Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Anonymous communication method, system and device based on internet file storage service

A storage service and file storage technology, applied in transmission systems, electrical components, digital data processing components, etc., can solve the problems of time-consuming construction and disassembly, low asynchrony, and attacker identification, reducing time and monetary cost, flexibility, and security

Active Publication Date: 2021-03-09
GUANGZHOU UNIVERSITY
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing anonymous communication systems are represented by Tor and I2P. Although the communication technology based on content encryption can protect the anonymity of communicators and communication relationships, most of these systems can only allow information to be distributed in a dedicated network composed of specially built nodes. transmission, which can lead to a series of problems
For example, building a private network requires a large amount of cost to purchase a large number of servers and bandwidth resources. If the budget for purchasing servers is low, it will not be possible to provide enough nodes to cover the identity of participants in anonymous communications, while a low bandwidth budget will lead to poor communication quality. good
However, it takes a lot of time to build and disassemble a large-scale network that can provide sufficient anonymity, and it is easy to attract attention
At the same time, these existing anonymous communication systems are often based on IP flow protocols, exchanging information among nodes with similar behaviors, usually with low asynchronicity and obvious time characteristics; the communication method is single, the data packet characteristics are obvious, and are easy to be identified by attackers. The problem is even more serious in the context of the reality of machine learning algorithm-assisted traffic identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous communication method, system and device based on internet file storage service
  • Anonymous communication method, system and device based on internet file storage service
  • Anonymous communication method, system and device based on internet file storage service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0052] In view of the problems existing in the existing technology, such as figure 1 The implementation environment shown. by figure 2 The overall schematic flow diagram shown is taken as an example to describe in detail the overall implementation process of the embodiment of the present invention in the implementation environment. The method includes the following steps:

[0053] Step S101: Initiate registration: the communication user submits an identity registration request and his own email address to the control center.

[0054] Step S102: Registration result fee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous communication method, system and device based on an internet file storage service, and the method comprises the steps: achieving the hiding of a user identity anda communication relation through a large number of user groups and access behaviors of an internet public file storage service; and using an internet public file storage service platform as an intermediate node for information forwarding, storing communication content in a data exchange file according to a specific file format, exchanging files between two communication parties in an asynchronouscommunication mode according to an agreed file exchange protocol, and achieving anonymous communication. The complete communication process comprises identity registration of a communication user, construction of a data exchange file by a sender, sending of the data exchange file by the sender, receiving of the data exchange file by a receiver, restoration of the data exchange file by the receiverand response of a communication result. The method, the system and the device can reduce the cost, guarantees the safety of communication contents and the anonymity of communicators and communicationrelationships, and can be widely applied to the technical field of network communication.

Description

technical field [0001] The present invention relates to the technical field of network security communication, in particular to an anonymous communication method, system and equipment based on Internet File Storage Service (IFSS). Background technique [0002] The existing anonymous communication systems are represented by Tor and I2P. Although the communication technology based on content encryption can protect the anonymity of the communicator and the communication relationship, most of these systems can only allow information to be distributed in a dedicated network composed of specially built nodes. transmission, which can lead to a series of problems. For example, building a private network requires a large amount of cost to purchase a large number of servers and bandwidth resources. If the budget for purchasing servers is low, it will not be possible to provide enough nodes to cover the identity of participants in anonymous communications, while a low bandwidth budget ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F1/18
CPCG06F1/182H04L63/0421H04L67/06H04L67/1097
Inventor 胡宁张弛程信达赵琰
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products