CN109886047A - File encryption treating method and apparatus - Google Patents

File encryption treating method and apparatus Download PDF

Info

Publication number
CN109886047A
CN109886047A CN201910218307.1A CN201910218307A CN109886047A CN 109886047 A CN109886047 A CN 109886047A CN 201910218307 A CN201910218307 A CN 201910218307A CN 109886047 A CN109886047 A CN 109886047A
Authority
CN
China
Prior art keywords
file
encrypted
encryption
target
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910218307.1A
Other languages
Chinese (zh)
Other versions
CN109886047B (en
Inventor
杨志权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910218307.1A priority Critical patent/CN109886047B/en
Publication of CN109886047A publication Critical patent/CN109886047A/en
Application granted granted Critical
Publication of CN109886047B publication Critical patent/CN109886047B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This application involves a kind of file encryption treating method and apparatus, which comprises obtains file to be encrypted, encrypts to the file to be encrypted, obtain initial encryption file;The attribute information for obtaining the file to be encrypted generates container corresponding with the file to be encrypted using the attribute information;The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the target encryption file is for sorting out the initial encryption file.Scheme provided by the present application may be implemented to encrypt file, and encrypted file is sorted out.

Description

File encryption treating method and apparatus
Technical field
It, can more particularly to a kind of file encryption processing method, device, computer this application involves Internet technical field Read storage medium and computer equipment.
Background technique
With the development of internet technology, there is on-line storage technology.User can be by registration user account to net Network hard disk is accessed and is managed.For example, user can be by file backup into network hard disc.If user account is stolen, File in network hard disc will be stolen.Therefore, it is necessary to back up in network hard disc again after encrypting to file.
In conventional manner, original can be encrypted to binary file after encrypting to file.However, binary system File it is unformatted, cannot recognize that file type during backup, network hard disc can not carry out encrypted file Sort out.Therefore, how file is encrypted, so that the technology that encrypted file can be classified into need to solve at present Problem.
Summary of the invention
Based on this, it is necessary to the technical issues of for that can not be sorted out by the encrypted file of conventional cryptography mode, provide A kind of file encryption processing method, device, computer readable storage medium and computer that encrypted file can be classified Equipment.
A kind of file encryption processing method, comprising:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted is generated corresponding with the file to be encrypted using the attribute information Container;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the mesh Mark encryption file is for sorting out the initial encryption file.
A kind of file encryption processing unit, described device include:
Initial encryption module encrypts the file to be encrypted, obtains initial encryption for obtaining file to be encrypted File;
Container generation module, for obtaining the attribute information of the file to be encrypted, using the attribute information generate with The corresponding container of the file to be encrypted;
Target encrypting module generates mesh for the initial encryption file to be stored in the Custom Space in the container Mark encryption file, the target encryption file is for sorting out the initial encryption file.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor, So that the processor executes following steps:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted is generated corresponding with the file to be encrypted using the attribute information Container;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the mesh Mark encryption file is for sorting out the initial encryption file.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the calculating When machine program is executed by the processor, so that the processor executes following steps:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted is generated corresponding with the file to be encrypted using the attribute information Container;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the mesh Mark encryption file is for sorting out the initial encryption file.
Above-mentioned file encryption processing method, device, computer readable storage medium and computer equipment, by to be encrypted File is encrypted, and initial encryption file is obtained, it is ensured that the safety of file to be encrypted.Utilize the attribute of file to be encrypted Information generates corresponding with file to be encrypted container, the attribute information of container with the attribute information of file to be encrypted be it is corresponding, By the Custom Space of initial encryption file deposit container, after generating target encryption file, target encrypts the attribute information of file Attribute information with file to be encrypted is also corresponding.Therefore, target encryption file can be sorted out according to attribute information, To realize that i.e. initial encryption file is sorted out to encrypted file.
A kind of document presentation method, comprising:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
A kind of document presentation device, described device include:
Document analysis module parses target encryption file, is held for obtaining target encryption file Device;
File extraction module, for extracting initial encryption file in the Custom Space of the container;
File decryption module obtains original for the initial encryption file to be decrypted;
Document presentation module is shown for loading the original by candidate displayed page.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor, So that the processor executes following steps:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the calculating When machine program is executed by the processor, so that the processor executes following steps:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
Above-mentioned document presentation method, apparatus, computer readable storage medium and computer equipment, by the mesh got Mark encryption file is parsed, and container is obtained.Initial encryption file is extracted from the Custom Space of container.To initial encryption text Part is decrypted, and can just obtain original and be shown, ensure that the safety of original.
A kind of file backup method, comprising:
File to be backed up is obtained, the file to be backed up is carried out according to the file encryption processing method in above-described embodiment Encryption obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
A kind of file backup device, described device include:
File encryption module, for obtaining file to be backed up, by the file to be backed up according to the text in above-described embodiment Part cipher processing method is encrypted, and obtains target encryption file;
File backup module is uploaded for the target to be encrypted file by queue, to carry out classification backup.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor, So that the processor executes following steps:
File to be backed up is obtained, the file to be backed up is carried out according to the file encryption processing method in above-described embodiment Encryption obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the calculating When machine program is executed by the processor, so that the processor executes following steps:
File to be backed up is obtained, the file to be backed up is carried out according to the file encryption processing method in above-described embodiment Encryption obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
Above-mentioned file backup method, device, computer readable storage medium and computer equipment, in the present embodiment, eventually File to be backed up is encrypted using file encryption processing method for end, and entire ciphering process does not need the participation of user, The encryption to file to be backed up can be completed in the case where user's unaware.The safety of file to be backed up is effectively guaranteed Property, while reducing user's operation, keep file backup process more convenient.Using what is obtained after the encryption of file encryption processing method The attribute information of target encryption file with the attribute information of file to be backed up be it is corresponding, target is encrypted file and is uploaded to by terminal Server, server can read the file type and file format identical with file to be backed up, to realize service Device sorts out target encryption file in backup.
Detailed description of the invention
Fig. 1 is the applied environment figure of file cipher processing method in one embodiment;
Fig. 2 is the flow diagram of file cipher processing method in one embodiment;
Fig. 3 is the interface schematic diagram that the setting page of cover control is triggered in one embodiment;
Fig. 4 be one embodiment Central Plains exhibition of paintings be shown as (a), hide be shown as (b), the fuzzy cover for being shown as (c) is shown The schematic diagram of mode;
Fig. 5 is the schematic diagram that the hiding displaying of mark is added in one embodiment;
Fig. 6 is flow diagram the step of encryption in one embodiment to file to be encrypted;
Fig. 7 is the structural schematic diagram of video file in one embodiment;
Fig. 8 is the flow diagram of file methods of exhibiting in one embodiment;
Fig. 9 is flow diagram the step of initial encryption file is decrypted in one embodiment;
Figure 10 is the interface schematic diagram that the page is decrypted in one embodiment;
Figure 11 is the flow diagram of file backup method in one embodiment;
Figure 12 is the structural block diagram of file cipher processing apparatus in one embodiment;
Figure 13 is the structural block diagram of document presentation device in one embodiment;
Figure 14 is the structural block diagram of file back-up device in one embodiment;
Figure 15 is the structural block diagram of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
Fig. 1 is the applied environment figure of file cipher processing method in one embodiment.Referring to Fig.1, this document encryption Method is applied to file encryption processing system.This document encryption treatment system includes terminal 110 and server 120.110 He of terminal Server 120 passes through network connection.Wherein, terminal 110 specifically can be terminal console or mobile terminal, and mobile terminal specifically may be used With at least one of mobile phone, tablet computer, laptop etc..Server 120 can be either more with independent server The server cluster of a server composition is realized.
As shown in Fig. 2, in one embodiment, providing a kind of file encryption processing method.The present embodiment is mainly with this Method is applied to the terminal 110 in above-mentioned Fig. 1 to illustrate.Referring to Fig. 2, this document cipher processing method specifically includes as follows Step:
S202 obtains file to be encrypted, encrypts to file to be encrypted, obtains initial encryption file.
File to be encrypted can be one of a plurality of types of files.For example, file to be encrypted may include but unlimited In audio file, video file, document files and image file.Wherein, a variety of in the present embodiment and following embodiments Refer to two or more.
The available file encryption instruction of terminal, obtains file to be encrypted according to file encryption instruction.File to be encrypted is deposited In the database of terminal local, terminal can obtain file to be encrypted from local data base for storage, carry out to file to be encrypted Encryption.Specifically, terminal can obtain file encryption instruction when showing that the encryption control in the page is triggered.File adds File identification to be encrypted is carried in close instruction, terminal obtains ciphertext to be added according to file identification to be encrypted from local data base Part.Encryption control can be entity control, be also possible to virtual control.Entity control can be the entity that is arranged in terminal by Key, virtual control be by terminal generate and display page presentation control, virtual control can by diversified forms and Show that any position of the page is shown.For example, virtual control can be planar graph, it is also possible to solid figure.Virtual control Can be at the top of the display page, it can also be in the bottom of the display page.
After terminal gets file to be encrypted, file to be encrypted is encrypted, obtains initial encryption file.Specifically, Terminal can encrypt file to be encrypted using one of a variety of cipher modes.For example, terminal can be to text to be encrypted Part carries out asymmetric encryption, can also carry out symmetric cryptography to file to be encrypted.Wherein, asymmetric encryption refers to that terminal generates one To key, i.e. public-key cryptography and private cipher key, public-key cryptography is corresponding with private cipher key and not identical, when using one of key After (such as public-key cryptography) encrypts file, corresponding another key (the corresponding private cipher key of public-key cryptography) can only be used File is decrypted.Symmetric cryptography refers to that terminal generates a key, which can simultaneously be encrypted and decrypted file. Terminal can also encrypt file using at least one of cipher mode Encryption Algorithm.For example, when terminal is to be encrypted When file carries out symmetric cryptography, AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm can be used Symmetric cryptography is carried out to file, obtains initial encryption file.
S204 obtains the attribute information of file to be encrypted, generates container corresponding with file to be encrypted using attribute information.
Terminal reads the attribute information of file to be encrypted, the attribute information that terminal can use file to be encrypted generate with to Encrypt the corresponding container of file.Wherein, container is corresponding with the attribute information of file to be encrypted and including Custom Space File.Custom Space in container can be used for storing initial encryption file, so that the attribute information of target encryption file It is corresponding with the attribute information of file to be encrypted, convenient for classifying to target encryption file.The container of generation follows ISO 14496 standards.14496 standard of ISO corresponds to MPEG-4 standard, is a kind of multimedia Uniform data format standard.For example, holding The format of device can be MP4, M4V, MOV or 3GP etc. and follow one of MPEG-4 reference format.
Specifically, different types of file to be encrypted possesses different attribute informations.File to be encrypted can be multiple types One of type file, a plurality of types of files may include video file, audio file, image file and document files.It is right It answers, when file to be encrypted is video file, corresponding attribute information includes but is not limited to file title, file format, text The information such as part label, video length, frame width, frame height, frame rate, data rate, audio bit rate, audio channel.When to When encryption file is audio file, corresponding attribute information includes but is not limited to file title, file format, file mark, sound The information such as frequency length, port number, bit rate, baud rate.When file to be encrypted is image file, corresponding attribute information includes But it is not limited to the information such as file title, file format, file mark, pixel, resolution ratio, locating depth, saturation degree.When file to be encrypted When for document files, corresponding attribute information includes but is not limited to file title, file format, file mark, number of pages, paragraph The information such as number, number of characters, line number.For example, terminal obtains the attribute letter of video file when file to be encrypted is video file Breath, can be according to the file format and the corresponding container of video length generation in attribute information, the file format and view of the container Frequency length is identical as file to be encrypted.
Initial encryption file is stored in the Custom Space in container by S206, is generated target and is encrypted file, target encryption text Part is for sorting out initial encryption file.
Terminal creates corresponding container using attribute information, which includes Custom Space.Terminal will be encrypted first Begin to encrypt in the Custom Space of file deposit container.The container that initial encryption file is incorporated in Custom Space is mesh Mark encryption file.Due to including file format in attribute information, the attribute information of container and the attribute information of file to be encrypted are It is corresponding.Therefore, the file format of container is identical as the file format of file to be encrypted, the target of generation encryption file format with The file format of file to be encrypted is also identical.The file format and corresponding file type of target encryption file can be known Not, convenient for sorting out to initial encryption file.
In the present embodiment, by encrypting to file to be encrypted, initial encryption file is obtained, it is ensured that be encrypted The safety of file.Container corresponding with file to be encrypted, the attribute letter of container are generated using the attribute information of file to be encrypted It is corresponding for ceasing with the attribute information of file to be encrypted, by the Custom Space of initial encryption file deposit container, generates target After encrypting file, the attribute information of target encryption file is also corresponding with the attribute information of file to be encrypted.Therefore, Ke Yigen Target encryption file is sorted out according to attribute information, to realize that i.e. initial encryption file is returned to encrypted file Class.
In one embodiment, terminal can also automatically be encrypted file to be encrypted.Terminal can be from local File to be encrypted is searched in database, and the file to be encrypted found is encrypted.Specifically, terminal can be according to connecing The user instruction received stores file into default file folder.Default file folder can be used for storing file to be encrypted.Terminal The file that unencryption is searched in can pressing from both sides from default file, is encrypted the file of unencryption as file to be encrypted.
Terminal can also be according to the user instruction received to file mark mark to be encrypted.Terminal recognition mark to be encrypted Corresponding file is encrypted using the corresponding file of mark to be encrypted as file to be encrypted.
In the present embodiment, terminal is stored or is marked to file to be encrypted according to user instructions, and terminal can be certainly Dynamic that file to be encrypted is encrypted, entire ciphering process does not need the operation that user triggers encryption file, to make text Part encryption is more convenient.
In one embodiment, terminal encrypts file to be encrypted, can also be right after obtained initial encryption file Initial encryption file is compressed, and compressed file is obtained.Terminal can be using one of a variety of compress modes to initial encryption File carries out compression processing.Specifically, terminal can be using one of lossy compression and lossless compression compress mode to initial It encrypts file and carries out compression processing, to obtain compressed file.Wherein, the compressed format of compressed file can be " .zip " or One of a variety of compressed formats such as " .rar ".Compressed compressed file can be stored in the customized sky in container by terminal Between, it generates target and encrypts file.Terminal obtains compressed file, compressed file is deposited by compressing to initial encryption file Enter in the Custom Space of container, reduces the corresponding memory space of initial encryption file, effectively save storage resource.
In one embodiment, above-mentioned file encryption processing method further include: cover control is triggered by the setting page, is obtained The corresponding cover exhibition method of extracting container;Obtain the corresponding cover of file to be encrypted;Pass through candidate exhibition according to cover exhibition method Show page presentation cover.
As shown in figure 3, terminal can be in the corresponding a variety of cover exhibition methods of setting page presentation container, for user's root Cover exhibition method is selected according to demand.Wherein, cover exhibition method includes but is not limited to fuzzy displaying, original painting is shown and hiding exhibition Show.Cover control is equipped in the setting page of terminal, terminal can obtain the corresponding cover displaying side of container by cover control Formula.
Terminal obtains the corresponding cover of file to be encrypted, using the corresponding cover of file to be encrypted as the cover of container.? In one embodiment, when file to be encrypted is video file, terminal can be made with a frame picture of selecting video content For the cover of container.Terminal can pass through candidate displayed page according to the corresponding cover exhibition method of container and show corresponding envelope Face.Wherein, candidate displayed page refers to displayed page when terminal display container or target encrypt file, for user's browsing Container or target encrypt file.Candidate displayed page can be the corresponding displaying of terminal for carrying out file encryption processing to be encrypted The page is also possible to the corresponding displayed page of terminal of other browsing containers or target encryption file.
Terminal can carry out corresponding pretreatment to cover according to the corresponding cover exhibition method of container.Specifically, such as Fig. 4 Shown, cover exhibition method may include that original painting shows, hides displaying and fuzzy displaying.When the cover displaying side that terminal is got When formula is that original painting is shown, terminal can not be pre-processed cover, i.e., by the corresponding cover of file to be encrypted directly as appearance Device cover is shown by candidate displayed page.Shown in cover such as Fig. 4 (a) that original painting is shown when showing.When terminal is got Cover exhibition method be when hiding to show, terminal is hidden processing to cover, i.e., logical using blank cover as container cover Candidate displayed page is crossed to be shown.It hides shown in the cover such as Fig. 4 (b) shown when showing.When the cover exhibition that terminal is got When showing that mode is fuzzy shows, terminal carries out Fuzzy Processing to cover.Specifically, terminal can use multi-Fuzzy processing mode One of to cover carry out Fuzzy Processing.For example, terminal can carry out Fuzzy Processing to cover by the way of gaussian filtering, Fuzzy Processing can also be carried out to cover by the way of mean filter.Terminal is sealed the cover after Fuzzy Processing as container Face is shown by candidate displayed page.Shown in the cover such as Fig. 4 (c) shown when fuzzy displaying.
In the present embodiment, terminal is by obtaining the corresponding cover exhibition method of container, in candidate displayed page with cover Exhibition method shows the corresponding cover of file to be encrypted, in order to user is clear, efficiently identify file encryption to be encrypted after it is right Container or target the encryption file answered.Terminal can modify cover document according to different degree, protect to cover document It is close, effectively raise the safety of target encryption file.
In one embodiment, when the cover exhibition method that terminal is got is to hide to show, terminal carries out cover After hiding processing, visible mark can also be added in blank cover.Wherein, visible mark can be the file with file to be encrypted The corresponding character mark of the attribute informations such as format or file type.For example, as shown in figure 5, when file to be encrypted is video text When part, the corresponding visible mark of video file can be added in blank cover, such as " encrypted video ".
In the present embodiment, when cover exhibition method is to hide to show, addition and file to be encrypted in blank cover Corresponding visible mark, so as to it is clear in blank cover, explicitly show file type, in order to identify cover for sky The corresponding file type of the file of white cover.
As shown in fig. 6, in one embodiment, the step of encrypting to file to be encrypted, includes:
S602 obtains user identifier, carries out the first transform operation at least once to user identifier, obtains corresponding first Value.
S604 carries out the second transform operation at least once to user identifier, obtains corresponding second value.
First value is spliced with second value, obtains key by S606.
S608 is encrypted using key pair file to be encrypted.
The available corresponding user identifier of user for carrying out file encryption of terminal.Wherein, user identifier may include using Family ID (Identification, identity number), such as user account.Terminal using user identifier to file to be encrypted into Row encryption, to effectively raise the safety of target encryption file.
After terminal gets user identifier, the first transform operation is carried out to user identifier.Terminal can to user identifier into Capable first transform operation at least once, obtains corresponding first value.First transform operation can using multiple encryption algorithms to Family mark is encrypted.For example, terminal can encrypt user identifier using hashing algorithm, terminal can use hash and calculate MD5 (Message-Digest Algorithm, Message Digest 5) in method converts user identifier, obtains corresponding First value.
Terminal can also carry out the second transform operation to user identifier.Terminal can carry out at least once the to user identifier Two transform operations obtain corresponding second value.Second transform operation can also carry out user identifier using multiple encryption algorithms Encryption.For example, terminal can be encrypted user identifier using hash function, corresponding hashed value is obtained, as the Two-value.Wherein, the first transform operation is the transform operation of two kinds of different encryptions from the second transform operation.
The first value that terminal obtains transform operation is spliced with second value, regard spliced value as key.Terminal It can use key pair file to be encrypted to be encrypted.Wherein, terminal can splice the first value and the using a variety of connecting methods Two-value.For example, terminal can splice the first value in preceding, second value after, key is obtained.Terminal can also be by second value Spliced after in preceding, the first value, obtains key.First value can also be mixed splicing with second value by terminal, obtain key.
Terminal can use key pair file to be encrypted and be encrypted, for example, terminal can use AES (Advanced Encryption Standard, Advanced Encryption Standard) symmetric cryptography is carried out to file to be encrypted.
In the present embodiment, after terminal gets user identifier, the first transform operation at least once is carried out to user identifier Second transform operation at least once respectively obtains the first value and second value, using the splicing result of the first value and second value as Key, substantially increases the complexity of key, and key is not easy to be cracked.It is encrypted, is had using key pair file to be encrypted The safety for improving file encryption of effect.
In one embodiment, terminal can also receive customized key by the setting page, utilize customized key pair File to be encrypted is encrypted.Specifically, terminal can show customized key reception entrance by the way that the page is arranged.Wherein, certainly Defining key reception entrance can be a floating-page, the customized key inputted for receiving user by input equipment. Customized key reception entrance can be the individual page in the setting page, be also possible to the subpage frame being arranged in the page.User Customized key can be inputted by the input equipment of diversified forms.Input equipment can be physical input device, such as entity Keyboard.It can also be virtual input device, such as dummy keyboard.Terminal can be obtained and be used by the input control of the setting page The customized key that family is inputted by input equipment, customized key can be by the groups such as number, letter, symbol at least The character string of one composition.Terminal can use customized key pair file to be encrypted and be encrypted.
In the present embodiment, terminal obtains customized key by the setting page, and customized key has privacy, utilizes Customized key pair file to be encrypted is encrypted, and the safety of file encryption can be effectively improved.
In one embodiment, terminal can use one or more values and generate key.For example, terminal individually can incite somebody to action oneself Key is defined as key, individually using the first value as key, individually using second value as key, the first value and second value are spelled It connects as key, the first value and customized key is subjected to splicing as key, second value and customized key are spliced As key, the first value, second value and customized key are subjected to splicing as key.Wherein, customized key, the first value, Second value and connecting method are referred to the description in the embodiment of above-mentioned file encryption processing method, therefore no longer superfluous herein It states.
In the present embodiment, key can be spliced by different values and be formed, and improved the complexity of key composition, passed through Complicated key pair file to be encrypted is encrypted, and the safety of file encryption is effectively raised.
In one embodiment, initial encryption file is stored in the Custom Space in container, generates target and encrypts file The step of include: to obtain Custom Space storage location in a reservoir;According to storage location by initial encryption file be stored in Custom Space generates target and encrypts file.
It include Custom Space in the container that terminal generates, Custom Space can be used for free storage file.Terminal can To obtain the storage location of Custom Space in a reservoir.Terminal deposits the initial encryption file that encryption obtains according to storage location Enter into Custom Space, generates target and encrypt file.For example, terminal can be generated when file to be encrypted is video file The corresponding container of video file.The format of container can be one of various video format.Container includes multiple spaces (box), space can be used for the information of storage file.The information of each space storage includes head information (Header) and data It (Date), include multiple fields in data.Wherein, data can be clear data, can also be made of at least one subspace.Eventually Initial encryption file can be stored in Custom Space by end, a field in space can also be chosen, by the field mark It is denoted as identifier, for being identified to target encryption file.For example, wyfs field mark can be identifier by terminal.Such as Shown in Fig. 7, here by taking the file of " .MOV " format as an example.The subspace udta in the space Moov is the customized sky of container Between, the initial encryption file obtained after encryption is stored in empty to udta by the storage location of the available subspace udta of terminal Between in.
In the present embodiment, terminal obtains the storage location of Custom Space, according to storage location by initial encryption file Deposit into Custom Space, generate target encrypt file, the attribute information of the initial encryption file encrypted may be with The attribute information of file to be encrypted does not correspond to, and initial encryption file is stored in the Custom Space of container by terminal, so that generating Target encryption file include initial encryption file data content, and attribute information is corresponding with file to be encrypted, in order to right Target encryption file is sorted out.
Meanwhile target encryption file in add identifier so that terminal can be determined by identifier file whether be Target encrypts file, does not need to be downloaded file and parse to judge whether file is target encryption file, effectively Resource is saved.
