Security defense method, device and system based on NLS (negative logic system)

A security defense and negative logic technology, applied in the field of network information security, can solve the problems of high network defense overhead and low network security factor, and achieve the effect of increasing network overhead and cost, reducing cost, and saving resources

Active Publication Date: 2015-04-29
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a security defense method, device and system based on the NLS negative logic system, which are used to solve the problems of low network security factor and large network defense cost in the security attack and defense mechanism based on PLS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense method, device and system based on NLS (negative logic system)
  • Security defense method, device and system based on NLS (negative logic system)
  • Security defense method, device and system based on NLS (negative logic system)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as figure 1 As shown, it is a flow chart of a security defense method based on the NLS negative logic system provided by Embodiment 1 of the present invention, and the method includes:

[0036] Step 101: The negative logic processing center receives an input item information.

[0037] In step 101, the negative logic processing center receives an input item information through the communication interface, wherein the expression form of the item information includes at least one of the following: data information expressed in binary, data information expressed in decimal, hexadecimal Data information, text information, etc. represented by the system.

[0038] For example: the entry information received by the negative logic processing center is 01010101, and it is determined that the entry information is data information in binary representation; the entry information received by the negative logic processing center is 0123456789, and it is determined that the entry...

Embodiment 2

[0063] Such as figure 2 As shown, it is a flowchart of a security defense method based on the NLS negative logic system provided by Embodiment 2 of the present invention. Embodiment 2 of the present invention is a detailed description of each step in Embodiment 1 of the present invention. Embodiment 2 of the present invention is described by taking the input entry information as password information of 6 digits as an example. The methods include:

[0064] Step 201: The negative logic processing center receives an input password information consisting of 6 digits.

[0065] Wherein, the password information may be 6 digits or multiple digits, which is not specifically limited here.

[0066] In step 201, since the user needs to encrypt and save an office document, a 6-digit password information is set for the office document, for example: 123456, and the set 6-digit password information is transmitted to the negative logic process through the communication interface Center, ...

Embodiment 3

[0079] Such as image 3 As shown, it is a schematic structural diagram of a security defense device based on the NLS negative logic system provided by Embodiment 3 of the present invention. Embodiment 3 of the present invention is an invention under the same inventive concept as Embodiment 1 and Embodiment 2 of the present invention. Including: an input module 11, a processing module 12 and an output module 13, wherein:

[0080] An input module 11, configured to receive an input entry information;

[0081] The processing module 12 is configured to configure at least two logic state values ​​for the received entry information according to the preset correspondence between the entry information and at least two logic state values, wherein the configured at least two logic state values The value does not include the logical state value corresponding to the state information determined by the positive logic mechanism;

[0082] The output module 13 is configured to randomly outp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security defense method, device and system based on an NLS (negative logic system). The method mainly comprises the following steps: a negative logic processing center receives a piece of input item information, configures at least two logic state values for the received item information according to the corresponding preset relationship between the item information and the at least two logic state values, and outputs one of the configured logic state values at random. Therefore, the one-to-one correspondence relationship between item information and logic state values adopted by an existing positive logic system is broken through, information of attack and defense parties is asymmetric, the network overhead and cost of an attacker are increased, the security of network defense is guaranteed, the cost of network defense is reduced and resources for network defense are reduced.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a security defense method, device and system based on an NLS negative logic system. Background technique [0002] Attack and defense in the security field mainly include information network attack and information network defense. The attack and defense mechanism refers to information network attack methods, information network defense methods, and the strategies or means for realizing them in various ways. The goal of the defense mechanism lies in the five attributes of information - confidentiality, integrity, availability, controllability and non-repudiation. [0003] With the development of information technology, the methods of information network attack and defense are constantly evolving and increasing, showing the characteristics of comprehensive, intelligent, systematic and advanced. In order to fight against network attacks, strengthen defense in depth, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 何申程叶霞杨光华刘钢庭王丹弘何坚安
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products