CN111581647A - File encryption and decryption method and device - Google Patents

File encryption and decryption method and device Download PDF

Info

Publication number
CN111581647A
CN111581647A CN201910118038.1A CN201910118038A CN111581647A CN 111581647 A CN111581647 A CN 111581647A CN 201910118038 A CN201910118038 A CN 201910118038A CN 111581647 A CN111581647 A CN 111581647A
Authority
CN
China
Prior art keywords
file
folder
target
specified
directory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910118038.1A
Other languages
Chinese (zh)
Other versions
CN111581647B (en
Inventor
刘轩
孙承华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Hikvision Storage Technology Co ltd
Original Assignee
Wuhan Hikvision Storage Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Hikvision Storage Technology Co ltd filed Critical Wuhan Hikvision Storage Technology Co ltd
Priority to CN201910118038.1A priority Critical patent/CN111581647B/en
Publication of CN111581647A publication Critical patent/CN111581647A/en
Application granted granted Critical
Publication of CN111581647B publication Critical patent/CN111581647B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a file encryption and decryption method and device, wherein the file encryption method is applied to electronic equipment and comprises the following steps: when a target file in the equipment needs to be encrypted, a specified folder is created in the equipment, wherein the specified folder is a folder which represents an unnamed null value and has a name attribute of a corresponding directory item in a file directory of a file system applied to the equipment; and moving the target file from the current position to the appointed folder, and encrypting the moved target file. The problem that the encrypted file is deleted by the user by mistake is avoided, and the file security is improved.

Description

File encryption and decryption method and device
Technical Field
The invention relates to the technical field of computers, in particular to a file encryption and decryption method and device.
Background
The safe storage of the file plays an important role in scenes such as office work and the like, and when the file is stored in equipment, the file needs to be encrypted in order to ensure that the file can only be opened by an authorized user.
In a related file encryption mode, only files on a disk are encrypted through an encryption algorithm, and after a user opens a folder at the upper level of the encrypted files in a file browser, the encrypted files are visible to the user and may be deleted by people by mistake, so that the files are lost, and the security performance of the files encrypted by the mode is not high enough.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for encrypting and decrypting a file, so as to avoid the problem that the encrypted file is mistakenly deleted by a user, and to facilitate the security of the file.
The invention provides a file encryption method, which is applied to electronic equipment and comprises the following steps:
when a target file in the equipment needs to be encrypted, a specified folder is created in the equipment, wherein the specified folder is a folder which represents an unnamed null value and has a name attribute of a corresponding directory item in a file directory of a file system applied to the equipment;
and moving the target file from the current position to the appointed folder, and encrypting the moved target file.
According to an embodiment of the present invention, the creating a designated folder in the present device includes:
creating a folder with a specified name in the equipment;
searching a directory entry corresponding to the specified name in the file directory, and modifying the specified name in the searched directory entry into a null value representing unnamed;
and determining the folder corresponding to the modified directory entry as the specified folder, and recording mark information for marking the specified folder in the directory entry.
According to an embodiment of the present invention, before creating the designated folder in the device, the method further includes: judging whether the specified folder exists in the equipment or not;
the creating of the designated folder in the present device includes: when the judgment result shows that the appointed folder does not exist in the equipment, the appointed folder is established in the equipment;
the method still further comprises:
and when the judgment result shows that the appointed folder exists in the equipment, moving the target file from the current position to the appointed folder, and encrypting the moved target file.
According to an embodiment of the present invention, the determining whether the specified folder exists in the device includes:
judging whether a target directory entry recorded with marking information for marking the appointed folder exists in the file directory;
if yes, determining that the appointed folder exists in the equipment, and determining the folder corresponding to the target directory entry as the appointed folder.
According to an embodiment of the present invention, encrypting the moved target file includes:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a directory entry corresponding to the target file;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
According to an embodiment of the present invention, after encrypting the moved target file, the method further includes:
and encrypting the directory entry corresponding to the target file.
The second aspect of the present invention provides a file decryption method, applied to an electronic device, the method including:
when a target file needs to be decrypted, searching out a specified directory item from a file directory of a file system applied to the equipment;
positioning the target file in the appointed folder according to the appointed directory entry, and decrypting the target file; the appointed folder is a folder of which the name attribute of the corresponding directory entry in the file directory is an unnamed null value;
and moving the decrypted target file from the specified folder to a specified position.
According to an embodiment of the present invention, the specified directory entry is a directory entry in the file directory in which flag information for flagging the specified folder is recorded.
According to one embodiment of the invention, the specified directory entry records therein association information of the encrypted directory entry;
locating the target file in the specified folder according to the specified directory entry includes:
determining the encrypted directory entries in the file directory according to the associated information recorded in the specified directory entries, and decrypting the encrypted directory entries;
and determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
According to one embodiment of the invention, decrypting the target file comprises:
acquiring the encryption level recorded in the target directory entry and corresponding to the target file;
determining target data to be decrypted in the target file according to the encryption grade, and decrypting the target data;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
A third aspect of the present invention provides a file encryption apparatus applied to an electronic device, the apparatus including:
the file folder creating module is used for creating a specified file folder in the equipment when a target file in the equipment needs to be encrypted, wherein the specified file folder is a file folder which represents an unnamed null value and has a name attribute of a corresponding directory item in a file directory of a file system applied to the equipment;
and the first mobile encryption module is used for moving the target file from the current position to the specified folder and encrypting the moved target file.
According to one embodiment of the invention, the folder creation module comprises:
a folder creating unit configured to create a folder with a specified name in the device;
a directory entry modification unit, configured to search for a directory entry corresponding to the specified name in the file directory, and modify the specified name in the searched directory entry into a null value indicating that the name is not named;
and the determining and marking unit is used for determining the folder corresponding to the modified directory entry as the specified folder, and recording marking information for marking the specified folder in the directory entry.
