CN206237438U - One kind encryption file security Transmission system - Google Patents

One kind encryption file security Transmission system Download PDF

Info

Publication number
CN206237438U
CN206237438U CN201621100520.0U CN201621100520U CN206237438U CN 206237438 U CN206237438 U CN 206237438U CN 201621100520 U CN201621100520 U CN 201621100520U CN 206237438 U CN206237438 U CN 206237438U
Authority
CN
China
Prior art keywords
file
encryption
character
receiving terminal
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201621100520.0U
Other languages
Chinese (zh)
Inventor
罗纲举
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guiyang Fangzhou Hi Tech Co ltd
Guiyang Fangzhou Technology Co ltd
Original Assignee
GUIYANG FANGZHOU HIGH-TECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUIYANG FANGZHOU HIGH-TECH Co Ltd filed Critical GUIYANG FANGZHOU HIGH-TECH Co Ltd
Priority to CN201621100520.0U priority Critical patent/CN206237438U/en
Application granted granted Critical
Publication of CN206237438U publication Critical patent/CN206237438U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses one kind encryption file security Transmission system, including transmitting terminal and receiving terminal and the transport module for connecting the transmitting terminal and receiving terminal.Encryption file security Transmission system of the present utility model ensures the integrality and confidentiality of file transmission, can effectively prevent file from being peeped the safe transmission for surreptitiously realizing encryption file.

Description

One kind encryption file security Transmission system
Technical field
The utility model is related to information security field, more particularly to a kind of encryption file security Transmission system.
Background technology
Since the information age, the life of the mankind there occurs earth-shaking change.Data in protection network system Do not destroyed, changed, revealed by accidental or malice reason, be one of main contents of network security.
Digerait represents with regard to Web bank's safety problem, and the having its source in of banking network crime steals user account and close The sensitive informations such as code.The keeping of Net silver account and password, depends on security risk consciousness and the behavior of user.
Increase the security of account or password by using soft keyboard in the prior art.Soft keyboard is simulated by software Keyboard is clicked on or touch-screen input character by mouse, is the password in order to prevent wooden horse from recording input through keyboard.But it is existing Software disk security is high not enough, still there is data decryptor, data cutout equivalent risk.
Utility model content
The technical problems to be solved in the utility model is to provide a kind of encryption file security Transmission system, to ensure that file is passed Defeated integrality and confidentiality, can effectively prevent file from being peeped the safe transmission for surreptitiously realizing encryption file.
In order to solve the above-mentioned technical problem, scheme of the present utility model is:One kind encryption file security Transmission system, including Transmitting terminal and receiving terminal and the transport module for connecting the transmitting terminal and receiving terminal, the transmitting terminal include:
Soft keyboard, for according to randomly ordered regularly arranged keypad character and being shown to the user of transmitting terminal;
File drum, the storage location of transmitting file is treated for showing;
Encryption key, for being input into DES keys, to the file encryption to be passed, obtains encrypting file;
Start button, for starting des encryption algorithm and the encryption file being transmitted,
The receiving terminal includes:
Progress display module, the transmission progress for showing the encryption file;
Memory, for storing the encryption file, the memory storage has a mark table, the mark table be stored with The mark and the keypad character of machine generation, the mark are corresponded with the keypad character;
Alarm display module, judge for the security according to transmission line transmission when whether be intercepted by a third party described in Encryption file;
Stop button, is connected with the alarm display module, for the security shown according to the alarm display module To stop the transmission to the encryption file;
Deciphering chip, for obtaining the mark, extracts corresponding with the mark described by inquiring about the mark table Keypad character, obtains the keypad character of user input, decrypts the encryption file,
The transport module includes:
First transport module, is connected with the transmitting terminal, and is communicated with the receiving terminal, is obtained to the receiving terminal The keypad character of user input is identified correspondingly, and sends the mark to the receiving terminal;
Second transport module, one end is connected with first transport module, and the other end is connected with the receiving terminal, and described Two transport modules are used to receive the encryption file.
Preferably, the keypad character is shown with symbol picture.
Preferably, the keypad character includes numerical character and alphabetic character and additional character character.
Preferably, the randomly ordered rule of the soft keyboard is generated by equipment I D, MAC Address and temporal information.
Preferably, described being designated randomly generates, and in more than 2 minutes effectively.
Preferably, the progress display module shows the progress of encryption file transmission in digital form.
Compared with prior art, the beneficial effects of the utility model are:
Encryption file security Transmission system of the present utility model, randomly ordered regularly arranged keyboard word is first passed through in transmitting terminal Symbol, prevents wooden horse from stealing encryption information by recording the input point of screen, then by using encryption key, according to DES algorithms File is encrypted and receiving terminal is sent to, and receiving terminal is entered by setting transmission of the progress display module to show file Degree, and alarm display module and stop button are set the transmission security that is shown according to alarm display module come in emergency Under terminate at any time to encrypting file transmission, it is ensured that the security and integrality of transmission file, it is enough effectively to prevent file from being peeped Surreptitiously, the safe transmission to encrypting file is realized.Deciphering chip is set in receiving terminal simultaneously, can be come with safe and complete the transmission Encryption file be decrypted, further prevent encryption file information leakage, can effectively take precautions against keyboard hook, data prison Listen, data cutout equivalent risk.
Brief description of the drawings
Fig. 1 is the frame diagram of the encryption file security Transmission system of the utility model embodiment.
In figure:1- transmitting terminals, 2- receiving terminals, 3- transport modules, 11- soft keyboards, 12- file drums, 13- encryptions are close Key, 14- start buttons, 21- progress display modules, 22- memories, 23- alarm display modules, 24- stop buttons, 25- decryption Chip, the transport modules of 31- first, the transport modules of 32- second.
Specific embodiment
Specific embodiment of the present utility model is described further below in conjunction with the accompanying drawings.Herein it should be noted that It is used to help understand the utility model for the explanation of these implementation methods, but does not constitute to restriction of the present utility model.This Outward, as long as technical characteristic involved in the utility model disclosed below each implementation method does not constitute conflict each other Can just be mutually combined.
Refer to Fig. 1, encryption file security Transmission system of the present utility model, including transmitting terminal 1 and receiving terminal 2 and use In the transport module 3 of linkup transmit end 1 and receiving terminal 2, transmitting terminal 1 includes:
Soft keyboard 11, for according to randomly ordered regularly arranged keypad character and being shown to the user of transmitting terminal.Keyboard word Symbol show with symbol picture, keypad character include numerical character and alphabetic character and additional character character, soft keyboard it is random Ordering rule is generated by equipment I D, MAC Address and temporal information.
File drum 12, the storage location of transmitting file is treated for showing, intuitively, is easy to observation.
Encryption key 13, for being input into DES keys, to file encryption to be passed, obtains encrypting file.Treat that transmitting file only has use Encrypted to the encryption key 13, receiving terminal 2 just can correctly untie the encryption file.
Start button 14, for starting des encryption algorithm and being transmitted to encryption file.There are the present embodiment two to add Close algorithm, is respectively des encryption algorithm and RSA Algorithm.Wherein software can automatically using the key of user input as DES algorithms Key, is encrypted to file, while in order to prevent the key of DES from browsing text in transmission progress display encryption key start button Revealed during part secure transmission system transmitting terminal receiving terminal other information display document location, software again presses the key of DES It is encrypted with the public key of RSA according to RSA cryptographic algorithms, the key of such DES is just safe in transmitting procedure, it is not easy to occur The private key that leakage, only receiving terminal possess RSA Algorithm can just untie this document.
Receiving terminal 2 includes:
Progress display module 21, the transmission progress for showing encryption file visually shows the progress of file transmission, and The progress of file transmission is shown in digital form.
Memory 22, for storing encryption file, memory storage has a mark table, and mark table is stored with the mark of random generation Know and keypad character, mark is corresponded with keypad character.It is designated and randomly generates, and in more than 2 minutes effectively.
Alarm display module 23, judge for the security according to transmission line transmission when whether be intercepted by a third party plus Ciphertext part.
Stop button 24, is connected with alarm display module 23, for the security that is shown according to alarm display module 23 come Stop the transmission to encrypting file.If alarm display module 23 sends alarm, this starts stop button 23, interrupts the biography of file It is defeated, it is ensured that the security of file and completion property.
Deciphering chip 25, identifies for obtaining, and is extracted by inquiring about mark table according to the AES of encryption key 13 With the corresponding keypad character of mark, the keypad character of user input is obtained, file is encrypted in decryption,
Transport module includes:
First transport module 31, is connected with transmitting terminal, and is communicated with receiving terminal, and user input is obtained to receiving terminal Keypad character is identified correspondingly, and sends mark to receiving terminal.
Second transport module 32, one end is connected with the first transport module, and the other end is connected with receiving terminal, the second transport module For receiving encryption file.
In sum, the encryption file security Transmission system, randomly ordered regularly arranged keyboard word is first passed through in transmitting terminal 1 Symbol, prevents wooden horse from stealing encryption information by recording the input point of screen, then by using encryption key 13, is calculated according to DES Be encrypted for file and receiving terminal 2 is sent to by method, and receiving terminal 2 shows file by setting progress display module 21 Transmission progress, and the transmission security that alarm display module 23 and stop button 24 show according to alarm display module 23 is set It is enough effective in case of emergency to terminate the transmission to encrypting file at any time, it is ensured that the security and integrality of transmission file Prevent file from being peeped surreptitiously, realize the safe transmission to encrypting file.Deciphering chip 25 is set in receiving terminal simultaneously, can be safe The encryption file that complete the transmission comes is decrypted, and further prevents the information leakage of encryption file, can effectively take precautions against Keyboard hook, data decryptor, data cutout equivalent risk.
Implementation method of the present utility model is explained in detail above in association with accompanying drawing, but the utility model is not limited to be retouched The implementation method stated.For a person skilled in the art, it is right in the case where the utility model principle and spirit is not departed from These implementation methods carry out various changes, modification, replacement and modification, still fall within protection domain of the present utility model.

Claims (6)

  1. It is 1. a kind of to encrypt file security Transmission system, it is characterised in that:It is including transmitting terminal and receiving terminal and described for connecting The transport module of transmitting terminal and receiving terminal, the transmitting terminal includes:
    Soft keyboard, for according to randomly ordered regularly arranged keypad character and being shown to the user of transmitting terminal;
    File drum, the storage location of transmitting file is treated for showing;
    Encryption key, for being input into DES keys, to the file encryption to be passed, obtains encrypting file;
    Start button, for opening the dynamic AESs of DES and the encryption file being transmitted,
    The receiving terminal includes:
    Progress display module, the transmission progress for showing the encryption file;
    Memory, for storing the encryption file, the memory storage has a mark table, and the mark table is stored with random life Into mark and the keypad character, the mark corresponds with the keypad character;
    Whether alarm display module, judges be intercepted by a third party the encryption during transmission for the security according to transmission line File;
    Stop button, is connected with the alarm display module, stops for the security shown according to the alarm display module Only to the transmission of the encryption file;
    Deciphering chip, for obtaining the mark, the keyboard corresponding with the mark is extracted by inquiring about the mark table Character, obtains the keypad character of user input, decrypts the encryption file,
    The transport module includes:
    First transport module, is connected with the transmitting terminal, and is communicated with the receiving terminal, and user is obtained to the receiving terminal The keypad character of input is identified correspondingly, and sends the mark to the receiving terminal;
    Second transport module, one end is connected with first transport module, and the other end is connected with the receiving terminal, and described second passes Defeated module is used to receive the encryption file.
  2. It is 2. according to claim 1 to encrypt file security Transmission system, it is characterised in that:The keypad character is with graphical diagram Piece shows.
  3. It is 3. according to claim 2 to encrypt file security Transmission system, it is characterised in that:The keypad character includes numeral Character and alphabetic character and additional character character.
  4. It is 4. according to claim 1 to encrypt file security Transmission system, it is characterised in that:The soft keyboard it is randomly ordered Rule is generated by device id, MAC Address and temporal information.
  5. It is 5. according to claim 1 to encrypt file security Transmission system, it is characterised in that:Described being designated randomly generates, And in more than 2 minutes effectively.
  6. It is 6. according to claim 1 to encrypt file security Transmission system, it is characterised in that:The progress display module is with number The progress of the form display encryption file transmission of word.
CN201621100520.0U 2016-09-30 2016-09-30 One kind encryption file security Transmission system Expired - Fee Related CN206237438U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621100520.0U CN206237438U (en) 2016-09-30 2016-09-30 One kind encryption file security Transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621100520.0U CN206237438U (en) 2016-09-30 2016-09-30 One kind encryption file security Transmission system

Publications (1)

Publication Number Publication Date
CN206237438U true CN206237438U (en) 2017-06-09

Family

ID=58983301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621100520.0U Expired - Fee Related CN206237438U (en) 2016-09-30 2016-09-30 One kind encryption file security Transmission system

Country Status (1)

Country Link
CN (1) CN206237438U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707344A (en) * 2017-11-12 2018-02-16 高飞 A kind of file numeral encryption transmission system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707344A (en) * 2017-11-12 2018-02-16 高飞 A kind of file numeral encryption transmission system

Similar Documents

Publication Publication Date Title
US5144665A (en) Cryptographic communication method and system
EP3324572B1 (en) Information transmission method and mobile device
CN100487715C (en) Date safety storing system, device and method
US20090300368A1 (en) User interface for secure data entry
CN108234132A (en) The safe communication system and method for a kind of main control chip and encryption chip
CN106063183A (en) Method and apparatus for cloud-assisted cryptography
CN104834868A (en) Electronic data protection method, device and terminal equipment
US8904195B1 (en) Methods and systems for secure communications between client applications and secure elements in mobile devices
CN103378971B (en) A kind of data encryption system and method
CN107078904A (en) Mixed cipher key is exported
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
WO2014187175A1 (en) Self-service financial equipment password input system and input method
CN103440462A (en) Embedded control method for improving security and secrecy performance of security microprocessor
CN102567688A (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
CN104239808A (en) Method and device for encryption transmission of data
KR20170097509A (en) Operation method based on white-box cryptography and security apparatus for performing the method
CN103607273B (en) A kind of data file encipher-decipher method controlled based on time limit
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN106549754A (en) The method and apparatus of management key
CN206237438U (en) One kind encryption file security Transmission system
WO2023240866A1 (en) Cipher card and root key protection method therefor, and computer readable storage medium
JP2003037587A (en) Method for generating session key
CN110968878B (en) Information transmission method, system, electronic equipment and readable medium
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 550002 room c-2-3h, yihaofeng, No.27, north section of Huaxi Avenue, Nanming District, Guiyang City, Guizhou Province [Xiangya community]

Patentee after: Guiyang Fangzhou Technology Co.,Ltd.

Address before: 550002 room c-2-3h, yihaofeng, No.27, north section of Huaxi Avenue, Nanming District, Guiyang City, Guizhou Province [Xiangya community]

Patentee before: Guiyang Fangzhou Hi Tech Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP03 Change of name, title or address

Address after: 550002 room c-2-3h, yihaofeng, No.27, north section of Huaxi Avenue, Nanming District, Guiyang City, Guizhou Province [Xiangya community]

Patentee after: Guiyang Fangzhou Hi Tech Co.,Ltd.

Address before: 550003 room c-2-3h, yihaofeng, No.27, north section of Huaxi Avenue, Nanming District, Guiyang City, Guizhou Province

Patentee before: GUIYANG FANGZHOU HIGH-TECH Co.,Ltd.

CP03 Change of name, title or address
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170609

Termination date: 20210930

CF01 Termination of patent right due to non-payment of annual fee