CN113568867A - File encryption migration method and device and electronic equipment - Google Patents

File encryption migration method and device and electronic equipment Download PDF

Info

Publication number
CN113568867A
CN113568867A CN202110837948.2A CN202110837948A CN113568867A CN 113568867 A CN113568867 A CN 113568867A CN 202110837948 A CN202110837948 A CN 202110837948A CN 113568867 A CN113568867 A CN 113568867A
Authority
CN
China
Prior art keywords
file information
file
information table
encryption
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110837948.2A
Other languages
Chinese (zh)
Inventor
曹德高
宋荣鑫
黄建庭
肖卫渭
倪思勇
王翔宇
郑�硕
谢银意
杨志豪
卫义超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qiyue Information Technology Co Ltd
Original Assignee
Shanghai Qiyue Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qiyue Information Technology Co Ltd filed Critical Shanghai Qiyue Information Technology Co Ltd
Priority to CN202110837948.2A priority Critical patent/CN113568867A/en
Publication of CN113568867A publication Critical patent/CN113568867A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/119Details of migration of file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of computers, in particular to a file encryption migration method, a file encryption migration device and electronic equipment, wherein the file encryption migration method comprises the following steps: creating a new file information table which is the same as the file information table of the file to be migrated; scanning all file information in a file information table of a file to be migrated in a multithreading mode, encrypting the file information and adding the encrypted file information to the new file information table; and when the service end initiates a request for the required file information, decrypting the file information table, matching file information corresponding to the request for the required file information in the new file information table, and acquiring the required file information. The invention ensures the security of file migration through an encryption mode, and simultaneously ensures that the logic of the business system can cover the business scene before and after the business system is online through the mode of modifying the acquired file, thereby realizing high-availability application.

Description

File encryption migration method and device and electronic equipment
Technical Field
The invention relates to the technical field of computers, in particular to a file encryption migration method, a file encryption migration device and electronic equipment.
Background
In the prior art, when a user migrates a file, the file to be migrated is usually copied from one terminal device to a USB storage device (e.g. a USB disk), and then the USB storage device is connected to another terminal device by the user, and the internal file is transferred to another terminal device.
In the process of file migration by the method, files need to be manually copied from one terminal device to a USB flash disk and then manually copied from the USB flash disk to another terminal device, the operation is complex, and in the process of file migration by the method, because the USB flash disk is a readable and writable storage medium with a file system and has automatic playing and running functions, cross infection and propagation of computer viruses among machines can be easily caused, so that the problem of potential safety hazard of the files exists.
Disclosure of Invention
The invention provides a file encryption migration method, a file encryption migration device and electronic equipment, which are used for ensuring the security of file migration and simultaneously not influencing the acquisition of a required file by an original online service.
An embodiment of the present specification provides a file encryption migration method, including:
creating a new file information table which is the same as the file information table of the file to be migrated;
scanning all file information in a file information table of a file to be migrated in a multithreading mode, encrypting the file information and adding the encrypted file information to the new file information table;
and when the service end initiates a request for the required file information, decrypting the file information table, matching file information corresponding to the request for the required file information in the new file information table, and acquiring the required file information.
Preferably, before the scanning, in a multithreading manner, all file information in the file information table of the file to be migrated, the method includes:
adding an encryption version number field and an encryption identification field in the new file information table;
and when the file to be migrated has the file which does not need to be encrypted, the encryption identification field is not added.
Preferably, the encrypting the file information and adding the encrypted file information to the new file information table includes:
adding a version number identifier to the secret key to obtain a secret key version number;
encrypting the version number of the secret key and the file information by adopting an advanced encryption standard algorithm;
and storing the encrypted key version number and the encrypted file information into the new file information table.
Preferably, the encrypting the file information and adding the encrypted file information to the new file information table further includes:
and updating the secret key periodically, and downloading the old secret key.
Preferably, the acquiring the requirement file information includes:
when the file information corresponding to the required file information request exists in the new file information table, acquiring the required file information through a storage path in the new file information table;
and when the file information corresponding to the required file information request does not exist in the new file information table, acquiring the required file information from a historical file information table.
Preferably, when the file to be migrated is migrated, the file information of the file to be migrated is stored in a distributed file storage manner.
An embodiment of the present specification further provides a file encryption migration apparatus, including:
the information table creating module is used for creating a new file information table which is the same as the file information table of the file to be migrated;
the information encryption module is used for scanning all file information in a file information table of the file to be migrated in a multithreading mode, encrypting the file information and adding the encrypted file information to the new file information table;
and the information acquisition module is used for decrypting the file information table when a service end initiates a request for the required file information, matching file information corresponding to the request for the required file information in the new file information table and acquiring the required file information.
Preferably, before the scanning, in a multithreading manner, all file information in the file information table of the file to be migrated, the method includes:
the field adding module is used for adding an encryption version number field and an encryption identification field in the new file information table;
and the judging module is used for not adding the encryption identification field when the file to be migrated has the file which does not need to be encrypted.
An electronic device, wherein the electronic device comprises:
a processor and a memory storing computer executable instructions that, when executed, cause the processor to perform the method of any of the above.
A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of the above.
The invention ensures the security of file migration through an encryption mode, and simultaneously ensures that the logic of the business system can cover the business scene before and after the business system is online through the mode of modifying the acquired file, thereby realizing high-availability application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram illustrating a method for encrypted migration of a file according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a file encryption migration apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present specification.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art. The same reference numerals denote the same or similar elements, components, or parts in the drawings, and thus their repetitive description will be omitted.
Features, structures, characteristics or other details described in a particular embodiment do not preclude the fact that the features, structures, characteristics or other details may be combined in a suitable manner in one or more other embodiments in accordance with the technical idea of the invention.
In describing particular embodiments, the present invention has been described with reference to features, structures, characteristics or other details that are within the purview of one skilled in the art to provide a thorough understanding of the embodiments. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific features, structures, characteristics, or other details.
The diagrams depicted in the figures are exemplary only, and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The term "and/or" and/or "includes all combinations of any one or more of the associated listed items.
Referring to fig. 1, a schematic diagram of a file encryption migration method provided in an embodiment of the present specification includes:
s101: creating a new file information table which is the same as the file information table of the file to be migrated;
in the preferred embodiment of the present invention, a new magnetic disk is prepared, a distributed magnetic disk system can be used for distributed file storage, a new file information table which is the same as the file information table of the original history file is newly created on the new magnetic disk, and different fields are added to the new file information table for subsequent encryption of file information.
S102: scanning all file information in a file information table of a file to be migrated in a multithreading mode, encrypting the file information and adding the encrypted file information to the new file information table;
in the preferred embodiment of the invention, all the file information in the file information table of the file to be migrated is scanned in a multithread task mode, so that system resources can be better utilized, and the overall operation efficiency of a scanning process is improved. And the security of the file is ensured by encrypting the file information.
S103: and when the service end initiates a request for the required file information, decrypting the file information table, matching file information corresponding to the request for the required file information in the new file information table, and acquiring the required file information.
In a preferred embodiment of the present invention, when the service system performs service processing, the service system pulls the required file information according to the service requirement, when the required file information is pulled, the required file information is preferentially searched in the new file information table, and when the required file information is not present in the new file information table, the required file information is pulled in the historical file information table, so that it is ensured that the service scene can be covered by the logic before and after the service system is online, and high availability application is realized.
Further, before the scanning all file information in the file information table of the file to be migrated in the multithreading manner, the method includes:
adding an encryption version number field and an encryption identification field in the new file information table;
and when the file to be migrated has the file which does not need to be encrypted, the encryption identification field is not added.
In a preferred embodiment of the invention, an encryption version number field, an encryption identification field or other fields are added in the new file information table for subsequent identification of new file information, when a file to be migrated needs to be encrypted, the encrypted file is distinguished through the fields, and when the file to be migrated exists in a file which does not need to be encrypted, the process of adding the encryption identification field is omitted.
Further, the encrypting the file information and adding to the new file information table includes:
adding a version number identifier to the secret key to obtain a secret key version number;
encrypting the version number of the secret key and the file information by adopting an advanced encryption standard algorithm;
and storing the encrypted key version number and the encrypted file information into the new file information table.
In a preferred embodiment of the present invention, the version number of the secret key and the field of the encrypted version number are corresponding to each other, and then the version number of the secret key and the file information are encrypted by using a high-level encryption standard algorithm, so that the encryption process of the file information is realized, and the security problem of the file information in migration is ensured.
Further, the encrypting the file information and adding the encrypted file information to the new file information table further includes:
and updating the secret key periodically, and downloading the old secret key.
In the preferred embodiment of the invention, the security of the secret key is ensured by regularly updating the secret key and off-line the old secret key, so that the potential safety hazard caused by stealing the file information by the attacked end by using the old secret key is prevented.
Further, the acquiring the requirement file information includes:
when the file information corresponding to the required file information request exists in the new file information table, acquiring the required file information through a storage path in the new file information table;
and when the file information corresponding to the required file information request does not exist in the new file information table, acquiring the required file information from a historical file information table.
In the preferred embodiment of the invention, in the process of acquiring the required file by the online service, if the file information corresponding to the required file information request exists in the new file information table, the required file information is directly acquired through a storage path in the new file information table; and if the file information corresponding to the demand file information request does not exist in the new file information table, traversing the historical file information table so as to read the demand file information. By the method, the service scene can be covered by the logic of the service system before and after the service system is online, and high-availability application is realized.
Further, when the file to be migrated is migrated, the file information of the file to be migrated is stored in a distributed file storage manner.
In the preferred embodiment of the invention, step 1, prepare the new magnetic disc, newly build the table the same as file information table of the original historical file, add two fields of encryption version number and whether the file needs to encrypt and label in the new table; step 2, scanning an original information table by utilizing a multi-thread task, inquiring a batch of data at one time, putting the batch of data into an encryption task until the whole table is scanned, storing a task processing file into a new disk for encrypting a file, recording file information into a new table, and storing the version number of an encrypted secret key; step 3, when the service system takes the file, the file information in the new table is preferentially searched, and if the new table has the information of the file, the new disk path stored in the new table is used for acquiring the file; and if the file information of the new table does not exist, inquiring in the historical file information table to obtain the required file information.
Step 1 may refer to the above embodiment for "creating a new file information table the same as the file information table of the file to be migrated"; adding an encryption version number field and an encryption identification field in the new file information table; and when the file to be migrated has the file which does not need to be encrypted, the encryption identification field is not added. "to describe, in step 2, reference may be made to the above embodiment for" scanning all file information in the file information table of the file to be migrated in a multithreading manner, encrypting the file information, and adding the encrypted file information to the new file information table; and updating the secret key periodically, and downloading the old secret key. "step 3 may refer to" when there is file information corresponding to the required file information request in the new file information table, obtain the required file information through a storage path in the new file information table in the above embodiment; and when the file information corresponding to the required file information request does not exist in the new file information table, acquiring the required file information from a historical file information table. "is described.
Fig. 2 is a schematic structural diagram of a file encryption migration apparatus provided in an embodiment of this specification, including:
an information table creating module 201, configured to create a new file information table that is the same as the file information table of the file to be migrated;
the information encryption module 202 is configured to scan all file information in a file information table of a file to be migrated in a multithreading manner, encrypt the file information, and add the encrypted file information to the new file information table;
the information obtaining module 203 is configured to decrypt the file information table when the service end initiates a request for the required file information, match file information corresponding to the request for the required file information in the new file information table, and obtain the required file information.
Further, before the scanning all file information in the file information table of the file to be migrated in the multithreading manner, the method includes:
the field adding module is used for adding an encryption version number field and an encryption identification field in the new file information table;
and the judging module is used for not adding the encryption identification field when the file to be migrated has the file which does not need to be encrypted.
Further, the information encryption module 202 includes a storage unit, configured to add a version number identifier to the key to obtain a version number of the key; encrypting the version number of the secret key and the file information by adopting an advanced encryption standard algorithm; storing the encrypted key version number and the encrypted file information into the new file information table; and updating the secret key periodically, and downloading the old secret key.
Further, the information obtaining module 203 includes a determining unit, configured to obtain the required file information through a storage path in the new file information table when the file information corresponding to the required file information request exists in the new file information table; and when the file information corresponding to the required file information request does not exist in the new file information table, acquiring the required file information from a historical file information table.
The functions of the apparatus in the embodiment of the present invention have been described in the above method embodiments, so that reference may be made to the related descriptions in the foregoing embodiments for details that are not described in the present embodiment, and further details are not described herein.
Based on the same inventive concept, the embodiment of the specification further provides the electronic equipment.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as specific physical implementations for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification. An electronic device 300 according to this embodiment of the invention is described below with reference to fig. 3. The electronic device 300 shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 3, electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to: at least one processing unit 310, at least one memory unit 320, a bus 330 connecting different device components (including the memory unit 320 and the processing unit 310), a display unit 340, and the like.
Wherein the storage unit stores program code executable by the processing unit 310 to cause the processing unit 310 to perform the steps according to various exemplary embodiments of the present invention described in the above-mentioned processing method section of the present specification. For example, the processing unit 310 may perform the steps as shown in fig. 1.
The storage unit 320 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)3201 and/or a cache storage unit 3202, and may further include a read only memory unit (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating device, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 400 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 300, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 300 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 350. Also, the electronic device 300 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 360. Network adapter 360 may communicate with other modules of electronic device 300 via bus 330. It should be appreciated that although not shown in FIG. 3, other hardware and/or software modules may be used in conjunction with electronic device 300, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID devices, tape drives, and data backup storage devices, to name a few.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention. The computer program, when executed by a data processing apparatus, enables the computer readable medium to implement the above-described method of the invention, namely: such as the method shown in fig. 1.
Fig. 4 is a schematic diagram of a computer-readable medium provided in an embodiment of the present disclosure.
A computer program implementing the method shown in fig. 1 may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor device, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution apparatus, device, or apparatus. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the components in embodiments in accordance with the invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP). The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A file encryption migration method is characterized by comprising the following steps:
creating a new file information table which is the same as the file information table of the file to be migrated;
scanning all file information in a file information table of a file to be migrated in a multithreading mode, encrypting the file information and adding the encrypted file information to the new file information table;
and when the service end initiates a request for the required file information, decrypting the file information table, matching file information corresponding to the request for the required file information in the new file information table, and acquiring the required file information.
2. The file encryption migration method according to claim 1, wherein before scanning all file information in the file information table of the file to be migrated in a multi-thread manner, the method comprises:
adding an encryption version number field and an encryption identification field in the new file information table;
and when the file to be migrated has the file which does not need to be encrypted, the encryption identification field is not added.
3. The file encryption migration method according to any one of claims 1-2, wherein the encrypting the file information and adding to the new file information table includes:
adding a version number identifier to the secret key to obtain a secret key version number;
encrypting the version number of the secret key and the file information by adopting an advanced encryption standard algorithm;
and storing the encrypted key version number and the encrypted file information into the new file information table.
4. A file encryption migration method according to any one of claims 1 to 3, wherein said encrypting and adding said file information to said new file information table further comprises:
and updating the secret key periodically, and downloading the old secret key.
5. The method for migrating the file encryption according to any one of claims 1-4, wherein the acquiring the required file information includes:
when the file information corresponding to the required file information request exists in the new file information table, acquiring the required file information through a storage path in the new file information table;
and when the file information corresponding to the required file information request does not exist in the new file information table, acquiring the required file information from a historical file information table.
6. The file encryption migration method according to any one of claims 1 to 5, wherein when the file to be migrated is migrated, a distributed file storage manner is adopted to store file information of the file to be migrated.
7. A file encryption migration apparatus, comprising:
the information table creating module is used for creating a new file information table which is the same as the file information table of the file to be migrated;
the information encryption module is used for scanning all file information in a file information table of the file to be migrated in a multithreading mode, encrypting the file information and adding the encrypted file information to the new file information table;
and the information acquisition module is used for decrypting the file information table when a service end initiates a request for the required file information, matching file information corresponding to the request for the required file information in the new file information table and acquiring the required file information.
8. The apparatus for encrypting and migrating files according to claim 7, wherein before scanning all file information in the file information table of the file to be migrated in a multi-thread manner, the apparatus comprises:
the field adding module is used for adding an encryption version number field and an encryption identification field in the new file information table;
and the judging module is used for not adding the encryption identification field when the file to be migrated has the file which does not need to be encrypted.
9. An electronic device, wherein the electronic device comprises:
a processor and a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-6.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-6.
CN202110837948.2A 2021-07-23 2021-07-23 File encryption migration method and device and electronic equipment Pending CN113568867A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110837948.2A CN113568867A (en) 2021-07-23 2021-07-23 File encryption migration method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110837948.2A CN113568867A (en) 2021-07-23 2021-07-23 File encryption migration method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN113568867A true CN113568867A (en) 2021-10-29

Family

ID=78166780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110837948.2A Pending CN113568867A (en) 2021-07-23 2021-07-23 File encryption migration method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113568867A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953893A (en) * 2017-02-15 2017-07-14 北京百度网讯科技有限公司 Data Migration between cloud storage system
CN107844271A (en) * 2017-10-27 2018-03-27 郑州云海信息技术有限公司 A kind of method, apparatus and computer-readable recording medium for being classified storage
CN109474418A (en) * 2019-01-22 2019-03-15 网易(杭州)网络有限公司 File enciphering method, document decryption method, device, medium and calculating equipment
US20190220441A1 (en) * 2018-01-18 2019-07-18 EMC IP Holding Company LLC Method, device and computer program product for data migration
CN112597126A (en) * 2020-12-14 2021-04-02 中国建设银行股份有限公司 Data migration method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953893A (en) * 2017-02-15 2017-07-14 北京百度网讯科技有限公司 Data Migration between cloud storage system
CN107844271A (en) * 2017-10-27 2018-03-27 郑州云海信息技术有限公司 A kind of method, apparatus and computer-readable recording medium for being classified storage
US20190220441A1 (en) * 2018-01-18 2019-07-18 EMC IP Holding Company LLC Method, device and computer program product for data migration
CN109474418A (en) * 2019-01-22 2019-03-15 网易(杭州)网络有限公司 File enciphering method, document decryption method, device, medium and calculating equipment
CN112597126A (en) * 2020-12-14 2021-04-02 中国建设银行股份有限公司 Data migration method and device

Similar Documents

Publication Publication Date Title
CN107077540B (en) Method and system for providing cloud-based application security services
CN114547558B (en) Authorization method, authorization control device, equipment and medium
CN102707999A (en) Application compatibility leveraging successful resolution of issues
CN105074712A (en) Code processing device and program
CN113568680B (en) Dynamic link library protection method, device, equipment and medium for application program
CN113391796B (en) Construction method, device, equipment and medium of integrated development environment
CN113761482A (en) Program code protection method and device
CN112764792B (en) Method and device for upgrading associated server version application and electronic equipment
CN111200593A (en) Application login method and device and electronic equipment
CN106055375A (en) Application program installation method and device
CN110795741A (en) Method and device for carrying out security processing on data
CN112016104A (en) Encryption method, device and system for financial sensitive data
CN111382447B (en) Encryption method for installation package, storage medium and computer equipment
JP2017146967A (en) Method and system for improving loading speed of intermediate language file
CN109543366B (en) Source code encryption method, device and system
CN105701405A (en) System and method for antivirus checking of native images of software assemblies
CN110119601B (en) Program reinforcing method and device based on application program installation package
CN110363572B (en) Program channel popularization method and device for closed ecological terminal and electronic equipment
CN110597496B (en) Method and device for acquiring bytecode file of application program
CN112416395A (en) Hot repair updating method and device
CN113568867A (en) File encryption migration method and device and electronic equipment
US11496304B2 (en) Information processing device, information processing method, and storage medium
CN114924742A (en) Hot patch making and applying method and device for virtual machine simulation software
CN116249980A (en) Software access through heterogeneous encryption
CN113742340A (en) Database table processing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination