Data security interaction method based on host characteristic confusion

A data security and interactive method technology, applied in the direction of electronic digital data processing, program control design, instruments, etc., can solve data leakage and other problems, and achieve the effect of content concealment and data security

Active Publication Date: 2019-03-19
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Most of the security processing methods such as identity authentication and data encryption are improved on the existing network laye

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security interaction method based on host characteristic confusion
  • Data security interaction method based on host characteristic confusion

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0037] In order to illustrate more clearly, the specific embodiment of the present invention is as follows:

[0038] Such as figure 2 As shown, a data security interaction method based on host feature confusion is characterized in that it includes the following steps:

[0039] (1) Before communication, the system uses the fingerprint information of the host to construct a communication byte substitution table T, sends it to the source and the sink, and stores it in the databases of both parties. The communication byte substitution table structure consists of four columns, the first column is the primary key index, the second column is the host fingerprint information, the third column is the data content, and the fourth column is the description information of the mapping;

[0040] Wherein, the host fingerprint information stored in the database includes: operating system architecture type, system version number, running service type, service interface number, browser type, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data security interaction method based on host characteristic confusion, and relates to a method for realizing data interaction through exposure of different host fingerprint information carried by an interaction data packet to the opposite party according to a predefined rule in an open network environment by employing a home-terminal host fingerprint confusion pool bytwo communication parties. According to the method, a host fingerprint communication byte substitution list is pre-stored in two communication terminals, a plurality of heterogeneous containers are generated to dynamically construct the host fingering confusion pool, an information source triggers the corresponding heterogeneous container in the confusion pool to generate the data packet carryingspecific host fingerprint information for reply according to a data request, and an information sink analyzes and replies the fingerprint information and obtains final data by employing the substitution list. According to the method, interaction data is hidden in various standard and ordinary protocol host fingerprint characteristics, any service information is not represented, and data security interaction of two communication parties is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of safe communication between a sending and receiving party in an open network environment, in particular to a data security interaction method based on host feature confusion by constructing a heterogeneous container pool. Background technique [0002] In an open network environment, communication is faced with many defects. Information transmission passes through many intermediate nodes. These nodes are uncontrollable to users, have high risks, and are vulnerable to monitoring by illegal third parties. When data passes through malicious nodes and links, Faced with the risk of information being sniffed, extracted, tampered with and blocked. [0003] At present, there are various ways of secure network communication, including authentication of identity, encryption of data, and construction of a virtual private network, etc., but these methods still have the following problems: [0004] (1) Protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06G06F9/455
CPCH04L63/101H04L67/02H04L67/06G06F9/45504H04L67/51
Inventor 张海锋贾哲许书彬侯镇泰彬彬赵立军
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products