CN104182697A - File encryption method and device - Google Patents

File encryption method and device Download PDF

Info

Publication number
CN104182697A
CN104182697A CN201410403711.3A CN201410403711A CN104182697A CN 104182697 A CN104182697 A CN 104182697A CN 201410403711 A CN201410403711 A CN 201410403711A CN 104182697 A CN104182697 A CN 104182697A
Authority
CN
China
Prior art keywords
packet
file
encrypted
encryption key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410403711.3A
Other languages
Chinese (zh)
Other versions
CN104182697B (en
Inventor
王楠
郭涛
余军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410403711.3A priority Critical patent/CN104182697B/en
Publication of CN104182697A publication Critical patent/CN104182697A/en
Application granted granted Critical
Publication of CN104182697B publication Critical patent/CN104182697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a file encryption method and device, and belongs to the technical field of information security. The method comprises the following steps: n data packets corresponding to an object file are received, wherein the data packets are obtained by cutting the object file by file sending terminals, and n is larger than or equal to 2; encryption is conducted on the n data packets through several batches, and the start time of conducting encryption on the data packets is earlier than the finish time of receiving the data packets; data packets subjected to encryption in batches are stored. According to the invention, the received data packets are subjected to encryption in batches, so that the whole object file is not stored in a file receiving terminal under the state that the object file is not encrypted, and the problem that the private file is transmitted completely before encryption is completed to cause the fact that the private file is still in an unencrypted state transiently at the file receiving terminal in the related technology is solved; meanwhile, the effect that after the private file is fully received, the private file is not in the unencrypted state can be achieved, and the security of the private file can be improved.

Description

File encrypting method and device
Technical field
The disclosure relates to field of information security technology, particularly a kind of file encrypting method and device
Background technology
Along with the development of Internet technology, people are also more and more frequent for the application of internet, often need to transmit some files by internet, and wherein some secret file have higher requirement for the confidentiality of file between the user of internet.
In correlation technique, have a kind of time slot scrambling of secret file, file receiving end receives the unencrypted secret file that file transmitting terminal sends, and after secret file receives, uses local key to be encrypted and to preserve to this secret file.
Although said method can be by after receiving at secret file; this secret file is encrypted to protect this secret file with local key; but secret file is unencryption to be sent; thereby before not also being encrypted after end of transmission, secret file still can be in an of short duration unencrypted state in file receiving end.
Summary of the invention
That unencryption sends in order to have solved secret file in correlation technique, thereby before not also being encrypted after end of transmission, or can be at file receiving end the problem in an of short duration unencrypted state, disclosure embodiment provides a kind of file encrypting method, described technical scheme is as follows:
According to the first aspect of disclosure embodiment, a kind of file encrypting method is provided, described method comprises:
Receive n the packet corresponding with file destination, described packet is to obtain after file transmitting terminal cuts described file destination, n >=2;
Divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet;
Each packet after storage is encrypted in batches.
Optionally, describedly divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet, comprising:
Often receive after a packet, described packet is encrypted by encryption key.
Optionally, describedly divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet, comprising:
Often receive after m packet, a described m packet is encrypted by encryption key, n > m >=2.
Optionally, described method, also comprises:
At the discontented m of the still unencrypted packet having received but while including last packet, the described still unencrypted packet having received is encrypted by encryption key.
Optionally, describedly divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet, comprising:
Often receive after 1 packet, whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold;
If reach described predetermined threshold, the described still unencrypted packet having received is encrypted by encryption key.
Optionally, described method, also comprises:
If when not reaching described predetermined threshold but including last packet in the described packet having received, the described still unencrypted packet having received is encrypted by encryption key.
Optionally, describedly divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet, comprising:
A described n packet is divided into K group according to the order of sequence, and each group comprises the packet of identical or different number, n >=K >=2;
While often receiving 1 packet in group, the packet in described group is encrypted by encryption key.
Optionally, described method,
The each batch of encryption key using is identical encryption key; Or,
The each batch of encryption key using is different encryption keys.
Optionally, described method also comprises:
Receive the operation requests to described file destination;
After each packet after described encryption is in batches decrypted, merges and obtain described file destination;
Described file destination is carried out to the corresponding file operation of described operation requests.
According to the second aspect of disclosure embodiment, a kind of document encrypting apparatus is provided, described device comprises:
Data reception module, is configured to receive n the packet corresponding with file destination, and described packet is to obtain after file transmitting terminal cuts described file destination, n >=2;
Data encryption module, is configured to a described n packet to divide different batches to be encrypted, and encrypts the zero hour of described packet early than the finish time that receives described packet;
Data memory module, is configured to each packet after storage is encrypted in batches.
Optionally, described data encryption module, comprising:
Encrypt separately submodule, be configured to often receive after a packet, described packet is encrypted by encryption key.
Optionally, described data encryption module, comprising:
Quantitatively encrypt submodule, be configured to often receive after m packet, a described m packet is encrypted to n > m >=2 by encryption key.
Optionally, described quantitative encryption submodule, when being configured at the discontented m of the still unencrypted packet having received but including last packet, is encrypted the described still unencrypted packet having received by encryption key.
Optionally, described data encryption module, comprising: Data Detection submodule and threshold value are encrypted submodule;
Described Data Detection submodule, is configured to often receive after 1 packet, and whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold;
Described threshold value is encrypted submodule, reaches described predetermined threshold if be configured to, and the described still unencrypted packet having received is encrypted by encryption key.
Optionally, described threshold value is encrypted submodule, when not reaching described predetermined threshold but including last packet in the described packet having received, the described still unencrypted packet having received is encrypted by encryption key if be configured to.
Optionally, described data encryption module, comprising: packet submodule and block encryption submodule;
Described packet submodule, is configured to a described n packet to be divided into according to the order of sequence K group, and each group comprises the packet of identical or different number, n >=K >=2;
Described block encryption submodule, while being configured to often to receive 1 packet in group, is encrypted the packet in described group by encryption key.
Optionally,
The each batch of encryption key using is identical encryption key; Or,
The each batch of encryption key using is different encryption keys.
Optionally, described device also comprises: request receiving module, deciphering merge module and operation executing module;
Described request receiver module, is configured to receive the operation requests to described file destination;
Described deciphering merges module, after being configured to each packet after described encryption to be in batches decrypted, merging and obtains described file destination;
Described operation executing module, is configured to described file destination to carry out the corresponding file operation of described operation requests.
According to the third aspect of disclosure embodiment, a kind of document encrypting apparatus is provided, comprising:
Processor;
Be used for the storer of the executable instruction of storing described processor;
Wherein, described processor is configured to:
Receive n the packet corresponding with file destination, described packet is to obtain after file transmitting terminal cuts described file destination, n >=2;
Divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet;
Each packet after storage is encrypted in batches.
The technical scheme that disclosure embodiment provides can comprise following beneficial effect:
By dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
Should be understood that, it is only exemplary and explanatory that above general description and details are hereinafter described, and can not limit the disclosure.
Brief description of the drawings
Accompanying drawing is herein merged in instructions and forms the part of this instructions, shows and meets embodiment of the present disclosure, and be used from and explain principle of the present disclosure with instructions one.
Fig. 1 is according to the process flow diagram of a kind of file encrypting method shown in an exemplary embodiment;
