A data security interaction method based on host characteristic obfuscation

A technology of data security and interactive method, applied in the fields of electronic digital data processing, instruments, computing, etc., can solve problems such as data leakage, and achieve the effect of content concealment and data security

Active Publication Date: 2021-02-26
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Most of the security processing methods such as identity authentication and data encryption are improved on the existing network layer 2 and above protocols. During data transmission, there are still protocol features that can be analyzed, resulting in the risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security interaction method based on host characteristic obfuscation
  • A data security interaction method based on host characteristic obfuscation

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0037] In order to illustrate more clearly, the specific embodiment of the present invention is as follows:

[0038] Such as figure 2 As shown, a data security interaction method based on host feature confusion is characterized in that it includes the following steps:

[0039] (1) Before communication, the system uses the fingerprint information of the host to construct a communication byte substitution table T, sends it to the source and the sink, and stores it in the databases of both parties. The communication byte substitution table structure consists of four columns, the first column is the primary key index, the second column is the host fingerprint information, the third column is the data content, and the fourth column is the description information of the mapping;

[0040] Wherein, the host fingerprint information stored in the database includes: operating system architecture type, system version number, running service type, service interface number, browser type, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data security interaction method based on host feature confusion, which involves in an open network environment, the communication parties use the fingerprint confusion pool of the local host to expose the interactive data packets carrying different host fingerprint information according to predefined rules. To the other party, the method of realizing data interaction. The invention pre-stores the host fingerprint communication byte substitution table at both ends of the communication, and generates a plurality of heterogeneous containers to dynamically build a host fingerprint confusion pool. The information source triggers the corresponding heterogeneous container in the confusion pool according to the data request, and generates a specific host carrying The data packet of the fingerprint information is replied, and the sink analyzes and replies the fingerprint information, and the final data is obtained by using the substitution table. The present invention hides the interaction data in the fingerprint features of standard and common various protocol hosts, does not represent any business information, and ensures the safe data interaction between the communication parties.

Description

technical field [0001] The present invention relates to the technical field of safe communication between a sending and receiving party in an open network environment, in particular to a data security interaction method based on host feature confusion by constructing a heterogeneous container pool. Background technique [0002] In an open network environment, communication is faced with many defects. Information transmission passes through many intermediate nodes. These nodes are uncontrollable to users, have high risks, and are vulnerable to monitoring by illegal third parties. When data passes through malicious nodes and links, Faced with the risk of information being sniffed, extracted, tampered with and blocked. [0003] At present, there are various ways of secure network communication, including authentication of identity, encryption of data, and construction of a virtual private network, etc., but these methods still have the following problems: [0004] (1) Protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06G06F9/455
CPCH04L63/101H04L67/02H04L67/06G06F9/45504H04L67/51
Inventor 张海锋贾哲许书彬侯镇泰彬彬赵立军
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products