CN112613071A - File encryption method and device and storage medium - Google Patents

File encryption method and device and storage medium Download PDF

Info

Publication number
CN112613071A
CN112613071A CN202011567804.1A CN202011567804A CN112613071A CN 112613071 A CN112613071 A CN 112613071A CN 202011567804 A CN202011567804 A CN 202011567804A CN 112613071 A CN112613071 A CN 112613071A
Authority
CN
China
Prior art keywords
file
encrypted
encryption
field
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011567804.1A
Other languages
Chinese (zh)
Inventor
胡新华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Dobit Information Technology Co ltd
Original Assignee
Wuhan Dobit Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Dobit Information Technology Co ltd filed Critical Wuhan Dobit Information Technology Co ltd
Priority to CN202011567804.1A priority Critical patent/CN112613071A/en
Publication of CN112613071A publication Critical patent/CN112613071A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention relates to a file encryption method, a device and a storage medium, wherein the method comprises the following steps: acquiring various files in the key resources, and determining files needing to be encrypted in the various files; determining an encryption key and a head adding length corresponding to a file to be encrypted according to an encryption rule; adding an encryption record field at the head of the file to be encrypted according to the head adding length; encrypting the file to be encrypted according to the encryption key and the encryption record field to determine an encrypted file; and packaging the encrypted file and files which do not need to be encrypted in various files into the APP. The invention adds the encryption record field at the head of the file by using the encryption rule, and then encrypts the file to be encrypted by using the encryption key and the encryption record field, thereby increasing the randomness of encryption, increasing the difficulty of decryption, ensuring the security of the file and effectively avoiding the leakage of important resources.

Description

File encryption method and device and storage medium
Technical Field
The present invention relates to the field of data encryption technologies, and in particular, to a file encryption method, device and storage medium.
Background
The common format of the android package is apk at present, and the common format can be easily decompressed by a plurality of decompressing software to restore the original form before packaging. For example, when an apk is opened using some type of decompression software, some directories and files before packaging are seen inside: an assets directory, res directory, android manifest. However, key resources in the android package file are not encrypted and can be easily taken by others, so that implementation modes of some functions are deduced, analysis and research and development periods are shortened, and serious technical leakage is caused, so that the key resources in the file are encrypted to protect core information of a company.
In the existing file encryption mode, the file content field is often encrypted only by using an encryption key, the encryption mode is too simple, and when a competitor knows the format of the file, the file is easy to be cracked. In summary, how to effectively encrypt the key resources of the file is an urgent problem to be solved.
Disclosure of Invention
In view of the above, there is a need to provide a method for encrypting a file, so as to solve the problem of how to effectively encrypt key resources of the file in the prior art.
The invention provides a file encryption method, which comprises the following steps:
acquiring a plurality of files in key resources, and determining files needing to be encrypted in the plurality of files;
determining an encryption key and a head adding length corresponding to the file to be encrypted according to an encryption rule;
adding an encryption record field at the head of the file to be encrypted according to the head adding length;
encrypting the file to be encrypted according to the encryption key and the encryption record field to determine an encrypted file;
and packaging the encrypted file and files which do not need to be encrypted in the multiple files into the APP.
Further, the determining the file to be encrypted in the plurality of files includes:
adding a field with a preset length at the head of the file to be encrypted according to the record information of the file;
storing a fixed identifier at the beginning of the preset length field.
Further, the determining, according to the encryption rule, an encryption key and a header addition length corresponding to the file to be encrypted includes:
determining the corresponding encryption key according to the name of the file to be encrypted;
and determining the corresponding head adding length according to the number of bytes occupied by the content of the file to be encrypted.
Further, the adding an encryption record field to the header of the file to be encrypted according to the header addition length includes:
adding an encryption record field at the head of the file to be encrypted according to the head adding length, wherein the length of the encryption record field is the head adding length;
and recording the encrypted position information at any position of the encrypted record field, wherein the encrypted position information comprises an encryption starting position and an encryption field length.
Further, the adding an encryption record field to the header of the file to be encrypted according to the header addition length further includes:
padding a random number in the encrypted record field except for a position where the encrypted position information is recorded.
Further, the encrypting the file to be encrypted according to the encryption key and the encryption record field, and determining the encrypted file includes:
determining the encryption starting position and the length of the encryption field according to the encryption position information in the encryption record field;
determining a field to be encrypted in the file to be encrypted according to the encryption starting position and the length of the encryption field;
and determining the encrypted file according to the encryption key and the field to be encrypted.
Further, the determining the encrypted file according to the encryption key and the field to be encrypted includes: and performing XOR operation on the encryption key and the field to be encrypted to determine the encrypted file.
Further, the file encryption method further includes: adding a first character string at the file name suffix of the encrypted file, wherein the first character string is used for preventing a computer from automatically identifying and analyzing the encrypted file.
The invention also provides a file encryption device, which comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program realizes the file encryption method when being executed by the processor.
The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the file encryption method as described above.
Compared with the prior art, the invention has the beneficial effects that: firstly, determining a file to be encrypted by acquiring key resources, thereby avoiding redundant encryption operation and preventing the encryption of the file which does not need to be encrypted; then, determining an encryption key corresponding to the file to be encrypted so as to perform subsequent encryption operation, and determining the length of the head to add so as to add a field with a certain length to record the encryption operation; furthermore, according to the length of the added head, an encryption record field is added to the head for effectively recording encryption operation; furthermore, the file to be encrypted is encrypted according to the encryption key and the encryption record field, so that the randomness of encryption is ensured, and the encryption operation is recorded; and finally, effective packaging is carried out, so that the downloading and the use of a user are facilitated. In conclusion, the invention adds the encryption record field at the head of the file by using the encryption rule, and then encrypts the file to be encrypted by using the encryption key and the encryption record field, thereby increasing the randomness of encryption, increasing the difficulty of decryption, ensuring the security of the file and effectively avoiding the leakage of important resources.
Drawings
FIG. 1 is a schematic flow chart of a file encryption method according to the present invention;
FIG. 2 is a schematic diagram of a process for determining a file to be encrypted according to the present invention;
fig. 3 is a schematic flow chart of determining an encryption key and a header addition length according to the present invention;
FIG. 4 is a schematic flow chart of adding an encrypted record field according to the present invention;