As shown in figure 8, in one embodiment, providing a kind of document presentation method.The present embodiment is mainly in this way It is illustrated applied to the terminal 110 in above-mentioned Fig. 1.Referring to Fig. 8, this document methods of exhibiting specifically comprises the following steps:
S802 obtains target and encrypts file, parses to target encryption file, obtains container.
S804 extracts initial encryption file in the Custom Space of container.
Initial encryption file is decrypted, obtains original by S806.
S808 loads original, is shown by candidate displayed page.
Terminal can obtain target encryption file in several ways, for example, target encryption file can be stored in end End local, terminal obtains target encryption file from local data base.Target encryption file is also possible to be stored in server Database in, terminal obtained from server target encryption file.Specifically, terminal can be from the database of server It downloads target and encrypts file, terminal can also receive the target encryption file that server issues.
It is the file obtained after being encrypted by file encryption processing method to original, original that target, which encrypts file, It is corresponding with the file to be encrypted in file encryption processing method.Terminal can encrypt file to target and parse, and obtain container. Container includes Custom Space, and the attribute information of container and the attribute information of original are corresponding.Container follows the mark of ISO 14496 It is quasi-.14496 standard of ISO corresponds to MPEG-4 standard, is a kind of multimedia Uniform data format standard.For example, the format of container It can be MP4, M4V, MOV or 3GP etc. and follow one of MPEG-4 reference format.Terminal is mentioned from the Custom Space of container Initial encryption file is taken, initial encryption file is the file obtained after encrypting to original.Wherein, file encryption processing side Method is referred to the description in the corresponding embodiment of above-mentioned file encryption processing method.
Initial encryption file is decrypted terminal, specifically, terminal obtains the corresponding key of initial encryption file, utilizes Key pair initial encryption file is decrypted, and obtains original.Original can be one of a plurality of types of files, example Such as, original can include but is not limited to audio file, video file, document files and image file.
Terminal loads original shows original by candidate displayed page.Wherein, candidate displayed page refers to terminal exhibition Show displayed page when original, so that user browses original.Candidate displayed page, which can be, carries out original encryption The corresponding displayed page of terminal, be also possible to other browsing originals the corresponding displayed page of terminal.
In the present embodiment, it is parsed by encrypting file to the target got, obtains container.From making by oneself for container Initial encryption file is extracted in adopted space.Initial encryption file is decrypted, original can be just obtained and is shown, is guaranteed The safety of original.
During the displaying to original, terminal can find initial encryption file from the Custom Space of container, And directly initial encryption file is decrypted using corresponding key, entire document presentation process does not need the participation of user, Original after can showing decryption in the case where user's unaware, reduces user's operation, makes document presentation process more It is convenient.
In one embodiment, above-mentioned document presentation method further include: obtain the operation for acting on candidate displayed page, root Object is shown according to operation selection target;The corresponding backup information of intended display object is pulled, well-behaved information includes backup address;Benefit It whether is encryption file with the corresponding file of backup information identification intended display object;When the corresponding file of intended display object is When encrypting file, target corresponding with intended display object is downloaded according to backup address and encrypts file.
Terminal can show object in candidate displayed page.Wherein, terminal can take various forms displaying and show Object.For example, terminal, which can use, shows that the corresponding character mark of object shows object, terminal also can use displaying pair As corresponding image identification displaying displaying object, terminal can also show displaying pair using the combination of character mark and image identification As.Terminal obtains the operation that user acts on candidate displayed page, and operation is used to indicate terminal selection and shows object, by selection Object is shown as intended display object, i.e. intended display object is at least one shown in object that candidate displayed page is shown It is a.
Terminal pulls the corresponding backup information of intended display object from server, and backup information is in terminal by target exhibition Show and be formed and stored in server when object is uploaded to server backup, includes that intended display object is corresponding in backup information Backup address.
Whether terminal is encryption file using the corresponding file of backup information identification intended display object.Specifically, file It is equipped with identifier after encryption, identifier is for identifying file as encryption file.Terminal can identify that intended display object is corresponding Backup information in whether there is identifier, when in the corresponding backup information of intended display object there are when identifier, then target Show that the corresponding file of object is target encryption file.When there is no identifiers in the corresponding backup information of intended display object When, then the corresponding file of intended display object is not target encryption file.
When the corresponding file of intended display object is that target encrypts file, terminal can be according to backup address, i.e. file Corresponding storage address when backup downloads target encryption text corresponding with intended display object from the database of server Part.Terminal can use document presentation method described in above-described embodiment and target encryption file be decrypted and shown.
In the present embodiment, terminal shows object, benefit by the operation selection target that user acts on candidate displayed page It may determine that whether the corresponding file of intended display object is target encryption file with the corresponding backup information of intended display object, When being target encryption file, then encrypted according to the corresponding target of backup address downloading intended display object in backup information File.When not being target encryption file, then the corresponding file of downloading intended display object is not needed.Terminal can pass through backup Information directly judges whether the corresponding file of intended display object is target encryption file, does not need intended display object is corresponding Data downloading after judge whether it is again target encryption file, effectively save the data transmission resources of terminal, reduce into This.
As shown in figure 9, in one embodiment, the step of initial encryption file is decrypted, includes:
S902 obtains user identifier, carries out the first transform operation at least once to user identifier, obtains corresponding first Value.
S904 carries out the second transform operation at least once to user identifier, obtains corresponding second value.
First value is spliced with second value, obtains key by S906.
S908 is decrypted using key pair initial encryption file.
The available corresponding user identifier of user for carrying out document presentation of terminal.Wherein, user identifier may include using Family ID (Identification, identity number), such as user account.Terminal using user identifier to file to be encrypted into Row decryption, to effectively raise the safety of target encryption file.
After terminal gets user identifier, the first transform operation is carried out to user identifier.Terminal can to user identifier into Capable first transform operation at least once, obtains corresponding first value.First transform operation can using multiple encryption algorithms to Family mark is encrypted.For example, terminal can encrypt user identifier using hashing algorithm, terminal can use hash and calculate MD5 (Message-Digest Algorithm, Message Digest 5) in method converts user identifier, obtains corresponding First value.
Terminal can also carry out the second transform operation to user identifier.Terminal can carry out at least once the to user identifier Two transform operations obtain corresponding second value.Second transform operation can also carry out user identifier using multiple encryption algorithms Encryption.For example, terminal can be encrypted user identifier using hash function, corresponding hashed value is obtained, as the Two-value.Wherein, the first transform operation is the transform operation of two kinds of different encryptions from the second transform operation.
The first value that terminal obtains transform operation is spliced with second value, regard spliced value as key.Terminal It is decrypted using the key pair initial encryption file.Wherein, terminal can splice the first value and the using a variety of connecting methods Two-value.For example, terminal can splice the first value in preceding, second value after, key is obtained.Terminal can also be by second value Spliced after in preceding, the first value, obtains key.First value can also be mixed splicing with second value by terminal, obtain key.
In the present embodiment, after terminal gets user identifier, the first transform operation at least once is carried out to user identifier Second transform operation at least once respectively obtains the first value and second value, splices the first value and second value to obtain key, greatly The complexity for improving key greatly, is decrypted using the key pair initial encryption file, effectively raises target encryption text The safety of part.Meanwhile key, from user identifier transformation, terminal can obtain key by transform operation.Entire decryption Process does not need user's participation, as long as user identifier is corresponding with target encryption file, so that it may realize to initial encryption file Decryption, the original after decryption can be shown in the case where user's unaware, reduces user's operation, to effectively improve User experience.
In one embodiment, terminal can also be encrypted in ciphering process using customized key pair original, It is corresponding, terminal can receive user by decryption the page input customized key, using customized key pair original into Row decryption.Specifically, as shown in Figure 10, terminal can show customized key reception entrance by decrypting the page.Wherein, it makes by oneself Adopted key reception entrance can be a floating-page, the customized key inputted for receiving user by input equipment.From Defining key reception entrance can be the individual page decrypted in the page, be also possible to decrypt the subpage frame in the page.Terminal can By the input control of the decryption page, to obtain the customized key that inputs by input equipment of user, customized key can be with By at least one character string formed in the groups such as number, letter, symbol.It is initial that terminal can use customized key pair Encryption file is decrypted.
