Mimicry defense system based on certificate identity authentication and certificate issuing method

A technology of certificate issuance and defense system, which is applied in the field of mime defense system and certificate issuance based on certificate identity authentication, which can solve the problems of incomprehensibility and issuance, and achieve the effect of high security and high security performance

Active Publication Date: 2020-04-14
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Purpose of the invention: Aiming at the defects in the prior art that certificates cannot be issued to devices in mimic defense under the premise of security, the present invention discloses a mimic defense system based on certificate identity authentication and a certificate issuing method. The mimic defense system includes The underlying device, the intermediate controller and the certificate issuance center; the intermediate controller adopting the mimic structure can effectively resist the attack of the attacker, and the back door of each heterogeneous executive is different, and the attacker cannot understand the properties of the isomer and carry out targeted attacks, each heterogeneous implementation manages a certificate revocation list, greatly improving security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry defense system based on certificate identity authentication and certificate issuing method
  • Mimicry defense system based on certificate identity authentication and certificate issuing method
  • Mimicry defense system based on certificate identity authentication and certificate issuing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The scheme will be further described and explained below in conjunction with the accompanying drawings.

[0041]as attached figure 2 And attached image 3 As shown, a mimetic defense system based on certificate identity authentication includes the underlying device that needs to install a certificate, an intermediate controller, and a certificate issuance center. The intermediate controller and the certificate issuance center each have a unique certificate, and the certificate stores its own public information. key, and the corresponding private key is kept privately by each device and is not disclosed to the public.

[0042] Devices are devices that need to access the network, such as routers, PCs, mobile phones, etc. The devices include a certificate request module, which is used to generate public-private key pairs, encrypt and decrypt, generate certificate request files, and install certificates.

[0043] Among them, the intermediate controller includes a control...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mimicry defense system based on certificate identity authentication and a certificate issuing method. The system is applied to the technical field of network security, and comprises bottom-layer equipment, an intermediate controller and a certificate issuing center, the intermediate controller and the certificate issuing center are respectively provided with a unique certificate, a public key and a corresponding private key of the certificate are stored in the certificate, and the corresponding private key is stored privately by each piece of equipment and is not disclosed to the outside; according to the method, a device sends a certificate request file to an intermediate controller, the intermediate controller applies for a certificate to a certificate issuing center after verifying the identity, the certificate issuing center issues the certificate and sends the certificate to an underlying device through the intermediate controller, and the underlying device installs the certificate. The intermediate controller of the mimicry structure can effectively resist attacks of attackers, meanwhile, when the judgment module works, if the output results of the heterogeneous executors are inconsistent, whether the heterogeneous executors are attacked can be judged in time, and the system can be maintained in time.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a mimetic defense system based on certificate identity authentication and a certificate issuing method. Background technique [0002] Cyberspace mimicry defense theory is an active defense theory, which is used to deal with unknown threats based on unknown vulnerabilities, backdoors, viruses or Trojan horses at the application level in different fields in cyberspace. [0003] figure 1 It is a typical dynamic heterogeneous redundant architecture of the mimic defense system. When a message is input, it is transmitted to each heterogeneous executive in the heterogeneous pool through the input agent. After all the heterogeneous executives process the message, the result is transmitted to the multi-mode arbitration module. If the results are consistent, output them. If they are not consistent, it is possible to identify an exception in the output message of a certain executi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3263H04L9/3268H04L9/3297H04L63/0442H04L63/0823H04L63/1441
Inventor 陈垚王泽雨赵海宁羊子煜郁晨陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products