Covert communication method, device and system, computer and readable storage medium

A covert communication and host technology, applied in the computer field, can solve problems such as the inability to obtain target data smoothly, and achieve the purpose and advantages of being concise and easy to understand

Pending Publication Date: 2022-01-11
杭州安恒信息安全技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a covert communication method, device, system, computer, and readable storage medium to at least solve the problem of the internal-to-outward transmission when the professional department needs to obtain the data of the target in the related art. It was discovered and intercepted by the security protection equipment, which made it impossible for the professional department to successfully obtain the target data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert communication method, device and system, computer and readable storage medium
  • Covert communication method, device and system, computer and readable storage medium
  • Covert communication method, device and system, computer and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0057] Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a covert communication method, a device and a system, a computer and a readable storage medium, and the method comprises the steps: receiving a data reading program transmitted by a control end; acquiring local target data by running the data reading program, converting the target data into a data packet according to a preset coding rule, and sending the data packet to the control end, so that the control end receives the data packet and analyzes the data packet according to the coding rule to obtain the target data; wherein the data in the data packet is communicable data identified by a security protection device in the host. According to the method, the data reading program is received, the target data is obtained according to the data reading program, the target data is converted into the data packet which cannot be intercepted by the security protection equipment according to the preset coding rule, and the data packet is sent to the control end, so that the control end can analyze the data packet according to the coding rule; and receiving and acquiring the target data in a hidden manner are realized.

Description

technical field [0001] The present application relates to the computer field, in particular to a covert communication method, device, system, computer and readable storage medium. Background technique [0002] Based on security considerations, security protection devices such as firewalls are usually installed in the host. During the network communication data interaction between the host and other clients, the security protection devices usually detect the target data to prevent data from being stolen and attacked. [0003] However, in order to ensure social security, the relevant professional departments have the need to intercept the target data to conduct security analysis on the target data. At present, when the professional department acquires the target data in the host, the transmission behavior from the inside to the outside is easily detected and intercepted by the security protection equipment, which makes the professional department unable to obtain the target da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L15/00H04L67/01
CPCH04L63/306H04L15/00H04L69/04
Inventor 李起瑞杨波
Owner 杭州安恒信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products