CN114745373A - File transmission method, device, equipment and storage medium - Google Patents

File transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN114745373A
CN114745373A CN202210534722.XA CN202210534722A CN114745373A CN 114745373 A CN114745373 A CN 114745373A CN 202210534722 A CN202210534722 A CN 202210534722A CN 114745373 A CN114745373 A CN 114745373A
Authority
CN
China
Prior art keywords
file
compressed
target
transmission picture
compressed file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210534722.XA
Other languages
Chinese (zh)
Inventor
赵旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210534722.XA priority Critical patent/CN114745373A/en
Publication of CN114745373A publication Critical patent/CN114745373A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the specification provides a file transmission method, a file transmission device, file transmission equipment and a storage medium, and can be used in the technical field of network security. The method comprises the steps of compressing the privacy file uploaded by a client to obtain a compressed file; processing the encryption identification of the designated area of the compressed file to obtain a target compressed file; acquiring a transmission picture; writing the target compressed file into the transmission picture to obtain a target transmission picture; and transmitting the target transmission picture to a target system. By utilizing the embodiment of the specification, the privacy of the client can be effectively protected, and the safety of information transmission is improved.

Description

File transmission method, device, equipment and storage medium
Technical Field
The present application relates to the field of network security technologies, and in particular, to a method, an apparatus, a device, and a storage medium for file transmission.
Background
At present, when a customer carries out online transaction at a bank, information is mainly transmitted through a traditional HTTP/HTTPS message. However, with this way of transmitting information, a password field exists regardless of whether the information is encrypted or not. Therefore, if the transmission information is intercepted, the privacy of the client can be leaked, and great risk is brought to the privacy security of the client.
Therefore, there is a need for a solution to the above technical problems.
Disclosure of Invention
The embodiment of the specification provides a file transmission method, a file transmission device, file transmission equipment and a storage medium, which can effectively protect the privacy of a client and improve the security of transmitted information.
The file transmission method, device, equipment and storage medium provided by the specification are realized in the following modes.
A file transfer method, comprising: compressing the private file uploaded by the client to obtain a compressed file; processing the encryption identification of the designated area of the compressed file to obtain a target compressed file; acquiring a transmission picture; writing the target compressed file into the transmission picture to obtain a target transmission picture; and transmitting the target transmission picture to a target system.
In some embodiments, the privacy file includes at least one file; compressing the private file uploaded by the client to obtain a compressed file comprises the following steps: compressing each file included in the private files based on a preset encryption mode to obtain a compressed packet corresponding to each file; and compressing the compressed packets corresponding to all the files to obtain compressed files.
In some embodiments, compressing each file included in the private file based on a preset encryption manner to obtain a compressed packet corresponding to each file includes: acquiring file information of a first file in the privacy files; determining an MD5 value of the first file by utilizing an MD5 algorithm according to the file information; and compressing the first file based on the MD5 value to obtain a compressed package corresponding to the first file.
In some embodiments, the designated area includes a compressed source file data area and a compressed source file directory area; the processing the encrypted identifier of the specified area of the compressed file to obtain the target compressed file includes: and modifying the encryption identifier of the compressed source file data area of the compressed file into a first identifier, and modifying the encryption identifier of the compressed source file directory area of the compressed file into a second identifier to obtain the target compressed file.
In some embodiments, writing the target compressed file into the transmission picture to obtain a target transmission picture includes: converting the target compressed file into hexadecimal data; determining an end zone bit of the transmission picture; and writing the hexadecimal data in the ending flag bit to obtain a target transmission picture.
A file transfer method, comprising: receiving a target transmission picture; the target transmission picture is obtained according to a privacy file uploaded by a client; extracting a target compressed file from the target transmission picture; processing the encryption identification of the designated area of the target compressed file to obtain a compressed file; and decompressing the compressed file to obtain the private file uploaded by the client.
In some embodiments, extracting a target compressed file from the target transmission picture comprises: determining an ending flag bit of the target transmission picture; extracting hexadecimal data after the ending flag bit; and converting the hexadecimal data to obtain a target compressed file.
In some embodiments, processing the encrypted identifier of the specified area of the target compressed file to obtain a compressed file includes: and modifying the encryption identifier of the compressed source file data area of the target compressed file into a third identifier, and modifying the encryption identifier of the compressed source file directory area of the target compressed file into a fourth identifier to obtain a compressed file.
In some embodiments, decompressing the compressed file to obtain the private file uploaded by the client includes: decompressing the compressed file to obtain at least one file; and decompressing at least one file based on a preset decryption mode to obtain the privacy file uploaded by the client.
In some embodiments, further comprising: calculating an MD5 value for the privacy file; comparing the MD5 value with a MD5 value saved in a blockchain; based on the comparison result, it is determined whether to perform a business transaction.
A file transfer device comprising: the compression module is used for compressing the private files uploaded by the client to obtain compressed files; the processing module is used for processing the encrypted identifier of the specified area of the compressed file to obtain a target compressed file; the acquisition module is used for acquiring a transmission picture; the writing module is used for writing the target compressed file into the transmission picture to obtain a target transmission picture; and the transmission module is used for transmitting the target transmission picture to a target system.
A file transfer device comprising: the receiving module is used for receiving a target transmission picture; the target transmission picture is obtained according to a privacy file uploaded by a client; the extraction module is used for extracting a target compressed file from the target transmission picture; the obtaining module is used for processing the encryption identification of the designated area of the target compressed file to obtain a compressed file; and the decompression module is used for decompressing the compressed file to obtain the privacy file uploaded by the client.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any one of the method embodiments of the present description when executing the computer program.
A computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any one of the method embodiments in the present specification.
A computer program product comprising a computer program that, when executed by a processor, performs the steps of any one of the method embodiments in the present specification.
The specification provides a file transmission method, a file transmission device, file transmission equipment and a storage medium. In some embodiments, the private file uploaded by the client may be compressed to obtain a compressed file, and the encrypted identifier of the specified area of the compressed file is processed to obtain a target compressed file; and a transmission picture can be obtained, the target compressed file is written into the transmission picture, a target transmission picture is obtained, and the target transmission picture is transmitted to a target system. Because in the transmission process of the information transmission file, the privacy information uploaded by the client is protected by using the compressed packet pseudo-encryption technology, even if the file is intercepted in the transmission process of the file, the password trace cannot be seen due to the absence of the password field, so that the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a schematic diagram of a scenario of a file transfer system provided herein;
FIG. 2 is a schematic flow chart diagram illustrating one embodiment of a file transfer method as provided herein;
FIG. 3 is a schematic flow chart diagram illustrating one embodiment of another file transfer method provided herein;
FIG. 4 is a block diagram of an embodiment of a document transportation device provided in the present specification;
FIG. 5 is a block diagram of another embodiment of a document transportation device;
fig. 6 is a block diagram of a hardware configuration of an embodiment of a file transfer server provided in the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments in the present specification, and not all of the embodiments. All other embodiments that can be obtained by a person skilled in the art based on one or more embodiments of the present disclosure without making any creative effort shall fall within the protection scope of the embodiments of the present disclosure.
As will be appreciated by one skilled in the art, implementations of the embodiments of the present description may be embodied as a system, an apparatus, a method, or a computer program product. Therefore, the disclosure of the embodiments of the present specification can be embodied in the following forms: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
Although the flow described below includes operations that occur in a particular order, it should be appreciated that the processes may include more or less operations that are performed sequentially or in parallel (e.g., using parallel processors or a multi-threaded environment).
As shown in fig. 1, which is a schematic view of a scenario of a file transfer system provided in this specification, where the file transfer system may include: a terminal device 101 and a server 102. In particular, the client may initiate a file transfer request to the terminal device 101. After receiving the file transmission request, the terminal device 101 may acquire the private file uploaded by the client, compress the private file to obtain a compressed file, and then process the encrypted identifier of the designated area of the compressed file to obtain the target compressed file. Further, a transmission picture may be obtained, the target compressed file is written into the transmission picture, a target transmission picture is obtained, and the target transmission picture is transmitted to the server 102. After receiving the target transmission picture, the server 102 may extract a target compressed file from the target transmission picture, process an encryption identifier of a designated area of the target compressed file to obtain a compressed file, and finally decompress the compressed file to obtain a private file uploaded by the client. Because in the file transmission process, the compressed packet pseudo-encryption technology is used for protecting the privacy information uploaded by the client, even if the file is intercepted in the file transmission process, no password trace can be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
The terminal device 101 may be a terminal device or software used by a client. Specifically, the terminal device may be a terminal device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart watch, or other wearable devices, or may be a robot device. Of course, the terminal device 101 may be software that can run in the above terminal device. For example: system applications, payment applications, browsers, wechat applets, and the like.
The server 102 may be a single server or a server cluster, and certainly, the functions of the server may also be implemented by a cloud computing technology. The server 102 may be connected to a plurality of terminal devices, or may be a server having a powerful information repository.
The following describes an embodiment of the present disclosure with a specific application scenario as an example. Specifically, fig. 2 is a schematic flow chart of an embodiment of a file transmission method provided in this specification. Although the present specification provides method steps or apparatus structures as shown in the following examples or figures, more or less steps or modules may be included in the method or apparatus, as may be conventional or necessary without inventive faculty.
It should be noted that, in the technical solution of the present application, the acquisition, storage, use, processing, etc. of data all conform to the relevant regulations of the national laws and regulations. The following embodiments are described from the perspective of a terminal device, and do not limit other technical solutions in the extensible application scenario based on the present specification. Specifically, as shown in fig. 2, a file transmission method provided in this specification may include the following steps.
S20: and compressing the private file uploaded by the client to obtain a compressed file.
The privacy file may be a file including privacy information, such as an identity material, an enterprise license, an enterprise report, and the like. Private information may also be referred to as sensitive information. Some sensitive characters, such as passwords, identification marks, bank card numbers, etc., may be included in the private information. Sensitive information is included in the compressed file.
In some embodiments, the client may upload the privacy file according to a prompt of the terminal device. The terminal equipment can prompt the client to upload the private file in a voice mode, a text mode and the like.
In some embodiments, at least one file may be included in the privacy file. For example, the privacy file uploaded by the client may include a1, a1, a2, A3, a1, a2, A3, a4, and the like. It is to be understood that the above description is only exemplary, and other embodiments of the present disclosure are not limited thereto.
In some implementation scenarios, when one or more files are included in the privacy file, the compressing the privacy file uploaded by the client to obtain a compressed file may include: compressing each file included in the private files based on a preset encryption mode to obtain a compressed packet corresponding to each file; and compressing the compressed packets corresponding to all the files to obtain compressed files. Specifically, for example, in some implementation scenarios, the private files uploaded by the client include a1, a2, and A3, and at this time, a1, a2, and A3 uploaded by the client may be packaged into separate compressed packages Z1, Z2, and Z3, respectively, based on a preset encryption manner. Further, the compressed packages Z1, Z2, Z3 may be packaged as one compressed package Z0, so that Z0 may be understood as a compressed file.
In some implementation scenarios, compressing each file included in the privacy file based on a preset encryption manner to obtain a compressed packet corresponding to each file may include: acquiring file information of a first file in the privacy files; determining an MD5 value of the first file by utilizing an MD5 algorithm according to the file information; and compressing the first file based on the MD5 value to obtain a compressed package corresponding to the first file. The first file may be any one of the privacy files. The file information may include a file name, a file creation time, and the like. The MD5 Algorithm, also known as MD5 Message Digest Algorithm (MD5 Message-Digest Algorithm), is a widely used cryptographic hash function that generates a 128-bit (16-byte) hash value to ensure the integrity of the Message transmission.
In some implementation scenarios, after determining the MD5 value of each file, the MD5 value may be used as an encryption password (also referred to as a compression password) for the corresponding file, and the file is compressed, so as to obtain a compressed package corresponding to the file.
In some implementation scenarios, after obtaining the MD5 value, the file information corresponding to each file and the MD5 value may be stored in the blockchain, which may facilitate subsequent use and prevent tampering. The blockchain is a decentralized, non-falsifiable and credible distributed account book and has the characteristics of non-falsification, trace retention in the whole process, traceability, public transparency, collective maintenance and the like.
S22: and processing the encryption identifier of the specified area of the compressed file to obtain a target compressed file.
In this embodiment of the present specification, after compressing a private file uploaded by a client to obtain a compressed file, an encryption identifier of a specified area of the compressed file may be processed to obtain a target compressed file. The compressed file may include a compressed source file data area, a compressed source file directory area, and a directory end flag. The compressed source file data region may include a file header, file data, and a data descriptor. The header may be used to indicate the start of the file and to record information of the file compression. The file data is located behind the file header and used for recording data of file compression and storage. The data descriptor exists only when the 3 rd bit of the general bit flag bit of the header is 1. The compressed source file directory area may be used to record directory information of compressed files, and a record of each compressed source file data area corresponds to a record of this compressed source file directory area. The end-of-directory flag may be used to mark the end of compressed directory data, each compressed file corresponding to a record in the data area.
In some embodiments, the designated area may include a compressed source file data area and a compressed source file directory area. The compressed source file data area and the compressed source file directory area respectively comprise global encryption identification bits. The global encryption flag may be used to write the encryption flag. Whether the current compressed file is encrypted can be determined according to the encryption identifier.
In some implementation scenarios, the processing the encrypted identifier of the specified area of the compressed file to obtain the target compressed file may include: and modifying the encryption identifier of the compressed source file data area of the compressed file into a first identifier, and modifying the encryption identifier of the compressed source file directory area of the compressed file into a second identifier to obtain the target compressed file. The first identifier and the second identifier may be hexadecimal data with a length of 2 bytes. The first flag may be 0000, indicating that the compressed file is unencrypted. The second flag may be 0900, indicating that the compressed file has encryption. Of course, the first identifier and the second identifier may be adjusted according to the actual scene.
Specifically, for example, in some implementation scenarios, after obtaining the compressed file Z0, the global encryption flag of the compressed source file data area of the compressed file Z0 may be modified to 0000, and the global encryption mode flag of the compressed source file directory area may be modified to 0900, so as to obtain the target compressed file C (which may also be referred to as compressed package C). At this time, if the compressed packet C is intercepted and downloaded by a person, password protection is prompted when the compressed packet C is opened, but no matter what password is input, password error is prompted. Of course, the above description is only exemplary, and the way of obtaining the target compressed file is not limited to the above examples, and other modifications are possible for those skilled in the art in light of the technical spirit of the present application, but all that can be achieved with the same or similar functions and effects as the present application is included in the scope of protection of the present application.
S24: and acquiring a transmission picture.
In this embodiment of the present specification, after the target compressed file is obtained, a transmission picture may be obtained, so that the obtained target compressed file is subsequently steganographically transferred to the transmission picture. Among these, steganography is a way of hiding information, which is understood to be a delivery event or content of information that does not let anyone other than the intended recipient know the information.
In some embodiments, a picture may be randomly generated as a transmission picture by a picture generation tool, a frame of image may be randomly captured from a video stored in a local or third-party organization as a transmission picture, a picture may be randomly selected from a local storage as a transmission picture, and the like. Of course, the above description is only exemplary, the manner of obtaining the transmission picture is not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the present application, but all that is needed is to cover the protection scope of the present application as long as the achieved function and effect are the same or similar to the present application. Wherein the third party authority may be a device communicating with the terminal device.
In some embodiments, after the transmission picture is obtained, the transmission picture may be stored in the blockchain, which may facilitate subsequent use while preventing tampering.
S26: and writing the target compressed file into the transmission picture to obtain a target transmission picture.
In this embodiment of the present specification, after a transmission picture is obtained, a target compressed file may be written into the transmission picture, so as to obtain a target transmission picture. Wherein a target transmission picture may be understood as a picture to be transmitted to a target system. Sensitive information of the client is hidden in the target transmission picture. The target transmission picture only transmits one picture in the transmission process, and when the target transmission picture is intercepted, the password field is not displayed, and only a common data packet of the transmission picture is displayed.
In some embodiments, writing the target compressed file into the transmission picture to obtain a target transmission picture may include: converting the target compressed file into hexadecimal data; determining an end zone bit of the transmission picture; and writing the hexadecimal data in the ending flag bit to obtain a target transmission picture.
Specifically, for example, in some implementation scenarios, a transmission picture D is randomly generated, and the obtained target compressed file C (which may also be referred to as a compressed packet C) is hidden in hexadecimal format in the end flag bit of the transmission picture D in the file carrier manner to obtain a target transmission picture E.
After the target system receives the target transmission picture, the process of identifying the target transmission picture is from a file header mark to an end mark bit of the file. Therefore, after the system identifies the ending zone bit of the picture, the default is that the picture is not continuously identified, so that only one picture can be seen and transmitted under the normal condition, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
In some embodiments, after the target transmission picture is obtained, the target transmission picture may be stored in the blockchain, which may facilitate subsequent use and prevent tampering.
According to the embodiment of the specification, the private information uploaded by the client is protected by using a compressed packet pseudo-encryption technology, so that even if the file is intercepted in the file transmission process, a password trace cannot be seen due to the fact that a password field does not exist, the privacy of the client can be effectively protected, and great guarantee is brought to the privacy safety of the client.
S28: and transmitting the target transmission picture to a target system.
In this embodiment of the present specification, after the target transmission picture is obtained, the target transmission picture may be uploaded to a target system. The target system can be an application system, a background system, a server, and the like.
In some embodiments, the manner of transmitting the target transmission picture to the target system may be one or more of wired, wireless, and the like, which is not limited in this specification.
In some embodiments, after receiving the target transmission picture, the target system may extract the target compressed file from the target transmission picture, and then process the encrypted identifier of the specified area of the target compressed file to obtain the compressed file. Furthermore, the compressed file can be decompressed to obtain the privacy file uploaded by the client, so that the privacy file is transmitted in a concealed mode.
In the embodiment of the specification, the file carrier is used for hiding the sensitive information in the picture, so that the transmission is realized by only transmitting one picture, and the sensitive data uploaded by a client cannot be seen, thereby effectively protecting the privacy of the client.
In the embodiment of the description, the pseudo encryption technology of the compressed packet is used for protecting sensitive data uploaded by a client, and even if a transmitted picture is intercepted and the compressed packet is separated, the compressed packet cannot be decompressed through password explosion, so that the security is high.
In the embodiment of the specification, the block chain is used for storing the file information, the MD5 corresponding to the file, the target transmission picture and the like, so that data can be effectively prevented from being tampered, and the data security is improved.
The embodiment of the specification can be applied to the fields of finance, file transmission and the like. For example, a compressed package pseudo-encryption technique may be used to hide sensitive file transfers in a financial transaction scenario.
It is to be understood that the foregoing is only exemplary, and the embodiments of the present disclosure are not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the present disclosure, and the scope of the present disclosure is intended to be covered by the claims as long as the functions and effects achieved by the embodiments are the same as or similar to the present disclosure.
The above embodiments describe embodiments of the file transfer method from the terminal device perspective. Based on the description of the above embodiments, the present specification also provides a file transfer method described from the server perspective. Fig. 3 is a schematic flow chart of another file transmission method provided in this specification according to an embodiment of the present invention. Specifically, in one embodiment, the method may include the following steps.
S30: receiving a target transmission picture; the target transmission picture is obtained according to a privacy file uploaded by a client;
s32: extracting a target compressed file from the target transmission picture;
s34: processing the encryption identifier of the designated area of the target compressed file to obtain a compressed file;
s36: and decompressing the compressed file to obtain the private file uploaded by the client.
The target transmission picture may be obtained based on the foregoing steps S20-S26, which may be referred to specifically, and is not described in detail herein.
In some embodiments, extracting the target compressed file from the target transmission picture may include: determining an end zone bit of the target transmission picture; extracting hexadecimal data after the ending flag bit; and converting the hexadecimal data to obtain a target compressed file.
In some embodiments, processing the encrypted identifier of the specified area of the target compressed file to obtain the compressed file may include: and modifying the encryption identifier of the compressed source file data area of the target compressed file into a third identifier, and modifying the encryption identifier of the compressed source file directory area of the target compressed file into a fourth identifier to obtain a compressed file. Of course, the third identifier and the fourth identifier may be adjusted according to the actual scene.
In some embodiments, decompressing the compressed file to obtain the private file uploaded by the client may include: decompressing the compressed file to obtain at least one file; and decompressing at least one file based on a preset decryption mode to obtain the privacy file uploaded by the client.
Specifically, for example, in some implementation scenarios, after receiving a target transmission picture sent by a terminal device, a server may first determine an end flag of the target transmission picture, and then extract hexadecimal data after the end flag. The hexadecimal data can then be transformed to obtain the file carrier, i.e. the target compressed file C (which can also be called compressed package C).
Further, the global encryption flag of the compressed package C may be modified to remove the pseudo-encryption, and a compressed file Z0 (also called compressed package Z0) is obtained. Specifically, the encryption identifier of the compressed source file data area of the compressed packet C may be modified, and the encryption identifier of the compressed source file directory area of the compressed packet C may be modified, so as to obtain the compressed packet Z0.
The compressed packet Z0 may then be decompressed to obtain Z1, Z2, Z3. Further, compressed passwords (i.e., MD5 values) corresponding to Z1, Z2, and Z3 may be acquired from the blockchain, and then Z1, Z2, and Z3 may be decompressed based on MD5 values corresponding to Z1, Z2, and Z3, respectively, so as to obtain privacy files a1, a2, and A3 uploaded by the client.
It is to be understood that the foregoing is only exemplary, and the embodiments of the present disclosure are not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the present disclosure, and the scope of the present disclosure is intended to be covered by the claims as long as the functions and effects achieved by the embodiments are the same as or similar to the present disclosure.
In some embodiments, after obtaining the privacy file uploaded by the client, the method may further include: calculating an MD5 value for the privacy file; comparing the MD5 value with a MD5 value saved in a blockchain; based on the comparison result, it is determined whether to perform a business transaction.
For example, in some implementations, after obtaining the privacy files a1, a2, A3 uploaded by the client, MD5 values of a1, a2, A3 may be calculated, respectively. Further, it can be compared with the MD5 values corresponding to a1, a2, A3 saved in the blockchain. If the files are consistent, the files A1, A2 and A3 are complete and are not tampered, and at the moment, the original files A1, A2 and A3 uploaded by the client can be processed according to business logic. If the files are inconsistent, the files A1, A2 and A3 are tampered, and at the moment, the files A1, A2 and A3 are refused to be processed, and a prompt is sent to the client through one or more modes of telephone, short message, mail and the like, so that the account resources of the client are protected.
In the embodiment of the specification, the compressed packet pseudo-encryption technology is used for protecting the privacy information uploaded by the client, so that even if the file is intercepted in the file transmission process, no password trace can be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
It should be noted that, in the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. For the relevant points, reference may be made to some descriptions of other method embodiments, which are not described in detail herein.
From the above description, it can be seen that, in the embodiment of the present application, a private file uploaded by a client may be compressed to obtain a compressed file, and an encryption identifier of an assigned area of the compressed file is processed to obtain a target compressed file; and a transmission picture can be obtained, the target compressed file is written into the transmission picture, a target transmission picture is obtained, and the target transmission picture is transmitted to a target system. Because in the file transmission process, the compressed packet pseudo-encryption technology is used for protecting the privacy information uploaded by the client, even if the file is intercepted in the file transmission process, no password trace can be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
It is to be understood that the foregoing is only exemplary, and the embodiments of the present disclosure are not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the present disclosure, and the scope of the present disclosure is intended to be covered by the claims as long as the functions and effects achieved by the embodiments are the same as or similar to the present disclosure. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in processes, methods, articles, or apparatus that include the recited elements is not excluded. Moreover, the references to "first" and "second" are merely intended to distinguish one outcome from another, and are not intended to be limiting.
Based on the file transmission method, an embodiment of the present specification further provides a file transmission device. As shown in fig. 4, in a software layer, the present specification provides a file transfer apparatus, which may include: the compression module 400, the processing module 402, the obtaining module 404, the writing module 406, and the transmission module 408.
The compression module 400 may be configured to compress the private file uploaded by the client, so as to obtain a compressed file;
a processing module 402, configured to process the encrypted identifier of the specified area of the compressed file to obtain a target compressed file;
an obtaining module 404, configured to obtain a transmission picture;
a writing module 406, configured to write the target compressed file into the transmission picture, so as to obtain a target transmission picture;
a transmission module 408 may be configured to transmit the target transmission picture to a target system.
In some embodiments, at least one file may be included in the privacy file; the compression module 400 may include:
the first compression unit may be configured to compress each file included in the private file based on a preset encryption manner, and obtain a compression packet corresponding to each file;
the second compression unit may be configured to compress the compressed packets corresponding to all the files to obtain compressed files.
In some embodiments, the first compression unit may include:
the device comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit can be used for acquiring file information of a first file in the privacy files;
a first determining unit operable to determine an MD5 value of the first file using an MD5 algorithm according to the file information;
an obtaining unit, configured to compress the first file based on the MD5 value, and obtain a compressed package corresponding to the first file.
In some embodiments, the designated area may include a compressed source file data area and a compressed source file directory area;
the processing module 402 may include:
the modification unit may be configured to modify the encryption identifier of the compressed source file data area of the compressed file into a first identifier, modify the encryption identifier of the compressed source file directory area of the compressed file into a second identifier, and obtain the target compressed file.
In some embodiments, the writing module 406 may include:
a conversion unit operable to convert the target compressed file into hexadecimal data;
a second determining unit, configured to determine an end flag of the transmitted picture;
and the writing unit can determine that the target transmission picture is obtained after the hexadecimal data is written in the ending flag bit.
As shown in fig. 5, in a software layer, another file transfer apparatus provided in this specification may include: a receiving module 500, an extracting module 502, an obtaining module 504, and a decompressing module 506.
A receiving module 500, which may be configured to receive a target transmission picture; the target transmission picture is obtained according to a privacy file uploaded by a client;
an extracting module 502, which may be configured to extract a target compressed file from the target transmission picture;
an obtaining module 504, configured to process the encrypted identifier of the specified area of the target compressed file, and obtain a compressed file;
and the decompressing module 506 may be configured to decompress the compressed file to obtain the privacy file uploaded by the client.
In some embodiments, the extraction module 502 may include:
a first determining unit, configured to determine an end flag of the target transmission picture;
an extracting unit, configured to extract hexadecimal data after the end flag bit;
and the conversion unit can be used for converting the hexadecimal data to obtain a target compressed file.
In some embodiments, the obtaining module 504 may include:
and the modifying unit can be used for modifying the encryption identifier of the compressed source file data area of the target compressed file into a third identifier and modifying the encryption identifier of the compressed source file directory area of the target compressed file into a fourth identifier to obtain the compressed file.
In some embodiments, the decompression module 506 may include:
the first decompression unit may be configured to decompress the compressed file to obtain at least one file;
the second decompressing unit may be configured to decompress at least one file based on a preset decryption manner, so as to obtain a privacy file uploaded by a client.
In some embodiments, it may further include:
a calculating unit, operable to calculate an MD5 value of the privacy file;
a comparison unit operable to compare the MD5 value with MD5 values stored in a blockchain;
and the second determination unit can be used for determining whether to perform business transaction based on the comparison result.
It should be noted that the above-mentioned apparatus may also include other embodiments according to the description of the method embodiment. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
Therefore, according to the file transmission device provided by the embodiment of the specification, in the transmission process of the information transmission file, the privacy information uploaded by the client is protected by using the compression package pseudo-encryption technology, so that even if the file is intercepted in the file transmission process, no password trace can be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
It should be noted that, the units, devices, modules, etc. illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. It is to be understood that, in implementing the present specification, functions of each module may be implemented in one or more pieces of software and/or hardware, or a module that implements the same function may be implemented by a combination of a plurality of sub-modules or sub-units, or the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The embodiment of the present specification further provides a file transmission device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the steps of any one of the method embodiments in the embodiment of the present specification may be implemented. For example, the following steps may be included: compressing the private file uploaded by the client to obtain a compressed file; processing the encryption identification of the designated area of the compressed file to obtain a target compressed file; acquiring a transmission picture; writing the target compressed file into the transmission picture to obtain a target transmission picture; and transmitting the target transmission picture to a target system.
In order to more accurately complete the above instruction, embodiments of the present specification further provide a server, where the server may be the file transmission device or the file transmission apparatus in the above embodiments. As shown in fig. 6, which is a block diagram of a hardware structure of an embodiment of a file transfer server provided in the present specification, the server 10 may include one or more processors 100 (only one is shown in the figure) (the processor 100 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 200 for storing data, and a transmission module 300 for communication function. It will be understood by those skilled in the art that the structure shown in fig. 6 is only an illustration and is not intended to limit the structure of the electronic device. For example, the server 10 may also include more or fewer components than shown in FIG. 6, and may also include other processing hardware, such as a database or multi-level cache, a GPU, or have a different configuration than shown in FIG. 6, for example.
The memory 200 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the file transfer method in the embodiment of the present specification, and the processor 100 executes various functional applications and data processing by executing the software programs and modules stored in the memory 200. Memory 200 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 200 may further include memory located remotely from processor 100, which may be connected to a computer terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 300 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal. In one example, the transmission module 300 includes a Network adapter (NIC) that can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission module 300 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The embodiments of the present specification further provide a computer-readable storage medium storing a computer program, which when executed by a processor, implements the steps of any one of the method embodiments of the specification. For example, the following steps may be included: compressing the private file uploaded by the client to obtain a compressed file; processing the encryption identification of the designated area of the compressed file to obtain a target compressed file; acquiring a transmission picture; writing the target compressed file into the transmission picture to obtain a target transmission picture; and transmitting the target transmission picture to a target system.
In this embodiment, the storage medium may include a physical device for storing information, and usually, the information is digitized and stored in a medium using an electric, magnetic, or optical method. The storage medium may include: devices that store information using electrical energy, such as: various memories, such as Random Access Memory (RAM), Read-Only Memory (ROM), etc.; devices that store information using magnetic energy, such as: hard disks, floppy disks, tapes, core memory, bubble memory, U disks, etc.; devices for storing information optically, such as: CD or DVD, etc. Of course, there are other ways of storing media that can be read, e.g., quantum memory, graphene memory, etc.
The embodiments of the present specification also provide a computer program product comprising a computer program that, when executed by a processor, can implement the steps of any one of the method embodiments of the present specification. For example, the following steps may be included: compressing the private file uploaded by a client to obtain a compressed file; processing the encryption identification of the designated area of the compressed file to obtain a target compressed file; acquiring a transmission picture; writing the target compressed file into the transmission picture to obtain a target transmission picture; and transmitting the target transmission picture to a target system.
It should be noted that the above-mentioned apparatuses, devices, computer-readable storage media, computer program products and descriptions of embodiments according to methods or apparatuses may also include other embodiments. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
Because embodiments of the present invention may be provided as a method, apparatus (system), computer program product, or the like, it will be apparent to those skilled in the art that the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects.
It is apparent that specific embodiments of the present specification have been described above. It is to be understood that the above description is intended to be illustrative, and not restrictive. Many embodiments and many applications other than the examples provided will be apparent to those of skill in the art upon reading the above description. The scope of embodiments of the present specification should, therefore, be determined not with reference to the above description, but should instead be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Furthermore, the present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (15)

1. A method for file transfer, comprising:
compressing the private file uploaded by the client to obtain a compressed file;
processing the encryption identification of the designated area of the compressed file to obtain a target compressed file;
acquiring a transmission picture;
writing the target compressed file into the transmission picture to obtain a target transmission picture;
and transmitting the target transmission picture to a target system.
2. The method of claim 1, wherein the privacy file comprises at least one file;
compressing the private file uploaded by the client to obtain a compressed file comprises the following steps:
compressing each file included in the private files based on a preset encryption mode to obtain a compressed packet corresponding to each file;
and compressing the compressed packets corresponding to all the files to obtain compressed files.
3. The method of claim 2, wherein compressing each file included in the private file based on a preset encryption manner to obtain a compressed packet corresponding to each file comprises:
acquiring file information of a first file in the privacy files;
determining an MD5 value of the first file by utilizing an MD5 algorithm according to the file information;
and compressing the first file based on the MD5 value to obtain a compressed package corresponding to the first file.
4. The method according to claim 1, wherein the specified area includes a compressed source file data area and a compressed source file directory area;
the processing the encrypted identifier of the specified area of the compressed file to obtain the target compressed file includes:
and modifying the encryption identifier of the compressed source file data area of the compressed file into a first identifier, and modifying the encryption identifier of the compressed source file directory area of the compressed file into a second identifier to obtain the target compressed file.
5. The method of claim 1, wherein writing the target compressed file into the transmission picture to obtain a target transmission picture comprises:
converting the target compressed file into hexadecimal data;
determining an end zone bit of the transmission picture;
and writing the hexadecimal data in the ending flag bit to obtain a target transmission picture.
6. A method for file transfer, comprising:
receiving a target transmission picture; the target transmission picture is obtained according to a privacy file uploaded by a client;
extracting a target compressed file from the target transmission picture;
processing the encryption identification of the designated area of the target compressed file to obtain a compressed file;
and decompressing the compressed file to obtain the privacy file uploaded by the client.
7. The method of claim 6, wherein extracting a target compressed file from the target transmission picture comprises:
determining an end zone bit of the target transmission picture;
extracting hexadecimal data after the ending flag bit;
and converting the hexadecimal data to obtain a target compressed file.
8. The method of claim 6, wherein processing the encrypted identification of the designated area of the target compressed file to obtain a compressed file comprises:
and modifying the encryption identifier of the compressed source file data area of the target compressed file into a third identifier, and modifying the encryption identifier of the compressed source file directory area of the target compressed file into a fourth identifier to obtain a compressed file.
9. The method of claim 6, wherein decompressing the compressed file to obtain a privacy file uploaded by a client comprises:
decompressing the compressed file to obtain at least one file;
and decompressing at least one file based on a preset decryption mode to obtain the privacy file uploaded by the client.
10. The method of claim 6, further comprising:
calculating an MD5 value for the privacy file;
comparing the MD5 value to MD5 values saved in a blockchain;
based on the comparison result, it is determined whether to perform a business transaction.
11. A file transfer apparatus, comprising:
the compression module is used for compressing the private files uploaded by the client to obtain compressed files;
the processing module is used for processing the encrypted identifier of the specified area of the compressed file to obtain a target compressed file;
the acquisition module is used for acquiring a transmission picture;
the writing module is used for writing the target compressed file into the transmission picture to obtain a target transmission picture;
and the transmission module is used for transmitting the target transmission picture to a target system.
12. A document transport apparatus, comprising:
the receiving module is used for receiving a target transmission picture; the target transmission picture is obtained according to a privacy file uploaded by a client;
the extraction module is used for extracting a target compressed file from the target transmission picture;
the obtaining module is used for processing the encrypted identifier of the specified area of the target compressed file to obtain a compressed file;
and the decompression module is used for decompressing the compressed file to obtain the privacy file uploaded by the client.
13. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 10 when executing the computer program.
14. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 10.
15. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 10.
CN202210534722.XA 2022-05-17 2022-05-17 File transmission method, device, equipment and storage medium Pending CN114745373A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210534722.XA CN114745373A (en) 2022-05-17 2022-05-17 File transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210534722.XA CN114745373A (en) 2022-05-17 2022-05-17 File transmission method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114745373A true CN114745373A (en) 2022-07-12

Family

ID=82287950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210534722.XA Pending CN114745373A (en) 2022-05-17 2022-05-17 File transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114745373A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116319638A (en) * 2023-03-16 2023-06-23 杭州安司源科技有限公司 Method and device for sending picture message in encrypted instant messaging system
CN116561092A (en) * 2023-04-04 2023-08-08 苏州小猫花网络科技有限公司 Block chain data storage method with guide function

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615917A (en) * 2015-01-20 2015-05-13 中兴通讯股份有限公司 Picture camouflaging method, picture viewing method, system and terminal
CN110287157A (en) * 2019-06-28 2019-09-27 北京金山安全软件有限公司 File processing method, file reading method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615917A (en) * 2015-01-20 2015-05-13 中兴通讯股份有限公司 Picture camouflaging method, picture viewing method, system and terminal
CN110287157A (en) * 2019-06-28 2019-09-27 北京金山安全软件有限公司 File processing method, file reading method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CAPTAIN HAMMER: "CTF——MISC——zip伪加密总结", Retrieved from the Internet <URL:https://blog.csdn.net/vhkjhwbs/article/details/99851686> *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116319638A (en) * 2023-03-16 2023-06-23 杭州安司源科技有限公司 Method and device for sending picture message in encrypted instant messaging system
CN116561092A (en) * 2023-04-04 2023-08-08 苏州小猫花网络科技有限公司 Block chain data storage method with guide function

Similar Documents

Publication Publication Date Title
CN108985081B (en) Watermark encryption method, device, medium and electronic equipment
CN110798315B (en) Data processing method and device based on block chain and terminal
CN110351239B (en) Block chain-based electronic contract storage method and device and electronic equipment
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
US20230038922A1 (en) Blockchain Implemented Data Hiding Solutions For Improvements In Secure Communication, Storage And Transmission Of Data
CN110688662A (en) Sensitive data desensitization and inverse desensitization method and electronic equipment
CN114745373A (en) File transmission method, device, equipment and storage medium
CN110289946B (en) Block chain wallet localized file generation method and block chain node point equipment
CN106919811B (en) File detection method and device
CN111143869A (en) Application package processing method and device, electronic equipment and storage medium
CN102790767B (en) Information safety control method, information safety display equipment and electronic trading system
CN114499875B (en) Service data processing method, device, computer equipment and storage medium
CN109274644A (en) A kind of data processing method, terminal and watermark server
US20240265403A1 (en) Blockchain systems and methods for protecting brands, operators and consumers against counterfeiting
US11791985B2 (en) Tracking, storage and authentication of documented intellectual property
CN114500093A (en) Safe interaction method and system for message information
WO2020044095A1 (en) File encryption method and apparatus, device, terminal, server, and computer-readable storage medium
CN116455572B (en) Data encryption method, device and equipment
CN113177193A (en) Watermark adding method, watermark verifying method and terminal equipment
CN109871703B (en) Big data transaction management method, device, storage medium and server
CN111105777B (en) Voice data acquisition and playing method and device, key package updating method and device and storage medium
CN108563396B (en) Safe cloud object storage method
CN113821820B (en) Method, device, medium and equipment for encrypting and decrypting resources in splitting mode
CN115222544A (en) Insurance authentication information acquisition method and device
CN109189450A (en) A kind of method and device of server firmware upgrading

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination