresponding backup information of the intended display object is pulled, the backup information includes backup address;
Identify whether the corresponding file of the intended display object is encryption file using the backup information;
When the corresponding file of the intended display object is encryption file, according to backup address downloading and the target exhibition
Show the corresponding target encryption file of object.
7. according to the method described in claim 5, it is characterized in that, the described initial encryption file is decrypted includes:
User identifier is obtained, the first transform operation at least once is carried out to the user identifier, obtains corresponding first value;
Second transform operation at least once is carried out to the user identifier, obtains corresponding second value;
First value is spliced with the second value, obtains key;
It is decrypted using initial encryption file described in the key pair.
8. according to the described in any item methods of claim 5 to 7, which is characterized in that the Custom Space in the container
Middle extraction initial encryption file includes:
Obtain the storage location of the Custom Space in the above-described container;
The initial encryption file is extracted from the Custom Space of the container according to the storage location.
9. a kind of file backup method, comprising:
File to be backed up is obtained, by the file to be backed up according to the described in any item file encryption processing sides of Claims 1-4
Method is encrypted, and obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
10. according to the method described in claim 9, it is characterized in that, the method also includes:
Obtain the corresponding cover of the file to be backed up;
By setting the page trigger cover control, obtain the corresponding cover exhibition method of the container so that the cover according to
The cover exhibition method is backed up.
11. a kind of file encryption processing unit, which is characterized in that described device includes:
Initial encryption module encrypts the file to be encrypted for obtaining file to be encrypted, obtains initial encryption text
Part;
Container generation module, for obtaining the attribute information of the file to be encrypted, using the attribute information generate with it is described
The corresponding container of file to be encrypted;
Target encrypting module generates target and adds for the initial encryption file to be stored in the Custom Space in the container
Ciphertext part, the target encryption file is for sorting out the initial encryption file.
12. a kind of document presentation device, which is characterized in that described device includes:
Document analysis module parses target encryption file, obtains container for obtaining target encryption file;
File extraction module, for extracting initial encryption file in the Custom Space of the container;
File decryption module obtains original for the initial encryption file to be decrypted;
Document presentation module is shown for loading the original by candidate displayed page.
13. a kind of file backup device, which is characterized in that described device includes:
File encryption module, for obtaining file to be backed up, by the file to be backed up according to any one of Claims 1-4 institute
The file encryption processing method stated is encrypted, and obtains target encryption file;
File backup module is uploaded for the target to be encrypted file by queue, to carry out classification backup.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910218307.1A CN109886047B (en) | 2019-03-21 | 2019-03-21 | File encryption processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910218307.1A CN109886047B (en) | 2019-03-21 | 2019-03-21 | File encryption processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109886047A true CN109886047A (en) | 2019-06-14 |
CN109886047B CN109886047B (en) | 2021-01-15 |
Family
ID=66933535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910218307.1A Active CN109886047B (en) | 2019-03-21 | 2019-03-21 | File encryption processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109886047B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111641497A (en) * | 2020-06-17 | 2020-09-08 | 深圳市钱海网络技术有限公司 | Method and device for automatically decrypting sensitive parameters |
CN112948843A (en) * | 2021-01-27 | 2021-06-11 | 维沃移动通信有限公司 | Encryption method, encryption device, electronic equipment and medium |
CN113268761A (en) * | 2021-07-20 | 2021-08-17 | 北京国电通网络技术有限公司 | Information encryption method and device, electronic equipment and computer readable medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050091517A1 (en) * | 2003-07-16 | 2005-04-28 | Pkware, Inc. | Method and system for mixed symmetric and asymmetric encryption of .ZIP files |
CN1868184A (en) * | 2003-10-17 | 2006-11-22 | 艾利森电话股份有限公司 | Container format for multimedia presentations |
CN101132272A (en) * | 2006-08-23 | 2008-02-27 | 中国科学院计算技术研究所 | System supporting downloading and using of distributed encrypted document |
CN103825953A (en) * | 2014-03-04 | 2014-05-28 | 武汉理工大学 | User mode encrypt file system |
CN104636679A (en) * | 2013-11-06 | 2015-05-20 | 黑莓有限公司 | Method and apparatus for controlling access to encrypted data |
CN105872745A (en) * | 2015-12-21 | 2016-08-17 | 乐视致新电子科技(天津)有限公司 | Extension method and device of input data sources |
US20170206364A1 (en) * | 2012-09-05 | 2017-07-20 | Amazon Technologies, Inc. | Decrypting content protected with initialization vector manipulation |
CN107122449A (en) * | 2017-04-25 | 2017-09-01 | 安徽大学 | File classification method and system based on public key encryption in multi-user environment |
CN108806773A (en) * | 2018-05-21 | 2018-11-13 | 上海熙业信息科技有限公司 | Medical image cloud storage platform designing method |
-
2019
- 2019-03-21 CN CN201910218307.1A patent/CN109886047B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050091517A1 (en) * | 2003-07-16 | 2005-04-28 | Pkware, Inc. | Method and system for mixed symmetric and asymmetric encryption of .ZIP files |
CN1868184A (en) * | 2003-10-17 | 2006-11-22 | 艾利森电话股份有限公司 | Container format for multimedia presentations |
CN101132272A (en) * | 2006-08-23 | 2008-02-27 | 中国科学院计算技术研究所 | System supporting downloading and using of distributed encrypted document |
US20170206364A1 (en) * | 2012-09-05 | 2017-07-20 | Amazon Technologies, Inc. | Decrypting content protected with initialization vector manipulation |
CN104636679A (en) * | 2013-11-06 | 2015-05-20 | 黑莓有限公司 | Method and apparatus for controlling access to encrypted data |
CN103825953A (en) * | 2014-03-04 | 2014-05-28 | 武汉理工大学 | User mode encrypt file system |
CN105872745A (en) * | 2015-12-21 | 2016-08-17 | 乐视致新电子科技(天津)有限公司 | Extension method and device of input data sources |
CN107122449A (en) * | 2017-04-25 | 2017-09-01 | 安徽大学 | File classification method and system based on public key encryption in multi-user environment |
CN108806773A (en) * | 2018-05-21 | 2018-11-13 | 上海熙业信息科技有限公司 | Medical image cloud storage platform designing method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111641497A (en) * | 2020-06-17 | 2020-09-08 | 深圳市钱海网络技术有限公司 | Method and device for automatically decrypting sensitive parameters |
CN112948843A (en) * | 2021-01-27 | 2021-06-11 | 维沃移动通信有限公司 | Encryption method, encryption device, electronic equipment and medium |
CN112948843B (en) * | 2021-01-27 | 2022-07-15 | 维沃移动通信有限公司 | Encryption method, encryption device, electronic equipment and medium |
CN113268761A (en) * | 2021-07-20 | 2021-08-17 | 北京国电通网络技术有限公司 | Information encryption method and device, electronic equipment and computer readable medium |
CN113268761B (en) * | 2021-07-20 | 2021-09-24 | 北京国电通网络技术有限公司 | Information encryption method and device, electronic equipment and computer readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN109886047B (en) | 2021-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10713391B2 (en) | Tamper protection and video source identification for video processing pipeline | |
Zhao et al. | TPE2: Three-pixel exact thumbnail-preserving image encryption | |
US10873568B2 (en) | Secure analytics using homomorphic and injective format-preserving encryption and an encrypted analytics matrix | |
US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
CN109886047A (en) | File encryption treating method and apparatus | |
US8738928B2 (en) | Apparatus and method for processing extension information in image files | |
TW202205118A (en) | Picture classification method and apparatus for protecting data privacy | |
CN107302706A (en) | Image anti-stealing link method, device and electronic equipment | |
CN116662941B (en) | Information encryption method, device, computer equipment and storage medium | |
EP3537319A1 (en) | Tamper protection and video source identification for video processing pipeline | |
US11929993B2 (en) | System, method and application for transcoding data into media files | |
CN112256893A (en) | Multimedia data processing method and device, electronic equipment and storage medium | |
Li et al. | Reversible data hiding in block compressed sensing images | |
CN114286131A (en) | Transmission method and device for anchor image model file in live broadcast wheat | |
CN108256343A (en) | Encryption method, device and the decryption method of Shader files, device | |
US20150082043A1 (en) | Terminal, server and digital content authorization method | |
CN116049783A (en) | Enterprise bill management method and system based on secure hardware carrier | |
CN112019642B (en) | Audio uploading method, device, equipment and storage medium | |
CN114398647A (en) | Data encryption storage method, encryption terminal and decryption terminal | |
CN113297586A (en) | Data decryption method and device | |
CN110443056A (en) | Data ciphering method, terminal and computer readable storage medium | |
Anam et al. | Random pixel embedding for hiding secret text over video file | |
CN110336772A (en) | Web data automatic evidence-collecting method and equipment based on encrypted authentication server | |
CN113794738B (en) | Data processing method and device, electronic equipment and storage medium | |
Sharma et al. | SecureCMerge: Secure PDF merging over untrusted servers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |