WO2013117087A1 - 一种文件下载方法及系统 - Google Patents

一种文件下载方法及系统 Download PDF

Info

Publication number
WO2013117087A1
WO2013117087A1 PCT/CN2012/080412 CN2012080412W WO2013117087A1 WO 2013117087 A1 WO2013117087 A1 WO 2013117087A1 CN 2012080412 W CN2012080412 W CN 2012080412W WO 2013117087 A1 WO2013117087 A1 WO 2013117087A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
encrypted
segment
encryption
network management
Prior art date
Application number
PCT/CN2012/080412
Other languages
English (en)
French (fr)
Inventor
骆庆开
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP12868319.0A priority Critical patent/EP2814199B1/en
Publication of WO2013117087A1 publication Critical patent/WO2013117087A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention relates to the field of communications, and in particular, to a file downloading method and system. Background technique
  • FTP File Transfer Protocol
  • FTP File Transfer Protocol
  • the user connects to a server program running on a remote computer through a client program.
  • the computer that performs file transfer is the FTP server, and the computer that connects to the FTP server and follows the FTP protocol and the server to transfer files is the FTP client.
  • the processing power of the FTP server and the FTP client is sufficient relative to the transmission speed. Therefore, the transmission speed is a bottleneck. If a security protocol such as SFTP or FTPS is used, the bottleneck will undoubtedly be enhanced.
  • the main technical problem to be solved by the present invention is to provide a file downloading method and system, which can simultaneously improve the efficiency and security performance of file transmission.
  • an embodiment of the present invention provides a file downloading method, including: acquiring, by an NMS, an original file, and encrypting the original file to obtain an encrypted file and corresponding encryption parameters;
  • the network management system sends the encrypted file to the device system through a file transmission link, and sends the encryption parameter to the device system through a secure link;
  • the encrypted file is decrypted according to the encryption parameter to obtain the original file.
  • the network management system encrypts the original file to obtain an encrypted file and corresponding encryption parameters:
  • the network management system divides the obtained original file into N segments according to a preset division rule, where N is an integer greater than or equal to 1;
  • the network management system encrypts and reassembles the N segments to obtain an encrypted file, and obtains a fragment tag set for recording location information of each encrypted segment in the encrypted file, and a key set for recording each segment key.
  • the encryption parameter includes the segment tag set and the key set.
  • the preset dividing rule is to randomly divide the original file, and the length of each segment obtained is greater than or equal to the length of the minimum encrypted data block.
  • the network management system encrypts and reassembles the N segments into:
  • Each segment is encrypted by using a key corresponding to each segment;
  • the encrypted segments are recombined according to the order before the splitting to obtain an encrypted file.
  • the device system decrypts the encrypted file according to the encryption parameter to:
  • Each segment is decrypted according to a key corresponding to each segment in the key set; and the decrypted segments are reorganized in the order before being split to obtain an original file.
  • the network management system sends the encrypted file to the device system through a file transmission link by using a file transfer protocol; the network management system passes the transmission path of the encrypted file and the file transmission protocol related parameters.
  • the secure link is sent to the device system.
  • the present invention also provides a file downloading system, the system comprising: a network management system and a device system; wherein the network management system comprises a file acquisition device, an encryption device and a file transmission device, the device system comprising a file receiving device, a decryption device and at least one client End,
  • the file obtaining means is configured to fetch an original file
  • the encrypting means is configured to encrypt the original file to obtain an encrypted file and corresponding encryption parameters
  • the file sending means is configured to pass the encrypted file through a file transfer link Sending to the device system, and sending the encryption parameter to the device system through a secure link;
  • the client is configured to download the encrypted file from the network management system;
  • the file receiving device is configured to acquire the encryption parameter from the network management system;
  • the decryption device is configured to encrypt the encryption according to the encryption parameter
  • the file is decrypted to get the original file.
  • the encryption device includes a division module, a parameter acquisition module, and an encryption module:
  • the dividing module is configured to divide the obtained original file into N segments according to a preset dividing rule, where N is an integer greater than or equal to 1;
  • the parameter obtaining module is configured to acquire a segment tag set for recording location information of each encrypted segment in the encrypted file, and a key set for recording each segment key;
  • the key set is obtained according to the key of each segment;
  • the encryption parameter includes the segment tag set and the key set; and the encryption module is configured to encrypt and recombine the N segments to obtain an encrypted file. .
  • the cryptographic module encrypts and reassembles the N segments, including:
  • the encryption module generates a key for each segment
  • the encryption module encrypts each segment by using a key corresponding to each segment
  • the encryption module reassembles the encrypted segments according to the order before the split to obtain an encrypted file.
  • the decrypting device decrypting the encrypted file according to the encryption parameter includes:
  • Decrypting means according to the segment mark set, dividing the encrypted file into N segments; the decrypting device decrypts each segment according to a key corresponding to each segment in the key set; and the decrypting device presses each segment after decryption
  • the file sending device includes a file transfer server, and the file sending device sends the encrypted file to the device system through the file transfer link by using the file transfer server.
  • the network management system in the embodiment of the present invention obtains the original file, and then encrypts the obtained original file to obtain the encrypted file and the corresponding encryption parameter; and sends the encrypted file to the device system through the file transmission link, and passes the obtained encryption parameter.
  • the security link is sent to the device system; after the device system obtains the encrypted path and the encryption parameter through the different path strengths, the encrypted file is decrypted according to the encryption parameter, and the original file is obtained.
  • the present invention transmits the encryption parameter through the secure link, and does not strictly limit the time of transmission of the encrypted file. Therefore, even if the secure link is overcome, the security of the encrypted file transmission is well protected. (4) Further, for counterfeiting, that is, a man-in-the-middle attack. Under the existing FTPS, SFTP and other frameworks, if the middleman intercepts all encrypted data and then uses brute force decryption, the system cannot be prevented. Especially for version software with a long expiration date, even if the key is lengthened, it cannot be effectively prevented from being deciphered within the validity period of the software.
  • the method by further dividing the original file into segments, the method requires a complete data file for decryption, but since each segment length is random, to decrypt the entire file, it is necessary to correctly judge N. The length of the fragments, otherwise decryption is very difficult, so the security of file transfer can be further improved.
  • FIG. 1 is a structural block diagram of a file downloading system according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic flowchart of a file downloading method according to Embodiment 1 of the present invention.
  • FIG. 3 is a schematic flowchart of a file downloading method according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic diagram of file division according to Embodiment 2 of the present invention.
  • FIG. 5 is a schematic diagram of file reorganization according to Embodiment 2 of the present invention. detailed description
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • FIG. 1 is a structural block diagram of a file downloading system in the embodiment.
  • the file downloading system includes a network management system and a device system, where the network management system includes a file acquiring device, an encryption device, and a file sending device.
  • the file obtaining device is used to obtain the original file.
  • the original file in this example refers to the unencrypted file.
  • the network management system obtains the version file
  • the original file here refers to the file.
  • the encryption processing device is configured to encrypt the original file acquired by the file obtaining device to obtain the encrypted file and the corresponding encryption parameter; the file sending device is configured to send the encrypted file acquired from the encryption device to the file transmission link to the file
  • the device system sends the encryption parameter obtained from the encryption device to the device system through the secure link; the file sending device in this example may include a file transfer server (ie, an FTP server), and the file sending device may specifically encrypt the file through the file transfer server. Sent to the device through the file transfer link System.
  • the device system includes a file receiving device, a decrypting device, and at least one client.
  • the client is configured to download an encrypted file from the network management system.
  • the client in this example may be an FTP client; and the file receiving device is configured to obtain from the network management system.
  • Corresponding encryption parameters are specifically related to the encryption parameters sent by the file sending device of the receiving network management system; the decrypting device is used for obtaining the encrypted parameters according to The pair of encrypted files are decrypted to get the original file.
  • the encryption device of the network management system in this example includes a division module, a parameter acquisition module, and an encryption module, where:
  • the dividing module is configured to divide the original file obtained by the file obtaining device into N segments according to a preset dividing rule, where the value of N is an integer greater than or equal to 1; the preset dividing rule may be divided according to a fixed length, It may be a random division. In order to further improve the security of transmission, in this example, random division may be preferred.
  • the parameter obtaining module is configured to obtain a segment tag set for recording location information of each encrypted segment in the encrypted file, and a key set for recording each segment key; and is further configured to obtain a secret according to the key of each segment Key set; the encryption parameter includes at least a fragment tag set and a key set.
  • the encryption module is used to encrypt and recombine the N segments of the partitioning module to obtain an encrypted file. It is worth noting that the encryption module in this example uses the same encryption algorithm to encrypt each segment, and can also use different encryption algorithms for different segments to encrypt, which can be selected according to actual conditions.
  • the encryption module encrypts and reorganizes the divided N segments, including:
  • the cryptographic module generates a key for each segment, and the key may be a symmetric key generated by the cryptographic module, and may be determined according to an encryption algorithm selected by the cryptographic module;
  • the cryptographic module encrypts each segment by using a symmetric key corresponding to each segment
  • the encryption module reassembles the encrypted segments according to the order before the split (that is, the original order in the original file before each segment is encrypted) to obtain an encrypted file.
  • the decryption device of the device system decrypts the encrypted file according to the obtained encryption parameter, including:
  • the decrypting device divides the encrypted file into N segments according to the segment tag set;
  • the decrypting device decrypts each segment according to the key corresponding to each segment in the key set; the decrypting device divides the decrypted segments in the order before the splitting (the order before the splitting can be used here) It refers to the original order of the unencrypted fragments in the original file before the original file is split; it can also refer to the original order of the encrypted fragments in the encrypted file before the encrypted file is split. Get the original file.
  • FIG. 2 is a schematic flowchart of the file downloading method in this example. As shown in FIG. 2, the method specifically includes:
  • the network management system retrieves the original file, encrypts the obtained original file, and obtains the encrypted file and corresponding encryption parameters;
  • the network management system sends the encrypted file to the device system through the file transmission link, and sends the encryption parameter to the device system through the secure link;
  • the device system After obtaining the encrypted file and the encryption parameter through the different links, the device system decrypts the encrypted file according to the obtained encryption parameter to obtain the original file. '
  • the process of encrypting the original file obtained by the network management system in this example includes: The network management system divides the captured original file into N segments according to a preset division rule, and the N value is an integer greater than or equal to 1;
  • the network management system encrypts and reassembles the N segments, obtains an encrypted file, records the key of each segment, obtains a key set, and obtains a fragment tag set for recording position information of each encrypted segment in the encrypted file, and a set of keys for recording each fragment key;
  • the encryption parameter includes at least a fragment marker set and the key set.
  • the default division rule in this example is to randomly divide the original file, but the length of each fragment finally obtained must be greater than or equal to the length of the smallest encrypted data block.
  • the process of encrypting and reorganizing the N segments by the network management system includes:
  • Each segment is encrypted by using a symmetric key corresponding to each segment
  • the process of decrypting the encrypted file by the device system according to the obtained encryption parameter includes:
  • Each segment is decrypted according to the key corresponding to each segment in the obtained key set; the original sequence of each segment before the decrypted segments are split to obtain the original file. Since it is divided according to the set of fragment marks, the correctness of the positions of the decrypted pieces and the original file can be guaranteed.
  • the original file encryption process and the transmission process are separated. Specifically, the original file is downloaded first, then encrypted, and the encrypted file and related encryption parameters are transmitted through different links, so that the file download can be detached.
  • SFTP, FTPS and other security protocols and directly use the protocol with a fast transmission speed (such as the FTP protocol.
  • the network management system also sends the encrypted file transmission path and FTP protocol related parameters to the device system through the secure link) It can improve the efficiency of file transfer, and does not need to encrypt and decrypt data during file transfer, which can further improve the efficiency of file transfer.
  • the solutions in this example also have better preventive measures, as follows: (1) For the stealing attack, with the development of hardware devices, the original Some security encryption algorithms continue to fail; the easiest way to deal with such attacks is to lengthen the keys. In this example, the file is not encrypted or decrypted during the transmission process, but is added and decrypted before and after the transmission, and is not restricted by real-time. Therefore, the key length can be compared with the security protocols such as SFTP and FTPS. The key is long, so security is naturally available Improved significantly. (2) For the tomb change attack, the algorithm such as MD5 is used to support the irreversible hash function to prevent the tomb change.
  • the original file is divided into segments and encrypted separately, and the original file can be randomly divided into N segments, and only the conditions for each segment can be encrypted, so that a complete data file is needed for decryption.
  • the length of each segment is random, to decrypt the entire file, it is necessary to correctly judge the length of the N segments. Otherwise, decryption is very difficult, so the security of file transmission can be further improved.
  • M-N+1 (M-N+1) species. While M is generally greater than 1000, N is generally greater than 10, and the possible combinations are at least (1000) ⁇ 10, and it is difficult to select the correct one from these combinations.
  • the file downloaded by the device system in this example is the version file.
  • the original file obtained by the network management system is an unencrypted version file.
  • the FIP protocol is used to transfer files between the network management system and the device system. See Figure 3 for the specific implementation process:
  • Step 1 the network management system receives the version download instruction
  • Step 1 The network management system obtains the version file to be downloaded through the file obtaining device, and records it as F0; the step of obtaining the version file is not the focus of the present invention, and therefore is not described herein again;
  • Step 2 The network management system randomly divides the version file F0 into two fragments.
  • the specific division process is as follows: Step 2.1, determine the value of N.
  • Step 4 The network management system encrypts each segment by using its own key.
  • the encryption algorithm adopted by the network management system supports integrity verification.
  • Step 5 The network management system combines the encrypted segments into a new version file F1 in the original order. Referring to FIG. 5, as shown in FIG. 5, the sequence of the encrypted segments in F1 and the segments before encryption are in F0. The order in the same is consistent;
  • Step 6 The network management system sends the set ⁇ , ⁇ , and F1 transmission paths and FTP related parameters to the device system through the secure link, and the device recognizes and saves these parameters.
  • the security link in this example can have multiple options, such as a TCP link that supports TLS; and the encrypted version file is sent to the device system through the FTP server;
  • Step 7 the device system requests the FTP server of the network management system to download the file F1 through the FTP client;
  • Step 8 file F1 is downloaded to the device system
  • Step 9 the device system uses the set P obtained in step 6 to divide F1 into N segments; Step 10, using the set K obtained in step 6, decrypting the N segments respectively; Step 11: Combine the decrypted N segments into a new file according to the position of each element mark in the set P, that is, the original file F0.

Abstract

本发明属于通信领域,公开了一种文件下载方法及装置,本发明中的网管系统获取原始文件,然后对获取的原始文件进行加密得到加密文件和相应的加密参数;并将得到加密文件通过文件传输链路发送给设备系统,将得到的加密参数通过安全链路发送给所述设备系统;设备系统获通过上述不同的路劲或取到加密文件和加密参数后,根据加密参数对加密文件进行解密,即可得到原始文件,提高了文件传输的效率和安全性。

Description

一种文件下载方法及系统 技术领域
本发明涉及通信领域, 具体涉及一种文件下载方法及系统。 背景技术
通信网络管理中, 文件传输协议 ( FTP, File Transfer Protocol ) 由于其 传输速度快, 效率高而得到较为广泛的应用。 同大多数 Internet服务一样, FTP也是一个客户 /服务器系统。 用户通过一个客户机程序连接至在远程计 算机上运行的服务器程序。依照 FTP协议提供服务, 进行文件传送的计算 机就是 FTP服务器, 而连接 FTP服务器, 遵循 FTP协议与服务器传送文 件的电脑就是 FTP客户端。
随着技术的进步,运营商对网络管理的安全性要求越来越高。虽然 FTP 协议的传输效率较高, 但其安全性是很低, 所以 SFTP ( Secure FTP ), FTPS ( FTP over SSL )等协议逐渐取代了传统的 FTP协议。 虽然 SFTP、 FTPS 等协议在安全性上得到了提升, 但是这类协议安全性的提升是以效率的降 低为代价的, 造成了速度降低, 容量减小等问题, 而传输效率的降低对于 大网络管理来说往往是致命的。
FTP服务器和 FTP客户端的处理能力相对于传输的速度是充足的, 所 以传输速度是一个瓶颈, 如果使用 SFTP、 FTPS等安全协议, 则无疑会加 剧这个瓶颈的制约作用。
另外, 使用 SFTP、 FTPS等安全协议也并非绝对安全。 对于版本文件 这样的敏感信息, 通过简单的中间人劫持会话, 就可以将加密的数据文件 存储, 然后从容地通过暴力破解。
综上所述, 现有网络管理中, 文件传输的效率和安全性都还有待进一 步改进。 发明内容
本发明要解决的主要技术问题是, 提供一种文件下载方法及系统, 可 同时提高文件传输的效率及安全性能。
为解决上述技术问题, 本发明实施例提供一种文件下载方法,包括: 网管系统获取原始文件, 对所述原始文件进行加密得到加密文件和相 应的加密参数;
所述网管系统将所述加密文件通过文件传输链路发送给设备系统, 将 所述加密参数通过安全链路发送给所述设备系统;
所述设备系统获取到所述加密文件和加密参数后, 根据所述加密参数 对所述加密文件进行解密, 得到所述原始文件。
在本发明的一种实施例中, 所述网管系统对所述原始文件进行加密得 到加密文件和相应的加密参数为:
网管系统将获取的原始文件按预设划分规则划分为 N个片段, 所述 N 为大于等于 1的整数;
网管系统对所述 N个片段进行加密、 重组, 得到加密文件, 并得到用 于记录各加密后的片段在加密文件中的位置信息的片段标记集合以及用于 记录各片段密钥的密钥集合; 所述加密参数包括所述片段标记集合和所述 密钥集合。
在本发明的一种实施例中, 所述预设划分规则为对原始文件进行随机 划分, 得到的每个片段的长度大于等于最小加密数据块的长度。
在本发明的一种实施例中, 所述网管系统对所述 N个片段进行加密、 重组为:
为每个片段生成密钥;
采用与各片段对应的密钥对各片段进行加密; 根据拆分前的顺序将加密后的各片段重新组合, 得到加密文件。
在本发明的一种实施例中, 所述设备系统根据所述加密参数对所述加 密文件进行解密为:
根据所述片段标记集合将所述加密文件划分成 N个片段;
根据所述密钥集合中各片段对应的密钥, 对各片段进行解密; 将解密后的各片段按拆分前的顺序进行重组, 得到原始文件。
在本发明的一种实施例中, 所述网管系统通过文件传输协议将所述加 密文件通过文件传输链路发送给设备系统; 所述网管系统将加密文件的传 输路径和文件传输协议相关参数通过所述安全链路发送给所述设备系统。
本发明还提供了一种文件下载系统, 该系统包括: 网管系统和设备系 统; 其中, 网管系统包括文件获取装置、 加密装置和文件发送装置, 设备 系统包括文件接收装置、 解密装置和至少一个客户端,
所述文件获取装置设置为取原始文件, 所述加密装置设置为对所述原 始文件进行加密得到加密文件和相应的加密参数; 所述文件发送装置设置 为将所述加密文件通过文件传输链路发送给设备系统, 将所述加密参数通 过安全链路发送给所述设备系统;
所述客户端设置为从所述网管系统下载所述加密文件; 所述文件接收 装置设置为从所述网管系统获取所述加密参数; 所述解密装置设置为根据 所述加密参数对所述加密文件进行解密, 得到原始文件。
在本发明的一种实施例中, 所述加密装置包括划分模块、 参数获取模 块和加密模块:
所述划分模块设置为将获取的原始文件按预设划分规则划分为 N个片 段, 所述 N为大于等于 1的整数;
所述参数获取模块设置为获取用于记录各加密后的片段在加密文件中 的位置信息的片段标记集合以及用于记录各片段密钥的密钥集合; 还设置 为根据各片段的密钥, 得到密钥集合; 所述加密参数包括所述片段标记集 合和所述密钥集合; 所述加密模块设置为对所述 N个片段进行加密、 重 组, 得到加密文件。
在本发明的一种实施例中, 所述加密模块对所述 N个片段进行加密、 重组包括:
加密模块为每个片段生成密钥;
加密模块采用与各片段对应的密钥对各片段进行加密;
加密模块根据拆分前的顺序将加密后的各片段重新组合, 得到加密文 件。
在本发明的一种实施例中, 所述解密装置根据所述加密参数对所述加 密文件进行解密包括:
解密装置根据所述片段标记集合将所述加密文件划分成 N个片段; 解密装置根据所述密钥集合中各片段对应的密钥, 对各片段进行解密; 解密装置将解密后的各片段按拆分前的顺序进行重组, 得到原始文件。 在本发明的一种实施例中, 所述文件发送装置包括文件传输服务器, 所述文件发送装置通过所述文件传输服务器将所述加密文件通过文件传输 链路发送给设备系统。
本发明实施例中的网管系统获取原始文件, 然后对获取的原始文件进 行加密得到加密文件和相应的加密参数; 并将得到加密文件通过文件传输 链路发送给设备系统, 将得到的加密参数通过安全链路发送给所述设备系 统; 设备系统获通过上述不同的路劲或取到加密文件和加密参数后, 根据 加密参数对加密文件进行解密, 即可得到原始文件。
采用该方案至少具备以下有益效果:
传输效率得到明显的提升: 现有的 SFTP、 FTPS等安全协议采用的是 一边下载原始文件一边加密的方案, 因此下载速度和系统容量等方面都受 到了很大限制, 再加上密钥协商的过程, 建立 FTP连接也需要较长的时间, 进一步限制了文件传输的效率。 本发明实施例则是将对原始文件加密过程 和传输过程分离, 具体是先下载完原始文件, 然后对其进行加密, 并将加 密文件和相关的加密参数通过不同的链路进行传送, 使得文件下载可以脱 离 SFTP、 FTPS等安全协议, 而直接使用传输速度较快的协议(例如 FTP 协议), 可提高文件传输的效率, 而且在文件传输过程中不需要加密解密数 据, 可进一步提高文件传输的效率; 在实际使用中, 通常是对文件进行一 次加密后, 多个客户端同时下载, 可进一步缩短传输时间, 提高传输效率; 传输的安全性能得到提升: 安全通讯协议, 应对的攻击主要有三类: 窃密, 墓改, 假冒。 (1 )对于窃密, 硬件设备的发展, 使得原有的安全加 密算法不断失效; 应对此类攻击的最简单办法就是加长密钥。 由于本发明 不是在传输过程中加密 /解密, 而是在传输前和传输完成后分别进行加、 解 密, 不受实时性限制, 所以密钥长度可以比 SFTP、 FTPS等安全协议的密 钥长。 因此安全性得到提高。 (2 )对于墓改, MD5等算法都支持不可逆哈 希函数防墓改。 (3 )本发明通过将加密参数通过安全链路传输, 且与加密 文件的传输的时间没有严格关联限制, 因此即便安全链路被攻克, 加密文 件的传输的安全性也有较好的保障。 (4 )进一步的, 对于假冒, 即中间人 攻击。 现有 FTPS, SFTP等框架下, 如果中间人截获了所有加密数据, 再 用暴力解密, 系统是无法防范的。 尤其是针对有效期限较长的版本软件, 即使加长密钥, 也不能有效防止在软件有效期内被破译。 本发明实施例通 过进一步的将原始文件分成片段分别加密的方法, 解密时是需要一个完整 的数据文件的, 但是因为每个片段长度是随机的, 所以要解密出整个文件, 就需要正确判断 N个片段的长度, 否则解密十分困难, 因此可进一步提高 文件传输的安全性。 附图说明
图 1为本发明实施例一的文件下载系统的结构框图;
图 2为本发明实施例一的文件下载方法流程示意图;
图 3为本发明实施例二的文件下载方法流程示意图;
图 4为本发明实施例二的文件划分示意图;
图 5为本发明实施例二的文件重组示意图。 具体实施方式
下面通过具体实施方式结合附图对本发明作进一步详细说明。
实施例一:
图 1所示为本实施例中的文件下载系统的结构框图, 如图 1所示, 该 文件下载系统包括网管系统和设备系统, 其中, 网管系统包括文件获取装 置、 加密装置和文件发送装置; 文件获取装置用于获取原始文件, 值得注 意的是, 本例中的原始文件是指未经加密处理的文件, 例如假设网管系统 获取的是版本文件, 则此处的原始文件则是指未经加密处理的版本文件; 加密装置则用于对文件获取装置获取的原始文件进行加密得到加密文件和 相应的加密参数; 文件发送装置用于将从加密装置获取的加密文件通过文 件传输链路发送给设备系统, 将从加密装置获取的加密参数通过安全链路 发送给设备系统; 本例中的文件发送装置可包括文件传输服务器(即 FTP 服务器), 文件发送装置具体可通过文件传输服务器将加密文件通过文件传 输链路发送给设备系统。
即本例中的加密文件和加密参数是分开通过不同的通道进行发送的。 设备系统包括文件接收装置、 解密装置和至少一个客户端; 客户端用 于从网管系统下载加密文件, 对应的, 本例中的客户端可为 FTP客户端; 文件接收装置用于从网管系统获取相应的加密参数, 具体为接收网管系统 的文件发送装置发送的相关加密参数; 解密装置则用于根据获取的加密参 数对加密文件进行解密以得到原始文件。
具体的, 本例中网管系统的加密装置包括划分模块、 参数获取模块和 加密模块, 其中:
划分模块用于将文件获取装置获取的原始文件按预设划分规则划分为 N个片段, 所述 N的值为大于等于 1的整数; 该预设划分规则可为按固定 的长度进行划分, 也可为随机划分, 为了进一步提高传输的安全性能, 本 例中可优选为随机划分。
参数获取模块用于获取用于记录各加密后的片段在加密文件中的位置 信息的片段标记集合以及用于记录各片段密钥的密钥集合; 还用于根据各 片段的密钥, 得到密钥集合; 加密参数至少包括片段标记集合和密钥集合。
加密模块用于对划分模块的 N个片段进行加密、 重组,得到加密文件。 值得注意的是, 本例中的加密模块采用同一加密算法对各片段进行加密, 也可针对不同的片段采用不同的加密算法进行加密, 具体可根据实际情况 进行选择。
加密模块对划分的 N个片段进行加密、 重组包括:
加密模块为每个片段生成密钥, 该密钥可以是加密模块生成的对称密 钥, 具体可根据加密模块所选择的加密算法决定;
加密模块采用与各片段对应的对称密钥对各片段进行加密;
加密模块根据拆分前的顺序(即各片段加密前在原始文件中的原顺序 ) 将加密后的各片段重新组合, 得到加密文件。
对应的, 设备系统的解密装置根据获取的加密参数对加密文件进行解 密的过程包括:
解密装置根据片段标记集合将加密文件划分成 N个片段;
解密装置根据密钥集合中各片段对应的密钥, 对各片段进行解密; 解密装置将解密后的各片段按拆分前的顺序 (此处的拆分前的顺序可 以是指对原始文件拆分前, 各未加密片段在原始文件中的原顺序; 也可'指 对加密文件拆分前, 各加密后的片段在加密文件中的原顺序).进行重组, 得到原始文件。
图 2所示为本例中文件下栽方法的流程示意图, 如图 2所示, 该方法 具体包括:
网管系统荻取原始文件, 对获取的原始文件进行加密得到加密文件和 相应的加密参数;
网管系统将加密文件通过文件传输链路发送给设备系统,· 将加密参数 通过安全链路发送给所述设备系统;
设备系统通过上述不同的链路获取到加密文件和加密参数后, 根据获 取的加密参数对加密文件进行解密, 得到原始文件。 '
具体的, 本例中的网管系统对其获取的原始文件进行加密的过程包括: 网管系统将荻取的原始文件按预设划分规则划分为 N个片段, N值为 大于等于 1的整数;
网管系统对 N个片段进行加密、 重组, 得到加密文件, 并记录各片段 的密钥, 得到密钥集合; 并得到用于记录各加密后的片段在加密文件中的 位置信息的片段标记集合以及用于记录各片段密钥的密钥集合; 加密参数 至少包括片段标记集合和所述密钥集合。 . 为了进一步提高文件传输的安全性, 本例中的预设划分规则为对原始 文件进行随机划分, 但最终得到的每个片段的长度必须大于等于最小加密 数据块的长度。
具体的, 网管系统对 N个片段进行加密、 重组的过程包括:
为每个片段生成密钥, 该密钥的具体形式决定于加密算法, 可以是对 称密钥, 支持完整性验证;
采用与各片段对应的对称密钥对各片段进行加密;
8
更正页 (细则第 91条) ISA/CN 根据拆分前各片段原来的顺序将加密后的各片段重新组合, 得到加密 文件。
对应的, 设备系统根据获取的加密参数对加密文件进行解密的过程则 包括:
根据片段标记集合将所述加密文件划分成 N个片段; 由于是根据片段 标记集合进行划分的, 可保证解密是划分的片段与加密过程划分的片段一 致;
根据获取的密钥集合中各片段对应的密钥, 对各片段进行解密; 将解密后的各片段拆分前各片段原来的顺序进行重组, 得到原始文件。 由于是根据片段标记集合进行划分的, 可保证解密后的各片段与原始文件 中的位置的正确性。
综上可知, 与现有的 SFTP、 FTPS等安全协议相比。 本例中将对原始 文件加密过程和传输过程分离, 具体是先下载完原始文件, 然后对其进行 加密, 并将加密文件和相关的加密参数通过不同的链路进行传送, 使得文 件下载可以脱离 SFTP、 FTPS等安全协议, 而直接使用传输速度较快的协 议(例如 FTP协议, 当采用 FTP协议时, 网管系统还将加密文件的传输路 径和 FTP协议相关参数通过安全链路发送给设备系统),可提高文件传输的 效率, 而且在文件传输过程中不需要加密解密数据, 可进一步提高文件传 输的效率。
同时, 针对网络安全协议的窃密, 墓改, 假冒三类攻击, 本例中的方 案也都有更好的防范措施, 具体如下: (1 )对于窃密攻击, 随着硬件设备 的发展, 使得原有的安全加密算法不断失效; 而应对此类攻击的最简单办 法就是加长密钥。 由于本例中不是在传输过程中对文件进行加密 /解密, 而 是在传输前和传输完成后分别进行加、 解密, 不受实时性限制, 所以密钥 长度可以比 SFTP、 FTPS等安全协议的密钥长, 因此安全性自然就能得到 显著的提高。 (2 )对于墓改攻击, 加密时采用 MD5等算法都支持不可逆哈 希函数防墓改。 (3 )对于假冒, 即中间人攻击。 现有 FTPS, SFTP等框架 下, 如果中间人截获了所有加密数据, 再用暴力解密, 系统是无法防范的。 尤其是针对有效期限较长的版本软件, 即使加长密钥, 也不能有效防止在 软件有效期内被破译。 本例则将原始文件分成片段分别加密的方法, 且可 将原始文件随机划分成 N个片段,只需要满足每个片段可加密的条件即可, 因此在解密时是需要一个完整的数据文件的, 但是因为每个片段长度是随 机的, 所以要解密出整个文件, 就需要正确判断 N个片段的长度, 否则解 密十分困难, 因此可进一步提高文件传输的安全性。 例如: 假设一个版 本软件长度为 M个最小长度单位, 那么可能的组合有 M x ( M-1 ) X… X
( M-N+1 )种。 而 M—般大于 1000, N一般大于 10, 这样可能的组合至少 为 ( 1000 ) Λ10种, 要从这些组合里面选择出正确的一种, 难度可想而知。
( 4 )本例中的密钥集合及片段标记集合是通过安全链路传输, 且与文件传 输的时间没有关联, 所以即便安全链路被攻克, 文件传输也有相当高的保 障。 实施例二:
为了更好的理解本发明, 本例中以一个具体的实现流程为例, 对本发 明做进一步说明。 本例中的设备系统下载的文件为版本文件, 即本例中网 管系统获取的原始文件为未加密的版本文件, 且本例中的网管系统与设备 系统之间采用 FIP协议进行文件的传输, 具体实现流程请参见图 3:
步驟 0, 网管系统收到版本下载指令;
步驟 1 , 网管系统获通过文件获取装置获取需要下载的版本文件, 记为 F0; 获取版本文件的步驟并非本发明的重点, 因此在此不再赘述;
步驟 2, 网管系统将版本文件 F0随机的划分为 Ν个片段,请参见图 4, 具体划分过程如下: 步驟 2.1 , 确定 N的值。 N的值是根据文件的大小 ( Size(FO) )和最小 加密数据块 (U)的长度(Len (U) )确定的, 可以根据具体情况使用不同的算 法。 例如, N=max { Size(F0)/Len(U)/l 000, 10};
步驟 2.2, 设 M= Size(F0)/Len(U), 即文件可以划分为 M个最小加密数 据块。 按照顺序分别标号 1 , 2, .·· , M。
步驟 3, 网管系统为每个片段生成对称密钥, 得到密钥集合记为 K, K={kl , ..· , kN}; 并从 [Ι,Μ]中随机取出 N-l个整数, 作为除第一个以外的 N-1 个加密后的片段的起始数据块, 即片段标记集合中的各元素为从 [Ι,Μ] 中随机取出 N-l个整数, 记片段标记集合为 P, P={pl, ... ,pN}, 各元素用于 记录各加密后片段在加密后的版本文件中的位置信息, ρΙ, .,. ,ρΝ记录的是 各个片段段首在 F0中的位置;
步驟 4, 网管系统为每个片段使用各自的密钥进行加密, 本例中网管系 统采取的加密算法支持完整性验证;
步驟 5,网管系统为将加密后的片段按照原顺序组合成一个新的版本文 件 F1 , 请参见图 5, 由图 5可知, 加密后的各片段在 F1中的顺序与加密前 各片段在 F0中的顺序保持一致;
步驟 6, 网管系统为通过安全链路, 将集合 Ρ, Κ, 以及 F1传输路径和 FTP相关参数发送给设备系统, 设备系认保存这些参数。 本例中的安全链 路可以有多种选择,例如支持 TLS的 TCP链路; 并通过 FTP服务器将加密 后的版本文件发送给设备系统;
步驟 7, 设备系统通过 FTP客户端向网管系统的 FTP服务器请求下载 文件 F1;
步驟 8, 文件 F1下载到设备系统;
步驟 9, 设备系统利用步驟 6获取的集合 P, 将 F1分成 N个片段; 步驟 10, 利用步驟 6获取的集合 K, 分别对 N个片段进行解密; 步驟 11 , 将解密后的 N个片段根据集合 P中各元素标记的位置组合成 一个新的文件, 即原文件 F0。 能认定本发明的具体实施只局限于这些说明。 对于本发明所属技术领域的 普通技术人员来说, 在不脱离本发明构思的前提下, 还可以做出若干简单 推演或替换, 都应当视为属于本发明的保护范围。

Claims

权利要求书
1、 一种文件下载方法, 其中, 该方法包括:
网管系统获取原始文件, 对所述原始文件进行加密得到加密文件和相 应的加密参数;
所述网管系统将所述加密文件通过文件传输链路发送给设备系统, 将 所述加密参数通过安全链路发送给所述设备系统;
所述设备系统获取到所述加密文件和加密参数后, 根据所述加密参数 对所述加密文件进行解密, 得到所述原始文件。
2、 如权利要求 1所述的方法, 其中, 所述网管系统对所述原始文件进 行加密得到加密文件和相应的加密参数为:
网管系统将获取的原始文件按预设划分规则划分为 N个片段, 所述 N 为大于等于 1的整数;
网管系统对所述 N个片段进行加密、 重组, 得到加密文件, 并得到用 于记录各加密后的片段在加密文件中的位置信息的片段标记集合以及用于 记录各片段密钥的密钥集合; 所述加密参数包括所述片段标记集合和所述 密钥集合。
3、 如权利要求 2所述的方法, 其中, 所述预设划分规则为对原始文件 进行随机划分, 得到的每个片段的长度大于等于最小加密数据块的长度。
4、 如权利要求 2所述的方法, 其中, 所述网管系统对所述 N个片段进 行加密、 重组为:
为每个片段生成密钥;
采用与各片段对应的密钥对各片段进行加密;
根据拆分前的顺序将加密后的各片段重新组合, 得到加密文件。
5、 如权利要求 4所述的方法, 其中, 所述设备系统根据所述加密参数 对所述加密文件进行解密为: 根据所述片段标记集合将所述加密文件划分成 N个片段; 根据所述密钥集合中各片段对应的密钥, 对各片段进行解密; 将解密后的各片段按拆分前的顺序进行重组, 得到原始文件。
6、 如权利要求 1至 5任一项所述的方法, 其中, 所述网管系统通过文 件传输协议将所述加密文件通过文件传输链路发送给设备系统; 所述网管 系统将加密文件的传输路径和文件传输协议相关参数通过所述安全链路发 送给所述设备系统。
7、 一种文件下载系统, 其中, 该系统包括: 网管系统和设备系统; 其 中, 网管系统包括文件获取装置、 加密装置和文件发送装置, 设备系统包 括文件接收装置、 解密装置和至少一个客户端,
所述文件获取装置设置为获取原始文件, 所述加密装置设置为对所述 原始文件进行加密得到加密文件和相应的加密参数; 所述文件发送装置设 置为将所述加密文件通过文件传输链路发送给设备系统, 将所述加密参数 通过安全链路发送给所述设备系统;
所述客户端设置为从所述网管系统下载所述加密文件; 所述文件接收 装置设置为从所述网管系统获取所述加密参数; 所述解密装置设置为根据 所述加密参数对所述加密文件进行解密, 得到原始文件。
8、如权利要求 7所述的下载系统,其中, 所述加密装置包括划分模块、 参数获取模块和加密模块; 其中,
所述划分模块设置为将获取的原始文件按预设划分规则划分为 N个片 段, 所述 N为大于等于 1的整数;
所述参数获取模块设置为获取用于记录各加密后的片段在加密文件中 的位置信息的片段标记集合以及用于记录各片段密钥的密钥集合; 还设置 为根据各片段的密钥, 得到密钥集合; 所述加密参数包括所述片段标记集 合和所述密钥集合; 所述加密模块设置为对所述 N个片段进行加密、 重组,得到加密文件。
9、 如权利要求 8所述的下载系统, 其中, 所述加密模块对所述 N个片 段进行加密、 重组为:
加密模块为每个片段生成密钥;
加密模块采用与各片段对应的密钥对各片段进行加密;
加密模块根据拆分前的顺序将加密后的各片段重新组合, 得到加密文 件。
10、 如权利要求 9所述的下载系统, 其中, 所述解密装置根据所述加 密参数对所述加密文件进行解密为:
解密装置根据所述片段标记集合将所述加密文件划分成 N个片段; 解密装置根据所述密钥集合中各片段对应的密钥, 对各片段进行解密; 解密装置将解密后的各片段按拆分前的顺序进行重组, 得到原始文件。
11、 如权利要求 7至 10任一项所述的下载系统, 其中, 所述文件发送 装置包括文件传输服务器, 所述文件发送装置通过所述文件传输服务器将 所述加密文件通过文件传输链路发送给设备系统。
PCT/CN2012/080412 2012-02-09 2012-08-21 一种文件下载方法及系统 WO2013117087A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP12868319.0A EP2814199B1 (en) 2012-02-09 2012-08-21 Method and system for downloading file

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210028712.5A CN103248650B (zh) 2012-02-09 2012-02-09 一种文件下载方法及系统
CN201210028712.5 2012-02-09

Publications (1)

Publication Number Publication Date
WO2013117087A1 true WO2013117087A1 (zh) 2013-08-15

Family

ID=48927872

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/080412 WO2013117087A1 (zh) 2012-02-09 2012-08-21 一种文件下载方法及系统

Country Status (3)

Country Link
EP (1) EP2814199B1 (zh)
CN (1) CN103248650B (zh)
WO (1) WO2013117087A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519039A (zh) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 一种数据的同态处理方法
CN116346508A (zh) * 2023-05-31 2023-06-27 深圳市东信时代信息技术有限公司 基于分片加密存储的信息传输方法、装置、设备及介质
CN116582249A (zh) * 2023-07-14 2023-08-11 山东极光智能科技有限公司 一种基于大数据的网络安全分析方法及系统

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270380A (zh) * 2014-10-15 2015-01-07 叶涛 基于移动网络和通信客户端的端到端加密方法和加密系统
CN105119870A (zh) * 2014-11-04 2015-12-02 合肥轩明信息科技有限公司 一种文件网络安全传输的方法
CN105162825A (zh) * 2015-07-11 2015-12-16 深圳市美贝壳科技有限公司 文件安全传输方法
CN106960155A (zh) * 2017-03-28 2017-07-18 联想(北京)有限公司 一种基本输入输出系统的更新方法和装置
CN107707599A (zh) * 2017-05-26 2018-02-16 语祯物联科技(上海)有限公司 一种物联网通信设备传输文件的方法及装置
CN107301108A (zh) * 2017-07-25 2017-10-27 合肥红铭网络科技有限公司 一种服务器安全保护系统
CN107395616B (zh) * 2017-08-14 2020-10-27 北京奇虎科技有限公司 一种用于对数据文件进行安全处理的方法及系统
CN107612942A (zh) * 2017-10-31 2018-01-19 北京拓通信科技有限公司 一种短信平台用户数据传输安全加密方法
CN108718312B (zh) * 2018-05-22 2020-08-14 朱小军 一种文件在线加密方法
CN109587222A (zh) * 2018-11-12 2019-04-05 厦门安胜网络科技有限公司 一种文件碎片化传输的方法、装置及存储介质
CN110166229A (zh) * 2019-04-12 2019-08-23 北京旷视科技有限公司 敏感信息的托管方法、应用系统和密钥中心系统
CN111125645B (zh) * 2019-11-15 2023-05-16 至本医疗科技(上海)有限公司 执行程序处理方法、系统、装置、计算机设备和介质
CN112230957A (zh) * 2020-10-16 2021-01-15 深圳市中江天华科技有限公司 一种基于云端和应用桥接的设备升级方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050138350A1 (en) * 2003-12-23 2005-06-23 Hariharan Ravi S. Configurable secure FTP
CN1968081A (zh) * 2006-10-27 2007-05-23 祝万昌 一种用于文件传送的数据加密系统和方法
CN101572698A (zh) * 2008-04-30 2009-11-04 北京明朝万达科技有限公司 一种文件网络传输通用加密方法
CN101594226A (zh) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 用于文件传输的数据保护方法和系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004054189A1 (en) * 2002-12-12 2004-06-24 Hunt, Derek, Hugh Method and system for secure transmission of e-mail
EP1645130A1 (en) * 2003-07-04 2006-04-12 Koninklijke Philips Electronics N.V. Method of broadcasting multimedia content via a distribution network
US8064599B2 (en) * 2007-08-29 2011-11-22 Red Hat, Inc. Secure message transport using message segmentation
WO2011071423A1 (en) * 2009-12-07 2011-06-16 Telefonaktiebolaget L M Ericsson (Publ) Method and arrangement for enabling play-out of media
CN102006331B (zh) * 2010-11-29 2013-08-14 中国联合网络通信集团有限公司 媒体信息发送方法、终端及p2p系统
CN102118512A (zh) * 2011-03-28 2011-07-06 阮晓迅 一种手机应用程序防破解方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050138350A1 (en) * 2003-12-23 2005-06-23 Hariharan Ravi S. Configurable secure FTP
CN1968081A (zh) * 2006-10-27 2007-05-23 祝万昌 一种用于文件传送的数据加密系统和方法
CN101572698A (zh) * 2008-04-30 2009-11-04 北京明朝万达科技有限公司 一种文件网络传输通用加密方法
CN101594226A (zh) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 用于文件传输的数据保护方法和系统

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519039A (zh) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 一种数据的同态处理方法
CN116346508A (zh) * 2023-05-31 2023-06-27 深圳市东信时代信息技术有限公司 基于分片加密存储的信息传输方法、装置、设备及介质
CN116346508B (zh) * 2023-05-31 2023-09-29 深圳市东信时代信息技术有限公司 基于分片加密存储的信息传输方法、装置、设备及介质
CN116582249A (zh) * 2023-07-14 2023-08-11 山东极光智能科技有限公司 一种基于大数据的网络安全分析方法及系统
CN116582249B (zh) * 2023-07-14 2023-09-29 山东极光智能科技有限公司 一种基于大数据的网络安全分析方法及系统

Also Published As

Publication number Publication date
EP2814199B1 (en) 2018-02-28
CN103248650A (zh) 2013-08-14
EP2814199A4 (en) 2015-04-08
CN103248650B (zh) 2016-12-14
EP2814199A1 (en) 2014-12-17

Similar Documents

Publication Publication Date Title
WO2013117087A1 (zh) 一种文件下载方法及系统
US11323276B2 (en) Mutual authentication of confidential communication
CN109347835B (zh) 信息传输方法、客户端、服务器以及计算机可读存储介质
US11533297B2 (en) Secure communication channel with token renewal mechanism
US10050955B2 (en) Efficient start-up for secured connections and related services
US8130961B2 (en) Method and system for client-server mutual authentication using event-based OTP
US11075759B2 (en) Fingerprint data processing method and processing apparatus
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
EP3170282B1 (en) Data distributing over network to user devices
CN106941404B (zh) 密钥保护方法及装置
CN103036880A (zh) 网络信息传输方法、设备及系统
AU2020225314A1 (en) Cryptographic data verification method
CN104243439A (zh) 文件传输处理方法、系统及终端
CN110855597B (zh) 消息传输方法、服务器及客户端
CN111081338A (zh) 安全型人体健康参数采集方法
KR20190135145A (ko) 웹 표준 환경에서 화이트박스 암호화 방법을 이용한 정보 보호 방법
CN117951720A (zh) 前端加密方法、装置、电子设备及存储介质
CN117714185A (zh) 一种基于国密算法的银行柜面数据处理方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12868319

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012868319

Country of ref document: EP