Identity-based file encryption transmission method

A file encryption and transmission method technology, applied in the field of identity-based file encryption and transmission, can solve the problems of complicated user usage and cumbersome background management.

Active Publication Date: 2013-10-16
北京创世泰克科技股份有限公司
View PDF5 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each user needs to apply for a digital certificate in advance, the use...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based file encryption transmission method
  • Identity-based file encryption transmission method
  • Identity-based file encryption transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to facilitate a further understanding of the method of the present invention, preferred embodiments are described in detail below in conjunction with the accompanying drawings.

[0043] The identity-based file encryption transmission method of the present invention is applicable to a system based on the FTP (File Transfer Protocol, file transfer protocol) protocol client / server architecture, based on the identity encryption (IBE, Identity Based Encryption) algorithm, for the Internet A relatively complete implementation scheme is proposed for the safe transmission of files between communication parties in the environment. The methods include authentication methods, symmetric key negotiation methods, encrypted file transfer methods, key update methods, and key management methods (such as figure 1 shown).

[0044] The file security transmission method proposed by the present invention can be briefly described as:

[0045] In the identity-based encryption (IBE) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based file encryption transmission method which is applicable to a system of client/server architecture based on FTP. The method, based on identity based encryption algorithm, comprises the following steps: generation of public keys and private keys of a client and a server; identity authentication; negotiation of a symmetric key; transmission of encrypted files and secret key update and management. The identity based encryption (IBE) algorithm is used in the identity-based method, so that users can communicate safely and signature of each person is authenticated without exchanging the public keys and the private keys; besides, the file safety transmission method is low in cost, flexible in form, high in efficiency and good in safety.

Description

technical field [0001] The invention relates to a file encryption transmission method, in particular to an identity-based file encryption transmission method for realizing secure file transmission between communication parties in an Internet environment. Background technique [0002] Since entering the 21st century, information technology is developing at an unprecedented speed. In recent years, with the rapid development of Internet technology, file transfer in the Internet environment has become an increasingly common technology. Correspondingly, the security of file transmission and the problems that arise are also more and more concerned by people. In the application of file transfer technology, there are many issues worthy of attention, such as how to verify the identity of the other party, how to securely obtain the keys for encrypted transmission with the other party, how to manage these keys, and so on. [0003] Currently, a generally accepted and widely used tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 曹晨磊刘烨张茹
Owner 北京创世泰克科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products