[go: up one dir, main page]

CN111581647B - File encryption and decryption method and device - Google Patents

File encryption and decryption method and device Download PDF

Info

Publication number
CN111581647B
CN111581647B CN201910118038.1A CN201910118038A CN111581647B CN 111581647 B CN111581647 B CN 111581647B CN 201910118038 A CN201910118038 A CN 201910118038A CN 111581647 B CN111581647 B CN 111581647B
Authority
CN
China
Prior art keywords
file
folder
target
specified
directory entry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910118038.1A
Other languages
Chinese (zh)
Other versions
CN111581647A (en
Inventor
刘轩
孙承华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Hikstorage Technology Co ltd
Original Assignee
Wuhan Hikstorage Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Hikstorage Technology Co ltd filed Critical Wuhan Hikstorage Technology Co ltd
Priority to CN201910118038.1A priority Critical patent/CN111581647B/en
Publication of CN111581647A publication Critical patent/CN111581647A/en
Application granted granted Critical
Publication of CN111581647B publication Critical patent/CN111581647B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a file encryption and decryption method and device, wherein the file encryption method is applied to electronic equipment and comprises the following steps: when a target file in the equipment is required to be encrypted, creating a designated folder in the equipment, wherein the designated folder is a folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the equipment as an unnamed null value; and moving the target file from the current position to the specified folder, and encrypting the moved target file. The problem that the encrypted file is deleted by the user by mistake is avoided, and the safety of the file is improved.

Description

File encryption and decryption method and device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for encrypting and decrypting a file.
Background
The secure storage of the file plays an important role in the office and other scenes, and when the file is stored in the device, the file needs to be encrypted in order to ensure that the file can only be opened by an authorized user.
In the related file encryption mode, only the files on the disk are encrypted through an encryption algorithm, and when a user opens a previous folder of the encrypted files in a file browser, the encrypted files are visible to the user and can be deleted by mistake, so that the files are lost, and therefore the safety performance of the files encrypted in the mode is not high enough.
Disclosure of Invention
In view of this, the invention provides a method and a device for encrypting and decrypting files, which avoid the problem that the encrypted files are deleted by users by mistake and are beneficial to improving the security of the files.
The first aspect of the present invention provides a file encryption method, applied to an electronic device, including:
when a target file in the equipment is required to be encrypted, creating a designated folder in the equipment, wherein the designated folder is a folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the equipment as an unnamed null value;
and moving the target file from the current position to the specified folder, and encrypting the moved target file.
According to one embodiment of the present invention, the creating a specified folder in the present device includes:
creating a folder with a designated name in the device;
searching a directory entry corresponding to the appointed name in the file directory, and modifying the appointed name in the searched directory entry into an unnamed null value;
and determining the folder corresponding to the modified directory entry as the specified folder, and recording marking information for marking the specified folder in the directory entry.
According to one embodiment of the present invention, before creating the specified folder in the present device, the method further comprises: judging whether the specified folder exists in the equipment or not;
the creating the specified folder in the device comprises: when the judgment result is that the specified folder does not exist in the equipment, creating the specified folder in the equipment;
the method still further comprises:
and when the judgment result shows that the specified folder exists in the device, moving the target file from the current position to the specified folder, and encrypting the moved target file.
According to one embodiment of the present invention, the determining whether the specified folder exists in the device includes:
judging whether a target directory entry recorded with marking information for marking a specified folder exists in the file directory;
if yes, determining that the specified folder exists in the device, and determining the folder corresponding to the target directory entry as the specified folder.
According to one embodiment of the present invention, encrypting the moved target file includes:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a catalog item corresponding to the target file;
The ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
According to one embodiment of the present invention, after encrypting the moved target file, the method further includes:
and encrypting the directory entry corresponding to the target file.
A second aspect of the present invention provides a file decrypting method, applied to an electronic device, including:
when a target file needs to be decrypted, a designated directory entry is searched out from a file directory of a file system applied by the equipment;
positioning the target file in the specified folder according to the specified directory entry and decrypting the target file; the designated folder is a folder with name attribute of a corresponding directory entry in the file directory being a null value which is not named;
and moving the decrypted target file from the specified folder to a specified position.
According to an embodiment of the present invention, the specified directory entry is a directory entry in which the marking information for marking the specified folder is recorded in the file directory.
According to one embodiment of the present invention, the specified directory entry has associated information of the encrypted directory entry recorded therein;
positioning the target file in the specified folder according to the specified directory entry, including:
determining an encrypted directory entry in the file directory according to the associated information recorded in the designated directory entry, and decrypting the encrypted directory entry;
and determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
According to one embodiment of the invention, decrypting the target file includes:
acquiring an encryption grade corresponding to the target file, which is recorded in the target directory entry;
determining target data to be decrypted in the target file according to the encryption grade, and decrypting the target data;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
A third aspect of the present invention provides a file encrypting apparatus, applied to an electronic device, comprising:
the file folder creation module is used for creating a specified file folder in the equipment when the target file in the equipment is required to be encrypted, wherein the specified file folder is a file folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the equipment, which is an unnamed null value;
and the first mobile encryption module is used for moving the target file from the current position to the specified folder and encrypting the moved target file.
According to one embodiment of the invention, the folder creation module includes:
a folder creation unit for creating a folder of a specified name in the present apparatus;
a catalog item modifying unit, configured to find a catalog item corresponding to the specified name in the file catalog, and modify the specified name in the found catalog item to represent an unnamed null value;
and a determining and marking unit, configured to determine the folder corresponding to the modified directory entry as the specified folder, and record marking information for marking the specified folder in the directory entry.
According to one embodiment of the present invention, before the folder creation module, the apparatus further includes: the judging module is used for judging whether the specified folder exists in the equipment or not;
the folder creation module is further configured to: when the judgment result is that the specified folder does not exist in the equipment, creating the specified folder in the equipment;
the apparatus further comprises:
and the second mobile encryption module is used for moving the target file from the current position to the specified folder if yes, and encrypting the moved target file.
According to one embodiment of the present invention, the judging module includes:
a judging unit configured to judge whether or not there is a target directory entry in the file directory in which the mark information for marking the specified folder is recorded;
and the folder determining unit is used for determining that the specified folder exists in the equipment if the specified folder exists in the equipment, and determining the folder corresponding to the target directory entry as the specified folder.
According to an embodiment of the present invention, when the first mobile encryption module or the second mobile encryption module encrypts the moved target file, the first mobile encryption module or the second mobile encryption module is specifically configured to:
Encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a catalog item corresponding to the target file;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
According to one embodiment of the invention, after the first mobile encryption module or the second mobile encryption module, the apparatus further comprises:
and the catalog item encryption module is used for encrypting the catalog item corresponding to the target file.
A fourth aspect of the present invention provides a file decrypting apparatus, applied to an electronic device, comprising:
the directory entry searching module is used for searching a specified directory entry from a file directory of a file system applied by the equipment when the target file needs to be decrypted;
the file positioning decryption module is used for positioning the target file in the specified folder according to the specified directory entry and decrypting the target file; the designated folder is a folder with name attribute of a corresponding directory entry in the file directory being a null value which is not named;
And the file moving module is used for moving the decrypted target file from the specified folder to a specified position.
According to an embodiment of the present invention, the specified directory entry is a directory entry in which the marking information for marking the specified folder is recorded in the file directory.
According to one embodiment of the present invention, the specified directory entry has associated information of the encrypted directory entry recorded therein;
the file positioning decryption module comprises:
a directory entry decryption unit configured to determine an encrypted directory entry in the file directory according to the association information recorded in the specified directory entry, and decrypt the encrypted directory entry;
and the target file positioning unit is used for determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to the storage path recorded in the target directory entry.
According to one embodiment of the present invention, the file location decryption module further includes:
an encryption grade obtaining unit, configured to obtain an encryption grade corresponding to the target file, where the encryption grade is recorded in the target directory entry;
the hierarchical decryption unit is used for determining target data to be decrypted in the target file according to the encryption grade and decrypting the target data;
The ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
A fifth aspect of the present invention provides an electronic device, including a processor and a memory; the memory stores a program that can be called by the processor; when the processor executes the program, the file encryption method or the file decryption method according to the foregoing embodiment is implemented.
A sixth aspect of the present invention provides a machine-readable storage medium having stored thereon a program which, when executed by a processor, implements a file encryption method, or a file decryption method, as described in the foregoing embodiments.
The embodiment of the invention has the beneficial effects that:
in the embodiment of the invention, the target file to be encrypted is moved to the designated folder, the encrypted target file is positioned in the designated folder, and the designated folder cannot be operated by a user because the name attribute of the directory entry corresponding to the designated folder is a null value which indicates unnamed, the encrypted target file is hidden in the designated folder for the user and cannot be operated for the user, so that the problem that the encrypted file is deleted by the user by mistake is avoided, and the safety of the file is improved.
Drawings
FIG. 1 is a flowchart of a file encryption method according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating a file encrypting apparatus according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for decrypting a file according to an embodiment of the present invention;
FIG. 4 is a block diagram illustrating a file decrypting apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of an electronic device according to an embodiment of the invention.
Description of the embodiments
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the accompanying claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the invention. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In order to make the description of the present invention clearer and more concise, some technical terms of the present invention are explained below:
FAT file system: microsoft is a generic name of a file system used in Dos (Disk Operation System, disk operating system) and Windows series operating system, and FAT12, FAT16, and FAT32 are FAT file systems.
FAT32: the partition format adopts a 32-bit file allocation table, so that the management capacity of the partition format to a disk is greatly enhanced, and the limit of FAT16 on the capacity of each partition which is only 2GB is broken through.
AES: advanced encryption standard (Advanced Encryption Standard, abbreviated AES), also known in cryptography as Rijndael encryption.
The first aspect of the invention provides a file encryption method. The file encryption method according to the embodiment of the present invention is described in more detail below, but is not limited thereto.
In one embodiment, referring to fig. 1, the file encryption method is applied to an electronic device, the method comprising the steps of:
s100: when a target file in the equipment is required to be encrypted, creating a designated folder in the equipment, wherein the designated folder is a folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the equipment as an unnamed null value;
s200: and moving the target file from the current position to the specified folder, and encrypting the moved target file.
In the embodiment of the present invention, the execution subject of the file encryption method may be an electronic device (hereinafter, the "present device" refers to the execution subject of the file encryption method), and the electronic device may be a computer device with an operating system and a file system. The operating system in the electronic device may be, for example, a windows system, but may also be other operating systems such as a DOS system.
In step S100, when the target file in the device needs to be encrypted, a designated folder is created in the device, where the designated folder is a folder with a name attribute of a corresponding directory entry in a file directory of a file system to which the device is applied, and the name attribute is a null value indicating unnamed.
The electronic device may determine that the target file in the device needs to be encrypted when receiving the instruction indicating encryption. The instruction can be triggered by the outside, and after the electronic equipment acquires the instruction triggered by the outside, the instruction can be analyzed to identify the content indicated by the instruction.
The designated folder is a folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the electronic equipment as an unnamed null value. In other words, the specified folder is a folder without a name in the present apparatus, and such a folder is not operable by the user, and the operation includes opening, deletion, and the like, i.e., the user cannot open, delete the specified folder in the file browser. The electronic device can operate the specified folder by operating the directory entry when executing the file encryption method according to the embodiment of the invention.
The file system to which the electronic device is applied is preferably FAT32, but may be FAT16 or the like. The device can modify the name attribute in the directory entry corresponding to the folder through the operating system, and the folder without the name cannot be deleted or opened by a user in the operating system, such as a windows system. To avoid derailing the operating system, the designated folders should not be system folders.
In step S200, the target file is moved from the current position to the designated folder, and the moved target file is encrypted.
The target file may be moved from the current location into the specified folder by changing the storage path of the target file in the directory entry. When moving, the operating system of the electronic device associates the directory entry corresponding to the target file in the file directory (abbreviated as a first directory entry) with the directory entry corresponding to the specified folder (abbreviated as a second directory entry). The target file and the designated folder before movement can be located on one disk partition or on different disk partitions.
If the target file before moving and the designated folder are located on a disk partition, the first directory entry and the second directory entry are located in the same file directory before and after moving, but before moving, the first directory entry is not associated with the second directory entry, and after moving, the first directory entry is associated with the second directory entry.
If the target file before moving and the specified folder are not located on the same disk partition, before moving, the first directory entry and the second directory entry are recorded in different file directories (the file directory where the first directory entry is located is simply referred to as a first file directory, the file directory where the second directory entry is located is simply referred to as a second file directory), after moving, the first directory entry may be deleted from the first file directory, the first directory entry may be added to the second file directory, and the first directory entry may be associated with the second directory entry.
The association manner is that, for example, the file name of the target file and the position information of the corresponding directory entry in the file directory are recorded in the second directory entry. After association, when searching the target file, the file name of the target file can be searched in the second directory entry, and the first directory entry is determined in the file directory according to the position information corresponding to the searched file name. For another example, by establishing a parent-child relationship, the first directory entry is used as a subdirectory entry of the second directory entry, and the specific association mode is dependent on a file system adopted by the electronic device.
The moved target file and the designated folder are located on a disk partition, and the target file is located in the designated folder. Since the designated folder is not operable by the user, the target file is not visible to the user, and further manipulation of the target file is only possible by moving the target file from the designated folder to the named folder.
The manner of encrypting the moved target file is not limited. Such as: and acquiring an encryption algorithm according to the instruction indicating encryption, and encrypting the target file by utilizing the encryption algorithm according to the encryption key carried in the instruction. The key, encryption level, and the like required for encrypting the target file may be carried in the instruction indicating encryption. The encryption algorithm may be, for example, an AES encryption algorithm, but may be other file encryption algorithms, and is not particularly limited.
In the embodiment of the invention, the target file to be encrypted is moved to the designated folder, the encrypted target file is positioned in the designated folder, and the designated folder cannot be operated by a user because the name attribute of the directory entry corresponding to the designated folder is a null value which indicates unnamed, the encrypted target file is hidden in the designated folder for the user and cannot be operated for the user, so that the problem that the encrypted file is deleted by the user by mistake is avoided, and the safety of the file is improved.
In addition, in the related file encryption mode, because the user can see the encrypted file, the encrypted file may be deleted by human error, in order to solve the problem of the deleted file, a solution is provided at present, specifically, the disk is divided into an encrypted disk partition and an unencrypted disk partition, the whole encrypted disk partition is encrypted during encryption, once the partition is set as the encrypted disk partition, the encrypted disk partition can only store encrypted data but not normal data, and space waste is caused.
In the embodiment of the invention, the encryption object is the target file, and is not the whole disk partition, so that the situation that the whole disk partition can only store the encryption data but can not store the common data is avoided, and the space waste is avoided under the condition that the encryption file is prevented from being deleted by mistake.
In one embodiment, the above-mentioned file encryption method flow may be performed by a file encryption device, as shown in fig. 2, where the file encryption device 100 mainly includes 2 modules: the folder creation module 101, the first mobile encryption module 102. The folder creation module 101 is configured to perform the above step S100, and the first mobile encryption module 102 is configured to perform the above step S200.
In one embodiment, in step S100, the creating a designated folder in the present device may include the following steps:
s101: creating a folder with a designated name in the device;
s102: searching a directory entry corresponding to the appointed name in the file directory, and modifying the appointed name in the searched directory entry into an unnamed null value;
s103: and determining the folder corresponding to the modified directory entry as the specified folder, and recording marking information for marking the specified folder in the directory entry.
In step S101, after creating a folder with a specified name in the electronic device, the operating system of the electronic device adds a directory entry corresponding to the folder in the file directory, where the name attribute in the directory entry is the specified name, so that the operating system can find the corresponding directory entry in the file directory according to the specified name.
The designation name is not particularly limited as long as it is ensured that the file or folder under the same folder is not renamed. The file directory is a data structure for recording directory entries of respective files in a file system to which the present apparatus is applied. Each directory entry may record the name, storage address, etc. of the corresponding file or folder as an index of the corresponding file or folder.
In step S102, the directory entry corresponding to the specified name is searched in the file directory, the specified name in the searched directory entry is modified to be a null value indicating unnamed, and after the name attribute is modified, the folder becomes an unnamed folder, which is not operable by the user.
In step S103, the folder corresponding to the modified directory entry is determined as the specified folder, that is, the unnamed folder is determined as a specified folder that cannot be operated by the user. Meanwhile, the marking information for marking the specified folder is recorded in the directory entry corresponding to the specified folder, so that the specified folder can be distinguished from other unnamed folders or files on the one hand, and on the other hand, the specified folder can be searched through the marking information. The tag information may be recorded in a system reserved bit (e.g., a position with an offset of 0x0c in the directory entry) of the directory entry corresponding to the specified folder, which is not particularly limited.
In one embodiment, before creating the specified folder in the device, the method further comprises: judging whether the specified folder exists in the equipment or not;
the creating the specified folder in the device comprises: when the judgment result is that the specified folder does not exist in the equipment, creating the specified folder in the equipment;
the method still further comprises:
and when the judgment result shows that the specified folder exists in the device, moving the target file from the current position to the specified folder, and encrypting the moved target file.
The specified folder can store a plurality of files, so that when the target file in the electronic equipment needs to be encrypted each time, whether the specified folder exists in the electronic equipment or not can be judged first, and more particularly whether the specified folder exists on a magnetic disk of the electronic equipment or not is judged. When a file is encrypted for the first time or when a previous designated folder is deleted by the system, no designated folder is available in the electronic device for storing the target file that cannot be operated by the user.
If the specified folder does not exist in the electronic device, the specified folder needs to be created, that is, the step of creating the specified folder in the device in step S100 is performed, after the specified folder is created, the target file is moved from the current position to the specified folder, and the moved target file is encrypted.
If the designated folder exists in the electronic device, the target file may be directly moved to the designated folder, and the moved target file may be encrypted, and the moving and encrypting of the target file may refer to the description related to step S200, which is not repeated herein.
Further, the determining whether the specified folder exists in the device includes the following steps:
judging whether a target directory entry recorded with marking information for marking a specified folder exists in the file directory;
if yes, determining that the specified folder exists in the device, and determining the folder corresponding to the target directory entry as the specified folder.
If the name attribute in the directory entry corresponding to the specified folder is null, that is, the specified folder is a folder without a name, then the target directory entry corresponding to the specified folder cannot be searched in the file directory according to the name. In this embodiment, the directory entry corresponding to the specified folder has the flag information for marking the specified folder recorded therein, and thus the target directory entry can be determined according to whether the flag information exists in the file directory.
The method comprises the steps that marking information can be searched in a file directory, if the marking information is searched, it is determined that a target directory entry recorded with marking information for marking a specified folder exists in the file directory, the directory entry where the marking information is located is the target directory entry, and accordingly the specified folder exists in the device; if not, determining that the target directory entry recorded with the marking information for marking the specified folder does not exist in the file directory, and correspondingly, the equipment does not exist the specified folder.
When determining that a target directory entry recorded with marking information for marking a specified folder exists in a file directory, the searched directory entry with the marking information is the target directory entry, a file corresponding to the target directory entry is the specified folder, and the folder corresponding to the target directory entry is determined to be the specified folder.
In one embodiment, encrypting the moved target file includes:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a catalog item corresponding to the target file;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
Encrypting the target file that is moved into the specified folder, whether the specified folder is currently created or previously created, can be accomplished in the manner described above.
When the target file is too large, if all the data in the target file is encrypted, the encryption time may be very long. In order to improve the encryption speed, in this embodiment, different encryption strategies may be selected according to different encryption levels, and when the data of the target file is large, part of the data may be selected from all the data of the target file as the target data to encrypt, so that the security of the target file may be ensured.
The higher the encryption level, i.e., the greater N, the faster the encryption speed. Taking the encryption grade as three grades for illustration, the first-grade encryption grade is used for encrypting all data, namely N=1, and the target data is all data in the target file; the second-stage encryption grade is half data encryption, which can be parity encryption, namely, when N=2 is encrypted, the first data block is encrypted, the second data block is not encrypted, and the third data block is encrypted, so that the encryption of target data is alternately realized, and M is half of the total number of data blocks divided by all data or a value obtained by rounding up half of the total number of data blocks; the third-level encryption grade is one third of data encryption, the first data block is encrypted, the second data block and the third data block are not encrypted, the fourth data block is encrypted, encryption of target data is alternately realized, and M is one third of the total number of data blocks divided by all data or one third of values obtained by rounding upwards. The encryption algorithm that encrypts the target data may be an AES encryption algorithm.
After encrypting the target data, the encryption level may be recorded in a directory entry corresponding to the target file. When decrypting the target file, the encryption grade can be obtained from the catalog item corresponding to the target file, and the target data to be decrypted is determined according to the encryption grade, so that the target file is decrypted.
In one embodiment, after encrypting the moved target file, the method further comprises:
and encrypting the directory entry corresponding to the target file.
In order to improve the security of the encrypted file, it is necessary to ensure that the file name, creation time, storage position of the encrypted file and other information of the file are not acquired by outsiders, and encrypt the directory entry corresponding to the encrypted file. The manner in which the directory entries are encrypted is not limited and may depend on the particular file system.
Taking FAT32 as an example, the directory entries of FAT32 mainly include a short file name directory entry and a long file name directory entry. When the name length of a file exceeds 8 characters, a long file name directory entry is used to record the file name. The short filename directory entry mainly includes information such as a file name of a file (when the name of the file is recorded using the long filename directory entry, a partial field of the file name is recorded in the short filename directory entry), creation time, file size, file storage address, and the like, and the long filename directory entry mainly records the file name of the file. Both the short filename directory entry and the long filename directory entry corresponding to the target file may be encrypted, or only the short filename directory entry corresponding to the target file may be encrypted. Encryption of the directory entry may employ, for example, the AES encryption algorithm, and the encryption speed is fast since the directory entry has only 32 bytes in total.
The second aspect of the invention also provides a file decryption method. The file decryption method according to the embodiment of the present invention is described in more detail below, but is not limited thereto.
In one embodiment, referring to fig. 3, a file decryption method is applied to an electronic device, which may include the steps of:
t100: when a target file needs to be decrypted, a designated directory entry is searched out from a file directory of a file system applied by the equipment;
t200: positioning the target file in the specified folder according to the specified directory entry and decrypting the target file; the designated folder is a folder with name attribute of a corresponding directory entry in the file directory being a null value which is not named;
t300: and moving the decrypted target file from the specified folder to a specified position.
The electronic device to which the file decryption method of the embodiment of the present invention is applied may refer to the description related to the electronic device in the foregoing embodiment, and will not be described herein.
In step T100, the electronic device may determine that the target file in the device needs to be decrypted when receiving the instruction for instructing decryption. The instruction can be triggered by the outside, and after the electronic equipment acquires the instruction triggered by the outside, the instruction can be analyzed to identify the content indicated by the instruction.
When the instruction indicates that decryption is required, the target file is in the specified folder, and the user cannot directly operate the target file, and the target file can be repositioned by finding the directory entry corresponding to the specified folder, namely the specified directory entry in the embodiment, so that the target file can be operated through the operating system.
In step T200, after the directory entry of the specified file is found, the target file in the specified folder is located according to the specified directory entry.
The designated folder is a folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the electronic equipment as an unnamed null value. In other words, the specified folder is a folder without a name in the present apparatus, and such a folder user is not operable. The operation includes opening, deleting, etc., i.e., the user cannot open, delete, etc., the designated folder. Of course, the operating system of the electronic device is operable with the specified folder, which may be operated by the operating system.
After locating the target file, the electronic device may decrypt the target file first, where the decryption mode corresponds to the encryption mode of the target file, and the decryption mode may be determined according to the instruction, and the specific decryption mode is not limited, for example, an AES decryption algorithm.
In step T300, the decrypted target file is moved from the specified folder to a specified location. The decrypted target file can be moved from the designated folder to the folder which can be operated by the user, namely, the designated position is the folder which can be operated by the user, and the name attribute in the directory entry corresponding to the folder which can be operated by the user is a named non-null value, so that the user can operate the target file after opening the folder in the file browser.
In the embodiment of the invention, the encrypted target file is in the appointed folder, and the name attribute of the directory entry corresponding to the appointed folder is an unnamed null value, so that the appointed folder can not be operated by a user, the encrypted target file is hidden in the appointed folder for the user, and can not be seen or operated by the user, thereby avoiding the problem that the encrypted file is deleted by the user by mistake, and being beneficial to improving the safety of the file; when decrypting, after finding the target file and decrypting it, moving the target file from the specified folder to the specified position, and the user can operate the target file in the specified position.
In one embodiment, the above-mentioned file decryption method flow may be performed by a file decryption device, as shown in fig. 4, the file decryption device 200 mainly includes 3 modules: a directory entry lookup module 201, a file location decryption module 202 and a file movement module 203. The directory entry searching module 201 is configured to perform the above step T100, the file location decrypting module 202 is configured to perform the above step T200, and the file moving module 203 is configured to perform the above step T300.
In one embodiment, the specified directory entry is a directory entry in which the marking information for marking the specified folder is recorded in the file directory.
The appointed directory entry is the directory entry corresponding to the appointed folder in the file directory. The index information for marking the appointed folder is recorded in the catalog item corresponding to the appointed folder, so that the appointed folder can be distinguished from other unnamed folders or files on the one hand, and on the other hand, the appointed folder can be searched through the index information. The tag information may be recorded in a system reserved bit (e.g., a position with an offset of 0x0c in the directory entry) of the directory entry corresponding to the specified folder, which is not particularly limited. When searching, the directory entry with the marked information is searched, and the directory entry can be determined to be the designated directory entry.
In one embodiment, the specified directory entry has associated information of the encrypted directory entry recorded therein;
in step T200, locating the target file in the specified folder according to the specified directory entry in the device may include the following steps:
t201: determining an encrypted directory entry in the file directory according to the associated information recorded in the designated directory entry, and decrypting the encrypted directory entry;
t202: and determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
In order to improve the security of the encrypted file, ensure that the file name, creation time, storage position of the encrypted file and other information are not acquired by outsiders, it is necessary to encrypt the directory entry corresponding to the encrypted file, and correspondingly, when the encrypted directory entry is found, the directory entry needs to be decrypted, and the decryption algorithm corresponds to the encryption algorithm of the directory entry, for example, the AES decryption algorithm is adopted to decrypt the directory entry.
Since the specified folder may store a plurality of files, there may be a plurality of searched directory entries, and correspondingly, there may be a plurality of decrypted directory entries, and since the directory entries are decrypted, a target directory entry corresponding to the target file may be determined from the decrypted directory entries according to the file name of the target file, and the storage path of the target file is recorded in the target directory entry, thereby locating the target file.
In one embodiment, in step T200, decrypting the target file may include the steps of:
t203: acquiring an encryption grade corresponding to the target file, which is recorded in the target directory entry;
t204: determining target data to be decrypted in the target file according to the encryption grade, and decrypting the target data;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
The target directory entry records the encryption level required for encrypting the target file, and the decryption mode corresponding to the encryption mode can be determined according to the encryption level, so that the correct target data can be found for decryption. Specifically, taking parity encryption as an example, the data blocks with odd orders of the first block, the third block, the fifth block and the like are decrypted, and the adopted decryption algorithm corresponds to an encryption algorithm, such as an AES decryption algorithm.
The content of the file decryption method in the embodiment of the present invention that is the same as or similar to the file encryption method can be referred to the related description in the file encryption method in the foregoing embodiment, and will not be repeated here.
A third aspect of the present invention provides a file encrypting apparatus, which is applied to an electronic device, referring to fig. 2, the file encrypting apparatus 100 comprising:
the folder creation module 101 is configured to create, in the device, a designated folder when the target file in the device needs to be encrypted, where the designated folder is a folder in which a name attribute of a corresponding directory entry in a file directory of a file system to which the device is applied is a null value that indicates unnamed;
the first mobile encryption module 102 is configured to move the target file from a current location to the specified folder, and encrypt the moved target file.
In one embodiment, the folder creation module includes:
a folder creation unit for creating a folder of a specified name in the present apparatus;
a catalog item modifying unit, configured to find a catalog item corresponding to the specified name in the file catalog, and modify the specified name in the found catalog item to represent an unnamed null value;
and a determining and marking unit, configured to determine the folder corresponding to the modified directory entry as the specified folder, and record marking information for marking the specified folder in the directory entry.
In one embodiment, before the folder creation module, the apparatus further comprises: the judging module is used for judging whether the specified folder exists in the equipment or not;
the folder creation module is further configured to: when the judgment result is that the specified folder does not exist in the equipment, creating the specified folder in the equipment;
the apparatus further comprises:
and the second mobile encryption module is used for moving the target file from the current position to the specified folder if yes, and encrypting the moved target file.
In one embodiment, the judging module includes:
a judging unit configured to judge whether or not there is a target directory entry in the file directory in which the mark information for marking the specified folder is recorded;
and the folder determining unit is used for determining that the specified folder exists in the equipment if the specified folder exists in the equipment, and determining the folder corresponding to the target directory entry as the specified folder.
In one embodiment, when the first mobile encryption module or the second mobile encryption module encrypts the moved target file, the method is specifically used for:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a catalog item corresponding to the target file;
The ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
In one embodiment, after the first mobile encryption module or the second mobile encryption module, the apparatus further comprises:
and the catalog item encryption module is used for encrypting the catalog item corresponding to the target file.
The implementation process of the functions and roles of each unit in the file encryption device is specifically shown in the implementation process of the corresponding steps in the file encryption method, and will not be described herein.
A fourth aspect of the present invention provides a file decrypting apparatus applied to an electronic device, referring to fig. 4, the file decrypting apparatus 200 comprising:
a directory entry searching module 201, configured to search, when a target file needs to be decrypted, a specified directory entry from a file directory of a file system to which the device is applied;
a file positioning and decrypting module 202, configured to position the target file in the specified folder according to the specified directory entry, and decrypt the target file; the designated folder is a folder with name attribute of a corresponding directory entry in the file directory being a null value which is not named;
And the file moving module 203 is configured to move the decrypted target file from the specified folder to a specified location.
In one embodiment, the specified directory entry is a directory entry in which the marking information for marking the specified folder is recorded in the file directory.
In one embodiment, the specified directory entry has associated information of the encrypted directory entry recorded therein;
the file positioning decryption module comprises:
a directory entry decryption unit configured to determine an encrypted directory entry in the file directory according to the association information recorded in the specified directory entry, and decrypt the encrypted directory entry;
and the target file positioning unit is used for determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to the storage path recorded in the target directory entry.
In one embodiment, the file location decryption module further includes:
an encryption grade obtaining unit, configured to obtain an encryption grade corresponding to the target file, where the encryption grade is recorded in the target directory entry;
the hierarchical decryption unit is used for determining target data to be decrypted in the target file according to the encryption grade and decrypting the target data;
The ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
The implementation process of the functions and roles of each unit in the file decryption device is specifically shown in the implementation process of the corresponding steps in the file decryption method, and will not be described herein.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements.
The invention also provides an electronic device, which comprises a processor and a memory; the memory stores a program that can be called by the processor; wherein the processor implements the file encryption method or the file decryption method as described in the foregoing embodiments when executing the program.
The embodiment of the file encrypting device or the file decrypting device can be applied to the electronic equipment. Taking software implementation as an example, the device in a logic sense is formed by reading corresponding computer program instructions in a nonvolatile memory into a memory by a processor of an electronic device where the device is located for operation. In terms of hardware, as shown in fig. 5, fig. 5 is a hardware structure diagram of an electronic device where the file encryption apparatus 100 according to an exemplary embodiment of the present invention is located, and in addition to the processor 510, the memory 530, the interface 520, and the nonvolatile storage 540 shown in fig. 5, the electronic device where the apparatus 100 is located in the embodiment may further include other hardware according to the actual functions of the electronic device, which will not be described herein.
The present invention also provides a machine-readable storage medium having stored thereon a program which, when executed by a processor, implements a file encryption method, or a file decryption method, as described in the foregoing embodiments.
The present invention may take the form of a computer program product embodied on one or more storage media (including, but not limited to, magnetic disk storage, CD-ROM, optical storage, etc.) having program code embodied therein. Machine-readable storage media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of machine-readable storage media include, but are not limited to: phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by the computing device.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather to enable any modification, equivalent replacement, improvement or the like to be made within the spirit and principles of the invention.

Claims (20)

1. A method for encrypting a file, the method comprising:
when a target file in the equipment is required to be encrypted, creating a designated folder in the equipment, wherein the designated folder is a folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the equipment as an unnamed null value, and the target file in the equipment is required to be encrypted after receiving an instruction for indicating encryption;
and moving the target file from the current position to the specified folder through an operating system of the electronic equipment, and encrypting the moved target file.
2. The file encryption method according to claim 1, wherein creating a specified folder in the present apparatus includes:
creating a folder with a designated name in the device;
searching a directory entry corresponding to the appointed name in the file directory, and modifying the appointed name in the searched directory entry into an unnamed null value;
And determining the folder corresponding to the modified directory entry as the specified folder, and recording marking information for marking the specified folder in the directory entry.
3. The file encryption method according to claim 1, wherein before creating the specified folder in the present apparatus, the method further comprises: judging whether the specified folder exists in the equipment or not;
the creating the specified folder in the device comprises: when the judgment result is that the specified folder does not exist in the equipment, creating the specified folder in the equipment;
the method still further comprises:
and when the judgment result shows that the specified folder exists in the device, moving the target file from the current position to the specified folder, and encrypting the moved target file.
4. The file encryption method according to claim 3, wherein the judging whether the specified folder exists in the device includes:
judging whether a target directory entry recorded with marking information for marking a specified folder exists in the file directory;
if yes, determining that the specified folder exists in the device, and determining the folder corresponding to the target directory entry as the specified folder.
5. A file encrypting method according to claim 1 or 3, wherein encrypting said target file after movement comprises:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a catalog item corresponding to the target file;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
6. A method of encrypting a file as claimed in claim 1 or 3, wherein after encrypting the moved target file, the method further comprises:
and encrypting the directory entry corresponding to the target file.
7. A method for decrypting a file, the method comprising:
when a target file to be decrypted is required, a specified directory entry is found from a file directory of a file system to which the device is applied, the target file to be decrypted is determined after receiving an instruction for indicating decryption, and the target file is obtained by encrypting according to the method of any one of claims 1 to 6;
Positioning the target file in the specified folder according to the specified directory entry by the operating system of the electronic equipment, and decrypting the target file; the designated folder is a folder with name attribute of a corresponding directory entry in the file directory being a null value which is not named;
and moving the decrypted target file from the specified folder to a specified position.
8. The file decrypting method as claimed in claim 7, wherein the specified directory entry is a directory entry in the file directory in which marking information for marking the specified folder is recorded.
9. The file decrypting method as claimed in claim 7, wherein the specified directory entry has associated information of the encrypted directory entry recorded therein;
positioning the target file in the specified folder according to the specified directory entry, including:
determining an encrypted directory entry in the file directory according to the associated information recorded in the designated directory entry, and decrypting the encrypted directory entry;
and determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to a storage path recorded in the target directory entry.
10. The file decrypting method as claimed in claim 9, wherein decrypting the target file comprises:
acquiring an encryption grade corresponding to the target file, which is recorded in the target directory entry;
determining target data to be decrypted in the target file according to the encryption grade, and decrypting the target data;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
11. A file encryption apparatus, characterized by being applied to an electronic device, comprising:
the file folder creation module is used for creating a specified file folder in the equipment when the target file in the equipment is required to be encrypted, wherein the specified file folder is a file folder with name attribute of a corresponding directory entry in a file directory of a file system applied by the equipment as an unnamed null value, and the target file in the equipment is required to be encrypted after an instruction for indicating encryption is received;
The first mobile encryption module is used for moving the target file from the current position to the specified folder through the operating system of the electronic equipment, and encrypting the moved target file.
12. The file encrypting apparatus according to claim 11, wherein said folder creation module comprises:
a folder creation unit for creating a folder of a specified name in the present apparatus;
a catalog item modifying unit, configured to find a catalog item corresponding to the specified name in the file catalog, and modify the specified name in the found catalog item to represent an unnamed null value;
and a determining and marking unit, configured to determine the folder corresponding to the modified directory entry as the specified folder, and record marking information for marking the specified folder in the directory entry.
13. The file encryption apparatus of claim 11, wherein prior to the folder creation module, the apparatus further comprises: the judging module is used for judging whether the specified folder exists in the equipment or not;
the folder creation module is further configured to: when the judgment result is that the specified folder does not exist in the equipment, creating the specified folder in the equipment;
The apparatus further comprises:
and the second mobile encryption module is used for moving the target file from the current position to the specified folder if yes, and encrypting the moved target file.
14. The file encrypting apparatus according to claim 13, wherein said judging module comprises:
a judging unit configured to judge whether or not there is a target directory entry in the file directory in which the mark information for marking the specified folder is recorded;
and the folder determining unit is used for determining that the specified folder exists in the equipment if the specified folder exists in the equipment, and determining the folder corresponding to the target directory entry as the specified folder.
15. The file encrypting apparatus according to claim 11 or 13, wherein the first mobile encrypting module or the second mobile encrypting module is specifically configured to:
encrypting the target data in the target file according to the obtained encryption grade, and recording the encryption grade into a catalog item corresponding to the target file;
the ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
16. The file encryption apparatus according to claim 11 or 13, wherein after the first mobile encryption module or the second mobile encryption module, the apparatus further comprises:
and the catalog item encryption module is used for encrypting the catalog item corresponding to the target file.
17. A document decryption apparatus, characterized by being applied to an electronic device, comprising:
a directory entry searching module, configured to search, when a target file to be decrypted is required, a specified directory entry from a file directory of a file system to which the device is applied, where the target file to be decrypted is determined after receiving an instruction indicating decryption, and the target file is obtained by encrypting according to the method according to any one of claims 1 to 6;
the file positioning decryption module is used for positioning the target file in the specified folder according to the specified directory entry by the operating system of the electronic equipment and decrypting the target file; the designated folder is a folder with name attribute of a corresponding directory entry in the file directory being a null value which is not named;
and the file moving module is used for moving the decrypted target file from the specified folder to a specified position.
18. The file decrypting apparatus as claimed in claim 17, wherein the specified directory entry is a directory entry in the file directory in which marking information for marking the specified folder is recorded.
19. The file decrypting apparatus as claimed in claim 17, wherein the specified directory entry has associated information of the encrypted directory entry recorded therein;
the file positioning decryption module comprises:
a directory entry decryption unit configured to determine an encrypted directory entry in the file directory according to the association information recorded in the specified directory entry, and decrypt the encrypted directory entry;
and the target file positioning unit is used for determining a target directory entry corresponding to the target file from the decrypted directory entries, and positioning the target file in the equipment according to the storage path recorded in the target directory entry.
20. The file decryption device according to claim 19, wherein the file location decryption module further comprises:
an encryption grade obtaining unit, configured to obtain an encryption grade corresponding to the target file, where the encryption grade is recorded in the target directory entry;
the hierarchical decryption unit is used for determining target data to be decrypted in the target file according to the encryption grade and decrypting the target data;
The ratio of all data in the target file to the size of the target data is N, wherein N is an integer which corresponds to the encryption level and is greater than or equal to 1, the target data comprises data blocks of data with M block interval specified sizes when N is greater than 1, and M is an integer which is greater than 1.
CN201910118038.1A 2019-02-15 2019-02-15 File encryption and decryption method and device Active CN111581647B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910118038.1A CN111581647B (en) 2019-02-15 2019-02-15 File encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910118038.1A CN111581647B (en) 2019-02-15 2019-02-15 File encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN111581647A CN111581647A (en) 2020-08-25
CN111581647B true CN111581647B (en) 2023-07-25

Family

ID=72111370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910118038.1A Active CN111581647B (en) 2019-02-15 2019-02-15 File encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN111581647B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112306412A (en) * 2020-10-30 2021-02-02 广东小天才科技有限公司 Encryption and decryption method, equipment and medium based on Ubifs system
CN113535278B (en) * 2021-06-15 2024-10-18 深圳市元征科技股份有限公司 Dynamic library calling method and device, electronic equipment and storage medium
CN113672565B (en) * 2021-08-09 2022-08-05 深圳市猿人创新科技有限公司 File marking method and device, electronic equipment and storage medium
US12248597B2 (en) 2021-08-24 2025-03-11 Red Hat, Inc. Encrypted file name metadata in a distributed file system directory entry

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106095871A (en) * 2016-06-06 2016-11-09 无锡天脉聚源传媒科技有限公司 A kind of method and device setting up data base directory structure
CN106295315A (en) * 2015-06-08 2017-01-04 杭州海康威视数字技术股份有限公司 For starting the method and system of electronic equipment
CN106941524A (en) * 2017-03-14 2017-07-11 郑州云海信息技术有限公司 A kind of WEB file configuration methods of HDFS
CN107451244A (en) * 2017-07-27 2017-12-08 广东欧珀移动通信有限公司 File naming method, mobile terminal and computer-readable recording medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005128996A (en) * 2003-09-30 2005-05-19 Dainippon Printing Co Ltd Information processing apparatus and system, and program
US7962755B2 (en) * 2006-04-28 2011-06-14 Ceelox, Inc. System and method for biometrically secured, transparent encryption and decryption
US10049228B2 (en) * 2015-01-20 2018-08-14 Microsoft Technology Licensing, Llc File encryption support for FAT file systems
US9824090B2 (en) * 2015-04-09 2017-11-21 Sophos Limited Emulating transparent file processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295315A (en) * 2015-06-08 2017-01-04 杭州海康威视数字技术股份有限公司 For starting the method and system of electronic equipment
CN106095871A (en) * 2016-06-06 2016-11-09 无锡天脉聚源传媒科技有限公司 A kind of method and device setting up data base directory structure
CN106941524A (en) * 2017-03-14 2017-07-11 郑州云海信息技术有限公司 A kind of WEB file configuration methods of HDFS
CN107451244A (en) * 2017-07-27 2017-12-08 广东欧珀移动通信有限公司 File naming method, mobile terminal and computer-readable recording medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NTFS文件系统文件存贮分析;陶永红;何明;;中国人民公安大学学报(自然科学版)(第03期);全文 *
文件隐藏与加密的简便方法;胡光鲁;;农业网络信息(第06期);全文 *

Also Published As

Publication number Publication date
CN111581647A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN111581647B (en) File encryption and decryption method and device
US10296239B1 (en) Object-based commands with quality of service identifiers
US7949693B1 (en) Log-structured host data storage
US10430398B2 (en) Data storage system having mutable objects incorporating time
US9324361B2 (en) Protecting stored data from traffic analysis
US8913750B2 (en) Method for managing keys and/or rights objects
US20140297603A1 (en) Method and apparatus for deduplication of replicated file
US20080282355A1 (en) Document container data structure and methods thereof
JP2008517354A (en) A computer with a method of building an encrypted database index for database table search
US9749132B1 (en) System and method for secure deletion of data
CN102084376B (en) Content search device
Wani et al. File system anti-forensics–types, techniques and tools
US20130151864A1 (en) Clipboard protection system in drm environment and recording medium in which program for executing method in computer is recorded
CN101310283A (en) Method and system for managing keys and/or rights objects
US10903977B2 (en) Hidden electronic file systems
CN116069729B (en) Intelligent document packaging method, system and medium
KR20080010906A (en) License management method and device
US20150278247A1 (en) Data access system and data access method
GB2373597A (en) Restricted data access
CN111913915B (en) File hiding method and device
JP4807289B2 (en) Information processing apparatus, file processing method, and program
JP2009516961A (en) Method and system for managing key and / or rights objects
JP4537772B2 (en) Disk system
CN112214778A (en) Method and system for realizing discrete encryption of local file through virtual file
JP2006293583A (en) File management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant