Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Mimic Defense System Based on Certificate Identity Authentication and Certificate Issuing Method

A certificate issuance and defense system technology, applied in the field of mimic defense system and certificate issuance based on certificate identity authentication, can solve the problems of issuance and inability to find out, and achieve the effect of high security and high security performance

Active Publication Date: 2020-06-16
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Purpose of the invention: Aiming at the defects in the prior art that certificates cannot be issued to devices in mimic defense under the premise of security, the present invention discloses a mimic defense system based on certificate identity authentication and a certificate issuing method. The mimic defense system includes The underlying device, the intermediate controller and the certificate issuance center; the intermediate controller adopting the mimic structure can effectively resist the attack of the attacker, and the back door of each heterogeneous executive is different, and the attacker cannot understand the properties of the isomer and carry out targeted attacks, each heterogeneous implementation manages a certificate revocation list, greatly improving security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Mimic Defense System Based on Certificate Identity Authentication and Certificate Issuing Method
  • A Mimic Defense System Based on Certificate Identity Authentication and Certificate Issuing Method
  • A Mimic Defense System Based on Certificate Identity Authentication and Certificate Issuing Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The scheme will be further described and explained below in conjunction with the accompanying drawings.

[0040] as attached figure 2 And attached image 3 As shown, a mimetic defense system based on certificate identity authentication includes the underlying device that needs to install a certificate, an intermediate controller, and a certificate issuance center. The intermediate controller and the certificate issuance center each have a unique certificate, and the certificate stores its own public information. key, and the corresponding private key is kept privately by each device and is not disclosed to the public.

[0041] Devices are devices that need to access the network, such as routers, PCs, mobile phones, etc. The devices include a certificate request module, which is used to generate public-private key pairs, encrypt and decrypt, generate certificate request files, and install certificates.

[0042] Among them, the intermediate controller includes a controll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mimetic defense system based on certificate identity authentication and a certificate issuing method, which are applied in the technical field of network security. The system includes bottom equipment, an intermediate controller, and a certificate issuing center. There is a unique certificate, which stores its own public key, and the corresponding private key is kept privately by each device and is not disclosed to the outside world; in the method described above, the device sends a certificate request file to the intermediate controller, and the intermediate controller issues a certificate to the certificate after verifying its identity. The center applies for a certificate, and the certificate issuing center issues the certificate and sends it to the underlying device through the intermediate controller, and the underlying device installs the certificate. The intermediate controller adopting the mimetic structure of the present invention can effectively resist the attack of the attacker, and at the same time, if the output results of the heterogeneous executives are inconsistent when the judgment module is working, it can also judge in time whether the heterogeneous executives are attacked, and repair the system in time .

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a mimetic defense system based on certificate identity authentication and a certificate issuing method. Background technique [0002] Cyberspace mimicry defense theory is an active defense theory, which is used to deal with unknown threats based on unknown vulnerabilities, backdoors, viruses or Trojan horses at the application level in different fields in cyberspace. [0003] figure 1 It is a typical dynamic heterogeneous redundant architecture of the mimic defense system. When a message is input, it is transmitted to each heterogeneous executive in the heterogeneous pool through the input agent. After all the heterogeneous executives process the message, the result is transmitted to the multi-mode arbitration module. If the results are consistent, output them. If they are not consistent, it is possible to identify an exception in the output message of a certain executi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3263H04L9/3268H04L9/3297H04L63/0442H04L63/0823H04L63/1441
Inventor 陈垚王泽雨赵海宁羊子煜郁晨陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products