CN1925388A - Resource encrypting and deencrypting method and system - Google Patents

Resource encrypting and deencrypting method and system Download PDF

Info

Publication number
CN1925388A
CN1925388A CN 200510093609 CN200510093609A CN1925388A CN 1925388 A CN1925388 A CN 1925388A CN 200510093609 CN200510093609 CN 200510093609 CN 200510093609 A CN200510093609 A CN 200510093609A CN 1925388 A CN1925388 A CN 1925388A
Authority
CN
China
Prior art keywords
mentioned
peer
resource
entities
burst
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510093609
Other languages
Chinese (zh)
Inventor
何小虎
聂岩
陈志远
高春友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Ltd China
Original Assignee
Siemens Ltd China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Ltd China filed Critical Siemens Ltd China
Priority to CN 200510093609 priority Critical patent/CN1925388A/en
Priority to PCT/EP2006/065862 priority patent/WO2007025998A2/en
Publication of CN1925388A publication Critical patent/CN1925388A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/605Copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/1082Resource delivery mechanisms involving incentive schemes

Abstract

This invention relates to materials coding and decoding method used to code network part, wherein, the distribution network part comprises at least one partner part and one central servo unit; the coding process is to code first original materials on partner; then dividing the coded materials for second coding. The decoding process is to receive at least one coded area by one partner and then for decoding area for second decoding by partner part.

Description

A kind of resource encryption and decryption method and resource encryption and decryption system thereof
(1) technical field
The present invention relates to a kind of resource encryption and decryption method, the especially resource encryption and decryption method in peer-to-peer network, and the encryption and decryption system that uses this method.
(2) background technology
Peer-to-peer network technology (Peer to Peer Networking in recent years; P2P) having obtained people more and more pays close attention to.In the shared resource of peer-to-peer network is distributed in each peer-entities (Peer) in the network, no longer there is the such Centroid centralized stores shared resource of server in the network, each peer-entities is reciprocity in logic network node, sharing of resource will directly carry out between each peer-entities in network, thereby avoid shared resource in the centralized network to be caused the bottleneck problem of resource-sharing by the Centroid centralized stores.
Along with the extensive use of computer network and enriching of multimedia resource, the P2P technology is mainly used in file (mainly being large-scale multimedia file) and shares the aspect, and in fact, the P2P system has become the hottest shared file system in the Internet.Yet in this distributed environment of P2P system, safety factor is a very important problem.In general, in all distributed systems, comprise that three necessary factors that break the wall of mistrust in the P2P system are respectively: authentication, mandate and encryption.
So-called authentication is meant that peer-entities proves that to other peer-entities it is exactly its entity of being claimed itself itself in a network (as the internet).The so-called mandate is meant the process that an entity that authenticated is implemented some behavior or visited the permission of some resource of authorizing.The so-called encryption, then be meant intelligible information (expressly) be converted into a kind of concerning undelegated individual and system the process of indigestible form (ciphertext).Deciphering is the inverse process of this process.A tangible purposes of encrypting is protected information flowing between peer-entities in an insecure network (as the internet) exactly.The safety certification of this and each peer-entities combines, and has guaranteed that swap data can not eavesdropped in communication.
Owing to be applied to file-sharing, make above-mentioned P2P system provide a kind of with the lower possibility of investing in the electronic market, and by introducing excitation peer-entities mechanism (the Incentive P2P that goes out by above-mentioned P2P conception deriving; IP2P), then provide a kind of commerce model of health for setting up above-mentioned electronic market.Peer-entities in each iP2P system can both be to selling (Sell), sales promotion (Promote), buy (Purchase), uploading behaviors such as (Upload) such as e-sourcings such as MP3 music, DVD video display, e-books.Simultaneously, iP2P will guarantee that also the sales promotion person of resource-based author (Originator), resource (or claims the resource recommendation person; Promoter), uploader of resource (Uploader) and service provider (Service Provider) separately contribution and give them suitable repayment (Reward).
Follow the proposition of above-mentioned iP2P electronic market notion, exist the problem of following several respects to have to be solved at present:
At first, in original P2P system, because resource-sharing, the resource of author is free so the copyright of author does not obtain any protection.If utilize the iP2P system to set up the electronic market, must solve the copyright (Copyright) and the report problems of author.
Secondly, how to guarantee the report problems of resource sales promotion person and resource uploader.Certain user's download in the iP2P system after a resource, can walk around the iP2P system and propagate to other users, other user uploads this resource again, that is to say, do not have other user of downloaded resources that the upload service of resource also can be provided, (Reward) therefrom is recompensed.
Once more, the problem of the transaction security that may exist in the assurance resource purchasing process.In the process of exchange of iP2P system, may there be deception (Spoofing), pretends to be unsafe factors such as (Personating), for example, a download user has been downloaded resource sheet 1 from user B, and it tells the charging platform resource sheet 1 of saying so to download from user C, and then charging platform can have been given the user C repayment that belongs to user B originally.
The existence of the problems referred to above causes the application of iP2P system to be very limited, and does not have the effective solution at the problems referred to above up to now.
(3) summary of the invention
Therefore, main purpose of the present invention is to provide a kind of resource encryption and decryption method, make the integrality and the security performance of carrying out resource transaction access effective assurance, can guarantee the copyright of author, the repayment of be impartial to resource sales promotion person and resource uploader simultaneously based on peer-to-peer network.
For achieving the above object, technical scheme of the present invention specifically is achieved in that a kind of resource encryption method, the resource that is used for distributed p 2 p is encrypted, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, and the method includes the steps of:
(1) above-mentioned peer-entities is that a resource that is positioned on this peer-entities is carried out the encryption first time;
(2) above-mentioned encrypted resource is carried out burst;
(3) above-mentioned burst being carried out the second time encrypts.
Wherein, above-mentioned peer-entities is when above-mentioned central service unit (ONU) registration, and above-mentioned central service unit is that above-mentioned peer-entities produces above-mentioned private key and stores this private key.When above-mentioned peer-entities when above-mentioned central service unit is logined, above-mentioned peer-entities is fetched its private key, and with this private key above-mentioned source material is carried out the first time and encrypt.
After encrypting for the first time, the resource after this peer-entities will be encrypted is for the first time carried out burst.Above-mentioned central service unit produces private key respectively at least one peer-entities, uses private key separately that burst is carried out the encryption second time respectively with above-mentioned at least one peer-entities.
A kind of resource decryption method is used for the resource deciphering of distributed p 2 p, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, and the method includes the steps of:
(1) above-mentioned peer-entities carries out the deciphering first time at least one encryption burst that this peer-entities receives;
(2) above-mentioned burst through deciphering is made up;
(3) resource of above-mentioned peer-entities after to combinations thereof carried out the deciphering second time.
Wherein, peer-entities is when the central service unit (ONU) registration, and the central service unit is that peer-entities produces PKI and stores this PKI.Peer-entities during deciphering is that the PKI that the peer-entities that above-mentioned encryption burst is encrypted produces is carried out the deciphering first time to above-mentioned encryption burst respectively with above-mentioned central service unit.
Peer-entities this peer-entities is received at least one encrypt burst and carry out deciphering first time after, make up at first according to integrality, and then with above-mentioned burst through deciphering through the above-mentioned burst of Information Authentication of the burst of deciphering.Peer-entities is that the resource of the PKI that produces of peer-entities that resource is encrypted after to combinations thereof carried out second time and deciphered with above-mentioned central service unit again.
Wherein, peer-entities can also be carried out following steps before carrying out deciphering the above-mentioned first time:
(1) above-mentioned peer-entities is searched above-mentioned resource in above-mentioned distributed p 2 p;
(2) above-mentioned peer-entities obtains the list of the residing peer-entities of above-mentioned resource;
(3) the above-mentioned peer-entities transmission of the peer-entities in above-mentioned list request respectively, and the peer-entities from this list is downloaded above-mentioned encryption burst.
Use the system of above-mentioned resource encryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: this system carries out the first time to a resource on the peer-entities and encrypts, then above-mentioned encrypted resource is carried out burst, by this system above-mentioned burst is carried out the second time again and encrypt.
Use the system of above-mentioned resource decryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: at least one encryption burst that this system docking is received carries out the deciphering first time, then above-mentioned burst through deciphering is made up, carry out second time by the resource of this system after again and decipher combinations thereof.
Based on a kind of resource provider method of distributed p 2 p, above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that:
(1) above-mentioned peer-entities provides resource;
(2) above-mentioned peer-entities carries out the resource deciphering in accordance with the method for claim 7.
As seen, resource encryption and decryption method provided by the present invention has following advantage and characteristics:
(1) the present invention adopts two-layer encryption method; wherein ground floor is encrypted (being that author is encrypted) and can be guaranteed that peer-entities (terminal use) is to the download of resource with upload and all pass through the author mandate; therefore author need not to worry problem of piracy in the iP2P system, and the copyright of author is protected.In addition, the central service unit (central server) of iP2P can be followed the tracks of and write down and the relevant resource of concluding the business, so author can be repaid accordingly according to this record.
(2) author just becomes the owner with after the resource issue, and the shared resource that the owner uploads is all through two infill layers, and promptly author is encrypted and each owner encrypts each burst respectively.This process has guaranteed that shared resource is just effective to its corresponding owner, unless could become the owner of resource for this reason through the peer-entities of downloading (terminal use), the owner of resource is impossible otherwise any other peer-entities (terminal use) is thought of as for this reason.That is to say, become the uploader of resource, at first must become the consumer of resource, this has protected the copyright of author from another aspect.In addition, uploading of burst resource can be followed the tracks of and write down in the central service unit (central server) of iP2P, so the uploader of sales promotion person (resource recommendation person) and burst resource can be repaid accordingly according to this record.
(3) every resource of download person's download is all passed through owner's signature (promptly the private key with the owner carries out the encryption second time), download person has only the owner of the burst that will download to tell after the central service unit, could obtain the PKI of deciphering from central service unit, unsafe factor such as this mechanism guaranteed the deception that may exist in the downloading process, pretend to be.
(4) the present invention guarantees that download person can be by the resource of formal, legal channel acquisition based on the iP2P system.Download person's downloaded resources uploader of also having an opportunity to become later on obtains the repayment as uploader then; Perhaps, after download person's downloaded resources, can be used as sales promotion person and give other peer-entities (terminal use), can reasonably obtain repayment equally as sales promotion person with resource recommendation.
(5) adopt the present invention can make the ISP of iP2P system when setting up the electronic market, need not to worry the safety problem of copyright protection and transaction; the resource of All Activity can obtain following the tracks of and record, and can guarantee author, owner, uploader, sales promotion person's repayment.
(4) description of drawings
Fig. 1 is a resource encryption and decryption process schematic diagram in the embodiments of the invention.
Fig. 2 is the login process schematic diagram of a Peer in the embodiments of the invention.
Fig. 3 is the open process schematic diagram of resource in the embodiments of the invention.
Fig. 4 is a resource downloading process schematic diagram in the embodiments of the invention.
Fig. 5 is that resource reconfigures schematic diagram in the embodiments of the invention.
(5) embodiment
The present invention is described in detail below in conjunction with accompanying drawing, by specific embodiment, and these embodiment are illustrative, do not have restricted.
Fig. 1 is a resource encryption and decryption process schematic diagram in the embodiments of the invention.The present invention has adopted the method for two-stage encryption and two level decryptions.The source material of author is at first encrypted through resource on the peer-entities, becomes encrypt asset, and this encrypt asset is divided into different bursts by peer-entities, by identical or different peer-entities burst is encrypted again, becomes the encryption burst.And, at first the encryption burst that receives is carried out burst deciphering for download person, and becoming the burst after the deciphering, the burst after this deciphering carries out the resource deciphering by peer-entities again through the encrypt asset that is combined into of peer-entities, thus the acquisition source material.Describe above-mentioned resource encryption and decryption process below in detail.
There has been the iP2P system in the first step if a Peer wants to add one, and this Peer must at first register (Register) to above-mentioned iP2P system server.After the registration, (this algorithm is with following three inventors' naming: Ron Rivest according to the RSA Algorithm of unsymmetrical key system for above-mentioned iP2P system server, Adi Shamir, Leonard Adleman), for this Peer produces a specific private key and a specific PKI, private key and PKI all are stored in the server of iP2P system.
In second step, above-mentioned Peer just can login this iP2P system to iP2P system server registration back, as shown in Figure 2.After the iP2P system server confirms that this Peer is the legal Peer that registered, this Peer just from the iP2P system server fetch it private key (Private Key A, PriKey-A).
In the 3rd step, above-mentioned Peer signs in to after the iP2P system server, the source material on this Peer should be disclosed, so that other Peer in the iP2P system can retrieve this source material.Disclosed process as shown in Figure 3.
(1) at first, the Peer at source material place is according to SHA (Secure Hash Algorithm; SHA) algorithm produces a source material HASH information (Source HASH_INFO) for this source material, and this source material HASH information is the unique sign of this source material.And author also can provide the description (Descriptor) about source material and the price information such as (Price) of source material.
(2) secondly, this Peer encrypts above-mentioned source material with its private key, thereby makes source material change encrypt asset into.For this encrypt asset, this Peer provides encrypt asset and describes.
(3) once more, above-mentioned Peer divides encrypt asset into three bursts (Slices 1, Slice 2, Slice 3) according to regular length, and is that different bursts produce different burst HASH information (Slice 1 HASH_INFO, Slice2 HASH_INFO, Slice 3 HASH_INFO) and burst is described according to the SHA algorithm.When above-mentioned Peer divides burst, add a header information (Header) respectively for each burst, this information is used to indicate the order of burst.
(4) then, this Peer produces a basic descriptor (Meta-info) based on source material HASH information, burst HASH information, burst size, author information, pricing information etc. for source material, and this Meta-info information is open in the iP2P system, for example be disclosed on the webpage of a website.Above-mentioned Meta-info openly after, the role of author changes, and becomes owner (Holder).
(5) Peer A encrypts above-mentioned burst with its private key, and above-mentioned header information is not then encrypted.There are two kinds of situations in encryption burst after encrypting, and first kind of situation be, all are encrypted bursts and all are present on the Peer A, and Peer A becomes uploader (Uploader).
Second kind of situation is, if there is a Peer B to wish to obtain one of them burst, burst 2 (Slice 2) for example, then Peer B at first downloads above-mentioned Meta-info (for example can download from above-mentioned disclosed webpage), download the Slice 2 that process is encrypted from Peer A then, Peer A still preserves a backup of encrypting Slice 2.Peer B obtains the PKI of Peer A earlier from the request of iP2P system server, use the PKI of Peer A that the encryption Slice2 that downloads is decrypted then.Peer B still with the SHA algorithm be the deciphering after Slice 2 calculate a new HASH_INFO, and the HASH_INFO of the Slice among this HASH_INFO and the Meta-info 2 compared, if consistent, then the Slice 2 that downloads to of explanation for correct, without the burst of rewriting; If inconsistent, illustrate that the Slice 2 that downloads to is not the Slice 2 that is positioned on the PeerA, in the downloading process mistake has appearred perhaps, should download again.Verified that Peer B encrypts Slice 2 with its private key after the above-mentioned integrality of Slice2.
Equally, if there is a Peer C to wish to obtain Slice 3, the process that step and above-mentioned Peer B obtain Slice 2 is similar.After the above-mentioned integrality of having verified Slice 3, Peer C encrypts Slice 3 with its private key.
Downloading to different Slice and using private key separately is that Peer B and Peer C also became uploader after above-mentioned Slice encrypted.
In the above two kinds of cases, the list of above-mentioned uploader (List) can leave on any one Peer of this iP2P system.
The 4th the step, above-mentioned source material openly after, other Peer just can retrieve this resource and buy this resource.The buyer need download to whole encrypt asset there from least one Peer.If it is enough wide to connect the network bandwidth of Peer A, the buyer can download three from Peer A and encrypt burst.But when download person was many, the network bandwidth that connects Peer A was not enough to support numerous download persons usually, and therefore method more commonly used is to download different encryption bursts respectively respectively on Peer A, Peer B, Peer C.For example, ADSL (Asymmetric Digital Subscriber Line) (the Asymmetric Digital Subscriber Line that widely uses now; ADSL) be exactly a kind of technology of typically carrying out transfer of data, the transmission of last behavior low speed, following behavior high-speed transfer with the asymmetric speed of uplink and downlink (bandwidth).Downloading process as shown in Figure 4.
At first, Peer M searches disclosed resource from webpage, just send request to the iP2P server, shown in Fig. 4 (1).Secondly, the iP2P whois lookup arrives the uploader list, and with this list (comprising Peer A, Peer B, Peer C) notice PeerM, shown in Fig. 4 (2).Once more, Peer M sends download request to Peer A, downloads from Peer A and encrypts burst 1, shown in Fig. 4 (3).Then, Peer M sends download request to Peer B, downloads from Peer B and encrypts burst 2, shown in Fig. 4 (4).At last, Peer M sends download request to Peer C, downloads from Peer B and encrypts burst 3, shown in Fig. 4 (5).So far, all bursts of resource all have been downloaded on the Peer M.
In the 5th step, the resource that downloads on the Peer M is reconfigured.Because the burst that downloads to has header information Hearder, so Peer M can make up above-mentioned burst according to sequencing according to this header information.Because therefore the resource that Peer M downloads to need be decrypted burst under the control of iP2P server for encrypting burst, the burst with deciphering reconfigures then, becomes encrypt asset, this encrypt asset is decrypted again, and recovers source material.Resource reconfigures process as shown in Figure 5.
At first, Peer M issues the iP2P server with the uploader list, shown in Fig. 5 (1).Secondly, the iP2P server is preserved this list and the PKI (PubKey-A, PubKey-B, PubKey-C) of each Peer in the list is passed to Peer M, shown in Fig. 5 (2).Once more, Peer M carries out the deciphering first time with the PKI of different uploader to corresponding encryption burst, obtain Slice 1, Slice 2, Slice 3 respectively, Peer M calculates the HASH_INFO of each burst respectively with the SHA algorithm then, HASH_INFO with each burst among the HASH_INFO of above-mentioned each burst and the METAINFO compares again, check the integrality of corresponding burst with this, shown in Fig. 5 (3).Then, it is a complete encrypt asset that Peer M reconfigures the burst of above-mentioned deciphering, shown in Fig. 5 (4).Subsequently, Peer M is to the PKI of iP2P server requests author, shown in Fig. 5 (5).The iP2P server passes to Peer M with the PKI of author, shown in Fig. 5 (6).Peer M is decrypted the encrypt asset that reconfigured with the PKI of author, and with the integrality of original HASH_INFO check source material, shown in Fig. 5 (7), then source material is resumed on Peer M, shown in Fig. 5 (8).
The 6th step recovered after the source material, and the process of exchange of above-mentioned resource finishes.As download person (buyer) if Peer M think that this resource is a good resource, will recommend this resource to other Peer.Suppose that Peer N obtains the recommendation information of PeerM, and think that this resource value must download, then Peer N clicks resource locator (the Uniform Resource Locators that Peer M recommends; URL), carry out resource downloading.After download was finished, Peer N need give Peer M repayment, and promptly Peer M has obtained repayment as sales promotion person.
Perhaps, Peer M has downloaded after the above-mentioned resource as conduct download person (buyer), and Peer M itself can be used as uploader.As another one Peer, for example Peer X is after Peer M downloaded resources, and Peer M also can be repaid accordingly as uploader.Under the situation of above-mentioned Peer M as uploader, after Peer M carries out the deciphering first time to the encryption burst that downloads to, obtain Slice 1, Slice 2, Slice 3, and check the integrality of corresponding burst with the HASH_INFO of different bursts, Peer M encrypts above-mentioned burst Slice 1, Slice 2, Slice 3 with its private key then.If Peer X is from Peer M this resource of having downloaded (purchases), Peer X need come the burst resource of Peer M encryption is decrypted from the PKI that central service unit obtains Peer M.
Therefore, from the above embodiments as can be seen,, can solve the copyright problem that utilizes the iP2P system to set up the author that the electronic market runs into and the report problems of author by resource encryption and decryption method of the present invention.The present invention has simultaneously guaranteed that also resource sales promotion person and resource uploader obtain their deserved repayment.The present invention can also avoid in the resource purchasing process the problem includes: deception that may problem, the problem of transaction security such as pretending to be.

Claims (15)

1. a resource encryption method is used for the resource encryption of distributed p 2 p, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that the method includes the steps of:
(1) above-mentioned peer-entities is that a resource that is positioned on this peer-entities is carried out the encryption first time;
(2) above-mentioned encrypted resource is carried out burst;
(3) above-mentioned burst being carried out the second time encrypts.
2. resource encryption method as claimed in claim 1 is characterized in that: by at least one above-mentioned peer-entities above-mentioned burst is carried out the second time and encrypt.
3. resource encryption method as claimed in claim 1 is characterized in that: with above-mentioned central service unit is that the private key that above-mentioned peer-entities produces carries out the encryption first time to above-mentioned source material.
4. resource encryption method as claimed in claim 2 is characterized in that: with above-mentioned central service unit is that the private key that above-mentioned at least one peer-entities produces respectively carries out the encryption second time to above-mentioned burst.
5. as claim 3 or 4 described resource encryption methods, it is characterized in that: above-mentioned peer-entities is when above-mentioned central service unit (ONU) registration, and above-mentioned central service unit is that above-mentioned peer-entities produces above-mentioned private key and stores this private key.
6. as claim 3 or 4 described resource encryption methods, it is characterized in that: when above-mentioned peer-entities was logined to above-mentioned central service unit, above-mentioned peer-entities was fetched its private key.
7. a resource decryption method is used for the resource deciphering of distributed p 2 p, and above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that the method includes the steps of:
(1) above-mentioned peer-entities carries out the deciphering first time at least one encryption burst that this peer-entities receives;
(2) above-mentioned burst through deciphering is made up;
(3) resource of above-mentioned peer-entities after to combinations thereof carried out the deciphering second time.
8. resource decryption method as claimed in claim 7 is characterized in that: with above-mentioned central service unit is that the PKI that the peer-entities that above-mentioned encryption burst is encrypted produces is carried out the deciphering first time to above-mentioned encryption burst respectively.
9. resource decryption method as claimed in claim 7 is characterized in that: with above-mentioned central service unit is that the resource of the PKI that produces of peer-entities that resource is encrypted after to combinations thereof carried out second time and deciphered.
10. resource decryption method as claimed in claim 8 or 9 is characterized in that: above-mentioned peer-entities is when above-mentioned central service unit (ONU) registration, and above-mentioned central service unit is that above-mentioned peer-entities produces above-mentioned PKI and stores this PKI.
11. resource decryption method as claimed in claim 7 is characterized in that above-mentioned peer-entities carries out also carrying out before the deciphering the above-mentioned first time following steps:
(1) above-mentioned peer-entities is searched above-mentioned resource in above-mentioned distributed p 2 p;
(2) above-mentioned peer-entities obtains the list of the residing peer-entities of above-mentioned resource;
(3) the above-mentioned peer-entities transmission of the peer-entities in above-mentioned list request respectively, and the peer-entities from this list is downloaded above-mentioned encryption burst.
12. resource decryption method as claimed in claim 7, it is characterized in that: after at least one encryption burst that above-mentioned peer-entities receives this peer-entities carries out the deciphering first time, make up at first according to the integrality of the above-mentioned burst of Information Authentication, and then with above-mentioned burst through deciphering through the burst of deciphering.
13. use the system of above-mentioned resource encryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: this system carries out the first time to a resource on the peer-entities and encrypts, then above-mentioned encrypted resource is carried out burst, by this system above-mentioned burst is carried out the second time again and encrypt.
14. use the system of above-mentioned resource decryption method, comprise at least one peer-entities and at least one central service unit in the said system, it is characterized in that: at least one encryption burst that this system docking is received carries out the deciphering first time, then above-mentioned burst through deciphering is made up, carry out second time by the resource of this system after again and decipher combinations thereof.
15. based on a kind of resource provider method of distributed p 2 p, above-mentioned distributed p 2 p comprises at least one peer-entities and at least one central service unit, it is characterized in that:
(1) above-mentioned peer-entities provides resource;
(2) above-mentioned peer-entities carries out the resource deciphering in accordance with the method for claim 7.
CN 200510093609 2005-08-31 2005-08-31 Resource encrypting and deencrypting method and system Pending CN1925388A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200510093609 CN1925388A (en) 2005-08-31 2005-08-31 Resource encrypting and deencrypting method and system
PCT/EP2006/065862 WO2007025998A2 (en) 2005-08-31 2006-08-31 Method and system for resource encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510093609 CN1925388A (en) 2005-08-31 2005-08-31 Resource encrypting and deencrypting method and system

Publications (1)

Publication Number Publication Date
CN1925388A true CN1925388A (en) 2007-03-07

Family

ID=37691793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510093609 Pending CN1925388A (en) 2005-08-31 2005-08-31 Resource encrypting and deencrypting method and system

Country Status (2)

Country Link
CN (1) CN1925388A (en)
WO (1) WO2007025998A2 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945125A (en) * 2010-08-30 2011-01-12 北京邮电大学 Method and device for transmitting documents
CN101763615B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Method for endorsing electronic paper
CN101763614B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Method for endorsing and signing on mixed electronic bill
CN101699465B (en) * 2009-10-23 2012-03-07 北京派瑞根科技开发有限公司 Electronic signature for endorsing and signing information medium containing electronic component
CN101763492B (en) * 2009-10-23 2012-03-21 北京派瑞根科技开发有限公司 Signature method on information medium comprising electronic components
CN102034120B (en) * 2009-10-23 2012-07-25 北京派瑞根科技开发有限公司 Electronic seal for information medium signature containing electronic component
CN101697202B (en) * 2009-10-23 2012-08-01 北京派瑞根科技开发有限公司 Electronic seal supporting endorsement of external safety component
CN102640447A (en) * 2010-02-26 2012-08-15 华为技术有限公司 System and method for securing wireless transmissions
CN102868912A (en) * 2012-08-16 2013-01-09 北京视博数字电视科技有限公司 Method and system for media content transmission based on CDN (Content Distribution Network) and P2P (Peer to Peer) converged infrastructure
CN108683747A (en) * 2018-06-11 2018-10-19 华为技术有限公司 Resource acquisition, distribution, method for down loading, device, equipment and storage medium
CN109391936A (en) * 2018-09-19 2019-02-26 四川长虹电器股份有限公司 A kind of method of OTA upgrade package encryption downloading
CN110266733A (en) * 2019-07-25 2019-09-20 群淂数码科技(上海)有限公司 Data ciphering method and its system
WO2020173278A1 (en) * 2019-02-28 2020-09-03 阿里巴巴集团控股有限公司 Voting system, method, and device
CN111741022A (en) * 2020-08-03 2020-10-02 南京科讯次元信息科技有限公司 Ultra-large file return based on one-way data import equipment
WO2021212660A1 (en) * 2020-04-23 2021-10-28 平安科技(深圳)有限公司 Distributed data encryption method, device, cloud storage server, and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2446200A (en) * 2006-12-01 2008-08-06 David Irvine Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping
EP2079033A1 (en) * 2008-01-04 2009-07-15 Irdeto Access B.V. Method and system for secure peer-to-peer communication
CN101699464B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Electronic signature supporting continuous endorsement on media including electronic components
CN101699468B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Electronic signature for continuously endorsing electronic paper through support of external security part
CN101699466B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Electronic signature for endorsing electronic paper through external security part
CN102664740B (en) * 2012-05-02 2014-12-17 四川建设网有限责任公司 Remote-authorization-based bidding document encryption and decryption method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004502379A (en) * 2000-06-29 2004-01-22 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Multi-encryption of a single document granting multi-level access privileges
US20050060538A1 (en) * 2003-09-15 2005-03-17 Intel Corporation Method, system, and program for processing of fragmented datagrams

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763615B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Method for endorsing electronic paper
CN101763614B (en) * 2009-10-23 2011-11-02 北京派瑞根科技开发有限公司 Method for endorsing and signing on mixed electronic bill
CN101699465B (en) * 2009-10-23 2012-03-07 北京派瑞根科技开发有限公司 Electronic signature for endorsing and signing information medium containing electronic component
CN101763492B (en) * 2009-10-23 2012-03-21 北京派瑞根科技开发有限公司 Signature method on information medium comprising electronic components
CN102034120B (en) * 2009-10-23 2012-07-25 北京派瑞根科技开发有限公司 Electronic seal for information medium signature containing electronic component
CN101697202B (en) * 2009-10-23 2012-08-01 北京派瑞根科技开发有限公司 Electronic seal supporting endorsement of external safety component
CN102640447B (en) * 2010-02-26 2015-03-18 华为技术有限公司 System and method for securing wireless transmissions
CN102640447A (en) * 2010-02-26 2012-08-15 华为技术有限公司 System and method for securing wireless transmissions
US8769686B2 (en) 2010-02-26 2014-07-01 Futurewei Technologies, Inc. System and method for securing wireless transmissions
CN101945125A (en) * 2010-08-30 2011-01-12 北京邮电大学 Method and device for transmitting documents
CN102868912A (en) * 2012-08-16 2013-01-09 北京视博数字电视科技有限公司 Method and system for media content transmission based on CDN (Content Distribution Network) and P2P (Peer to Peer) converged infrastructure
CN108683747A (en) * 2018-06-11 2018-10-19 华为技术有限公司 Resource acquisition, distribution, method for down loading, device, equipment and storage medium
US11240213B2 (en) 2018-06-11 2022-02-01 Huawei Technologies Co., Ltd. Resource obtaining, distribution, and download method and apparatus, device, and storage medium
CN109391936A (en) * 2018-09-19 2019-02-26 四川长虹电器股份有限公司 A kind of method of OTA upgrade package encryption downloading
CN109391936B (en) * 2018-09-19 2021-04-06 四川长虹电器股份有限公司 OTA upgrade package encryption downloading method
WO2020173278A1 (en) * 2019-02-28 2020-09-03 阿里巴巴集团控股有限公司 Voting system, method, and device
CN110266733A (en) * 2019-07-25 2019-09-20 群淂数码科技(上海)有限公司 Data ciphering method and its system
WO2021212660A1 (en) * 2020-04-23 2021-10-28 平安科技(深圳)有限公司 Distributed data encryption method, device, cloud storage server, and storage medium
CN111741022A (en) * 2020-08-03 2020-10-02 南京科讯次元信息科技有限公司 Ultra-large file return based on one-way data import equipment

Also Published As

Publication number Publication date
WO2007025998A2 (en) 2007-03-08
WO2007025998A3 (en) 2007-10-04

Similar Documents

Publication Publication Date Title
CN1925388A (en) Resource encrypting and deencrypting method and system
CN108681853B (en) Logistics information transmission method, system and device based on block chain
EP3404891B1 (en) Method and system for distributing digital content in peer-to-peer network
US20210182871A1 (en) Post-processing method and device based on copyright registration information, apparatus, and medium
CN105659240B (en) It is a kind of for sending and authentication URL is signed to carry out URL certifications in self adaptation stream and the system and method for the content access authorization based on URL
JP2022509105A (en) Systems and methods implemented by computers that enable access to data stored on the blockchain
CN1859108A (en) Data downloading system and method for controlling downloading business effectiveness
CN103379098A (en) Content sharing method, device and network system thereof
CN103957436A (en) Video anti-stealing-link method based on OTT service
CN1992594A (en) URL extension method for streaming media system
CN1692614A (en) Access control and key management system for streaming media
US20150205755A1 (en) Extensible Media Format System and Methods of Use
CN111292041A (en) Electronic contract generating method, device, equipment and storage medium
CN111193755B (en) Data access method, data encryption method and data encryption and access system
JP2013115522A (en) Link access control method, program, and system
CN117134893A (en) Digital collection processing method, device and system
CN109040087B (en) File encryption and decryption method and device
Chong et al. Privacy-enhanced superdistribution of layered content with trusted access control
CN111125734B (en) Data processing method and system
US11562084B2 (en) System and method for secure, trustful internet interactions
JP7475492B2 (en) USING MULTI-PARTY COMPUTATION AND K-ANONNYMY TECHNIQUES TO PROTECT SENSITIVE INFORMATION
CN110858243A (en) Page acquisition method and device for gateway
KR102661484B1 (en) Fraud prevention in aggregated network measurements
US11736459B2 (en) Preventing fraud in aggregated network measurements
CN116095671B (en) Resource sharing method based on meta universe and related equipment thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20070307