Data secrete sharing system and method based on core network

A core network and secret sharing technology, applied in the field of data secret sharing system based on core network, can solve the problem that the fingerprint feature of the entry node is easy to be discovered by the adversary, and it is easy to cause the adversary's suspicion, so as to improve the efficiency of covert communication, increase the difficulty, The effect of improving concealment

Active Publication Date: 2013-12-18
INST OF INFORMATION ENG CAS
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because these anonymous communication systems often rely on the distribution of entry nodes, and the fingerprint characteristics of these entry nodes are extremely easy to be discovered by the adversary
In addition, the use of encrypted channels in traditional anonymous communica...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data secrete sharing system and method based on core network
  • Data secrete sharing system and method based on core network
  • Data secrete sharing system and method based on core network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0054] Traditional covert communication methods are all end-to-end communication methods. Generally, covert channels are placed in other bunker channels. Unlike traditional covert communication, which requires both parties to participate in a covert handshake, the core idea of ​​the present invention is to use end-to-end covert channels , moving to the end-to-intermediate (information publishing end and forwarding router) communication method, that is, in the covert handshake process, with the help of the forwarding router in the core network, only the information publishing end and the forwarding router need to participate, and the information receiving end does not need to participate. While this method improves th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data secrete sharing system and method based on a core network. The method comprises the steps of hiding target information to be sent in shelter information at the information publish end and publishing the shelter information into specific network application. When an innocent user downloads resources in the specific network application, downloaded information passes through a forwarding router, and the forwarding router can recognize whether the downloaded information is the shelter information. If the downloaded information is the shelter information, the shelter information is copied, prime information is sent to the innocent user, and the copied shelter information can be sent to the real information receiving end through a background server. The information publishing end and the router participate in a hidden handshake process, and the information receiving end doesn't participate in the process. The method improves the covert communication efficiency, improves opponent detection difficulty and improves information transmission hiddenness by hiding the target information to be sent in the shelter information.

Description

technical field [0001] The invention relates to the fields of privacy protection, covert communication and anonymous communication, in particular to a core network-based data secret sharing system and method. Background technique [0002] In recent years, the Internet has gradually become an important tool for people's daily life and entertainment. However, with the development of the Internet and people's pursuit of privacy protection, network monitoring has also received more and more attention. The audit and analysis of people's network behavior has brought great impact to people's communication security and personal privacy. threaten. [0003] For a long time, anonymous communication systems have become an effective way to protect user privacy. However, research has shown that it is not difficult to detect and discover traditional anonymous communication systems (such as Tor) service nodes. Because these anonymous communication systems often rely on the distribution of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 谭庆丰时金桥刘培朋王啸
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products