CN104735094A - Information separation based data security transmission system and method - Google Patents

Information separation based data security transmission system and method Download PDF

Info

Publication number
CN104735094A
CN104735094A CN201510192667.0A CN201510192667A CN104735094A CN 104735094 A CN104735094 A CN 104735094A CN 201510192667 A CN201510192667 A CN 201510192667A CN 104735094 A CN104735094 A CN 104735094A
Authority
CN
China
Prior art keywords
file
explant
recipient
main body
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510192667.0A
Other languages
Chinese (zh)
Other versions
CN104735094B (en
Inventor
朱晓阳
孙巍
张鹏程
林信南
李大刚
崔小乐
吴大畏
宋志棠
陈后鹏
陈小刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Wu An Information Technology Co Ltd
Original Assignee
Nanjing Wu An Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Wu An Information Technology Co Ltd filed Critical Nanjing Wu An Information Technology Co Ltd
Priority to CN201510192667.0A priority Critical patent/CN104735094B/en
Publication of CN104735094A publication Critical patent/CN104735094A/en
Application granted granted Critical
Publication of CN104735094B publication Critical patent/CN104735094B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses an information separation based data security transmission system and method. The method includes: a sender automatically separating an original document into a main block file and separated-block file, wherein the main block file points to the separated-block file through an encryption pointer and are directly transmitted to a recipient through the data transmission system, and ID (identity) of the receiver and the recipient is encrypted to be transmitted to a transmission control server together with the separated-block file; the recipient receiving the directly-transmitted main block file and prestoring the same, sending acquisition requests of the separated-block file to the transmission control server, the transmission control server performing decryption, verification of identity and content comparison, returning the separated-block file to the recipient after verification and comparison are successful, and the recipient performing reduction processing on the main block file and the separated-block file to restore to the original document. The electronic document is transmitted by means of two separated files, and is stored and transmitted through different routes in the network, so that secret information stolen by hackers by means of intercepting, illegal accessing and the like can be effectively prevented.

Description

Based on data safe transmission system and the method for information separated
Technical field
The present invention relates to technical field of data transmission, be specifically related to a kind of data safe transmission system based on information separated and method.
Background technology
For a long time, safe and secret management in message transmitting procedure, mainly based on the integrated application of encryption, access control and two kinds of technology, to preserve with complete form and transmission is the Main Morphology of data information application and management, there is the hidden trouble attacked, steal and crack.In recent years, some are based on the storage administration solution of data separating, after complete data information is carried out information separated, be stored in multiple different position on network, and pass through the integrated application of the complicated technology such as encryption, mandate, access control technology, increase and steal and analyze the difficulty cracked, improve document information at the level security stored and in transmission, but in practical application, too complicated solution is technical require high, management cost is large, to be difficult to carry out in the overwhelming majority, in minisystem or universal.
Summary of the invention
Goal of the invention: for safe information transmission demand, the invention provides a kind of data safe transmission system based on information separated and method, effectively can prevent hacker from passing through to intercept, the means such as unauthorized access steal secret; Simultaneously easy to implement and universal.
Technical scheme: the data safe transmission system based on information separated of the present invention and method, comprises terminal system, data transmission system, public key management device and transmission Control Server; Described terminal system is arranged on each user terminal, has sending mode and receiving mode, and the terminal system being in sending mode is transmit leg, is in the terminal system of receiving mode for recipient; Described public key management device comprises a pair PKI double secret key, original is separated into main body block file and explant file by transmit leg, sending and receiving both sides ID is encrypted afterwards by " PKI " and explant file is sent to described transmission Control Server in the lump, the filename of explant file forms encryption pointers by " PKI " encryption and is inserted in main body block file, and the main body block file containing encryption pointers is directly sent to recipient by described data transmission system; Recipient receives the main body block file containing encryption pointers, be that parameter sends the request of explant file acquisition to described transmission Control Server with encryption pointers, described transmission Control Server is by " private key " enabling decryption of encrypted pointer and sending and receiving both sides ID, carry out file comparison and authentication, after checking, comparison success, explant file is back to recipient; Main body block file is become original with explant file access pattern by recipient.
Improve technique scheme further, described terminal system comprises private access device, general transmission device, separating reducing processing unit; The described separating reducing processing unit of transmit leg is by original separated component from block file and main body block file, and main body block file is become original with explant file access pattern by the described separating reducing processing unit of recipient; The described general transmission device of transmit leg is used for main body block file to be directly sent to recipient by described data transmission system, and the described general transmission device of recipient is for receiving main body block file; The described private access device of transmit leg is for sending explant file and sending and receiving both sides ID extremely described transmission Control Server, and the described private access device of recipient is used for sending separate file to described transmission Control Server and obtains request, acquisition explant file.
Described transmission Control Server comprises subscriber's meter, explant database and access control apparatus; Described access control apparatus receives explant file and the sending and receiving both sides ID of the transmission of described transmit leg, be stored into described explant database, and accept the explant file acquisition request of described recipient, sending and receiving both sides ID certification and file comparison is carried out by described " private key ", for legitimate request, corresponding explant file is back to described recipient.
Described " PKI " is shared by all users, and to the encryption of various information during for transmitting, described " private key " is by transmitting Control Server alone for the decryption processing of various information.
Described data transmission system comprises normal data transmission system, dedicated data transmission system and all kinds of mailing system.
Carry out Security Data Transmission based on said system at transmit leg and recipient, comprise the steps:
S1: the separating treatment of original: original is separated into main body block file and explant file by the separating reducing processing unit of transmit leg automatically, be encrypted by " PKI " filename to explant file, generate encryption pointers and be inserted into the assigned address of main body block file, by " PKI ", sending and receiving both sides ID being encrypted simultaneously;
S2: file sends: the main body block file containing encryption pointers is directly reached recipient by data transmission system by the general transmission device of transmit leg, and explant file and sending and receiving both sides ID are sent to transmission Control Server by the private access device of transmit leg;
S3: the recovery of original: the general transmission device of recipient receive direct transfer containing temporary after the main body block file of encryption pointers, and start private access device, private access device with the encryption pointers in main body block file for parameter, the request of explant file acquisition is sent to transmission Control Server, transmission Control Server is by " private key " enabling decryption of encrypted pointer and receipts, send out both sides ID, carry out authentication, the filename of comparison explant file and receipts in explant database, send out both sides ID, after comparison success, corresponding explant file is back to recipient, main body block file and explant file are reverted to original by separating reducing processing unit by recipient.
In described step S2, main body block file is direct transferred by common or dedicated data transmission system or mailing system; In described step S2, explant file and sending and receiving both sides ID are sent to transmission Control Server, are stored in explant database.
For preventing by stealing subscriber's meter, comparison cipher-text information obtains sending and receiving both sides ID, adopts to add strong algorithms as follows and be encrypted described explant file and sending and receiving both sides ID in described step S1, instead of does simple encrypting storing to ID:
A: set user $ as comprising the character string of outbox side and recipient ID, L0 is its length;
B: get L0 character at explant file F0 assigned address, is designated as S0 $ (S0 $ is unordered mess code);
After C:user $ and S0 $ carries out XOR conversion by binary system, as the sending and receiving both sides ID of encryption;
D:S0 $, by after " PKI " encryption (being designated as S1 $), is saved in F0 origin-location;
Following algorithm is adopted to be decrypted to described explant file and sending and receiving both sides ID in described step S3:
A: take out S1 $ at explant file F0 assigned address, be decrypted into S0 $ by " private key ";
B: in explant file F0, replaces S1 $ with S0 $, recovers original F0;
C: the sending and receiving both sides ID of encryption is carried out binary system XOR inverse transformation by S0 $, reduction comprises the character string user $ of outbox side and recipient ID.
For the anti-analysis of strengthening native system cracks performance, the encryption mode of above-mentioned explant file can be applied to main body block file, now need to increase pair of secret keys, that is: for explant file and main body block file, use a double secret key respectively.
The present invention is based on PKI public encryption system, by the critical data in a double secret key management transmitting procedure, to provide safe and secret formation transfer service, PKI (Public Key) and private key (Private Key) are the double secret key (i.e. a PKI and a private key) obtained by a kind of algorithm, PKI is the disclosed part of cipher key pair, to all users openly, private key is then private part, is preserved by specialized hardware.When using this double secret key, if with one of them secret key encryption one piece of data, another secret key decryption must be used, such as just must decipher with private key by public key encryption data, if also must use public key decryptions by encrypted private key data, otherwise deciphering can not be successful.
Beneficial effect: compared with prior art, advantage of the present invention:
1, the file transfer pattern based on information separated provided by the invention, in transmission and processing process, file is separated the form of document with two, undertaken storing and forwarding by the different route in network, security files data effectively can be prevented in storage, forward, in transmitting procedure by hacker by intercepting, the means such as unauthorized access steal secret;
2, the invention provides a complete document separated transmission embodiment, in fact include that document is separated, sends, transmission and the conceptual solutions of receiving course, applied by the superposition of separation, PKI encryption and decryption, the multinomial technology of access control, in the transmitting procedure that not only doubled, document Anti-theft, anti-analysis crack ability, send simultaneously, transmit and receive each process logic clear, be convenient to architectonical and be integrated into practical transmission system;
3, based on the double secret key of PKI, user is arranged a pair or two right as required, in a highly economical manner, realize encryption and the decrypt operation of key message in information transmission, realize and manage also very convenient, the user ID of encryption transmitting-receiving both sides and the incidence relation of separation document, incidence relation between the user of hiding receiving-transmitting sides, between separation document, effectively prevent and undertaken analyzing, searching by technological means, be separated document to obtain two, realize the possibility that original text recovers.
Accompanying drawing explanation
Fig. 1 is system framework figure of the present invention.
Fig. 2 is the system framework figure of embodiment 1.
Fig. 3 is the system framework figure of embodiment 2.
Fig. 4 is separation algorithm flow chart.
Embodiment
Below by accompanying drawing, technical solution of the present invention is described in detail.
The data safe transmission system based on information separated as shown in Figure 1, comprises transmission Control Server, data transmission system, public key management device and terminal system.Terminal system is the transfer management program operating in each user terminal, mainly comprises separating reducing processing unit, private access device and general transmission device.Public key management device for managing a PKI double secret key, wherein " PKI " shared by all user terminals, for transmitting time encryption to information, " private key " by described transmission Control Server alone for the decryption processing of information.Transmission Control Server comprises the access control key elements such as explant database, access control apparatus and subscriber's meter, and subscriber's meter is used for user account management; Data transmission system can be transmission system or certain mailing system of certain existing general transmission system or special exploitation, is responsible for file and sends and receive process;
embodiment 1:separate file is by transmission Control Server and mailing system transmission.
As shown in Figure 2, separate file is by transmission Control Server and mailing system transmission.
Based on the data safe transmission method of said system, user A sends file f ile to user B, processes in accordance with the following steps:
S1: user A, by the separating reducing processing unit of terminal A, carries out file separation, and point following two steps are carried out:
S11: original text shelves file is separated into main body block file f ile1 automatically and explant file f ile2, file1 and file2 all can not recover original text separately, and both cooperations can conveniently be reduced;
The filename of S12: explant file f ile2 is by " PKI " encryption, generate encrypted characters string s_pointer, s_pointer is inserted into main body block file f ile1, main body block file f ile1 points to explant file f ile2 by s_pointer, to realize the association of two files, s_pointer is the filename after encryption, is called encryption pointers; The ID of user A, B is all encrypted by " PKI ".
S2: separate file passes through two kinds of different approach transmissions:
S21: main body block file f ile1 is directly sent to user B by terminal A by mailing system;
S22: the id information of user A, B of explant file f ile2 and encryption is sent to transmission Control Server d_server by the private access device of terminal A, preserve by transmission Control Server d_server is unified and manages control, the id information of user A, user B is had only transmission Control Server d_server and could be obtained by " private key " deciphering;
S3: user B acquisition and the original text Recovery processing completing separate file:
S31: user B by after terminal B reception mail, file1 is downloaded to assigned address, start the private access device of terminal B, the private access device of terminal B for parameter, proposes explant file acquisition request to transmission Control Server d_server with the encryption pointers s_pointer in main body block file f ile1;
S32: transmission Control Server d_server is with the ID of the ID of " private key " enabling decryption of encrypted pointer s_pointer and user A, user B, thus obtain the filename of explant file f ile2, and explant file f ile2 is found in the file being sent to user B, return to user B;
The separating reducing processing unit of S33: user B startup terminal B, is reduced into original file by main body block file f ile1 and explant file f ile2;
S34: user B notification transmission Control Server d_server removes explant file f ile2.
embodiment 2:separate file is by transmission Control Server and data transfer server transmission.
As shown in Figure 3, separate file is by transmission Control Server and data transfer server transmission.
Based on the data safe transmission method of said system, when user A sends file f ile to user B, process as follows:
S1: user A carries out file separating treatment by the separating reducing processing unit of terminal A, divides following two and carries out:
S11: original text shelves file is separated into main body block file f ile1 and explant file f ile2 automatically, main body block file f ile1 and explant file f ile2 all can not recover original text separately, and both cooperations then can conveniently be reduced;
S12: the id information of user A, B is all encrypted by " PKI "; The filename of explant file f ile2 is by " PKI " encryption, generate encrypted characters string s_pointer, the ID of user A, B after s_pointer and encryption is inserted into the assigned address of main body block file f ile1, main body block file f ile1 points to explant file f ile2 by s_pointer, to realize the association of two files, because of s_pointer be encryption after filename, be called encryption pointers.
S2: separate file is sent by two different approaches:
S21: main body block file f ile1 by the general transmission device of terminal A, stores, forwards, send the terminal B at user B place to, the automatic reception process of terminal B backstage through data transfer server.Wherein, data transfer server provides real-time data transport service, when user A sends data to user B, first data transfer server receives and temporal data, then the online situation of the login of monitor user ' B, once B logs in online, immediately by data retransmission to user B;
S22: explant file f ile2 and encryption after user A, user B id information be sent to transmission Control Server d_server through terminal A private access device, preserve by transmission Control Server d_server is unified and manages control, the id information of user A, B of encryption is had only transmission Control Server d_server and could be obtained by " private key " deciphering.
S3: user B completes the acquisition of separate file and original text recovers according to the following steps:
S31: user B, by after terminal B reception main body block file f ile1, is saved in assigned address automatically, and the private access device of triggering terminal B;
S32: user B with the ID of user A, B of the encryption pointers s_pointer in main body block file f ile1 and encryption for parameter, propose explant file f ile2 to transmission Control Server d_server and obtain request;
S33: transmission Control Server d_server with the id information of " private key " enabling decryption of encrypted pointer s_pointer and user A, B, obtain the filename of explant file f ile2, be sent at user A in the file of user B and find explant file f ile2, and return user B;
The separating reducing processing unit of S34: user B startup terminal B, is reduced into original file by main body block file f ile1 and explant file f ile2;
S35: user B notification transmission Control Server d_server removes explant file f ile2.
The separating treatment algorithm that the step S1 of data safe transmission method adopts in above-described embodiment 1 and embodiment 2 is as follows:
S11: go characterization to convert, target eliminates original text shelves file format character, makes the information entropy in original text shelves file even as far as possible, by the contextual data correlation conversion of original text shelves file, formed without tag file, be designated as S0.
Mapping algorithm is selected with simple ripe for principle, and to ensure that system effectiveness is with reliable, specific implementation can adopt the mapping mode based on des encryption algorithm, and introduces the correlation of three initial vector IVs 1, IV2 and IV3 augmentation data, as shown in Figure 4.Utilize the ripe nonlinear transformation of cryptographic algorithm realization to original information, n-th data block and (n-1)th data block ciphertext, after the n-th-2 data block plaintext difference XORs, carry out des encryption conversion, this is in fact a kind of enhancement mode CBC(encrypted data chunk feedback) chain type encryption mode, enhance the relevance between data, due to the 1st, 2 data blocks lack the data clear text and ciphertext of participating in XOR, in program realizes, set initial vector IV 1, IV2 and IV3, to start the chain type encryption mode of positive-going transition, wherein initial vector IV 1, IV2 and IV3 is by program stochastic generation.Consider des encryption with the data block of 56 for converter unit, adopt 7B in the present implementation, the length of IV1, IV2 and IV3 is also 7B accordingly accordingly.
S12: information extraction, L are the size without tag file S0, and X, Y are suitable large positive integer.
L=lenth(S0), can L>10 be arranged;
Generate random positive integer m, (L+10000)/2X<m<(L+10000)/X;
Define arrays rp(m), rl(m), rs(m);
For i=1 to m;
Generate random positive integer r1 → rp(i), 1<r1<L;
Generate random positive integer r2 → rl(i), 0<r2<(L/Y)+1;
Position rp(i at S0), extract rl(i) individual byte, stored in rs(i);
Extract in S0 and sentence random data and insert;
Next i。
S13: data are packed:
By the initial vector IV 1 in S11, IV2, IV3, the rn in S2, array rp(m), rl(m), rs(m) to be packaged into a data file designation be file2, after being extracted without tag file S0 remainder called after file1.
After carrying out separating treatment by above step to original text shelves file, separate file file1, file2 all can not recover original text separately, and process is simply efficient, and retrieving algorithm is the algorithm for inversion of separation algorithm, are easy to equally realize.
As mentioned above, although represented with reference to specific preferred embodiment and described the present invention, it shall not be construed as the restriction to the present invention self.Under the spirit and scope of the present invention prerequisite not departing from claims definition, various change can be made in the form and details to it.Especially; main body block file described in this patent and explant file; respectively by certain transmission system and transmission Control Server; transmission is completed in the mode direct transferred and access control combines; as all sent the other side to by certain transmission system or transmission Control Server; be convenient to truth equally and there is good effect, therefore to this adjustment change, should patent protection be listed in.

Claims (8)

1. based on a data safe transmission system for information separated, it is characterized in that: comprise terminal system, data transmission system, public key management device and transmission Control Server; Described terminal system is arranged on each user terminal, has sending mode and receiving mode, and the terminal system being in sending mode is transmit leg, is in the terminal system of receiving mode for recipient; Described public key management device comprises a pair PKI double secret key, original is separated into main body block file and explant file by transmit leg, sending and receiving both sides ID is encrypted afterwards by " PKI " and explant file is sent to described transmission Control Server in the lump, the filename of explant file forms encryption pointers by " PKI " encryption and is inserted in main body block file, and the main body block file containing encryption pointers is directly sent to recipient by described data transmission system; Recipient receives the main body block file containing encryption pointers, be that parameter sends the request of explant file acquisition to described transmission Control Server with encryption pointers, described transmission Control Server is by " private key " enabling decryption of encrypted pointer and sending and receiving both sides ID, carry out file comparison and authentication, after success, explant file is back to recipient; Main body block file is become original with explant file access pattern by recipient.
2. the data safe transmission system based on information separated according to claim 1, is characterized in that: described terminal system comprises private access device, general transmission device, separating reducing processing unit; The described separating reducing processing unit of transmit leg is by original separated component from block file and main body block file, and main body block file is become original with explant file access pattern by the described separating reducing processing unit of recipient; The described general transmission device of transmit leg is used for main body block file to be directly sent to recipient by described data transmission system, and the described general transmission device of recipient is for receiving main body block file; The described private access device of transmit leg is for sending explant file and sending and receiving both sides ID extremely described transmission Control Server, and the described private access device of recipient is used for sending separate file to described transmission Control Server and obtains request, acquisition explant file.
3. the data safe transmission system based on information separated according to claim 1, is characterized in that: described transmission Control Server comprises subscriber's meter, explant database and access control apparatus; Described access control apparatus receives explant file and the sending and receiving both sides ID of the transmission of described transmit leg, be stored into described explant database, accept the explant file acquisition request of described recipient simultaneously, by described " private key " deciphering and certification, comparison, for legitimate request, corresponding explant file is back to described recipient.
4. the data safe transmission system based on information separated according to claim 1, it is characterized in that: described " PKI " is shared by all users, to the encryption of information during for transmitting, described " private key " is by transmitting Control Server alone for the decryption processing of information.
5. the data safe transmission system based on information separated according to claim 1, is characterized in that: described data transmission system comprises normal data transmission system, dedicated data transmission system and all kinds of mailing system.
6. based on a data safe transmission method for information separated, it is characterized in that, between transmit leg and recipient, comprise the steps:
S1: the separating treatment of original: original is separated into main body block file and explant file by the separating reducing processing unit of transmit leg automatically, be encrypted by " PKI " filename to explant file, generate encryption pointers and be inserted into the assigned address of main body block file, by " PKI ", sending and receiving both sides ID being encrypted simultaneously;
S2: file sends: the main body block file containing encryption pointers is directly reached recipient by data transmission system by the general transmission device of transmit leg, and explant file and sending and receiving both sides ID are sent to transmission Control Server by the private access device of transmit leg;
S3: the recovery of original: the general transmission device of recipient receive direct transfer containing temporary after the main body block file of encryption pointers, and start private access device, private access device with the encryption pointers in main body block file for parameter, the request of explant file acquisition is sent to transmission Control Server, transmission Control Server is by " private key " enabling decryption of encrypted pointer and receipts, send out both sides ID, carry out authentication, the filename of comparison explant file and receipts in explant database, send out both sides ID, after comparison success, corresponding explant file is back to recipient, main body block file and explant file are reverted to original by separating reducing processing unit by recipient.
7. the data safe transmission method based on information separated according to claim 6, is characterized in that: in described step S2, main body block file is direct transferred by common or dedicated data transmission system or mailing system; In described step S2, explant file and sending and receiving both sides ID are sent to transmission Control Server, are stored in explant database.
8. the data safe transmission method based on information separated according to claim 6, is characterized in that: in described step S1, and employing adds strong algorithms as follows and is encrypted described explant file and sending and receiving both sides ID:
A: set user $ as comprising the character string of sending and receiving both sides ID, L0 is its length;
B: get L0 character at explant file F0 assigned address, being designated as S0 $, S0 $ is unordered mess code;
After C:user $ and S0 $ carries out XOR conversion by binary system, as the sending and receiving both sides ID of encryption;
It is S1 $ that D:S0 $ encrypts postscript by " PKI ", is saved in F0 origin-location;
Following algorithm is adopted to be decrypted to described explant file and sending and receiving both sides ID in described step S3:
A: take out S1 $ at explant file F0 assigned address, be decrypted into S0 $ by " private key ";
B: in explant file F0, replaces S1 $ with S0 $, recovers original F0;
C: the sending and receiving both sides ID of encryption is carried out binary system XOR inverse transformation by S0 $, reduction comprises the character string user $ of sending and receiving both sides ID.
CN201510192667.0A 2015-04-21 2015-04-21 Data safe transmission system and method based on information separation Expired - Fee Related CN104735094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510192667.0A CN104735094B (en) 2015-04-21 2015-04-21 Data safe transmission system and method based on information separation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510192667.0A CN104735094B (en) 2015-04-21 2015-04-21 Data safe transmission system and method based on information separation

Publications (2)

Publication Number Publication Date
CN104735094A true CN104735094A (en) 2015-06-24
CN104735094B CN104735094B (en) 2018-02-27

Family

ID=53458528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510192667.0A Expired - Fee Related CN104735094B (en) 2015-04-21 2015-04-21 Data safe transmission system and method based on information separation

Country Status (1)

Country Link
CN (1) CN104735094B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208115A (en) * 2015-09-01 2015-12-30 南京伍安信息科技有限公司 Network-based file separate storage and transmission management system and method
CN105279453A (en) * 2015-09-25 2016-01-27 南京伍安信息科技有限公司 Separate storage management-supporting file partition hiding system and method thereof
CN111245818A (en) * 2020-01-08 2020-06-05 中国信息安全测评中心 File transmission method and system, sending end equipment and receiving end equipment
CN112153072A (en) * 2020-09-30 2020-12-29 重庆电子工程职业学院 Computer network information safety control device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455541A (en) * 2002-05-02 2003-11-12 富士施乐株式会社 Data transmission method and system
CN101047843A (en) * 2006-03-28 2007-10-03 中国科学院微电子研究所 Contents protection method based on contents partition
CN101072172A (en) * 2006-05-10 2007-11-14 李晓耕 Method and device for realizing network data high-efficiency transfer
CN102355426A (en) * 2011-06-30 2012-02-15 北京神州泰岳软件股份有限公司 Method for transmitting off-line file and system
CN103930880A (en) * 2011-11-10 2014-07-16 史克威尔·艾尼克斯有限公司 Data transmission and reception system
CN104270454A (en) * 2014-10-14 2015-01-07 无锡云捷科技有限公司 CDN dynamic application acceleration method based on data transmission optimizing system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455541A (en) * 2002-05-02 2003-11-12 富士施乐株式会社 Data transmission method and system
CN101047843A (en) * 2006-03-28 2007-10-03 中国科学院微电子研究所 Contents protection method based on contents partition
CN101072172A (en) * 2006-05-10 2007-11-14 李晓耕 Method and device for realizing network data high-efficiency transfer
CN102355426A (en) * 2011-06-30 2012-02-15 北京神州泰岳软件股份有限公司 Method for transmitting off-line file and system
CN103930880A (en) * 2011-11-10 2014-07-16 史克威尔·艾尼克斯有限公司 Data transmission and reception system
CN104270454A (en) * 2014-10-14 2015-01-07 无锡云捷科技有限公司 CDN dynamic application acceleration method based on data transmission optimizing system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208115A (en) * 2015-09-01 2015-12-30 南京伍安信息科技有限公司 Network-based file separate storage and transmission management system and method
CN105208115B (en) * 2015-09-01 2019-02-12 南京伍安信息科技有限公司 A kind of network-based file separation storage and transmission and management system and method
CN105279453A (en) * 2015-09-25 2016-01-27 南京伍安信息科技有限公司 Separate storage management-supporting file partition hiding system and method thereof
CN105279453B (en) * 2015-09-25 2018-04-06 南京伍安信息科技有限公司 It is a kind of to support the partitions of file for separating storage management to hide system and method
CN111245818A (en) * 2020-01-08 2020-06-05 中国信息安全测评中心 File transmission method and system, sending end equipment and receiving end equipment
CN112153072A (en) * 2020-09-30 2020-12-29 重庆电子工程职业学院 Computer network information safety control device

Also Published As

Publication number Publication date
CN104735094B (en) 2018-02-27

Similar Documents

Publication Publication Date Title
US10057052B2 (en) Data encryption cipher using rotating ports
US6125185A (en) System and method for encryption key generation
CN104023013A (en) Data transmission method, server side and client
CN105162599B (en) A kind of data transmission system and its transmission method
CN102082790B (en) Method and device for encryption/decryption of digital signature
US20120063597A1 (en) Apparatus and associated methodology for managing content control keys
CN106464488A (en) Information transmission method and mobile device
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN109005027B (en) Random data encryption and decryption method, device and system
CN104253694A (en) Encrypting method for network data transmission
KR20210124368A (en) End-to-end double ratchet encryption using epoch key exchange
CN113542428B (en) Vehicle data uploading method and device, vehicle, system and storage medium
CN105307160A (en) Data transmission method and device by use of Wi-Fi network
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN104735094A (en) Information separation based data security transmission system and method
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN106330432A (en) DES encryption algorithm based encryption method
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN111556004A (en) Hybrid dual network encryption system
CN103117850A (en) Cryptosystem based on random sequence database
CN104486756A (en) Encryption and decryption method and system for secret letter short message
CN113965382A (en) Tamper-proof method for bidding supervision list data encryption algorithm
CN115333845B (en) Privacy data verification method based on subset

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180227