[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109194650A - Encrypted transmission method based on the remote encryption transmission system of file - Google Patents

Encrypted transmission method based on the remote encryption transmission system of file Download PDF

Info

Publication number
CN109194650A
CN109194650A CN201811020777.9A CN201811020777A CN109194650A CN 109194650 A CN109194650 A CN 109194650A CN 201811020777 A CN201811020777 A CN 201811020777A CN 109194650 A CN109194650 A CN 109194650A
Authority
CN
China
Prior art keywords
file
user
server
byte
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811020777.9A
Other languages
Chinese (zh)
Other versions
CN109194650B (en
Inventor
裴小根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811020777.9A priority Critical patent/CN109194650B/en
Publication of CN109194650A publication Critical patent/CN109194650A/en
Application granted granted Critical
Publication of CN109194650B publication Critical patent/CN109194650B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to encryption technology fields, and in particular, to a kind of encrypted transmission method based on the remote encryption transmission system of file, the remote encryption transmission system of file includes client, for registering, logging in, Batch sending and receive file;File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents malicious attack, code key management and management interface service;After user's registration, only it is to be understood that the account number of other side can mutually send file by outer net, file can automatic encrypting and decrypting when sending and receiving, it does not need user and carries out any encryption and decryption operation, Batch sending and batch is supported to receive, the data that can be transmitted again to user while easy to operate escort, and preferably solve the problems, such as to carry out remote file security transmission using Android system.

Description

Encrypted transmission method based on the remote encryption transmission system of file
Technical field:
The present invention relates to encryption technology fields, and in particular, to a kind of adding based on the remote encryption transmission system of file Close transmission method.
Background technique:
For confidential information in ancient war, simple transformation usually is made to communications content, cryptographic technique is as guarantee letter The core technology of breath safety is being used widely very early.Cryptography is fashionable forever in the means of assuring data security Topic.The symmetric cryptography of caesar cipher till now before for a long time, then arrive asymmetric cryptography and the threshold cryptography in future Technology, cryptography have immeasurable value in continuous development and perfect.In life, no matter everybody is office or learns It practises, we always need to send and receive various files, have many file transfer conveyances at present, for example Tencent QQ is soft Part.The file transmitting function of Tencent QQ software is very convenient, but is not encryption by the file of Tencent QQ software transmission , when file may cause unnecessary loss by malicious intercepted to us.Certainly, we can first add file It is close, the file of this encryption is retransmited, the risk of leakage of data is reduced, but other side is needed to know that password, password are being transmitted across Risk is equally existed in journey, and the process of encrypting and decrypting is also comparatively laborious, be also unfavorable for more than the file we to password into Row management.
Summary of the invention:
The present invention overcomes the deficiencies of existing technologies, and provides a kind of encrypted transmission based on the remote encryption transmission system of file Method.
The technical problems to be solved by the invention are implemented with the following technical solutions: one kind encrypting biography based on file at a distance The encrypted transmission method of defeated system, the remote encryption transmission system of file include
Client, for registering, logging in, Batch sending and receive file;
File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents from disliking Meaning attack, code key management and management interface service;
Management server for audit function, La Hei and is forced offline;
The encrypted transmission method includes:
(1) client of user A can read file to byte byte arrays, using symmetrical during reading to array Encryption Algorithm is encrypted, and is encrypted each byte using the device number of user A, is subsequently sent to server;
(2) server receives the ciphertext that user A is sent, and the file of server corresponding account is arrived in storage, and A is sent File size, name, be saved in the path of server and recipient's storage of this document to database Send table;
(3) user B request receives file, and server has received instruction, and ergodic data library Send table, inquire-receive person The data for being the account number of user B, and not receiving, by the filename, file size, file path, the hair that find record The information such as the person of sending find the file that user A is sent to user B, and this ciphertext are read byte arrays, complete file encryption Transmission.
Preferably, the client and file server are to be completed user's registration, login and file based on C/S model and passed Defeated service, the system administration services are to be based on B/S mode, are same data used in file server and management server Library, and in file server there are interface, file server forces user offline according to the certain states of database and adds user Enter blacklist, administrator makes the state of the management server modification certain values of database via web page operation, controls file server User is made and forces offline and draws black.
Preferably, in the step (3), each byte of server ciphertext passes through symmetric encipherment algorithm and user first The key of A is reduced into the original text byte of A transmission, then original text byte is encrypted to using symmetric encipherment algorithm by the key of B close Text, the key of the ciphertext are the device number of B, and after B receives file, client reads the device number of user B, and utilization is identical The file received is decrypted in symmetric encipherment algorithm.
Preferably, the symmetric cryptography code key of symmetric encipherment algorithm is Android mobile phone device number, the symmetric encipherment algorithm packet It includes:
1) file is read to memory, is stored in byte arrays;
2) cell phone apparatus number is read, is stored to key array, key array length is fixed as 15, is the length of device number Degree;
3) byte arrays are traversed, first element of first element of byte arrays and code key array is subjected to XOR operation, Second element of second element of byte arrays and code key array is subjected to XOR operation, byte arrays the 15th byte and code key The 15th element of array carries out XOR operation, then first element exclusive or of the 16th bit element of byte arrays and code key array is transported It calculates, the new byte value obtained after each operation is sent to server, in cycles.
Compared with prior art, the application has the beneficial effect that provided by the present application a kind of encrypt at a distance based on file The encrypted transmission method of Transmission system, after user's registration, only it is to be understood that the account number of other side can mutually be sent by outer net File, file when sending and receiving can automatic encrypting and decrypting, do not need user and carry out any encryption and decryption operation, support batch It sends and batch receives, the data that can be transmitted again to user while easy to operate escort, and preferably solve use Android system carries out the problem of remote file security transmission.
Specific embodiment:
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, tie below Specific embodiment is closed, the present invention is furture elucidated.
A kind of encrypted transmission method based on the remote encryption transmission system of file, the remote encrypted transmission system of file System include client, for registering, logging in, Batch sending and receive file;
File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents from disliking Meaning attack, code key management and management interface service;
Management server for audit function, La Hei and is forced offline;
The encrypted transmission method includes:
(1) client of user A can read file to byte byte arrays, using symmetrical during reading to array Encryption Algorithm is encrypted, and is encrypted each byte using the device number of user A, is subsequently sent to server;
(2) server receives the ciphertext that user A is sent, and the file of server corresponding account is arrived in storage, and A is sent File size, name, be saved in the path of server and recipient's storage of this document to database Send table;
(3) user B request receives file, and server has received instruction, and ergodic data library Send table, inquire-receive person The data for being the account number of user B, and not receiving, by the filename, file size, file path, the hair that find record The information such as the person of sending find the file that user A is sent to user B, and this ciphertext are read byte arrays, complete file encryption Transmission.
Preferably, the client and file server are to be completed user's registration, login and file based on C/S model and passed Defeated service, the system administration services are to be based on B/S mode, are same data used in file server and management server Library, and in file server there are interface, file server forces user offline according to the certain states of database and adds user Enter blacklist, administrator makes the state of the management server modification certain values of database via web page operation, controls file server User is made and forces offline and draws black.
Preferably, in the step (3), each byte of server ciphertext passes through symmetric encipherment algorithm and user first The key of A is reduced into the original text byte of A transmission, then original text byte is encrypted to using symmetric encipherment algorithm by the key of B close Text, the key of the ciphertext are the device number of B, and after B receives file, client reads the device number of user B, and utilization is identical The file received is decrypted in symmetric encipherment algorithm.
In order to improve file transmission efficiency, this system does not use ready-made symmetric encipherment algorithm, such as DES, 3DES etc., A but innovative customized symmetric encipherment algorithm: the characteristic of XOR operation (^), a several exclusive or number two are based on It is secondary, as a result or this number itself.Such as: X^Y^X=X.System is using Android mobile phone device number as symmetric cryptographic key, Android " the electronics string number " that handset serial is made of 15 bit digitals, it is corresponded with every mobile phone.Device number is made For the key of symmetric cryptography, when transmitting file, device number not will do it transmission, if wanting Brute Force, enumeration result has 10 15 power kinds as a result, even the light in martial prowess Taihu Lake also takes 92 days with the calculating of the peak velocities of 12.54 hundred million hundred million times/second, be used for It encrypts fool proof.Algorithm main working process is as follows:
1) file is read to memory, is stored in byte arrays byte [];
2) cell phone apparatus number is read, is stored to key array pwd [], key array length is fixed as 15, that is, sets Standby number length;
3) byte arrays are traversed, first element of first element of byte [] and pwd [] is subjected to XOR operation, it will Second element of second element of byte [] and pwd [] carries out XOR operation, the 15th byte of byte [] and pwd [] the 15th Element carries out XOR operation, then by first element XOR operation of the 16th bit element of byte [] and pwd [], after each operation Obtained new byte value is sent to server, in cycles.The customized symmetric encipherment algorithm source code that system uses:
In the application, also disclose a kind of asymmetric encryption RSA Algorithm, account number when being mainly used for registering customers as and should Server end is sent to after the encryption of user mobile phone device number.
What RSA Algorithm used is the problem that mathematically big number decomposes, as long as private key digit is sufficiently large, even with public key It can not calculate that private key, private key are just fool proof at 1024.Main process is:
(1) two Big primes p and q are generated at random, n=p*q are taken, if k=(p-1) * (q-1);
(2) an arbitrary positive integer e is taken, it is desired to meet e and k prime number and e < k each other;
(3) meet d*e%t=1, and calculate d;
(4) it respectively obtains by the above process: n, d, e;
(5) original text M (M < n) is set;
(6) it encrypts: obtaining ciphertext c after c=(M*d) %n operation;
(7) decrypt: M=(c*e) %n obtains original text M.
{ n, e } is used as public key, { n, d } is used as private key, is encrypted using public key to data, only corresponding private key ability It is decrypted, vice versa.Rivest, shamir, adelman has the following characteristics that key is made of a public key and a private key;It is public Key can be disclosed to be known by owner;Private key only has owner all, and all other men are unable to get;The data of public key encryption only have Corresponding private key could decrypt.The source code of RSA Algorithm:
In the application, system is made of a client and two servers, server be divided into Ftp server and System management server is two completely different programs.Client and file server are to complete user based on C/S model Registration, login and file encryption transfer function;System administration services are to be designed based on B/S mode exclusively for administrator, are provided The function of audit and system administration.Because being same database used in file server and management server, and in text There are interface, file server can be accomplished to force to allow according to the certain states of database user offline and to be added user part server Enter the function of blacklist, so administrator directly passes through web page operation and can make the shape of the management server modification certain values of database State forces offline and draws black equal operation to can control file server and make to user.
In the application, the design of client is mainly made of two interfaces, and one is login interface, another is to log in Interface after success.There are three buttons for login interface: obtaining identifying code, login, registration;And including two input frames: one It is input account number, another is input identifying code.If user did not register, account number is just inputted, registration is then clicked, is System will be automatically performed registering functional: the account number of user and device number encrypted transmission to server, and be saved in server data Library.If user's registration mistake, account number is inputted, then clicks and obtains identifying code, temporary login password will be sent to by server Mailbox account number corresponding to user account number, because user account number is exactly QQ number, and QQ number has just been opened freely automatically in registration QQ mailbox service.After user views temporary login password and successfully log in from mailbox, main interface will be entered. Main interface is by one for showing that the console of information, recipient's account number input frame, a file send progress bar and hair It send file, receive the buttons such as file, transmission list composition.As long as user inputs the account number of other side in recipient's account number input frame, It clicks and sends, the All Files in the Sendding file under program folder will be sent to the account number of recipient.Only It wants other side to register in this system, when he logs in, clicks and receive file, all others can be downloaded to the text of his transmission Part.File download also has progress bar and shows, the file that success is downloaded can be saved under the file where program Under Received subdirectory.The process sent and received no longer needs to do any operation, and file is transferred to server and from server Locally downloading process is entirely encryption.
In the application, file server is wanted to provide service simultaneously for multiple users, each user registration, login, Each process sent files and received files be it is independent, not will receive others' influence;File server needs simultaneously Stability powerful enough because user may in any one process unexpected interrupt operation or abnormal operation, for example use Family does not input for a long time after server sends login authentication code or long-time is without operation after the login, still Connection is not turned off again, can waste server resource in this way, so in design document server, it is necessary in view of these are asked Topic cannot cause whole system to collapse because of the abnormal operation of any one of user or illegal user.File server Need to provide the services such as registration, mailbox identifying code, login, file transmission.Possess key management and Account Administration function, needs Powerful journal function can record to be which IP address from what port numbers access server and carried out which in which period Operation;It needs to record simultaneously, what file had sent to which user at what time by which user.Can file to user into Row management provides the functions such as batch is downloaded and batch uploads;Needing simultaneously prevents malicious intrusions function, for example illegal visitor is simultaneously It is not to be interacted by client and server, at this point, server needs to carry out illegal invasion label to these malice visitor; File server does not allow the same account number to log in multiple places simultaneously, when account number is online, at other Anywhere with regard to nothing Method is again coupled to server.File server is pure java programming, and management server is web program, in order to allow Management server controls file server, so file server is needed there are interface, by database as medium, and management Server is communicated.
In the application, in this system, management function is individually come out and is made into a web program, realized based on B/S mode, As long as having network environment, and a browser can be managed file server, it is not limited to be which platform or What equipment.Management server needs function to be offered to have audit function, subscriber management function.Audit function, according to file The log of server record, energy supervisory control system running state, it can be seen which user is online, which user is in which time hair How many file sent or had received.It can check which operation is the IP address for accessing server carried out, can control file clothes Business device is forced offline by some online user.
In the application, file server has barrier layer by layer, protects user file, and has more complicated interaction association View, will not easily be found out by invader.Program can open text service in port numbers 19951 when starting and monitor, dedicated for The exchange of language, including need registration service, login service, send file or receive file service when all in advance from this end Slogan sends an instruction to server;Port numbers 19952 are that file sends serve port, when user needs to send file, just It is to pass data to server by this port numbers;19953 port numbers are dedicated for sending file service, when server connects When receiving the instruction of client request reception file, server can send the file to request user by this port numbers; 19954 port numbers are that service is monitored in heartbeat, this port numbers can will receive a data from client every 15 seconds, if three Secondary to be not received by, server just will be considered that client has left, and just will disconnect all connections with this client, release clothes Business device resource.
In the application, when some user requests registration service, server will use RSA rivest, shamir, adelman, raw Public key is transferred to client by public key and private key in a pair, the public key that client is given using server by account number and device number into Ciphertext, is then passed back server by row encryption, and private key is decrypted server by utilizing just now, obtains user data, in this way, service Device just may be useful for the account number and key at family, and all user account numbers and device number can be all saved in the User table of database.And The key of user is exactly device number, will not be lost.QQ number and IMEI number binding, carry out normal communication by QQ number.Such case, Even account number logs in other equipment, the file of the user has been downloaded, equally can not also have been parsed, because without correct IMEI number i.e. key pair ciphertext are decrypted.And for a user, if file reaches correct destination, client End can directly read IMEI code and ciphertext is decrypted, and the file that user sees is exactly original text, do other operations without user, Click send file or receive file can, it is easy to operate.
In the application, when user A will to user B send file, if user A and user B not in same local area network, that Can not direct communication, so needing file server as intermediary.File server, which operates in, possesses independent IP On the server of address, A can and server communication, B also can and server communication.So user A sends file to user B Process, which is A in fact, sends file to server, and server knows that this document is the file that A is sent to B after receiving file, when with After family B is logged in, request receives file, then the file that server can be sent to A B is transferred to user B.Only it is only completed outer net The function of transmission does not achieve the purpose that this system, most importantly encrypted transmission.Encrypted transmission process is as follows:
User A sends file to user B, firstly, the client of user A can read file to byte byte arrays, reads It takes the process to array just to will use the symmetric encipherment algorithm from wound, each byte is encrypted using the device number of A, is then sent out It is sent to server.It is ciphertext that user A is sent that server is received, can store the file of server corresponding account, and The recipient of file size, the name that A is sent, the path and this document that are saved in server stores to database Send Table, this completes the processes for sending file.The process that user's A file is transferred to server is entirely encryption, even if by Others intercepts, and interceptor is at a complete loss as to what to do without key.File is successfully sent to after file server, and storage is on the server Form remain ciphertext, user B request receives file, and server has received instruction, will ergodic data library Send table, look into Ask recipient's data for being the account number of user B, and not receiving, then by find the filename of record, file size, The information such as file path, sender find the file that user A is sent to user B, this ciphertext are then read byte number Group, because user A and user B just arrives the key storage of the device number of oneself i.e. symmetric cryptography when registration Server User table, so during reading, each byte of server ciphertext pass through first symmetric encipherment algorithm and The key of user A, is reduced into the original text byte of A transmission, then original text byte is encrypted by the key of B using symmetric encipherment algorithm At ciphertext, the key of this ciphertext is exactly the device number of B, and after B receives file, client can read the device number of user B, The file received is decrypted using identical symmetric encipherment algorithm.
When user transmits file, after user logs in, the account number of recipient is had input, clicks and sends file, it is in fact first An instruction can be first sent to server, indicate that this client needs to send file.The instruction of transmission on the way is also to add completely Close, what is utilized is the symmetric encipherment algorithm of innovation, identical with the mode of encryption file.After this instruction reaches server, clothes Business device can be directly decrypted using the corresponding key pair instruction of active user, if the data decrypted meet format, just One state of client is returned, indicates that server all set receives file.The format of this instruction is exactly: " S recipient's account number The name for receiving file receives the size S " of file.If the data decrypted are not right, indicate that active user is illegal user, directly Connect its connection of disconnection.
Basic principles and main features and the features of the present invention of the invention have been shown and described above.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes Change and improvement is both fallen in the range of claimed invention.The scope of protection of present invention is by appended claims And its equivalent thereof.

Claims (4)

1. a kind of encrypted transmission method based on the remote encryption transmission system of file, which is characterized in that the file is remote Encryption transmission system includes
Client, for registering, logging in, Batch sending and receive file;
File server for file transfer services, subscriber management service, heartbeat detection function, journal function, prevents malice from attacking It hits, code key management and management interface service;
Management server for audit function, La Hei and is forced offline;
The encrypted transmission method includes:
(1) client of user A can read file to byte byte arrays, use symmetric cryptography during reading to array Algorithm is encrypted, and is encrypted each byte using the device number of user A, is subsequently sent to server;
(2) server receives the ciphertext that user A is sent, and the file of server corresponding account, and the text that A is sent are arrived in storage The recipient of part size, name, the path and this document that are saved in server stores to database Send table;
(3) user B request receives file, and server has received instruction, and ergodic data library Send table, and inquire-receive person is to use The account number of family B, and the data not received, by the filename, file size, the file path, sender that find record Etc. information, find the file that user A is sent to user B, and this ciphertext is read byte arrays, complete file encryption and pass It is defeated.
2. the encrypted transmission method based on the remote encryption transmission system of file according to claim 1, feature It is, the client and file server are to complete user's registration, login and file transfer services based on C/S model, described System administration services are to be based on B/S mode, are same databases used in file server and management server, and are taken in file Device be engaged in there are interface, file server forces user offline according to the certain states of database and blacklist is added in user, manages Member makes the state of the management server modification certain values of database via web page operation, and control file server makes pressure to user Offline and drawing is black.
3. the encrypted transmission method based on the remote encryption transmission system of file according to claim 1, feature It is, in the step (3), each byte of server ciphertext passes through the key of symmetric encipherment algorithm and user A first, also The original text byte that original is sent at A, then original text byte is encrypted to ciphertext using symmetric encipherment algorithm by the key of B, the ciphertext Key be B device number, when B receive file after, client read user B device number, utilize identical symmetric cryptography The file received is decrypted in algorithm.
4. the encrypted transmission method based on the remote encryption transmission system of file according to claim 3, feature It is, the symmetric cryptography code key of symmetric encipherment algorithm is Android mobile phone device number, and the symmetric encipherment algorithm includes:
1) file is read to memory, is stored in byte arrays;
2) cell phone apparatus number is read, is stored to key array, key array length is fixed as 15, is the length of device number;
3) byte arrays are traversed, first element of first element of byte arrays and code key array are subjected to XOR operation, by word Second element of second element of joint number group and code key array carries out XOR operation, the 15th byte of byte arrays and code key array 15th element carries out XOR operation, then by first element XOR operation of the 16th bit element of byte arrays and code key array, will The new byte value obtained after each operation is sent to server.
CN201811020777.9A 2018-09-03 2018-09-03 Encryption transmission method based on file remote encryption transmission system Expired - Fee Related CN109194650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811020777.9A CN109194650B (en) 2018-09-03 2018-09-03 Encryption transmission method based on file remote encryption transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811020777.9A CN109194650B (en) 2018-09-03 2018-09-03 Encryption transmission method based on file remote encryption transmission system

Publications (2)

Publication Number Publication Date
CN109194650A true CN109194650A (en) 2019-01-11
CN109194650B CN109194650B (en) 2022-02-01

Family

ID=64912114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811020777.9A Expired - Fee Related CN109194650B (en) 2018-09-03 2018-09-03 Encryption transmission method based on file remote encryption transmission system

Country Status (1)

Country Link
CN (1) CN109194650B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138859A (en) * 2019-05-16 2019-08-16 广州温芯云科技有限公司 A kind of body temperature real-time monitoring system based on Internet of Things body temperature patch
CN110519232A (en) * 2019-07-30 2019-11-29 裴小根 The remote encryption transmission system of file based on Android OS two-dimensional symmetric Encryption Algorithm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018791A1 (en) * 2001-07-18 2003-01-23 Chia-Chi Feng System and method for electronic file transmission
CN104573551A (en) * 2014-12-25 2015-04-29 广东欧珀移动通信有限公司 File processing method and mobile terminal
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method
US20180159833A1 (en) * 2015-05-13 2018-06-07 Alibaba Group Holding Limited Method and apparatus for securing communications using multiple encryption keys

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030018791A1 (en) * 2001-07-18 2003-01-23 Chia-Chi Feng System and method for electronic file transmission
CN104573551A (en) * 2014-12-25 2015-04-29 广东欧珀移动通信有限公司 File processing method and mobile terminal
US20180159833A1 (en) * 2015-05-13 2018-06-07 Alibaba Group Holding Limited Method and apparatus for securing communications using multiple encryption keys
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138859A (en) * 2019-05-16 2019-08-16 广州温芯云科技有限公司 A kind of body temperature real-time monitoring system based on Internet of Things body temperature patch
CN110519232A (en) * 2019-07-30 2019-11-29 裴小根 The remote encryption transmission system of file based on Android OS two-dimensional symmetric Encryption Algorithm

Also Published As

Publication number Publication date
CN109194650B (en) 2022-02-01

Similar Documents

Publication Publication Date Title
CN104023013B (en) Data transmission method, server side and client
US5638448A (en) Network with secure communications sessions
Khan et al. Security in cloud computing using cryptographic algorithms
US6292895B1 (en) Public key cryptosystem with roaming user capability
US8345875B2 (en) System and method of creating and sending broadcast and multicast data
CN107708112A (en) A kind of encryption method suitable for MQTT SN agreements
CN102088441B (en) Data encryption transmission method and system for message-oriented middleware
CN108347419A (en) Data transmission method and device
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
Hwang et al. Two attacks on Neuman—Stubblebine authentication protocols
WO2009024647A1 (en) Secure transfer of information
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
CN114244508B (en) Data encryption method, device, equipment and storage medium
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN107210915A (en) It is mutually authenticated
CN112202773B (en) Computer network information security monitoring and protection system based on internet
CN109194650A (en) Encrypted transmission method based on the remote encryption transmission system of file
JPH0969831A (en) Cipher communication system
CN111698203A (en) Cloud data encryption method
Ren et al. Toward efficient and secure deep packet inspection for outsourced middlebox
CN103986640A (en) Instant messaging method and system capable of guaranteeing safety of user communication content
Prabhu et al. Security in computer networks and distributed systems
CN115150076A (en) Encryption system and method based on quantum random number
CN105791301A (en) Key distribution management method with information and key separated for multiple user groups

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220201

CF01 Termination of patent right due to non-payment of annual fee