Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and client for realizing covert communication, and server

A server and client technology, applied in the field of communication, can solve problems such as the inability to securely realize secret communication, and achieve the effect of improving concealment and security, strong penetrating power, and high usability

Active Publication Date: 2017-02-22
北龙中网(北京)科技有限责任公司
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these covert channels based on protocols such as DNS, ICMP, and FTP have been listed as the main objects of network monitoring, and their monitoring and interception are also written into protection policies by network monitoring devices such as IPS and firewalls, which cannot safely realize covert communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and client for realizing covert communication, and server
  • Method and client for realizing covert communication, and server
  • Method and client for realizing covert communication, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0045] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a client for realizing covert communication, and a server. The method comprises steps that agreement of design rules of an NTP protocol packet with the server is carried out; the uplink transmission data is added to an NTP request message according to the design rules of the NTP protocol packet, the NTP request message is sent to the server, so the server is enabled to analyze the NTP request message according to the design rules of the NTP protocol packet to acquire the uplink transmission data. The method is advantaged in that strong penetrating power, good crypticity and high availability are realized, communication crypticity and security are improved, and preventive bases for malicious utilization of a covert channel are provided.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for realizing covert communication, a client and a server. Background technique [0002] Covert communication technology is divided into encryption technology and information hiding technology. Both have their own advantages. Cryptographic technology encrypts information and turns plaintext into unrecognizable ciphertext, making encrypted information difficult to understand. But doing so brings another problem. Encryption technology encrypts plaintext into a bunch of garbled codes, which can easily arouse the desire of unauthorized persons to crack confidential information. The information hiding technology is to hide specific confidential information in some kind of public information. Since the content and characteristics of the carrier signal are displayed externally, and the public information is used as a cover, unauthorized persons will not feel the existenc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04J3/06
CPCH04J3/0667H04L63/0407H04L63/20
Inventor 马迪王伟朱越凡毛伟
Owner 北龙中网(北京)科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products