CN1925388A - Resource encrypting and deencrypting method and system - Google Patents
Resource encrypting and deencrypting method and system Download PDFInfo
- Publication number
- CN1925388A CN1925388A CN 200510093609 CN200510093609A CN1925388A CN 1925388 A CN1925388 A CN 1925388A CN 200510093609 CN200510093609 CN 200510093609 CN 200510093609 A CN200510093609 A CN 200510093609A CN 1925388 A CN1925388 A CN 1925388A
- Authority
- CN
- China
- Prior art keywords
- mentioned
- peer
- resource
- entities
- burst
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/1082—Resource delivery mechanisms involving incentive schemes
Abstract
This invention relates to materials coding and decoding method used to code network part, wherein, the distribution network part comprises at least one partner part and one central servo unit; the coding process is to code first original materials on partner; then dividing the coded materials for second coding. The decoding process is to receive at least one coded area by one partner and then for decoding area for second decoding by partner part.
Description
(1) technical field
The present invention relates to a kind of resource encryption and decryption method, the especially resource encryption and decryption method in peer-to-peer network, and the encryption and decryption system that uses this method.
(2) background technology
Peer-to-peer network technology (Peer to Peer Networking in recent years; P2P) having obtained people more and more pays close attention to.In the shared resource of peer-to-peer network is distributed in each peer-entities (Peer) in the network, no longer there is the such Centroid centralized stores shared resource of server in the network, each peer-entities is reciprocity in logic network node, sharing of resource will directly carry out between each peer-entities in network, thereby avoid shared resource in the centralized network to be caused the bottleneck problem of resource-sharing by the Centroid centralized stores.
Along with the extensive use of computer network and enriching of multimedia resource, the P2P technology is mainly used in file (mainly being large-scale multimedia file) and shares the aspect, and in fact, the P2P system has become the hottest shared file system in the Internet.Yet in this distributed environment of P2P system, safety factor is a very important problem.In general, in all distributed systems, comprise that three necessary factors that break the wall of mistrust in the P2P system are respectively: authentication, mandate and encryption.
So-called authentication is meant that peer-entities proves that to other peer-entities it is exactly its entity of being claimed itself itself in a network (as the internet).The so-called mandate is meant the process that an entity that authenticated is implemented some behavior or visited the permission of some resource of authorizing.The so-called encryption, then be meant intelligible information (expressly) be converted into a kind of concerning undelegated individual and system the process of indigestible form (ciphertext).Deciphering is the inverse process of this process.A tangible purposes of encrypting is protected information flowing between peer-entities in an insecure network (as the internet) exactly.The safety certification of this and each peer-entities combines, and has guaranteed that swap data can not eavesdropped in communication.
Owing to be applied to file-sharing, make above-mentioned P2P system provide a kind of with the lower possibility of investing in the electronic market, and by introducing excitation peer-entities mechanism (the Incentive P2P that goes out by above-mentioned P2P conception deriving; IP2P), then provide a kind of commerce model of health for setting up above-mentioned electronic market.Peer-entities in each iP2P system can both be to selling (Sell), sales promotion (Promote), buy (Purchase), uploading behaviors such as (Upload) such as e-sourcings such as MP3 music, DVD video display, e-books.Simultaneously, iP2P will guarantee that also the sales promotion person of resource-based author (Originator), resource (or claims the resource recommendation person; Promoter), uploader of resource (Uploader) and service provider (Service Provider) separately contribution and give them suitable repayment (Reward).
Follow the proposition of above-mentioned iP2P electronic market notion, exist the problem of following several respects to have to be solved at present:
At first, in original P2P system, because resource-sharing, the resource of author is free so the copyright of author does not obtain any protection.If utilize the iP2P system to set up the electronic market, must solve the copyright (Copyright) and the report problems of author.
Secondly, how to guarantee the report problems of resource sales promotion person and resource uploader.Certain user's download in the iP2P system after a resource, can walk around the iP2P system and propagate to other users, other user uploads this resource again, that is to say, do not have other user of downloaded resources that the upload service of resource also can be provided, (Reward) therefrom is recompensed.
Once more, the problem of the transaction security that may exist in the assurance resource purchasing process.In the process of exchange of iP2P system, may there be deception (Spoofing), pretends to be unsafe factors such as (Personating), for example, a download user has been downloaded resource sheet 1 from user B, and it tells the charging platform resource sheet 1 of saying so to download from user C, and then charging platform can have been given the user C repayment that belongs to user B originally.
The existence of the problems referred to above causes the application of iP2P system to be very limited, and does not have the effective solution at the problems referred to above up to now.
(3) summary of the invention
Therefore, main purpose of the present invention is to provide a kind of resource encryption and decryption method, make the integrality and the security performance of carrying out resource transaction access effective assurance, can guarantee the copyright of author, the repayment of be impartial to resource sales promotion person and resource uploader simultaneously based on peer-to-peer network.
For achieving the above object, technical scheme of the present invention specifically is achieved in that a kind of resource encryption method, the resource that is used for distributed p 2 p is encrypted, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, and the method includes the steps of:
(1) above-mentioned peer-entities is that a resource that is positioned on this peer-entities is carried out the encryption first time;
(2) above-mentioned encrypted resource is carried out burst;
(3) above-mentioned burst being carried out the second time encrypts.
Wherein, above-mentioned peer-entities is when above-mentioned central service unit (ONU) registration, and above-mentioned central service unit is that above-mentioned peer-entities produces above-mentioned private key and stores this private key.When above-mentioned peer-entities when above-mentioned central service unit is logined, above-mentioned peer-entities is fetched its private key, and with this private key above-mentioned source material is carried out the first time and encrypt.
After encrypting for the first time, the resource after this peer-entities will be encrypted is for the first time carried out burst.Above-mentioned central service unit produces private key respectively at least one peer-entities, uses private key separately that burst is carried out the encryption second time respectively with above-mentioned at least one peer-entities.
A kind of resource decryption method is used for the resource deciphering of distributed p 2 p, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, and the method includes the steps of:
(1) above-mentioned peer-entities carries out the deciphering first time at least one encryption burst that this peer-entities receives;
(2) above-mentioned burst through deciphering is made up;
(3) resource of above-mentioned peer-entities after to combinations thereof carried out the deciphering second time.
Wherein, peer-entities is when the central service unit (ONU) registration, and the central service unit is that peer-entities produces PKI and stores this PKI.Peer-entities during deciphering is that the PKI that the peer-entities that above-mentioned encryption burst is encrypted produces is carried out the deciphering first time to above-mentioned encryption burst respectively with above-mentioned central service unit.
Peer-entities this peer-entities is received at least one encrypt burst and carry out deciphering first time after, make up at first according to integrality, and then with above-mentioned burst through deciphering through the above-mentioned burst of Information Authentication of the burst of deciphering.Peer-entities is that the resource of the PKI that produces of peer-entities that resource is encrypted after to combinations thereof carried out second time and deciphered with above-mentioned central service unit again.
Wherein, peer-entities can also be carried out following steps before carrying out deciphering the above-mentioned first time:
(1) above-mentioned peer-entities is searched above-mentioned resource in above-mentioned distributed p 2 p;
(2) above-mentioned peer-entities obtains the list of the residing peer-entities of above-mentioned resource;
(3) the above-mentioned peer-entities transmission of the peer-entities in above-mentioned list request respectively, and the peer-entities from this list is downloaded above-mentioned encryption burst.
Use the system of above-mentioned resource encryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: this system carries out the first time to a resource on the peer-entities and encrypts, then above-mentioned encrypted resource is carried out burst, by this system above-mentioned burst is carried out the second time again and encrypt.
Use the system of above-mentioned resource decryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: at least one encryption burst that this system docking is received carries out the deciphering first time, then above-mentioned burst through deciphering is made up, carry out second time by the resource of this system after again and decipher combinations thereof.
Based on a kind of resource provider method of distributed p 2 p, above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that:
(1) above-mentioned peer-entities provides resource;
(2) above-mentioned peer-entities carries out the resource deciphering in accordance with the method for claim 7.
As seen, resource encryption and decryption method provided by the present invention has following advantage and characteristics:
(1) the present invention adopts two-layer encryption method; wherein ground floor is encrypted (being that author is encrypted) and can be guaranteed that peer-entities (terminal use) is to the download of resource with upload and all pass through the author mandate; therefore author need not to worry problem of piracy in the iP2P system, and the copyright of author is protected.In addition, the central service unit (central server) of iP2P can be followed the tracks of and write down and the relevant resource of concluding the business, so author can be repaid accordingly according to this record.
(2) author just becomes the owner with after the resource issue, and the shared resource that the owner uploads is all through two infill layers, and promptly author is encrypted and each owner encrypts each burst respectively.This process has guaranteed that shared resource is just effective to its corresponding owner, unless could become the owner of resource for this reason through the peer-entities of downloading (terminal use), the owner of resource is impossible otherwise any other peer-entities (terminal use) is thought of as for this reason.That is to say, become the uploader of resource, at first must become the consumer of resource, this has protected the copyright of author from another aspect.In addition, uploading of burst resource can be followed the tracks of and write down in the central service unit (central server) of iP2P, so the uploader of sales promotion person (resource recommendation person) and burst resource can be repaid accordingly according to this record.
(3) every resource of download person's download is all passed through owner's signature (promptly the private key with the owner carries out the encryption second time), download person has only the owner of the burst that will download to tell after the central service unit, could obtain the PKI of deciphering from central service unit, unsafe factor such as this mechanism guaranteed the deception that may exist in the downloading process, pretend to be.
(4) the present invention guarantees that download person can be by the resource of formal, legal channel acquisition based on the iP2P system.Download person's downloaded resources uploader of also having an opportunity to become later on obtains the repayment as uploader then; Perhaps, after download person's downloaded resources, can be used as sales promotion person and give other peer-entities (terminal use), can reasonably obtain repayment equally as sales promotion person with resource recommendation.
(5) adopt the present invention can make the ISP of iP2P system when setting up the electronic market, need not to worry the safety problem of copyright protection and transaction; the resource of All Activity can obtain following the tracks of and record, and can guarantee author, owner, uploader, sales promotion person's repayment.
(4) description of drawings
Fig. 1 is a resource encryption and decryption process schematic diagram in the embodiments of the invention.
Fig. 2 is the login process schematic diagram of a Peer in the embodiments of the invention.
Fig. 3 is the open process schematic diagram of resource in the embodiments of the invention.
Fig. 4 is a resource downloading process schematic diagram in the embodiments of the invention.
Fig. 5 is that resource reconfigures schematic diagram in the embodiments of the invention.
(5) embodiment
The present invention is described in detail below in conjunction with accompanying drawing, by specific embodiment, and these embodiment are illustrative, do not have restricted.
Fig. 1 is a resource encryption and decryption process schematic diagram in the embodiments of the invention.The present invention has adopted the method for two-stage encryption and two level decryptions.The source material of author is at first encrypted through resource on the peer-entities, becomes encrypt asset, and this encrypt asset is divided into different bursts by peer-entities, by identical or different peer-entities burst is encrypted again, becomes the encryption burst.And, at first the encryption burst that receives is carried out burst deciphering for download person, and becoming the burst after the deciphering, the burst after this deciphering carries out the resource deciphering by peer-entities again through the encrypt asset that is combined into of peer-entities, thus the acquisition source material.Describe above-mentioned resource encryption and decryption process below in detail.
There has been the iP2P system in the first step if a Peer wants to add one, and this Peer must at first register (Register) to above-mentioned iP2P system server.After the registration, (this algorithm is with following three inventors' naming: Ron Rivest according to the RSA Algorithm of unsymmetrical key system for above-mentioned iP2P system server, Adi Shamir, Leonard Adleman), for this Peer produces a specific private key and a specific PKI, private key and PKI all are stored in the server of iP2P system.
In second step, above-mentioned Peer just can login this iP2P system to iP2P system server registration back, as shown in Figure 2.After the iP2P system server confirms that this Peer is the legal Peer that registered, this Peer just from the iP2P system server fetch it private key (Private Key A, PriKey-A).
In the 3rd step, above-mentioned Peer signs in to after the iP2P system server, the source material on this Peer should be disclosed, so that other Peer in the iP2P system can retrieve this source material.Disclosed process as shown in Figure 3.
(1) at first, the Peer at source material place is according to SHA (Secure Hash Algorithm; SHA) algorithm produces a source material HASH information (Source HASH_INFO) for this source material, and this source material HASH information is the unique sign of this source material.And author also can provide the description (Descriptor) about source material and the price information such as (Price) of source material.
(2) secondly, this Peer encrypts above-mentioned source material with its private key, thereby makes source material change encrypt asset into.For this encrypt asset, this Peer provides encrypt asset and describes.
(3) once more, above-mentioned Peer divides encrypt asset into three bursts (Slices 1, Slice 2, Slice 3) according to regular length, and is that different bursts produce different burst HASH information (Slice 1 HASH_INFO, Slice2 HASH_INFO, Slice 3 HASH_INFO) and burst is described according to the SHA algorithm.When above-mentioned Peer divides burst, add a header information (Header) respectively for each burst, this information is used to indicate the order of burst.
(4) then, this Peer produces a basic descriptor (Meta-info) based on source material HASH information, burst HASH information, burst size, author information, pricing information etc. for source material, and this Meta-info information is open in the iP2P system, for example be disclosed on the webpage of a website.Above-mentioned Meta-info openly after, the role of author changes, and becomes owner (Holder).
(5) Peer A encrypts above-mentioned burst with its private key, and above-mentioned header information is not then encrypted.There are two kinds of situations in encryption burst after encrypting, and first kind of situation be, all are encrypted bursts and all are present on the Peer A, and Peer A becomes uploader (Uploader).
Second kind of situation is, if there is a Peer B to wish to obtain one of them burst, burst 2 (Slice 2) for example, then Peer B at first downloads above-mentioned Meta-info (for example can download from above-mentioned disclosed webpage), download the Slice 2 that process is encrypted from Peer A then, Peer A still preserves a backup of encrypting Slice 2.Peer B obtains the PKI of Peer A earlier from the request of iP2P system server, use the PKI of Peer A that the encryption Slice2 that downloads is decrypted then.Peer B still with the SHA algorithm be the deciphering after Slice 2 calculate a new HASH_INFO, and the HASH_INFO of the Slice among this HASH_INFO and the Meta-info 2 compared, if consistent, then the Slice 2 that downloads to of explanation for correct, without the burst of rewriting; If inconsistent, illustrate that the Slice 2 that downloads to is not the Slice 2 that is positioned on the PeerA, in the downloading process mistake has appearred perhaps, should download again.Verified that Peer B encrypts Slice 2 with its private key after the above-mentioned integrality of Slice2.
Equally, if there is a Peer C to wish to obtain Slice 3, the process that step and above-mentioned Peer B obtain Slice 2 is similar.After the above-mentioned integrality of having verified Slice 3, Peer C encrypts Slice 3 with its private key.
Downloading to different Slice and using private key separately is that Peer B and Peer C also became uploader after above-mentioned Slice encrypted.
In the above two kinds of cases, the list of above-mentioned uploader (List) can leave on any one Peer of this iP2P system.
The 4th the step, above-mentioned source material openly after, other Peer just can retrieve this resource and buy this resource.The buyer need download to whole encrypt asset there from least one Peer.If it is enough wide to connect the network bandwidth of Peer A, the buyer can download three from Peer A and encrypt burst.But when download person was many, the network bandwidth that connects Peer A was not enough to support numerous download persons usually, and therefore method more commonly used is to download different encryption bursts respectively respectively on Peer A, Peer B, Peer C.For example, ADSL (Asymmetric Digital Subscriber Line) (the Asymmetric Digital Subscriber Line that widely uses now; ADSL) be exactly a kind of technology of typically carrying out transfer of data, the transmission of last behavior low speed, following behavior high-speed transfer with the asymmetric speed of uplink and downlink (bandwidth).Downloading process as shown in Figure 4.
At first, Peer M searches disclosed resource from webpage, just send request to the iP2P server, shown in Fig. 4 (1).Secondly, the iP2P whois lookup arrives the uploader list, and with this list (comprising Peer A, Peer B, Peer C) notice PeerM, shown in Fig. 4 (2).Once more, Peer M sends download request to Peer A, downloads from Peer A and encrypts burst 1, shown in Fig. 4 (3).Then, Peer M sends download request to Peer B, downloads from Peer B and encrypts burst 2, shown in Fig. 4 (4).At last, Peer M sends download request to Peer C, downloads from Peer B and encrypts burst 3, shown in Fig. 4 (5).So far, all bursts of resource all have been downloaded on the Peer M.
In the 5th step, the resource that downloads on the Peer M is reconfigured.Because the burst that downloads to has header information Hearder, so Peer M can make up above-mentioned burst according to sequencing according to this header information.Because therefore the resource that Peer M downloads to need be decrypted burst under the control of iP2P server for encrypting burst, the burst with deciphering reconfigures then, becomes encrypt asset, this encrypt asset is decrypted again, and recovers source material.Resource reconfigures process as shown in Figure 5.
At first, Peer M issues the iP2P server with the uploader list, shown in Fig. 5 (1).Secondly, the iP2P server is preserved this list and the PKI (PubKey-A, PubKey-B, PubKey-C) of each Peer in the list is passed to Peer M, shown in Fig. 5 (2).Once more, Peer M carries out the deciphering first time with the PKI of different uploader to corresponding encryption burst, obtain Slice 1, Slice 2, Slice 3 respectively, Peer M calculates the HASH_INFO of each burst respectively with the SHA algorithm then, HASH_INFO with each burst among the HASH_INFO of above-mentioned each burst and the METAINFO compares again, check the integrality of corresponding burst with this, shown in Fig. 5 (3).Then, it is a complete encrypt asset that Peer M reconfigures the burst of above-mentioned deciphering, shown in Fig. 5 (4).Subsequently, Peer M is to the PKI of iP2P server requests author, shown in Fig. 5 (5).The iP2P server passes to Peer M with the PKI of author, shown in Fig. 5 (6).Peer M is decrypted the encrypt asset that reconfigured with the PKI of author, and with the integrality of original HASH_INFO check source material, shown in Fig. 5 (7), then source material is resumed on Peer M, shown in Fig. 5 (8).
The 6th step recovered after the source material, and the process of exchange of above-mentioned resource finishes.As download person (buyer) if Peer M think that this resource is a good resource, will recommend this resource to other Peer.Suppose that Peer N obtains the recommendation information of PeerM, and think that this resource value must download, then Peer N clicks resource locator (the Uniform Resource Locators that Peer M recommends; URL), carry out resource downloading.After download was finished, Peer N need give Peer M repayment, and promptly Peer M has obtained repayment as sales promotion person.
Perhaps, Peer M has downloaded after the above-mentioned resource as conduct download person (buyer), and Peer M itself can be used as uploader.As another one Peer, for example Peer X is after Peer M downloaded resources, and Peer M also can be repaid accordingly as uploader.Under the situation of above-mentioned Peer M as uploader, after Peer M carries out the deciphering first time to the encryption burst that downloads to, obtain Slice 1, Slice 2, Slice 3, and check the integrality of corresponding burst with the HASH_INFO of different bursts, Peer M encrypts above-mentioned burst Slice 1, Slice 2, Slice 3 with its private key then.If Peer X is from Peer M this resource of having downloaded (purchases), Peer X need come the burst resource of Peer M encryption is decrypted from the PKI that central service unit obtains Peer M.
Therefore, from the above embodiments as can be seen,, can solve the copyright problem that utilizes the iP2P system to set up the author that the electronic market runs into and the report problems of author by resource encryption and decryption method of the present invention.The present invention has simultaneously guaranteed that also resource sales promotion person and resource uploader obtain their deserved repayment.The present invention can also avoid in the resource purchasing process the problem includes: deception that may problem, the problem of transaction security such as pretending to be.
Claims (15)
1. a resource encryption method is used for the resource encryption of distributed p 2 p, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that the method includes the steps of:
(1) above-mentioned peer-entities is that a resource that is positioned on this peer-entities is carried out the encryption first time;
(2) above-mentioned encrypted resource is carried out burst;
(3) above-mentioned burst being carried out the second time encrypts.
2. resource encryption method as claimed in claim 1 is characterized in that: by at least one above-mentioned peer-entities above-mentioned burst is carried out the second time and encrypt.
3. resource encryption method as claimed in claim 1 is characterized in that: with above-mentioned central service unit is that the private key that above-mentioned peer-entities produces carries out the encryption first time to above-mentioned source material.
4. resource encryption method as claimed in claim 2 is characterized in that: with above-mentioned central service unit is that the private key that above-mentioned at least one peer-entities produces respectively carries out the encryption second time to above-mentioned burst.
5. as claim 3 or 4 described resource encryption methods, it is characterized in that: above-mentioned peer-entities is when above-mentioned central service unit (ONU) registration, and above-mentioned central service unit is that above-mentioned peer-entities produces above-mentioned private key and stores this private key.
6. as claim 3 or 4 described resource encryption methods, it is characterized in that: when above-mentioned peer-entities was logined to above-mentioned central service unit, above-mentioned peer-entities was fetched its private key.
7. a resource decryption method is used for the resource deciphering of distributed p 2 p, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that the method includes the steps of:
(1) above-mentioned peer-entities carries out the deciphering first time at least one encryption burst that this peer-entities receives;
(2) above-mentioned burst through deciphering is made up;
(3) resource of above-mentioned peer-entities after to combinations thereof carried out the deciphering second time.
8. resource decryption method as claimed in claim 7 is characterized in that: with above-mentioned central service unit is that the PKI that the peer-entities that above-mentioned encryption burst is encrypted produces is carried out the deciphering first time to above-mentioned encryption burst respectively.
9. resource decryption method as claimed in claim 7 is characterized in that: with above-mentioned central service unit is that the resource of the PKI that produces of peer-entities that resource is encrypted after to combinations thereof carried out second time and deciphered.
10. resource decryption method as claimed in claim 8 or 9 is characterized in that: above-mentioned peer-entities is when above-mentioned central service unit (ONU) registration, and above-mentioned central service unit is that above-mentioned peer-entities produces above-mentioned PKI and stores this PKI.
11. resource decryption method as claimed in claim 7 is characterized in that above-mentioned peer-entities carries out also carrying out before the deciphering the above-mentioned first time following steps:
(1) above-mentioned peer-entities is searched above-mentioned resource in above-mentioned distributed p 2 p;
(2) above-mentioned peer-entities obtains the list of the residing peer-entities of above-mentioned resource;
(3) the above-mentioned peer-entities transmission of the peer-entities in above-mentioned list request respectively, and the peer-entities from this list is downloaded above-mentioned encryption burst.
12. resource decryption method as claimed in claim 7, it is characterized in that: after at least one encryption burst that above-mentioned peer-entities receives this peer-entities carries out the deciphering first time, make up at first according to the integrality of the above-mentioned burst of Information Authentication, and then with above-mentioned burst through deciphering through the burst of deciphering.
13. use the system of above-mentioned resource encryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: this system carries out the first time to a resource on the peer-entities and encrypts, then above-mentioned encrypted resource is carried out burst, by this system above-mentioned burst is carried out the second time again and encrypt.
14. use the system of above-mentioned resource decryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: at least one encryption burst that this system docking is received carries out the deciphering first time, then above-mentioned burst through deciphering is made up, carry out second time by the resource of this system after again and decipher combinations thereof.
15. based on a kind of resource provider method of distributed p 2 p, above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that:
(1) above-mentioned peer-entities provides resource;
(2) above-mentioned peer-entities carries out the resource deciphering in accordance with the method for claim 7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510093609 CN1925388A (en) | 2005-08-31 | 2005-08-31 | Resource encrypting and deencrypting method and system |
PCT/EP2006/065862 WO2007025998A2 (en) | 2005-08-31 | 2006-08-31 | Method and system for resource encryption and decryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200510093609 CN1925388A (en) | 2005-08-31 | 2005-08-31 | Resource encrypting and deencrypting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1925388A true CN1925388A (en) | 2007-03-07 |
Family
ID=37691793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200510093609 Pending CN1925388A (en) | 2005-08-31 | 2005-08-31 | Resource encrypting and deencrypting method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN1925388A (en) |
WO (1) | WO2007025998A2 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101945125A (en) * | 2010-08-30 | 2011-01-12 | 北京邮电大学 | Method and device for transmitting documents |
CN101763615B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Method for endorsing electronic paper |
CN101763614B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Method for endorsing and signing on mixed electronic bill |
CN101699465B (en) * | 2009-10-23 | 2012-03-07 | 北京派瑞根科技开发有限公司 | Electronic signature for endorsing and signing information medium containing electronic component |
CN101763492B (en) * | 2009-10-23 | 2012-03-21 | 北京派瑞根科技开发有限公司 | Signature method on information medium comprising electronic components |
CN102034120B (en) * | 2009-10-23 | 2012-07-25 | 北京派瑞根科技开发有限公司 | Electronic seal for information medium signature containing electronic component |
CN101697202B (en) * | 2009-10-23 | 2012-08-01 | 北京派瑞根科技开发有限公司 | Electronic seal supporting endorsement of external safety component |
CN102640447A (en) * | 2010-02-26 | 2012-08-15 | 华为技术有限公司 | System and method for securing wireless transmissions |
CN102868912A (en) * | 2012-08-16 | 2013-01-09 | 北京视博数字电视科技有限公司 | Method and system for media content transmission based on CDN (Content Distribution Network) and P2P (Peer to Peer) converged infrastructure |
CN108683747A (en) * | 2018-06-11 | 2018-10-19 | 华为技术有限公司 | Resource acquisition, distribution, method for down loading, device, equipment and storage medium |
CN109391936A (en) * | 2018-09-19 | 2019-02-26 | 四川长虹电器股份有限公司 | A kind of method of OTA upgrade package encryption downloading |
CN110266733A (en) * | 2019-07-25 | 2019-09-20 | 群淂数码科技(上海)有限公司 | Data ciphering method and its system |
WO2020173278A1 (en) * | 2019-02-28 | 2020-09-03 | 阿里巴巴集团控股有限公司 | Voting system, method, and device |
CN111741022A (en) * | 2020-08-03 | 2020-10-02 | 南京科讯次元信息科技有限公司 | Ultra-large file return based on one-way data import equipment |
WO2021212660A1 (en) * | 2020-04-23 | 2021-10-28 | 平安科技(深圳)有限公司 | Distributed data encryption method, device, cloud storage server, and storage medium |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2446200A (en) * | 2006-12-01 | 2008-08-06 | David Irvine | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
EP2079033A1 (en) * | 2008-01-04 | 2009-07-15 | Irdeto Access B.V. | Method and system for secure peer-to-peer communication |
CN101699464B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Electronic signature supporting continuous endorsement on media including electronic components |
CN101699468B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Electronic signature for continuously endorsing electronic paper through support of external security part |
CN101699466B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Electronic signature for endorsing electronic paper through external security part |
CN102664740B (en) * | 2012-05-02 | 2014-12-17 | 四川建设网有限责任公司 | Remote-authorization-based bidding document encryption and decryption method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004502379A (en) * | 2000-06-29 | 2004-01-22 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Multi-encryption of a single document granting multi-level access privileges |
US20050060538A1 (en) * | 2003-09-15 | 2005-03-17 | Intel Corporation | Method, system, and program for processing of fragmented datagrams |
-
2005
- 2005-08-31 CN CN 200510093609 patent/CN1925388A/en active Pending
-
2006
- 2006-08-31 WO PCT/EP2006/065862 patent/WO2007025998A2/en active Application Filing
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101763615B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Method for endorsing electronic paper |
CN101763614B (en) * | 2009-10-23 | 2011-11-02 | 北京派瑞根科技开发有限公司 | Method for endorsing and signing on mixed electronic bill |
CN101699465B (en) * | 2009-10-23 | 2012-03-07 | 北京派瑞根科技开发有限公司 | Electronic signature for endorsing and signing information medium containing electronic component |
CN101763492B (en) * | 2009-10-23 | 2012-03-21 | 北京派瑞根科技开发有限公司 | Signature method on information medium comprising electronic components |
CN102034120B (en) * | 2009-10-23 | 2012-07-25 | 北京派瑞根科技开发有限公司 | Electronic seal for information medium signature containing electronic component |
CN101697202B (en) * | 2009-10-23 | 2012-08-01 | 北京派瑞根科技开发有限公司 | Electronic seal supporting endorsement of external safety component |
CN102640447B (en) * | 2010-02-26 | 2015-03-18 | 华为技术有限公司 | System and method for securing wireless transmissions |
CN102640447A (en) * | 2010-02-26 | 2012-08-15 | 华为技术有限公司 | System and method for securing wireless transmissions |
US8769686B2 (en) | 2010-02-26 | 2014-07-01 | Futurewei Technologies, Inc. | System and method for securing wireless transmissions |
CN101945125A (en) * | 2010-08-30 | 2011-01-12 | 北京邮电大学 | Method and device for transmitting documents |
CN102868912A (en) * | 2012-08-16 | 2013-01-09 | 北京视博数字电视科技有限公司 | Method and system for media content transmission based on CDN (Content Distribution Network) and P2P (Peer to Peer) converged infrastructure |
CN108683747A (en) * | 2018-06-11 | 2018-10-19 | 华为技术有限公司 | Resource acquisition, distribution, method for down loading, device, equipment and storage medium |
US11240213B2 (en) | 2018-06-11 | 2022-02-01 | Huawei Technologies Co., Ltd. | Resource obtaining, distribution, and download method and apparatus, device, and storage medium |
CN109391936A (en) * | 2018-09-19 | 2019-02-26 | 四川长虹电器股份有限公司 | A kind of method of OTA upgrade package encryption downloading |
CN109391936B (en) * | 2018-09-19 | 2021-04-06 | 四川长虹电器股份有限公司 | OTA upgrade package encryption downloading method |
WO2020173278A1 (en) * | 2019-02-28 | 2020-09-03 | 阿里巴巴集团控股有限公司 | Voting system, method, and device |
CN110266733A (en) * | 2019-07-25 | 2019-09-20 | 群淂数码科技(上海)有限公司 | Data ciphering method and its system |
WO2021212660A1 (en) * | 2020-04-23 | 2021-10-28 | 平安科技(深圳)有限公司 | Distributed data encryption method, device, cloud storage server, and storage medium |
CN111741022A (en) * | 2020-08-03 | 2020-10-02 | 南京科讯次元信息科技有限公司 | Ultra-large file return based on one-way data import equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2007025998A2 (en) | 2007-03-08 |
WO2007025998A3 (en) | 2007-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1925388A (en) | Resource encrypting and deencrypting method and system | |
CN108681853B (en) | Logistics information transmission method, system and device based on block chain | |
EP3404891B1 (en) | Method and system for distributing digital content in peer-to-peer network | |
US20210182871A1 (en) | Post-processing method and device based on copyright registration information, apparatus, and medium | |
CN105659240B (en) | It is a kind of for sending and authentication URL is signed to carry out URL certifications in self adaptation stream and the system and method for the content access authorization based on URL | |
JP2022509105A (en) | Systems and methods implemented by computers that enable access to data stored on the blockchain | |
CN1859108A (en) | Data downloading system and method for controlling downloading business effectiveness | |
CN103379098A (en) | Content sharing method, device and network system thereof | |
CN103957436A (en) | Video anti-stealing-link method based on OTT service | |
CN1992594A (en) | URL extension method for streaming media system | |
CN1692614A (en) | Access control and key management system for streaming media | |
US20150205755A1 (en) | Extensible Media Format System and Methods of Use | |
CN111292041A (en) | Electronic contract generating method, device, equipment and storage medium | |
CN111193755B (en) | Data access method, data encryption method and data encryption and access system | |
JP2013115522A (en) | Link access control method, program, and system | |
CN117134893A (en) | Digital collection processing method, device and system | |
CN109040087B (en) | File encryption and decryption method and device | |
Chong et al. | Privacy-enhanced superdistribution of layered content with trusted access control | |
CN111125734B (en) | Data processing method and system | |
US11562084B2 (en) | System and method for secure, trustful internet interactions | |
JP7475492B2 (en) | USING MULTI-PARTY COMPUTATION AND K-ANONNYMY TECHNIQUES TO PROTECT SENSITIVE INFORMATION | |
CN110858243A (en) | Page acquisition method and device for gateway | |
KR102661484B1 (en) | Fraud prevention in aggregated network measurements | |
US11736459B2 (en) | Preventing fraud in aggregated network measurements | |
CN116095671B (en) | Resource sharing method based on meta universe and related equipment thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20070307 |