A Key Heterogeneous Defense Method

A key and heterogeneous technology, which is applied in the field of network security, can solve the problem of too much cache in the clock controller, and achieve the effect of increasing attack difficulty, increasing uncertainty, and increasing attack difficulty

Active Publication Date: 2021-03-12
ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the deficiencies in the above-mentioned prior art, the object of the present invention is to provide a key heterogeneous defense method to prevent the attacker from repeatedly attacking the probing rule, the attacker crossing the voting device to attack, and the problem of time delay during dynamic encryption. At the same time, the clock controller can also solve the problem of excessive cache, ensuring that users enjoy safe and stable web services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Key Heterogeneous Defense Method
  • A Key Heterogeneous Defense Method
  • A Key Heterogeneous Defense Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0025] A key heterogeneous defense method, involving the user end, the forwarding control end and the server cluster end, such as figure 1 shown.

[0026] The forwarding control terminal includes a distributor, a cache pool, a key generator and a voter; after receiving a user request, the forwarding control terminal will encrypt the request information in different ways and distribute it to Different executives on the server cluster side; the forwarding control end can also process the results re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key heterogeneous defense method. According to the technical scheme adopted by the invention, the method comprises the steps of initiating a service request by a user on a user side according to the needs of the user; after receiving the user service request information, applying to a buffer pool for encryption by a forwarding control terminal; returning two encryption modes to a distributor and synchronizing a decryption mode of one of the encryption modes to executive bodies which receive the information by the buffer pool; transmitting the information encrypted byadopting the encryption mode provided with the decryption mode and the other encryption mode to the executive bodies by the distributor and repeating the method to generate 2n encryption and decryption modes, where the n is the number of executive bodies; after receiving the encrypted information, decrypting the information to generate result information, encrypting the result information and returning to a voter by the executive bodies; and making a vote according to a voting algorithm and returning the result to the user by the voter. The method disclosed by the invention has the advantagesthat while attackers are confused, the executive body non-external attack abnormality caused by the delay of the executive body decryption mode after the encryption modes are transformed is solved atthe same time.

Description

technical field [0001] The invention relates to the field of network security, in particular to a key heterogeneous defense method. Background technique [0002] In today's network environment, the Web service system, as an important service bearing and providing platform, is a virtual representative of the government, enterprises and individuals on the Internet, which brings together massive data resources, such as user information, enterprise data, financial finance, business secrets, The importance of intellectual property rights, customer order information, etc. is self-evident. Therefore, the Web server becomes the main attack target of network hackers. Network hackers use various channels, various attack tools, and various deceptive means to obtain the information they want. [0003] Under normal circumstances, the encryption method of the dynamic heterogeneous defense system is only ordinary dynamic encryption, and the encryption method is fixed within a certain per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/062H04L63/067H04L63/068H04L63/1441H04L63/205
Inventor 李沁园韩嘉佳孙歆吕磅李霁远孙昌华张波管小娟唐源马博林
Owner ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products