TWI752747B - Multimedia and complete file parallel transmission method - Google Patents
Multimedia and complete file parallel transmission method Download PDFInfo
- Publication number
- TWI752747B TWI752747B TW109142727A TW109142727A TWI752747B TW I752747 B TWI752747 B TW I752747B TW 109142727 A TW109142727 A TW 109142727A TW 109142727 A TW109142727 A TW 109142727A TW I752747 B TWI752747 B TW I752747B
- Authority
- TW
- Taiwan
- Prior art keywords
- multimedia
- multimedia device
- connection
- key
- receiving end
- Prior art date
Links
Images
Abstract
一種多媒體與完整檔案並行傳輸方法,其係讓多數多媒體設備連接至座標節點,且以座標節點為基礎尋找數個連接路徑最短之多媒體設備形成連網群組,由多媒體設備之發送端依據多媒體設備之接收端之用戶識別碼發送連線訊息傳送至多媒體設備之接收端,使多媒體設備之發送端與多媒體設備之接收端以加密封包方式進行穿透式直接連線,於連線後產生金鑰解開加密封包,並取得隨機金鑰,以藉由隨機金鑰讓多媒體設備之發送端與多媒體設備之接收端進行加密傳輸。藉此,可使多媒體設備之間進行完整檔案並行傳輸時,達到有效降低成本之功效,並因加密和直接連結傳輸而具備隱私保護的效益。 A method for parallel transmission of multimedia and complete files, which is to connect most multimedia devices to a coordinate node, and based on the coordinate nodes to find a number of multimedia devices with the shortest connection paths to form a networking group, and a sending end of the multimedia devices is based on the multimedia devices. The user identification code of the receiving end sends a connection message to the receiving end of the multimedia device, so that the sending end of the multimedia device and the receiving end of the multimedia device are directly connected through a sealed package, and a key is generated after the connection. Unpack the encapsulated package and obtain a random key, so that the sender of the multimedia device and the receiver of the multimedia device can perform encrypted transmission through the random key. In this way, when complete files are transmitted in parallel between multimedia devices, the cost can be effectively reduced, and the benefits of privacy protection can be achieved due to encryption and direct connection transmission.
Description
本發明是有關於一種多媒體與完整檔案並行傳輸方法,尤指一種可有效降低傳輸成本,並因加密和直接連結傳輸而具備隱私保護的效益之多媒體與完整檔案並行傳輸方法。 The present invention relates to a parallel transmission method for multimedia and complete files, especially a method for parallel transmission of multimedia and complete files that can effectively reduce transmission costs and have the benefits of privacy protection due to encryption and direct link transmission.
一般多媒體設備之間進行傳輸時,通常需要建置強大儲存空間以及執行效能之伺服器,以藉由該伺服器透過各式之運算與處理程序,提供各多媒體設備間之檔案並行傳輸。 When transferring between multimedia devices, it is usually necessary to build a server with powerful storage space and execution performance, so that the server can provide parallel transfer of files between multimedia devices through various computing and processing programs.
然而,以現行之傳輸方式而言,因需要建制強大儲存空間以及執行效能之伺服器,而使得成本大幅提升。 However, in the current transmission method, the cost is greatly increased due to the need to build a server with powerful storage space and execution performance.
本發明之主要目的係在於,可使多媒體設備之間進行完整檔案並行傳輸時,達到有效降低成本之功效,並因加密和直接連結傳輸而具備隱私保護的效益。 The main purpose of the present invention is to achieve the effect of effectively reducing the cost when the complete file is transmitted in parallel between multimedia devices, and to have the benefit of privacy protection due to encryption and direct connection transmission.
為達上述之目的,本發明係一種多媒體與完整檔案並行傳輸方法,其包含有下列步驟: In order to achieve the above-mentioned purpose, the present invention is a parallel transmission method for multimedia and complete files, which comprises the following steps:
步驟一:由一伺服器提供至少一座標節點,讓多數多媒體設備連接至該座標節點。 Step 1: at least a coordinate node is provided by a server, and most multimedia devices are connected to the coordinate node.
步驟二:以該座標節點為基礎經DHT KAD(distributed hash table Kademlia)演算法尋找連接路徑最短之數個多媒體設備,以使數個連接路徑最短之多媒體 設備形成一連網群組。 Step 2: Based on the coordinate node, the DHT KAD (distributed hash table Kademlia) algorithm is used to find several multimedia devices with the shortest connection path, so as to make several multimedia devices with the shortest connection path Devices form a networked group.
步驟三:多媒體設備之發送端於所在之連網群組中依據多媒體設備之接收端之用戶識別碼發送連線訊息,經DHT KAD演算法,將連線訊息傳送至多媒體設備之接收端。 Step 3: The sending end of the multimedia device sends a connection message in the network group where it is located according to the user identification code of the receiving end of the multimedia device, and sends the connection message to the receiving end of the multimedia device through the DHT KAD algorithm.
步驟四:使多媒體設備之發送端與多媒體設備之接收端以加密封包方式進行穿透式直接連線。 Step 4: Make the transmitting end of the multimedia device and the receiving end of the multimedia device perform a penetrating direct connection in the form of a sealed packet.
步驟五:於連線後產生至少一金鑰至多媒體設備之接收端,使多媒體設備之接收端以該金鑰解開加密封包,並取得一隨機金鑰,以藉由該隨機金鑰讓多媒體設備之發送端與多媒體設備之接收端進行加密傳輸。 Step 5: After connecting, generate at least one key to the receiving end of the multimedia device, so that the receiving end of the multimedia device uses the key to unlock and seal the package, and obtain a random key, so as to use the random key to make the multimedia device The sender of the device and the receiver of the multimedia device perform encrypted transmission.
於上述之多媒體與完整檔案並行傳輸方法中,該步驟二中各多媒體設備亦作為連接之節點,以使各座標節點與各多媒體設備之間相互配合,而於該連網群組中形成有多數個作為連接之節點,並使最多由八個連接路徑最短之各座標節點或各多媒體設備相互連接。 In the above-mentioned parallel transmission method for multimedia and complete files, each multimedia device in the second step is also used as a connection node, so that each coordinate node and each multimedia device cooperate with each other, and a majority of the network group is formed. Each coordinate node or each multimedia device with the shortest connection path at most is connected to each other.
於上述之多媒體與完整檔案並行傳輸方法中,該步驟四中係以用戶資料包協定(UDP)之加密封包方式進行穿透式直接連線。 In the above-mentioned method for parallel transmission of multimedia and complete files, in the fourth step, a penetrating direct connection is performed in a sealed packet manner of the User Data Packet Protocol (UDP).
於上述之多媒體與完整檔案並行傳輸方法中,該步驟四中若連線失敗,則會藉由一中繼服務器進行傳輸,並持續執行該步驟四,直至連線成功後再轉由穿透式直接連線。 In the above-mentioned method for parallel transmission of multimedia and complete files, if the connection fails in step 4, a relay server will be used for transmission, and step 4 will continue to be executed until the connection is successful, and then transfer to the penetrating method. Connect directly.
於上述之多媒體與完整檔案並行傳輸方法中,該步驟五中係於連線後產生一私金鑰與一公金鑰,讓該私金鑰與該公金鑰進行非對稱加密,並傳送至多媒體設備之接收端,使多媒體設備之接收端以該私金鑰與該公金鑰解開加密封包,並取得該隨機金鑰。 In the above-mentioned method for parallel transmission of multimedia and complete files, in step 5, a private key and a public key are generated after the connection, so that the private key and the public key are asymmetrically encrypted and sent to the multimedia device At the receiving end, the receiving end of the multimedia device uses the private key and the public key to unlock the encapsulated package and obtain the random key.
於上述之多媒體與完整檔案並行傳輸方法中,該步驟五中該隨機金鑰係使多媒體設備之發送端與多媒體設備之接收端進行對稱加密傳輸。 In the above-mentioned method for parallel transmission of multimedia and complete files, the random key in step 5 enables the sender of the multimedia device and the receiver of the multimedia device to perform symmetric encrypted transmission.
於上述之多媒體與完整檔案並行傳輸方法中,該步驟五中若連線中斷後重新連線,則便會再次產生一隨機金鑰。 In the above-mentioned parallel transmission method of multimedia and complete files, if the connection is disconnected and then reconnected in step 5, a random key will be generated again.
1:容器 1: container
1:座標節點 1: Coordinate node
2:多媒體設備 2: Multimedia equipment
21:多媒體設備之發送端 21: The sender of multimedia equipment
22:多媒體設備之接收端 22: Receiver of multimedia equipment
3:連網群組 3: Networking groups
s1:步驟一 s1: step one
s2:步驟二
s2:
s3:步驟三
s3:
s4:步驟四 s4: Step 4
s5:步驟五 s5: Step 5
第1圖,係本發明之流程示意圖。 Fig. 1 is a schematic flow chart of the present invention.
第2圖,係本發明之使用狀態示意圖。 Figure 2 is a schematic diagram of the use state of the present invention.
請參閱『第1圖至第3圖』所示,係分別為本發明之流程示意圖及本發明之使用狀態示意圖。如圖所示:本發明係一種多媒體與完整檔案並行傳輸方法,其包含有下列步驟: Please refer to "Fig. 1 to Fig. 3", which are a schematic flow diagram of the present invention and a schematic diagram of the use state of the present invention, respectively. As shown in the figure: the present invention is a parallel transmission method for multimedia and complete files, which includes the following steps:
步驟一s1:由一伺服器提供至少一座標節點1,讓多數多媒體設備2連接至該座標節點1。
Step 1 s1 : at least a coordinate node 1 is provided by a server, and most of the
步驟二s2:以該座標節點1為基礎經DHT KAD(distributed hash table Kademlia)演算法尋找連接路徑最短之數個多媒體設備2,以使數個連接路徑最短之多媒體設備2形成一連網群組3。
步驟三s3:多媒體設備之發送端21於所在之連網群組3中依據多媒體設備之接收端22之用戶識別碼發送連線訊息,經DHT KAD演算法,將連線訊息傳送至多媒體設備之接收端22。
步驟四s4:使多媒體設備之發送端21與多媒體設備之接收端22以加密封包方式進行穿透式直接連線。
Step 4 s4: Make the transmitting
步驟五s5:於連線後產生至少一金鑰至多媒體設備之接收端22,使多媒體設備之接收端22以該金鑰解開加密封包,並取得一隨機金鑰,以藉由該隨機
金鑰讓多媒體設備之發送端21與多媒體設備之接收端22進行加密傳輸。如此,可使多媒體設備之發送端21與多媒體設備之接收端22之間進行完整檔案並行傳輸時,達到有效降低成本之功效,並因加密和直接連結傳輸而具備隱私保護的效益。
Step 5 s5: After the connection is made, at least one key is generated to the
於本發明之一較佳具體實施例中,該步驟二中各多媒體設備2亦作為連接之節點,以使各座標節點1與各多媒體設備2之間相互配合,而於該連網群3組中形成有多數個作為連接之節點,並使最多八個連接路徑最短之各座標節點1或各多媒體設備2相互連接。如此,可以較佳之效率進行多媒體設備之發送端21與多媒體設備之接收端22間之連線。
In a preferred embodiment of the present invention, each
於本發明之一較佳具體實施例中,該步驟四中係以用戶資料包協定(UDP)之加密封包方式進行穿透式直接連線。如此,可由較低之成本進行多媒體設備之發送端21與多媒體設備之接收端22間之連線。
In a preferred embodiment of the present invention, in the fourth step, a penetrating direct connection is performed in a sealed packet manner of the User Data Packet Protocol (UDP). In this way, the connection between the transmitting
於本發明之一較佳具體實施例中,該步驟四中若連線失敗,則會藉由一中繼服務器進行傳輸,並持續執行該步驟四,直至連線成功後再轉由穿透式直接連線。如此,可以較佳之效率進行多媒體設備之發送端21與多媒體設備之接收端22間之連線。
In a preferred embodiment of the present invention, if the connection fails in step 4, it will be transmitted through a relay server, and step 4 will continue to be executed until the connection is successful, and then transfer to the penetrating type. Connect directly. In this way, the connection between the transmitting
於本發明之一較佳具體實施例中,該步驟五中係於連線後產生一私金鑰與一公金鑰,讓該私金鑰與該公金鑰進行非對稱加密,並傳送至多媒體設備之接收端22,使多媒體設備之接收端22以該私金鑰與該公金鑰解開加密封包,並取得該隨機金鑰。如此,可於多媒體設備之發送端21與多媒體設備之接收端22間進行傳輸時,達到較佳之資訊安全效果。
In a preferred embodiment of the present invention, in step 5, a private key and a public key are generated after the connection is made, and the private key and the public key are asymmetrically encrypted and transmitted to the multimedia device. The receiving
於本發明之一較佳具體實施例中,該步驟五中該隨機金鑰係使多媒體設備之發送端21與多媒體設備之接收端22進行對稱加密傳輸。如此,可於多媒體設備之發送端21與多媒體設備之接收端22間進行傳輸時,達到
較佳之資訊安全效果。
In a preferred embodiment of the present invention, the random key in step 5 enables the
於本發明之一較佳具體實施例中,該步驟五中若連線中斷後重新連線,則便會再次產生一隨機金鑰。如此,可於多媒體設備之發送端21與多媒體設備之接收端22間進行傳輸時,達到較佳之資訊安全效果。
In a preferred embodiment of the present invention, if the connection is disconnected and then reconnected in step 5, a random key will be generated again. In this way, a better information security effect can be achieved during transmission between the transmitting
綜上所述,本發明多媒體與完整檔案並行傳輸方法可有效改善習用之種種缺點,可使多媒體設備之間進行完整檔案並行傳輸時,達到有效降低成本之功效,並因加密和直接連結傳輸而具備隱私保護的效益;進而使本發明之產生能更進步、更實用、更符合員工使用之所須,確已符合發明專利申請之要件,爰依法提出專利申請。 To sum up, the method for parallel transmission of multimedia and complete files of the present invention can effectively improve various disadvantages of conventional methods, and can effectively reduce costs when performing parallel transmission of complete files between multimedia devices. It has the benefit of privacy protection; furthermore, the invention can be more advanced, more practical, and more suitable for the needs of employees. It has indeed met the requirements for an invention patent application, and a patent application can be filed in accordance with the law.
惟以上所述者,僅為本發明之較佳實施例而已,當不能以此限定本發明實施之範圍;故,凡依本發明申請專利範圍及發明說明書內容所作之簡單的等效變化與修飾,皆應仍屬本發明專利涵蓋之範圍內。 However, the above are only preferred embodiments of the present invention, and should not limit the scope of implementation of the present invention; therefore, any simple equivalent changes and modifications made according to the scope of the patent application of the present invention and the contents of the description of the invention , shall still fall within the scope covered by the patent of the present invention.
1:座標節點 1: Coordinate node
2:多媒體設備 2: Multimedia equipment
21:多媒體設備之發送端 21: The sender of multimedia equipment
22:多媒體設備之接收端 22: Receiver of multimedia equipment
3:連網群組 3: Networking groups
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW109142727A TWI752747B (en) | 2020-12-01 | 2020-12-01 | Multimedia and complete file parallel transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW109142727A TWI752747B (en) | 2020-12-01 | 2020-12-01 | Multimedia and complete file parallel transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI752747B true TWI752747B (en) | 2022-01-11 |
TW202224442A TW202224442A (en) | 2022-06-16 |
Family
ID=80810009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW109142727A TWI752747B (en) | 2020-12-01 | 2020-12-01 | Multimedia and complete file parallel transmission method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI752747B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102263787A (en) * | 2011-07-08 | 2011-11-30 | 西安电子科技大学 | Dynamic distributed certification authority (CA) configuration method |
US8635464B2 (en) * | 2010-12-03 | 2014-01-21 | Yacov Yacobi | Attribute-based access-controlled data-storage system |
TWM517486U (en) * | 2015-09-25 | 2016-02-11 | 和春技術學院 | Vehicle data-transmission system |
US9344438B2 (en) * | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
US9357001B2 (en) * | 2009-10-01 | 2016-05-31 | Telefonaktiebolaget Lm Ericsson (Publ) | Location aware mass information distribution system and method |
-
2020
- 2020-12-01 TW TW109142727A patent/TWI752747B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9344438B2 (en) * | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
US9357001B2 (en) * | 2009-10-01 | 2016-05-31 | Telefonaktiebolaget Lm Ericsson (Publ) | Location aware mass information distribution system and method |
US8635464B2 (en) * | 2010-12-03 | 2014-01-21 | Yacov Yacobi | Attribute-based access-controlled data-storage system |
CN102263787A (en) * | 2011-07-08 | 2011-11-30 | 西安电子科技大学 | Dynamic distributed certification authority (CA) configuration method |
TWM517486U (en) * | 2015-09-25 | 2016-02-11 | 和春技術學院 | Vehicle data-transmission system |
Non-Patent Citations (2)
Title |
---|
Frank Dabek, "A Distributed Hash Table", the dissertation for the degree of Doctor of Philosophy, Massachusetts Institute of Technology, Jul 10, Year of 2006 * |
Frank Dabek, "A Distributed Hash Table", the dissertation for the degree of Doctor of Philosophy, Massachusetts Institute of Technology, Jul 10, Year of 2006。 |
Also Published As
Publication number | Publication date |
---|---|
TW202224442A (en) | 2022-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6858749B2 (en) | Devices and methods for establishing connections in load balancing systems | |
US7457410B2 (en) | Transmission/reception system | |
JP2018521534A (en) | Network device and method for processing a session using a packet signature | |
US20170093811A1 (en) | Method for establishing a secure private interconnection over a multipath network | |
US20080072035A1 (en) | Securing multicast data | |
CN108769292B (en) | Message data processing method and device | |
CN103685467A (en) | Interconnection and internetworking platform of Internet of things, and communication method thereof | |
WO2007027241A2 (en) | Multi-key cryptographically generated address | |
WO2015177789A1 (en) | A method for establishing a secure private interconnection over a multipath network | |
CN113904809B (en) | Communication method, device, electronic equipment and storage medium | |
US8345878B2 (en) | Method for distributing cryptographic keys in a communication network | |
TW202137793A (en) | Communication method between mesh network and cloud server, mesh network system and node device thereof | |
CN109040059B (en) | Protected TCP communication method, communication device and storage medium | |
WO2012130128A1 (en) | Method, device, and system for implementing network identifier conversion | |
CN104184646A (en) | VPN data interaction method and system and VPN data interaction device | |
CN113904807B (en) | Source address authentication method and device, electronic equipment and storage medium | |
Mosko et al. | Mobile sessions in content-centric networks | |
TWI752747B (en) | Multimedia and complete file parallel transmission method | |
CN103458060A (en) | Method and device for transmitting host machine identifiers under multistage network address translation (NAT) | |
Leshov et al. | Content name privacy in tactical named data networking | |
JP7432765B2 (en) | Privacy communication methods between nodes and network nodes | |
CN115459913A (en) | Quantum key cloud platform-based link transparent encryption method and system | |
TWM610408U (en) | Multimedia and complete file parallel transmission device | |
WO2018149673A1 (en) | A method of distributing a sub-flow associated with a session and a network apparatus | |
JP4464187B2 (en) | Transmission / reception system |