Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File transmitting method and system, sending end equipment and receiving end equipment

A file transmission and receiving end technology, applied in the field of information security, can solve problems such as easy cracking of encrypted files, file leaks, insufficient security of mobile office, etc., and achieve the effect of improving information security and increasing transmission security

Pending Publication Date: 2020-06-05
CHINA INFORMATION TECH SECURITY EVALUATION CENT
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the files involved in mobile office often need to be connected to the government / enterprise intranet through an open wireless public network, and even the information may be transmitted wirelessly in the air, which will lead to insufficient security in mobile office. For example, if the sending end If the communication line to the receiving end is monitored, illegal elements can directly obtain encrypted files and encryption keys, so that encrypted files can be easily cracked, resulting in file leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File transmitting method and system, sending end equipment and receiving end equipment
  • File transmitting method and system, sending end equipment and receiving end equipment
  • File transmitting method and system, sending end equipment and receiving end equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0066] This application provides a file transfer method, system, sending end device, and receiving end device, which are used to improve the information security of file transfer. The file transfer method, system, sending end device, and file transfer method of this application will be described below through multiple embodiments The receiver device is described in detail.

[0067] refer to figure 1 , is a schematic flowchart of a file transfer method provided in an optional embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a file transmitting method and system, sending end equipment and receiving end equipment, and the method comprises the steps: carrying out the random arrangement of all encryption sub-files corresponding to a to-be-transmitted target file, wherein the sequence of all encryption sub-files can be disturbed so as to improve the difficulty for an illegal person to decrypt an original file, and improve the transmission safety of file information; furthermore, the encrypted file and the information table thereof are respectively transmitted according to different lines, wherein even if an illegal person monitors the transmission line of the encrypted file, the information table cannot be obtained from the line at the same time; therefore, on the one hand, the illegal person cannot recover the original logic sequence of each encrypted sub-file according to the segment serial number and the arrangement sequence in the information table; on the other hand, the illegal person cannot obtain the encryption key and cannot crack the decryption key according to the encryption key, that is, the illegal person cannot decrypt each encrypted sub-file, so that the difficulty is provided for the illegal person to obtain the target file, and the information security of the transmitted target file is improved.

Description

technical field [0001] The present application belongs to the technical field of information security, and in particular relates to a file transmission method and system, a sending end device, and a receiving end device. Background technique [0002] Mobile office, as a brand-new office mode, can free office workers from the constraints of time and space, and unit information can be interacted smoothly anytime and anywhere, improving office efficiency. [0003] In mobile office, there may be a situation where the data volume of the office file to be transferred is relatively large. For this case, if an error occurs during the transfer process, the entire file needs to be retransmitted. In order to avoid this phenomenon and ensure the correct transfer of the file, In the prior art, the sending end segments the original file to be transmitted and encrypts the segmented file, and then, the sending end directly sends the encrypted file and the encryption key together to the rece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0435H04L63/12H04L67/06
Inventor 饶华一张宝峰杨永生石竑松刘昱函张骁许源
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products