According to an embodiment of the invention, before the folder creating module, the apparatus further comprises: the judging module is used for judging whether the specified folder exists in the equipment or not;
the folder creation module is further to: when the judgment result shows that the appointed folder does not exist in the equipment, the appointed folder is established in the equipment;
the apparatus still further comprises:
and the second mobile encryption module is used for moving the target file from the current position to the appointed folder and encrypting the moved target file if the target file is in the appointed folder.
According to an embodiment of the present invention, the determining module includes:
a judging unit configured to judge whether a target directory entry in which flag information for marking a specified folder is recorded exists in the file directory;
and if so, determining that the specified folder exists in the device, and determining the folder corresponding to the target directory entry as the specified folder.
According to an embodiment of the present invention, when the first mobile encryption module or the second mobile encryption module encrypts the moved target file, the first mobile encryption module or the second mobile encryption module is specifically configured to:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a directory entry corresponding to the target file;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
According to an embodiment of the present invention, after the first mobile encryption module or the second mobile encryption module, the apparatus further includes:
and the directory entry encryption module is used for encrypting the directory entry corresponding to the target file.
A fourth aspect of the present invention provides a file decryption apparatus, which is applied to an electronic device, and includes:
the directory item searching module is used for searching out a specified directory item from a file directory of a file system applied by the equipment when the target file needs to be decrypted;
the file positioning decryption module is used for positioning the target file in the specified folder according to the specified directory entry and decrypting the target file; the appointed folder is a folder of which the name attribute of the corresponding directory entry in the file directory is an unnamed null value;
and the file moving module is used for moving the decrypted target file from the specified folder to a specified position.
According to an embodiment of the present invention, the specified directory entry is a directory entry in the file directory in which flag information for flagging the specified folder is recorded.
According to one embodiment of the invention, the specified directory entry records therein association information of the encrypted directory entry;
the file positioning decryption module comprises:
the directory entry decryption unit is used for determining the encrypted directory entries in the file directory according to the associated information recorded in the specified directory entry and decrypting the encrypted directory entries;
and the target file positioning unit is used for determining a target directory entry corresponding to the target file from the decrypted directory entries and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
According to an embodiment of the present invention, the file location decryption module further includes:
an encryption level obtaining unit, configured to obtain an encryption level corresponding to the target file recorded in the target directory entry;
the hierarchical decryption unit is used for determining target data to be decrypted in the target file according to the encryption grade and decrypting the target data;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
A fifth aspect of the present invention provides an electronic device, comprising a processor and a memory; the memory stores a program that can be called by the processor; when the processor executes the program, the file encryption method or the file decryption method according to the foregoing embodiments is implemented.
A sixth aspect of the present invention provides a machine-readable storage medium on which a program is stored, the program, when executed by a processor, implementing the file encryption method or the file decryption method according to the foregoing embodiments.
The embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the target file to be encrypted is moved to the designated folder, the encrypted target file is in the designated folder, and the name attribute of the directory entry corresponding to the designated folder is a null value which represents unnamed, so the designated folder cannot be operated by a user, the encrypted target file is hidden in the designated folder for the user and cannot be seen or operated for the user, and therefore, the problem that the encrypted file is mistakenly deleted by the user is avoided, and the security of the file is favorably improved.
Drawings
FIG. 1 is a flowchart illustrating a file encryption method according to an embodiment of the present invention;
FIG. 2 is a block diagram of a file encryption apparatus according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a file decryption method according to an embodiment of the present invention;
FIG. 4 is a block diagram of a file decryption apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of an electronic device according to an embodiment of the invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In order to make the description of the present invention clearer and more concise, some technical terms in the present invention are explained below:
FAT file system: a file System commonly used by microsoft in the Dos (Disk Operation System) and Windows-series operating systems is collectively referred to as FAT12, FAT16, and FAT 32.
FAT 32: the partition format adopts a 32-bit file allocation table, so that the management capability of the partition format on a disk is greatly enhanced, and the limit that the FAT16 only has 2GB for the capacity of each partition is broken through.
AES: advanced Encryption Standard (AES), also known as Rijndael Encryption, is a block Encryption Standard adopted by the federal government in the united states.
The invention provides a file encryption method in a first aspect. The following describes the file encryption method according to the embodiment of the present invention more specifically, but should not be limited thereto.
In one embodiment, referring to fig. 1, the file encryption method is applied to an electronic device, and the method includes the following steps:
s100: when a target file in the equipment needs to be encrypted, a specified folder is created in the equipment, wherein the specified folder is a folder which represents an unnamed null value and has a name attribute of a corresponding directory item in a file directory of a file system applied to the equipment;
s200: and moving the target file from the current position to the appointed folder, and encrypting the moved target file.
In the embodiment of the present invention, the execution subject of the file encryption method may be an electronic device (hereinafter, "this device" refers to the execution subject of the file encryption method), and the electronic device may be a computer device with an operating system and a file system. The operating system in the electronic device may be, for example, a windows system, but may also be another operating system such as a DOS system.
In step S100, when the target file in the device needs to be encrypted, a specified folder is created in the device, where the specified folder is a folder in which a name attribute of a corresponding directory entry in a file directory of a file system applied to the device is an unnamed null value.
The electronic device may determine that the target file in the device needs to be encrypted when receiving the instruction indicating encryption. The instruction can be triggered by the outside, and after the electronic equipment acquires the externally triggered instruction, the instruction can be analyzed to identify the content indicated by the instruction.
The designated folder is a folder which represents an unnamed null value and has a name attribute of a corresponding directory entry in a file directory of a file system applied to the electronic equipment. In other words, a specified folder is a folder without a name in the present device, and such folder is not operable by the user, including opening, deleting, and the like, that is, the user cannot open, delete, and the like, the specified folder in the file browser. The electronic device can operate the specified folder by operating the directory entry when executing the file encryption method of the embodiment of the invention.
Preferably, the file system applied to the electronic device is FAT32, but may be FAT16 or the like. The device can modify the name attribute in the corresponding directory entry of the folder through the operating system, and the folder without the name cannot be deleted or opened by a user in the operating system, such as a windows system. To avoid creating a violation of the operating system, the designated folder should not be a system folder.
In step S200, the target file is moved from the current position to the designated folder, and the moved target file is encrypted.
The target file can be moved from the current location to the designated folder by changing the storage path of the target file in the directory entry. When the electronic device moves, the operating system of the electronic device associates a directory entry (for short, a first directory entry) corresponding to the target file in the file directory with a directory entry (for short, a second directory entry) corresponding to the specified folder. The target file and the designated folder before moving can be co-located on one disk partition, or can be located on different disk partitions.
If the target file and the designated folder before the movement are located on the same disk partition, the first directory entry and the second directory entry are located in the same file directory before and after the movement, only the first directory entry and the second directory entry are not associated before the movement, and the first directory entry and the second directory entry are associated after the movement.
If the target file and the designated folder before moving are not in the same disk partition, the first directory entry and the second directory entry are recorded in different file directories (the file directory where the first directory entry is located is simply called a first file directory, and the file directory where the second directory entry is located is simply called a second file directory) before moving, after moving, the first directory entry can be deleted from the first file directory, the first directory entry is added into the second file directory, and the first directory entry and the second directory entry are associated.
For example, the second directory entry records the file name of the target file and the location information of the corresponding directory entry in the file directory. After the association, when the target file is searched, the file name of the target file may be searched in the second directory entry, and the first directory entry may be determined in the file directory according to the location information corresponding to the searched file name. For another example, by establishing a parent-child relationship, the first directory entry is used as a child directory entry of the second directory entry, and the specific association manner may be determined according to a file system adopted by the electronic device.
The moved target file and the appointed folder are positioned on a disk partition, and the target file is positioned in the appointed folder. Since the designated folder is not operable by the user, the target file is not visible to the user, and further operation on the target file is only possible if the target file is moved from the designated folder to the named folder.
The method for encrypting the moved target file is not limited. Such as: and acquiring an encryption algorithm according to the instruction indicating encryption, and encrypting the target file by using the encryption algorithm according to an encryption key carried in the instruction. The instruction indicating encryption may carry a key, an encryption level, and the like required for encrypting the target file. The encryption algorithm may be, for example, an AES encryption algorithm, but may also be other file encryption algorithms, and is not limited to the specific one.
In the embodiment of the invention, the target file to be encrypted is moved to the designated folder, the encrypted target file is in the designated folder, and the name attribute of the directory entry corresponding to the designated folder is a null value which represents unnamed, so the designated folder cannot be operated by a user, the encrypted target file is hidden in the designated folder for the user and cannot be seen or operated for the user, and therefore, the problem that the encrypted file is mistakenly deleted by the user is avoided, and the security of the file is favorably improved.
In addition, in a related file encryption mode, because a user can see an encrypted file, the encrypted file may be deleted by mistake, and in order to solve the problem of deletion by mistake, a solution is also provided at present, specifically, a disk is divided into an encrypted disk partition and a non-encrypted disk partition, the whole encrypted disk partition is encrypted during encryption, and once the partition is set as the encrypted disk partition, the encrypted disk partition can only store encrypted data but cannot store common data, so that space waste is caused.
In the embodiment of the invention, the encrypted object is the target file instead of the whole disk partition, so that the situation that only encrypted data can be stored in the whole disk partition but common data cannot be stored is avoided, and the space waste is avoided under the condition that the encrypted file is prevented from being deleted by mistake.
In an embodiment, the above-mentioned file encryption method process can be executed by a file encryption device, as shown in fig. 2, the file encryption device 100 mainly includes 2 modules: a folder creation module 101 and a first mobile encryption module 102. The folder creation module 101 is configured to perform the step S100, and the first mobile encryption module 102 is configured to perform the step S200.
In an embodiment, in step S100, the creating a designated folder in the present device may include the following steps:
s101: creating a folder with a specified name in the equipment;
s102: searching a directory entry corresponding to the specified name in the file directory, and modifying the specified name in the searched directory entry into a null value representing unnamed;
s103: and determining the folder corresponding to the modified directory entry as the specified folder, and recording mark information for marking the specified folder in the directory entry.
In step S101, after a folder with a specified name is created in the electronic device, the operating system of the electronic device adds a directory entry corresponding to the folder in the file directory, where the name attribute in the directory entry is the specified name, so that the operating system can search the corresponding directory entry in the file directory according to the specified name.
The name is not limited, and the name is not duplicated with the file or folder in the same folder. A file directory is a data structure for recording directory entries of respective files in a file system to which the present apparatus is applied. Each directory entry may record the name and storage address of the corresponding file or folder, etc., as an index of the corresponding file or folder.
In step S102, a directory entry corresponding to the specified name is searched in a file directory, the specified name in the searched directory entry is modified into a null value indicating no name, and after the name attribute is modified, the folder becomes a file folder without name, and the user cannot operate the folder.
In step S103, the folder corresponding to the modified directory entry is determined as the designated folder, that is, the unnamed folder is determined as the designated folder that cannot be operated by the user. Meanwhile, the marking information for marking the designated folder is recorded in the directory entry corresponding to the designated folder, so that the designated folder can be distinguished from other unnamed folders or files on one hand, and on the other hand, the designated folder can be searched through the marking information. The flag information may be recorded in a system reserved bit (for example, a position of an offset amount of 0x0c in the directory entry) of the directory entry corresponding to the designated folder, which is not limited in particular.
In one embodiment, before creating the designated folder in the device, the method further comprises: judging whether the specified folder exists in the equipment or not;
the creating of the designated folder in the present device includes: when the judgment result shows that the appointed folder does not exist in the equipment, the appointed folder is established in the equipment;
the method still further comprises:
and when the judgment result shows that the appointed folder exists in the equipment, moving the target file from the current position to the appointed folder, and encrypting the moved target file.
Therefore, when the target file in the electronic equipment needs to be encrypted each time, whether the specified folder exists in the electronic equipment or not can be judged, and more specifically, whether the specified folder exists on a magnetic disk of the electronic equipment or not can be judged. When a file is encrypted for the first time or when a previously designated folder is deleted by the system, the electronic device does not yet have a designated folder which is not operable by the user and is used for storing the target file.
If the specified folder does not exist in the electronic device, the specified folder needs to be created, that is, the step of creating the specified folder in the device in step S100 is executed, after the specified folder is created, the target file is moved from the current position to the specified folder, and the moved target file is encrypted.
If the specified folder exists in the electronic device, the target file may be directly moved to the specified folder, and the moved target file is encrypted, and the moving and encrypting of the target file may refer to the description related to step S200, which is not described herein again.
Further, the determining whether the specified folder exists in the device includes the following steps:
judging whether a target directory entry recorded with marking information for marking the appointed folder exists in the file directory;
if yes, determining that the appointed folder exists in the equipment, and determining the folder corresponding to the target directory entry as the appointed folder.
If the name attribute in the directory entry corresponding to the specified folder is null, that is, the specified folder is a folder without a name, then at this time, the target directory entry corresponding to the specified folder cannot be searched in the file directory according to the name. In this embodiment, the directory entry corresponding to the designated folder has recorded therein flag information for marking the designated folder, so that the target directory entry can be determined according to whether the flag information exists in the file directory.
The marking information can be searched in the file directory, if the marking information is searched, a target directory entry recorded with the marking information for marking the appointed folder exists in the file directory, the directory entry where the marking information is located is the target directory entry, and correspondingly, the appointed folder exists in the equipment; if the file directory is not found, determining that the target directory entry recorded with the marking information for marking the designated folder does not exist in the file directory, and correspondingly, the designated folder does not exist in the equipment.
When a target directory entry recorded with marking information for marking a designated folder exists in a file directory, the directory entry where the found marking information is located is determined to be the target directory entry, a file corresponding to the target directory entry is determined to be the designated folder, and the folder corresponding to the target directory entry is determined to be the designated folder.
In one embodiment, encrypting the moved target file includes:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a directory entry corresponding to the target file;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
Whether the designated folder is currently created or previously created, encrypting the target file moved into the designated folder may be accomplished in the manner described above.
When the target file is too large, the encryption time can be very long if all the data in the target file is encrypted. In order to increase the encryption speed, in this embodiment, different encryption strategies may be selected according to different encryption levels, and when the data of the target file is large, a part of the data may be selected from all the data of the target file as the target data for encryption, which may also ensure the security of the target file.
The higher the encryption level, i.e. the larger N, the faster the encryption speed. The encryption level is divided into three levels as an example, the first level of encryption level is to encrypt all data, that is, N is 1, and the target data is all data in the target file; the second-stage encryption level is half of data encryption, which can be parity encryption, namely N is 2, when encrypting, the first block of data is encrypted, the second block of data is not encrypted, and the third block of data is encrypted, so that the encryption of the target data is alternately realized, and M is half of the total number of data blocks divided by all data or a value obtained by rounding up half of the total number of data blocks divided by all data; the third encryption level is one third of data encryption, the first block of data is encrypted, the second block and the third block of data are not encrypted, the fourth block of data is encrypted, the encryption of the target data is alternately realized, and M is one third of the total number of the data blocks divided by all the data or a value obtained by rounding up one third. The encryption algorithm for encrypting the target data may be an AES encryption algorithm.
After the target data is encrypted, the encryption level may be recorded in the directory entry corresponding to the target file. When the target file is decrypted, the encryption grade can be obtained from the directory entry corresponding to the target file, and the target data needing to be decrypted is determined according to the encryption grade, so that the decryption of the target file is realized.
In one embodiment, after encrypting the moved target file, the method further includes:
and encrypting the directory entry corresponding to the target file.
In order to improve the security of the encrypted file and ensure that information such as the file name, the creation time, and the storage location of the encrypted file is not obtained by an outsider, it is necessary to encrypt the directory entry corresponding to the encrypted file. The manner of encrypting the directory entry is not limited, and may depend on the specific file system.
Taking FAT32 as an example, directory entries of FAT32 mainly include short filename directory entries and long filename directory entries. When the name length of a file exceeds 8 characters, a long filename directory entry is used to record the file name. The short filename directory entry mainly includes information such as the filename of the file (when the name of the file is recorded using the long filename directory entry, the short filename directory entry records a partial field of the filename), creation time, file size, and file storage address, and the long filename directory entry mainly records the filename of the file. Both the short filename directory entry and the long filename directory entry corresponding to the target file may be encrypted, or only the short filename directory entry corresponding to the target file may be encrypted. The encryption of the directory entry may be performed, for example, by using the AES encryption algorithm, which is fast because the directory entry has only 32 bytes in total.
The second aspect of the invention also provides a file decryption method. The following describes the file decryption method according to the embodiment of the present invention more specifically, but not limited thereto.
In one embodiment, referring to fig. 3, a file decryption method is applied to an electronic device, and the method may include the steps of:
t100: when a target file needs to be decrypted, searching out a specified directory item from a file directory of a file system applied to the equipment;
t200: positioning the target file in the appointed folder according to the appointed directory entry, and decrypting the target file; the appointed folder is a folder of which the name attribute of the corresponding directory entry in the file directory is an unnamed null value;
t300: and moving the decrypted target file from the specified folder to a specified position.
The electronic device to which the file decryption method according to the embodiment of the present invention is applied can refer to the description related to the electronic device in the foregoing embodiment, and details are not repeated here.
In step T100, the electronic device may determine that the target file in the device needs to be decrypted when receiving the instruction indicating decryption. The instruction can be triggered by the outside, and after the electronic equipment acquires the externally triggered instruction, the instruction can be analyzed to identify the content indicated by the instruction.
When the instruction indicates that decryption is required, the target file is in the designated folder, and the user cannot see or directly operate the target file, and the target file can be relocated by finding out the directory entry corresponding to the designated folder, namely the designated directory entry in the embodiment, so that the target file can be operated through the operating system.
In step T200, after the directory entry of the specified file is found, the target file in the specified folder is located in the present device according to the specified directory entry.
The designated folder is a folder which represents an unnamed null value and has a name attribute of a corresponding directory entry in a file directory of a file system applied to the electronic equipment. In other words, a designated folder is an unowned folder in the present device, and such folder user is not operable. The operation includes opening, deleting, etc., i.e., the user cannot open, delete, etc., the specified folder. Of course, the operating system of the electronic device is operable with the designated folder, and the designated folder may be operated by the operating system.
After the target file is located, the electronic device may decrypt the target file first, where the decryption manner corresponds to the encryption manner of the target file, and the decryption manner may be determined according to an instruction, and a specific decryption manner is not limited, for example, an AES decryption algorithm.
In step T300, the decrypted target file is moved from the designated folder to a designated location. The decrypted target file can be moved from the specified folder to the folder which can be operated by the user, namely, the specified position is the folder which can be operated by the user, and the name attribute in the directory entry corresponding to the folder which can be operated by the user is a non-null value which represents the named name, so that the user can operate the target file after opening the folder in the file browser.
In the embodiment of the invention, the encrypted target file is in the appointed folder, and the name attribute of the directory entry corresponding to the appointed folder is a null value which represents unnamed, so the appointed folder cannot be operated by a user, the encrypted target file is hidden in the appointed folder for the user and cannot be seen or operated for the user, the problem that the encrypted file is mistakenly deleted by the user is avoided, and the security of the file is favorably improved; when decrypting, after finding the target file and decrypting the target file, moving the target file from the specified folder to the specified position, and enabling a user to operate the target file in the specified position.
In an embodiment, the above-mentioned file decryption method process can be executed by a file decryption apparatus, as shown in fig. 4, the file decryption apparatus 200 mainly includes 3 modules: a directory entry searching module 201, a file positioning and decrypting module 202 and a file moving module 203. The directory entry searching module 201 is configured to perform the step T100, the file location decryption module 202 is configured to perform the step T200, and the file moving module 203 is configured to perform the step T300.
In one embodiment, the specified directory entry is a directory entry recorded with flag information for marking the specified folder in the file directory.
And the specified directory entry is a directory entry corresponding to the specified folder in the file directory. The mark information for marking the designated folder is recorded in the directory entry corresponding to the designated folder, so that the designated folder can be distinguished from other unnamed folders or files on one hand, and on the other hand, the designated folder can be searched through the mark information. The flag information may be recorded in a system reserved bit (for example, a position of an offset amount of 0x0c in the directory entry) of the directory entry corresponding to the designated folder, which is not limited in particular. When searching, the directory entry with the mark information can be determined as the appointed directory entry as long as the directory entry is searched.
In one embodiment, the specified directory entry records the association information of the encrypted directory entry;
in step T200, locating the target file in the specified folder according to the specified directory entry may include the following steps:
t201: determining the encrypted directory entries in the file directory according to the associated information recorded in the specified directory entries, and decrypting the encrypted directory entries;
t202: and determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
In order to improve the security of the encrypted file and ensure that information such as the file name, the creation time, the storage position of the encrypted file and the like of the file is not acquired by outsiders, it is necessary to encrypt the directory entry corresponding to the encrypted file, correspondingly, when the encrypted directory entry is found, the directory entry needs to be decrypted, and the decryption algorithm corresponds to the encryption algorithm of the directory entry, for example, the AES decryption algorithm is adopted to decrypt the directory entry.
Because a plurality of files may be stored in the designated folder, there may be a plurality of directory entries found, and correspondingly, there may be a plurality of decrypted directory entries, and because the directory entries are decrypted, a target directory entry corresponding to the target file may be determined from the decrypted directory entries according to the file name of the target file, and a storage path of the target file is recorded in the target directory entry, so that the target file may be located.
In one embodiment, the step T200 of decrypting the target file may include the following steps:
t203: acquiring the encryption level recorded in the target directory entry and corresponding to the target file;
t204: determining target data to be decrypted in the target file according to the encryption grade, and decrypting the target data;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
The target directory entry records the encryption level required for encrypting the target file, and the decryption mode corresponding to the encryption mode can be determined according to the encryption level, so that correct target data can be found for decryption. Specifically, for example, odd-even encryption is used to decrypt the odd-numbered data blocks, such as the first block, the third block, and the fifth block, and the decryption algorithm used corresponds to the encryption algorithm, such as AES decryption algorithm.
The contents of the file decryption method in the embodiment of the present invention that are the same as or similar to the file encryption method can refer to the related descriptions in the file encryption method in the foregoing embodiment, and are not described herein again.
A third aspect of the present invention provides a file encryption apparatus, which is applied to an electronic device, and referring to fig. 2, the file encryption apparatus 100 includes:
the file folder creating module 101 is configured to create a specified file folder in the device when a target file in the device needs to be encrypted, where the specified file folder is a file folder in which a name attribute of a corresponding directory entry in a file directory of a file system applied to the device is an unnamed null value;
the first mobile encryption module 102 is configured to move the target file from the current location to the specified folder, and encrypt the moved target file.
In one embodiment, the folder creation module comprises:
a folder creating unit configured to create a folder with a specified name in the device;
a directory entry modification unit, configured to search for a directory entry corresponding to the specified name in the file directory, and modify the specified name in the searched directory entry into a null value indicating that the name is not named;
and the determining and marking unit is used for determining the folder corresponding to the modified directory entry as the specified folder, and recording marking information for marking the specified folder in the directory entry.
In one embodiment, before the folder creation module, the apparatus further comprises: the judging module is used for judging whether the specified folder exists in the equipment or not;
the folder creation module is further to: when the judgment result shows that the appointed folder does not exist in the equipment, the appointed folder is established in the equipment;
the apparatus still further comprises:
and the second mobile encryption module is used for moving the target file from the current position to the appointed folder and encrypting the moved target file if the target file is in the appointed folder.
In one embodiment, the determining module comprises:
a judging unit configured to judge whether a target directory entry in which flag information for marking a specified folder is recorded exists in the file directory;
and if so, determining that the specified folder exists in the device, and determining the folder corresponding to the target directory entry as the specified folder.
In one embodiment, when the first mobile encryption module or the second mobile encryption module encrypts the moved target file, the first mobile encryption module or the second mobile encryption module is specifically configured to:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a directory entry corresponding to the target file;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
In one embodiment, after the first mobile encryption module or the second mobile encryption module, the apparatus further comprises:
and the directory entry encryption module is used for encrypting the directory entry corresponding to the target file.
The implementation process of the functions and actions of each unit in the file encryption device is specifically described in the implementation process of the corresponding step in the file encryption method, and is not described herein again.
A fourth aspect of the present invention provides a file decryption apparatus, which is applied to an electronic device, and referring to fig. 4, the file decryption apparatus 200 includes:
a directory entry searching module 201, configured to search, when the target file needs to be decrypted, a specified directory entry from a file directory of a file system applied to the device;
the file positioning decryption module 202 is configured to position the target file in the specified folder according to the specified directory entry, and decrypt the target file; the appointed folder is a folder of which the name attribute of the corresponding directory entry in the file directory is an unnamed null value;
and the file moving module 203 is configured to move the decrypted target file from the specified folder to a specified location.
In one embodiment, the specified directory entry is a directory entry recorded with flag information for marking the specified folder in the file directory.
In one embodiment, the specified directory entry records the association information of the encrypted directory entry;
the file positioning decryption module comprises:
the directory entry decryption unit is used for determining the encrypted directory entries in the file directory according to the associated information recorded in the specified directory entry and decrypting the encrypted directory entries;
and the target file positioning unit is used for determining a target directory entry corresponding to the target file from the decrypted directory entries and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
In one embodiment, the file location decryption module further comprises:
an encryption level obtaining unit, configured to obtain an encryption level corresponding to the target file recorded in the target directory entry;
the hierarchical decryption unit is used for determining target data to be decrypted in the target file according to the encryption grade and decrypting the target data;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
The implementation process of the functions and actions of each unit in the file decryption device is specifically described in the implementation process of the corresponding step in the file decryption method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts shown as units may or may not be physical units.
The invention also provides an electronic device, which comprises a processor and a memory; the memory stores a program that can be called by the processor; wherein, when the processor executes the program, the file encryption method or the file decryption method as described in the foregoing embodiments is implemented.
The embodiment of the file encryption device or the file decryption device can be applied to electronic equipment. Taking a software implementation as an example, as a logical device, the device is formed by reading, by a processor of the electronic device where the device is located, a corresponding computer program instruction in the nonvolatile memory into the memory for operation. From a hardware aspect, as shown in fig. 5, fig. 5 is a hardware structure diagram of an electronic device where the file encryption apparatus 100 is located according to an exemplary embodiment of the present invention, and except for the processor 510, the memory 530, the interface 520, and the nonvolatile memory 540 shown in fig. 5, the electronic device where the apparatus 100 is located in the embodiment may also include other hardware according to an actual function of the electronic device, which is not described again.
The present invention also provides a machine-readable storage medium on which a program is stored, which when executed by a processor, implements the file encryption method or the file decryption method as described in the foregoing embodiments.
The present invention may take the form of a computer program product embodied on one or more storage media including, but not limited to, disk storage, CD-ROM, optical storage, and the like, having program code embodied therein. Machine-readable storage media include both permanent and non-permanent, removable and non-removable media, and the storage of information may be accomplished by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of machine-readable storage media include, but are not limited to: phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technologies, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by a computing device.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (20)

1. A file encryption method is applied to electronic equipment and comprises the following steps:
when a target file in the equipment needs to be encrypted, a specified folder is created in the equipment, wherein the specified folder is a folder which represents an unnamed null value and has a name attribute of a corresponding directory item in a file directory of a file system applied to the equipment;
and moving the target file from the current position to the appointed folder, and encrypting the moved target file.
2. The file encryption method according to claim 1, wherein the creating of the designated folder in the present device includes:
creating a folder with a specified name in the equipment;
searching a directory entry corresponding to the specified name in the file directory, and modifying the specified name in the searched directory entry into a null value representing unnamed;
and determining the folder corresponding to the modified directory entry as the specified folder, and recording mark information for marking the specified folder in the directory entry.
3. The file encryption method of claim 1, wherein before creating the specified folder in the device, the method further comprises: judging whether the specified folder exists in the equipment or not;
the creating of the designated folder in the present device includes: when the judgment result shows that the appointed folder does not exist in the equipment, the appointed folder is established in the equipment;
the method still further comprises:
and when the judgment result shows that the appointed folder exists in the equipment, moving the target file from the current position to the appointed folder, and encrypting the moved target file.
4. The file encryption method according to claim 3, wherein said determining whether the specified folder exists in the present device includes:
judging whether a target directory entry recorded with marking information for marking the appointed folder exists in the file directory;
if yes, determining that the appointed folder exists in the equipment, and determining the folder corresponding to the target directory entry as the appointed folder.
5. The file encryption method according to claim 1 or 3, wherein encrypting the moved target file comprises:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a directory entry corresponding to the target file;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
6. The file encryption method according to claim 1 or 3, wherein after encrypting the moved target file, the method further comprises:
and encrypting the directory entry corresponding to the target file.
7. A file decryption method is applied to electronic equipment, and the method comprises the following steps:
when a target file needs to be decrypted, searching out a specified directory item from a file directory of a file system applied to the equipment;
positioning the target file in the appointed folder according to the appointed directory entry, and decrypting the target file; the appointed folder is a folder of which the name attribute of the corresponding directory entry in the file directory is an unnamed null value;
and moving the decrypted target file from the specified folder to a specified position.
8. The file decryption method according to claim 7, wherein the specified directory entry is a directory entry in which flag information for flag the specified folder is recorded in the file directory.
9. The file decryption method of claim 7, wherein the specified directory entry has associated information of an encrypted directory entry recorded therein;
locating the target file in the specified folder according to the specified directory entry includes:
determining the encrypted directory entries in the file directory according to the associated information recorded in the specified directory entries, and decrypting the encrypted directory entries;
and determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
10. The file decryption method of claim 9, wherein decrypting the target file comprises:
acquiring the encryption level recorded in the target directory entry and corresponding to the target file;
determining target data to be decrypted in the target file according to the encryption grade, and decrypting the target data;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
11. A file encryption device is applied to electronic equipment, and the file encryption device comprises:
the file folder creating module is used for creating a specified file folder in the equipment when a target file in the equipment needs to be encrypted, wherein the specified file folder is a file folder which represents an unnamed null value and has a name attribute of a corresponding directory item in a file directory of a file system applied to the equipment;
and the first mobile encryption module is used for moving the target file from the current position to the specified folder and encrypting the moved target file.
12. The file encryption apparatus of claim 11, wherein the folder creation module comprises:
a folder creating unit configured to create a folder with a specified name in the device;
a directory entry modification unit, configured to search for a directory entry corresponding to the specified name in the file directory, and modify the specified name in the searched directory entry into a null value indicating that the name is not named;
and the determining and marking unit is used for determining the folder corresponding to the modified directory entry as the specified folder, and recording marking information for marking the specified folder in the directory entry.
13. The file encryption apparatus of claim 11, wherein said folder creation module is preceded by the apparatus further comprising: the judging module is used for judging whether the specified folder exists in the equipment or not;
the folder creation module is further to: when the judgment result shows that the appointed folder does not exist in the equipment, the appointed folder is established in the equipment;
the apparatus still further comprises:
and the second mobile encryption module is used for moving the target file from the current position to the appointed folder and encrypting the moved target file if the target file is in the appointed folder.
14. The file encryption apparatus according to claim 13, wherein said judging module comprises:
a judging unit configured to judge whether a target directory entry in which flag information for marking a specified folder is recorded exists in the file directory;
and if so, determining that the specified folder exists in the device, and determining the folder corresponding to the target directory entry as the specified folder.
15. The file encryption apparatus according to claim 11 or 13, wherein the first mobile encryption module or the second mobile encryption module, when encrypting the moved target file, is specifically configured to:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a directory entry corresponding to the target file;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
16. The file encryption apparatus according to claim 11 or 13, wherein after the first mobile encryption module or the second mobile encryption module, the apparatus further comprises:
and the directory entry encryption module is used for encrypting the directory entry corresponding to the target file.
17. A file decryption apparatus, applied to an electronic device, includes:
the directory item searching module is used for searching out a specified directory item from a file directory of a file system applied by the equipment when the target file needs to be decrypted;
the file positioning decryption module is used for positioning the target file in the specified folder according to the specified directory entry and decrypting the target file; the appointed folder is a folder of which the name attribute of the corresponding directory entry in the file directory is an unnamed null value;
and the file moving module is used for moving the decrypted target file from the specified folder to a specified position.
18. The file decryption apparatus according to claim 17, wherein the specified directory entry is a directory entry in which flag information for flag the specified folder is recorded in the file directory.
19. The file decryption apparatus according to claim 17, wherein the specified directory entry has associated information of an encrypted directory entry recorded therein;
the file positioning decryption module comprises:
the directory entry decryption unit is used for determining the encrypted directory entries in the file directory according to the associated information recorded in the specified directory entry and decrypting the encrypted directory entries;
and the target file positioning unit is used for determining a target directory entry corresponding to the target file from the decrypted directory entries and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
20. The file decryption device according to claim 19, wherein the file location decryption module further comprises:
an encryption level obtaining unit, configured to obtain an encryption level corresponding to the target file recorded in the target directory entry;
the hierarchical decryption unit is used for determining target data to be decrypted in the target file according to the encryption grade and decrypting the target data;
the ratio of the size of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, when N is greater than 1, the target data comprises M data blocks of data with specified size at intervals, and M is an integer greater than 1.
CN201910118038.1A 2019-02-15 2019-02-15 File encryption and decryption method and device Active CN111581647B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910118038.1A CN111581647B (en) 2019-02-15 2019-02-15 File encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910118038.1A CN111581647B (en) 2019-02-15 2019-02-15 File encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN111581647A true CN111581647A (en) 2020-08-25
CN111581647B CN111581647B (en) 2023-07-25

Family

ID=72111370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910118038.1A Active CN111581647B (en) 2019-02-15 2019-02-15 File encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN111581647B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112306412A (en) * 2020-10-30 2021-02-02 广东小天才科技有限公司 Encryption and decryption method, equipment and medium based on Ubifs system
CN113535278A (en) * 2021-06-15 2021-10-22 深圳市元征未来汽车技术有限公司 Dynamic library calling method and device, electronic equipment and storage medium
CN113672565A (en) * 2021-08-09 2021-11-19 深圳市猿人创新科技有限公司 File marking method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060018484A1 (en) * 2003-09-30 2006-01-26 Dai Nippon Printing Co., Ltd. Information processing device, information processing system, and program
US20070255963A1 (en) * 2006-04-28 2007-11-01 Erix Pizano System and method for biometrically secured, transparent encryption and decryption
US20160210469A1 (en) * 2015-01-20 2016-07-21 Microsoft Technology Licensing, Llc File Encryption Support for FAT File Systems
US20160299892A1 (en) * 2015-04-09 2016-10-13 Sophos Limited Emulating transparent file processing
CN106095871A (en) * 2016-06-06 2016-11-09 无锡天脉聚源传媒科技有限公司 A kind of method and device setting up data base directory structure
CN106295315A (en) * 2015-06-08 2017-01-04 杭州海康威视数字技术股份有限公司 For starting the method and system of electronic equipment
CN106941524A (en) * 2017-03-14 2017-07-11 郑州云海信息技术有限公司 A kind of WEB file configuration methods of HDFS
CN107451244A (en) * 2017-07-27 2017-12-08 广东欧珀移动通信有限公司 File naming method, mobile terminal and computer-readable recording medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060018484A1 (en) * 2003-09-30 2006-01-26 Dai Nippon Printing Co., Ltd. Information processing device, information processing system, and program
US20070255963A1 (en) * 2006-04-28 2007-11-01 Erix Pizano System and method for biometrically secured, transparent encryption and decryption
US20160210469A1 (en) * 2015-01-20 2016-07-21 Microsoft Technology Licensing, Llc File Encryption Support for FAT File Systems
US20160299892A1 (en) * 2015-04-09 2016-10-13 Sophos Limited Emulating transparent file processing
CN106295315A (en) * 2015-06-08 2017-01-04 杭州海康威视数字技术股份有限公司 For starting the method and system of electronic equipment
CN106095871A (en) * 2016-06-06 2016-11-09 无锡天脉聚源传媒科技有限公司 A kind of method and device setting up data base directory structure
CN106941524A (en) * 2017-03-14 2017-07-11 郑州云海信息技术有限公司 A kind of WEB file configuration methods of HDFS
CN107451244A (en) * 2017-07-27 2017-12-08 广东欧珀移动通信有限公司 File naming method, mobile terminal and computer-readable recording medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
胡光鲁;: "文件隐藏与加密的简便方法", 农业网络信息, no. 06 *
陶永红;何明;: "NTFS文件系统文件存贮分析", 中国人民公安大学学报(自然科学版), no. 03 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112306412A (en) * 2020-10-30 2021-02-02 广东小天才科技有限公司 Encryption and decryption method, equipment and medium based on Ubifs system
CN113535278A (en) * 2021-06-15 2021-10-22 深圳市元征未来汽车技术有限公司 Dynamic library calling method and device, electronic equipment and storage medium
CN113672565A (en) * 2021-08-09 2021-11-19 深圳市猿人创新科技有限公司 File marking method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111581647B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
CN105678189B (en) Data file encryption storage and retrieval system and method
US10013573B2 (en) Personal ledger blockchain
US10430398B2 (en) Data storage system having mutable objects incorporating time
US7949693B1 (en) Log-structured host data storage
US9324361B2 (en) Protecting stored data from traffic analysis
US20140297603A1 (en) Method and apparatus for deduplication of replicated file
CN111581647B (en) File encryption and decryption method and device
CN105993018B (en) Content item encryption in mobile device
US20080282355A1 (en) Document container data structure and methods thereof
US9749132B1 (en) System and method for secure deletion of data
JP2008517354A (en) A computer with a method of building an encrypted database index for database table search
Wani et al. File system anti-forensics–types, techniques and tools
EP2778953A1 (en) Encoded-search database device, method for adding and deleting data for encoded search, and addition/deletion program
CN101310283A (en) Method and system for managing keys and/or rights objects
US10903977B2 (en) Hidden electronic file systems
CN110020544A (en) The Hash information processing method and system of record are stored in the block of block chain
CN104751076A (en) Method for recovering disk data
KR20080010906A (en) Method and apparatus for managing license
CN111382126B (en) System and method for deleting file and preventing file recovery
US20150278247A1 (en) Data access system and data access method
GB2373597A (en) Restricted data access
CN116069729B (en) Intelligent document packaging method, system and medium
EP1540444A2 (en) Computer encryption systems
KR101767104B1 (en) Apparatus and method of message hiding in file system
JP4807289B2 (en) Information processing apparatus, file processing method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant