CN104182697B - File encrypting method and device - Google Patents

File encrypting method and device Download PDF

Info

Publication number
CN104182697B
CN104182697B CN201410403711.3A CN201410403711A CN104182697B CN 104182697 B CN104182697 B CN 104182697B CN 201410403711 A CN201410403711 A CN 201410403711A CN 104182697 B CN104182697 B CN 104182697B
Authority
CN
China
Prior art keywords
packet
file
encrypted
encryption
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410403711.3A
Other languages
Chinese (zh)
Other versions
CN104182697A (en
Inventor
王楠
郭涛
余军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410403711.3A priority Critical patent/CN104182697B/en
Publication of CN104182697A publication Critical patent/CN104182697A/en
Application granted granted Critical
Publication of CN104182697B publication Critical patent/CN104182697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The disclosure is directed to a kind of file encrypting method and device, belong to field of information security technology.Methods described includes:N packet corresponding with file destination is received, the packet is obtained after file transmitting terminal is cut the file destination, n >=2;The n packet point different batches are encrypted, carved at the beginning of encrypting the packet earlier than the finish time for receiving the packet;Store each packet encrypt in batches after.The disclosure is by the way that the packet received is encrypted in batches, so that whole file destination will not be stored in file reception end in the state of unencryption, solve before secret file is not encrypted also after end of transmission in correlation technique, the problem of being still in an of short duration unencrypted state at file reception end;Reach that the effect of the state of unencryption is not present in secret file after finishing receiving, improved the confidentiality of secret file.

Description

File encrypting method and device
Technical field
This disclosure relates to field of information security technology, more particularly to a kind of file encrypting method and device
Background technology
With the development of Internet technology, people for internet application also more and more frequently, the user of internet it Between be frequently necessary to transmit some files by internet, and some of which secret file for the confidentiality of file have it is higher will Ask.
There is a kind of time slot scrambling of secret file in correlation technique, what file reception termination message in-coming part transmitting terminal was sent does not add Close secret file, after secret file reception is finished, is encrypted and is preserved using local key to the secret file.
Although the above method can be by after secret file reception is finished, being carried out to the secret file using local key The secret file is protected in encryption, but secret file is that unencryption is sent, thus before not being encrypted also after end of transmission, Secret file still can be in file reception end in an of short duration unencrypted state.
The content of the invention
It is that unencryption is sent to solve secret file in correlation technique, thus is not added also after end of transmission Before close, the problem of being still in an of short duration unencrypted state at file reception end, the embodiment of the present disclosure provides one kind File encrypting method, the technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure there is provided a kind of file encrypting method, methods described includes:
N packet corresponding with file destination is received, the packet is that file transmitting terminal enters the file destination Obtained after row cutting, n >=2;
The n packet point different batches are encrypted, carved at the beginning of encrypting the packet earlier than reception institute State the finish time of packet;
Store each packet encrypt in batches after.
Optionally, it is described that the n packet point different batches are encrypted, carved at the beginning of encrypting the packet Earlier than the finish time for receiving the packet, including:
Often receive after a packet, the packet is encrypted by encryption key.
Optionally, it is described that the n packet point different batches are encrypted, carved at the beginning of encrypting the packet Earlier than the finish time for receiving the packet, including:
Often receive after m data bag, the m data bag is encrypted by encryption key, n > m >=2.
Optionally, methods described, in addition to:
When the packet not yet encrypted having been received by is discontented with m but includes last packet, by described in The packet not yet encrypted received is encrypted by encryption key.
Optionally, it is described that the n packet point different batches are encrypted, carved at the beginning of encrypting the packet Earlier than the finish time for receiving the packet, including:
Often receive after 1 packet, detect whether the data total amount for the packet not yet encrypted having been received by reaches Predetermined threshold;
If reaching the predetermined threshold, the packet not yet encrypted having been received by is carried out by encryption key Encryption.
Optionally, methods described, in addition to:
, will if include last packet in not up to described predetermined threshold but the packet having been received by The packet not yet encrypted having been received by is encrypted by encryption key.
Optionally, it is described that the n packet point different batches are encrypted, carved at the beginning of encrypting the packet Earlier than the finish time for receiving the packet, including:
The n packet is sequentially divided into K group, each group includes the packet of identical or different number, n >=K ≥2;
When often receiving the packet in 1 group, the packet in described group is encrypted by encryption key.
Optionally, methods described,
Encryption key used in each batch is identical encryption key;Or,
Encryption key used in each batch is different encryption key.
Optionally, methods described also includes:
Receive the operation requests to the file destination;
After each packet after the encryption in batches is decrypted, merging obtains the file destination;
File operation corresponding to the operation requests is performed to the file destination.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of document encrypting apparatus, described device includes:
Data reception module, is configured as receiving n packet corresponding with file destination, the packet is file hair What sending end was obtained after the file destination is cut, n >=2;
Data encryption module, is configured as the n packet point different batches being encrypted, encrypts the packet At the beginning of carve earlier than the finish time for receiving the packet;
Data memory module, is configured as storing each packet after encryption in batches.
Optionally, the data encryption module, including:
Individually encryption submodule, is configured as often receiving after a packet, the packet is passed through into encryption key It is encrypted.
Optionally, the data encryption module, including:
Submodule is quantitatively encrypted, is configured as often receiving after m data bag, the m data bag is close by encrypting Key is encrypted, n > m >=2.
Optionally, it is described quantitatively to encrypt submodule, it is configured as being discontented with m in the packet not yet encrypted having been received by But when including last packet, the packet not yet encrypted having been received by is added by encryption key It is close.
Optionally, the data encryption module, including:Data Detection submodule and threshold value encryption submodule;
The Data Detection submodule, is configured as often receiving after 1 packet, detects the not yet encryption having been received by The data total amount of packet whether reach predetermined threshold;
The threshold value encrypts submodule, if being configured as reaching the predetermined threshold, is had been received by described not yet The packet of encryption is encrypted by encryption key.
Optionally, threshold value encryption submodule, if being configured as not up to described predetermined threshold but described having been received by Packet in when including last packet, the packet not yet encrypted having been received by is passed through into encryption key It is encrypted.
Optionally, the data encryption module, including:Packet submodule and block encryption submodule;
The packet submodule, is configured as the n packet being sequentially divided into K group, each group includes The packet of identical or different number, n >=K >=2;
The block encryption submodule, when being configured as often receiving the packet in 1 group, by the data in described group Bag is encrypted by encryption key.
Optionally,
Encryption key used in each batch is identical encryption key;Or,
Encryption key used in each batch is different encryption key.
Optionally, described device also includes:Request receiving module, decryption merging module and operation executing module;
The request receiving module, is configured as receiving the operation requests to the file destination;
The decryption merging module, is configured as after each packet after the encryption in batches is decrypted, merges Obtain the file destination;
The operation executing module, is configured as performing the file destination file behaviour corresponding to the operation requests Make.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of document encrypting apparatus, including:
Processor;
For the memory for the executable instruction for storing the processor;
Wherein, the processor is configured as:
N packet corresponding with file destination is received, the packet is that file transmitting terminal enters the file destination Obtained after row cutting, n >=2;
The n packet point different batches are encrypted, carved at the beginning of encrypting the packet earlier than reception institute State the finish time of packet;
Store each packet encrypt in batches after.
The technical scheme that the embodiment of the present disclosure is provided can include the following benefits:
By the way that the packet received point different batches are encrypted, carved at the beginning of ciphering process earlier than reception process Finish time so that whole file destination will not be stored in file reception end in the state of unencryption, solve secret text Part is that before not being encrypted also after end of transmission, secret file still can be in an of short duration unencryption at file reception end The problem of state;Reach that the effect of the state of unencryption is not present in secret file after finishing receiving, improved secret file Confidentiality.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of file encrypting method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of file encrypting method according to another exemplary embodiment;
Fig. 3 is a kind of flow chart of file encrypting method according to another exemplary embodiment;
Fig. 4 is a kind of flow chart of file encrypting method according to another exemplary embodiment;
Fig. 5 is a kind of flow chart of file encrypting method according to another exemplary embodiment;
Fig. 6 is a kind of block diagram of document encrypting apparatus according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of document encrypting apparatus according to another exemplary embodiment;
Fig. 8 is a kind of block diagram of document encrypting apparatus according to an exemplary embodiment.
Pass through above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings It is not intended to limit the scope that the disclosure is conceived by any mode with word description, but is by reference to specific embodiment Those skilled in the art illustrate the concept of the disclosure.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Terminal in the embodiment of the present invention can be mobile phone, tablet personal computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio aspect 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect 4) is broadcast Put device, pocket computer on knee, camera, desktop computer and video camera etc..
Fig. 1 is a kind of flow chart of file encrypting method according to an exemplary embodiment, and the present embodiment is with this article Part encryption method is applied to illustrate in terminal.This document encryption method can include following several steps:
In a step 101, n packet corresponding with file destination is received, packet is that file transmitting terminal is literary by target What part was obtained after being cut, n >=2.
In a step 102, n packet point different batches are encrypted, carved at the beginning of encryption data bag earlier than connecing Receive the finish time of packet.
In step 103, each packet storage is encrypted in batches after.
In summary, the file encrypting method that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
Fig. 2 is a kind of flow chart of file encrypting method according to another exemplary embodiment, and the present embodiment is with this File encrypting method is applied to illustrate in terminal.This document encryption method can include following several steps:
In step 201, n packet corresponding with file destination is received, packet is that file transmitting terminal is literary by target What part was obtained after being cut, n >=2;
File reception end receives corresponding with file destination n packet, and packet is file transmitting terminal by file destination Obtained after being cut, n >=2, file destination is that file transmitting terminal is sent to file reception end.
This step can be divided into following 3 sub-steps:
1st, the file transmission information that file reception termination message in-coming part transmitting terminal is sent, file transmission information can include target File is cut into n packet.
2nd, data channel is set up in file reception end according to file transmission information and file transmitting terminal.
3rd, file reception end receives n packet by data channel.
It should be noted that when file reception end often receives 1 packet, number can be determined according to file transmission information According to sequence number of the bag in n packet and record, the sequence number can be used for after by n packet combining be file destination.
In step 202., often receive after a packet, packet is encrypted by encryption key;
File reception end is often received after a packet, and packet is encrypted by encryption key, each batch Used encryption key is identical encryption key;Or, encryption key used in each batch is different encryption key.
That is, the n packet that file reception termination is received can use same encryption key to be encrypted, and can also make It is encrypted with n different encryption keys.
In step 203, each packet storage is encrypted in batches after;
Each packet after encryption is stored in local storage by file reception end after each packet is encrypted On.
When different pieces of information bag uses different encryption keys, file reception end can also store the sequence number of each packet with Corresponding relation between each encryption key.
In step 204, the operation requests to file destination are received;
File reception termination receives operation requests to file destination, and this operation requests can be wanting of sending of user Using the request of file destination, such as request for edlin is entered to file destination, checking and sending etc..
In step 205, after each packet encrypt in batches after is decrypted, merging obtains file destination;
Each packet encrypt in batches after is decrypted using used encryption key when encrypting at file reception end, N packet is obtained, now, file reception end can be by each packet recorded in step 201 in n packet Sequence number, the n packet combining obtained after decryption is obtained into file destination.
In step 206, the file operation corresponding to operation requests is performed to file destination;
File reception end performs the file operation corresponding to operation requests after file destination is obtained to file destination, than Edlin such as is entered to file destination, checks and sends.
In summary, the file encrypting method that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
It should be added that, the present embodiment is just added by often receiving after a packet to the packet It is close, file reception is terminated the usual very little of ratio that the file in unencrypted state in the file received accounts for overall file, than Such as file destination is secret picture and has 100 packets, then synchronization only has centesimal number in file reception end According to state of the bag in unencryption, even if the packet of the part unencryption is stolen, stealer also can not add from the part Close packet judges the content of secret picture, has reached the effect of the largely confidentiality of enhancing file destination.
Fig. 3 is a kind of flow chart of file encrypting method according to another exemplary embodiment, and the present embodiment is with this File encrypting method is applied to illustrate in terminal.This document encryption method can include following several steps:
In step 301, n packet corresponding with file destination is received, packet is that file transmitting terminal is literary by target What part was obtained after being cut, n >=2;
File reception end receives corresponding with file destination n packet, and packet is file transmitting terminal by file destination Obtained after being cut, n >=2, file destination is that file transmitting terminal is sent to file reception end.
This step can be divided into following 3 sub-steps:
1st, the file transmission information that file reception termination message in-coming part transmitting terminal is sent, file transmission information can include target File is cut into n packet.
2nd, data channel is set up in file reception end according to file transmission information and file transmitting terminal.
3rd, file reception end receives n packet by data channel.
It should be noted that when file reception end often receives 1 packet, number can be determined according to file transmission information According to sequence number of the bag in n packet and record, the sequence number can be used for after by n packet combining be file destination.
In step 302, often receive after m data bag, m data bag is encrypted by encryption key, n > m ≥2;
File reception end is often received after m data bag, and m data bag is encrypted by encryption key, and n > m >= 2, encryption key used in each batch is identical encryption key;Or, encryption key used in each batch is difference Encryption key.
That is, when m data bag is encrypted every time for file reception end, same encryption key can be used to be added It is close, it can also be encrypted every time using different encryption keys.
Such as n is that 100, m is 20, then when file reception end receives 20 packets every time, is not yet added to what is received Close packet is encrypted by encryption key, and encryption 5 times are needed altogether, same encryption key can be used this 5 times, 5 different encryption keys can be used.
Wherein, m value can be set by user, user can according to this transmission file destination packet Sum determines m value, make it that total encryption number of times should not be excessive.In addition, predetermined threshold can also be by file transmitting terminal The value of setting.
In step 303, it is discontented with m in the packet not yet encrypted having been received by but includes last packet When, the packet not yet encrypted having been received by is encrypted by encryption key;
It is discontented with m in the packet not yet encrypted having been received by but includes last packet in file reception end When, the packet not yet encrypted having been received by is encrypted by encryption key.
Receive after all packets, file reception end needs to add the packet that last batch is received It is close, if having received last packet can be judged that such as file transmitting terminal can by file transmission information Instructed with sending an end of transmission to file reception end, file reception termination is received after the instruction, will just be had been received by still The packet of unencryption is encrypted by encryption key;Or last packet is accompanied with a special mark, text Part receiving terminal is received after last packet at once with regard to that can find the mark.
Such as n is that 110, m is 50, and file reception end is when the first two batch receives 50 packets every time, to receiving To the packet not yet encrypted be encrypted by encryption key, when receiving 10 packets afterwards, transmitted according to file Information learns that 10 packets include last packet, then this 10 packets is added by encryption key It is close.
If the packet not yet encrypted having been received by is discontented with m, and does not include most in the packet having been received by During latter packet, file reception end continues to packet.
In step 304, each packet storage is encrypted in batches after;
Each packet after encryption is stored in local storage by file reception end after each packet is encrypted On.
When different batches use different encryption keys, file reception end can also store the sequence number of each packet with it is each Corresponding relation between individual encryption key.
In step 305, the operation requests to file destination are received;
File reception termination receives operation requests to file destination, and this operation requests can be wanting of sending of user Using the request of file destination, such as edlin entered to file destination, check and send.
Within step 306, after each packet encrypt in batches after is decrypted, merging obtains file destination;
Each packet encrypt in batches after is decrypted using used encryption key when encrypting at file reception end, N packet is obtained, now, file reception end can be by each packet recorded in step 301 in n packet Sequence number, the n packet combining obtained after decryption is obtained into file destination.
In step 307, the file operation corresponding to operation requests is performed to file destination;
File reception end performs the file operation corresponding to operation requests after file destination is obtained to file destination, than Edlin such as is entered to file destination, checks and sends.
In summary, the file encrypting method that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
It should be added that, the present embodiment is by often receiving after m data bag, to not yet encrypting of receiving Packet is encrypted by encryption key, greatly reduces encryption number of times of this method in file encryption, equally also significantly Decryption number of times required during reduction file destination is reduced, the effect for reducing file reception end workload has been reached, has made this reality The file encrypting method for applying example offer is more quick in application.
Fig. 4 is a kind of flow chart of file encrypting method according to another exemplary embodiment, and the present embodiment is with this File encrypting method is applied to illustrate in terminal.This document encryption method can include following several steps:
In step 401, n packet corresponding with file destination is received, packet is that file transmitting terminal is literary by target What part was obtained after being cut, n >=2;
File reception end receives corresponding with file destination n packet, and packet is file transmitting terminal by file destination Obtained after being cut, n >=2, file destination is that file transmitting terminal is sent to file reception end.
This step can be divided into following 3 sub-steps:
1st, the file transmission information that file reception termination message in-coming part transmitting terminal is sent, file transmission information can include target File is cut into n packet.
2nd, data channel is set up in file reception end according to file transmission information and file transmitting terminal.
3rd, file reception end receives n packet by data channel.
It should be noted that when file reception end often receives 1 packet, number can be determined according to file transmission information According to sequence number of the bag in n packet and record, the sequence number can be used for after by n packet combining be file destination.
In step 402, often receive after 1 packet, detect the data for the packet not yet encrypted having been received by Whether total amount reaches predetermined threshold;
File reception end is often received after 1 packet, detects that the data for the packet not yet encrypted having been received by are total Whether amount reaches predetermined threshold.
Such as, when predetermined threshold is 1MB, file reception termination is received after a packet, the not yet encryption having been received by Data be surrounded by 10, file reception end detects whether the data total amount of this 10 packets reaches 1MB.
In step 403, if reaching predetermined threshold, the packet not yet encrypted having been received by is passed through into encryption key It is encrypted;
If the data total amount for the packet not yet encrypted having been received by reaches predetermined threshold, it will have been received by not yet The packet of encryption is encrypted by encryption key.
Such as, when predetermined threshold is 1MB, the data not yet encrypted having been received by are surrounded by 10 and this 10 packets Data total amount has met or exceeded 1MB, then this 10 packets is encrypted by encryption key.
In addition, file reception end is when being encrypted, encryption key used in each batch is identical encryption key; Or, encryption key used in each batch is different encryption key.Such as, the data total amount of file destination is 10MB, in advance Threshold value is determined for 1MB, then file reception end may need to carry out 10 encryptions, and this 10 times encryptions can use same encryption close Key, can also use 10 different encryption keys.
Wherein, predetermined threshold can be set by user, user can according to this transmission file destination number Predetermined threshold is determined according to total amount, to cause the unsuitable excessive and total encryption number of times of data total amount of file reception end unencryption It is unsuitable excessive.In addition, predetermined threshold can also be the value set by file transmitting terminal.
In step 404, if not up to including last packet in predetermined threshold but the packet having been received by When, the packet not yet encrypted having been received by is encrypted by encryption key;
If the data total amount not up to predetermined threshold for the packet not yet encrypted having been received by, but the data having been received by When including last packet in bag, the packet not yet encrypted having been received by is encrypted by encryption key.
Receive after all packets, file reception end needs to add the packet that last batch is received It is close, if having received last packet can be judged that such as file transmitting terminal can by file transmission information Instructed with sending an end of transmission to file reception end, file reception termination is received after the instruction, will just be had been received by still The packet of unencryption is encrypted by encryption key;Or last packet is accompanied with a special mark, text Part receiving terminal is received after last packet at once with regard to that can find the mark.
If the data total amount not up to predetermined threshold for the packet not yet encrypted having been received by, and the data having been received by When not including last packet in bag, file reception end continues to packet.
In step 405, each packet storage is encrypted in batches after;
Each packet after encryption is stored in local storage by file reception end after each packet is encrypted On.
When different batches use different encryption keys, file reception end can also store the sequence number of each packet with it is each Corresponding relation between individual encryption key.
In a step 406, the operation requests to file destination are received;
File reception termination receives operation requests to file destination, and this operation requests can be wanting of sending of user Using the request of file destination, such as edlin entered to file destination, check and send.
In step 407, after each packet encrypt in batches after is decrypted, merging obtains file destination;
Each packet encrypt in batches after is decrypted using used encryption key when encrypting at file reception end, N packet is obtained, now, file reception end can be by each packet recorded in step 401 in n packet Sequence number, the n packet combining obtained after decryption is obtained into file destination.
In a step 408, the file operation corresponding to operation requests is performed to file destination;
File reception end performs the file operation corresponding to operation requests after file destination is obtained to file destination, than Edlin such as is entered to file destination, checks and sends.
In summary, the file encrypting method that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
It should be added that, the present embodiment is total by the data in the packet not yet encrypted having been received by every time When amount reaches predetermined threshold, the packet not yet encrypted having been received by is encrypted by encryption key, both file is connect The file data amount of unencryption will not be excessive in receiving end, also make it that the number of times of file encryption will not be excessive, has reached and both improved mesh The confidentiality of file is marked, reduces the effect of file reception end workload again.
Fig. 5 is a kind of flow chart of file encrypting method according to another exemplary embodiment, and the present embodiment is with this File encrypting method is applied to illustrate in terminal.This document encryption method can include following several steps:
In step 501, n packet corresponding with file destination is received, packet is that file transmitting terminal is literary by target What part was obtained after being cut, n >=2;
File reception end receives corresponding with file destination n packet, and packet is file transmitting terminal by file destination Obtained after being cut, n >=2, file destination is that file transmitting terminal is sent to file reception end.
This step can be divided into following 3 sub-steps:
1st, the file transmission information that file reception termination message in-coming part transmitting terminal is sent, file transmission information can include target File is cut into n packet.
2nd, data channel is set up in file reception end according to file transmission information and file transmitting terminal.
3rd, file reception end receives n packet by data channel.
It should be noted that when file reception end often receives 1 packet, number can be determined according to file transmission information According to sequence number of the bag in n packet and record, the sequence number can be used for after by n packet combining be file destination.
In step 502, n packet is sequentially divided into K group, each group includes the data of identical or different number Bag, n >=K >=2;
N packet is sequentially divided into K group by file reception end, and each group includes the data of identical or different number Bag, n >=K >=2.
Such as n is that 10, K is 3, then three groups can include 2,3 and 5 packets respectively.Packet herein according to Completed according to that can be file transmitting terminal or file reception end according to the anticipated transmission of each packet in n packet of file destination Time is grouped, and the Estimated Time Of Completion can be judged according to data package size and transmission rate.
That is, anticipated transmission deadline close packet is placed on 1 group, such file reception end is downloaded in multithreading When, the packet that can make with 1 group completes to transmit in the close time.
In step 503, when often receiving the packet in 1 group, the packet in group is carried out by encryption key Encryption;
When file reception end often receives the packet in 1 group, the packet in group is added by encryption key It is close.
When carrying out multi-thread transmission at file reception end, the packet in every 1 group can be complete within the close time Into transmission, so just the packet in group is encrypted by encryption key after the packet in receiving 1 group, greatly It is big to reduce the time that packet exists in the case of unencryption at file reception end, improve the confidentiality of file destination.
In step 504, each packet storage is encrypted in batches after;
Each packet after encryption is stored in local storage by file reception end after each packet is encrypted On.
When different batches use different encryption keys, file reception end can also store the sequence number of each packet with it is each Corresponding relation between individual encryption key.
In step 505, the operation requests to file destination are received;
File reception termination receives operation requests to file destination, and this operation requests can be wanting of sending of user Using the request of file destination, such as edlin entered to file destination, check and send.
In step 506, after each packet encrypt in batches after is decrypted, merging obtains file destination;
Each packet encrypt in batches after is decrypted using used encryption key when encrypting at file reception end, N packet is obtained, now, file reception end can be by each packet recorded in step 501 in n packet Sequence number, the n packet combining obtained after decryption is obtained into file destination.
In step 507, the file operation corresponding to operation requests is performed to file destination;
File reception end performs the file operation corresponding to operation requests after file destination is obtained to file destination, than Edlin such as is entered to file destination, checks and sends.
In summary, the file encrypting method that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
It should be added that, the present embodiment by the way that anticipated transmission deadline close packet is assigned into 1 group, And when often receiving the packet of 1 group, just the packet in group is encrypted by encryption key, greatly reduced each Packet in group in the case of unencryption file reception end existence time, reached and improved file destination confidentiality Effect.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.It is real for disclosure device The details not disclosed in example is applied, method of disclosure embodiment is refer to.
Fig. 6 is a kind of block diagram of document encrypting apparatus according to an exemplary embodiment, and this document encryption device can With by software, hardware or both be implemented in combination with it is some or all of as terminal.This document encryption device can be wrapped Include:Data reception module 610, data encryption module 620 and data memory module 630;
Data reception module 610, is configured as receiving n packet corresponding with file destination, packet is file hair What sending end was obtained after file destination is cut, n >=2.
Data encryption module 620, is configured n packet point different batches being encrypted, the beginning of encryption data bag Finish time of the moment earlier than received data packet.
Data memory module 630, is configured as storing each packet after encryption in batches.
In summary, the document encrypting apparatus that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
Fig. 7 is a kind of block diagram of document encrypting apparatus according to another exemplary embodiment, this document encryption device Can by software, hardware or both be implemented in combination with it is some or all of as terminal.This document encryption device can be with Including:Data reception module 610, data encryption module 620 and data memory module 630;
Data reception module 610, is configured as receiving n packet corresponding with file destination, packet is file hair What sending end was obtained after file destination is cut, n >=2.
Data encryption module 620, be configured as n packet point different batches being encrypted, and encryption data bag is opened Begin finish time of the moment earlier than received data packet.
Data memory module 630, is configured as storing each packet after encryption in batches.
Optionally, data encryption module 620, including:
Individually encryption submodule 621, is configured as often receiving after a packet, packet is entered by encryption key Row encryption.
Optionally, data encryption module 620, including:
Submodule 622 is quantitatively encrypted, is configured as often receiving after m data bag, m data bag is passed through into encryption key It is encrypted, n > m >=2.
Optionally, submodule 622 is quantitatively encrypted, is configured as being discontented with m in the packet not yet encrypted having been received by But when including last packet, the packet not yet encrypted having been received by is encrypted by encryption key.
Optionally, data encryption module 620, including:Data Detection submodule 623 and threshold value encryption submodule 624;
Data Detection submodule 623, is configured as often receiving after 1 packet, detects the not yet encryption having been received by The data total amount of packet whether reach predetermined threshold;
Threshold value encrypts submodule 624, if being configured as reaching predetermined threshold, by the data not yet encrypted having been received by Bag is encrypted by encryption key.
Optionally, threshold value encryption submodule 624, if in the packet for being configured as not up to predetermined threshold but having been received by When including last packet, the packet not yet encrypted having been received by is encrypted by encryption key.
Optionally, data encryption module 620, including:Packet submodule 625 and block encryption submodule 626;
Packet submodule 625, is configured as n packet being sequentially divided into K group, each group include it is identical or The packet of different numbers, n >=K >=2;
Block encryption submodule 626, when being configured as often receiving the packet in 1 group, the packet in group is led to Encryption key is crossed to be encrypted.
Optionally, encryption key used in each batch is identical encryption key;Or, add used in each batch Key is different encryption key.
Optionally, the device also includes:Request receiving module 640, decryption merging module 650 and operation executing module 660;
Request receiving module 640, is configured as receiving the operation requests to file destination;
Merging module 650 is decrypted, is configured as after each packet encrypt in batches after is decrypted, merging obtains mesh Mark file;
Operation executing module 660, is configured as performing file destination the file operation corresponding to operation requests.
In summary, the document encrypting apparatus that the present embodiment is provided, by the way that the packet received point different batches are entered The finish time earlier than the process of reception is carved at the beginning of row encryption, ciphering process so that whole file destination will not be in unencryption In the state of be stored in file reception end, it is secret file before not being encrypted also after end of transmission to solve secret file Or a problem of of short duration unencrypted state can be at file reception end;Reach secret file after finishing receiving not There is the effect of the state of unencryption, improve the confidentiality of secret file.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 8 is a kind of block diagram of device 800 for file encryption according to an exemplary embodiment.For example, dress It can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, medical treatment to put 800 Equipment, body-building equipment, personal digital assistant etc..
Reference picture 8, device 800 can include following one or more assemblies:Processing assembly 802, memory 804, power supply Component 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong Believe component 816.
The integrated operation of the usual control device 800 of processing assembly 802, such as with display, call, data communication, phase Machine operates the operation associated with record operation.Processing assembly 802 can refer to including one or more processors 820 to perform Order, to complete all or part of step of above-mentioned method.In addition, processing assembly 802 can include one or more modules, just Interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, it is many to facilitate Interaction between media component 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in device 800.These data are shown Example includes the instruction of any application program or method for being operated on device 800, and contact data, telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detection touches or slide related duration and pressure with described.In certain embodiments, many matchmakers Body component 808 includes a front camera and/or rear camera.When device 800 be in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive the multi-medium data of outside.Each front camera and Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 be in operator scheme, when such as call model, logging mode and speech recognition mode, microphone by with It is set to reception external audio signal.The audio signal received can be further stored in memory 804 or via communication set Part 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 is provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented Estimate.For example, sensor cluster 814 can detect opening/closed mode of device 800, the relative positioning of component is for example described Component is the display and keypad of device 800, and sensor cluster 814 can be with 800 1 components of detection means 800 or device Position change, the existence or non-existence that user contacts with device 800, the orientation of device 800 or acceleration/deceleration and device 800 Temperature change.Sensor cluster 814 can include proximity transducer, be configured to detect in not any physical contact The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, communication component 816 also includes near-field communication (NFC) module, to promote junction service.For example, Radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, bluetooth can be based in NFC module (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be believed by one or more application specific integrated circuits (ASIC), numeral Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of device 800 When device is performed so that device 800 is able to carry out any file encrypting method in each above-mentioned embodiment.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (17)

1. a kind of file encrypting method, it is characterised in that methods described includes:
N packet corresponding with file destination is received, the packet is that file transmitting terminal is cut the file destination Obtained after cutting, n >=2;
The n packet point different batches are encrypted, carved at the beginning of encrypting the packet earlier than the reception number According to the finish time of bag, encryption key used in each batch is identical encryption key, or, added used in each batch Key is different encryption key;
Store each packet encrypt in batches after.
2. according to the method described in claim 1, it is characterised in that described to be added the n packet point different batches It is close, carved at the beginning of encrypting the packet earlier than the finish time for receiving the packet, including:
Often receive after a packet, the packet is encrypted by encryption key.
3. according to the method described in claim 1, it is characterised in that described to be added the n packet point different batches It is close, carved at the beginning of encrypting the packet earlier than the finish time for receiving the packet, including:
Often receive after m data bag, the m data bag is encrypted by encryption key, n > m >=2.
4. method according to claim 3, it is characterised in that methods described, in addition to:
When the packet not yet encrypted having been received by is discontented with m but includes last packet, received described To the packet not yet encrypted be encrypted by encryption key.
5. according to the method described in claim 1, it is characterised in that described to be added the n packet point different batches It is close, carved at the beginning of encrypting the packet earlier than the finish time for receiving the packet, including:
Often receive after 1 packet, detect whether the data total amount of the packet not yet encrypted having been received by reaches predetermined Threshold value;
If reaching the predetermined threshold, the packet not yet encrypted having been received by is added by encryption key It is close.
6. method according to claim 5, it is characterised in that methods described, in addition to:
, will be described if include last packet in not up to described predetermined threshold but the packet having been received by The packet not yet encrypted having been received by is encrypted by encryption key.
7. the method described in claim 1, it is characterised in that described that the n packet point different batches are encrypted, plus Carved at the beginning of the close packet earlier than the finish time for receiving the packet, including:
The n packet is sequentially divided into K group, each group includes the packet of identical or different number, n >=K >=2;
When often receiving the packet in 1 group, the packet in described group is encrypted by encryption key.
8. according to any described method of claim 1 to 7, it is characterised in that methods described also includes:
Receive the operation requests to the file destination;
After each packet after the encryption in batches is decrypted, merging obtains the file destination;
File operation corresponding to the operation requests is performed to the file destination.
9. a kind of document encrypting apparatus, it is characterised in that described device includes:
Data reception module, is configured as receiving n packet corresponding with file destination, the packet is file transmitting terminal Obtained after the file destination is cut, n >=2;
Data encryption module, is configured as the n packet point different batches being encrypted, encrypts opening for the packet The moment begin earlier than the finish time for receiving the packet, encryption key used in each batch is identical encryption key, Or, encryption key used in each batch is different encryption key;
Data memory module, is configured as storing each packet after encryption in batches.
10. device according to claim 9, it is characterised in that the data encryption module, including:
Individually encryption submodule, is configured as often receiving after a packet, the packet is carried out by encryption key Encryption.
11. device according to claim 9, it is characterised in that the data encryption module, including:
Submodule is quantitatively encrypted, is configured as often receiving after m data bag, the m data bag is entered by encryption key Row encryption, n > m >=2.
12. device according to claim 11, it is characterised in that
It is described quantitatively to encrypt submodule, it is configured as being discontented with m in the packet not yet encrypted having been received by but includes most During latter packet, the packet not yet encrypted having been received by is encrypted by encryption key.
13. device according to claim 9, it is characterised in that the data encryption module, including:Data Detection submodule Block and threshold value encryption submodule;
The Data Detection submodule, is configured as often receiving after 1 packet, detects the number not yet encrypted having been received by Whether predetermined threshold is reached according to the data total amount of bag;
The threshold value encrypts submodule, if being configured as reaching the predetermined threshold, by the not yet encryption having been received by Packet be encrypted by encryption key.
14. device according to claim 13, it is characterised in that
The threshold value encrypts submodule, if being configured as wrapping in not up to described predetermined threshold but the packet having been received by When having included last packet, the packet not yet encrypted having been received by is encrypted by encryption key.
15. the device described in claim 9, it is characterised in that the data encryption module, including:Packet submodule and Block encryption submodule;
The packet submodule, is configured as the n packet being sequentially divided into K group, and each group includes identical Or the packet of different numbers, n >=K >=2;
The block encryption submodule, when being configured as often receiving the packet in 1 group, the packet in described group is led to Encryption key is crossed to be encrypted.
16. according to claim 9 to 15Any described device, it is characterised in that described device also includes:Request receives mould Block, decryption merging module and operation executing module;
The request receiving module, is configured as receiving the operation requests to the file destination;
The decryption merging module, is configured as after each packet after the encryption in batches is decrypted, merging is obtained The file destination;
The operation executing module, is configured as performing the file destination file operation corresponding to the operation requests.
17. a kind of document encrypting apparatus, it is characterised in that including:
Processor;
For the memory for the executable instruction for storing the processor;
Wherein, the processor is configured as:
N packet corresponding with file destination is received, the packet is that file transmitting terminal is cut the file destination Obtained after cutting, n >=2;
The n packet point different batches are encrypted, carved at the beginning of encrypting the packet earlier than the reception number According to the finish time of bag, encryption key used in each batch is identical encryption key, or, added used in each batch Key is different encryption key;
Store each packet encrypt in batches after.
CN201410403711.3A 2014-08-15 2014-08-15 File encrypting method and device Active CN104182697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410403711.3A CN104182697B (en) 2014-08-15 2014-08-15 File encrypting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410403711.3A CN104182697B (en) 2014-08-15 2014-08-15 File encrypting method and device

Publications (2)

Publication Number Publication Date
CN104182697A CN104182697A (en) 2014-12-03
CN104182697B true CN104182697B (en) 2017-07-28

Family

ID=51963728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410403711.3A Active CN104182697B (en) 2014-08-15 2014-08-15 File encrypting method and device

Country Status (1)

Country Link
CN (1) CN104182697B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102015211668B4 (en) 2015-06-24 2019-03-28 Volkswagen Ag Method and device for increasing the safety of a remote release, motor vehicle
CN107220550A (en) * 2017-04-19 2017-09-29 上海海加网络科技有限公司 Encrypted card performance optimization method and system based on eCryptfs
CN106973072A (en) * 2017-05-24 2017-07-21 深圳市乃斯网络科技有限公司 Network link encryption method and system based on terminal
CN109525388B (en) * 2017-09-19 2022-07-15 中兴通讯股份有限公司 Combined encryption method and system with separated keys
CN108769052A (en) * 2018-06-12 2018-11-06 北斗巡星信息科技有限公司 Wrist strap transmits the encrypted method and device of information

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁系统软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN103905535A (en) * 2014-03-17 2014-07-02 深圳市中兴移动通信有限公司 File transmission method and device and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693398B (en) * 2012-05-09 2015-04-01 深圳大学 Data encryption method and system
CN103455764B (en) * 2013-08-27 2016-09-14 无锡华御信息技术有限公司 A kind of file encryption based on file division folding and decryption system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁系统软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
CN103905535A (en) * 2014-03-17 2014-07-02 深圳市中兴移动通信有限公司 File transmission method and device and terminal

Also Published As

Publication number Publication date
CN104182697A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
CN103916233B (en) A kind of information ciphering method and device
CN104219058B (en) Authentication, identification authorization method and device
CN104125055B (en) Encryption and decryption method and electronic equipment
CN104182697B (en) File encrypting method and device
CN104391870B (en) Logistics information acquisition methods and device
CN103914634A (en) Image encryption method, image encryption device and electronic device
WO2016045469A1 (en) Information encryption method and mobile terminal
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN103455761B (en) File encryption and decryption method and device and electronic device
CN105260673A (en) Short message reading method and apparatus
CN104168277A (en) File security maintaining method and device
WO2016192165A1 (en) Data encryption method and apparatus
CN103914541B (en) The method and device of information search
CN104093119B (en) unlocking method and device
CN104573550A (en) Method and device for protecting data
CN106453052A (en) Message interaction method and apparatus thereof
CN106372517A (en) File encryption method, file decryption method, file encryption device and equipment
CN104219053B (en) Method for information display, information concealing method and device
CN107766701A (en) Electronic equipment, dynamic library file guard method and device
CN104468581B (en) The method and device of login application program
CN106295294A (en) Method for controlling mobile terminal and device
CN105893854B (en) Encryption and decryption method and device
CN107682538A (en) The display methods and device of application interface
CN108900553A (en) A kind of communication means, device and computer readable storage medium
CN105681365B (en) Method and apparatus for file transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant