CN107425970A - A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks - Google Patents

A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks Download PDF

Info

Publication number
CN107425970A
CN107425970A CN201710889923.0A CN201710889923A CN107425970A CN 107425970 A CN107425970 A CN 107425970A CN 201710889923 A CN201710889923 A CN 201710889923A CN 107425970 A CN107425970 A CN 107425970A
Authority
CN
China
Prior art keywords
file
key
symmetric key
encrypted
reception end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710889923.0A
Other languages
Chinese (zh)
Inventor
李敬贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710889923.0A priority Critical patent/CN107425970A/en
Publication of CN107425970A publication Critical patent/CN107425970A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

This application discloses a kind of document transmission method of P2P networks, this method includes:Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end;File reception end receives encrypted symmetric key, and encrypted symmetric key is decrypted using asymmetric decipherment algorithm, obtains symmetric key;File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encrypting file, and encryption file is sent to file reception end;File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains decrypting file.It can be seen that transmit symmetric key using rivest, shamir, adelman, symmetric encipherment algorithm transmits file, it is ensured that the security of file transmission, and the efficiency of transmission.Accordingly, the invention also discloses a kind of file transmitting terminal, file reception end and computer-readable recording medium, equally there is above beneficial effect.

Description

A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks
Technical field
The present invention relates to computer communication field, more particularly to a kind of document transmission method of P2P networks, transmitting terminal, connect Receiving end and medium.
Background technology
P2P (Peer-to-Peer, equity interconnection or P-2-P technology) is a kind of peer-to-peer network mould in computer network Type.It can realize that the different computers in computer network require no trunking, just directly exchange the number of communicating pair It is believed that breath.So this technology is widely used in the communications field, P2P technologies allow in network arbitrary node can be with Another node for needing to communicate in network is directly connected to, and carries out data exchange therewith, is fallen into a trap exactly because eliminating network The communication links of calculation machine node, so that the data exchange between network node becomes more efficient.
In the transmitting procedure of P2P files, the file of communicating pair is often transmitted using symmetric encipherment algorithm, though So, symmetric encipherment algorithm has the characteristics of transmission speed is fast, encryption efficiency is high.But file transmitting terminal and file reception end are all Using same key, the security of file transmission cannot be guaranteed, moreover, in the case, file reception end and file hair The number of keys that sending end possesses can be especially big, the high-efficiency operation of network has been had a strong impact on, so how to be realized with better method The transmission of P2P files, it is those skilled in the art's urgent problem to be solved.
The content of the invention
In view of this, it is an object of the invention to provide a kind of document transmission method of P2P networks, can both be protected with reaching The security of file transmission is demonstrate,proved, the purpose of file transmission high efficiency can be taken into account again.Its concrete scheme is as follows:
A kind of document transmission method of P2P networks, including:
Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, obtains encrypted symmetric key, and will The encrypted symmetric key is sent to file reception end;
The file reception end receives the encrypted symmetric key, and using asymmetric decipherment algorithm to the cryptographic symmetrical Key is decrypted, and obtains the symmetric key;
File is encrypted using symmetric encipherment algorithm and the symmetric key for the file transmitting terminal, obtains encryption text Part, and the encryption file is sent to the file reception end;
The file reception end receives the encryption file, and the encryption file is solved using the symmetric key It is close, obtain decrypting file.
Preferably, symmetric key is encrypted using rivest, shamir, adelman for the file transmitting terminal, obtains encryption pair Claim key, and the encrypted symmetric key is sent to the process at file reception end, including:
The file transmitting terminal, which is sent, creates key request to the file reception end;
The file reception end receives the establishment key request, creates asymmetric public key and asymmetric privacy keys, and by institute Asymmetric public key is stated to send to the file transmitting terminal;
The file transmitting terminal receives the asymmetric public key, creates the symmetric key, and use the asymmetric public affairs The symmetric key is encrypted key, obtains encrypted symmetric key, and the encrypted symmetric key is sent to the file Receiving terminal.
Preferably, the file reception end receives the encrypted symmetric key, and using asymmetric decipherment algorithm to described Encrypted symmetric key is decrypted, and obtains the process of the symmetric key, including:
The encrypted symmetric key is decrypted using the asymmetric privacy keys for the file reception end, and it is described right to obtain Claim key.
Preferably, the file transmitting terminal receives the asymmetric public key, creates the process of the symmetric key, including:
The file transmitting terminal receives the asymmetric public key, creates the symmetric key at random.
Accordingly, the invention also discloses a kind of file transmitting terminal, including:
Key sending module, for symmetric key to be encrypted using rivest, shamir, adelman, it is close to obtain cryptographic symmetrical Key, and the encrypted symmetric key is sent to file reception end;Wherein, the file reception end utilizes asymmetric decipherment algorithm The encrypted symmetric key is decrypted, obtains the symmetric key;
File sending module, for file to be encrypted using symmetric encipherment algorithm and the symmetric key, added Ciphertext part, and the encryption file is sent to the file reception end;Wherein, the file reception end receives the encryption text Part, and the encryption file is decrypted using the symmetric key, obtain decrypting file.
Preferably, the key sending module, including:
Request transmitting unit, key request is created to the file reception end for sending;Wherein, the file reception end The establishment key request is received, creates asymmetric public key and asymmetric privacy keys, and the asymmetric public key is sent to described File transmitting terminal;
Key handling unit, for receiving the asymmetric public key, the symmetric key is created, and using described asymmetric The symmetric key is encrypted public key, obtains encrypted symmetric key, and the encrypted symmetric key is sent to the text Part receiving terminal.
Accordingly, the invention also discloses a kind of file reception end, including:
Key reception module, for when the encrypted symmetric key for receiving the transmission of file transmitting terminal, then utilizing asymmetric solution The encrypted symmetric key is decrypted close algorithm, obtains the symmetric key;Wherein, the file transmitting terminal utilizes non-right Claim AES that the symmetric key is encrypted, obtain encrypted symmetric key, and by the encrypted symmetric key send to File reception end;
File decryption module, encryption file is received for working as, and the encryption file is entered using the symmetric key Row decryption, obtain decrypting file;Wherein, the encryption file is that the file transmitting terminal utilizes symmetric encipherment algorithm and described right Key-pair file is claimed to be encrypted, obtained encryption file.
Preferably, the key reception module, including:
Request reception unit, the establishment key request sent for receiving the file transmitting terminal, and create asymmetric public affairs Key and asymmetric privacy keys, and the asymmetric public key is sent to the file transmitting terminal;Wherein, the file transmitting terminal receives The asymmetric public key, the symmetric key is created, and the symmetric key is encrypted using the asymmetric public key, obtained Sent to encrypted symmetric key, and by the encrypted symmetric key to the file reception end.
Preferably, the key reception module, including:
Cipher key decryption unit, for the encrypted symmetric key to be decrypted using the asymmetric privacy keys, obtain institute State symmetric key.
Accordingly, the invention also discloses a kind of computer-readable recording medium, on the computer-readable recording medium Computer program is stored with, realizes that the file of P2P networks as previously disclosed passes when the computer program is executed by processor The step of transmission method.
In the present invention, a kind of document transmission method of P2P networks, including:File transmitting terminal is calculated using asymmetric encryption Symmetric key is encrypted method, obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end;File connects Receiving end receives encrypted symmetric key, and encrypted symmetric key is decrypted using asymmetric decipherment algorithm, obtains symmetric key; File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encrypting file, and will encrypt file Send to file reception end;File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains Decrypt file.It can be seen that in the present invention, symmetric key is transmitted using rivest, shamir, adelman, is passed using symmetric encipherment algorithm Defeated file, can be with using the method in the present invention compared to transmitting file only by symmetric encipherment algorithm in the prior art Ensure the security of file transmission, and the efficiency of transmission of file simultaneously.Accordingly, the invention also discloses a kind of transmission of file End, a kind of file reception end and a kind of computer-readable recording medium, equally have above beneficial effect.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of document transmission method flow chart for P2P networks that the embodiment of the present invention one provides;
Fig. 2 is a kind of document transmission method flow chart for P2P networks that the embodiment of the present invention two provides;
Fig. 3 is a kind of schematic diagram for file transmitting terminal that the embodiment of the present invention three provides;
Fig. 4 is a kind of schematic diagram at file reception end that the embodiment of the present invention four provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
The embodiment of the present invention one discloses a kind of document transmission method of P2P networks, as shown in figure 1, this method includes:
Step S11:Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, and it is close to obtain cryptographic symmetrical Key, and encrypted symmetric key is sent to file reception end.
Step S12:File reception end receives encrypted symmetric key, and using asymmetric decipherment algorithm to encrypted symmetric key It is decrypted, obtains symmetric key.
Step S13:File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encryption text Part, and encryption file is sent to file reception end.
Step S14:File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains Decrypt file.
It can be seen that in the present invention, symmetric key is transmitted using rivest, shamir, adelman, is transmitted using symmetric encipherment algorithm File, can be same using the method in the present invention compared to file is transmitted only by symmetric encipherment algorithm in the prior art When ensure the security of file transmission, and the efficiency of transmission of file.
The embodiment of the present invention two discloses a kind of document transmission method of specific P2P networks, relative to a upper embodiment, The present embodiment has made further instruction and optimization to technical scheme.It is as shown in Fig. 2 specific:
Step S21:File transmitting terminal, which is sent, creates key request to file reception end.
Step S22:File reception end, which receives, creates key request, creates asymmetric public key and asymmetric privacy keys, and will be non- Symmetrical public key is sent to file transmitting terminal.
Step S23:File transmitting terminal receives asymmetric public key, creates symmetric key, and will be symmetrical using asymmetric public key Key is encrypted, and obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end.
Specifically, in the present embodiment, file transmitting terminal receives asymmetric public key, creates symmetric key at random.
It is understood that when file transmitting terminal reception asymmetric public key, then a symmetric key can be created at random, to protect Demonstrate,prove the progress of subsequent step.
Step S24:Encrypted symmetric key is decrypted using asymmetric privacy keys for file reception end, obtains symmetric key.
Step S25:File is encrypted using symmetric encipherment algorithm and symmetric key for file transmitting terminal, obtains encryption text Part, and encryption file is sent to file reception end.
Step S26:File reception end receives encryption file, and encryption file is decrypted using symmetric key, obtains Decrypt file.
In the present embodiment, symmetric key is transmitted to asymmetric encryption, the process of file is transmitted using symmetric cryptography Specific elaboration has been carried out, has passed through the method in the present embodiment, it is ensured that the security of file transmission, and text can be taken into account The efficiency of part transmission.
Accordingly, the invention also discloses a kind of file transmitting terminal, as shown in figure 3, this document transmitting terminal includes:
Key sending module 31, for symmetric key to be encrypted using rivest, shamir, adelman, obtain cryptographic symmetrical Key, and encrypted symmetric key is sent to file reception end;Wherein, file reception end utilizes asymmetric decipherment algorithm to encryption Symmetric key is decrypted, and obtains symmetric key;
File sending module 32, for file to be encrypted using symmetric encipherment algorithm and symmetric key, encrypted File, and encryption file is sent to file reception end;Wherein, file reception end receives encryption file, and utilizes symmetric key Encryption file is decrypted, obtains decrypting file.
Preferably, key sending module 31, including:
Request transmitting unit, key request is created to file reception end for sending;Wherein, file reception end, which receives, creates Key request, asymmetric public key and asymmetric privacy keys are created, and asymmetric public key is sent to file transmitting terminal;
Key handling unit, for receiving asymmetric public key, symmetric key is created, and will be symmetrical close using asymmetric public key Key is encrypted, and obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end.
Accordingly, the invention also discloses a kind of file reception end, as shown in figure 4, this document receiving terminal includes:
Key reception module 41, the encrypted symmetric key of file transmitting terminal transmission is received for working as, then using asymmetric Encrypted symmetric key is decrypted decipherment algorithm, obtains symmetric key;Wherein, file transmitting terminal utilizes rivest, shamir, adelman Symmetric key is encrypted, obtains encrypted symmetric key, and encrypted symmetric key is sent to file reception end;
File decryption module 42, encryption file is received for working as, and encryption file is decrypted using symmetric key, Obtain decrypting file;Wherein, it is that file transmitting terminal is added using symmetric encipherment algorithm and symmetric key to file to encrypt file Encryption file that is close, obtaining.
Preferably, key reception module 41, including:
Request reception unit, for receive file transmitting terminal transmission establishment key request, and create asymmetric public key and Asymmetric privacy keys, and asymmetric public key is sent to file transmitting terminal;Wherein, file transmitting terminal receives asymmetric public key, creates Symmetric key, and symmetric key being encrypted using asymmetric public key, obtains encrypted symmetric key, and by encrypted symmetric key Send to file reception end.
Preferably, key reception module 41, including:
Cipher key decryption unit, encrypted symmetric key is decrypted using asymmetric privacy keys for file transmitting terminal, obtained Symmetric key.
Accordingly, the invention also discloses a kind of computer-readable recording medium, stored on computer-readable recording medium There is computer program, the step of the document transmission method of foregoing disclosed P2P networks is realized when computer program is executed by processor Suddenly.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
Above to a kind of document transmission method of P2P networks provided by the present invention, a kind of file transmitting terminal, a kind of file Receiving terminal and a kind of computer-readable recording medium are described in detail, and specific case used herein is to the present invention's Principle and embodiment are set forth, and the explanation of above example is only intended to help the method and its core for understanding the present invention Thought;Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, in embodiment and application Upper there will be changes, in summary, this specification content should not be construed as limiting the invention.

Claims (10)

  1. A kind of 1. document transmission method of P2P networks, it is characterised in that including:
    Symmetric key is encrypted using rivest, shamir, adelman for file transmitting terminal, obtains encrypted symmetric key, and by described in Encrypted symmetric key is sent to file reception end;
    The file reception end receives the encrypted symmetric key, and using asymmetric decipherment algorithm to the encrypted symmetric key It is decrypted, obtains the symmetric key;
    File is encrypted using symmetric encipherment algorithm and the symmetric key for the file transmitting terminal, obtains encrypting file, And the encryption file is sent to the file reception end;
    The file reception end receives the encryption file, and the encryption file is decrypted using the symmetric key, Obtain decrypting file.
  2. 2. according to the method for claim 1, it is characterised in that the file transmitting terminal will be right using rivest, shamir, adelman Claim key to be encrypted, obtain encrypted symmetric key, and the encrypted symmetric key is sent to the process at file reception end, bag Include:
    The file transmitting terminal, which is sent, creates key request to the file reception end;
    The file reception end receives the establishment key request, creates asymmetric public key and asymmetric privacy keys, and will be described non- Symmetrical public key is sent to the file transmitting terminal;
    The file transmitting terminal receives the asymmetric public key, creates the symmetric key, and use the asymmetric public key pair The symmetric key is encrypted, and obtains encrypted symmetric key, and the encrypted symmetric key is sent to the file reception End.
  3. 3. according to the method for claim 2, it is characterised in that the file reception end receives the encrypted symmetric key, And the encrypted symmetric key is decrypted using asymmetric decipherment algorithm, the symmetric key is obtained, including:
    The encrypted symmetric key is decrypted using the asymmetric privacy keys for the file reception end, is obtained described symmetrical close Key.
  4. 4. according to the method for claim 2, it is characterised in that the file transmitting terminal receives the asymmetric public key, wound The process of the symmetric key is built, including:
    The file transmitting terminal receives the asymmetric public key, creates the symmetric key at random.
  5. A kind of 5. file transmitting terminal, it is characterised in that including:
    Key sending module, for symmetric key to be encrypted using rivest, shamir, adelman, encrypted symmetric key is obtained, and The encrypted symmetric key is sent to file reception end;Wherein, the file reception end utilizes asymmetric decipherment algorithm to institute State encrypted symmetric key to be decrypted, obtain the symmetric key;
    File sending module, for file to be encrypted using symmetric encipherment algorithm and the symmetric key, obtain encryption text Part, and the encryption file is sent to the file reception end;Wherein, the file reception end receives the encryption file, And the encryption file is decrypted using the symmetric key, obtain decrypting file.
  6. 6. file transmitting terminal according to claim 5, it is characterised in that the key sending module, including:
    Request transmitting unit, key request is created to the file reception end for sending;Wherein, the file reception end receives The establishment key request, asymmetric public key and asymmetric privacy keys are created, and the asymmetric public key is sent to the file Transmitting terminal;
    Key handling unit, for receiving the asymmetric public key, the symmetric key is created, and use the asymmetric public key The symmetric key is encrypted, obtains encrypted symmetric key, and the encrypted symmetric key is sent to the file and connect Receiving end.
  7. A kind of 7. file reception end, it is characterised in that including:
    Key reception module, for when the encrypted symmetric key for receiving the transmission of file transmitting terminal, then being calculated using asymmetric decryption The encrypted symmetric key is decrypted method, obtains the symmetric key;Wherein, the file transmitting terminal is added using asymmetric The symmetric key is encrypted close algorithm, obtains encrypted symmetric key, and the encrypted symmetric key is sent to file Receiving terminal;
    File decryption module, encryption file is received for working as, and the encryption file is solved using the symmetric key It is close, obtain decrypting file;Wherein, to be the file transmitting terminal utilize symmetric encipherment algorithm and described symmetrical close with the encryption file File is encrypted key, obtained encryption file.
  8. 8. file reception end according to claim 7, it is characterised in that the key reception module, including:
    Request reception unit, the establishment key request sent for receiving the file transmitting terminal, and create asymmetric public key and Asymmetric privacy keys, and the asymmetric public key is sent to the file transmitting terminal;Wherein, described in the file transmitting terminal receives Asymmetric public key, the symmetric key is created, and the symmetric key is encrypted using the asymmetric public key, added Close symmetric key, and the encrypted symmetric key is sent to the file reception end.
  9. 9. file reception end according to claim 8, it is characterised in that the key reception module, including:
    Cipher key decryption unit, for the encrypted symmetric key to be decrypted using the asymmetric privacy keys, it is described right to obtain Claim key.
  10. 10. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, realize that the file of the P2P networks as described in any one of Claims 1-4 passes when the computer program is executed by processor The step of transmission method.
CN201710889923.0A 2017-09-27 2017-09-27 A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks Pending CN107425970A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710889923.0A CN107425970A (en) 2017-09-27 2017-09-27 A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710889923.0A CN107425970A (en) 2017-09-27 2017-09-27 A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks

Publications (1)

Publication Number Publication Date
CN107425970A true CN107425970A (en) 2017-12-01

Family

ID=60435851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710889923.0A Pending CN107425970A (en) 2017-09-27 2017-09-27 A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks

Country Status (1)

Country Link
CN (1) CN107425970A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525666A (en) * 2018-11-16 2019-03-26 维沃移动通信有限公司 A kind of data back up method and mobile terminal
CN109995715A (en) * 2017-12-29 2019-07-09 百度在线网络技术(北京)有限公司 Private data encipher-decipher method, device, equipment and the storage medium of block chain
WO2020172874A1 (en) * 2019-02-28 2020-09-03 华为技术有限公司 File processing method and terminal device
CN113014580A (en) * 2021-02-24 2021-06-22 天津中新智冠信息技术有限公司 File transmission method and device, electronic equipment and storage medium
CN113259438A (en) * 2021-05-14 2021-08-13 北京达佳互联信息技术有限公司 Method and device for sending model file and method and device for receiving model file
CN114745134A (en) * 2022-03-30 2022-07-12 恒玄科技(上海)股份有限公司 Method, system, equipment and computer readable medium for transferring media data stream
CN114760081A (en) * 2020-12-28 2022-07-15 富泰华工业(深圳)有限公司 File encryption and decryption method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859416A (en) * 2006-01-13 2006-11-08 南京邮电大学 Service network safety system structure plan based on reciprocity calculation
CN103916480A (en) * 2014-04-15 2014-07-09 武汉理工大学 File encrypting system for shared file
CN104243439A (en) * 2013-11-12 2014-12-24 新华瑞德(北京)网络科技有限公司 File transfer processing method and system and terminals
CN106254324A (en) * 2016-07-26 2016-12-21 杭州文签网络技术有限公司 A kind of encryption method storing file and device
CN106506470A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859416A (en) * 2006-01-13 2006-11-08 南京邮电大学 Service network safety system structure plan based on reciprocity calculation
CN104243439A (en) * 2013-11-12 2014-12-24 新华瑞德(北京)网络科技有限公司 File transfer processing method and system and terminals
CN103916480A (en) * 2014-04-15 2014-07-09 武汉理工大学 File encrypting system for shared file
CN106254324A (en) * 2016-07-26 2016-12-21 杭州文签网络技术有限公司 A kind of encryption method storing file and device
CN106506470A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995715A (en) * 2017-12-29 2019-07-09 百度在线网络技术(北京)有限公司 Private data encipher-decipher method, device, equipment and the storage medium of block chain
CN109525666A (en) * 2018-11-16 2019-03-26 维沃移动通信有限公司 A kind of data back up method and mobile terminal
WO2020172874A1 (en) * 2019-02-28 2020-09-03 华为技术有限公司 File processing method and terminal device
CN114760081A (en) * 2020-12-28 2022-07-15 富泰华工业(深圳)有限公司 File encryption and decryption method and device and electronic equipment
CN113014580A (en) * 2021-02-24 2021-06-22 天津中新智冠信息技术有限公司 File transmission method and device, electronic equipment and storage medium
CN113259438A (en) * 2021-05-14 2021-08-13 北京达佳互联信息技术有限公司 Method and device for sending model file and method and device for receiving model file
CN114745134A (en) * 2022-03-30 2022-07-12 恒玄科技(上海)股份有限公司 Method, system, equipment and computer readable medium for transferring media data stream

Similar Documents

Publication Publication Date Title
CN107425970A (en) A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks
CN104641617B (en) A kind of cipher key interaction method and device
US9379891B2 (en) Method and system for ID-based encryption and decryption
CN108510270B (en) Mobile transfer method with safe quantum
CN101980558B (en) Method for encryption authentication on Ad hoc network transmission layer protocol
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN101707767B (en) Data transmission method and devices
CN102035845B (en) Switching equipment for supporting link layer secrecy transmission and data processing method thereof
CN102025505A (en) Advanced encryption standard (AES) algorithm-based encryption/decryption method and device
CN104506483A (en) Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN1938980A (en) Method and apparatus for cryptographically processing data
CN101651539A (en) updating and distributing encryption keys
CN107770127A (en) The transmission method and device of a kind of data
CN112740733A (en) Secure access method and device
CN102869013A (en) Secure communication system based on wireless channel characteristic
CN109586908A (en) A kind of safe packet transmission method and its system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN104202158A (en) Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing
CN109344639A (en) A kind of distribution automation double protection safety chip, data transmission method and equipment
CN100594691C (en) Data transmission encryption method of MANET network
CN110138795A (en) A kind of multistep in communication process mixes encipher-decipher method
CN102891848A (en) Method for carrying out encryption and decryption by using IPSec security association
CN101047945B (en) Mobile communication system and customer temporary identity distribution method
CN105827601A (en) Data encryption application method and system of mobile device
Gaur et al. A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171201

RJ01 Rejection of invention patent application after publication