CN112613071A - File encryption method and device and storage medium - Google Patents
File encryption method and device and storage medium Download PDFInfo
- Publication number
- CN112613071A CN112613071A CN202011567804.1A CN202011567804A CN112613071A CN 112613071 A CN112613071 A CN 112613071A CN 202011567804 A CN202011567804 A CN 202011567804A CN 112613071 A CN112613071 A CN 112613071A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypted
- encryption
- field
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004806 packaging method and process Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 4
- 238000005336 cracking Methods 0.000 description 3
- 241000282326 Felis catus Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention relates to a file encryption method, a device and a storage medium, wherein the method comprises the following steps: acquiring various files in the key resources, and determining files needing to be encrypted in the various files; determining an encryption key and a head adding length corresponding to a file to be encrypted according to an encryption rule; adding an encryption record field at the head of the file to be encrypted according to the head adding length; encrypting the file to be encrypted according to the encryption key and the encryption record field to determine an encrypted file; and packaging the encrypted file and files which do not need to be encrypted in various files into the APP. The invention adds the encryption record field at the head of the file by using the encryption rule, and then encrypts the file to be encrypted by using the encryption key and the encryption record field, thereby increasing the randomness of encryption, increasing the difficulty of decryption, ensuring the security of the file and effectively avoiding the leakage of important resources.
Description
Technical Field
The present invention relates to the field of data encryption technologies, and in particular, to a file encryption method, device and storage medium.
Background
The common format of the android package is apk at present, and the common format can be easily decompressed by a plurality of decompressing software to restore the original form before packaging. For example, when an apk is opened using some type of decompression software, some directories and files before packaging are seen inside: an assets directory, res directory, android manifest. However, key resources in the android package file are not encrypted and can be easily taken by others, so that implementation modes of some functions are deduced, analysis and research and development periods are shortened, and serious technical leakage is caused, so that the key resources in the file are encrypted to protect core information of a company.
In the existing file encryption mode, the file content field is often encrypted only by using an encryption key, the encryption mode is too simple, and when a competitor knows the format of the file, the file is easy to be cracked. In summary, how to effectively encrypt the key resources of the file is an urgent problem to be solved.
Disclosure of Invention
In view of the above, there is a need to provide a method for encrypting a file, so as to solve the problem of how to effectively encrypt key resources of the file in the prior art.
The invention provides a file encryption method, which comprises the following steps:
acquiring a plurality of files in key resources, and determining files needing to be encrypted in the plurality of files;
determining an encryption key and a head adding length corresponding to the file to be encrypted according to an encryption rule;
adding an encryption record field at the head of the file to be encrypted according to the head adding length;
encrypting the file to be encrypted according to the encryption key and the encryption record field to determine an encrypted file;
and packaging the encrypted file and files which do not need to be encrypted in the multiple files into the APP.
Further, the determining the file to be encrypted in the plurality of files includes:
adding a field with a preset length at the head of the file to be encrypted according to the record information of the file;
storing a fixed identifier at the beginning of the preset length field.
Further, the determining, according to the encryption rule, an encryption key and a header addition length corresponding to the file to be encrypted includes:
determining the corresponding encryption key according to the name of the file to be encrypted;
and determining the corresponding head adding length according to the number of bytes occupied by the content of the file to be encrypted.
Further, the adding an encryption record field to the header of the file to be encrypted according to the header addition length includes:
adding an encryption record field at the head of the file to be encrypted according to the head adding length, wherein the length of the encryption record field is the head adding length;
and recording the encrypted position information at any position of the encrypted record field, wherein the encrypted position information comprises an encryption starting position and an encryption field length.
Further, the adding an encryption record field to the header of the file to be encrypted according to the header addition length further includes:
padding a random number in the encrypted record field except for a position where the encrypted position information is recorded.
Further, the encrypting the file to be encrypted according to the encryption key and the encryption record field, and determining the encrypted file includes:
determining the encryption starting position and the length of the encryption field according to the encryption position information in the encryption record field;
determining a field to be encrypted in the file to be encrypted according to the encryption starting position and the length of the encryption field;
and determining the encrypted file according to the encryption key and the field to be encrypted.
Further, the determining the encrypted file according to the encryption key and the field to be encrypted includes: and performing XOR operation on the encryption key and the field to be encrypted to determine the encrypted file.
Further, the file encryption method further includes: adding a first character string at the file name suffix of the encrypted file, wherein the first character string is used for preventing a computer from automatically identifying and analyzing the encrypted file.
The invention also provides a file encryption device, which comprises a processor and a memory, wherein the memory is stored with a computer program, and the computer program realizes the file encryption method when being executed by the processor.
The present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the file encryption method as described above.
Compared with the prior art, the invention has the beneficial effects that: firstly, determining a file to be encrypted by acquiring key resources, thereby avoiding redundant encryption operation and preventing the encryption of the file which does not need to be encrypted; then, determining an encryption key corresponding to the file to be encrypted so as to perform subsequent encryption operation, and determining the length of the head to add so as to add a field with a certain length to record the encryption operation; furthermore, according to the length of the added head, an encryption record field is added to the head for effectively recording encryption operation; furthermore, the file to be encrypted is encrypted according to the encryption key and the encryption record field, so that the randomness of encryption is ensured, and the encryption operation is recorded; and finally, effective packaging is carried out, so that the downloading and the use of a user are facilitated. In conclusion, the invention adds the encryption record field at the head of the file by using the encryption rule, and then encrypts the file to be encrypted by using the encryption key and the encryption record field, thereby increasing the randomness of encryption, increasing the difficulty of decryption, ensuring the security of the file and effectively avoiding the leakage of important resources.
Drawings
FIG. 1 is a schematic flow chart of a file encryption method according to the present invention;
FIG. 2 is a schematic diagram of a process for determining a file to be encrypted according to the present invention;
fig. 3 is a schematic flow chart of determining an encryption key and a header addition length according to the present invention;
FIG. 4 is a schematic flow chart of adding an encrypted record field according to the present invention;
FIG. 5 is a schematic diagram of a process for determining an encrypted file according to the present invention;
FIG. 6 is a diagram illustrating an XOR operation according to the present invention.
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate preferred embodiments of the invention and together with the description, serve to explain the principles of the invention and not to limit the scope of the invention.
Example 1
An embodiment of the present invention provides a file encryption method, and referring to fig. 1, fig. 1 is a schematic flow chart of the file encryption method provided by the present invention, where the file encryption method includes steps S1 to S5, where:
in step S1, acquiring multiple files in the key resource, and determining a file to be encrypted in the multiple files;
in step S2, according to the encryption rule, an encryption key and a header addition length corresponding to the file to be encrypted are determined;
in step S3, according to the header addition length, an encryption record field is added to the header of the file to be encrypted;
in step S4, according to the encryption key and the encryption record field, encrypting the file to be encrypted, and determining the encrypted file;
in step S5, the file to be encrypted is encrypted according to the encryption key and the encryption record field, and the encrypted file is determined.
In the embodiment of the invention, firstly, the key resources are obtained to determine the files needing to be encrypted, so that redundant encryption operation is avoided, and the files needing not to be encrypted are prevented from being encrypted; then, determining an encryption key corresponding to the file to be encrypted so as to perform subsequent encryption operation, and determining the length of the head to add so as to add a field with a certain length to record the encryption operation; furthermore, according to the length of the added head, an encryption record field is added to the head for effectively recording encryption operation; furthermore, the file to be encrypted is encrypted according to the encryption key and the encryption record field, so that the randomness of encryption is ensured, and the encryption operation is recorded; and finally, effective packaging is carried out, so that the downloading and the use of a user are facilitated.
Preferably, referring to fig. 2, fig. 2 is a schematic flow chart of determining a file to be encrypted according to the present invention, where the step S1 includes steps S11 to S12, where:
in step S11, adding a field with a preset length in the header of the file to be encrypted according to the record information of the file;
in step S12, a fixed identifier is stored at the beginning of the preset length field.
Therefore, the file to be encrypted is effectively identified by adding the preset length field at the head of the file to be encrypted and storing the fixed identifier, so that the file to be encrypted is distinguished from the file not to be encrypted. In one specific embodiment of the present invention, the file name is: docx, a specific encryption key is generated according to the file name "information", and if the file is a file to be encrypted, the file is distinguished from the recorded information, a certain length (namely a preset length field) is added to the head of the file, a fixed beginning "encode" (fixed identifier) is stored, and other positions are reserved for other purposes.
Preferably, referring to fig. 3, fig. 3 is a schematic flow chart illustrating the determining of the encryption key and the header addition length provided by the present invention, where the step S2 includes steps S21 to S22, where:
in step S21, determining a corresponding encryption key according to the name of the file to be encrypted;
in step S22, the corresponding header addition length is determined according to the number of bytes occupied by the file content to be encrypted.
The invention aims at the problem that the file header is added with the length of random data, namely the header addition length, and the length added by each file is different according to the byte number occupied by the file name content, so that the starting position of the file cannot be accurately calculated, and the cracking difficulty is increased. Meanwhile, according to a certain rule, the corresponding encryption key is determined according to the name of the file to be encrypted, so that different files are ensured to have different corresponding encryption keys, targeted encryption is realized, and meanwhile, the difficulty of decryption is increased.
Preferably, referring to fig. 4, fig. 4 is a schematic flowchart of the process of adding the encrypted record field according to the present invention, where the step S3 includes steps S31 to S32, where:
in step S31, adding an encrypted record field to the header of the file to be encrypted according to the header addition length, where the length of the encrypted record field is the header addition length;
in step S32, the encryption position information is recorded at an arbitrary position of the encryption record field, wherein the encryption position information includes the encryption start position and the encryption field length.
Therefore, the invention records the encryption position information at any position of the encryption record field, records the encryption operation, determines the encryption starting position and the length of the encryption field, and determines the field corresponding to the encryption, namely, the invention does not encrypt the field of the whole file, but encrypts the field in the encryption record field by appointing a certain encryption field, encrypts the data which is not regular originally, and increases the cracking difficulty. For example, each file is added to a specified length from a certain position at random, and when the file is decrypted, it is also required to know which contents are encrypted, so that the starting position (namely the encryption starting position) and the length (namely the length of an encryption field) are recorded in front of the file contents when the file is encrypted, so that when the file is decrypted, the position from which the file is decrypted can be known, how long the file is decrypted, and the randomness of the encryption and the difficulty of the decryption are ensured.
Preferably, the step S3 further includes: a random number is padded in the encrypted record field except for the position where the encrypted position information is recorded. Therefore, when information is stored, certain fixed positions in bytes added to the head can be recorded, other positions are filled with random numbers, the random numbers are changed into irregular numbers, and the decryption difficulty is further increased.
Preferably, referring to fig. 5, fig. 5 is a schematic flowchart of the process of determining an encrypted file according to the present invention, where the step S4 includes steps S41 to S43, where:
in step S41, an encryption start position and an encryption field length are determined based on the encryption position information in the encryption record field;
in step S42, determining a field to be encrypted in the file to be encrypted according to the encryption start position and the length of the encryption field;
in step S43, an encrypted file is determined according to the encryption key and the field to be encrypted.
Therefore, firstly, according to the encryption position information in the encryption record field, the encryption starting position and the encryption field length are determined, the field to be encrypted specified in the encryption record field is determined, the starting position and the ending position of the field to be encrypted are determined according to the encryption starting position and the encryption field length, accurate positioning is carried out, and then the field to be encrypted is operated through the encryption secret key, so that accurate encryption is carried out.
Preferably, the step S43 specifically includes: and performing XOR operation on the encryption key and the field to be encrypted to determine the encrypted file. Therefore, the fields needing to be encrypted are subjected to XOR operation through the encryption key, and based on the fields needing to be encrypted which are randomly selected, the encryption accuracy can be ensured by applying simple encryption operation, and the cracking difficulty is increased. It is to be understood that the encryption algorithm applied by the present invention using the encryption key includes, but is not limited to, an exclusive or operation, as long as efficient encryption can be performed.
It should be noted that, referring to fig. 6, fig. 6 is a schematic diagram of the xor operation provided by the present invention, where a is an operator, and the name is xor, and the role is: in bitwise operation, the result is 0 when two values are the same and 1 when they are not the same. Assuming any two integers, A and B, are represented by binary numbers 0010101010 and 1100110101, respectively, then if A and B are XOR' ed, the integer C is obtained: 1110011111, this process corresponds to an encryption process, namely: the data A is encrypted by the key B to obtain encrypted data C. In the decryption process, taking C and B to do XOR, and obtaining data after the processing is finished, namely A: and the encrypted data C is decrypted by the key B to obtain the original data A. At this time, the entire process of encryption and decryption is completed. If B is used as a fixed encryption Key Key, the resource data A is encrypted to obtain data C before being packaged, the data C is packaged and issued to the market, after a user installs an App, when the user starts to run, a program automatically decrypts the C data through the Key to obtain the data A, then the program is run, and at the moment, the symmetrical encryption and decryption work is completed. Thus, simple xor encryption, knowing the format of the file, can be easily broken, taking the picture as an example, png compressed picture, the format of the header is fixed: 89504E 47, the Key for encryption can be simply pushed out by existing data.
Preferably, the above file encryption method further includes: and adding a first character string at the suffix of the file name of the encrypted file, wherein the first character string is used for preventing a computer from automatically identifying and analyzing the encrypted file. Therefore, after the file is encrypted, some files are checked for errors during system access, such as: the jpg and png pictures have fixed formats, when a folder is opened by a windows system, part of information can be decrypted and taken out to be displayed to a user, and the first character string is added at the suffix of the file name, so that a computer is prevented from automatically identifying the format of an encrypted file to decrypt. In a specific embodiment of the present invention, the entire content of the file name is encrypted specifically, for example, aes, and then a string suffix of the unconventional file format suffix is added to the encrypted name, for example, cat, so that the computer cannot automatically recognize and analyze the encrypted name.
Preferably, the decryption process of the file is opposite to the symmetric sequence of the encryption method of the file, when decryption is needed, if the file suffix is found to be the encrypted file suffix, the decryption process is carried out, the file name is decrypted, the real file name is restored by decryption according to a decryption algorithm of a corresponding algorithm during encryption, such as aes, data of the file content with the length of the file name offset is read, and the encrypted initial position and the encrypted length are read from the offset useless data according to a fixed position to decrypt the corresponding mode used during encryption of the file data, so that the real file data are obtained.
Example 2
The embodiment of the invention provides a file encryption device, which comprises a processor and a memory, wherein a computer program is stored in the memory, and when the computer program is executed by the processor, the file encryption device realizes the file encryption method.
Example 3
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the file encryption method as described above.
The invention discloses a file encryption method, a device and a storage medium, wherein in the method, firstly, a key resource is obtained to determine a file to be encrypted, so as to avoid redundant encryption operation and prevent the file which does not need to be encrypted from being encrypted; then, determining an encryption key corresponding to the file to be encrypted so as to perform subsequent encryption operation, and determining the length of the head to add so as to add a field with a certain length to record the encryption operation; furthermore, according to the length of the added head, an encryption record field is added to the head for effectively recording encryption operation; furthermore, the file to be encrypted is encrypted according to the encryption key and the encryption record field, so that the randomness of encryption is ensured, and the encryption operation is recorded; and finally, effective packaging is carried out, so that the downloading and the use of a user are facilitated.
According to the technical scheme, the encryption rule is utilized to add the encryption record field at the head of the file, and then the encryption key and the encryption record field are utilized to encrypt the file to be encrypted, so that the randomness of encryption is increased, the difficulty of decryption is increased, the safety of the file is ensured, and the leakage of important resources is effectively avoided.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.
Claims (10)
1. A method for encrypting a file, comprising:
acquiring a plurality of files in key resources, and determining files needing to be encrypted in the plurality of files;
determining an encryption key and a head adding length corresponding to the file to be encrypted according to an encryption rule;
adding an encryption record field at the head of the file to be encrypted according to the head adding length, wherein the encryption record field is used for recording encryption operation;
encrypting the file to be encrypted according to the encryption key and the encryption record field to determine an encrypted file;
and packaging the encrypted file and files which do not need to be encrypted in the multiple files into the APP.
2. The method for encrypting the file according to claim 1, wherein the determining the file to be encrypted in the plurality of files comprises:
adding a field with a preset length at the head of the file to be encrypted according to the record information of the file;
storing a fixed identifier at the beginning of the preset length field.
3. The method for encrypting the file according to claim 1, wherein the determining the encryption key and the header addition length corresponding to the file to be encrypted according to the encryption rule comprises:
determining the corresponding encryption key according to the name of the file to be encrypted;
and determining the corresponding head adding length according to the number of bytes occupied by the content of the file to be encrypted.
4. The method for encrypting the file according to claim 1, wherein the adding an encryption record field to the header of the file to be encrypted according to the header addition length comprises:
adding the encrypted record field to the head of the file to be encrypted according to the head adding length, wherein the length of the encrypted record field is the head adding length;
and recording the encrypted position information at any position of the encrypted record field, wherein the encrypted position information comprises an encryption starting position and an encryption field length.
5. The method for encrypting the file according to claim 4, wherein the adding an encryption record field to the header of the file to be encrypted according to the header addition length further comprises:
padding a random number in the encrypted record field except for a position where the encrypted position information is recorded.
6. The method for encrypting the file according to claim 5, wherein the encrypting the file to be encrypted according to the encryption key and the encryption record field, and the determining the encrypted file comprises:
determining the encryption starting position and the length of the encryption field according to the encryption position information in the encryption record field;
determining a field to be encrypted in the file to be encrypted according to the encryption starting position and the length of the encryption field;
and determining the encrypted file according to the encryption key and the field to be encrypted.
7. The method for encrypting the file according to claim 6, wherein the determining the encrypted file according to the encryption key and the field to be encrypted comprises: and performing XOR operation on the encryption key and the field to be encrypted to determine the encrypted file.
8. The method for encrypting the file according to any one of claims 1 to 7, further comprising: adding a first character string at the file name suffix of the encrypted file, wherein the first character string is used for preventing a computer from automatically identifying and analyzing the encrypted file.
9. An apparatus for encrypting a file, comprising a processor and a memory, the memory having stored thereon a computer program which, when executed by the processor, implements a method for encrypting a file according to any one of claims 1 to 8.
10. A computer-readable storage medium, on which a computer program is stored, the computer program, when executed by a processor, implementing a method of encrypting a file according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011567804.1A CN112613071A (en) | 2020-12-25 | 2020-12-25 | File encryption method and device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011567804.1A CN112613071A (en) | 2020-12-25 | 2020-12-25 | File encryption method and device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112613071A true CN112613071A (en) | 2021-04-06 |
Family
ID=75247853
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011567804.1A Pending CN112613071A (en) | 2020-12-25 | 2020-12-25 | File encryption method and device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112613071A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102456116A (en) * | 2010-10-28 | 2012-05-16 | 无锡江南计算技术研究所 | File encryption method, file decryption method and devices |
CN103310158A (en) * | 2013-06-14 | 2013-09-18 | 大唐移动通信设备有限公司 | File processing method and device |
CN105790925A (en) * | 2014-12-24 | 2016-07-20 | 北京奇虎科技有限公司 | Data encryption method, data decryption method, data encryption device and data decryption device |
CN106372529A (en) * | 2016-08-23 | 2017-02-01 | 广州视源电子科技股份有限公司 | File encryption and decryption method and system |
CN106789836A (en) * | 2015-11-20 | 2017-05-31 | 北大方正集团有限公司 | E-sourcing guard method and system |
CN107516045A (en) * | 2016-06-17 | 2017-12-26 | 中兴通讯股份有限公司 | Document protection method and device |
CN110069905A (en) * | 2019-04-26 | 2019-07-30 | 深圳智慧园区信息技术有限公司 | A kind of device and method of Springboot program encryption and decryption |
CN111125742A (en) * | 2018-10-30 | 2020-05-08 | 奇酷互联网络科技(深圳)有限公司 | File management method, intelligent terminal and device with storage function |
CN111382447A (en) * | 2018-12-28 | 2020-07-07 | 广州市百果园信息技术有限公司 | Installation package encryption method, storage medium and computer equipment |
CN111639353A (en) * | 2020-05-26 | 2020-09-08 | 浙江大华技术股份有限公司 | Data management method and device, embedded equipment and storage medium |
CN111680272A (en) * | 2020-06-05 | 2020-09-18 | 深圳前海微众银行股份有限公司 | Byte code encryption and decryption method and device |
-
2020
- 2020-12-25 CN CN202011567804.1A patent/CN112613071A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102456116A (en) * | 2010-10-28 | 2012-05-16 | 无锡江南计算技术研究所 | File encryption method, file decryption method and devices |
CN103310158A (en) * | 2013-06-14 | 2013-09-18 | 大唐移动通信设备有限公司 | File processing method and device |
CN105790925A (en) * | 2014-12-24 | 2016-07-20 | 北京奇虎科技有限公司 | Data encryption method, data decryption method, data encryption device and data decryption device |
CN106789836A (en) * | 2015-11-20 | 2017-05-31 | 北大方正集团有限公司 | E-sourcing guard method and system |
CN107516045A (en) * | 2016-06-17 | 2017-12-26 | 中兴通讯股份有限公司 | Document protection method and device |
CN106372529A (en) * | 2016-08-23 | 2017-02-01 | 广州视源电子科技股份有限公司 | File encryption and decryption method and system |
CN111125742A (en) * | 2018-10-30 | 2020-05-08 | 奇酷互联网络科技(深圳)有限公司 | File management method, intelligent terminal and device with storage function |
CN111382447A (en) * | 2018-12-28 | 2020-07-07 | 广州市百果园信息技术有限公司 | Installation package encryption method, storage medium and computer equipment |
CN110069905A (en) * | 2019-04-26 | 2019-07-30 | 深圳智慧园区信息技术有限公司 | A kind of device and method of Springboot program encryption and decryption |
CN111639353A (en) * | 2020-05-26 | 2020-09-08 | 浙江大华技术股份有限公司 | Data management method and device, embedded equipment and storage medium |
CN111680272A (en) * | 2020-06-05 | 2020-09-18 | 深圳前海微众银行股份有限公司 | Byte code encryption and decryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017148316A1 (en) | File encryption method, file decryption method, electronic device, and storage medium | |
US7650499B2 (en) | Encryption apparatus and decryption apparatus | |
US6993661B1 (en) | System and method that provides for the efficient and effective sanitizing of disk storage units and the like | |
JP3741357B2 (en) | Data storage method and system, and data storage processing recording medium | |
US8341429B2 (en) | Data transfer device | |
US8495365B2 (en) | Content processing apparatus and encryption processing method | |
WO2012063755A1 (en) | Distributed archive system, data archive device, and data restoring device | |
CN109981266B (en) | Method and device for storing and reading key and sensitive information | |
KR101117588B1 (en) | Record carrier comprising encryption indication information | |
JP2018142314A5 (en) | ||
WO2021169121A1 (en) | Method for switching between data storage schemes, device, and storage medium | |
CN116015767A (en) | Data processing method, device, equipment and medium | |
JP2010532880A (en) | System and method for processing data for data security | |
CN108173906A (en) | Installation kit method for down loading, device, storage medium and electronic equipment | |
CN112613071A (en) | File encryption method and device and storage medium | |
JP3302086B2 (en) | Compression encryption device | |
CN110929274B (en) | Method, system and device for encrypting and decrypting file by using Blowfish | |
CN1898625A (en) | License information management apparatus and license information management method | |
JP7235941B2 (en) | Information management system and method | |
JP2004246431A (en) | Content protection system, content protection method, and program making computer execute method | |
JP7412445B2 (en) | Content duplication device, access control device and access control program | |
CN116069742B (en) | Compression and decompression method and device | |
JP2020503625A (en) | Data erasing method and apparatus | |
CN117220985A (en) | Data encryption interaction method and device based on isolated network | |
CN112685756B (en) | Data writing and reading method, device, medium and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210406 |
|
RJ01 | Rejection of invention patent application after publication |