CN118041908A - File transmission method based on decentralization point-to-point technology - Google Patents

File transmission method based on decentralization point-to-point technology Download PDF

Info

Publication number
CN118041908A
CN118041908A CN202410198908.1A CN202410198908A CN118041908A CN 118041908 A CN118041908 A CN 118041908A CN 202410198908 A CN202410198908 A CN 202410198908A CN 118041908 A CN118041908 A CN 118041908A
Authority
CN
China
Prior art keywords
file
point
transmission
receiving device
file transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410198908.1A
Other languages
Chinese (zh)
Inventor
林勇杰
高斌
邹琼
周双全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ruiyun Technology Co ltd
Original Assignee
Shenzhen Ruiyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ruiyun Technology Co ltd filed Critical Shenzhen Ruiyun Technology Co ltd
Priority to CN202410198908.1A priority Critical patent/CN118041908A/en
Publication of CN118041908A publication Critical patent/CN118041908A/en
Pending legal-status Critical Current

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention discloses a file transmission method based on a decentralization point-to-point technology, which comprises the following steps of; s1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device Identification (ID); s2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel; s3: the file transmission end and the file receiving end perform identity verification, and after the verification is passed, the step S4 is performed; s4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection. The invention avoids the risk of single-point fault and data leakage, provides higher transmission efficiency and flexibility, and can realize safe, efficient and reliable file transmission.

Description

File transmission method based on decentralization point-to-point technology
Technical Field
The invention relates to the technical field of file transmission, in particular to a file transmission method based on a decentralization point-to-point technology.
Background
The file transmission often depends on a centralized server as a transfer node, and the transfer node has the problems of single-point failure, data theft, low transmission efficiency and the like.
Accordingly, the prior art has drawbacks and needs improvement.
Disclosure of Invention
The invention aims to solve the technical problems that: the file transmission method based on the decentralization point-to-point technology is provided, the file transmission equipment and the file receiving equipment are directly communicated, the communication transmission, the data encryption, the increment synchronization and other mechanisms are directly carried out between the file transmission equipment and the file receiving equipment without depending on a centralized server or cloud storage service, and safe, efficient and reliable file transmission is realized.
The technical scheme of the invention is as follows: a file transmission method based on a decentralization point-to-point technology is provided, which comprises the following steps.
S1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device identification ID. The device identification ID may be a device unique identification.
S2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel (for example, a TCP/IP protocol is adopted to realize point-to-point connection); the discovery method comprises the following steps: the file transmission device searches other devices through two modes of broadcasting information or local area network to find file receiving devices which can be used for file transmission; the file transmitting device and the file receiving device establish a connection channel by using a point-to-point communication protocol.
S3: and (4) carrying out identity verification on the file transmission end and the file receiving end, and entering step S4 after the verification is passed.
S4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection. And encrypting the transmitted file to avoid theft.
S5: an incremental synchronous transmission step; the step transmission only involves the modified part of the file, reducing the data transmission amount and transmission time. The method specifically comprises the following steps: s51: detecting whether the file transmitted by the file transmission device changes or not; if the change occurs, the process proceeds to step S52; s52: and comparing the changed content with the original file by using a differential algorithm technology, and transmitting and replacing only different parts, so that the file transmitted by the file transmission device is consistent with the file received by the file receiving device. When the transmitted file is changed, only different parts are transmitted and replaced, so that the transmission quantity and the transmission time are reduced.
In step S51, the change condition of the file transmitted by the file transmission device is detected by monitoring the size and modification time of the file transmitted by the file transmission device and the change of the hash value of the file.
The file transmission method based on the decentralization point-to-point technology further comprises the steps of setting a device trust mechanism: and the trust relationship is established between the file transmission device and the file receiving device, and the file transmission device and the file receiving device are verified through the public key or the digital certificate of the sharing device. By establishing a trust mechanism, the file is prevented from being transmitted to unverified equipment, the safety of file transmission is further ensured, and the file is prevented from being stolen.
File transfer between the file transfer device and the file receiving device is limited by a trust mechanism: the file transfer device transfers only to the trusted file receiving device and refuses to transfer to the unverified file receiving device.
In step S2, NAT traversal is used to solve network obstacles (such as firewalls, routers, etc.) existing between the file transmitting device and the file receiving device.
In step S4, the file transmission apparatus encrypts using the public key of the receiving side, and the file reception apparatus decrypts using its own private key.
By adopting the scheme, the file transmission method based on the decentralization point-to-point technology provided by the invention avoids the risks of single-point faults and data leakage, provides higher transmission efficiency and flexibility, and can realize safe, efficient and reliable file transmission. The invention has wide technical application prospect and is expected to realize wide application in various fields.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the invention.
Detailed Description
The invention will be described in detail below with reference to the drawings and the specific embodiments.
Referring to fig. 1, the present embodiment provides a file transmission method based on a decentralization point-to-point technology, which includes the following steps.
S1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device identification ID. The device identification ID may be a device unique identification.
S2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel (for example, a TCP/IP protocol is adopted to realize point-to-point connection); the discovery method comprises the following steps: the file transmission device searches other devices through two modes of broadcasting information or local area network to find file receiving devices which can be used for file transmission; the file transmitting device and the file receiving device establish a connection channel by using a point-to-point communication protocol.
S3: and (4) carrying out identity verification on the file transmission end and the file receiving end, and entering step S4 after the verification is passed.
S4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection. And encrypting the transmitted file to avoid theft.
S5: an incremental synchronous transmission step; the step transmission only involves the modified part of the file, reducing the data transmission amount and transmission time. The method specifically comprises the following steps: s51: detecting whether the file transmitted by the file transmission device changes or not; if the change occurs, the process proceeds to step S52; s52: and comparing the changed content with the original file by using a differential algorithm technology, and transmitting and replacing only different parts, so that the file transmitted by the file transmission device is consistent with the file received by the file receiving device. When the transmitted file is changed, only different parts are transmitted and replaced, so that the transmission quantity and the transmission time are reduced.
In step S51, the change condition of the file transmitted by the file transmission device is detected by monitoring the size and modification time of the file transmitted by the file transmission device and the change of the hash value of the file.
The file transmission method based on the decentralization point-to-point technology further comprises the steps of setting a device trust mechanism: and the trust relationship is established between the file transmission device and the file receiving device, and the file transmission device and the file receiving device are verified through the public key or the digital certificate of the sharing device. By establishing a trust mechanism, the file is prevented from being transmitted to unverified equipment, the safety of file transmission is further ensured, and the file is prevented from being stolen.
File transfer between the file transfer device and the file receiving device is limited by a trust mechanism: the file transfer device transfers only to the trusted file receiving device and refuses to transfer to the unverified file receiving device.
In step S2, NAT traversal is used to solve network obstacles (such as firewalls, routers, etc.) existing between the file transmitting device and the file receiving device.
In step S4, the file transmission apparatus encrypts using the public key of the receiving side, and the file reception apparatus decrypts using its own private key.
In summary, the invention provides a file transmission method based on the decentralization point-to-point technology, which avoids the risks of single-point failure and data leakage, provides higher transmission efficiency and flexibility, and can realize safe, efficient and reliable file transmission. The invention has wide technical application prospect and is expected to realize wide application in various fields.
The foregoing description of the preferred embodiment of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (7)

1. The file transmission method based on the decentralization point-to-point technology is characterized by comprising the following steps of:
S1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device Identification (ID);
s2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel; the discovery method comprises the following steps: the file transmission device searches other devices through two modes of broadcasting information or local area network to find file receiving devices which can be used for file transmission; establishing a connection channel between the file transmission device and the file receiving device by using a point-to-point communication protocol;
S3: the file transmission end and the file receiving end perform identity verification, and after the verification is passed, the step S4 is performed;
s4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection.
2. The method for file transfer based on the decentralization point-to-point technique as recited in claim 1, further comprising step S5: an incremental synchronous transmission step; the transmission in the step only involves the modification part of the file, so that the data transmission quantity and the transmission time are reduced; the method specifically comprises the following steps:
S51: detecting whether the file transmitted by the file transmission device changes or not; if the change occurs, the process proceeds to step S52;
S52: and comparing the changed content with the original file by using a differential algorithm technology, and transmitting and replacing only different parts, so that the file transmitted by the file transmission device is consistent with the file received by the file receiving device.
3. The method according to claim 2, wherein in step S51, the change condition of the file transmitted by the file transmission device is detected by monitoring the size and modification time of the file transmitted by the file transmission device and the change of the hash value of the file.
4. The method for file transfer based on the decentralized point-to-point technology according to claim 1, further comprising setting a device trust mechanism: and the trust relationship is established between the file transmission device and the file receiving device, and the file transmission device and the file receiving device are verified through the public key or the digital certificate of the sharing device.
5. The method for file transfer based on the decentralized point-to-point technique according to claim 4, wherein file transfer between the file transfer device and the file receiving device is limited by a trust mechanism: the file transfer device transfers only to the trusted file receiving device and refuses to transfer to the unverified file receiving device.
6. The method according to claim 1, wherein in step S2, NAT traversal is used to solve network obstacles between the file transmitting device and the file receiving device.
7. The file transmission method according to claim 1, wherein in step S4, the file transmission device encrypts using the public key of the receiving party, and the file receiving device decrypts using its own private key.
CN202410198908.1A 2024-02-22 2024-02-22 File transmission method based on decentralization point-to-point technology Pending CN118041908A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410198908.1A CN118041908A (en) 2024-02-22 2024-02-22 File transmission method based on decentralization point-to-point technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410198908.1A CN118041908A (en) 2024-02-22 2024-02-22 File transmission method based on decentralization point-to-point technology

Publications (1)

Publication Number Publication Date
CN118041908A true CN118041908A (en) 2024-05-14

Family

ID=90985582

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410198908.1A Pending CN118041908A (en) 2024-02-22 2024-02-22 File transmission method based on decentralization point-to-point technology

Country Status (1)

Country Link
CN (1) CN118041908A (en)

Similar Documents

Publication Publication Date Title
CN107018134B (en) Power distribution terminal safety access platform and implementation method thereof
Carcelle Power line communications in practice
US7870261B2 (en) Information processing device, an information processing method, and a computer program to securely connect clients on an external network to devices within an internal network
US7631180B2 (en) System and method for implementing an enhanced transport layer security protocol
US7353380B2 (en) Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
US7349325B2 (en) Broadband over low voltage power lines communications system and method
WO2016068655A1 (en) Method of performing device to device communication between user equipments
CN102891848B (en) Ipsec security alliance is utilized to be encrypted the method for deciphering
CN105376239A (en) Method and device for supporting mobile terminal to perform IPSec VPN message transmission
JP3296514B2 (en) Encryption communication terminal
CN114143050B (en) Video data encryption system
CN111064738A (en) TLS (transport layer Security) secure communication method and system
US20080104693A1 (en) Transporting keys between security protocols
KR20140091221A (en) Security apparatus for decrypting data encrypted according to the web security protocol and operating method thereof
CN118041908A (en) File transmission method based on decentralization point-to-point technology
CN100428748C (en) Dual-status-based multi-party communication method
CN101217532B (en) An anti-network attack data transmission method and system
JP3263879B2 (en) Cryptographic communication system
JP5804480B2 (en) An optimization method for the transfer of secure data streams over autonomous networks
EP1528748A1 (en) Method and system for managing computer networks
US20060253697A1 (en) System and method for securing communications over low voltage power lines
CN117857226B (en) Safety communication method and system based on industrial Internet multilateral platform
CN114338116B (en) Encryption transmission method and device and SD-WAN network system
CN110545226B (en) Device communication method and communication system
EP1561326B1 (en) Apparatus and method for negotiating network parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination