Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Architecture for protecting key data based on mimicry defense

A key data, heterogeneous technology, applied in the direction of digital data protection, electronic digital data processing, instruments, etc., can solve the problems of data encryption increase, cracking, data security depends on encryption algorithm and key, etc., to ensure normal Output, the effect of data leakage prevention

Active Publication Date: 2020-02-04
创元网络技术股份有限公司
View PDF8 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of data encryption depends on the complexity of the encryption algorithm and key, and because the complexity of data encryption increases additional overhead, it is still a static and single protection method, and there is still the possibility of being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Architecture for protecting key data based on mimicry defense
  • Architecture for protecting key data based on mimicry defense
  • Architecture for protecting key data based on mimicry defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] For the protection of data in information systems, different types of data should have different protection strengths according to their importance, otherwise the breakthrough of key data protection may even threaten the entire protection system. Therefore, improper protection of key data will become a weak link in the security of the entire information system. For example, if the access control lists (Access Control Lists, ACL) maintained by the firewall can be maliciously stolen and tampered with, the access control will lose its meaning, and the entire information system will also be exposed to security threats. In the following, the specific content of the present invention will be described in detail by taking the ACL protection problem as a use case.

[0043] Working Mechanism

[0044]The present invention introduces a mimic defense mechanism. There will be different degrees of differences in the specific application of mimic defense, and the final mechanism arc...

Embodiment 2

[0071] Such as Figure 1-2 As shown, an architecture based on mimic defense technology to protect key data, which includes heterogeneous redundant executives, distributors, arbitrators and dynamic schedulers; heterogeneous redundant executives: all heterogeneous redundant executives A pool of executives is formed, and the business function of these executives is to encrypt and decrypt data. It is emphasized here that the heterogeneous redundant execution body here is in an abstract sense, which will be explained later in the analysis of the heterogeneous dimension. Distributor: Contains two kinds of distributors, encrypted distributor and decrypted distributor. Arbiter: Carry out multi-mode adjudication, generate correct output and throw problem input according to the adjudication result. Dynamic scheduler: dynamically schedules heterogeneous redundant executives according to policies.

[0072] exist figure 2 In , the solid arrows represent the control flow, and the dashe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a framework for protecting key data based on mimicry defense. The framework comprises a heterogeneous redundant execution body, a dispatcher, a decision device and a mimicry converter, excitation is input from the dispatcher and then enters the heterogeneous redundant executor, and the mimicry converter is connected with the dispatcher, the adjustor and the mimicry converter and carries out mimicry conversion through dynamic scheduling and negative feedback control. The heterogeneous redundant executor processes the input excitation of the distributor and then outputs the processed input excitation to a decision device, and the decision device outputs a response; according to the technical scheme, the architecture is applied to data protection, so that the difficulty of stealing and tampering protected data can be greatly improved, and key data can be better protected.

Description

technical field [0001] The invention belongs to the technical field of key data protection, and in particular relates to a framework for protecting key data based on mimic defense. Background technique [0002] Today's network and information systems have become the basic infrastructure for the operation of human society. However, with the rapid development of network and information technology, the problem of information security has become more and more serious. Therefore, the issue of information security has been paid more and more attention by countries all over the world. For information security issues, most of the traditional defense technologies and methods adopt the “remedial” defense, which needs to rely on attack technology as prior knowledge to carry out targeted “point” defense. Vulnerabilities and backdoors are important entrances for attackers to successfully carry out attacks, but as a defender, they are not able to grasp all the vulnerabilities and backdo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 申智灵周清雷邓淼磊张少华刘晶波王凡冯峰李斌董召薛正元
Owner 创元网络技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products