CN118041908A - File transmission method based on decentralization point-to-point technology - Google Patents
File transmission method based on decentralization point-to-point technology Download PDFInfo
- Publication number
- CN118041908A CN118041908A CN202410198908.1A CN202410198908A CN118041908A CN 118041908 A CN118041908 A CN 118041908A CN 202410198908 A CN202410198908 A CN 202410198908A CN 118041908 A CN118041908 A CN 118041908A
- Authority
- CN
- China
- Prior art keywords
- file
- point
- transmission
- receiving device
- file transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 84
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000005516 engineering process Methods 0.000 title claims abstract description 16
- 238000012795 verification Methods 0.000 claims abstract description 8
- 238000012546 transfer Methods 0.000 claims description 20
- 230000008859 change Effects 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 claims description 9
- 238000012986 modification Methods 0.000 claims description 5
- 230000004048 modification Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 230000006872 improvement Effects 0.000 description 1
Landscapes
- Small-Scale Networks (AREA)
Abstract
The invention discloses a file transmission method based on a decentralization point-to-point technology, which comprises the following steps of; s1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device Identification (ID); s2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel; s3: the file transmission end and the file receiving end perform identity verification, and after the verification is passed, the step S4 is performed; s4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection. The invention avoids the risk of single-point fault and data leakage, provides higher transmission efficiency and flexibility, and can realize safe, efficient and reliable file transmission.
Description
Technical Field
The invention relates to the technical field of file transmission, in particular to a file transmission method based on a decentralization point-to-point technology.
Background
The file transmission often depends on a centralized server as a transfer node, and the transfer node has the problems of single-point failure, data theft, low transmission efficiency and the like.
Accordingly, the prior art has drawbacks and needs improvement.
Disclosure of Invention
The invention aims to solve the technical problems that: the file transmission method based on the decentralization point-to-point technology is provided, the file transmission equipment and the file receiving equipment are directly communicated, the communication transmission, the data encryption, the increment synchronization and other mechanisms are directly carried out between the file transmission equipment and the file receiving equipment without depending on a centralized server or cloud storage service, and safe, efficient and reliable file transmission is realized.
The technical scheme of the invention is as follows: a file transmission method based on a decentralization point-to-point technology is provided, which comprises the following steps.
S1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device identification ID. The device identification ID may be a device unique identification.
S2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel (for example, a TCP/IP protocol is adopted to realize point-to-point connection); the discovery method comprises the following steps: the file transmission device searches other devices through two modes of broadcasting information or local area network to find file receiving devices which can be used for file transmission; the file transmitting device and the file receiving device establish a connection channel by using a point-to-point communication protocol.
S3: and (4) carrying out identity verification on the file transmission end and the file receiving end, and entering step S4 after the verification is passed.
S4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection. And encrypting the transmitted file to avoid theft.
S5: an incremental synchronous transmission step; the step transmission only involves the modified part of the file, reducing the data transmission amount and transmission time. The method specifically comprises the following steps: s51: detecting whether the file transmitted by the file transmission device changes or not; if the change occurs, the process proceeds to step S52; s52: and comparing the changed content with the original file by using a differential algorithm technology, and transmitting and replacing only different parts, so that the file transmitted by the file transmission device is consistent with the file received by the file receiving device. When the transmitted file is changed, only different parts are transmitted and replaced, so that the transmission quantity and the transmission time are reduced.
In step S51, the change condition of the file transmitted by the file transmission device is detected by monitoring the size and modification time of the file transmitted by the file transmission device and the change of the hash value of the file.
The file transmission method based on the decentralization point-to-point technology further comprises the steps of setting a device trust mechanism: and the trust relationship is established between the file transmission device and the file receiving device, and the file transmission device and the file receiving device are verified through the public key or the digital certificate of the sharing device. By establishing a trust mechanism, the file is prevented from being transmitted to unverified equipment, the safety of file transmission is further ensured, and the file is prevented from being stolen.
File transfer between the file transfer device and the file receiving device is limited by a trust mechanism: the file transfer device transfers only to the trusted file receiving device and refuses to transfer to the unverified file receiving device.
In step S2, NAT traversal is used to solve network obstacles (such as firewalls, routers, etc.) existing between the file transmitting device and the file receiving device.
In step S4, the file transmission apparatus encrypts using the public key of the receiving side, and the file reception apparatus decrypts using its own private key.
By adopting the scheme, the file transmission method based on the decentralization point-to-point technology provided by the invention avoids the risks of single-point faults and data leakage, provides higher transmission efficiency and flexibility, and can realize safe, efficient and reliable file transmission. The invention has wide technical application prospect and is expected to realize wide application in various fields.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the invention.
Detailed Description
The invention will be described in detail below with reference to the drawings and the specific embodiments.
Referring to fig. 1, the present embodiment provides a file transmission method based on a decentralization point-to-point technology, which includes the following steps.
S1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device identification ID. The device identification ID may be a device unique identification.
S2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel (for example, a TCP/IP protocol is adopted to realize point-to-point connection); the discovery method comprises the following steps: the file transmission device searches other devices through two modes of broadcasting information or local area network to find file receiving devices which can be used for file transmission; the file transmitting device and the file receiving device establish a connection channel by using a point-to-point communication protocol.
S3: and (4) carrying out identity verification on the file transmission end and the file receiving end, and entering step S4 after the verification is passed.
S4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection. And encrypting the transmitted file to avoid theft.
S5: an incremental synchronous transmission step; the step transmission only involves the modified part of the file, reducing the data transmission amount and transmission time. The method specifically comprises the following steps: s51: detecting whether the file transmitted by the file transmission device changes or not; if the change occurs, the process proceeds to step S52; s52: and comparing the changed content with the original file by using a differential algorithm technology, and transmitting and replacing only different parts, so that the file transmitted by the file transmission device is consistent with the file received by the file receiving device. When the transmitted file is changed, only different parts are transmitted and replaced, so that the transmission quantity and the transmission time are reduced.
In step S51, the change condition of the file transmitted by the file transmission device is detected by monitoring the size and modification time of the file transmitted by the file transmission device and the change of the hash value of the file.
The file transmission method based on the decentralization point-to-point technology further comprises the steps of setting a device trust mechanism: and the trust relationship is established between the file transmission device and the file receiving device, and the file transmission device and the file receiving device are verified through the public key or the digital certificate of the sharing device. By establishing a trust mechanism, the file is prevented from being transmitted to unverified equipment, the safety of file transmission is further ensured, and the file is prevented from being stolen.
File transfer between the file transfer device and the file receiving device is limited by a trust mechanism: the file transfer device transfers only to the trusted file receiving device and refuses to transfer to the unverified file receiving device.
In step S2, NAT traversal is used to solve network obstacles (such as firewalls, routers, etc.) existing between the file transmitting device and the file receiving device.
In step S4, the file transmission apparatus encrypts using the public key of the receiving side, and the file reception apparatus decrypts using its own private key.
In summary, the invention provides a file transmission method based on the decentralization point-to-point technology, which avoids the risks of single-point failure and data leakage, provides higher transmission efficiency and flexibility, and can realize safe, efficient and reliable file transmission. The invention has wide technical application prospect and is expected to realize wide application in various fields.
The foregoing description of the preferred embodiment of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.
Claims (7)
1. The file transmission method based on the decentralization point-to-point technology is characterized by comprising the following steps of:
S1: the file transmission device is connected with the file receiving device through the Internet to acquire a unique device Identification (ID);
s2: the file transmission device and the file receiving device automatically discover through a network and establish a point-to-point connection channel; the discovery method comprises the following steps: the file transmission device searches other devices through two modes of broadcasting information or local area network to find file receiving devices which can be used for file transmission; establishing a connection channel between the file transmission device and the file receiving device by using a point-to-point communication protocol;
S3: the file transmission end and the file receiving end perform identity verification, and after the verification is passed, the step S4 is performed;
s4: and encrypting the transmitted file, and transmitting the transmitted file data by using a symmetric encryption algorithm or an asymmetric encryption algorithm for encryption protection.
2. The method for file transfer based on the decentralization point-to-point technique as recited in claim 1, further comprising step S5: an incremental synchronous transmission step; the transmission in the step only involves the modification part of the file, so that the data transmission quantity and the transmission time are reduced; the method specifically comprises the following steps:
S51: detecting whether the file transmitted by the file transmission device changes or not; if the change occurs, the process proceeds to step S52;
S52: and comparing the changed content with the original file by using a differential algorithm technology, and transmitting and replacing only different parts, so that the file transmitted by the file transmission device is consistent with the file received by the file receiving device.
3. The method according to claim 2, wherein in step S51, the change condition of the file transmitted by the file transmission device is detected by monitoring the size and modification time of the file transmitted by the file transmission device and the change of the hash value of the file.
4. The method for file transfer based on the decentralized point-to-point technology according to claim 1, further comprising setting a device trust mechanism: and the trust relationship is established between the file transmission device and the file receiving device, and the file transmission device and the file receiving device are verified through the public key or the digital certificate of the sharing device.
5. The method for file transfer based on the decentralized point-to-point technique according to claim 4, wherein file transfer between the file transfer device and the file receiving device is limited by a trust mechanism: the file transfer device transfers only to the trusted file receiving device and refuses to transfer to the unverified file receiving device.
6. The method according to claim 1, wherein in step S2, NAT traversal is used to solve network obstacles between the file transmitting device and the file receiving device.
7. The file transmission method according to claim 1, wherein in step S4, the file transmission device encrypts using the public key of the receiving party, and the file receiving device decrypts using its own private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410198908.1A CN118041908A (en) | 2024-02-22 | 2024-02-22 | File transmission method based on decentralization point-to-point technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410198908.1A CN118041908A (en) | 2024-02-22 | 2024-02-22 | File transmission method based on decentralization point-to-point technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118041908A true CN118041908A (en) | 2024-05-14 |
Family
ID=90985582
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410198908.1A Pending CN118041908A (en) | 2024-02-22 | 2024-02-22 | File transmission method based on decentralization point-to-point technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118041908A (en) |
-
2024
- 2024-02-22 CN CN202410198908.1A patent/CN118041908A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107018134B (en) | Power distribution terminal safety access platform and implementation method thereof | |
Carcelle | Power line communications in practice | |
US7870261B2 (en) | Information processing device, an information processing method, and a computer program to securely connect clients on an external network to devices within an internal network | |
US7631180B2 (en) | System and method for implementing an enhanced transport layer security protocol | |
US7353380B2 (en) | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |
US7349325B2 (en) | Broadband over low voltage power lines communications system and method | |
WO2016068655A1 (en) | Method of performing device to device communication between user equipments | |
CN102891848B (en) | Ipsec security alliance is utilized to be encrypted the method for deciphering | |
CN105376239A (en) | Method and device for supporting mobile terminal to perform IPSec VPN message transmission | |
JP3296514B2 (en) | Encryption communication terminal | |
CN114143050B (en) | Video data encryption system | |
CN111064738A (en) | TLS (transport layer Security) secure communication method and system | |
US20080104693A1 (en) | Transporting keys between security protocols | |
KR20140091221A (en) | Security apparatus for decrypting data encrypted according to the web security protocol and operating method thereof | |
CN118041908A (en) | File transmission method based on decentralization point-to-point technology | |
CN100428748C (en) | Dual-status-based multi-party communication method | |
CN101217532B (en) | An anti-network attack data transmission method and system | |
JP3263879B2 (en) | Cryptographic communication system | |
JP5804480B2 (en) | An optimization method for the transfer of secure data streams over autonomous networks | |
EP1528748A1 (en) | Method and system for managing computer networks | |
US20060253697A1 (en) | System and method for securing communications over low voltage power lines | |
CN117857226B (en) | Safety communication method and system based on industrial Internet multilateral platform | |
CN114338116B (en) | Encryption transmission method and device and SD-WAN network system | |
CN110545226B (en) | Device communication method and communication system | |
EP1561326B1 (en) | Apparatus and method for negotiating network parameters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination |