[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2010145162A1 - File transfer method and system - Google Patents

File transfer method and system Download PDF

Info

Publication number
WO2010145162A1
WO2010145162A1 PCT/CN2009/075924 CN2009075924W WO2010145162A1 WO 2010145162 A1 WO2010145162 A1 WO 2010145162A1 CN 2009075924 W CN2009075924 W CN 2009075924W WO 2010145162 A1 WO2010145162 A1 WO 2010145162A1
Authority
WO
WIPO (PCT)
Prior art keywords
sheep
file
communication
new
generation
Prior art date
Application number
PCT/CN2009/075924
Other languages
French (fr)
Chinese (zh)
Inventor
康望星
施元庆
刘家兵
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010145162A1 publication Critical patent/WO2010145162A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • WA is a security solution for identity and management.
  • 1 is a security solution for use, including , , and so on.
  • the typical W system consists mainly of Hugh (he c o E ), A he c o S pp c E (A), and He c o Se VceE (A).
  • Hugh is the rest of the operation before the connection
  • the TA (TA o , ) ie, the terminal
  • the terminal rests on the premise of the identity for the identity operation, and resides in ( ccess o , connect ) or TA
  • each of the rest and rest is provided by the rest of the sheep ( hhe ca o Se Vce , A ) (also
  • Terminal connection first need 802.11, terminal W identity and management, with the completion of the same terminal identity identity, terminal
  • This document provides the God document method and system, which solves the problem of improving the security of the document and overcoming the existing wood.
  • the upper method includes a step-by-step update in the step of receiving the file in the direction, wherein
  • the updated steps include
  • Steps to update the line the method includes
  • the new S file receives the new file and receives the new new file.
  • the line solution is where 9 is less than P.
  • the method includes: the W terminal is generated in the following manner
  • the method includes the method of generating and receiving
  • the method includes including encapsulating the
  • the method includes the recipient's root using the file line solution encapsulated in the new file.
  • the present invention provides a second communication of the communication system and the processing of the force file
  • the first communication includes a first generated sheep, a sheep, and a first communication sheep.
  • the second communication includes a second generated sheep, a file sheep, and a second communication sheep.
  • the first generated sheep generates sy
  • the second generation sheep generates x
  • the value of the PX and the second communication is communicated to the second sheep communication
  • the first generation of the sheep in the first communication sheep receives the PX and the second communication , the second communication
  • the second generation of the sheep is received in the second communication sheep and the first communication
  • the first communication and the second communication are pre- 9, the first communication and the second communication are less than P in advance.
  • the first generation of the sheep is used to generate a new 9, new PY g mo ), and the value of PY and the first communication is communicated to the second communication.
  • the second generation sheep is used recently to generate a new 9, new X g mod ), the value of the X and the second communication is passed to the second communication sheep.
  • the first generation of the sheep in the first communication sheep receives the X and the second communication , the second communication
  • the second generating sheep is in the second communication sheep receiving the Y and the first communication , the first communication
  • the first communication includes WA sheep.
  • the first generation of the sheep will be the plain WA sheep, and receive the WA sheep return
  • the second WA sheep uses the second communication of W Private plaintext or plaintext, generated
  • bits are less than the bits.
  • the file sheep receives the unfiled file of the new file, and encapsulates the file in the file.
  • the communication sheep receives it, and the file contains the new secret that has been used.
  • the file sheep near the second communication sheep received the file, using the new packaged file line solution.
  • the e-e ma algorithm is used in front of the file, and the line density is combined with the non-line density, which improves the security of the file, and in the other way, the security of the file is improved, and in the file, Update the row-critical update of the e-e ma algorithm to reduce the purpose of the update with a small amount.
  • 3 is a schematic diagram of the file system provided by this mediation. Preferred way of the present
  • the idea is to use the e-e m algorithm in front of the file and combine it with the line density to improve the security of the file.
  • terminal A is a file method provided by the present mode.
  • the file (terminal A) and file receiving (terminal B) are both WA terminal, WA 1 stored in terminal A and terminal B, and the method is Including the next steps
  • the file, terminal A and terminal B can be generated in the file.
  • P is usually large, so the P e- e m algorithm can be used instead of the 90 e- e m algorithm.
  • Terminal B can generate the interface generated by the WA sheep of the terminal. 102 Terminal B to Terminal A
  • the text contains etc., as well as the terminal B PX and so on.
  • Terminal B can generate the generated interface provided by the WA sheep of the terminal, that is, the PX is used as the plaintext WA sheep, and the WA sheep uses the plaintext generation of the WAP of the terminal B (the terminal B). .
  • W sheep can also get the plain text first, using the terminal B's.
  • terminal A terminal B success, generate sy, PY g mod) get
  • terminal A can also generate the interface sy of the generation interface provided by the terminal WA sheep.
  • Terminal A can provide the interface terminal B of the terminal WA sheep, that is, the plaintext contained in the text and
  • W sheep Use the terminal of the bus of the terminal B (the terminal B's public) to solve the result, and compare the plain text or the plain text.
  • the text contains etc., as well as the terminal A PY and so on.
  • Terminal A can be generated by the generation interface provided by WA Sheep. 105 received, terminal B terminal A, success, get PY) xmo )
  • terminal A and terminal B get the same (below).
  • Terminal A receives the file, divides the file into multiple files, and uses each file to encapsulate each confidential file in the file.
  • File encapsulation 2 including the file republic file section.
  • File contains file, file length, file
  • the length of the file is the length of the file, the length of the file is fixed, 10 files may not be included, and the length can be from terminal A and terminal B.
  • the file can be divided into files in the file, and terminal A can pre-position terminal B.
  • terminal B After receiving the file, terminal B uses the ciphertext 15 line solution contained in it to get the original text of the file.
  • Terminal A and terminal B can perform step 107 108 until the file.
  • the security of the step-by-step file, the terminal A and the terminal B can be close to the next step.
  • terminal A can stop file 20, extract bits (for example, bits with less than the first bit) force new (9g ⁇ P), regenerate PY g mod P), will be included in the update Terminal B
  • the terminal A PY is included.
  • Terminal B receives the update, terminal A, , update in the same way, regenerate X gxmo ) and PY) xmodP)
  • Terminal B PX is included in the update terminal A
  • the above update includes X, and includes the terminal BX and so on.
  • terminal A uses the new file
  • terminal B also receives the new file line solution.
  • the first communication and the second communication in 3 are file and receive communication, respectively, and the second communication may be a WA-enabled terminal and/or a terminal, or a terminal and a terminal, or a respectively.
  • the first generation of sheep produces an easygoing sy, PY y
  • the second generation sheep generates x, PX gs m ), PX and the value of the second communication pass the second communication sheep communication
  • the first generation of the sheep is close to the first communication in the first communication sheep receiving the PX and the second communication
  • the second generation of the sheep is close to the second communication sheep receiving the PY and the first communication, the first communication, the success,
  • the file sheep received the secret file in the second communication sheep.
  • the first generated sheep is used near the root to generate a new 9, new PY g mod ), and the value of PY and the first communication is communicated to the second communication.
  • the second generation sheep is used near the root to generate new
  • the first generation of the sheep is close to the first communication in the communication sheep, the second communication, the success, the new
  • the first communication has a WA sheep second communication near the second WA sheep
  • the first generation of the sheep will be the plain WA sheep, and receive the WA sheep return
  • WA sheep uses the private plaintext or plaintext of the communication WA, generated, will return to the first generation sheep
  • the second generation of the sheep will be the second WA sheep in the plaintext, and receive the second WA sheep back.
  • the second WA sheep uses the second communication of the WA's private plaintext or plaintext, generated, and will return to the second generation sheep.
  • the file is encapsulated in the file.
  • the communication sheep receives the file containing the new secret.
  • the second communication sheep receives the file and uses the new packaged file line solution.
  • This method provides the God file method and system.
  • the e- em algorithm is used before the file, and the line density is combined with the non-line density.
  • the security of the file is improved, and in addition, the security of the file is improved in the file.
  • the e-em algorithm updates the line-density update, with a smaller amount of calculation for the purpose of the update.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a file transfer method and system so as to enhance the security of the file transfer. The transfer method includes: a sender calculates the temporary public key PY0 = go sy (mod P); a receiver calculates the temporary public key PX0 = g0 sx (mod P); the sender and receiver exchange their temporary public keys and signatures; the sender calculates (PX0) sy (mod P) and defines it as the key USK after verifying the signature value of the receiver; the receiver calculates (PY0) sx (mod P) and defines it as the key USK after verifying the signature value of the sender; the sender uses the key USK to encrypt the file block of the file to be sent and sends it to the receiver; the receiver uses the key USK to decrypt the received encrypted file block.

Description

神文件 方法及 統  God file method and system
木領域 Wood field
本 涉及 同 (W eess oca Aea ewok , W A 領域 尤其涉及 神文件 方法及 統。  This is related to (W eess oca Aea ewok, W A field especially involves God file methods and systems.
背景 木 Background
保密 ( W eess oca ea ewok . . .  Confidential (W eess oca ea ewok . . .
A h 、A h ,
e c o dP vacy as c e, W ) 以 ( s e oEec ca dEec o csE g ee s, 和屯子工程 ) 802.11  e c o dP vacy as c e, W ) to ( s e oEec ca dEec o csE g ee s, and electronic engineering) 802.11
的元 安全 。 W 由 部分 WA (  Meta security. W by part of WA (
A he ca o as c e, )和 ( A vacy as c e, 保密 ) 。 其中, WA是用于 身 份 和 管理的安全方案 1是用于 的安全 方案, 包括 、 和 等功能。 A he ca o as c e, ) and ( A vacy as c e, confidentiality). Among them, WA is a security solution for identity and management. 1 is a security solution for use, including , , and so on.
典型的W 統主要由 休 ( he c o E , ) 、 者 休 (A he c o S pp c E , A ) 以及 各 休 ( he c o Se VceE , A )組成。 其中, 者 休是在接 岡 前 操作的 休,駐留在 TA( TA o , ) (即終端) 休 于 者 休在接 岡 前提 供身份 操作, 般駐留在 ( ccess o , 接 )或 TA  The typical W system consists mainly of Hugh (he c o E ), A he c o S pp c E (A), and He c o Se VceE (A). Among them, Hugh is the rest of the operation before the connection, and the TA (TA o , ) (ie, the terminal) rests on the premise of the identity for the identity operation, and resides in ( ccess o , connect ) or TA
各 休 于 休和 者 休提供 別的 各, 般駐 留在 各羊 ( hhe ca o Se Vce , A ) (也可以  Each of the rest and rest is provided by the rest of the sheep ( hhe ca o Se Vce , A ) (also
各 ) 中。 Each).
終端接 , 首先需要 802.11 的 , 終端的W 身份 和 管理 , 配合 各 完成 終端 同的 向身份 身份 , 終端  Terminal connection, first need 802.11, terminal W identity and management, with the completion of the same terminal identity identity, terminal
, 使用 出的 終端提供 于 1的 和解 各。 在 中, 文件共享是非常重要的 , 但現有的 文件的 都存在安全上的漏洞, 文件都以明文方式 , 者可以任意 、 的 以及文件內容。 在具有W A 接 能力的終端上, WA 只能 在接 部分 ( ) 的安全性, 文件 等 並各不能 到 作用。 , using the terminal provided by the 1 settlement each. Among them, file sharing is very important, but there are security vulnerabilities in existing files. The files are in plain text, and can be arbitrary and file content. On a terminal with WA connection capability, WA can only be connected to the part ( ) security, files, etc. and can not be used.
內容  Content
本 提供 神文件 方法及 統, 其所解決的 木 是, 提高文 件 的安全性, 克服現有 木的不足。  This document provides the God document method and system, which solves the problem of improving the security of the document and overcoming the existing wood.
本 提供了 神文件 方法, 方法包括  This document provides the God file method, including
文件的 PY g mod ), 文件的接收 File PY g mod ), file reception
PX g xmod ) , 和 接收 將 算出的 以及  PX g xmod ) , and the reception will be calculated as well
的 算出的PX 以及 接收 的 相交換  Calculated PX and received phase exchange
和 接收 的 , And received ,
PX)ymod ) , 接收 PY)xmod ), 將 算出的 PX)ymod ) 和 PY)Xm d ) 作力密  PX)ymod ) , receiving PY)xmod ), making the calculated PX)ymod ) and PY)Xm d )
將 文件的文件 接 收 以及  Receive the file of the file and
接收 接收到的 密的文件 行解 其中, sy和 x分別 和 接收 生成的  Receiving the received secret file line solution where sy and x are respectively generated by the sum and the received
, 和 接收 預先 的 9 , 和 接收 預先 的小于P的 。  , and receive the advance 9 , and receive the advance less than P .
此外, 上 方法近包括 在所 方向 接收 文件的文 件 的步驟中 行密 更新, 其中,  In addition, the upper method includes a step-by-step update in the step of receiving the file in the direction, wherein
更新的步驟包括  The updated steps include
所迷 和 接收 分別 前使用的 生成新的 9, 分別 新的 PY gymod )和PX gxmo ) 和所述接收 將 算出的 PY以及 的The fascination and reception are used separately before the generation of new 9, respectively, new PY gymod ) and PX gxmo ) And the reception will calculate the PY as well
X以及所述接收 的 相交換  X and the phase exchange of the reception
和接收 的 , 分別 PX) mod ) 和PY)Xmo ), 將 算出的 PX)ymo ) 和 PY)xm ) 作力新的  And received, respectively PX) mod ) and PY) Xmo ), will calculate the PX) ymo ) and PY) xm )
行密 更新的步驟 , 方法近包括  Steps to update the line, the method includes
生成 新的 S , 所述新的 S 文件的未 文件 接收 接收 新的 新的 密的文件 行解 其中, 9小于 P。  Generate a new S, the new S file receives the new file and receives the new new file. The line solution is where 9 is less than P.
此外, 上 方法中, 和 接收 保密 W 終端  In addition, in the above method, and receiving a secure W terminal
方法近包括 所述W 終端 下方式生成  The method includes: the W terminal is generated in the following manner
將 的明文 教友 W 終端的元 The plain text of the church member W terminal
WA 羊 明文 或 明文 的 , 生成 。 此外, 方法近包括 所迷 和 接收 下方式生成所 述  WA sheep plain or plain text, generated. In addition, the method includes the method of generating and receiving
前使用的 中提取 比特作力 新的 g 或  Previously used to extract bit force for new g or
前使用的 生成 ,  Pre-used generation,
中提取 比特作力 新的 9  Extracting bit force new 9
其中, 的比特 小于 的比特 。 ,在所 新的 文件的未 文件 密的步驟 , 方法近包括 將所述 封裝在 中  Where the bits are less than the bits. In the undocumented step of the new file, the method includes including encapsulating the
接收 其中, 文件 的 中包含有已使用 新的 密的 Received, the file contains new ones that have been used Secret
在所 接收 接收到 文件 的步驟 , 方法近包括 所 迷接收方根 使用 新的 文件 文中封裝的 文件 行解 。  In the step of receiving the received file, the method includes the recipient's root using the file line solution encapsulated in the new file.
本 近提供 神文件 統, 統包括作力文件的 的第 通信 和作力文件的接收 的第二通信 其中,  The present invention provides a second communication of the communication system and the processing of the force file,
所述第 通信 中包括 第 生成羊 、 羊 、 第 通 信羊 第二通信 中包括 第二 生成羊 、 文件 羊 、 第 二通信羊  The first communication includes a first generated sheep, a sheep, and a first communication sheep. The second communication includes a second generated sheep, a file sheep, and a second communication sheep.
第 生成羊 生成 sy,  The first generated sheep generates sy,
PY g mod ), 將 和 第 通信 的 值通 第 通 信羊 第二通信 PY g mod ), will communicate with the value of the first communication, the second communication
第二 生成羊 生成 x, The second generation sheep generates x,
Figure imgf000006_0001
), 將 PX 和 第二通信 的 值通 第二 羊 第 通信
Figure imgf000006_0001
), the value of the PX and the second communication is communicated to the second sheep communication
第 生成羊 近 在 第 通信羊 接收到 PX 和 第二通信 的 , 第二通信 的  The first generation of the sheep in the first communication sheep receives the PX and the second communication , the second communication
, 成功 , PX) mod ), 將 文件 羊  , success, PX) mod ), will file sheep
第二 生成羊 近 在 第二通信羊 接收到 和 第 通信 的 , 第 通信 的  The second generation of the sheep is received in the second communication sheep and the first communication
, 成功 , PY)xmod ), 將 文件 羊  , success, PY)xmod ), will file sheep
文件 羊 文件的文件 ,將 的文件 第 通信羊 第二通信 文件 羊 在 第二通信羊 接收到 密的 文件 , 所述 所述 密的文件 行解  File sheep file file, file of the first communication sheep second communication file sheep in the second communication sheep received the secret file, the dense file line solution
其中, P , 第 通信 和 第二通信 預先 的 9 , 第 通信 和 第二通信 預先 的小于P的 。 Where P, the first communication and the second communication are pre- 9, the first communication and the second communication are less than P in advance.
此外, 上 統中, 第 生成羊 近 前使用的 生成新的 9, 新的 PY g mo ), 將 PY和 第 通信 的 值通 第 通信羊 第二 通信  In addition, in the upper system, the first generation of the sheep is used to generate a new 9, new PY g mo ), and the value of PY and the first communication is communicated to the second communication.
第二 生成羊 近 前使用的 生成新的 9, 新的 X g mod ), 將 X和 第二通 信 的 值通 第二通信羊 第 通信  The second generation sheep is used recently to generate a new 9, new X g mod ), the value of the X and the second communication is passed to the second communication sheep.
第 生成羊 近 在 第 通信羊 接收到 X和 第二通信 的 , 第二通信 的  The first generation of the sheep in the first communication sheep receives the X and the second communication , the second communication
, 成功 , 新的 PX) mod ), 將 文 件 羊 行文件 的  , success, new PX) mod ), file file
第二 生成羊 近 在 第二通信羊 接收到 Y和 第 通信 的 , 第 通信 的  The second generating sheep is in the second communication sheep receiving the Y and the first communication , the first communication
, 成功 , PY)xmod ), 將 文件 羊 行文件 的解  , success, PY)xmod ), will file the file of the sheep file
其中, 9小于 P。  Where 9 is less than P.
此 , 上 統中, 第 通信 中近包括 WA 羊  This, in the upper system, the first communication includes WA sheep.
通信 中近包括第二WA 羊  Nearly including the second WA sheep in communication
第 生成羊 近 將 的明文 第 WA 羊 , 以及接收 WA 羊 返 的 The first generation of the sheep will be the plain WA sheep, and receive the WA sheep return
WA 羊 使用 第 通信 的W 的 私有 明文 或 明文 的 , 生成  WA Sheep uses the private plaintext or plaintext of W's communication, generated
, 將所生成的 返 第 生成羊  , will be generated back to the first sheep
第二 生成羊 近 將 的明文 第二 WA 羊 , 以及接收所述第二WA 羊 返 的  a second generation sheep near the plain second WA sheep, and receiving the second WA sheep return
第二WA 羊 使用 第二通信 的W 的 私有 明文 或 明文 的 , 生成 The second WA sheep uses the second communication of W Private plaintext or plaintext, generated
, 將所生成的 返 第二 生成羊 。  , will generate the second generation of sheep.
此外, 上 統中, 第 生成羊元和 第二 生成羊 近 生成 新的 9, 其中, 新的 9的生成方 下  In addition, in the upper system, the first generation of the sheep and the second generation of the sheep are newly generated, wherein the new generation of 9
前使用的 中提取 比特作力 新的 9 或 前使用的 , 生成的 中提 取 比特作力 新的 9  Before using the bit extraction force for the new 9 or before, the generated middle extraction bit force new 9
其中, 的比特 小于 的比特 。  Where the bits are less than the bits.
此外, 上 統中, 文件 羊 近 在接收到 新的 文件的未 文件 ,將 文件 封裝在文件 文 中 第 通信羊 接收 其中, 文件 的 中包含有已使用 新的 密的  In addition, in the above system, the file sheep receives the unfiled file of the new file, and encapsulates the file in the file. The communication sheep receives it, and the file contains the new secret that has been used.
文件 羊 近 在 第二通信羊 接收到文件 , 使用 新的 其中封裝的文件 行解 。 上 , 本 在文件 前使用 e- e ma 算法, 結合 于非 的 行密 , 提高了文件 的安全性, 且在 的 中引 了 向 此外, 了 步提高文件 的安全 性, 在文件 的 中, 通 更新 e- e ma 算法的 行密 的更新, 以較小的 算量 了 更新的目的。  The file sheep near the second communication sheep received the file, using the new packaged file line solution. On the above, the e-e ma algorithm is used in front of the file, and the line density is combined with the non-line density, which improves the security of the file, and in the other way, the security of the file is improved, and in the file, Update the row-critical update of the e-e ma algorithm to reduce the purpose of the update with a small amount.
1是本 的 介 方式所提供的文件 方法的 程1 is the process of the file method provided by this interface.
2是本 的 介 方式所提供的文件 的封裝 示意 以及 2 is the package description of the files provided by this interface and
3是本 的 介 方式所提供的文件 統的 示意 。 本 的較佳 方式 3 is a schematic diagram of the file system provided by this mediation. Preferred way of the present
本 的 思想是, 在文件 前使用 e- e m 算法, 結合 于非 的 行密 , 以提高文件 的安全性。  The idea is to use the e-e m algorithm in front of the file and combine it with the line density to improve the security of the file.
下面將結合 和 本 。 The following will be combined with this and .
1是本 的 介 方式所提供的文件 方法的 程 本 方式中文件的 (終端A)和文件的接收 (終端B)都 WA 終端, 終端A和終端B中都存儲有 的WA 1所示, 方法包括 下步驟  1 is a file method provided by the present mode. The file (terminal A) and file receiving (terminal B) are both WA terminal, WA 1 stored in terminal A and terminal B, and the method is Including the next steps
100 終端A 終端B 行文件 的  100 terminal A terminal B line file
在本步驟中, 方可以 以下文件 文件 、 文件大小等。 文件 , 終端A和終端B可以升 生成 于 文件 的 。  In this step, you can use the following file, file size, and so on. The file, terminal A and terminal B can be generated in the file.
101 終端B 終端A預先 的 e- e m 算法 P和 9, 以及終端B生成的 x, PX g xmo P)  101 terminal B terminal A pre-e-e m algorithm P and 9, and terminal B generated x, PX g xmo P)
其中, P和g , 且P>g mod表示 。  Where P and g are, and P>g mod is expressed.
了提高安全性, P通常 大 , 因此可以將P e- e m 算 法的 , 而將90 e- e m 算法的 。  To improve security, P is usually large, so the P e- e m algorithm can be used instead of the 90 e- e m algorithm.
需要注意的是, 本步驟中使用的 P和 90 保密, 可 以 明文方式在 中 。  It should be noted that the P and 90 used in this step are confidential and can be in plain text.
終端 B可以 終端的 WA 羊 提供的 生成接口生成 102 終端B向終端A  Terminal B can generate the interface generated by the WA sheep of the terminal. 102 Terminal B to Terminal A
文中包含 等 , 以及終端B PX等 的 。  The text contains etc., as well as the terminal B PX and so on.
終端 B可以 終端的 WA 羊 提供的 生成接口生成上 ,也就是 將PX等 作力明文 WA羊 , WA羊 使用終端B 的WAP 的 ( 終端B的 ) 的明文 生成 。 然, W 羊 也可以先將 的明文 , 使用終端B 的 得到的 得到 。 Terminal B can generate the generated interface provided by the WA sheep of the terminal, that is, the PX is used as the plaintext WA sheep, and the WA sheep uses the plaintext generation of the WAP of the terminal B (the terminal B). . However, W sheep can also get the plain text first, using the terminal B's.
103 接收到 , 終端A 終端B的 , 成功 , 生成 sy, PY g mod ) 得到
Figure imgf000010_0001
103 received, terminal A terminal B, success, generate sy, PY g mod) get
Figure imgf000010_0001
同 ,終端A也可以 終端的WA 羊 提供的 生成接口生成 隨和數sy  Similarly, terminal A can also generate the interface sy of the generation interface provided by the terminal WA sheep.
,終端A可以 終端的WA 羊 提供的 接口 終端B 的 , 也就是說將 文中包含的明文 和 Terminal A can provide the interface terminal B of the terminal WA sheep, that is, the plaintext contained in the text and
0 WA 羊 , W 羊 使用終端B的WA 的公 ( 終端B 的公 ) 行解 , 將 的結果 出的明文 或明文 的 比較, 得到 結果。 0 WA sheep, W sheep Use the terminal of the bus of the terminal B (the terminal B's public) to solve the result, and compare the plain text or the plain text.
104 終端A向  104 terminal A direction
文中包含 等 , 以及終端A PY等 的5 。  The text contains etc., as well as the terminal A PY and so on.
終端A可以 WA 羊 提供的 生成接口生成上 。 105 接收到 , 終端B 終端A的 , 成功 , 得到 PY)xmo )  Terminal A can be generated by the generation interface provided by WA Sheep. 105 received, terminal B terminal A, success, get PY) xmo )
需要注意的是, 的規則可 , 由于 It should be noted that the rules can be
C PY)xm d )  C PY)xm d )
Figure imgf000010_0002
Figure imgf000010_0002
5 也就是說,終端A和終端B 得到了相同的 (以下 。 5 That is, terminal A and terminal B get the same (below).
106 終端B向終端A 文件 , 以通 終端A 已生 成 , 可以升 文件的 107 終端 A接收到文件 , 將 文件分割成多 文 件 , 使用 各文件 , 將各 密的文件 封裝在文件 文中 106 Terminal B to the terminal A file, to the terminal A has been generated, can be filed 107 Terminal A receives the file, divides the file into multiple files, and uses each file to encapsulate each confidential file in the file.
文件 的封裝 2所示, 包括文件 共和文件 部分 其中  File encapsulation 2, including the file republic file section.
文件 部分中封裝有 密的文件  Enclosed files in the file section
文件 中包含 文件 、 文件 長度、 文件  File contains file, file length, file
文件 長度 于 文件 的長度, 果文件 長度 固定 , 10 則文件 中可以不包含 , 長度 可以由終端A和終端B The length of the file is the length of the file, the length of the file is fixed, 10 files may not be included, and the length can be from terminal A and terminal B.
得到  Get
文件 于 文件 分割 的文件 的 , 也 可 , 終端A可以預先將 終端B。  The file can be divided into files in the file, and terminal A can pre-position terminal B.
108 接收到文件 , 終端B使用 其中包含的 密文 15 行解 , 得到文件 的原文。  108 After receiving the file, terminal B uses the ciphertext 15 line solution contained in it to get the original text of the file.
終端A和終端B可以 執行步驟107 108,直至文件 。 了 步增 文件 的安全性, 終端A和終端B近可以 下步驟 行密 更新  Terminal A and terminal B can perform step 107 108 until the file. The security of the step-by-step file, the terminal A and the terminal B can be close to the next step.
109 ( > ) 文件 , 終端A可以停止文件 的 20 , 中提取 比特 (例 , 前 比特 小于 的比 特 )作力新的 ( 9,g<P),重新 生成 PY g mod P), 將 包含在 更新 中 終端B  109 ( > ) file, terminal A can stop file 20, extract bits (for example, bits with less than the first bit) force new (9g<P), regenerate PY g mod P), will be included in the update Terminal B
上 更新 中 包含PY 外, 近包含終端A PY等 的 。  In addition to the PY in the update, the terminal A PY is included.
25 110 終端B接收到 更新 , 終端A的 , , 按照相同的方法更新 9, 重新 生成 X gxmo ) 以及 PY)xmodP)25 110 Terminal B receives the update, terminal A, , update in the same way, regenerate X gxmo ) and PY) xmodP)
11 終端B PX 包含在 更新 中 終端A 上 更新 中 包含 X 外,近包含終端B X等 的 。 11 Terminal B PX is included in the update terminal A The above update includes X, and includes the terminal BX and so on.
112 接收到 更新 , 終端A 終端B的 , , 使用更新的 X 重新 PX) mo )  112 received update, terminal A terminal B, , using updated X re-PX) mo )
此 , 終端A使用新的 的文件 , 終端B也 新的 接收到的文件 行解 。  Thus, terminal A uses the new file, and terminal B also receives the new file line solution.
本 的基本原理, 上 近可以有多 交換方式, 例 ( )在上迷 中, 和接收 更新 9 更新 The basic principle of this, there can be more exchange methods, examples () in the above, and receive updates 9 updates
PY/ X, 而更新 在本 的其它 中, 也可以 分別重新生成 教東更新 PY/ X, 然, 通 重新生成 教東 更新 PY/ X的 算量較大。  PY/X, and update In the other of this, you can also regenerate the PY/X update separately, but the recalculation of the PY/X is larger.
( )在上 中, 通 中提取 比特 生成新的 9 在本 的其它 中, 也可以 得到 , 然 中提取 比特作力新的 9 然, 通信 必須 相同的 算法, 以及相同的比特提取方法生成新的 9, 以便 通信 保持相同的 9。  ( ) In the upper part, the extraction of the bit in the pass generates a new 9 in the other, which can also be obtained, but the bit is extracted as the new 9th, the communication must be the same algorithm, and the same bit extraction method generates a new 9, so that the communication remains the same 9.
( )在上 中, 由終端A 起更新 , 且在更新完成前 停止文件 的 在本 的其它 中, 更新 的 中 元 停止文件 的 , 只需在 更新完成 , 終端A 使用新 密文件 通 終端B 新 (例 , 在文件 中 文件 已 新的 ) 即可  ( ) In the upper part, it is updated by the terminal A, and before the update is completed, the file in the other part of the file is stopped, and the updated middle element stops the file, and only after the update is completed, the terminal A uses the new secret file to pass the terminal B new (Example, the file is new in the file)
此外, 也可以由終端B 起更新 同 , 的生成也 可以由終端B 。  In addition, it is also possible to update from the terminal B, and the generation can also be performed by the terminal B.
( )在上 中, P 由通信 預先 得到 由于WA 終端的 C ( 休制的 e- e m ( - )交換) 中包含固定的 P, 因此, 果通信 都是WA 終端, 則可 以 分別 終端的WA 羊 中提取 C 中的 P。 ( ) In the above, P is pre-acquired by communication because the WA of the WA terminal (the e-em (-) exchange of the system) contains a fixed P. Therefore, if the communication is a WA terminal, the WA sheep of the terminal can be separately Extract P from C.
3是本 的 介 方式所提供的文件 統的 示意 。 3 中的第 通信 和第二通信 分別是文件的 和接收 第 通 信 和第二通信 可以分別是支持WA 的 終端和 、 或 和 終端、 或終端和終端、 或 和 。3 is a schematic diagram of the file system provided by this mediation. The first communication and the second communication in 3 are file and receive communication, respectively, and the second communication may be a WA-enabled terminal and/or a terminal, or a terminal and a terminal, or a respectively.
3所示, 第 通信 中 置有 第 生成羊 , 文件 羊 , 第 通信羊 第二通信 中 置有 第二 生成羊 , 文件 羊 , 第二通信羊  3, in the first communication, there is a first generation sheep, a file sheep, a communication sheep, a second generation sheep, a file sheep, a second communication sheep.
第 生成羊 于生成隨和 sy, PY y The first generation of sheep produces an easygoing sy, PY y
9 o ), 將PY和第 通信 的 值通 第 通信羊 第二通信  9 o ), the value of PY and the first communication is communicated to the second communication
第二 生成羊 于生成 x, 時 PX gs m ), PX和第二通信 的 值通 第二通信羊 第 通信  The second generation sheep generates x, PX gs m ), PX and the value of the second communication pass the second communication sheep communication
第 生成羊 近 于在 第 通信羊 接收到 PX 和第二通信 的 , 第二通信 的 , 成功 , The first generation of the sheep is close to the first communication in the first communication sheep receiving the PX and the second communication
PX) mod ), 將 文件 羊  PX) mod ), will file sheep
第二 生成羊 近 于在 第二通信羊 接收到 PY和第 通信 的 , 第 通信 的 , 成功 , The second generation of the sheep is close to the second communication sheep receiving the PY and the first communication, the first communication, the success,
Figure imgf000013_0001
將 文件 羊
Figure imgf000013_0001
File sheep
文件 羊 于 文件的文件 第 通信羊 第二通信  File sheep in file file communication sheep second communication
文件 羊 于在 第二通信羊 接收到 密的文件 ,  The file sheep received the secret file in the second communication sheep.
行解 。 此外, 第 生成羊 近 于根 前使用的 生成新的 9, 新的 PY g mod ), 將PY和 第 通信 的 值通 第 通信羊 第二通信  Line solution. In addition, the first generated sheep is used near the root to generate a new 9, new PY g mod ), and the value of PY and the first communication is communicated to the second communication.
第二 生成羊 近 于根 前使用的 生成新的 The second generation sheep is used near the root to generate new
9, 新的 X g mod ), 將 X和第二通信 的  9, the new X g mod ), will X and the second communication
第二通信羊 第 通信  Second communication sheep communication
第 生成羊 近 于在 第 通信羊 接收到 X和第二通信 的 , 第二通信 的 , 成功 , 新的 The first generation of the sheep is close to the first communication in the communication sheep, the second communication, the success, the new
PX) mod ), 將 文件 羊 行文件 的 第二 生成羊 近 于在 第二通信羊 接收到 PY和第 通信 的 , 第 通信 的 , 成功 ,PX) mod ), will file the sheep line file The second generation of the sheep is close to the second communication sheep receiving the PY and the first communication, the first communication, the success,
Y) x mo ), 將 文件 羊 行文件 的解 。 Y) x mo ), the solution to the file sheep file.
y , 第 通信 中近 置有 WA 羊 第二通信 中近 有第二WA 羊  y , the first communication has a WA sheep second communication near the second WA sheep
第 生成羊 近 將 的明文 WA 羊 , 以及接收 WA 羊 返 的 The first generation of the sheep will be the plain WA sheep, and receive the WA sheep return
WA 羊 使用第 通信 的WA 的私有 明文 或明文 的 , 生成 , 將 返 第 生成羊  WA sheep uses the private plaintext or plaintext of the communication WA, generated, will return to the first generation sheep
第二 生成羊 近 將 的明文 第二 WA 羊 , 以及接收 第二WA 羊 返 的  The second generation of the sheep will be the second WA sheep in the plaintext, and receive the second WA sheep back.
第二WA 羊 使用第二通信 的WA 的私有 明文 或明文 的 , 生成 , 將 返 第二 生成羊 。  The second WA sheep uses the second communication of the WA's private plaintext or plaintext, generated, and will return to the second generation sheep.
文件 羊 在接收到新的 文件的未 文件 ,將 文件 封裝在文件 文中 第 通信羊 接收 文件 的 中包含已使用新的 密的  File Sheep In the file that receives the new file, the file is encapsulated in the file. The communication sheep receives the file containing the new secret.
文件 羊 第二通信羊 接收到文件 , 使用新 的 其中封裝的文件 行解 。  File Sheep The second communication sheep receives the file and uses the new packaged file line solution.
以上 , 力本 的較佳 而 非 于限定本 的保 。  Above, the strength of the power is better than the guarantee of the limit.
然, 本 近可有其它多 方式, 本領域的 木 理解可 上 內容 本 作出各 相 的 和 , 且不 本 精神及其 , 而 相 的 和 都 包括在本 的 要求的保 園內。  However, there are many other ways to do this, and the understanding of wood in this field can be made in the context of the sum of the various aspects, and not the spirit and the sum of the phases are included in the requirements of this warranty.
用性 本 提供 神文件 方法及 統, 在文件 前使用 e- e m 算法, 結合 于非 的 行密 , 提高了文件 的 安全性, 且在 的 中引 了 向 此外, 了 步 提高文件 的安全性, 在文件 的 中, 通 更新 e- e m 算法 的 行密 的更新,以較小的 算量 了 更新的目的。 Usability This method provides the God file method and system. The e- em algorithm is used before the file, and the line density is combined with the non-line density. The security of the file is improved, and in addition, the security of the file is improved in the file. In the middle of the update, the e-em algorithm updates the line-density update, with a smaller amount of calculation for the purpose of the update.

Claims

要 求 Claim
1、 神文件 方法, 其包括  1. God file method, which includes
文件的 PY g mod ), 文件的接收 File PY g mod ), file reception
PX g xmod ) , 和 接收 將 算出的PY以及  PX g xmod ) , and receive will calculate the PY and
的 算出的PX 以及 接收 的 相交換  Calculated PX and received phase exchange
和 接收 的 ,  And received ,
(PPX symodP, 接收 PY s(PPX symodP, receiving PY s
odP, 將 算出的 PX symod P) 和 PY)xmod ) 作力密  odP, the calculated PX symod P) and PY)xmod )
將 文件的文件  File file
接收 以及  Receiving and
接收 接收到的 密的文件 行解 其中, sy和 x分別 和 接收 生成的  Receiving the received secret file line solution where sy and x are respectively generated by the sum and the received
, 和所述接收 預先 的 9 ,  , and the receiving advance 9 ,
和 接收 預先 的小于P的 。 And receive a pre-less than P.
2、 要求1 的方法,  2. The method of requirement 1,
方法近包括 在所 方向 接收 文件的文件 的 步驟中 行密 更新, 其中, 更新的步驟包括  The method includes a step-by-step update in the step of receiving the file of the file in the direction, wherein the updating step includes
所迷 和所述接收 分別 前使用的 生成新的 9, 分別 新的 PY gymo )和PX gxmodP) 和所述接收 將 算出的 PY以及 的 X以及所述接收 的 相交換 以及  And the receiving separately used to generate a new 9, respectively, a new PY gymo) and a PX gxmodP) and the receiving the calculated PY and the X and the receiving phase exchange and
和 接收 的 , 分別 PX) mod )和PY)xmo ), 將 算出的 PX)ymo ) 和 PY)xmod ) 作力新的  And received, respectively PX) mod ) and PY) xmo ), will calculate the PX) ymo ) and PY) xmod )
行密 更新的步驟 , 方法近  Step-by-step update procedure
生成 新的 , 新的 文件的未 文件 接收 以及 接收 新的 新的 密 的文件 行解 Generate new, new File not receiving and receiving new new secret file line solution
其中, 9小于 P。 Where 9 is less than P.
3、 要求1或2 的方法, 其中,  3. The method of claim 1 or 2, wherein
和 接收 保密 W 終 端  And receiving a confidential W terminal
方法近包括 所迷W 終端 下方式生成  The method includes the following method:
將 的明文 教友 W 終端的元 The plain text of the church member W terminal
WA 羊 WA sheep
WA羊 使用 W 終端的W 的私有 明文 或 明文 的 , 生成 。  WA Sheep uses the private plaintext or plaintext of the W terminal's W, generated.
4、 要求2 的方法, 其近包括 4. The method of requirement 2, which includes
前使用的 中提取 比特作力 新的 Previously used in the extraction of bit force
g 或  g or
前使用的 生成 , 中提取 比特作力 新的 9  Before using the build, extracting the bit force, the new 9
其中, 的比特 小于 的比特 。 Where the bits are less than the bits.
5、 要求2 的方法, 其中,  5. The method of claim 2, wherein
在所 新的 文件的未 文件 密 的步驟 , 方法近包括 將所 文件 封裝在文件 文中  In the undocumented step of the new file, the method includes including encapsulating the file in the file.
接收 其中, 文件 的 中包含有已使用 新的  Received, the file contains the new one that has been used.
密的  Secret
在所 接收 接收到 文件 的步驟 , 方法近包括 所 迷接收方根 使用 新的 文件 文中封裝的 文件 行解 。 In the step of receiving the received file, the method includes the recipient's root using the file line solution encapsulated in the new document.
6、 神文件 統,其包括作力文件的 的第 通信 和作力 文件的接收 的第二通信 其中, 6. The God file system, which includes the second communication of the communication and the force file of the force file, wherein
第 通信 包括 第 生成羊 、 文件 羊 、 第 通信 羊  The first communication includes the first generation sheep, the file sheep, the communication sheep
第二通信 包括 第二 生成羊 、 文件 羊 、 第二通信 羊  The second communication includes the second generation sheep, the file sheep, the second communication sheep
第 生成羊 生成 sy,  The first generated sheep generates sy,
PY g mod ), 將 PY 和 第 通信 的 值通 第 通 信羊 第二通信 PY g mod ), the value of PY and the first communication is communicated to the second communication
第二 生成羊 生成 x,  The second generation sheep generates x,
PX gsxmod ), 將 PX 和 第二通信 的 值通 第二通 信羊 第 通信 PX gsxmod ), passing the value of PX and the second communication to the second communication
第 生成羊 近 在 第 通信羊 接收到 PX 和 第二通信 的 , 第二通信 的  The first generation of the sheep in the first communication sheep receives the PX and the second communication , the second communication
, 成功 , PX) m P, 將 算出的  , success, PX) m P, will be calculated
文件 羊  File sheep
第二 生成羊 近 在 第二通信羊 接收到 PY 和 第 通信 的 , 第 通信 的  The second generation sheep is in the second communication sheep receiving the PY and the first communication
, 成功 , PY)xm P, 將 算出的  , success, PY)xm P, will be calculated
文件 羊  File sheep
文件 羊 文件的文件 ,將 的文件 第 通信羊 第二通信 文件 羊 在 第二通信羊 接收到 密的 文件 , 密的文件 行解  File sheep file file, file of the first communication sheep second communication file sheep in the second communication sheep received the secret file, the secret file line solution
其中, P , 第 通信 和 第二通信 預先 的 9 , 第 通信 和 第二通信 預先 的小于P的 。  Wherein, P, the first communication and the second communication are in advance of 9, the first communication and the second communication are less than P in advance.
7、 要求6 的 統, 其中, 第 生成羊 近 前使用的 生成新的 9, 新的 PY g mod ), 將 PY和 第 通 信 的 值通 第 通信羊 第二通信 7, the requirements of the system 6, where The first generation of the sheep used to generate a new 9, new PY g mod), the PY and the first communication value of the communication communication sheep second communication
第二 生成羊 近 前使用的 生成新的 9, 新的 X g mod ), 將 X和 第二通 信 的 值通 第二通信羊 第 通信  The second generation sheep is used recently to generate a new 9, new X g mod ), the value of the X and the second communication is passed to the second communication sheep.
第 生成羊 近 在 第 通信羊 接收到 X和 第二通信 的 , 第二通信 的  The first generation of the sheep in the first communication sheep receives the X and the second communication , the second communication
, 成功 , 新的 PX) mod ), 將  , success, new PX) mod ), will
羊 行文件 的  Sheep file
第二 生成羊 近 在 第二通信羊 接收到 PY和 第 通信 的 , 第 通信 的  The second generation sheep is in the second communication sheep receiving the PY and the first communication
, 成功 , PY)xmod ), 將 文件 羊 行文件 的解  , success, PY)xmod ), will file the file of the sheep file
其中, 9小于 P。  Where 9 is less than P.
8、 要求6或7 的 統, 其中,  8. Requires a system of 6 or 7, where
第 通信 中近包括 WA 羊 第二通信 中近包括 第二WA 羊  The first communication includes WA sheep, the second communication, including the second WA sheep.
第 生成羊 近 將 的明文 第WA 羊 , 以及接收 WA 羊 返 的 The first generation of the sheep will be the plain text of the WA sheep, and receive the WA sheep return
WA 羊 使用 第 通信 的W 的 私有 明文 或 明文 的 , 生成  WA Sheep uses the private plaintext or plaintext of W's communication, generated
, 將所生成的 返 第 生成羊  , will be generated back to the first sheep
第二 生成羊 近 將 的明文 第二WA 羊 , 以及接收 第二WA 羊 返 的  The second generation of the sheep will be the second WA sheep, and receive the second WA sheep.
第二WA 羊 使用 第二通信 的W 的 私有 明文 或 明文 的 , 生成  The second WA sheep uses the second communication of W's private plaintext or plaintext to generate
, 將所生成的 返 第二 生成羊 。 , will generate the second generation of sheep.
9、 要求7 的 統, 其中, 9. The system of requirement 7, where
第 生成羊元和 第二 生成羊 下方式生成 新的 9  The first generation of the sheep and the second generation of the sheep form a new 9
前使用的 中提取 比特作力 新的 9 或 前使用的 , 生成的 中提 取 比特作力 新的 9  Before using the bit extraction force for the new 9 or before, the generated middle extraction bit force new 9
其中, 的比特 小于 S 比特 。  Where the bits are smaller than the S bits.
10、 要求7所述的 統, 其中,  10. The system described in claim 7, wherein
文件 羊 近 在接收到 新的 文件的 未 文件 , 將 文件 封裝在文件 文中 第 通信 羊 接收 其中, 文件 的 中包含有已使用 新的 密的  The file sheep is not receiving the new file, and the file is encapsulated in the file. The communication sheep receives it, and the file contains the new secret.
文件 羊 近 在 第二通信羊 接收到文件 , 使用 新的 其中封裝的文件 行解 。  The file sheep near the second communication sheep received the file, using the new packaged file line solution.
PCT/CN2009/075924 2009-06-30 2009-12-24 File transfer method and system WO2010145162A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910150757.8A CN101600204B (en) 2009-06-30 2009-06-30 File transmission method and system
CN200910150757.8 2009-06-30

Publications (1)

Publication Number Publication Date
WO2010145162A1 true WO2010145162A1 (en) 2010-12-23

Family

ID=41421397

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075924 WO2010145162A1 (en) 2009-06-30 2009-12-24 File transfer method and system

Country Status (2)

Country Link
CN (1) CN101600204B (en)
WO (1) WO2010145162A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857479A (en) * 2011-06-30 2013-01-02 北京新媒传信科技有限公司 Network communication encrypting method and system

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101600204B (en) * 2009-06-30 2011-05-11 中兴通讯股份有限公司 File transmission method and system
CN105763333B (en) * 2016-01-28 2019-05-24 北京江南天安科技有限公司 A kind of machinery of consultation of unsymmetrical key
CN106603233B (en) * 2017-01-04 2020-01-21 顾建明 Encryption and decryption method for remote bid opening type bidding system
CN106961612B (en) * 2017-03-16 2021-02-02 Oppo广东移动通信有限公司 Image processing method and device
CN107835072A (en) * 2017-11-10 2018-03-23 周海军 The method of controlling security and device of network service
CN109361506B (en) * 2018-09-21 2021-06-15 无锡润盟软件有限公司 Information processing method
CN109510711B (en) * 2019-01-08 2022-04-01 深圳市网心科技有限公司 Network communication method, server, client and system
CN111192474A (en) * 2019-11-14 2020-05-22 晏子俊 Garage-based private parking space sharing method
CN112311752A (en) * 2020-05-09 2021-02-02 杭州绿鲸科技有限公司 Internet of things smart meter safety system and implementation method
CN112307463A (en) * 2020-05-09 2021-02-02 杭州绿鲸科技有限公司 Internet of things smart meter production test system and safety protection method
CN114650151A (en) * 2020-12-15 2022-06-21 宝能汽车集团有限公司 Data transmission method, device and system based on vehicle CAN bus and storage medium
WO2022178890A1 (en) * 2021-02-27 2022-09-01 华为技术有限公司 Key transmission method and apparatus
CN114205090B (en) * 2021-11-30 2024-01-30 傲然技术有限公司 Safe file sharing method and system based on cryptographic algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1507720A (en) * 2002-01-17 2004-06-23 株式会社东芝 Secure data transmission links
CN1761186A (en) * 2005-11-11 2006-04-19 南京邮电大学 Method for distributing net key
CN101048970A (en) * 2004-10-29 2007-10-03 汤姆森许可贸易公司 Secure authenticated channel
US20080152132A1 (en) * 2006-12-22 2008-06-26 Samsung Electronics Co., Ltd. Broadcast encryption method and broadcast decryption method thereof
CN101600204A (en) * 2009-06-30 2009-12-09 中兴通讯股份有限公司 A kind of document transmission method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1507720A (en) * 2002-01-17 2004-06-23 株式会社东芝 Secure data transmission links
CN101048970A (en) * 2004-10-29 2007-10-03 汤姆森许可贸易公司 Secure authenticated channel
CN1761186A (en) * 2005-11-11 2006-04-19 南京邮电大学 Method for distributing net key
US20080152132A1 (en) * 2006-12-22 2008-06-26 Samsung Electronics Co., Ltd. Broadcast encryption method and broadcast decryption method thereof
CN101600204A (en) * 2009-06-30 2009-12-09 中兴通讯股份有限公司 A kind of document transmission method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857479A (en) * 2011-06-30 2013-01-02 北京新媒传信科技有限公司 Network communication encrypting method and system

Also Published As

Publication number Publication date
CN101600204A (en) 2009-12-09
CN101600204B (en) 2011-05-11

Similar Documents

Publication Publication Date Title
WO2010145162A1 (en) File transfer method and system
US11689870B2 (en) Hearing device and method of updating a hearing device
CN104618120B (en) A kind of mobile terminal key escrow digital signature method
US9647833B2 (en) System and method for identity-based key management
US8009829B2 (en) Method and system for deploying advanced cryptographic algorithms
US7899185B2 (en) Real privacy management authentication system
CN106936570B (en) Key configuration method, key management center and network element
CN104333455B (en) A kind of smart mobile phone secret signalling and method
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN109672539A (en) SM2 algorithm collaboration signature and decryption method, apparatus and system
EP1976322A1 (en) An authentication method
CN101820342B (en) Method for implementing hardware encryption engine
US8694789B2 (en) System and method for generating a non-repudiatable record of a data stream
CN111654511A (en) Chained data encryption method, chained data decryption method and corresponding systems
CN103987037A (en) Secret communication implementation method and device
CN109409888B (en) Public block chain system supporting private transaction and processing method of private transaction
JP2003522475A (en) Method, system and mobile terminal for data accuracy check
CN104717220A (en) Control signaling secure transmission method based on hardware encryption
CN111970699A (en) Terminal WIFI login authentication method and system based on IPK
CN108599944A (en) A kind of identifying code short message transparent encryption method based on handset identities
CN111181944B (en) Communication system, information distribution method, device, medium, and apparatus
CN109951378B (en) File encryption transmission and sharing method in instant messaging
CN115208615A (en) Data encryption transmission method for numerical control system
WO2018047132A1 (en) A system and method for authentication and secure communication
CN112367329B (en) Communication connection authentication method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09846076

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09846076

Country of ref document: EP

Kind code of ref document: A1