A concealed communication method in a block chain network environment

A network environment, covert communication technology, applied in the field of network security

Active Publication Date: 2018-12-18
INST OF SOFTWARE - CHINESE ACAD OF SCI +1
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the existing drawbacks of network covert channels, the present invention provides a covert communication method under the blockchain network environment, which overcomes the defects existing in the existing network covert channels, uses the time stamp mechanism of the blockchain network as a transmission reliability verification benchmark, and utilizes The peer-to-peer network transmission mechanism of the blockcha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A concealed communication method in a block chain network environment
  • A concealed communication method in a block chain network environment
  • A concealed communication method in a block chain network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Below in conjunction with accompanying drawing, the present invention will be further described through embodiment.

[0048] Such as figure 1 As shown, the concealed communication method under the block chain network of the present invention mainly includes the following steps:

[0049] (1) Information coding. The original concealed information is encoded using a previously agreed source coding or channel coding mechanism.

[0050] Specifically, the covert communication flow chart under the blockchain network is as follows: figure 2 As shown, the covert communication information encoding under the blockchain network is detailed as follows:

[0051] (1a) Using the previously agreed source coding or channel coding mechanism, which may include source coding or channel coding (for example: binary coding, Huffman coding, spreading code, etc.), the original hidden information sequence M(m 1 ,m 2 ,m 3 …m n ) to encode and generate the coded information sequence M’(m 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a concealed communication method in a block chain network environment. The original concealed information is encoded by using a predetermined source encoding or channel encoding mechanism. The encoded information is modulated with the time interval of the information by a predetermined modulation method in advance to generate a time interval sequence of normal informationtransmission to be sent to a block chain network, and each information of the time interval sequence of the normal information transmission is timestamped by a block chain mechanism. By using the P2Pnetwork transmission mechanism and the distributed chain storage mechanism under the block chain network environment, the time interval sequence of the normal information is transmitted and stored with high reliability. By observing the block chain network, the receiver of the concealed information obtains the time interval sequence of the normal information transmission sent by the sender, and the acquired information in a manner of information time interval is demodulated to obtain demodulated information; the demodulated information is decoded.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a covert communication method in a block chain network environment, which realizes covert transmission of confidential information. Background technique [0002] With the development of network technology, the security of network information communication has been paid more and more attention. On the one hand, malicious information (such as Trojan horse programs, viruses, network attacks, etc.) needs to be blocked and detected; on the other hand, the security and privacy of normal communication information (such as: commercial information, personal privacy information, etc.) Protect. Network covert channel can be applied in two aspects of network information communication security, so it is getting more and more attention. [0003] The network covert channel is defined as the communication channel that violates the communication restriction rules for covert information t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3297H04L63/12H04L2463/121
Inventor 李彦峰丁丽萍吴敬征崔强刘雪花关贝
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products