Browse Prior Art Database

Method for Secure File Transfer in Computer Network

IP.com Disclosure Number: IPCOM000204450D
Original Publication Date: 2011-Feb-25
Included in the Prior Art Database: 2011-Feb-25
Document File: 3 page(s) / 287K

Publishing Venue

Siemens

Related People

Juergen Carstens: CONTACT

Abstract

In times of increasing danger of security of computer networks, a reliable and secure network infrastructure is crucial for allowing secure data transfer within networks. Especially transferring files containing confidential data is very critical. Since hackers and spyware are becoming increasingly sophisticated, the need for secure means to transfer data within networks increases. Figure 1 depicts a hacker’s attack on a computer network. Since the network is not sufficiently secured, the hacker is able to read files which are transferred from one PC (Personal Computer) to another. Modern software tools, which are developed for this purpose, make it even easier for the hacker to get in possession of sensitive data. Several methods for securing networks and for securely transferring files do already exist but have certain drawbacks. At present, network administrators make use of secure network solutions which are sold by software and hardware development companies. All these solutions are implemented by using existing or proprietary methods for a secure file transmission within computer networks.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 3

(This page contains 01 pictures or other non-text object)

(This page contains 00 pictures or other non-text object)

Method for Secure File Transfer in Computer Network

Idea: Bernd Steiner; DE-Nuremberg

In times of increasing danger of security of computer networks, a reliable and secure network infrastructure is crucial for allowing secure data transfer within networks. Especially transferring files containing confidential data is very critical. Since hackers and spyware are becoming increasingly sophisticated, the need for secure means to transfer data within networks increases. Figure 1 depicts a hacker's attack on a computer network. Since the network is not sufficiently secured, the hacker is able to read files which are transferred from one PC (Personal Computer) to another. Modern software tools, which are developed for this purpose, make it even easier for the hacker to get in possession of sensitive data. Several methods for securing networks and for securely transferring files do already exist but have certain drawbacks.

At present, network administrators make use of secure network solutions which are sold by software and hardware development companies. All these solutions are implemented by using existing or proprietary methods for a secure file transmission within computer networks.

Furthermore, a new method is introduced as a new concept for securing file transfer in computer networks. The security of an existing computer network can be enhanced or the new method can be used as a standalone system in insecure computer networks. This new method comprises a Preparation Phase and a Transfer Phase. Figure 2 depicts the Preparation Phase of the new method using an exemplary simple text file SampleFile.txt. This file shall be securely transferred within a computer network. At first, the file is splitted in to small files, which are called segment files, for example file "a", "b", or "c" in figure 2. To each file segment, a unique and random filename is assigned. The segmented files are discrete files which do not have any linkage to any other of the segmented files. Each file segment is encrypted with a secure encryption algorithm, such as AES (Advanced Encryption Standard). In addition, so-called dummy files are created with the same size as the segmented files containing random binary data. Examples for dummy files in figure 2 are file "g" and "n". Further on, a TOC (Table Of Contents) file is created containing a list of all segmented files and their position within the original file. All dummy files are not listed in the TOC file. Also the TOC file gets encrypted with a secure but different encryption algorithm.

After the Preparation Phase follows the Transfer Phase in which the SampleFile.txt is not transferred to the recipient. Instead, all the segmented and dummy files are sent to the recipient across the network in random or...