Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File encryption method and electronic device

An electronic device and file encryption technology, which is applied in the electronic field, can solve the problems of low encryption security, long time-consuming encryption, and low efficiency, so as to increase the difficulty of decryption, improve encryption efficiency, and ensure security.

Active Publication Date: 2016-01-20
BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
View PDF8 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the file is large, the encryption takes too long and the efficiency is very low
In addition, the existing technology uses a fixed key, as long as the fixed key is cracked, the file content can be obtained, and the encryption security is very low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method and electronic device
  • File encryption method and electronic device
  • File encryption method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] In an embodiment of the present invention, a file encryption method is provided, and the method is applied to a first electronic device. The first electronic device involved in the present invention includes various types of computers (such as desktop computers, notebook computers, tablet computers, all-in-one computers, etc.) ), mobile terminals (such as smart phones) and other devices with data processing functions.

[0055] See below figure 1 , which is an implementation flowchart of the file encryption method in the embodiment of the present invention, the method specifically includes:

[0056] Step S1, the first electronic device randomly divides the file to be encrypted into at least two data blocks.

[0057] Specifically, the files to be encrypted involved in the present invention may include various types of data files (such as documents, pictures, audio, video, etc.) or folders.

[0058]Before dividing the data blocks, a strategy analysis may be performed on ...

Embodiment 2

[0132] Embodiment 2: In the embodiment of the present invention, an electronic device is provided, please refer to image 3 , the electronic device includes: a division module 31 , an encryption module 32 , a first generation module 33 , and a key store 34 .

[0133] The division module 31 is used to divide the file to be encrypted randomly into at least two data blocks; the data block stores its own start position and end position in the file to be encrypted.

[0134] The encryption module 32 is used to randomly select all or part of the data blocks, and randomly selects an encryption key for each data block from the key storehouse 34 to encrypt to obtain an encrypted block; the initial block of the corresponding data block is stored in the encrypted block. position and end position.

[0135] The first generating module 33 is configured to generate an encrypted file according to the start position and end position of the data block and / or the encrypted block.

[0136] Furth...

Embodiment 3

[0151] In an embodiment of the present invention, a decryption method is provided, and the method is applied in a second electronic device, and the second electronic device involved in the present invention includes various types of computers (such as desktop computers, notebook computers, tablet computers, all-in-one computers) , mobile terminals (such as smart phones) and other devices with data processing functions.

[0152] See below Figure 4 , is a flowchart of a file decryption method in an embodiment of the present invention, including:

[0153] Step 1, the second electronic device receives the encrypted file sent by the first electronic device.

[0154] Specifically, the encrypted file is an encrypted file obtained by using the file encryption method described in Embodiment 1.

[0155] And because the first electronic device may be maliciously intercepted by other electronic devices when transmitting the encrypted file to the second electronic device, and the encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a file encryption method and an electronic device. The method comprises: after determining a to-be-encrypted file, randomly dividing the to-be-encrypted file into at least two data blocks; then randomly selecting all or a part of the data blocks, and randomly selecting one encryption key from a key library for each data block to perform encryption to obtain an encrypted block; and then generating an encrypted file according to starting locations and ending locations of the data blocks and / or the encrypted blocks. According to the file encryption method and the electronic device provided by the present invention, the whole to-be-encrypted file is divided, thereby increasing the encryption efficiency; and during encryption, selection of the data blocks and selection of the encryption key are both random, so that the secrecy of the encrypted file is improved, the decryption difficulty is increased, and the security of the encrypted file is ensured.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a file encryption method and electronic equipment. Background technique [0002] With the continuous development of science and technology, electronic technology has also developed rapidly, and there are more and more types of electronic products, and people have also enjoyed various conveniences brought by the development of science and technology. Now people can enjoy the comfortable life brought by the development of science and technology through various types of electronic devices. [0003] For example, if user A needs to send an important data file to user B, user A can control electronic device 1 to send the data file to user B, and user B can receive the data file through electronic device 2 . [0004] In order to ensure the security and confidentiality of the file, user A can manipulate the electronic device 1 to encrypt the data file, and then transmit the encrypte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F21/606G06F2221/2107
Inventor 杨乐
Owner BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products