In the present embodiment, terminal obtains the customized key of user's input by the decryption page, and customized key has Privacy could be decrypted initial encryption file using customized key, can effectively improve target encryption file Safety.
In one embodiment, the corresponding key generating mode of the available target encryption file of terminal, it is raw according to key Key is generated at mode.Terminal generates key according to key generating mode, is decrypted using key pair initial encryption file.Tool Body, the corresponding key generating mode of terminal available target encryption file, key generating mode be terminal to original into The generating mode of key is generated when row encryption.For example, terminal can be individually using customized key as key, individually by the first value As key, individually using second value as key, regard the first value and second value splicing as key, by the first value with it is customized close Key carries out splicing as key, and second value and customized key are carried out splicing as key, and the first value and is made by oneself second value Adopted key carries out splicing as key.Wherein, customized key, the first value, second value and connecting method are referred to above-mentioned Description in the embodiment of file encryption processing method, therefore details are not described herein.
In the present embodiment, terminal can generate key according to key generating mode, and key can be worth by one or more Composition, improves the complexity of key, effectively raises the safety of target encryption file.
In one embodiment, the step of initial encryption file is extracted in the Custom Space of container includes: to be obtained from The storage location of definition space in a reservoir;Initial encryption file is extracted from the Custom Space of container according to storage location.
It include Custom Space in container, Custom Space can be used for free storage file.Terminal is available to be made by oneself The storage location of adopted space in a reservoir.The initial encryption file in Custom Space is found according to storage location, will initially be added Ciphertext part is extracted from Custom Space.
In the present embodiment, by obtaining Custom Space storage location in a reservoir, according to storage location from container Custom Space in extract initial encryption file, so that initial encryption file be decrypted, obtained original is carried out It shows.Initial encryption file stores in Custom Space, and terminal can use target encryption file and carry out to initial encryption file Sort out, initial encryption file is sorted out to realize.
As shown in figure 11, in one embodiment, a kind of file backup method is provided.The present embodiment is mainly in this way It is illustrated applied to the terminal 110 in above-mentioned Fig. 1.Referring to Fig.1 1, this document backup method specifically comprises the following steps:
S1102 obtains file to be backed up, and file to be backed up is encrypted according to file encryption processing method, is obtained File is encrypted to target.
Target is encrypted file and is uploaded by queue, to carry out classification backup by S1104.
Terminal is referred to the file encryption processing side provided in above-described embodiment when receiving file backup instruction File to be backed up is encrypted in method, obtains target encryption file.Wherein, it is close to can use user identifier generation for terminal Key is encrypted using key pair file to be backed up, to obtain target encryption file, entire ciphering process does not need to use Family participates in.Target encryption file is uploaded to server by queue by terminal, so that server returns target encryption file Class backup.
In the present embodiment, file to be backed up is encrypted using file encryption processing method for terminal, entire to add Close process does not need the participation of user, and the encryption to file to be backed up can be completed in the case where user's unaware.Effectively It ensure that the safety of file to be backed up, while reducing user's operation, keep file backup process more convenient.
Using the attribute information and file to be backed up of the target encryption file obtained after the encryption of file encryption processing method Attribute information be it is corresponding, terminal by target encryption file be uploaded to server, server can be read and file to be backed up Identical file type and file format sorts out target encryption file in backup to realize server.
In one embodiment, above-mentioned file backup method further include: obtain the corresponding cover of file to be backed up;By setting Page triggering cover control is set, the corresponding cover exhibition method of container is obtained, so that cover is standby according to the progress of cover exhibition method Part.
Terminal obtains the corresponding cover of file to be encrypted, using the corresponding cover of file to be encrypted as the cover of container.? In one embodiment, when file to be encrypted is video file, terminal can be made with a frame picture of selecting video content For the cover of container.
Terminal can be in the corresponding a variety of cover exhibition methods of setting page presentation container.Wherein, cover exhibition method packet It includes but is not limited to fuzzy displaying, original painting is shown and hides displaying.Cover control is equipped in the setting page of terminal, cover control can For selecting the corresponding cover exhibition method of container.The cover control that terminal can be triggered by the setting page obtains container pair The cover exhibition method answered.
Terminal can carry out corresponding pretreatment to cover according to the corresponding cover exhibition method of container.Specifically, when eventually When the cover exhibition method got being held to show for original painting, terminal can not be pre-processed cover, i.e., by file to be encrypted Corresponding cover is directly as container cover.When the cover exhibition method that terminal is got is to hide to show, terminal is to cover It is hidden processing, i.e., using blank cover as container cover.When the cover exhibition method that terminal is got is fuzzy shows, Terminal carries out Fuzzy Processing to cover.Specifically, terminal can carry out cover using one of multi-Fuzzy processing mode Fuzzy Processing.For example, terminal can carry out Fuzzy Processing to cover by the way of gaussian filtering, mean filter can also be used Mode to cover carry out Fuzzy Processing.Terminal is using the cover after Fuzzy Processing as container cover.
Terminal pre-processes cover, the cover that obtains that treated, and treated cover with target is encrypted file one It rises and is uploaded to server, cover is backed up so that server is according to treated, and cover shows that target adds so that treated Ciphertext part.
In the present embodiment, terminal is by obtaining the corresponding cover exhibition method of container, according to cover exhibition method to envelope Face is pre-processed.Server backs up together with treated cover when backup target encrypts file, and with treated envelope Face shows that target encrypts file, in order to which clear, efficiently identification target encrypts file.Terminal can also be according to different degree Cover document is modified, is maintained secrecy to cover document, the safety of target encryption file is effectively raised.
In one embodiment, when the cover exhibition method that terminal is got is to hide to show, terminal carries out cover After hiding processing, default mark can also be added in blank cover.Wherein, default mark can be the file with file to be encrypted The corresponding character mark of the attribute informations such as format or file type.For example, as shown in figure 5, when file to be encrypted is video text When part, the corresponding character mark of video file can be added in blank cover, such as " encrypted video ".
In the present embodiment, when cover exhibition method is to hide to show, addition and file to be encrypted in blank cover Corresponding default mark, so as to it is clear in blank cover, explicitly show file type, in order to identify cover for sky The corresponding file type of the file of white cover.
Fig. 2, Fig. 6, Fig. 8, Fig. 9, Figure 11 are the flow diagram in embodiment.Although should be understood that Fig. 2, Fig. 6, Each step in the flow chart of Fig. 8, Fig. 9, Figure 11 is successively shown according to the instruction of arrow, but these steps are not certainty It is successively executed according to the sequence that arrow indicates.Unless expressly stating otherwise herein, there is no stringent for the execution of these steps Sequence limits, these steps can execute in other order.Moreover, at least part in Fig. 2, Fig. 6, Fig. 8, Fig. 9, Figure 11 Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out, But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
As shown in figure 12, in one embodiment, a kind of file encryption processing unit is provided, which includes initial add Close module 1202, container generation module 1204 and target encrypting module 1206, in which:
Initial encryption module 1202 encrypts file to be encrypted, obtains initial encryption for obtaining file to be encrypted File.
Container generation module 1204, for obtaining the attribute information of file to be encrypted, using attribute information generate with it is to be added The corresponding container of ciphertext part.
Target encrypting module 1206, the Custom Space for being stored in initial encryption file in container, generates target and adds Ciphertext part, target encryption file is for sorting out initial encryption file.
Above-mentioned file encryption processing unit obtains initial encryption file, Ke Yibao by encrypting to file to be encrypted Demonstrate,prove the safety of file to be encrypted.Container corresponding with file to be encrypted, container are generated using the attribute information of file to be encrypted Attribute information with the attribute information of file to be encrypted be it is corresponding, by the Custom Space of initial encryption file deposit container, After generating target encryption file, the attribute information of target encryption file is also corresponding with the attribute information of file to be encrypted.Cause This, can sort out target encryption file according to attribute information, to reach the effect sorted out to encrypted file Fruit.
In one embodiment, above-mentioned file encryption processing unit further includes cover display module, for passing through setting page Cover control is triggered in face, obtains the corresponding cover exhibition method of container;Obtain the corresponding cover of file to be encrypted;According to cover exhibition Show that mode passes through candidate displayed page and shows cover.
In one embodiment, initial encryption module 1202 is also used to obtain user identifier, carries out at least to user identifier First transform operation obtains corresponding first value;Second transform operation at least once is carried out to user identifier, is corresponded to Second value;First value is spliced with second value, obtains key;It is encrypted using key pair file to be encrypted.
In one embodiment, target encrypting module 1206 is also used to obtain the storage position of Custom Space in a reservoir It sets;Initial encryption file is stored in Custom Space according to storage location, target is generated and encrypts file.
As shown in figure 13, in one embodiment, a kind of document presentation device is provided, which includes document analysis mould Block 1302, file extraction module 1304, file decryption module 1306 and document presentation module 1308, in which:
Document analysis module 1302 parses target encryption file, is held for obtaining target encryption file Device.
File extraction module 1304, for extracting initial encryption file in the Custom Space of container.
File decryption module 1306 obtains original for initial encryption file to be decrypted.
Document presentation module 1308 is shown for loading original by candidate displayed page.
Above-mentioned document presentation device is parsed by encrypting file to the target got, obtains container.From container Initial encryption file is extracted in Custom Space.Initial encryption file is decrypted, original can be just obtained and is shown, It ensure that the safety of original.
During the displaying to original, terminal can find initial encryption file from the Custom Space of container, And directly initial encryption file is decrypted using corresponding key, entire document presentation process does not need the participation of user, Original after can showing decryption in the case where user's unaware, reduces user's operation, makes document presentation process more It is convenient.
In one embodiment, above-mentioned document presentation device further includes file download module, acts on candidate for obtaining The operation of displayed page shows object according to operation selection target;Pull the corresponding backup information of intended display object, backup letter Breath includes backup address;It whether is encryption file using the corresponding file of backup information identification intended display object;When target exhibition When showing the corresponding file of object to encrypt file, target corresponding with intended display object is downloaded according to backup address and encrypts text Part.
In one embodiment, file decryption module 1306 is also used to obtain user identifier, carries out at least to user identifier First transform operation obtains corresponding first value;Second transform operation at least once is carried out to user identifier, is corresponded to Second value;First value is spliced with second value, obtains key;It is decrypted using key pair initial encryption file.
In one embodiment, file extraction module 1304 is also used to obtain the storage position of Custom Space in a reservoir It sets;Initial encryption file is extracted from the Custom Space of container according to storage location.
As shown in figure 14, in one embodiment, a kind of file backup device is provided, which includes file encryption mould Block 1402 and file backup module 1404, in which:
File encryption module 1402, for obtaining file to be backed up, by file to be backed up according to being described in above-described embodiment File encryption processing method be encrypted, obtain target encryption file.
File backup module 1404 is uploaded for target to be encrypted file by queue, to carry out classification backup.
Above-mentioned file backup device, in the present embodiment, terminal to file to be backed up using file encryption processing method into Row encryption, entire ciphering process do not need the participation of user, can complete in the case where user's unaware to be backed up The encryption of file.The safety of file to be backed up is effectively guaranteed, while reducing user's operation, makes file backup more just It is prompt.Believed using the attribute information of target encryption file and the attribute of file to be backed up that are obtained after the encryption of file encryption processing method Breath be it is corresponding, terminal by target encryption file be uploaded to server, server can read identical with file to be backed up File type and file format, thus realize server backup when to target encryption file sort out.
In one embodiment, above-mentioned file backup device further includes cover backup module, for obtaining file to be backed up Corresponding cover;Cover control is triggered by the setting page, the corresponding cover exhibition method of container is obtained, so that cover is according to envelope Face exhibition method is backed up.
Figure 15 shows the internal structure chart of computer equipment in one embodiment.The computer equipment specifically can be figure Terminal 110 in 1.As shown in figure 15, it includes the place connected by system bus which, which includes the computer equipment, Manage device, memory, network interface, input unit and display screen.Wherein, memory includes non-volatile memory medium and interior storage Device.The non-volatile memory medium of the computer equipment is stored with operating system, can also be stored with computer program, the computer When program is executed by processor, processor may make to realize file encryption processing method, document presentation method or file backup side Method.Computer program can also be stored in the built-in storage, when which is executed by processor, processor may make to hold Style of writing part cipher processing method, document presentation method or file backup method.The display screen of computer equipment can be liquid crystal Display screen or electric ink display screen, the input unit of computer equipment can be the touch layer covered on display screen, can also be with It is the key being arranged on computer equipment shell, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse Deng.
It will be understood by those skilled in the art that structure shown in Figure 15, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, file encryption processing unit provided by the present application, document presentation device or file backup dress The form that can be implemented as a kind of computer program is set, computer program can be run in computer equipment as shown in figure 15. Composition this document cipher processing apparatus, document presentation device or file backup device can be stored in the memory of computer equipment Each program module, for example, initial encryption module 1202, container generation module 1204 shown in Figure 12 and target encrypting module Document analysis module 1302, file extraction module 1304 shown in 1206, Figure 13, file decryption module 1306 and document presentation mould Block 1308, file encryption module 1402 and file backup module 1404 shown in Figure 14.The computer that each program module is constituted Program makes processor execute the file encryption processing method of each embodiment of the application described in this specification, document presentation Step in method or file backup method.
For example, computer equipment shown in figure 15 can be by initial in file encryption processing unit as shown in figure 12 Encrypting module 1202, which executes, obtains file to be encrypted, encrypts to file to be encrypted, obtains initial encryption file.Computer is set It is standby that the attribute information for obtaining file to be encrypted can be executed by container generation module 1204, using attribute information generate with it is to be encrypted The corresponding container of file.Computer equipment can be executed by target encrypting module 1206 and initial encryption file is stored in container Custom Space generates target and encrypts file, and target encryption file is for sorting out initial encryption file.
For example, computer equipment shown in figure 15 can pass through the document analysis in document presentation device as shown in fig. 13 that Module 1302, which executes, obtains target encryption file, parses to target encryption file, obtains container.Computer equipment can pass through File extraction module 1304 is executed extracts initial encryption file in the Custom Space of container.Computer equipment can pass through file Initial encryption file is decrypted the execution of deciphering module 1306, obtains original.Computer equipment can pass through document presentation mould Block 1308 executes load original, is shown by candidate displayed page.
For example, computer equipment shown in figure 15 can pass through the file encryption in file backup device as shown in figure 14 Module 1402, which executes, obtains file to be backed up, and file to be backed up is encrypted according to file encryption processing method, is obtained Target encrypts file.Computer equipment can be executed by file backup module 1404 uploads target encryption file by queue, To carry out classification backup.
In one embodiment, a kind of computer equipment, including memory and processor are provided, memory is stored with meter Calculation machine program, when computer program is executed by processor, so that processor executes above-mentioned file encryption processing method, document presentation The step of method or file backup method.The step of file encryption processing method, document presentation method or file backup method herein Suddenly it can be the step in the file encryption processing method, document presentation method or file backup method of above-mentioned each embodiment.
In one embodiment, a kind of computer readable storage medium is provided, computer program, computer journey are stored with When sequence is executed by processor, so that processor executes above-mentioned file encryption processing method, document presentation method or file backup side The step of method.The step of file encryption processing method, document presentation method or file backup method can be above-mentioned each herein Step in the file encryption processing method of embodiment, document presentation method or file backup method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read In storage medium, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, provided herein Each embodiment used in any reference to memory, storage, database or other media, may each comprise non-volatile And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled Journey ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (13)

