Mirror image file transmission method and device, equipment and storage medium

A technology of image files and transmission methods, applied in the field of information security, can solve the problems of content leakage and tampering, and achieve the effect of improving security

Pending Publication Date: 2022-01-07
中电科网络安全科技股份有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with traditional Internet scenarios, new risks are often introduced, that is, the content may be leaked and tampered during the transmission process of the image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mirror image file transmission method and device, equipment and storage medium
  • Mirror image file transmission method and device, equipment and storage medium
  • Mirror image file transmission method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In the prior art, in some private cloud or local area network application scenarios, development and actual operation are often not in the same reachable network. The image is often sent offline to the customer through a storage medium such as a CD, and then the customer reads the offline image from the medium. Compared with traditional Internet scenarios, new risks are often introduced, that is, the content may be leaked or tampered with during the transmission process of the image. In order to overcome the above-mentioned technical problems, the present application proposes a mirror image file transmission method, which can improve the security of mirror image offline transmission.

[0043] The embodiment of the present application discloses a mirror image file transmission method, see figure 1 As shown, the method may include the following steps:

[0044] Step S11: Connect the local encryption tool with the containerized device at the receiving end and perform a pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mirror image file transmission method and device, equipment and a storage medium. The method comprises the following steps: connecting a local encryption tool with containerized equipment of a receiving end and carrying out pairing operation to obtain a paired encryption tool stored with a public key of a receiver and a paired containerized equipment stored with a public key of a sender; encrypting a target mirror image file by using the paired encryption tool to obtain a file package containing the encrypted mirror image file; and copying the file package to the receiving end in an off-line manner, so that the receiving end decrypts the encrypted mirror image file by using the paired containerization equipment to obtain the target mirror image file. It can be seen that the encryption tool and the containerized equipment are paired, the paired encryption tool is used for encryption, and the paired containerized equipment of the receiving end is used for decryption, so that the problems of leakage and tampering of mirror image content in a mirror image offline transmission scene are solved, and the security of mirror image offline transmission is improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a mirror image file transmission method, device, equipment and storage medium. Background technique [0002] At present, container technology not only provides the isolation of the application operating environment, but also shields the differences and complexity of the underlying infrastructure, greatly improving the convenience of deployment. Image confidentiality protection and inspection. In the prior art, a common solution is to establish a trusted HTTPS link with the warehouse, and the warehouse will sign the image after submission. In a single cloud environment, this process is a closed-loop process, and the image is pulled when deploying, and the same repository is used for image submission and deployment. However, in some private cloud or local area network application scenarios, development and actual operation are often not in the same reachable n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/60
CPCG06F9/45558G06F21/602G06F2009/45587G06F2009/45595
Inventor 曹占涛文欣齐伟钢周俊唐操袁生荣崔炳华胡凌男谭亮王钰翔
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products