Method and system for improving transmission security of file

A file transmission and security technology, applied in the field of information security, can solve the problems that users cannot decrypt encrypted files, security risks, password table is difficult to maintain, etc.

Active Publication Date: 2012-04-18
FEITIAN TECHNOLOGIES
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When transferring and distributing some important files, the traditional method usually uses some symmetric secret algorithm to encrypt the file, and then inform the file receiver of the password in plain text. This method is relatively simple to operate, but there are many security risks: First, when the password is leaked , we cannot guarantee whether the person viewing the file is a legitimate file recipient; secondly, when decrypting after a period of time, if the initial encryption password is forgotten, the user cannot decrypt the encrypted file; thirdly, when the user needs to When a file is encrypted and distributed to multiple people, if the same password is used to encrypt, the risk will be uncontrollable. If any password is leaked, the file will be stolen, and it is difficult to trace the source of the leak. If different The receiver of the file uses different keys to encrypt separately, which increases the workload virtually, and the password table is difficult to maintain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving transmission security of file
  • Method and system for improving transmission security of file
  • Method and system for improving transmission security of file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0204] Embodiment 1 of the present invention provides a method for improving file transmission security, such as figure 1 As shown, including the file encryption process and file decryption process:

[0205] Among them, file encryption includes:

[0206] Step A: After receiving the trigger information, obtain the corresponding key information from the key server according to the friend ID in the trigger information; use the generated session key to encrypt the file corresponding to the file ID in the trigger information, and generate File ciphertext; respectively use the first key in the key information to encrypt the session key to generate corresponding session ciphertext;

[0207] Specifically, in this embodiment, the key information includes the second key and the first key; the key server uses a preset algorithm corresponding to the friend ID to calculate the generated second key to generate the first key;

[0208] Step B: Composing the friend ID in the trigger informat...

Embodiment 2

[0218] see figure 2 and image 3 , Embodiment 2 of the present invention provides a method for improving the security of file transmission. In this embodiment, the sender stores the file in the network disk server in advance. figure 2 For the file encryption process in the method of this embodiment, image 3 It is the file decryption process in the method of this embodiment; the sending terminal in this embodiment includes a terminal device and software installed on it.

[0219] Such as figure 2 As shown, the file encryption process includes:

[0220] Step 201: the sending terminal initiates a request to establish a connection with the network disk server;

[0221] Step 202: The network disk server judges whether the sender is a legal user, if legal, execute step 205, and if not, execute step 203;

[0222] In this embodiment, step 202 is specifically:

[0223] Step 202-1: The network disk server prompts the user to enter the login password through the sending terminal...

Embodiment 3

[0307] see Figure 5 and Figure 6 Embodiment 3 of the present invention provides another method for improving the security of file transmission. In this embodiment, the user stores the file and all friend IDs in the network disk server in advance, and sets the file in advance. Which files are allowed to be used by the file? For friend access, the sending terminal in this embodiment includes terminal equipment, that is, the software installed on it, Figure 5 For the file encryption process in the method of this embodiment, Figure 6 It is the file decryption process in the method of this embodiment;

[0308] Such as Figure 5 As shown, the file encryption process includes:

[0309] Step 501: the sending terminal initiates a request to establish a connection with the network disk server;

[0310] Step 502: The network disk server judges whether the sender is a legal user, if legal, execute step 505, and if not, execute step 503;

[0311] In this embodiment, the implement...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for improving the transmission security of a file. The method comprises the following steps of: respectively obtaining a first secret key and a second secret key, which are corresponding to each other, in a secret key server according to a friend identifier in triggering information; encrypting the file by a generated session key to generate a file ciphertext; respectively encrypting the session key by the first secret key to generate a corresponding session ciphertext; forming the friend identifier, the corresponding second secret key, the session ciphertext and the file ciphertext into a file packet; and obtaining and analyzing the file packet, outputting the second secret key which is obtained in an analysis way and is corresponding to a receiver when data which accords with a preset format is analyzed and the receiver is a transmitting friend, receiving a third secret key which is generated by a secret key generator according to the second secret key, deciphering the session ciphertext by the third secret key, and deciphering the file ciphertext by the session ciphertext which is obtained in a deciphering way. Therefore, the operation for transmitting the file to a plurality of users can be simplified, and the transmission security of the file can be further improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for improving file transmission security. Background technique [0002] With the wide application of computer technology, in all walks of life, almost all data and information will be entered into computers and stored as files. For remote users, viewing these documents requires remote access or local viewing by sending and storing them. Remote access requires authorization, and if the file is transmitted in plain text and stored locally for viewing, it will be illegally intercepted during the transmission process, revealing privacy. [0003] Network hard disk is an important application on the Internet at present, and data security is a core issue of network hard disk application. When transferring and distributing some important files, the traditional method usually uses some symmetric secret algorithm to encrypt the file, and then inform the file receiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products