Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information hiding access method and system based on behavior obfuscation and server

An access method and access system technology, which are applied to the information hiding access method and system based on behavior confusion, and the server field, can solve the problems of large data traffic, difficult implementation, complex and changeable transmission paths, and avoid binding relationships. , The effect of reducing the risk of leakage and clarifying the function and responsibilities

Active Publication Date: 2019-12-10
XIDIAN UNIV +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The transmission path is complex and changeable, the reliability is poor, and it is vulnerable to malicious monitoring by third parties
[0006] 2. Information security is too dependent on service providers, and behavior information is completely transparent to service providers
Its flaws are: Although asymmetric encryption is used in the data transmission process, the data sender and receiver may encounter various attacks from third parties during the protocol negotiation process; the access method additionally stipulates that the data The sender and receiver of the website stipulate that the receiver cannot be a third-party public service provider and cannot access the information provided by the public service provider on the Internet
Its defect is that it needs to configure an additional proxy server, and the realization of the anonymous access function is too dependent on the proxy server. Once there is a problem with the proxy server, the entire anonymous access system will be paralyzed. For users, all information is exposed to the proxy server. a good choice
[0019] (3) The k-anonymous method has low reliability and a large amount of data communication;
[0020] (4) The third-party-based solution is difficult to implement and has poor practicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding access method and system based on behavior obfuscation and server
  • Information hiding access method and system based on behavior obfuscation and server
  • Information hiding access method and system based on behavior obfuscation and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0083] According to the existing technology, the program of additionally configuring the client and server programs cannot access third-party public network resources; it is difficult to ensure that user information will not be leaked by the server through the program of adding a proxy server; the reliability of the k-anonymous method is low, and the data traffic Large; third-party-based solutions are difficult to implement and have poor practicability. The obfuscation-based anonymous access method of the present invention confuses real access behaviors with a large number of false access behaviors of virtual identities, re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network space security, and discloses an information hiding access method and system based on behavior confusion, and a server. The method comprises thesteps of data collection, data storage, data analysis, access preparation, user access request check, virtual identity selection, access link selection, target page access, access result return, selection of a large number of virtual user models, acquisition of a large number of simulation access links and simulation of real social behavior processes of a large number of virtual users. Accordingto the invention, the modularization of each functional component is realized, and the functional responsibility of each module is clear; the binding relationship between the identity and the behavioris avoided, and the leakage risk of the user identity information and the behavior intention is reduced. According to the invention, the virtual user identity and the virtual access link are established by analyzing the real user identity information and the behavior data of the network, and the identity information and the access intention of the real user are confused by maintaining the accessbehavior activities of a large number of virtual users, so that the purpose of information hidden access is achieved.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, and in particular relates to an information concealment access method, system and server based on behavior confusion. Background technique [0002] With the continuous and in-depth development of computer networks, the public Internet structure is becoming more and more complex, and its functions are becoming more and more perfect. Big data, cloud computing, Internet of Things, blockchain and other network technologies are integrated and developed. The inherent advantages of the network, such as speed, efficiency and reliability, continue to Increasingly, more and more sensitive data transmission tasks are entrusted to the public network. At the same time, the information concealment transmission technology of the open network has made great progress, involving information source encryption, link concealment, protocol control, message confusion and many other fields. There have emerge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/12H04L41/145H04L63/0421H04L63/20
Inventor 朱辉李鹤麟李晖兰玮张林杰赵海强
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products