1. a kind of file encryption processing method, comprising:
File to be encrypted is obtained, the file to be encrypted is encrypted, initial encryption file is obtained;
The attribute information for obtaining the file to be encrypted generates appearance corresponding with the file to be encrypted using the attribute information Device;
The initial encryption file is stored in the Custom Space in the container, target is generated and encrypts file, the target adds Ciphertext part is for sorting out the initial encryption file.
2. the method according to claim 1, wherein the method also includes:
Cover control is triggered by the setting page, obtains the corresponding cover exhibition method of the container;
Obtain the corresponding cover of the file to be encrypted;
Pass through candidate displayed page according to the cover exhibition method and shows the cover.
3. the method according to claim 1, wherein it is described to the file to be encrypted carry out encryption include:
User identifier is obtained, the first transform operation at least once is carried out to the user identifier, obtains corresponding first value;
Second transform operation at least once is carried out to the user identifier, obtains corresponding second value;
First value is spliced with the second value, obtains key;
It is encrypted using file to be encrypted described in the key pair.
4. method according to any one of claims 1 to 3, which is characterized in that described to be stored in the initial encryption file Custom Space in the container, generating target encryption file includes:
Obtain the storage location of the Custom Space in the above-described container;
The initial encryption file is stored in the Custom Space according to the storage location, target is generated and encrypts file.
5. a kind of document presentation method, comprising:
It obtains target and encrypts file, target encryption file is parsed, container is obtained;
Initial encryption file is extracted in the Custom Space of the container;
The initial encryption file is decrypted, original is obtained;
The original is loaded, is shown by candidate displayed page.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
The operation for acting on the candidate displayed page is obtained, object is shown according to the operation selection target;
The corresponding backup information of the intended display object is pulled, the backup information includes backup address;
Identify whether the corresponding file of the intended display object is encryption file using the backup information;
When the corresponding file of the intended display object is encryption file, according to backup address downloading and the target exhibition Show the corresponding target encryption file of object.
7. according to the method described in claim 5, it is characterized in that, the described initial encryption file is decrypted includes:
User identifier is obtained, the first transform operation at least once is carried out to the user identifier, obtains corresponding first value;
Second transform operation at least once is carried out to the user identifier, obtains corresponding second value;
First value is spliced with the second value, obtains key;
It is decrypted using initial encryption file described in the key pair.
8. according to the described in any item methods of claim 5 to 7, which is characterized in that the Custom Space in the container Middle extraction initial encryption file includes:
Obtain the storage location of the Custom Space in the above-described container;
The initial encryption file is extracted from the Custom Space of the container according to the storage location.
9. a kind of file backup method, comprising:
File to be backed up is obtained, by the file to be backed up according to the described in any item file encryption processing sides of Claims 1-4 Method is encrypted, and obtains target encryption file;
The target is encrypted file to upload by queue, to carry out classification backup.
10. according to the method described in claim 9, it is characterized in that, the method also includes:
Obtain the corresponding cover of the file to be backed up;
By setting the page trigger cover control, obtain the corresponding cover exhibition method of the container so that the cover according to The cover exhibition method is backed up.
11. a kind of file encryption processing unit, which is characterized in that described device includes:
Initial encryption module encrypts the file to be encrypted for obtaining file to be encrypted, obtains initial encryption text Part;
Container generation module, for obtaining the attribute information of the file to be encrypted, using the attribute information generate with it is described The corresponding container of file to be encrypted;
Target encrypting module generates target and adds for the initial encryption file to be stored in the Custom Space in the container Ciphertext part, the target encryption file is for sorting out the initial encryption file.
12. a kind of document presentation device, which is characterized in that described device includes:
Document analysis module parses target encryption file, obtains container for obtaining target encryption file;
File extraction module, for extracting initial encryption file in the Custom Space of the container;
File decryption module obtains original for the initial encryption file to be decrypted;
Document presentation module is shown for loading the original by candidate displayed page.
13. a kind of file backup device, which is characterized in that described device includes:
File encryption module, for obtaining file to be backed up, by the file to be backed up according to any one of Claims 1-4 institute The file encryption processing method stated is encrypted, and obtains target encryption file;
File backup module is uploaded for the target to be encrypted file by queue, to carry out classification backup.
CN201910218307.1A 2019-03-21 2019-03-21 File encryption processing method and device Active CN109886047B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910218307.1A CN109886047B (en) 2019-03-21 2019-03-21 File encryption processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910218307.1A CN109886047B (en) 2019-03-21 2019-03-21 File encryption processing method and device

Publications (2)

Publication Number Publication Date
CN109886047A true CN109886047A (en) 2019-06-14
CN109886047B CN109886047B (en) 2021-01-15

Family

ID=66933535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910218307.1A Active CN109886047B (en) 2019-03-21 2019-03-21 File encryption processing method and device

Country Status (1)

Country Link
CN (1) CN109886047B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111641497A (en) * 2020-06-17 2020-09-08 深圳市钱海网络技术有限公司 Method and device for automatically decrypting sensitive parameters
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
CN113268761A (en) * 2021-07-20 2021-08-17 北京国电通网络技术有限公司 Information encryption method and device, electronic equipment and computer readable medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091517A1 (en) * 2003-07-16 2005-04-28 Pkware, Inc. Method and system for mixed symmetric and asymmetric encryption of .ZIP files
CN1868184A (en) * 2003-10-17 2006-11-22 艾利森电话股份有限公司 Container format for multimedia presentations
CN101132272A (en) * 2006-08-23 2008-02-27 中国科学院计算技术研究所 System supporting downloading and using of distributed encrypted document
CN103825953A (en) * 2014-03-04 2014-05-28 武汉理工大学 User mode encrypt file system
CN104636679A (en) * 2013-11-06 2015-05-20 黑莓有限公司 Method and apparatus for controlling access to encrypted data
CN105872745A (en) * 2015-12-21 2016-08-17 乐视致新电子科技(天津)有限公司 Extension method and device of input data sources
US20170206364A1 (en) * 2012-09-05 2017-07-20 Amazon Technologies, Inc. Decrypting content protected with initialization vector manipulation
CN107122449A (en) * 2017-04-25 2017-09-01 安徽大学 File classification method and system based on public key encryption in multi-user environment
CN108806773A (en) * 2018-05-21 2018-11-13 上海熙业信息科技有限公司 Medical image cloud storage platform designing method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091517A1 (en) * 2003-07-16 2005-04-28 Pkware, Inc. Method and system for mixed symmetric and asymmetric encryption of .ZIP files
CN1868184A (en) * 2003-10-17 2006-11-22 艾利森电话股份有限公司 Container format for multimedia presentations
CN101132272A (en) * 2006-08-23 2008-02-27 中国科学院计算技术研究所 System supporting downloading and using of distributed encrypted document
US20170206364A1 (en) * 2012-09-05 2017-07-20 Amazon Technologies, Inc. Decrypting content protected with initialization vector manipulation
CN104636679A (en) * 2013-11-06 2015-05-20 黑莓有限公司 Method and apparatus for controlling access to encrypted data
CN103825953A (en) * 2014-03-04 2014-05-28 武汉理工大学 User mode encrypt file system
CN105872745A (en) * 2015-12-21 2016-08-17 乐视致新电子科技(天津)有限公司 Extension method and device of input data sources
CN107122449A (en) * 2017-04-25 2017-09-01 安徽大学 File classification method and system based on public key encryption in multi-user environment
CN108806773A (en) * 2018-05-21 2018-11-13 上海熙业信息科技有限公司 Medical image cloud storage platform designing method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111641497A (en) * 2020-06-17 2020-09-08 深圳市钱海网络技术有限公司 Method and device for automatically decrypting sensitive parameters
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
CN112948843B (en) * 2021-01-27 2022-07-15 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
CN113268761A (en) * 2021-07-20 2021-08-17 北京国电通网络技术有限公司 Information encryption method and device, electronic equipment and computer readable medium
CN113268761B (en) * 2021-07-20 2021-09-24 北京国电通网络技术有限公司 Information encryption method and device, electronic equipment and computer readable medium

Also Published As

Publication number Publication date
CN109886047B (en) 2021-01-15

Similar Documents

Publication Publication Date Title
US10713391B2 (en) Tamper protection and video source identification for video processing pipeline
Zhao et al. TPE2: Three-pixel exact thumbnail-preserving image encryption
US10873568B2 (en) Secure analytics using homomorphic and injective format-preserving encryption and an encrypted analytics matrix
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN109886047A (en) File encryption treating method and apparatus
US8738928B2 (en) Apparatus and method for processing extension information in image files
TW202205118A (en) Picture classification method and apparatus for protecting data privacy
CN107302706A (en) Image anti-stealing link method, device and electronic equipment
CN116662941B (en) Information encryption method, device, computer equipment and storage medium
EP3537319A1 (en) Tamper protection and video source identification for video processing pipeline
US11929993B2 (en) System, method and application for transcoding data into media files
CN112256893A (en) Multimedia data processing method and device, electronic equipment and storage medium
Li et al. Reversible data hiding in block compressed sensing images
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
CN108256343A (en) Encryption method, device and the decryption method of Shader files, device
US20150082043A1 (en) Terminal, server and digital content authorization method
CN116049783A (en) Enterprise bill management method and system based on secure hardware carrier
CN112019642B (en) Audio uploading method, device, equipment and storage medium
CN114398647A (en) Data encryption storage method, encryption terminal and decryption terminal
CN113297586A (en) Data decryption method and device
CN110443056A (en) Data ciphering method, terminal and computer readable storage medium
Anam et al. Random pixel embedding for hiding secret text over video file
CN110336772A (en) Web data automatic evidence-collecting method and equipment based on encrypted authentication server
CN113794738B (en) Data processing method and device, electronic equipment and storage medium
Sharma et al. SecureCMerge: Secure PDF merging over untrusted servers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant