CN109194650A - Encrypted transmission method based on the remote encryption transmission system of file - Google Patents
Encrypted transmission method based on the remote encryption transmission system of file Download PDFInfo
- Publication number
- CN109194650A CN109194650A CN201811020777.9A CN201811020777A CN109194650A CN 109194650 A CN109194650 A CN 109194650A CN 201811020777 A CN201811020777 A CN 201811020777A CN 109194650 A CN109194650 A CN 109194650A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- server
- byte
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 48
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000012546 transfer Methods 0.000 claims abstract description 7
- 238000001514 detection method Methods 0.000 claims abstract description 4
- 238000007726 management method Methods 0.000 claims description 30
- 230000006870 function Effects 0.000 claims description 23
- 238000003491 array Methods 0.000 claims description 20
- 238000012550 audit Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000008569 process Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 5
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to encryption technology fields, and in particular, to a kind of encrypted transmission method based on the remote encryption transmission system of file, the remote encryption transmission system of file includes client, for registering, logging in, Batch sending and receive file;File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents malicious attack, code key management and management interface service;After user's registration, only it is to be understood that the account number of other side can mutually send file by outer net, file can automatic encrypting and decrypting when sending and receiving, it does not need user and carries out any encryption and decryption operation, Batch sending and batch is supported to receive, the data that can be transmitted again to user while easy to operate escort, and preferably solve the problems, such as to carry out remote file security transmission using Android system.
Description
Technical field:
The present invention relates to encryption technology fields, and in particular, to a kind of adding based on the remote encryption transmission system of file
Close transmission method.
Background technique:
For confidential information in ancient war, simple transformation usually is made to communications content, cryptographic technique is as guarantee letter
The core technology of breath safety is being used widely very early.Cryptography is fashionable forever in the means of assuring data security
Topic.The symmetric cryptography of caesar cipher till now before for a long time, then arrive asymmetric cryptography and the threshold cryptography in future
Technology, cryptography have immeasurable value in continuous development and perfect.In life, no matter everybody is office or learns
It practises, we always need to send and receive various files, have many file transfer conveyances at present, for example Tencent QQ is soft
Part.The file transmitting function of Tencent QQ software is very convenient, but is not encryption by the file of Tencent QQ software transmission
, when file may cause unnecessary loss by malicious intercepted to us.Certainly, we can first add file
It is close, the file of this encryption is retransmited, the risk of leakage of data is reduced, but other side is needed to know that password, password are being transmitted across
Risk is equally existed in journey, and the process of encrypting and decrypting is also comparatively laborious, be also unfavorable for more than the file we to password into
Row management.
Summary of the invention:
The present invention overcomes the deficiencies of existing technologies, and provides a kind of encrypted transmission based on the remote encryption transmission system of file
Method.
The technical problems to be solved by the invention are implemented with the following technical solutions: one kind encrypting biography based on file at a distance
The encrypted transmission method of defeated system, the remote encryption transmission system of file include
Client, for registering, logging in, Batch sending and receive file;
File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents from disliking
Meaning attack, code key management and management interface service;
Management server for audit function, La Hei and is forced offline;
The encrypted transmission method includes:
(1) client of user A can read file to byte byte arrays, using symmetrical during reading to array
Encryption Algorithm is encrypted, and is encrypted each byte using the device number of user A, is subsequently sent to server;
(2) server receives the ciphertext that user A is sent, and the file of server corresponding account is arrived in storage, and A is sent
File size, name, be saved in the path of server and recipient's storage of this document to database Send table;
(3) user B request receives file, and server has received instruction, and ergodic data library Send table, inquire-receive person
The data for being the account number of user B, and not receiving, by the filename, file size, file path, the hair that find record
The information such as the person of sending find the file that user A is sent to user B, and this ciphertext are read byte arrays, complete file encryption
Transmission.
Preferably, the client and file server are to be completed user's registration, login and file based on C/S model and passed
Defeated service, the system administration services are to be based on B/S mode, are same data used in file server and management server
Library, and in file server there are interface, file server forces user offline according to the certain states of database and adds user
Enter blacklist, administrator makes the state of the management server modification certain values of database via web page operation, controls file server
User is made and forces offline and draws black.
Preferably, in the step (3), each byte of server ciphertext passes through symmetric encipherment algorithm and user first
The key of A is reduced into the original text byte of A transmission, then original text byte is encrypted to using symmetric encipherment algorithm by the key of B close
Text, the key of the ciphertext are the device number of B, and after B receives file, client reads the device number of user B, and utilization is identical
The file received is decrypted in symmetric encipherment algorithm.
Preferably, the symmetric cryptography code key of symmetric encipherment algorithm is Android mobile phone device number, the symmetric encipherment algorithm packet
It includes:
1) file is read to memory, is stored in byte arrays;
2) cell phone apparatus number is read, is stored to key array, key array length is fixed as 15, is the length of device number
Degree;
3) byte arrays are traversed, first element of first element of byte arrays and code key array is subjected to XOR operation,
Second element of second element of byte arrays and code key array is subjected to XOR operation, byte arrays the 15th byte and code key
The 15th element of array carries out XOR operation, then first element exclusive or of the 16th bit element of byte arrays and code key array is transported
It calculates, the new byte value obtained after each operation is sent to server, in cycles.
Compared with prior art, the application has the beneficial effect that provided by the present application a kind of encrypt at a distance based on file
The encrypted transmission method of Transmission system, after user's registration, only it is to be understood that the account number of other side can mutually be sent by outer net
File, file when sending and receiving can automatic encrypting and decrypting, do not need user and carry out any encryption and decryption operation, support batch
It sends and batch receives, the data that can be transmitted again to user while easy to operate escort, and preferably solve use
Android system carries out the problem of remote file security transmission.
Specific embodiment:
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below
Specific embodiment is closed, the present invention is furture elucidated.
A kind of encrypted transmission method based on the remote encryption transmission system of file, the remote encrypted transmission system of file
System include client, for registering, logging in, Batch sending and receive file;
File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents from disliking
Meaning attack, code key management and management interface service;
Management server for audit function, La Hei and is forced offline;
The encrypted transmission method includes:
(1) client of user A can read file to byte byte arrays, using symmetrical during reading to array
Encryption Algorithm is encrypted, and is encrypted each byte using the device number of user A, is subsequently sent to server;
(2) server receives the ciphertext that user A is sent, and the file of server corresponding account is arrived in storage, and A is sent
File size, name, be saved in the path of server and recipient's storage of this document to database Send table;
(3) user B request receives file, and server has received instruction, and ergodic data library Send table, inquire-receive person
The data for being the account number of user B, and not receiving, by the filename, file size, file path, the hair that find record
The information such as the person of sending find the file that user A is sent to user B, and this ciphertext are read byte arrays, complete file encryption
Transmission.
Preferably, the client and file server are to be completed user's registration, login and file based on C/S model and passed
Defeated service, the system administration services are to be based on B/S mode, are same data used in file server and management server
Library, and in file server there are interface, file server forces user offline according to the certain states of database and adds user
Enter blacklist, administrator makes the state of the management server modification certain values of database via web page operation, controls file server
User is made and forces offline and draws black.
Preferably, in the step (3), each byte of server ciphertext passes through symmetric encipherment algorithm and user first
The key of A is reduced into the original text byte of A transmission, then original text byte is encrypted to using symmetric encipherment algorithm by the key of B close
Text, the key of the ciphertext are the device number of B, and after B receives file, client reads the device number of user B, and utilization is identical
The file received is decrypted in symmetric encipherment algorithm.
In order to improve file transmission efficiency, this system does not use ready-made symmetric encipherment algorithm, such as DES, 3DES etc.,
A but innovative customized symmetric encipherment algorithm: the characteristic of XOR operation (^), a several exclusive or number two are based on
It is secondary, as a result or this number itself.Such as: X^Y^X=X.System is using Android mobile phone device number as symmetric cryptographic key, Android
" the electronics string number " that handset serial is made of 15 bit digitals, it is corresponded with every mobile phone.Device number is made
For the key of symmetric cryptography, when transmitting file, device number not will do it transmission, if wanting Brute Force, enumeration result has 10
15 power kinds as a result, even the light in martial prowess Taihu Lake also takes 92 days with the calculating of the peak velocities of 12.54 hundred million hundred million times/second, be used for
It encrypts fool proof.Algorithm main working process is as follows:
1) file is read to memory, is stored in byte arrays byte [];
2) cell phone apparatus number is read, is stored to key array pwd [], key array length is fixed as 15, that is, sets
Standby number length;
3) byte arrays are traversed, first element of first element of byte [] and pwd [] is subjected to XOR operation, it will
Second element of second element of byte [] and pwd [] carries out XOR operation, the 15th byte of byte [] and pwd [] the 15th
Element carries out XOR operation, then by first element XOR operation of the 16th bit element of byte [] and pwd [], after each operation
Obtained new byte value is sent to server, in cycles.The customized symmetric encipherment algorithm source code that system uses:
In the application, also disclose a kind of asymmetric encryption RSA Algorithm, account number when being mainly used for registering customers as and should
Server end is sent to after the encryption of user mobile phone device number.
What RSA Algorithm used is the problem that mathematically big number decomposes, as long as private key digit is sufficiently large, even with public key
It can not calculate that private key, private key are just fool proof at 1024.Main process is:
(1) two Big primes p and q are generated at random, n=p*q are taken, if k=(p-1) * (q-1);
(2) an arbitrary positive integer e is taken, it is desired to meet e and k prime number and e < k each other;
(3) meet d*e%t=1, and calculate d;
(4) it respectively obtains by the above process: n, d, e;
(5) original text M (M < n) is set;
(6) it encrypts: obtaining ciphertext c after c=(M*d) %n operation;
(7) decrypt: M=(c*e) %n obtains original text M.
{ n, e } is used as public key, { n, d } is used as private key, is encrypted using public key to data, only corresponding private key ability
It is decrypted, vice versa.Rivest, shamir, adelman has the following characteristics that key is made of a public key and a private key;It is public
Key can be disclosed to be known by owner;Private key only has owner all, and all other men are unable to get;The data of public key encryption only have
Corresponding private key could decrypt.The source code of RSA Algorithm:
In the application, system is made of a client and two servers, server be divided into Ftp server and
System management server is two completely different programs.Client and file server are to complete user based on C/S model
Registration, login and file encryption transfer function;System administration services are to be designed based on B/S mode exclusively for administrator, are provided
The function of audit and system administration.Because being same database used in file server and management server, and in text
There are interface, file server can be accomplished to force to allow according to the certain states of database user offline and to be added user part server
Enter the function of blacklist, so administrator directly passes through web page operation and can make the shape of the management server modification certain values of database
State forces offline and draws black equal operation to can control file server and make to user.
In the application, the design of client is mainly made of two interfaces, and one is login interface, another is to log in
Interface after success.There are three buttons for login interface: obtaining identifying code, login, registration;And including two input frames: one
It is input account number, another is input identifying code.If user did not register, account number is just inputted, registration is then clicked, is
System will be automatically performed registering functional: the account number of user and device number encrypted transmission to server, and be saved in server data
Library.If user's registration mistake, account number is inputted, then clicks and obtains identifying code, temporary login password will be sent to by server
Mailbox account number corresponding to user account number, because user account number is exactly QQ number, and QQ number has just been opened freely automatically in registration
QQ mailbox service.After user views temporary login password and successfully log in from mailbox, main interface will be entered.
Main interface is by one for showing that the console of information, recipient's account number input frame, a file send progress bar and hair
It send file, receive the buttons such as file, transmission list composition.As long as user inputs the account number of other side in recipient's account number input frame,
It clicks and sends, the All Files in the Sendding file under program folder will be sent to the account number of recipient.Only
It wants other side to register in this system, when he logs in, clicks and receive file, all others can be downloaded to the text of his transmission
Part.File download also has progress bar and shows, the file that success is downloaded can be saved under the file where program
Under Received subdirectory.The process sent and received no longer needs to do any operation, and file is transferred to server and from server
Locally downloading process is entirely encryption.
In the application, file server is wanted to provide service simultaneously for multiple users, each user registration, login,
Each process sent files and received files be it is independent, not will receive others' influence;File server needs simultaneously
Stability powerful enough because user may in any one process unexpected interrupt operation or abnormal operation, for example use
Family does not input for a long time after server sends login authentication code or long-time is without operation after the login, still
Connection is not turned off again, can waste server resource in this way, so in design document server, it is necessary in view of these are asked
Topic cannot cause whole system to collapse because of the abnormal operation of any one of user or illegal user.File server
Need to provide the services such as registration, mailbox identifying code, login, file transmission.Possess key management and Account Administration function, needs
Powerful journal function can record to be which IP address from what port numbers access server and carried out which in which period
Operation;It needs to record simultaneously, what file had sent to which user at what time by which user.Can file to user into
Row management provides the functions such as batch is downloaded and batch uploads;Needing simultaneously prevents malicious intrusions function, for example illegal visitor is simultaneously
It is not to be interacted by client and server, at this point, server needs to carry out illegal invasion label to these malice visitor;
File server does not allow the same account number to log in multiple places simultaneously, when account number is online, at other Anywhere with regard to nothing
Method is again coupled to server.File server is pure java programming, and management server is web program, in order to allow
Management server controls file server, so file server is needed there are interface, by database as medium, and management
Server is communicated.
In the application, in this system, management function is individually come out and is made into a web program, realized based on B/S mode,
As long as having network environment, and a browser can be managed file server, it is not limited to be which platform or
What equipment.Management server needs function to be offered to have audit function, subscriber management function.Audit function, according to file
The log of server record, energy supervisory control system running state, it can be seen which user is online, which user is in which time hair
How many file sent or had received.It can check which operation is the IP address for accessing server carried out, can control file clothes
Business device is forced offline by some online user.
In the application, file server has barrier layer by layer, protects user file, and has more complicated interaction association
View, will not easily be found out by invader.Program can open text service in port numbers 19951 when starting and monitor, dedicated for
The exchange of language, including need registration service, login service, send file or receive file service when all in advance from this end
Slogan sends an instruction to server;Port numbers 19952 are that file sends serve port, when user needs to send file, just
It is to pass data to server by this port numbers;19953 port numbers are dedicated for sending file service, when server connects
When receiving the instruction of client request reception file, server can send the file to request user by this port numbers;
19954 port numbers are that service is monitored in heartbeat, this port numbers can will receive a data from client every 15 seconds, if three
Secondary to be not received by, server just will be considered that client has left, and just will disconnect all connections with this client, release clothes
Business device resource.
In the application, when some user requests registration service, server will use RSA rivest, shamir, adelman, raw
Public key is transferred to client by public key and private key in a pair, the public key that client is given using server by account number and device number into
Ciphertext, is then passed back server by row encryption, and private key is decrypted server by utilizing just now, obtains user data, in this way, service
Device just may be useful for the account number and key at family, and all user account numbers and device number can be all saved in the User table of database.And
The key of user is exactly device number, will not be lost.QQ number and IMEI number binding, carry out normal communication by QQ number.Such case,
Even account number logs in other equipment, the file of the user has been downloaded, equally can not also have been parsed, because without correct
IMEI number i.e. key pair ciphertext are decrypted.And for a user, if file reaches correct destination, client
End can directly read IMEI code and ciphertext is decrypted, and the file that user sees is exactly original text, do other operations without user,
Click send file or receive file can, it is easy to operate.
In the application, when user A will to user B send file, if user A and user B not in same local area network, that
Can not direct communication, so needing file server as intermediary.File server, which operates in, possesses independent IP
On the server of address, A can and server communication, B also can and server communication.So user A sends file to user B
Process, which is A in fact, sends file to server, and server knows that this document is the file that A is sent to B after receiving file, when with
After family B is logged in, request receives file, then the file that server can be sent to A B is transferred to user B.Only it is only completed outer net
The function of transmission does not achieve the purpose that this system, most importantly encrypted transmission.Encrypted transmission process is as follows:
User A sends file to user B, firstly, the client of user A can read file to byte byte arrays, reads
It takes the process to array just to will use the symmetric encipherment algorithm from wound, each byte is encrypted using the device number of A, is then sent out
It is sent to server.It is ciphertext that user A is sent that server is received, can store the file of server corresponding account, and
The recipient of file size, the name that A is sent, the path and this document that are saved in server stores to database Send
Table, this completes the processes for sending file.The process that user's A file is transferred to server is entirely encryption, even if by
Others intercepts, and interceptor is at a complete loss as to what to do without key.File is successfully sent to after file server, and storage is on the server
Form remain ciphertext, user B request receives file, and server has received instruction, will ergodic data library Send table, look into
Ask recipient's data for being the account number of user B, and not receiving, then by find the filename of record, file size,
The information such as file path, sender find the file that user A is sent to user B, this ciphertext are then read byte number
Group, because user A and user B just arrives the key storage of the device number of oneself i.e. symmetric cryptography when registration
Server User table, so during reading, each byte of server ciphertext pass through first symmetric encipherment algorithm and
The key of user A, is reduced into the original text byte of A transmission, then original text byte is encrypted by the key of B using symmetric encipherment algorithm
At ciphertext, the key of this ciphertext is exactly the device number of B, and after B receives file, client can read the device number of user B,
The file received is decrypted using identical symmetric encipherment algorithm.
When user transmits file, after user logs in, the account number of recipient is had input, clicks and sends file, it is in fact first
An instruction can be first sent to server, indicate that this client needs to send file.The instruction of transmission on the way is also to add completely
Close, what is utilized is the symmetric encipherment algorithm of innovation, identical with the mode of encryption file.After this instruction reaches server, clothes
Business device can be directly decrypted using the corresponding key pair instruction of active user, if the data decrypted meet format, just
One state of client is returned, indicates that server all set receives file.The format of this instruction is exactly: " S recipient's account number
The name for receiving file receives the size S " of file.If the data decrypted are not right, indicate that active user is illegal user, directly
Connect its connection of disconnection.
Basic principles and main features and the features of the present invention of the invention have been shown and described above.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes
Change and improvement is both fallen in the range of claimed invention.The scope of protection of present invention is by appended claims
And its equivalent thereof.
Claims (4)
1. a kind of encrypted transmission method based on the remote encryption transmission system of file, which is characterized in that the file is remote
Encryption transmission system includes
Client, for registering, logging in, Batch sending and receive file;
File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents malice from attacking
It hits, code key management and management interface service;
Management server for audit function, La Hei and is forced offline;
The encrypted transmission method includes:
(1) client of user A can read file to byte byte arrays, use symmetric cryptography during reading to array
Algorithm is encrypted, and is encrypted each byte using the device number of user A, is subsequently sent to server;
(2) server receives the ciphertext that user A is sent, and the file of server corresponding account, and the text that A is sent are arrived in storage
The recipient of part size, name, the path and this document that are saved in server stores to database Send table;
(3) user B request receives file, and server has received instruction, and ergodic data library Send table, and inquire-receive person is to use
The account number of family B, and the data not received, by the filename, file size, the file path, sender that find record
Etc. information, find the file that user A is sent to user B, and this ciphertext is read byte arrays, complete file encryption and pass
It is defeated.
2. the encrypted transmission method based on the remote encryption transmission system of file according to claim 1, feature
It is, the client and file server are to complete user's registration, login and file transfer services based on C/S model, described
System administration services are to be based on B/S mode, are same databases used in file server and management server, and are taken in file
Device be engaged in there are interface, file server forces user offline according to the certain states of database and blacklist is added in user, manages
Member makes the state of the management server modification certain values of database via web page operation, and control file server makes pressure to user
Offline and drawing is black.
3. the encrypted transmission method based on the remote encryption transmission system of file according to claim 1, feature
It is, in the step (3), each byte of server ciphertext passes through the key of symmetric encipherment algorithm and user A first, also
The original text byte that original is sent at A, then original text byte is encrypted to ciphertext using symmetric encipherment algorithm by the key of B, the ciphertext
Key be B device number, when B receive file after, client read user B device number, utilize identical symmetric cryptography
The file received is decrypted in algorithm.
4. the encrypted transmission method based on the remote encryption transmission system of file according to claim 3, feature
It is, the symmetric cryptography code key of symmetric encipherment algorithm is Android mobile phone device number, and the symmetric encipherment algorithm includes:
1) file is read to memory, is stored in byte arrays;
2) cell phone apparatus number is read, is stored to key array, key array length is fixed as 15, is the length of device number;
3) byte arrays are traversed, first element of first element of byte arrays and code key array are subjected to XOR operation, by word
Second element of second element of joint number group and code key array carries out XOR operation, the 15th byte of byte arrays and code key array
15th element carries out XOR operation, then by first element XOR operation of the 16th bit element of byte arrays and code key array, will
The new byte value obtained after each operation is sent to server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811020777.9A CN109194650B (en) | 2018-09-03 | 2018-09-03 | Encryption transmission method based on file remote encryption transmission system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811020777.9A CN109194650B (en) | 2018-09-03 | 2018-09-03 | Encryption transmission method based on file remote encryption transmission system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109194650A true CN109194650A (en) | 2019-01-11 |
CN109194650B CN109194650B (en) | 2022-02-01 |
Family
ID=64912114
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811020777.9A Expired - Fee Related CN109194650B (en) | 2018-09-03 | 2018-09-03 | Encryption transmission method based on file remote encryption transmission system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109194650B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138859A (en) * | 2019-05-16 | 2019-08-16 | 广州温芯云科技有限公司 | A kind of body temperature real-time monitoring system based on Internet of Things body temperature patch |
CN110519232A (en) * | 2019-07-30 | 2019-11-29 | 裴小根 | The remote encryption transmission system of file based on Android OS two-dimensional symmetric Encryption Algorithm |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030018791A1 (en) * | 2001-07-18 | 2003-01-23 | Chia-Chi Feng | System and method for electronic file transmission |
CN104573551A (en) * | 2014-12-25 | 2015-04-29 | 广东欧珀移动通信有限公司 | File processing method and mobile terminal |
CN106817377A (en) * | 2017-03-27 | 2017-06-09 | 努比亚技术有限公司 | A kind of data encryption device, decryption device and method |
US20180159833A1 (en) * | 2015-05-13 | 2018-06-07 | Alibaba Group Holding Limited | Method and apparatus for securing communications using multiple encryption keys |
-
2018
- 2018-09-03 CN CN201811020777.9A patent/CN109194650B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030018791A1 (en) * | 2001-07-18 | 2003-01-23 | Chia-Chi Feng | System and method for electronic file transmission |
CN104573551A (en) * | 2014-12-25 | 2015-04-29 | 广东欧珀移动通信有限公司 | File processing method and mobile terminal |
US20180159833A1 (en) * | 2015-05-13 | 2018-06-07 | Alibaba Group Holding Limited | Method and apparatus for securing communications using multiple encryption keys |
CN106817377A (en) * | 2017-03-27 | 2017-06-09 | 努比亚技术有限公司 | A kind of data encryption device, decryption device and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138859A (en) * | 2019-05-16 | 2019-08-16 | 广州温芯云科技有限公司 | A kind of body temperature real-time monitoring system based on Internet of Things body temperature patch |
CN110519232A (en) * | 2019-07-30 | 2019-11-29 | 裴小根 | The remote encryption transmission system of file based on Android OS two-dimensional symmetric Encryption Algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN109194650B (en) | 2022-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104023013B (en) | Data transmission method, server side and client | |
US5638448A (en) | Network with secure communications sessions | |
Khan et al. | Security in cloud computing using cryptographic algorithms | |
US6292895B1 (en) | Public key cryptosystem with roaming user capability | |
US8345875B2 (en) | System and method of creating and sending broadcast and multicast data | |
CN107708112A (en) | A kind of encryption method suitable for MQTT SN agreements | |
CN102088441B (en) | Data encryption transmission method and system for message-oriented middleware | |
CN108347419A (en) | Data transmission method and device | |
CN102780698A (en) | User terminal safety communication method in platform of Internet of Things | |
CN109951513B (en) | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card | |
Hwang et al. | Two attacks on Neuman—Stubblebine authentication protocols | |
WO2009024647A1 (en) | Secure transfer of information | |
JPH07325785A (en) | Network user identifying method, ciphering communication method, application client and server | |
CN114244508B (en) | Data encryption method, device, equipment and storage medium | |
CN102088352B (en) | Data encryption transmission method and system for message-oriented middleware | |
CN107210915A (en) | It is mutually authenticated | |
CN112202773B (en) | Computer network information security monitoring and protection system based on internet | |
CN109194650A (en) | Encrypted transmission method based on the remote encryption transmission system of file | |
JPH0969831A (en) | Cipher communication system | |
CN111698203A (en) | Cloud data encryption method | |
Ren et al. | Toward efficient and secure deep packet inspection for outsourced middlebox | |
CN103986640A (en) | Instant messaging method and system capable of guaranteeing safety of user communication content | |
Prabhu et al. | Security in computer networks and distributed systems | |
CN115150076A (en) | Encryption system and method based on quantum random number | |
CN105791301A (en) | Key distribution management method with information and key separated for multiple user groups |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220201 |
|
CF01 | Termination of patent right due to non-payment of annual fee |