CN107425970A - A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks - Google Patents
A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks Download PDFInfo
- Publication number
- CN107425970A CN107425970A CN201710889923.0A CN201710889923A CN107425970A CN 107425970 A CN107425970 A CN 107425970A CN 201710889923 A CN201710889923 A CN 201710889923A CN 107425970 A CN107425970 A CN 107425970A
- Authority
- CN
- China
- Prior art keywords
- file
- key
- symmetric key
- encrypted
- reception end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Abstract
This application discloses a kind of document transmission method of P2P networks, this method includes:Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end;File reception end receives encrypted symmetric key, and encrypted symmetric key is decrypted using asymmetric decipherment algorithm, obtains symmetric key;File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encrypting file, and encryption file is sent to file reception end;File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains decrypting file.It can be seen that transmit symmetric key using rivest, shamir, adelman, symmetric encipherment algorithm transmits file, it is ensured that the security of file transmission, and the efficiency of transmission.Accordingly, the invention also discloses a kind of file transmitting terminal, file reception end and computer-readable recording medium, equally there is above beneficial effect.
Description
Technical field
The present invention relates to computer communication field, more particularly to a kind of document transmission method of P2P networks, transmitting terminal, connect
Receiving end and medium.
Background technology
P2P (Peer-to-Peer, equity interconnection or P-2-P technology) is a kind of peer-to-peer network mould in computer network
Type.It can realize that the different computers in computer network require no trunking, just directly exchange the number of communicating pair
It is believed that breath.So this technology is widely used in the communications field, P2P technologies allow in network arbitrary node can be with
Another node for needing to communicate in network is directly connected to, and carries out data exchange therewith, is fallen into a trap exactly because eliminating network
The communication links of calculation machine node, so that the data exchange between network node becomes more efficient.
In the transmitting procedure of P2P files, the file of communicating pair is often transmitted using symmetric encipherment algorithm, though
So, symmetric encipherment algorithm has the characteristics of transmission speed is fast, encryption efficiency is high.But file transmitting terminal and file reception end are all
Using same key, the security of file transmission cannot be guaranteed, moreover, in the case, file reception end and file hair
The number of keys that sending end possesses can be especially big, the high-efficiency operation of network has been had a strong impact on, so how to be realized with better method
The transmission of P2P files, it is those skilled in the art's urgent problem to be solved.
The content of the invention
In view of this, it is an object of the invention to provide a kind of document transmission method of P2P networks, can both be protected with reaching
The security of file transmission is demonstrate,proved, the purpose of file transmission high efficiency can be taken into account again.Its concrete scheme is as follows:
A kind of document transmission method of P2P networks, including:
Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, obtains encrypted symmetric key, and will
The encrypted symmetric key is sent to file reception end;
The file reception end receives the encrypted symmetric key, and using asymmetric decipherment algorithm to the cryptographic symmetrical
Key is decrypted, and obtains the symmetric key;
File is encrypted using symmetric encipherment algorithm and the symmetric key for the file transmitting terminal, obtains encryption text
Part, and the encryption file is sent to the file reception end;
The file reception end receives the encryption file, and the encryption file is solved using the symmetric key
It is close, obtain decrypting file.
Preferably, symmetric key is encrypted using rivest, shamir, adelman for the file transmitting terminal, obtains encryption pair
Claim key, and the encrypted symmetric key is sent to the process at file reception end, including:
The file transmitting terminal, which is sent, creates key request to the file reception end;
The file reception end receives the establishment key request, creates asymmetric public key and asymmetric privacy keys, and by institute
Asymmetric public key is stated to send to the file transmitting terminal;
The file transmitting terminal receives the asymmetric public key, creates the symmetric key, and use the asymmetric public affairs
The symmetric key is encrypted key, obtains encrypted symmetric key, and the encrypted symmetric key is sent to the file
Receiving terminal.
Preferably, the file reception end receives the encrypted symmetric key, and using asymmetric decipherment algorithm to described
Encrypted symmetric key is decrypted, and obtains the process of the symmetric key, including:
The encrypted symmetric key is decrypted using the asymmetric privacy keys for the file reception end, and it is described right to obtain
Claim key.
Preferably, the file transmitting terminal receives the asymmetric public key, creates the process of the symmetric key, including:
The file transmitting terminal receives the asymmetric public key, creates the symmetric key at random.
Accordingly, the invention also discloses a kind of file transmitting terminal, including:
Key sending module, for symmetric key to be encrypted using rivest, shamir, adelman, it is close to obtain cryptographic symmetrical
Key, and the encrypted symmetric key is sent to file reception end;Wherein, the file reception end utilizes asymmetric decipherment algorithm
The encrypted symmetric key is decrypted, obtains the symmetric key;
File sending module, for file to be encrypted using symmetric encipherment algorithm and the symmetric key, added
Ciphertext part, and the encryption file is sent to the file reception end;Wherein, the file reception end receives the encryption text
Part, and the encryption file is decrypted using the symmetric key, obtain decrypting file.
Preferably, the key sending module, including:
Request transmitting unit, key request is created to the file reception end for sending;Wherein, the file reception end
The establishment key request is received, creates asymmetric public key and asymmetric privacy keys, and the asymmetric public key is sent to described
File transmitting terminal;
Key handling unit, for receiving the asymmetric public key, the symmetric key is created, and using described asymmetric
The symmetric key is encrypted public key, obtains encrypted symmetric key, and the encrypted symmetric key is sent to the text
Part receiving terminal.
Accordingly, the invention also discloses a kind of file reception end, including:
Key reception module, for when the encrypted symmetric key for receiving the transmission of file transmitting terminal, then utilizing asymmetric solution
The encrypted symmetric key is decrypted close algorithm, obtains the symmetric key;Wherein, the file transmitting terminal utilizes non-right
Claim AES that the symmetric key is encrypted, obtain encrypted symmetric key, and by the encrypted symmetric key send to
File reception end;
File decryption module, encryption file is received for working as, and the encryption file is entered using the symmetric key
Row decryption, obtain decrypting file;Wherein, the encryption file is that the file transmitting terminal utilizes symmetric encipherment algorithm and described right
Key-pair file is claimed to be encrypted, obtained encryption file.
Preferably, the key reception module, including:
Request reception unit, the establishment key request sent for receiving the file transmitting terminal, and create asymmetric public affairs
Key and asymmetric privacy keys, and the asymmetric public key is sent to the file transmitting terminal;Wherein, the file transmitting terminal receives
The asymmetric public key, the symmetric key is created, and the symmetric key is encrypted using the asymmetric public key, obtained
Sent to encrypted symmetric key, and by the encrypted symmetric key to the file reception end.
Preferably, the key reception module, including:
Cipher key decryption unit, for the encrypted symmetric key to be decrypted using the asymmetric privacy keys, obtain institute
State symmetric key.
Accordingly, the invention also discloses a kind of computer-readable recording medium, on the computer-readable recording medium
Computer program is stored with, realizes that the file of P2P networks as previously disclosed passes when the computer program is executed by processor
The step of transmission method.
In the present invention, a kind of document transmission method of P2P networks, including:File transmitting terminal is calculated using asymmetric encryption
Symmetric key is encrypted method, obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end;File connects
Receiving end receives encrypted symmetric key, and encrypted symmetric key is decrypted using asymmetric decipherment algorithm, obtains symmetric key;
File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encrypting file, and will encrypt file
Send to file reception end;File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains
Decrypt file.It can be seen that in the present invention, symmetric key is transmitted using rivest, shamir, adelman, is passed using symmetric encipherment algorithm
Defeated file, can be with using the method in the present invention compared to transmitting file only by symmetric encipherment algorithm in the prior art
Ensure the security of file transmission, and the efficiency of transmission of file simultaneously.Accordingly, the invention also discloses a kind of transmission of file
End, a kind of file reception end and a kind of computer-readable recording medium, equally have above beneficial effect.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of document transmission method flow chart for P2P networks that the embodiment of the present invention one provides;
Fig. 2 is a kind of document transmission method flow chart for P2P networks that the embodiment of the present invention two provides;
Fig. 3 is a kind of schematic diagram for file transmitting terminal that the embodiment of the present invention three provides;
Fig. 4 is a kind of schematic diagram at file reception end that the embodiment of the present invention four provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
The embodiment of the present invention one discloses a kind of document transmission method of P2P networks, as shown in figure 1, this method includes:
Step S11:Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, and it is close to obtain cryptographic symmetrical
Key, and encrypted symmetric key is sent to file reception end.
Step S12:File reception end receives encrypted symmetric key, and using asymmetric decipherment algorithm to encrypted symmetric key
It is decrypted, obtains symmetric key.
Step S13:File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encryption text
Part, and encryption file is sent to file reception end.
Step S14:File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains
Decrypt file.
It can be seen that in the present invention, symmetric key is transmitted using rivest, shamir, adelman, is transmitted using symmetric encipherment algorithm
File, can be same using the method in the present invention compared to file is transmitted only by symmetric encipherment algorithm in the prior art
When ensure the security of file transmission, and the efficiency of transmission of file.
The embodiment of the present invention two discloses a kind of document transmission method of specific P2P networks, relative to a upper embodiment,
The present embodiment has made further instruction and optimization to technical scheme.It is as shown in Fig. 2 specific:
Step S21:File transmitting terminal, which is sent, creates key request to file reception end.
Step S22:File reception end, which receives, creates key request, creates asymmetric public key and asymmetric privacy keys, and will be non-
Symmetrical public key is sent to file transmitting terminal.
Step S23:File transmitting terminal receives asymmetric public key, creates symmetric key, and will be symmetrical using asymmetric public key
Key is encrypted, and obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end.
Specifically, in the present embodiment, file transmitting terminal receives asymmetric public key, creates symmetric key at random.
It is understood that when file transmitting terminal reception asymmetric public key, then a symmetric key can be created at random, to protect
Demonstrate,prove the progress of subsequent step.
Step S24:Encrypted symmetric key is decrypted using asymmetric privacy keys for file reception end, obtains symmetric key.
Step S25:File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encryption text
Part, and encryption file is sent to file reception end.
Step S26:File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains
Decrypt file.
In the present embodiment, symmetric key is transmitted to asymmetric encryption, the process of file is transmitted using symmetric cryptography
Specific elaboration has been carried out, has passed through the method in the present embodiment, it is ensured that the security of file transmission, and text can be taken into account
The efficiency of part transmission.
Accordingly, the invention also discloses a kind of file transmitting terminal, as shown in figure 3, this document transmitting terminal includes:
Key sending module 31, for symmetric key to be encrypted using rivest, shamir, adelman, obtain cryptographic symmetrical
Key, and encrypted symmetric key is sent to file reception end;Wherein, file reception end utilizes asymmetric decipherment algorithm to encryption
Symmetric key is decrypted, and obtains symmetric key;
File sending module 32, for file to be encrypted using symmetric encipherment algorithm and symmetric key, encrypted
File, and encryption file is sent to file reception end;Wherein, file reception end receives encryption file, and utilizes symmetric key
Encryption file is decrypted, obtains decrypting file.
Preferably, key sending module 31, including:
Request transmitting unit, key request is created to file reception end for sending;Wherein, file reception end, which receives, creates
Key request, asymmetric public key and asymmetric privacy keys are created, and asymmetric public key is sent to file transmitting terminal;
Key handling unit, for receiving asymmetric public key, symmetric key is created, and will be symmetrical close using asymmetric public key
Key is encrypted, and obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end.
Accordingly, the invention also discloses a kind of file reception end, as shown in figure 4, this document receiving terminal includes:
Key reception module 41, the encrypted symmetric key of file transmitting terminal transmission is received for working as, then using asymmetric
Encrypted symmetric key is decrypted decipherment algorithm, obtains symmetric key;Wherein, file transmitting terminal utilizes rivest, shamir, adelman
Symmetric key is encrypted, obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end;
File decryption module 42, encryption file is received for working as, and encryption file is decrypted using symmetric key,
Obtain decrypting file;Wherein, it is that file transmitting terminal is added using symmetric encipherment algorithm and symmetric key to file to encrypt file
Encryption file that is close, obtaining.
Preferably, key reception module 41, including:
Request reception unit, for receive file transmitting terminal transmission establishment key request, and create asymmetric public key and
Asymmetric privacy keys, and asymmetric public key is sent to file transmitting terminal;Wherein, file transmitting terminal receives asymmetric public key, creates
Symmetric key, and symmetric key being encrypted using asymmetric public key, obtains encrypted symmetric key, and by encrypted symmetric key
Send to file reception end.
Preferably, key reception module 41, including:
Cipher key decryption unit, encrypted symmetric key is decrypted using asymmetric privacy keys for file transmitting terminal, obtained
Symmetric key.
Accordingly, the invention also discloses a kind of computer-readable recording medium, stored on computer-readable recording medium
There is computer program, the step of the document transmission method of foregoing disclosed P2P networks is realized when computer program is executed by processor
Suddenly.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that
A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged
Except other identical element in the process including the key element, method, article or equipment being also present.
Above to a kind of document transmission method of P2P networks provided by the present invention, a kind of file transmitting terminal, a kind of file
Receiving terminal and a kind of computer-readable recording medium are described in detail, and specific case used herein is to the present invention's
Principle and embodiment are set forth, and the explanation of above example is only intended to help the method and its core for understanding the present invention
Thought;Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, in embodiment and application
Upper there will be changes, in summary, this specification content should not be construed as limiting the invention.
Claims (10)
- A kind of 1. document transmission method of P2P networks, it is characterised in that including:Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, obtains encrypted symmetric key, and by described in Encrypted symmetric key is sent to file reception end;The file reception end receives the encrypted symmetric key, and using asymmetric decipherment algorithm to the encrypted symmetric key It is decrypted, obtains the symmetric key;File is encrypted using symmetric encipherment algorithm and the symmetric key for the file transmitting terminal, obtains encrypting file, And the encryption file is sent to the file reception end;The file reception end receives the encryption file, and the encryption file is decrypted using the symmetric key, Obtain decrypting file.
- 2. according to the method for claim 1, it is characterised in that the file transmitting terminal will be right using rivest, shamir, adelman Claim key to be encrypted, obtain encrypted symmetric key, and the encrypted symmetric key is sent to the process at file reception end, bag Include:The file transmitting terminal, which is sent, creates key request to the file reception end;The file reception end receives the establishment key request, creates asymmetric public key and asymmetric privacy keys, and will be described non- Symmetrical public key is sent to the file transmitting terminal;The file transmitting terminal receives the asymmetric public key, creates the symmetric key, and use the asymmetric public key pair The symmetric key is encrypted, and obtains encrypted symmetric key, and the encrypted symmetric key is sent to the file reception End.
- 3. according to the method for claim 2, it is characterised in that the file reception end receives the encrypted symmetric key, And the encrypted symmetric key is decrypted using asymmetric decipherment algorithm, the symmetric key is obtained, including:The encrypted symmetric key is decrypted using the asymmetric privacy keys for the file reception end, is obtained described symmetrical close Key.
- 4. according to the method for claim 2, it is characterised in that the file transmitting terminal receives the asymmetric public key, wound The process of the symmetric key is built, including:The file transmitting terminal receives the asymmetric public key, creates the symmetric key at random.
- A kind of 5. file transmitting terminal, it is characterised in that including:Key sending module, for symmetric key to be encrypted using rivest, shamir, adelman, encrypted symmetric key is obtained, and The encrypted symmetric key is sent to file reception end;Wherein, the file reception end utilizes asymmetric decipherment algorithm to institute State encrypted symmetric key to be decrypted, obtain the symmetric key;File sending module, for file to be encrypted using symmetric encipherment algorithm and the symmetric key, obtain encryption text Part, and the encryption file is sent to the file reception end;Wherein, the file reception end receives the encryption file, And the encryption file is decrypted using the symmetric key, obtain decrypting file.
- 6. file transmitting terminal according to claim 5, it is characterised in that the key sending module, including:Request transmitting unit, key request is created to the file reception end for sending;Wherein, the file reception end receives The establishment key request, asymmetric public key and asymmetric privacy keys are created, and the asymmetric public key is sent to the file Transmitting terminal;Key handling unit, for receiving the asymmetric public key, the symmetric key is created, and use the asymmetric public key The symmetric key is encrypted, obtains encrypted symmetric key, and the encrypted symmetric key is sent to the file and connect Receiving end.
- A kind of 7. file reception end, it is characterised in that including:Key reception module, for when the encrypted symmetric key for receiving the transmission of file transmitting terminal, then being calculated using asymmetric decryption The encrypted symmetric key is decrypted method, obtains the symmetric key;Wherein, the file transmitting terminal is added using asymmetric The symmetric key is encrypted close algorithm, obtains encrypted symmetric key, and the encrypted symmetric key is sent to file Receiving terminal;File decryption module, encryption file is received for working as, and the encryption file is solved using the symmetric key It is close, obtain decrypting file;Wherein, to be the file transmitting terminal utilize symmetric encipherment algorithm and described symmetrical close with the encryption file File is encrypted key, obtained encryption file.
- 8. file reception end according to claim 7, it is characterised in that the key reception module, including:Request reception unit, the establishment key request sent for receiving the file transmitting terminal, and create asymmetric public key and Asymmetric privacy keys, and the asymmetric public key is sent to the file transmitting terminal;Wherein, described in the file transmitting terminal receives Asymmetric public key, the symmetric key is created, and the symmetric key is encrypted using the asymmetric public key, added Close symmetric key, and the encrypted symmetric key is sent to the file reception end.
- 9. file reception end according to claim 8, it is characterised in that the key reception module, including:Cipher key decryption unit, for the encrypted symmetric key to be decrypted using the asymmetric privacy keys, it is described right to obtain Claim key.
- 10. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, realize that the file of the P2P networks as described in any one of Claims 1-4 passes when the computer program is executed by processor The step of transmission method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710889923.0A CN107425970A (en) | 2017-09-27 | 2017-09-27 | A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710889923.0A CN107425970A (en) | 2017-09-27 | 2017-09-27 | A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107425970A true CN107425970A (en) | 2017-12-01 |
Family
ID=60435851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710889923.0A Pending CN107425970A (en) | 2017-09-27 | 2017-09-27 | A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107425970A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109525666A (en) * | 2018-11-16 | 2019-03-26 | 维沃移动通信有限公司 | A kind of data back up method and mobile terminal |
CN109995715A (en) * | 2017-12-29 | 2019-07-09 | 百度在线网络技术(北京)有限公司 | Private data encipher-decipher method, device, equipment and the storage medium of block chain |
WO2020172874A1 (en) * | 2019-02-28 | 2020-09-03 | 华为技术有限公司 | File processing method and terminal device |
CN113014580A (en) * | 2021-02-24 | 2021-06-22 | 天津中新智冠信息技术有限公司 | File transmission method and device, electronic equipment and storage medium |
CN113259438A (en) * | 2021-05-14 | 2021-08-13 | 北京达佳互联信息技术有限公司 | Method and device for sending model file and method and device for receiving model file |
CN114745134A (en) * | 2022-03-30 | 2022-07-12 | 恒玄科技(上海)股份有限公司 | Method, system, equipment and computer readable medium for transferring media data stream |
CN114760081A (en) * | 2020-12-28 | 2022-07-15 | 富泰华工业(深圳)有限公司 | File encryption and decryption method and device and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859416A (en) * | 2006-01-13 | 2006-11-08 | 南京邮电大学 | Service network safety system structure plan based on reciprocity calculation |
CN103916480A (en) * | 2014-04-15 | 2014-07-09 | 武汉理工大学 | File encrypting system for shared file |
CN104243439A (en) * | 2013-11-12 | 2014-12-24 | 新华瑞德(北京)网络科技有限公司 | File transfer processing method and system and terminals |
CN106254324A (en) * | 2016-07-26 | 2016-12-21 | 杭州文签网络技术有限公司 | A kind of encryption method storing file and device |
CN106506470A (en) * | 2016-10-31 | 2017-03-15 | 大唐高鸿信安(浙江)信息科技有限公司 | network data security transmission method |
-
2017
- 2017-09-27 CN CN201710889923.0A patent/CN107425970A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859416A (en) * | 2006-01-13 | 2006-11-08 | 南京邮电大学 | Service network safety system structure plan based on reciprocity calculation |
CN104243439A (en) * | 2013-11-12 | 2014-12-24 | 新华瑞德(北京)网络科技有限公司 | File transfer processing method and system and terminals |
CN103916480A (en) * | 2014-04-15 | 2014-07-09 | 武汉理工大学 | File encrypting system for shared file |
CN106254324A (en) * | 2016-07-26 | 2016-12-21 | 杭州文签网络技术有限公司 | A kind of encryption method storing file and device |
CN106506470A (en) * | 2016-10-31 | 2017-03-15 | 大唐高鸿信安(浙江)信息科技有限公司 | network data security transmission method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995715A (en) * | 2017-12-29 | 2019-07-09 | 百度在线网络技术(北京)有限公司 | Private data encipher-decipher method, device, equipment and the storage medium of block chain |
CN109525666A (en) * | 2018-11-16 | 2019-03-26 | 维沃移动通信有限公司 | A kind of data back up method and mobile terminal |
WO2020172874A1 (en) * | 2019-02-28 | 2020-09-03 | 华为技术有限公司 | File processing method and terminal device |
CN114760081A (en) * | 2020-12-28 | 2022-07-15 | 富泰华工业(深圳)有限公司 | File encryption and decryption method and device and electronic equipment |
CN113014580A (en) * | 2021-02-24 | 2021-06-22 | 天津中新智冠信息技术有限公司 | File transmission method and device, electronic equipment and storage medium |
CN113259438A (en) * | 2021-05-14 | 2021-08-13 | 北京达佳互联信息技术有限公司 | Method and device for sending model file and method and device for receiving model file |
CN114745134A (en) * | 2022-03-30 | 2022-07-12 | 恒玄科技(上海)股份有限公司 | Method, system, equipment and computer readable medium for transferring media data stream |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107425970A (en) | A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks | |
CN104641617B (en) | A kind of cipher key interaction method and device | |
US9379891B2 (en) | Method and system for ID-based encryption and decryption | |
CN108510270B (en) | Mobile transfer method with safe quantum | |
CN101980558B (en) | Method for encryption authentication on Ad hoc network transmission layer protocol | |
US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
CN101707767B (en) | Data transmission method and devices | |
CN102035845B (en) | Switching equipment for supporting link layer secrecy transmission and data processing method thereof | |
CN102025505A (en) | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device | |
CN104506483A (en) | Method for encrypting and decrypting information and managing secret key as well as terminal and network server | |
CN1938980A (en) | Method and apparatus for cryptographically processing data | |
CN101651539A (en) | updating and distributing encryption keys | |
CN107770127A (en) | The transmission method and device of a kind of data | |
CN112740733A (en) | Secure access method and device | |
CN102869013A (en) | Secure communication system based on wireless channel characteristic | |
CN109586908A (en) | A kind of safe packet transmission method and its system | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN104202158A (en) | Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing | |
CN109344639A (en) | A kind of distribution automation double protection safety chip, data transmission method and equipment | |
CN100594691C (en) | Data transmission encryption method of MANET network | |
CN110138795A (en) | A kind of multistep in communication process mixes encipher-decipher method | |
CN102891848A (en) | Method for carrying out encryption and decryption by using IPSec security association | |
CN101047945B (en) | Mobile communication system and customer temporary identity distribution method | |
CN105827601A (en) | Data encryption application method and system of mobile device | |
Gaur et al. | A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171201 |
|
RJ01 | Rejection of invention patent application after publication |