Fig. 2 is according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment;
Fig. 3 is according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment;
Fig. 4 is according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment;
Fig. 5 is according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment;
Fig. 6 is according to the block diagram of a kind of document encrypting apparatus shown in an exemplary embodiment;
Fig. 7 is according to the block diagram of a kind of document encrypting apparatus shown in another exemplary embodiment;
Fig. 8 is according to the block diagram of a kind of document encrypting apparatus shown in an exemplary embodiment.
By above-mentioned accompanying drawing, the embodiment that the disclosure is clear and definite has been shown, will there is hereinafter more detailed description.These accompanying drawings and text description are not the scope in order to limit disclosure design by any mode, but by reference to specific embodiment for those skilled in the art illustrate concept of the present disclosure.
Embodiment
Here will at length describe exemplary embodiment, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they are only and the example of apparatus and method as consistent in some aspects that described in detail in appended claims, of the present disclosure.
Terminal in the embodiment of the present invention can be mobile phone, panel computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert compression standard audio frequency aspect 4) player, pocket computer on knee, camera, desk-top computer and video camera etc.
Fig. 1 is that the present embodiment is applied in terminal and illustrates with this file encrypting method according to the process flow diagram of a kind of file encrypting method shown in an exemplary embodiment.This file encrypting method can comprise following several step:
In step 101, receive n the packet corresponding with file destination, packet is to obtain after file transmitting terminal cuts file destination, n >=2.
In step 102, divide different batches to be encrypted n packet, the zero hour of encrypted packets is early than the finish time that receives packet.
In step 103, each packet after storage is encrypted in batches.
In sum, the file encrypting method that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
Fig. 2 is that the present embodiment is applied in terminal and illustrates with this file encrypting method according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment.This file encrypting method can comprise following several step:
In step 201, receive n the packet corresponding with file destination, packet is to obtain after file transmitting terminal cuts file destination, n >=2;
File receiving end receives n the packet corresponding with file destination, and packet is to obtain after file transmitting terminal cuts file destination, n >=2, and file destination is that file transmitting terminal sends to file receiving end.
This step can be divided into 3 sub-steps below:
1, file receiving end receives the file transmission information that file transmitting terminal sends, and file transmission information can comprise that file destination is cut into n packet.
2, file receiving end is set up data channel according to file transmission information and file transmitting terminal.
3, file receiving end receives n packet by data channel.
It should be noted that, when file receiving end often receives 1 packet, can wrap in n sequence number the record in packet according to file transmission information specified data, this sequence number can for after be file destination by n packet combining.
In step 202, often receive after a packet, packet is encrypted by encryption key;
File receiving end often receives after a packet, and packet is encrypted by encryption key, and the each batch of encryption key using is identical encryption key; Or the each batch of encryption key using is different encryption keys.
That is, the n that file receiving end a receives packet can use same encryption key to be encrypted, and also can use n different encryption key to be encrypted.
In step 203, each packet after storage is encrypted in batches;
File receiving end, by after each Data Packet Encryption, is stored in each packet after encrypting on local storage.
In the time that different pieces of information bag uses different encryption keys, file receiving end also can be stored the corresponding relation between sequence number and each encryption key of each packet.
In step 204, receive the operation requests to file destination;
File receiving end receives the operation requests to file destination, and this operation requests can be the request of wanting to use file destination that user sends, such as request that file destination is edited, checked and sends etc.
In step 205, after each packet after in batches encrypting is decrypted, merges and obtain file destination;
The encryption key that file receiving end uses when each packet utilization after in batches encrypting is encrypted is decrypted, obtain n packet, now, file receiving end can be by each packet of recording in step 201 sequence number in n packet, n the packet combining obtaining after deciphering obtained to file destination.
In step 206, to the corresponding file operation of file destination executable operations request;
File receiving end is obtaining after file destination, to the corresponding file operation of file destination executable operations request, such as file destination being edited, checked and transmission etc.
In sum, the file encrypting method that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
It should be added that, the present embodiment is just encrypted this packet after often receiving a packet, the ratio that makes in file that file receiving end receives to account in the file of unencrypted state overall file is conventionally very little, such as file destination is secret picture and has 100 packets, in file receiving end, synchronization only has centesimal packet in unencrypted state, even if this part unencrypted packet is stolen, stealer also cannot judge from this part unencrypted packet the content of secret picture, reach the effect that strengthens to a great extent the confidentiality of file destination.
Fig. 3 is that the present embodiment is applied in terminal and illustrates with this file encrypting method according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment.This file encrypting method can comprise following several step:
In step 301, receive n the packet corresponding with file destination, packet is to obtain after file transmitting terminal cuts file destination, n >=2;
File receiving end receives n the packet corresponding with file destination, and packet is to obtain after file transmitting terminal cuts file destination, n >=2, and file destination is that file transmitting terminal sends to file receiving end.
This step can be divided into 3 sub-steps below:
1, file receiving end receives the file transmission information that file transmitting terminal sends, and file transmission information can comprise that file destination is cut into n packet.
2, file receiving end is set up data channel according to file transmission information and file transmitting terminal.
3, file receiving end receives n packet by data channel.
It should be noted that, when file receiving end often receives 1 packet, can wrap in n sequence number the record in packet according to file transmission information specified data, this sequence number can for after be file destination by n packet combining.
In step 302, often receive after m packet, m packet is encrypted to n > m >=2 by encryption key;
File receiving end often receives after m packet, m packet is encrypted by encryption key, and n > m >=2, the each batch of encryption key using is identical encryption key; Or the each batch of encryption key using is different encryption keys.
That is, when file receiving end is encrypted m packet, can use same encryption key to be encrypted at every turn, also can all use different encryption keys to be encrypted at every turn.
