Method and device for file encryption and decryption

A file encryption and encryption key technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of cumbersome file encryption and decryption process, achieve simple and fast encryption process, flexible decryption, and reduce the undecryptable The effect of chance

Inactive Publication Date: 2016-10-12
MEIZU TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a method and device for file encryption and decryption to solve the problem of complicated file encryption and decryption processes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for file encryption and decryption
  • Method and device for file encryption and decryption
  • Method and device for file encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] figure 1 For the file decryption method in one embodiment, the method includes:

[0047] Step S110: Receive input decrypted data.

[0048] The user sends an instruction to open the file by clicking on the file at the GUI level, and a key input window is generated according to the instruction, and the decrypted data can be input in the window.

[0049] Step S120: judging whether the content of the target file contains the decrypted data;

[0050] If yes, decrypt the target file.

[0051] The target file can be a word, txt, PDF or audio file, but it is not limited thereto, it can also be o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a file encryption and decryption method and device. The decryption method includes: receiving input decryption data; judging whether the content of the target file contains the decryption data; and if so, decrypting the target file. The encryption method includes: obtaining a target file to be encrypted; receiving an encryption instruction for the target file; generating an encryption key according to the content of the target file; according to the encryption instruction for the target file, using the The encryption key is used to encrypt the target file. Using the above method, the encryption operation is simpler and faster, and the decryption is more flexible. Additionally, a device is provided.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a method and device for encrypting and decrypting files. Background technique [0002] With the continuous development of information technology, the issue of information security has become increasingly prominent. An important part of ensuring information security is to encrypt information. [0003] In traditional technology, the encryption method is generally based on the encrypted information entered by the user combined with the encryption algorithm to encrypt the information to be encrypted. The way the user enters the encrypted information includes keyboard entry, fingerprint entry, gesture entry, voiceprint entry, etc. The entry process is very cumbersome . In addition, if the user forgets to enter the information or the fingerprint, voiceprint and other information changes, it may be necessary to perform very tedious work such as deciphering the password, and even ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/62G06F2221/2107
Inventor 李艳红
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products