FIG. 5 is a schematic diagram of a process for determining an encrypted file according to the present invention;
FIG. 6 is a diagram illustrating an XOR operation according to the present invention.
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate preferred embodiments of the invention and together with the description, serve to explain the principles of the invention and not to limit the scope of the invention.
Example 1
An embodiment of the present invention provides a file encryption method, and referring to fig. 1, fig. 1 is a schematic flow chart of the file encryption method provided by the present invention, where the file encryption method includes steps S1 to S5, where:
in step S1, acquiring multiple files in the key resource, and determining a file to be encrypted in the multiple files;
in step S2, according to the encryption rule, an encryption key and a header addition length corresponding to the file to be encrypted are determined;
in step S3, according to the header addition length, an encryption record field is added to the header of the file to be encrypted;
in step S4, according to the encryption key and the encryption record field, encrypting the file to be encrypted, and determining the encrypted file;
in step S5, the file to be encrypted is encrypted according to the encryption key and the encryption record field, and the encrypted file is determined.
In the embodiment of the invention, firstly, the key resources are obtained to determine the files needing to be encrypted, so that redundant encryption operation is avoided, and the files needing not to be encrypted are prevented from being encrypted; then, determining an encryption key corresponding to the file to be encrypted so as to perform subsequent encryption operation, and determining the length of the head to add so as to add a field with a certain length to record the encryption operation; furthermore, according to the length of the added head, an encryption record field is added to the head for effectively recording encryption operation; furthermore, the file to be encrypted is encrypted according to the encryption key and the encryption record field, so that the randomness of encryption is ensured, and the encryption operation is recorded; and finally, effective packaging is carried out, so that the downloading and the use of a user are facilitated.
Preferably, referring to fig. 2, fig. 2 is a schematic flow chart of determining a file to be encrypted according to the present invention, where the step S1 includes steps S11 to S12, where:
in step S11, adding a field with a preset length in the header of the file to be encrypted according to the record information of the file;
in step S12, a fixed identifier is stored at the beginning of the preset length field.
Therefore, the file to be encrypted is effectively identified by adding the preset length field at the head of the file to be encrypted and storing the fixed identifier, so that the file to be encrypted is distinguished from the file not to be encrypted. In one specific embodiment of the present invention, the file name is: docx, a specific encryption key is generated according to the file name "information", and if the file is a file to be encrypted, the file is distinguished from the recorded information, a certain length (namely a preset length field) is added to the head of the file, a fixed beginning "encode" (fixed identifier) is stored, and other positions are reserved for other purposes.
Preferably, referring to fig. 3, fig. 3 is a schematic flow chart illustrating the determining of the encryption key and the header addition length provided by the present invention, where the step S2 includes steps S21 to S22, where:
in step S21, determining a corresponding encryption key according to the name of the file to be encrypted;
in step S22, the corresponding header addition length is determined according to the number of bytes occupied by the file content to be encrypted.
The invention aims at the problem that the file header is added with the length of random data, namely the header addition length, and the length added by each file is different according to the byte number occupied by the file name content, so that the starting position of the file cannot be accurately calculated, and the cracking difficulty is increased. Meanwhile, according to a certain rule, the corresponding encryption key is determined according to the name of the file to be encrypted, so that different files are ensured to have different corresponding encryption keys, targeted encryption is realized, and meanwhile, the difficulty of decryption is increased.
Preferably, referring to fig. 4, fig. 4 is a schematic flowchart of the process of adding the encrypted record field according to the present invention, where the step S3 includes steps S31 to S32, where:
in step S31, adding an encrypted record field to the header of the file to be encrypted according to the header addition length, where the length of the encrypted record field is the header addition length;
in step S32, the encryption position information is recorded at an arbitrary position of the encryption record field, wherein the encryption position information includes the encryption start position and the encryption field length.
Therefore, the invention records the encryption position information at any position of the encryption record field, records the encryption operation, determines the encryption starting position and the length of the encryption field, and determines the field corresponding to the encryption, namely, the invention does not encrypt the field of the whole file, but encrypts the field in the encryption record field by appointing a certain encryption field, encrypts the data which is not regular originally, and increases the cracking difficulty. For example, each file is added to a specified length from a certain position at random, and when the file is decrypted, it is also required to know which contents are encrypted, so that the starting position (namely the encryption starting position) and the length (namely the length of an encryption field) are recorded in front of the file contents when the file is encrypted, so that when the file is decrypted, the position from which the file is decrypted can be known, how long the file is decrypted, and the randomness of the encryption and the difficulty of the decryption are ensured.
Preferably, the step S3 further includes: a random number is padded in the encrypted record field except for the position where the encrypted position information is recorded. Therefore, when information is stored, certain fixed positions in bytes added to the head can be recorded, other positions are filled with random numbers, the random numbers are changed into irregular numbers, and the decryption difficulty is further increased.
Preferably, referring to fig. 5, fig. 5 is a schematic flowchart of the process of determining an encrypted file according to the present invention, where the step S4 includes steps S41 to S43, where:
in step S41, an encryption start position and an encryption field length are determined based on the encryption position information in the encryption record field;
in step S42, determining a field to be encrypted in the file to be encrypted according to the encryption start position and the length of the encryption field;
in step S43, an encrypted file is determined according to the encryption key and the field to be encrypted.
Therefore, firstly, according to the encryption position information in the encryption record field, the encryption starting position and the encryption field length are determined, the field to be encrypted specified in the encryption record field is determined, the starting position and the ending position of the field to be encrypted are determined according to the encryption starting position and the encryption field length, accurate positioning is carried out, and then the field to be encrypted is operated through the encryption secret key, so that accurate encryption is carried out.
Preferably, the step S43 specifically includes: and performing XOR operation on the encryption key and the field to be encrypted to determine the encrypted file. Therefore, the fields needing to be encrypted are subjected to XOR operation through the encryption key, and based on the fields needing to be encrypted which are randomly selected, the encryption accuracy can be ensured by applying simple encryption operation, and the cracking difficulty is increased. It is to be understood that the encryption algorithm applied by the present invention using the encryption key includes, but is not limited to, an exclusive or operation, as long as efficient encryption can be performed.
It should be noted that, referring to fig. 6, fig. 6 is a schematic diagram of the xor operation provided by the present invention, where a is an operator, and the name is xor, and the role is: in bitwise operation, the result is 0 when two values are the same and 1 when they are not the same. Assuming any two integers, A and B, are represented by binary numbers 0010101010 and 1100110101, respectively, then if A and B are XOR' ed, the integer C is obtained: 1110011111, this process corresponds to an encryption process, namely: the data A is encrypted by the key B to obtain encrypted data C. In the decryption process, taking C and B to do XOR, and obtaining data after the processing is finished, namely A: and the encrypted data C is decrypted by the key B to obtain the original data A. At this time, the entire process of encryption and decryption is completed. If B is used as a fixed encryption Key Key, the resource data A is encrypted to obtain data C before being packaged, the data C is packaged and issued to the market, after a user installs an App, when the user starts to run, a program automatically decrypts the C data through the Key to obtain the data A, then the program is run, and at the moment, the symmetrical encryption and decryption work is completed. Thus, simple xor encryption, knowing the format of the file, can be easily broken, taking the picture as an example, png compressed picture, the format of the header is fixed: 89504E 47, the Key for encryption can be simply pushed out by existing data.
Preferably, the above file encryption method further includes: and adding a first character string at the suffix of the file name of the encrypted file, wherein the first character string is used for preventing a computer from automatically identifying and analyzing the encrypted file. Therefore, after the file is encrypted, some files are checked for errors during system access, such as: the jpg and png pictures have fixed formats, when a folder is opened by a windows system, part of information can be decrypted and taken out to be displayed to a user, and the first character string is added at the suffix of the file name, so that a computer is prevented from automatically identifying the format of an encrypted file to decrypt. In a specific embodiment of the present invention, the entire content of the file name is encrypted specifically, for example, aes, and then a string suffix of the unconventional file format suffix is added to the encrypted name, for example, cat, so that the computer cannot automatically recognize and analyze the encrypted name.
Preferably, the decryption process of the file is opposite to the symmetric sequence of the encryption method of the file, when decryption is needed, if the file suffix is found to be the encrypted file suffix, the decryption process is carried out, the file name is decrypted, the real file name is restored by decryption according to a decryption algorithm of a corresponding algorithm during encryption, such as aes, data of the file content with the length of the file name offset is read, and the encrypted initial position and the encrypted length are read from the offset useless data according to a fixed position to decrypt the corresponding mode used during encryption of the file data, so that the real file data are obtained.
Example 2
The embodiment of the invention provides a file encryption device, which comprises a processor and a memory, wherein a computer program is stored in the memory, and when the computer program is executed by the processor, the file encryption device realizes the file encryption method.
Example 3
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the file encryption method as described above.
The invention discloses a file encryption method, a device and a storage medium, wherein in the method, firstly, a key resource is obtained to determine a file to be encrypted, so as to avoid redundant encryption operation and prevent the file which does not need to be encrypted from being encrypted; then, determining an encryption key corresponding to the file to be encrypted so as to perform subsequent encryption operation, and determining the length of the head to add so as to add a field with a certain length to record the encryption operation; furthermore, according to the length of the added head, an encryption record field is added to the head for effectively recording encryption operation; furthermore, the file to be encrypted is encrypted according to the encryption key and the encryption record field, so that the randomness of encryption is ensured, and the encryption operation is recorded; and finally, effective packaging is carried out, so that the downloading and the use of a user are facilitated.
According to the technical scheme, the encryption rule is utilized to add the encryption record field at the head of the file, and then the encryption key and the encryption record field are utilized to encrypt the file to be encrypted, so that the randomness of encryption is increased, the difficulty of decryption is increased, the safety of the file is ensured, and the leakage of important resources is effectively avoided.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (10)

1. A method for encrypting a file, comprising:
acquiring a plurality of files in key resources, and determining files needing to be encrypted in the plurality of files;
determining an encryption key and a head adding length corresponding to the file to be encrypted according to an encryption rule;
adding an encryption record field at the head of the file to be encrypted according to the head adding length, wherein the encryption record field is used for recording encryption operation;
encrypting the file to be encrypted according to the encryption key and the encryption record field to determine an encrypted file;
and packaging the encrypted file and files which do not need to be encrypted in the multiple files into the APP.
2. The method for encrypting the file according to claim 1, wherein the determining the file to be encrypted in the plurality of files comprises:
adding a field with a preset length at the head of the file to be encrypted according to the record information of the file;
storing a fixed identifier at the beginning of the preset length field.
3. The method for encrypting the file according to claim 1, wherein the determining the encryption key and the header addition length corresponding to the file to be encrypted according to the encryption rule comprises:
determining the corresponding encryption key according to the name of the file to be encrypted;
and determining the corresponding head adding length according to the number of bytes occupied by the content of the file to be encrypted.
4. The method for encrypting the file according to claim 1, wherein the adding an encryption record field to the header of the file to be encrypted according to the header addition length comprises:
adding the encrypted record field to the head of the file to be encrypted according to the head adding length, wherein the length of the encrypted record field is the head adding length;
and recording the encrypted position information at any position of the encrypted record field, wherein the encrypted position information comprises an encryption starting position and an encryption field length.
5. The method for encrypting the file according to claim 4, wherein the adding an encryption record field to the header of the file to be encrypted according to the header addition length further comprises:
padding a random number in the encrypted record field except for a position where the encrypted position information is recorded.
6. The method for encrypting the file according to claim 5, wherein the encrypting the file to be encrypted according to the encryption key and the encryption record field, and the determining the encrypted file comprises:
determining the encryption starting position and the length of the encryption field according to the encryption position information in the encryption record field;
determining a field to be encrypted in the file to be encrypted according to the encryption starting position and the length of the encryption field;
and determining the encrypted file according to the encryption key and the field to be encrypted.
7. The method for encrypting the file according to claim 6, wherein the determining the encrypted file according to the encryption key and the field to be encrypted comprises: and performing XOR operation on the encryption key and the field to be encrypted to determine the encrypted file.
8. The method for encrypting the file according to any one of claims 1 to 7, further comprising: adding a first character string at the file name suffix of the encrypted file, wherein the first character string is used for preventing a computer from automatically identifying and analyzing the encrypted file.
9. An apparatus for encrypting a file, comprising a processor and a memory, the memory having stored thereon a computer program which, when executed by the processor, implements a method for encrypting a file according to any one of claims 1 to 8.
10. A computer-readable storage medium, on which a computer program is stored, the computer program, when executed by a processor, implementing a method of encrypting a file according to any one of claims 1 to 8.
CN202011567804.1A 2020-12-25 2020-12-25 File encryption method and device and storage medium Pending CN112613071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011567804.1A CN112613071A (en) 2020-12-25 2020-12-25 File encryption method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011567804.1A CN112613071A (en) 2020-12-25 2020-12-25 File encryption method and device and storage medium

Publications (1)

Publication Number Publication Date
CN112613071A true CN112613071A (en) 2021-04-06

Family

ID=75247853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011567804.1A Pending CN112613071A (en) 2020-12-25 2020-12-25 File encryption method and device and storage medium

Country Status (1)

Country Link
CN (1) CN112613071A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102456116A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 File encryption method, file decryption method and devices
CN103310158A (en) * 2013-06-14 2013-09-18 大唐移动通信设备有限公司 File processing method and device
CN105790925A (en) * 2014-12-24 2016-07-20 北京奇虎科技有限公司 Data encryption method, data decryption method, data encryption device and data decryption device
CN106372529A (en) * 2016-08-23 2017-02-01 广州视源电子科技股份有限公司 File encryption and decryption method and system
CN106789836A (en) * 2015-11-20 2017-05-31 北大方正集团有限公司 E-sourcing guard method and system
CN107516045A (en) * 2016-06-17 2017-12-26 中兴通讯股份有限公司 Document protection method and device
CN110069905A (en) * 2019-04-26 2019-07-30 深圳智慧园区信息技术有限公司 A kind of device and method of Springboot program encryption and decryption
CN111125742A (en) * 2018-10-30 2020-05-08 奇酷互联网络科技(深圳)有限公司 File management method, intelligent terminal and device with storage function
CN111382447A (en) * 2018-12-28 2020-07-07 广州市百果园信息技术有限公司 Installation package encryption method, storage medium and computer equipment
CN111639353A (en) * 2020-05-26 2020-09-08 浙江大华技术股份有限公司 Data management method and device, embedded equipment and storage medium
CN111680272A (en) * 2020-06-05 2020-09-18 深圳前海微众银行股份有限公司 Byte code encryption and decryption method and device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102456116A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 File encryption method, file decryption method and devices
CN103310158A (en) * 2013-06-14 2013-09-18 大唐移动通信设备有限公司 File processing method and device
CN105790925A (en) * 2014-12-24 2016-07-20 北京奇虎科技有限公司 Data encryption method, data decryption method, data encryption device and data decryption device
CN106789836A (en) * 2015-11-20 2017-05-31 北大方正集团有限公司 E-sourcing guard method and system
CN107516045A (en) * 2016-06-17 2017-12-26 中兴通讯股份有限公司 Document protection method and device
CN106372529A (en) * 2016-08-23 2017-02-01 广州视源电子科技股份有限公司 File encryption and decryption method and system
CN111125742A (en) * 2018-10-30 2020-05-08 奇酷互联网络科技(深圳)有限公司 File management method, intelligent terminal and device with storage function
CN111382447A (en) * 2018-12-28 2020-07-07 广州市百果园信息技术有限公司 Installation package encryption method, storage medium and computer equipment
CN110069905A (en) * 2019-04-26 2019-07-30 深圳智慧园区信息技术有限公司 A kind of device and method of Springboot program encryption and decryption
CN111639353A (en) * 2020-05-26 2020-09-08 浙江大华技术股份有限公司 Data management method and device, embedded equipment and storage medium
CN111680272A (en) * 2020-06-05 2020-09-18 深圳前海微众银行股份有限公司 Byte code encryption and decryption method and device

Similar Documents

Publication Publication Date Title
WO2017148316A1 (en) File encryption method, file decryption method, electronic device, and storage medium
US7650499B2 (en) Encryption apparatus and decryption apparatus
US6993661B1 (en) System and method that provides for the efficient and effective sanitizing of disk storage units and the like
JP3741357B2 (en) Data storage method and system, and data storage processing recording medium
US8341429B2 (en) Data transfer device
US8495365B2 (en) Content processing apparatus and encryption processing method
WO2012063755A1 (en) Distributed archive system, data archive device, and data restoring device
CN109981266B (en) Method and device for storing and reading key and sensitive information
KR101117588B1 (en) Record carrier comprising encryption indication information
JP2018142314A5 (en)
WO2021169121A1 (en) Method for switching between data storage schemes, device, and storage medium
CN116015767A (en) Data processing method, device, equipment and medium
JP2010532880A (en) System and method for processing data for data security
CN108173906A (en) Installation kit method for down loading, device, storage medium and electronic equipment
CN112613071A (en) File encryption method and device and storage medium
JP3302086B2 (en) Compression encryption device
CN110929274B (en) Method, system and device for encrypting and decrypting file by using Blowfish
CN1898625A (en) License information management apparatus and license information management method
JP7235941B2 (en) Information management system and method
JP2004246431A (en) Content protection system, content protection method, and program making computer execute method
JP7412445B2 (en) Content duplication device, access control device and access control program
CN116069742B (en) Compression and decompression method and device
JP2020503625A (en) Data erasing method and apparatus
CN117220985A (en) Data encryption interaction method and device based on isolated network
CN112685756B (en) Data writing and reading method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210406

RJ01 Rejection of invention patent application after publication