Such as n is that 100, m is 20, when file receiving end receives 20 packets at every turn, the still unencrypted packet receiving is encrypted by encryption key, altogether need to encrypt 5 times, this can use same encryption key 5 times, also can use 5 different encryption keys.
Wherein, the value of m can be set by user, and user can decide according to the packet sum of the file destination of this transmission the value of m, to make total encryption number of times too much unsuitable.In addition, predetermined threshold can be also the value of being set by file transmitting terminal.
In step 303, at the discontented m of the still unencrypted packet having received but while including last packet, the still unencrypted packet having received is encrypted by encryption key;
File receiving end is at the discontented m of the still unencrypted packet having received but while including last packet, the still unencrypted packet having received is encrypted by encryption key.
Receive after all packets, the packet that file receiving end need to receive last batch is encrypted, whether having received last packet can judge by file transmission information, such as file transmitting terminal can send an end of transmission instruction to file receiving end, file receiving end receives after this instruction, just the still unencrypted packet having received is encrypted by encryption key; Or last packet is accompanied with a special mark, file receiving end just can be found this mark after receiving last packet at once.
Such as n is 110, m is 50, file receiving end is in the time that the first two batch receives 50 packets at every turn, the still unencrypted packet receiving is encrypted by encryption key, while receiving afterwards 10 packets, learn that according to file transmission information these 10 data handbags contain last packet, are encrypted by encryption key these 10 packets.
If the still unencrypted packet having received discontented m, and while not including last packet in the packet having received, file receiving end continues to receive packet.
In step 304, each packet after storage is encrypted in batches;
File receiving end, by after each Data Packet Encryption, is stored in each packet after encrypting on local storage.
In the time that different batches uses different encryption keys, file receiving end also can be stored the corresponding relation between sequence number and each encryption key of each packet.
In step 305, receive the operation requests to file destination;
File receiving end receives the operation requests to file destination, and this operation requests can be the request of wanting to use file destination that user sends, such as file destination being edited, checked and transmission etc.
In step 306, after each packet after in batches encrypting is decrypted, merges and obtain file destination;
The encryption key that file receiving end uses when each packet utilization after in batches encrypting is encrypted is decrypted, obtain n packet, now, file receiving end can be by each packet of recording in step 301 sequence number in n packet, n the packet combining obtaining after deciphering obtained to file destination.
In step 307, to the corresponding file operation of file destination executable operations request;
File receiving end is obtaining after file destination, to the corresponding file operation of file destination executable operations request, such as file destination being edited, checked and transmission etc.
In sum, the file encrypting method that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
It should be added that, the present embodiment is by often receiving after m packet, the still unencrypted packet receiving is encrypted by encryption key, greatly reduce the encryption number of times of this method in the time of file encryption, needed deciphering number of times while equally also having greatly reduced restore target file, reached the effect that reduces file receiving end workload, the file encrypting method that the present embodiment is provided is more quick in the time of application.
Fig. 4 is that the present embodiment is applied in terminal and illustrates with this file encrypting method according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment.This file encrypting method can comprise following several step:
In step 401, receive n the packet corresponding with file destination, packet is to obtain after file transmitting terminal cuts file destination, n >=2;
File receiving end receives n the packet corresponding with file destination, and packet is to obtain after file transmitting terminal cuts file destination, n >=2, and file destination is that file transmitting terminal sends to file receiving end.
This step can be divided into 3 sub-steps below:
1, file receiving end receives the file transmission information that file transmitting terminal sends, and file transmission information can comprise that file destination is cut into n packet.
2, file receiving end is set up data channel according to file transmission information and file transmitting terminal.
3, file receiving end receives n packet by data channel.
It should be noted that, when file receiving end often receives 1 packet, can wrap in n sequence number the record in packet according to file transmission information specified data, this sequence number can for after be file destination by n packet combining.
In step 402, often receive after 1 packet, whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold;
File receiving end often receives after 1 packet, and whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold.
Such as, when predetermined threshold is 1MB, file receiving end receives after a packet, and the still unencrypted data that received are surrounded by 10, and whether the data total amount that file receiving end detects these 10 packets reaches 1MB.
In step 403, if reach predetermined threshold, the still unencrypted packet having received is encrypted by encryption key;
If the data total amount of the still unencrypted packet having received reaches predetermined threshold, the still unencrypted packet having received is encrypted by encryption key.
Such as, when predetermined threshold is 1MB, the data total amount that the still unencrypted data that received are surrounded by 10 and these 10 packets has met or exceeded 1MB, by encryption key, these 10 packets is encrypted.
In addition, file receiving end is in the time being encrypted, and the each batch of encryption key using is identical encryption key; Or the each batch of encryption key using is different encryption keys.Such as, the data total amount of file destination is 10MB, and predetermined threshold is 1MB, and file receiving end may need to carry out 10 encryptions, and these 10 times encryptions can be used same encryption key, also can use 10 different encryption keys.
Wherein, predetermined threshold can be set by user, and user can decide predetermined threshold according to the data total amount of the file destination of this transmission, and to make file receiving end unencrypted data total amount unsuitable excessive, and total encryption number of times is too much unsuitable.In addition, predetermined threshold can be also the value of being set by file transmitting terminal.
In step 404, if when not reaching predetermined threshold but including last packet in the packet that received, the still unencrypted packet having received is encrypted by encryption key;
If the data total amount of the still unencrypted packet having received does not reach predetermined threshold, but while including last packet in the packet having received, the still unencrypted packet having received is encrypted by encryption key.
Receive after all packets, the packet that file receiving end need to receive last batch is encrypted, whether having received last packet can judge by file transmission information, such as file transmitting terminal can send an end of transmission instruction to file receiving end, file receiving end receives after this instruction, just the still unencrypted packet having received is encrypted by encryption key; Or last packet is accompanied with a special mark, file receiving end just can be found this mark after receiving last packet at once.
If the data total amount of the still unencrypted packet having received does not reach predetermined threshold, and while not including last packet in the packet having received, file receiving end continues to receive packet.
In step 405, each packet after storage is encrypted in batches;
File receiving end, by after each Data Packet Encryption, is stored in each packet after encrypting on local storage.
In the time that different batches uses different encryption keys, file receiving end also can be stored the corresponding relation between sequence number and each encryption key of each packet.
In step 406, receive the operation requests to file destination;
File receiving end receives the operation requests to file destination, and this operation requests can be the request of wanting to use file destination that user sends, such as file destination being edited, checked and transmission etc.
In step 407, after each packet after in batches encrypting is decrypted, merges and obtain file destination;
The encryption key that file receiving end uses when each packet utilization after in batches encrypting is encrypted is decrypted, obtain n packet, now, file receiving end can be by each packet of recording in step 401 sequence number in n packet, n the packet combining obtaining after deciphering obtained to file destination.
In step 408, to the corresponding file operation of file destination executable operations request;
File receiving end is obtaining after file destination, to the corresponding file operation of file destination executable operations request, such as file destination being edited, checked and transmission etc.
In sum, the file encrypting method that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
It should be added that, when the present embodiment arrives predetermined threshold by the data total amount at the still unencrypted packet having received at every turn, the still unencrypted packet having received is encrypted by encryption key, both made the unencrypted file data amount in file receiving end can be not excessive, also make the number of times of file encryption can be not too much, reach the confidentiality that both improves file destination, reduced again the effect of file receiving end workload.
Fig. 5 is that the present embodiment is applied in terminal and illustrates with this file encrypting method according to the process flow diagram of a kind of file encrypting method shown in another exemplary embodiment.This file encrypting method can comprise following several step:
In step 501, receive n the packet corresponding with file destination, packet is to obtain after file transmitting terminal cuts file destination, n >=2;
File receiving end receives n the packet corresponding with file destination, and packet is to obtain after file transmitting terminal cuts file destination, n >=2, and file destination is that file transmitting terminal sends to file receiving end.
This step can be divided into 3 sub-steps below:
1, file receiving end receives the file transmission information that file transmitting terminal sends, and file transmission information can comprise that file destination is cut into n packet.
2, file receiving end is set up data channel according to file transmission information and file transmitting terminal.
3, file receiving end receives n packet by data channel.
It should be noted that, when file receiving end often receives 1 packet, can wrap in n sequence number the record in packet according to file transmission information specified data, this sequence number can for after be file destination by n packet combining.
In step 502, n packet is divided into K group according to the order of sequence, each group comprises the packet of identical or different number, n >=K >=2;
N packet is divided into according to the order of sequence K group by file receiving end, and each group comprises the packet of identical or different number, n >=K >=2.
Such as n is that 10, K is 3, three groups can include respectively 2,3 and 5 packets.Grouping is herein divided into groups according to can be file transmitting terminal or file receiving end be transmitted the time according to the expectation of each packet in a file destination n packet, and this Estimated Time Of Completion can judge according to data package size and transfer rate.
That is, will estimate that being transmitted close packet of time is placed on 1 group, file receiving end, in the time that multithreading is downloaded, can make to complete transmission with the packet of 1 group in the close time like this.
In step 503, while often receiving 1 packet in group, the packet in group is encrypted by encryption key;
When file receiving end often receives 1 packet in group, the packet in group is encrypted by encryption key.
In the time that file receiving end carries out multi-thread transmission, packet in every 1 group can be to complete transmission within the close time, just the packet in group is encrypted by encryption key receiving after 1 packet in group like this, greatly reduce the time that packet exists at file receiving end in unencrypted situation, improved the confidentiality of file destination.
In step 504, each packet after storage is encrypted in batches;
File receiving end, by after each Data Packet Encryption, is stored in each packet after encrypting on local storage.
In the time that different batches uses different encryption keys, file receiving end also can be stored the corresponding relation between sequence number and each encryption key of each packet.
In step 505, receive the operation requests to file destination;
File receiving end receives the operation requests to file destination, and this operation requests can be the request of wanting to use file destination that user sends, such as file destination being edited, checked and transmission etc.
In step 506, after each packet after in batches encrypting is decrypted, merges and obtain file destination;
The encryption key that file receiving end uses when each packet utilization after in batches encrypting is encrypted is decrypted, obtain n packet, now, file receiving end can be by each packet of recording in step 501 sequence number in n packet, n the packet combining obtaining after deciphering obtained to file destination.
In step 507, to the corresponding file operation of file destination executable operations request;
File receiving end is obtaining after file destination, to the corresponding file operation of file destination executable operations request, such as file destination being edited, checked and transmission etc.
In sum, the file encrypting method that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
It should be added that, the present embodiment is by estimating that being transmitted close packet of time assigns to 1 group, and while often receiving the packet of 1 group, just the packet in group is encrypted by encryption key, packet in having greatly reduced each group in the life period of file receiving end, has reached the effect that improves file destination confidentiality in unencrypted situation.
Following is disclosure device embodiment, can be for carrying out disclosure embodiment of the method.For the details not disclosing in disclosure device embodiment, please refer to disclosure embodiment of the method.
Fig. 6 is according to the block diagram of a kind of document encrypting apparatus shown in an exemplary embodiment, and this document encrypting apparatus can be realized and be become the some or all of of terminal by software, hardware or both combinations.This document encrypting apparatus can comprise: data reception module 610, data encryption module 620 and data memory module 630;
Data reception module 610, is configured to receive n the packet corresponding with file destination, and packet is to obtain after file transmitting terminal cuts file destination, n >=2.
Data encryption module 620, is configured n packet to divide different batches to be encrypted, and the zero hour of encrypted packets is early than the finish time that receives packet.
Data memory module 630, is configured to each packet after storage is encrypted in batches.
In sum, the document encrypting apparatus that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
Fig. 7 is according to the block diagram of a kind of document encrypting apparatus shown in another exemplary embodiment, and this document encrypting apparatus can be realized and be become the some or all of of terminal by software, hardware or both combinations.This document encrypting apparatus can comprise: data reception module 610, data encryption module 620 and data memory module 630;
Data reception module 610, is configured to receive n the packet corresponding with file destination, and packet is to obtain after file transmitting terminal cuts file destination, n >=2.
Data encryption module 620, is configured to n packet to divide different batches to be encrypted, and the zero hour of encrypted packets is early than the finish time that receives packet.
Data memory module 630, is configured to each packet after storage is encrypted in batches.
Optionally, data encryption module 620, comprising:
Encrypt separately submodule 621, be configured to often receive after a packet, packet is encrypted by encryption key.
Optionally, data encryption module 620, comprising:
Quantitatively encrypt submodule 622, be configured to often receive after m packet, m packet is encrypted to n > m >=2 by encryption key.
Optionally, quantitatively encrypt submodule 622, when being configured at the discontented m of the still unencrypted packet having received but including last packet, the still unencrypted packet having received is encrypted by encryption key.
Optionally, data encryption module 620, comprising: Data Detection submodule 623 and threshold value are encrypted submodule 624;
Data Detection submodule 623, is configured to often receive after 1 packet, and whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold;
Threshold value is encrypted submodule 624, reaches predetermined threshold if be configured to, and the still unencrypted packet having received is encrypted by encryption key.
Optionally, threshold value is encrypted submodule 624, when not reaching predetermined threshold but including last packet in the packet that received, the still unencrypted packet having received is encrypted by encryption key if be configured to.
Optionally, data encryption module 620, comprising: packet submodule 625 and block encryption submodule 626;
Packet submodule 625, is configured to n packet to be divided into according to the order of sequence K group, and each group comprises the packet of identical or different number, n >=K >=2;
Block encryption submodule 626, while being configured to often to receive 1 packet in group, is encrypted the packet in group by encryption key.
Optionally, the each batch of encryption key using is identical encryption key; Or the each batch of encryption key using is different encryption keys.
Optionally, this device also comprises: request receiving module 640, deciphering merge module 650 and operation executing module 660;
Request receiving module 640, is configured to receive the operation requests to file destination;
Deciphering merges module 650, after being configured to each packet after in batches encrypting to be decrypted, merging and obtains file destination;
Operation executing module 660, is configured to the corresponding file operation of file destination executable operations request.
In sum, the document encrypting apparatus that the present embodiment provides, by dividing different batches to be encrypted the packet receiving, the zero hour of ciphering process is early than the finish time of receiving course, make whole file destination can under unencrypted state, not be stored in file receiving end, having solved secret file is before not also being encrypted after end of transmission, secret file still can be at file receiving end the problem in an of short duration unencrypted state; Reach the effect that secret file does not exist unencrypted state after finishing receiving, improved the confidentiality of secret file.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations have been described in detail in the embodiment about the method, will not elaborate explanation herein.
Fig. 8 is according to the block diagram of a kind of device 800 for file encryption shown in an exemplary embodiment.For example, device 800 can be mobile phone, computing machine, digital broadcast terminal, information receiving and transmitting equipment, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 8, device 800 can comprise following one or more assembly: processing components 802, storer 804, power supply module 806, multimedia groupware 808, audio-frequency assembly 810, I/O (I/O) interface 812, sensor module 814, and communications component 816.
The integrated operation of processing components 802 common control device 800, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Processing components 802 can comprise that one or more processors 820 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 802 can comprise one or more modules, is convenient to mutual between processing components 802 and other assemblies.For example, processing components 802 can comprise multi-media module, to facilitate mutual between multimedia groupware 808 and processing components 802.
Storer 804 is configured to store various types of data to be supported in the operation of device 800.The example of these data comprises for any application program of operation on device 800 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 804 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
Power supply module 806 provides electric power for installing 800 various assemblies.Power supply module 806 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for device 800.
Multimedia groupware 808 is included in the screen that an output interface is provided between described device 800 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.Described touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to described touch or slide.In certain embodiments, multimedia groupware 808 comprises a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 comprises a microphone (MIC), and when device 800 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal receiving can be further stored in storer 804 or be sent via communications component 816.In certain embodiments, audio-frequency assembly 810 also comprises a loudspeaker, for output audio signal.
I/O interface 812 is for providing interface between processing components 802 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 814 comprises one or more sensors, is used to device 800 that the state estimation of various aspects is provided.For example, sensor module 814 can detect the opening/closing state of device 800, the relative positioning of assembly, for example described assembly is display and the keypad of device 800, the position of all right pick-up unit 800 of sensor module 814 or 800 1 assemblies of device changes, user is with device 800 existence that contact or do not have the temperature variation of device 800 orientation or acceleration/deceleration and device 800.Sensor module 814 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 814 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 814 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to be convenient to the communication of wired or wireless mode between device 800 and other equipment.Device 800 wireless networks that can access based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 816 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, communications component 816 also comprises near-field communication (NFC) module, to promote junction service.For example, can be based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be realized by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the storer 804 of instruction, above-mentioned instruction can have been carried out said method by the processor 820 of device 800.For example, described non-provisional computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage equipment etc.
A kind of non-provisional computer-readable recording medium, in the time that the instruction in described storage medium is carried out by the processor that installs 800, makes device 800 can carry out the arbitrary file encrypting method in above-mentioned each embodiment.
Those skilled in the art, considering instructions and putting into practice after invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendments and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (19)

1. a file encrypting method, is characterized in that, described method comprises:
Receive n the packet corresponding with file destination, described packet is to obtain after file transmitting terminal cuts described file destination, n >=2;
Divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet;
Each packet after storage is encrypted in batches.
2. method according to claim 1, is characterized in that, describedly divides different batches to be encrypted a described n packet, encrypts the zero hour of described packet early than the finish time that receives described packet, comprising:
Often receive after a packet, described packet is encrypted by encryption key.
3. method according to claim 1, is characterized in that, describedly divides different batches to be encrypted a described n packet, encrypts the zero hour of described packet early than the finish time that receives described packet, comprising:
Often receive after m packet, a described m packet is encrypted by encryption key, n > m >=2.
4. method according to claim 3, is characterized in that, described method, also comprises:
At the discontented m of the still unencrypted packet having received but while including last packet, the described still unencrypted packet having received is encrypted by encryption key.
5. method according to claim 1, is characterized in that, describedly divides different batches to be encrypted a described n packet, encrypts the zero hour of described packet early than the finish time that receives described packet, comprising:
Often receive after 1 packet, whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold;
If reach described predetermined threshold, the described still unencrypted packet having received is encrypted by encryption key.
6. method according to claim 5, is characterized in that, described method, also comprises:
If when not reaching described predetermined threshold but including last packet in the described packet having received, the described still unencrypted packet having received is encrypted by encryption key.
7. method claimed in claim 1, is characterized in that, describedly divides different batches to be encrypted a described n packet, encrypts the zero hour of described packet early than the finish time that receives described packet, comprising:
A described n packet is divided into K group according to the order of sequence, and each group comprises the packet of identical or different number, n >=K >=2;
While often receiving 1 packet in group, the packet in described group is encrypted by encryption key.
8. according to the arbitrary described method of claim 1 to 7, it is characterized in that,
The each batch of encryption key using is identical encryption key; Or,
The each batch of encryption key using is different encryption keys.
9. according to the arbitrary described method of claim 1 to 7, it is characterized in that, described method also comprises:
Receive the operation requests to described file destination;
After each packet after described encryption is in batches decrypted, merges and obtain described file destination;
Described file destination is carried out to the corresponding file operation of described operation requests.
10. a document encrypting apparatus, is characterized in that, described device comprises:
Data reception module, is configured to receive n the packet corresponding with file destination, and described packet is to obtain after file transmitting terminal cuts described file destination, n >=2;
Data encryption module, is configured to a described n packet to divide different batches to be encrypted, and encrypts the zero hour of described packet early than the finish time that receives described packet;
Data memory module, is configured to each packet after storage is encrypted in batches.
11. devices according to claim 10, is characterized in that, described data encryption module, comprising:
Encrypt separately submodule, be configured to often receive after a packet, described packet is encrypted by encryption key.
12. devices according to claim 10, is characterized in that, described data encryption module, comprising:
Quantitatively encrypt submodule, be configured to often receive after m packet, a described m packet is encrypted to n > m >=2 by encryption key.
13. devices according to claim 12, is characterized in that,
Described quantitative encryption submodule, when being configured at the discontented m of the still unencrypted packet having received but including last packet, is encrypted the described still unencrypted packet having received by encryption key.
14. devices according to claim 10, is characterized in that, described data encryption module, comprising: Data Detection submodule and threshold value are encrypted submodule;
Described Data Detection submodule, is configured to often receive after 1 packet, and whether the data total amount that detects the still unencrypted packet having received reaches predetermined threshold;
Described threshold value is encrypted submodule, reaches described predetermined threshold if be configured to, and the described still unencrypted packet having received is encrypted by encryption key.
15. devices according to claim 14, is characterized in that,
Described threshold value is encrypted submodule, when not reaching described predetermined threshold but including last packet in the described packet having received, the described still unencrypted packet having received is encrypted by encryption key if be configured to.
16. devices claimed in claim 10, is characterized in that, described data encryption module, comprising: packet submodule and block encryption submodule;
Described packet submodule, is configured to a described n packet to be divided into according to the order of sequence K group, and each group comprises the packet of identical or different number, n >=K >=2;
Described block encryption submodule, while being configured to often to receive 1 packet in group, is encrypted the packet in described group by encryption key.
17. according to claim 10 to 16 arbitrary described devices, it is characterized in that,
The each batch of encryption key using is identical encryption key; Or,
The each batch of encryption key using is different encryption keys.
18. according to claim 10 to 16 arbitrary described devices, it is characterized in that, described device also comprises: request receiving module, deciphering merge module and operation executing module;
Described request receiver module, is configured to receive the operation requests to described file destination;
Described deciphering merges module, after being configured to each packet after described encryption to be in batches decrypted, merging and obtains described file destination;
Described operation executing module, is configured to described file destination to carry out the corresponding file operation of described operation requests.
19. 1 kinds of document encrypting apparatus, is characterized in that, comprising:
Processor;
Be used for the storer of the executable instruction of storing described processor;
Wherein, described processor is configured to:
Receive n the packet corresponding with file destination, described packet is to obtain after file transmitting terminal cuts described file destination, n >=2;
Divide different batches to be encrypted a described n packet, encrypt the zero hour of described packet early than the finish time that receives described packet;
Each packet after storage is encrypted in batches.
CN201410403711.3A 2014-08-15 2014-08-15 File encrypting method and device Active CN104182697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410403711.3A CN104182697B (en) 2014-08-15 2014-08-15 File encrypting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410403711.3A CN104182697B (en) 2014-08-15 2014-08-15 File encrypting method and device

Publications (2)

Publication Number Publication Date
CN104182697A true CN104182697A (en) 2014-12-03
CN104182697B CN104182697B (en) 2017-07-28

Family

ID=51963728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410403711.3A Active CN104182697B (en) 2014-08-15 2014-08-15 File encrypting method and device

Country Status (1)

Country Link
CN (1) CN104182697B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973072A (en) * 2017-05-24 2017-07-21 深圳市乃斯网络科技有限公司 Network link encryption method and system based on terminal
CN107220550A (en) * 2017-04-19 2017-09-29 上海海加网络科技有限公司 Encrypted card performance optimization method and system based on eCryptfs
CN107924610A (en) * 2015-06-24 2018-04-17 大众汽车有限公司 Method and apparatus for improving the security in Remote triggering, motor vehicle
CN108769052A (en) * 2018-06-12 2018-11-06 北斗巡星信息科技有限公司 Wrist strap transmits the encrypted method and device of information
CN109525388A (en) * 2017-09-19 2019-03-26 中兴通讯股份有限公司 A kind of combined ciphering method and system of cipher key separation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁***软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN102693398A (en) * 2012-05-09 2012-09-26 深圳大学 Data encryption method and system
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN103905535A (en) * 2014-03-17 2014-07-02 深圳市中兴移动通信有限公司 File transmission method and device and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁***软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN102693398A (en) * 2012-05-09 2012-09-26 深圳大学 Data encryption method and system
CN103455764A (en) * 2013-08-27 2013-12-18 无锡华御信息技术有限公司 File segmentation and merging technology-based file encryption and decryption systems
CN103905535A (en) * 2014-03-17 2014-07-02 深圳市中兴移动通信有限公司 File transmission method and device and terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107924610A (en) * 2015-06-24 2018-04-17 大众汽车有限公司 Method and apparatus for improving the security in Remote triggering, motor vehicle
US10803680B2 (en) 2015-06-24 2020-10-13 Volkswagen Aktiengesellschaft Method and apparatus for increasing safety for remote triggering, and motor vehicle
CN107924610B (en) * 2015-06-24 2021-07-09 大众汽车有限公司 Method and device for increasing safety during remote triggering, motor vehicle
CN107220550A (en) * 2017-04-19 2017-09-29 上海海加网络科技有限公司 Encrypted card performance optimization method and system based on eCryptfs
CN106973072A (en) * 2017-05-24 2017-07-21 深圳市乃斯网络科技有限公司 Network link encryption method and system based on terminal
CN109525388A (en) * 2017-09-19 2019-03-26 中兴通讯股份有限公司 A kind of combined ciphering method and system of cipher key separation
CN109525388B (en) * 2017-09-19 2022-07-15 中兴通讯股份有限公司 Combined encryption method and system with separated keys
CN108769052A (en) * 2018-06-12 2018-11-06 北斗巡星信息科技有限公司 Wrist strap transmits the encrypted method and device of information

Also Published As

Publication number Publication date
CN104182697B (en) 2017-07-28

Similar Documents

Publication Publication Date Title
CN104219058B (en) Authentication, identification authorization method and device
CN104243484B (en) Information interacting method and device, electronic equipment
EP3605989A1 (en) Information sending method, information receiving method, apparatus, and system
US20200228330A1 (en) Command transmission method and apparatus, electronic device
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN104955031A (en) Information transmission method and device
CN104486083A (en) Supervisory video processing method and device
CN104852911A (en) Safety verification method, device and system
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN105049213A (en) File signature method and device
CN104125055A (en) Encryption and decryption method and electronic device
CN104168277A (en) File security maintaining method and device
CN103914541B (en) The method and device of information search
CN104715337A (en) Attendance method, and attendance management method and device
CN104618330A (en) Business processing method and device and terminal
CN104182697A (en) File encryption method and device
CN104125067A (en) Account and token secret key binding method and device
CN105119888A (en) Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device
CN106372517A (en) File encryption method, file decryption method, file encryption device and equipment
CN105306716A (en) Data processing method, device and system
CN109246110B (en) Data sharing method and device and computer readable storage medium
CN105450662A (en) Encryption method and device
CN104331672A (en) Method and device for performing confidential treatment on pictures upon bracelet
CN113868505A (en) Data processing method and device, electronic equipment, server and storage medium
CN105681365B (en) Method and apparatus for file transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant