CN109428899A - File security transfer management method and system - Google Patents

File security transfer management method and system Download PDF

Info

Publication number
CN109428899A
CN109428899A CN201710719512.7A CN201710719512A CN109428899A CN 109428899 A CN109428899 A CN 109428899A CN 201710719512 A CN201710719512 A CN 201710719512A CN 109428899 A CN109428899 A CN 109428899A
Authority
CN
China
Prior art keywords
file
client
cryptographic hash
transmitted
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710719512.7A
Other languages
Chinese (zh)
Inventor
陈芳莉
韩萌
陈新荣
董自雷
王建坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Petroleum and Chemical Corp
Sinopec Exploration and Production Research Institute
Original Assignee
China Petroleum and Chemical Corp
Sinopec Exploration and Production Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Petroleum and Chemical Corp, Sinopec Exploration and Production Research Institute filed Critical China Petroleum and Chemical Corp
Priority to CN201710719512.7A priority Critical patent/CN109428899A/en
Publication of CN109428899A publication Critical patent/CN109428899A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of file security transfer management method and system, this method comprises: client and server communicates to connect;The server information of file existing for query service device end returns client;Encryption and compression processing are carried out according to data information of the setting of client to file, is sent to server end;Server end carries out decompression and decryption processing to file;Client sends integrity request, the Hash value information of checking file after received server-side integrity request, and returns client;Judge the integrality of file transmission.The advantage is that: self-defining data communication protocol, supports communication interface flexible expansion;Customized big file Cut Stratagem solves the security risk in document transmission process using encryption concurrent transmission, prevents from causing to divulge a secret after data are intercepted;The problems such as data integrity checking mechanism is provided using MD5 method of calibration, the damage of file packet loss is prevented, is tampered.

Description

File security transfer management method and system
Technical field
The present invention relates to information technology fields, more particularly, to a kind of file security transfer management method and system.
Background technique
File transmission can be all used under informatization process, every profession and trade, each business scenario, file transmits (File Transfer), refer to by a file or in which a part pass to another computer system from a computer system, Middle FTP, HTTP are common File Transfer Protocol.
The full name of FTP is that File Transfer Protocol (File Transfer Protocol) is exactly specifically used to as its name suggests Transmit the agreement of file.FTP is currently still widely used, but also faces many problems in use, such as: safety Strategy is not perfect, safety is poor, and password and file content all use plaintext transmission, it is possible to create undesirable eavesdropping;Number It is unreasonable according to transmission mode, it will cause file corruption etc..In short, it is one neither dangerous, it is also not unfriendly, and efficiency Low agreement certainly will be substituted.
The full name of HTTP is hypertext transfer protocol (HyperText Transfer Protocol), and http protocol uploads It is more suitable for WEB application and small documents uploads (within 10M), is not suitable for big file uploading, and safety is also poor, such as: Using in plain text (not encrypting), content may be ravesdropping for communication;The identity for verifying communication party, it is therefore possible to meet with camouflage;Nothing Method proves the integrality of message, and it is possible to distorted.
Currently, file uploads, download technology comparative maturity, there is the file server based on File Transfer Protocol, such as common file Server S erver-U, FileZilla, VSFTP, IISFTP etc.;Also there is the component based on Transmission Control Protocol, relevant component also compares It is relatively abundant, it can realize common scenarios, the upload of ordinary file and down operation, but there is also some for these components or tool Disadvantage: cannot support the client of high concurrent to connect, and can not achieve and handle multiple concurrent asynchronous I/O requests;Safety is compared Difference, data transmit unencryption or cipher mode is relatively simple, and data transmission is possible to be ravesdropping;Transmission efficiency is low, does not support It concurrently uploads, when Documents Comparison is big, uploading speed is slow, and transmission is unstable, or even Caton situation occurs;Some transmission groups Part does not support breakpoint transmission, does not support the breakpoint transmission of big file especially;The data integrity audit function cannot be provided, text is worked as Part cannot find to correct in time when damage.
In the Chinese invention patent application application No. is CN201510467555.1, it is non-depressed to provide a kind of safe transmission The encryption and decryption method of contracting file, belong to data security arts, execute ciphering process by AES or des encryption algorithm, Encryption file header structure and file item sequence are generated, file content to be encrypted is then read in a manner of multi thread and multi task.The hair Bright has the beneficial effect that: 1. have the ability for quickly encrypting multiple file directorys and single file;2. there is fast decryption and release Release the ability that encryption document determines file;3. the ability supported with all files format;4. based on DSA signature algorithm and AES encryption algorithm, safety are higher.But the transmission file of this form is unable to compression transmission, is not suitable for the biography of larger file It is defeated.
In the Chinese invention patent application application No. is CN201410744447.X, provide a kind of based on concurrent transmission mould The big file uploading method of formula, belongs to computer application technology, which includes: document analysis unit, concurrent transmission list Member, analysis corrector, file reduction unit;Big file reading and converting is byte stream in document analysis unit and split by client For the identical multiple byte streams of size, concurrent transmission unit concurrently sends these byte streams, file reception end to file reception end It receives to be reconfigured byte stream by file reduction unit according to sequence notation after file stream and is reduced into original file.But this The transmission of kind form needs to split big file, reduces the stability and reliability of file transmission.
In the Chinese invention patent application application No. is CN201310347968.7, disclose a kind of based on File Transfer Protocol The method for realizing super large file multithreading breaking point uploading includes the following steps: that S1, ftp client establish multithreading connection, realizes The multithreading of file uploads;S2, file is divided into multiple pieces, distributes to different threads and upload, when some thread has uploaded After one blocks of files, new blocks of files of reallocating gives the thread;S3, it is not yet uploaded using each blocks of files of multi-thread concurrent upload Part, avoid the operation for uploading the data portion transmitted again;S4, ftp client additionally set up a thread, specially For recording provisional configuration the file information in real time.The invention is suitable for the FTP upload service of super large file, passes through multi-thread concurrent The method of upload can effectively shorten and upload super large file to the time needed for ftp server;By the method for breaking point uploading, It avoids uploading the data portion transmitted again, reduces transmission quantity, further save and upload super large file to ftp server Time.But the file transmission of this form can not provide the data integrity audit function, cannot be timely when file corruption It was found that amendment.
In the Chinese invention patent application application No. is CN201210581891.5, it is related to a kind of multifile real-time synchronization The method of transmission, specifically includes the following steps: step 1: useful data is sent to receiving end by starting transmitting terminal, transmitting terminal;Step Rapid 2: the file that receiving end is arranged saves contents and listening port;Step 3: receiving end receives the data that transmitting terminal is sent.This hair The bright mode using one process single thread, system resources consumption are few;Data are transmitted by TCP connection, it is ensured that data were transmitted can By property and timeliness;The integrality of data can be also ensured that when process restarts by saving breakpoint file;Deployment is simple, increases Add the file to be synchronized, it is only necessary to it is stored in fixed catalogue, it is flexibly simple;Single treatment is all that chunk data carries out, energy The read-write efficiency and network transmission efficiency performance for preferably utilizing disk, improve processing speed.Avoid data in database Directly operate, can be at least 10 times faster than database manipulation with file mode, reduce the risk of loss of data.But this file Synchronization transfer method does not have good compatibility and scalability, is restricted in practical applications.
Therefore, it is necessary to develop a kind of file security transfer management method and system, it can reach highly-safe, make file It transmits more efficient, stable, reliable, and is capable of providing the data integrity audit function, it can modified purpose in time when file corruption.
The information for being disclosed in background of invention part is merely intended to deepen the reason to general background technique of the invention Solution, and it is known to those skilled in the art existing to be not construed as recognizing or imply that the information is constituted in any form Technology.
Summary of the invention
The invention proposes a kind of file security transfer management method and system, can be real by cryptographic Hash check addition The complete transmission of data is showed.
According to an aspect of the invention, it is proposed that a kind of file security transfer management method, which comprises
Client and server establishes communication connection, and the client sends file upload request;
After the server end receives request, the server information of the file existing for the server end is inquired, Return the client;
The client reads the data information of the file according to the server information, according to the client It is arranged and encryption and compression processing is carried out to the data information of the file, is sent to the server end;
The server end carries out decompression and decryption processing to the file;
The client sends integrity request, examines the file after integrity request described in the received server-side Hash value information, and return the client;
The Hash value information that the cryptographic Hash of client comparison local file and the server end are returned, described in judgement The integrality of file transmission.
Preferably, the integrality for judging file transmission includes:
When the cryptographic Hash of the local file and the Hash value information of the return are consistent, the file is completely uploaded;
When the cryptographic Hash of the local file and the Hash value information of the return are inconsistent, the file is lost, described Client request uploads the file again.
Preferably, the server information includes the letter for uploading the information of segment and having received the initial position of segment Breath.
Preferably, when the file is determined as small documents, single thread transmission is executed.
Preferably, the method for the single thread transmission includes:
The cryptographic Hash for calculating file to be transmitted is stored in the client, and the file to be transmitted is encrypted and pressed Contracting;
When the file to be transmitted uploads, restore again after network interruption, the file to be transmitted can execute breakpoint transmission;
The received server-side is decrypted it and decompresses to the file to be transmitted, generates the cryptographic Hash of return;
The cryptographic Hash for calculating file to be transmitted and the cryptographic Hash of the return compare, and carry out the file to be transmitted Integrality judgement.
Preferably, when the original document is determined as big file, multi-threaded parallel transmission is executed.
Preferably, the method for executing the multi-thread transmission includes:
The cryptographic Hash for calculating big file is stored in the client, by the big file division at multiple file fragments;
The multiple file fragment is encrypted and compressed, the server end is sent to;
The multiple file fragment is decrypted and is decompressed in the server end, and the multiple file fragment is closed And generate and restore big file, return the cryptographic Hash of the big file of reduction;
The cryptographic Hash of the big file and the cryptographic Hash of the big file of reduction compare, and carry out the integrality of the big file Judgement.
Preferably, the cryptographic Hash is calculated by the Message Digest 5.
Preferably, the server end uses IOCP Communication Model.
According to another aspect of the invention, it is proposed that a kind of file security transmission and management system, the system comprises:
Client uploads file to be transmitted;
Server end, the server end and the client, which are established, to be communicated to connect;
Monitoring unit, the monitoring unit receive the upload request of client file to be transmitted;
Processing unit, the processing unit handle the upload request of the file to be transmitted, calculate described to be passed Cryptographic Hash after defeated file upload;
Storage unit, the storage unit store the cryptographic Hash of the file to be transmitted;
Judging unit, the judging unit judge the size of the file to be transmitted, indicate the client executing single line Journey transmission executes multi-threaded parallel transmission;
Comparison unit compares the cryptographic Hash in the storage unit with the cryptographic Hash in the processing unit.
A kind of file security transfer management method and system according to the present invention, the advantage is that: self-defining data communicates Agreement supports communication interface flexible expansion;Customized big file Cut Stratagem solves electronics text using encryption concurrent transmission Security risk in part transmission process prevents from causing to divulge a secret after data are intercepted;It is complete that data are provided using MD5 method of calibration Property checking mechanism, prevent the damage of file packet loss, the problems such as being tampered.
Method and system of the invention has other characteristics and advantages, these characteristics and advantages are attached from what is be incorporated herein It will be apparent in figure and subsequent specific embodiment, or will be in the attached drawing and subsequent specific implementation being incorporated herein It is stated in detail in example, these the drawings and specific embodiments are used together to explain specific principle of the invention.
Detailed description of the invention
Exemplary embodiment of the present is described in more detail in conjunction with the accompanying drawings, of the invention is above-mentioned and other Purpose, feature and advantage will be apparent, wherein in exemplary embodiments of the present invention, identical appended drawing reference is usual Represent same parts.
Fig. 1 shows a kind of framework of file security transfer management method of an exemplary embodiment according to the present invention Schematic diagram.
Fig. 2 shows a kind of exemplary diagrams of small documents method for uploading according to an embodiment of the invention.
Fig. 3 shows a kind of exemplary diagram of big file uploading method according to an embodiment of the invention.
Specific embodiment
The present invention will be described in more detail below with reference to accompanying drawings.Although showing the preferred embodiment of the present invention in attached drawing, However, it is to be appreciated that may be realized in various forms the present invention and should not be limited by the embodiments set forth herein.On the contrary, providing These embodiments are of the invention more thorough and complete in order to make, and can will fully convey the scope of the invention to ability The technical staff in domain.
The present invention provides a kind of file security transfer management methods, comprising:
Client and server establishes communication connection, and client sends file upload request;
After server end receives request, the server information of file existing for query service device end returns client;
Client reads the data information of file according to server information, according to the setting of client to the data of file Information carries out encryption and compression processing, is sent to server end;
Server end carries out decompression and decryption processing to file;
Client sends integrity request, the Hash value information of checking file after received server-side integrity request, and Return client;
The Hash value information that client compares the cryptographic Hash of local file and server end is returned, judges the complete of file transmission Whole property.
Further, judge file transmission integrality include:
When the cryptographic Hash of local file and the Hash value information of return are consistent, file is completely uploaded;
When the cryptographic Hash of local file and the Hash value information of return are inconsistent, file is lost, client request again on Transmitting file.
Preferably, server information includes the information for uploading segment and the initial position for having received segment Information.
Pretreatment memory is dynamically distributed according to the configuration file of server-side when server end starts, creates file transfer services Thread pool, and realize the dynamic allocation and monitoring of thread pool memory.By monitor service receive client upload, downloading, merging, The request such as integrity verification receives the request processing service distributing to request dynamic after requesting and pre-allocating in thread pool and completes phase It should handle and return information is to client.
Preferably, cryptographic Hash is carried out by Message Digest 5 (Message Digest Algorithm, MD5) It calculates.
MD5 algorithm has the advantage that
Preferable compressibility: the MD5 value length of the data of random length, calculating is fixed;
It is easy to calculate: calculating MD5 value from former data and be easy to;
Good anti-modification: making any change to former data, even only modifying 1 byte, obtained MD5 value is all There is very big difference;
Strong impact resistant: known original data and its MD5 value are wanted to find data (the i.e. forgery number with identical MD5 value According to) it is very difficult.
Data integrity checking mechanism is provided using MD5 method of calibration, prevents file packet loss from damaging, being tampered etc. and asks Topic.
Preferably, server end uses IOCP Communication Model.
IOCP full name I/O Completion Port, Chinese are translated into I/O completing port, and IOCP is an asynchronous I/O API, I/O event efficiently can be notified to have the advantage that application program using IOCP by it
Help the memory pool (related with Chong Die I/O technology) for maintaining to reuse;It is negative that thread creation/termination is deleted in removal Load;Conducive to management, thread is distributed, control is concurrent, the thread context switching of minimum;Optimize thread scheduling, improves CPU and interior Deposit the hit rate of buffering.
Self-defining data communication protocol supports communication interface flexible expansion.
The present invention also provides a kind of file security transmission and management systems, comprising:
Client uploads file to be transmitted;
Server end, server end and client, which are established, to be communicated to connect;
Monitoring unit, monitoring unit receive the upload request of client file to be transmitted;
Processing unit, processing unit handle the upload request of file to be transmitted, after calculating file upload to be transmitted Cryptographic Hash;
Storage unit, storage unit store the cryptographic Hash of file to be transmitted;
Judging unit, judging unit judge the size of file to be transmitted, the transmission of instruction client executing single thread or execution Multi-threaded parallel transmission;
Comparison unit compares the cryptographic Hash in the cryptographic Hash and processing unit in storage unit.
Preferably, file threshold value is equipped in judging unit, when the size of file to be transmitted is less than file threshold value, Single thread transmission is executed, when the size of file to be transmitted is not less than file threshold value, executes multi-threaded parallel transmission.
Wherein, file threshold value is usually set to 500M.
Customized big file Cut Stratagem solves the safety in electronic document transmission process using encryption concurrent transmission Hidden danger prevents from causing to divulge a secret after data are intercepted.
Embodiment
Fig. 1 shows a kind of framework of file security transfer management method of an exemplary embodiment according to the present invention Schematic diagram.
As shown in Figure 1, a kind of file security transfer management method of the invention, comprising:
Client and server establishes communication connection, uploads file request, and server end receives to ask by the service of monitoring Requesting processing is transferred to handle after asking, i.e. file request processing service, whether query service device end has existed point of file Piece file (clip file), and the information such as initial position of received slicing files, and return to reception information, upload request Pass through;
Client reads the data of the corresponding position of the slicing files of upper transmitting file according to the server information received Information carries out encryption and compression processing to data flow, according to data flow of the setting of client to file, and is sent to server End, the data flow of file is decrypted the data reception service of server end and decompression processing, by the data convert of file, and It is written in file fragment;
After entire file is transmitted, client, which is sent, merges file request, received server-side to merging file request The file fragment received is serviced by file mergences afterwards and merges file;
After the completion of file mergences, client sends integrity request as needed, by testing after received server-side request The MD5 information of service acquisition file is demonstrate,proved, and returns client, client obtains the clothes of MD5 information and return according to local file The MD5 information of business device file compares;
Front and back information is consistent, then file is transmitted, if it is inconsistent, there is mistake, client in supporting paper transmission End can request again upper transmitting file.
Server end is additionally provided with judgement service, compares to the size and given threshold of upper transmitting file, when upper transmitting file When less than given threshold, judge that upper transmitting file as small documents, executes single thread transmission, when upper transmitting file is not less than given threshold When, judge that upper transmitting file as big file, executes multi-threaded parallel transmission.Wherein, given threshold is 500M in the present embodiment.
Fig. 2 shows a kind of exemplary diagrams of small documents method for uploading according to an embodiment of the invention.
As shown in Fig. 2, method for uploading when upper transmitting file is small documents, comprising:
Client is connected to server end;
File transmission prepares: judging file size, the cryptographic Hash of calculation document (MD5 algorithm), is judged as in the present embodiment Small documents;
File is encrypted, is compressed;
Based on self-defining data communication protocol IOCP of the invention execute single thread file spread it is defeated, if what file uploaded Network interruption in the process, when network channel restores, this document can execute breakpoint transmission, and the data transmission for transmission is arrived Server end guarantees the efficiency of data transmission;
The upper transmitting file received is decrypted in server end, decompression operations, generates original document, calculation server end The cryptographic Hash of received file is compared with the cryptographic Hash of client file, does integrity verification;
Front and back cryptographic Hash is consistent, and file uploads completely, and upload procedure terminates, and front and back cryptographic Hash is inconsistent, then file transmits There is packet loss phenomenon in the process, prompts to carry out upload operation again to this document.
Fig. 3 shows a kind of exemplary diagram of big file uploading method according to an embodiment of the invention.
As shown in figure 3, method for uploading when upper transmitting file is big file, comprising:
Client is connected to server end;
File transmission prepares: judging file size, the cryptographic Hash of calculation document (MD5 algorithm), is judged as in the present embodiment Big file;
Cutting whole into sections is carried out to current big file, i.e., by strategy to file block;
Multithreading file stream encryption, compression are executed based on our self-defining data communication protocol IOCP, i.e., to every block file Stream is encrypted, is compressed, parallel transmission;
Server end decompresses file stream, decrypts, and blocked file is written;
Server end is to file merged block;
The cryptographic Hash of calculation server end file, makees integrity verification;
When the cryptographic Hash of server file and the cryptographic Hash of client file are consistent, then it is assumed that file transmission is complete, no There are data packetloss, upload procedure terminates, when the cryptographic Hash of server file and the cryptographic Hash of client file are different It causes, then has data packetloss in document transmission process, prompt to carry out upload operation again to this document.
The embodiment of the present invention is described above, above description is exemplary, and non-exclusive, and also not It is limited to disclosed embodiment.Without departing from the scope and spirit of embodiment described, for the art Those of ordinary skill for many modifications and changes are obvious.The selection of term used herein, it is intended to best Principle, practical application or the improvement to the technology in market of embodiment are explained in ground, or make the other common of the art Technical staff can understand embodiments disclosed herein.

Claims (10)

1. a kind of file security transfer management method characterized by comprising
Client and server establishes communication connection, and the client sends file upload request;
After the server end receives request, the server information of the file existing for the server end is inquired, is returned The client;
The client reads the data information of the file according to the server information, according to the setting of the client Encryption and compression processing are carried out to the data information of the file, are sent to the server end;
The server end carries out decompression and decryption processing to the file;
The client sends integrity request, and the Kazakhstan of the file is examined after integrity request described in the received server-side Uncommon value information, and return the client;
The Hash value information that the cryptographic Hash of the client comparison local file and the server end are returned, judges the file The integrality of transmission.
2. file security transfer management method according to claim 1, wherein judge the integrality packet of the file transmission It includes:
When the cryptographic Hash of the local file and the Hash value information of the return are consistent, the file is completely uploaded;
When the cryptographic Hash of the local file and the Hash value information of the return are inconsistent, the file is lost, the client End request uploads the file again.
3. file security transfer management method according to claim 1, wherein the server information includes uploading piece Section information and received segment initial position information.
4. file security transfer management method according to claim 1, wherein when the file is determined as small documents, hold The transmission of row single thread.
5. file security transfer management method according to claim 4, wherein the method for single thread transmission includes:
The cryptographic Hash for calculating file to be transmitted is stored in the client, and the file to be transmitted is encrypted and compressed;
When the file to be transmitted uploads, restore again after network interruption, the file to be transmitted can execute breakpoint transmission;
The received server-side is decrypted it and decompresses to the file to be transmitted, generates the cryptographic Hash of return;
The cryptographic Hash for calculating file to be transmitted and the cryptographic Hash of the return compare, and carry out the complete of the file to be transmitted Property judgement.
6. file security transfer management method according to claim 1, wherein the original document is determined as big file When, execute multi-threaded parallel transmission.
7. file security transfer management method according to claim 6, wherein execute the method packet of the multi-thread transmission It includes:
The cryptographic Hash for calculating big file is stored in the client, by the big file division at multiple file fragments;
The multiple file fragment is encrypted and compressed, the server end is sent to;
The multiple file fragment is decrypted and is decompressed in the server end, and the multiple file fragment is merged, It generates and restores big file, return the cryptographic Hash of the big file of reduction;
The cryptographic Hash of the big file and the cryptographic Hash of the big file of reduction compare, and the integrality for carrying out the big file is sentenced It is disconnected.
8. file security transfer management method according to claim 1, wherein the cryptographic Hash passes through the eap-message digest Algorithm is calculated.
9. file security transfer management method according to claim 1, wherein the server end communicates mould using IOCP Type.
10. a kind of file security transmission and management system utilizes file security transfer tube described in any one of claim 1-8 Reason method, comprising:
Client uploads file to be transmitted;
Server end, the server end and the client, which are established, to be communicated to connect;
Monitoring unit, the monitoring unit receive the upload request of client file to be transmitted;
Processing unit, the processing unit handle the upload request of the file to be transmitted, calculate the text to be transmitted Cryptographic Hash after part upload;
Storage unit, the storage unit store the cryptographic Hash of the file to be transmitted;
Judging unit, the judging unit judge the size of the file to be transmitted, indicate that the client executing single thread passes Defeated or execution multi-threaded parallel transmission;
Comparison unit compares the cryptographic Hash in the storage unit with the cryptographic Hash in the processing unit.
CN201710719512.7A 2017-08-21 2017-08-21 File security transfer management method and system Pending CN109428899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710719512.7A CN109428899A (en) 2017-08-21 2017-08-21 File security transfer management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710719512.7A CN109428899A (en) 2017-08-21 2017-08-21 File security transfer management method and system

Publications (1)

Publication Number Publication Date
CN109428899A true CN109428899A (en) 2019-03-05

Family

ID=65497865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710719512.7A Pending CN109428899A (en) 2017-08-21 2017-08-21 File security transfer management method and system

Country Status (1)

Country Link
CN (1) CN109428899A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109947776A (en) * 2019-03-15 2019-06-28 海南新软软件有限公司 A kind of data compression, decompressing method and device
CN110247986A (en) * 2019-06-28 2019-09-17 北京奇艺世纪科技有限公司 A kind of document transmission method, device and electronic equipment
CN110401723A (en) * 2019-08-16 2019-11-01 北京浪潮数据技术有限公司 Method, system, equipment and the storage medium of OVA file upload services device
CN110442442A (en) * 2019-08-13 2019-11-12 中国核动力研究设计院 Nuclear power plant DCS platform engineering teacher's station software safeguards network communication method
CN110933159A (en) * 2019-11-27 2020-03-27 中电装备山东电子有限公司 File transmission method and system supporting breakpoint continuous transmission
CN111274252A (en) * 2020-01-08 2020-06-12 平安科技(深圳)有限公司 Block chain data chaining method, device, storage medium and server
CN111352912A (en) * 2020-03-10 2020-06-30 Oppo广东移动通信有限公司 Compressed file processing method, device, storage medium, terminal and server
CN111726401A (en) * 2020-06-09 2020-09-29 北京天空卫士网络安全技术有限公司 File transmission method and device
CN112395094A (en) * 2021-01-19 2021-02-23 成都四方伟业软件股份有限公司 Resource initialization downloading method and device based on TPL
CN112600941A (en) * 2021-01-20 2021-04-02 广东金赋科技股份有限公司 Method, device and storage medium for automatically updating transmission data size optimization
CN112615899A (en) * 2020-11-25 2021-04-06 北京中电普华信息技术有限公司 Large file transmission method, device and system
CN112637225A (en) * 2020-12-28 2021-04-09 厦门市美亚柏科信息股份有限公司 Data sending method, data receiving method, client and server
CN113034194A (en) * 2021-04-02 2021-06-25 深圳市英特飞电子有限公司 Intelligent lamp pole advertisement management method and device, computer equipment and storage medium
CN113438277A (en) * 2021-05-28 2021-09-24 深圳证券通信有限公司 File receiving and transmitting method for communication system
CN113495903A (en) * 2021-09-08 2021-10-12 西安热工研究院有限公司 Electric power time sequence database caching method, system, equipment and readable storage medium
CN113987099A (en) * 2021-11-02 2022-01-28 金云数据科技有限公司 BIM technology-based method for automatically dropping model to GIS
CN114039971A (en) * 2021-11-11 2022-02-11 北京神舟航天软件技术股份有限公司 Large file concurrent transmission method based on file flow in BS mode
CN114448975A (en) * 2022-03-04 2022-05-06 中国建设银行股份有限公司 File transmission method, device, equipment and medium
CN114866533A (en) * 2022-04-28 2022-08-05 麦加芯彩新材料科技(上海)股份有限公司 File uploading method and device and electronic equipment
CN115037741A (en) * 2022-08-11 2022-09-09 中国长江三峡集团有限公司 File transmission method and device
CN116702225A (en) * 2023-06-08 2023-09-05 重庆傲雄在线信息技术有限公司 Method, system, equipment and medium for fast verifying electronic archive file based on hash parallel computing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020141588A1 (en) * 2001-03-27 2002-10-03 Rollins Doug L. Data security for digital data storage
CN1812410A (en) * 2005-01-25 2006-08-02 台湾积体电路制造股份有限公司 File transfer management systems and methods
CN101360260A (en) * 2007-07-31 2009-02-04 广东新支点技术服务有限公司 Hybrid mobile P2P content sharing system construction suitable for 2.5G/3G mobile data network
CN103237049A (en) * 2013-03-18 2013-08-07 北京易华录信息技术股份有限公司 File transfer method and device
CN103442037A (en) * 2013-08-09 2013-12-11 华南理工大学 Method for achieving multithreading breakpoint upload of oversized file based on FTP
CN106250270A (en) * 2016-07-28 2016-12-21 四川新环佳科技发展有限公司 A kind of data back up method under cloud computing platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020141588A1 (en) * 2001-03-27 2002-10-03 Rollins Doug L. Data security for digital data storage
CN1812410A (en) * 2005-01-25 2006-08-02 台湾积体电路制造股份有限公司 File transfer management systems and methods
CN101360260A (en) * 2007-07-31 2009-02-04 广东新支点技术服务有限公司 Hybrid mobile P2P content sharing system construction suitable for 2.5G/3G mobile data network
CN103237049A (en) * 2013-03-18 2013-08-07 北京易华录信息技术股份有限公司 File transfer method and device
CN103442037A (en) * 2013-08-09 2013-12-11 华南理工大学 Method for achieving multithreading breakpoint upload of oversized file based on FTP
CN106250270A (en) * 2016-07-28 2016-12-21 四川新环佳科技发展有限公司 A kind of data back up method under cloud computing platform

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109947776A (en) * 2019-03-15 2019-06-28 海南新软软件有限公司 A kind of data compression, decompressing method and device
CN110247986A (en) * 2019-06-28 2019-09-17 北京奇艺世纪科技有限公司 A kind of document transmission method, device and electronic equipment
CN110442442A (en) * 2019-08-13 2019-11-12 中国核动力研究设计院 Nuclear power plant DCS platform engineering teacher's station software safeguards network communication method
CN110401723A (en) * 2019-08-16 2019-11-01 北京浪潮数据技术有限公司 Method, system, equipment and the storage medium of OVA file upload services device
CN110933159A (en) * 2019-11-27 2020-03-27 中电装备山东电子有限公司 File transmission method and system supporting breakpoint continuous transmission
CN111274252B (en) * 2020-01-08 2023-11-28 平安科技(深圳)有限公司 Block chain data uplink method and device, storage medium and server
CN111274252A (en) * 2020-01-08 2020-06-12 平安科技(深圳)有限公司 Block chain data chaining method, device, storage medium and server
CN111352912A (en) * 2020-03-10 2020-06-30 Oppo广东移动通信有限公司 Compressed file processing method, device, storage medium, terminal and server
CN111352912B (en) * 2020-03-10 2024-04-12 Oppo广东移动通信有限公司 Compressed file processing method, device, storage medium, terminal and server
CN111726401A (en) * 2020-06-09 2020-09-29 北京天空卫士网络安全技术有限公司 File transmission method and device
CN111726401B (en) * 2020-06-09 2023-05-26 北京天空卫士网络安全技术有限公司 File transmission method and device
CN112615899A (en) * 2020-11-25 2021-04-06 北京中电普华信息技术有限公司 Large file transmission method, device and system
CN112637225A (en) * 2020-12-28 2021-04-09 厦门市美亚柏科信息股份有限公司 Data sending method, data receiving method, client and server
CN112395094A (en) * 2021-01-19 2021-02-23 成都四方伟业软件股份有限公司 Resource initialization downloading method and device based on TPL
CN112600941A (en) * 2021-01-20 2021-04-02 广东金赋科技股份有限公司 Method, device and storage medium for automatically updating transmission data size optimization
CN112600941B (en) * 2021-01-20 2023-04-18 广东金赋科技股份有限公司 Method, device and storage medium for automatically updating transmission data size optimization
CN113034194B (en) * 2021-04-02 2024-05-17 深圳市英特飞电子有限公司 Intelligent lamp post advertisement management method, intelligent lamp post advertisement management device, computer equipment and storage medium
CN113034194A (en) * 2021-04-02 2021-06-25 深圳市英特飞电子有限公司 Intelligent lamp pole advertisement management method and device, computer equipment and storage medium
CN113438277A (en) * 2021-05-28 2021-09-24 深圳证券通信有限公司 File receiving and transmitting method for communication system
CN113495903A (en) * 2021-09-08 2021-10-12 西安热工研究院有限公司 Electric power time sequence database caching method, system, equipment and readable storage medium
CN113495903B (en) * 2021-09-08 2021-12-17 西安热工研究院有限公司 Electric power time sequence database caching method, system, equipment and readable storage medium
CN113987099B (en) * 2021-11-02 2024-01-30 金云数据科技有限公司 BIM technology-based method for automatically falling model to GIS
CN113987099A (en) * 2021-11-02 2022-01-28 金云数据科技有限公司 BIM technology-based method for automatically dropping model to GIS
CN114039971A (en) * 2021-11-11 2022-02-11 北京神舟航天软件技术股份有限公司 Large file concurrent transmission method based on file flow in BS mode
CN114448975A (en) * 2022-03-04 2022-05-06 中国建设银行股份有限公司 File transmission method, device, equipment and medium
CN114866533A (en) * 2022-04-28 2022-08-05 麦加芯彩新材料科技(上海)股份有限公司 File uploading method and device and electronic equipment
CN115037741A (en) * 2022-08-11 2022-09-09 中国长江三峡集团有限公司 File transmission method and device
CN115037741B (en) * 2022-08-11 2022-11-15 中国长江三峡集团有限公司 File transmission method and device
CN116702225A (en) * 2023-06-08 2023-09-05 重庆傲雄在线信息技术有限公司 Method, system, equipment and medium for fast verifying electronic archive file based on hash parallel computing

Similar Documents

Publication Publication Date Title
CN109428899A (en) File security transfer management method and system
CN109347835B (en) Information transmission method, client, server, and computer-readable storage medium
US7885412B2 (en) Pre-generation of generic session keys for use in communicating within communications environments
CN103107889B (en) A kind of cloud computing environment data encryption storage system and method that can search for
CN106209606B (en) A kind of method, terminal and system for using WEB mail safely
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN102882974B (en) Method for saving website access resource by website identification version number
US10764261B2 (en) System and method for enabling a scalable public-key infrastructure on a smart grid network
CN106878024B (en) A kind of verifying code check method and system based on caching
US7739301B2 (en) Method and apparatus for improving file system proxy performance and security by distributing information to clients via file handles
CN112615899A (en) Large file transmission method, device and system
CN101552669A (en) Method and system of data transmission
CN105141635A (en) Method and system for safe communication of group sending messages
CN112689014B (en) Double-full-work communication method, device, computer equipment and storage medium
CN109951546A (en) Transactions requests processing method, device, equipment and medium based on intelligent contract
CN109729000B (en) Instant messaging method and device
CN109768948A (en) Information push method, system and messaging device
CN102194014A (en) Document storage method and document recovery method
CN115134087A (en) Client security data deduplication method for decentralized cloud storage
CN110224824B (en) Digital certificate processing method and device, computer equipment and storage medium
CN111181920A (en) Encryption and decryption method and device
CN104301102B (en) Widget communication means, apparatus and system
CN109218009B (en) Method, client and server for improving equipment ID security
CN104917763A (en) PIN code caching method
CN111835519A (en) Covert communication method based on public block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190305