Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for integrated protection of data distributed processing in computer networks

A distributed data and computer system technology, applied in the direction of digital data protection, electronic digital data processing, digital transmission system, etc., can solve problems such as password security, destruction of anonymous identification system, leakage, etc.

Inactive Publication Date: 2004-09-08
乔治·B·古罗夫 +4
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But such a system is not reliable enough because, firstly, it is not cryptographically secure, and secondly, there is a transmission distance between the user and the agent, where the real (genuine) identifier is transmitted in public mode and may be unauthorized User interception to undermine the entire anonymous identification system
[0003] The main disadvantage of the mentioned method is that the processing of the address part of the message is carried out in the web server in open mode, using insecure e-mail programs, i.e. the processing is carried out in source code and data code
Such constituted "windows" break the entire chain of secure distributed information processing and become a possible cause of "disclosure" due to unauthorized access, including access using incidental electromagnetic radiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for integrated protection of data distributed processing in computer networks
  • Method and system for integrated protection of data distributed processing in computer networks
  • Method and system for integrated protection of data distributed processing in computer networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In Fig. 1, the integrated protection system corresponding to the distributed data processing of the exemplary embodiment of the present invention includes: a key certification, generation and distribution center (CCGDK); at least one user equipment 2 and at least one distributed data processing server 3. CCGDK1 (Fig. 2) includes a user certification subsystem 4, a secret key table generation subsystem 5, a data logic security computing system 6, a subsystem 7 for generating media for certified users, a public key generation subsystem 8, Identity verification and data integrity checking subsystem 9 , secure arithmetic processor 10 , key distribution subsystem 11 , and secure processing control unit 12 .

[0036] Each user equipment 2 (Fig. 3) comprises a secret key table generation subsystem 13, an internal random decoder 14, an internal random encoder 15, a subsystem 17 including data input from a data medium and an identity verification and data integrity checker The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to means for protecting information system against a nonauthorised intrusion. Said invention makes it possible to form a pass-through circuit for protecting a data distributed processing. The access to a computer system being obtained on a user device and on a server for the data distributed processing, a system of internal and external keys based on secret keys received from a centre for certifying, forming and distributing keys is formed. Secret internal single-use keys for a symmetrical encryption mode used for data transmission, storage and processing are generated, and a connection request to a pre-selected server is sent from the user device to the certification centre. Open keys on which the external single-use keys for symmetrical encryption mode are generated are received. For transmission to the server, sent information is encrypted by using a stochastic coding involving the use of the external single-use keys. Said information is also encrypted using secret internal signal-use symmetrical keys, processed, stochastically coded and sent to the user device.

Description

technical field [0001] The invention relates to the fields of computer networks, information systems and security devices against unauthorized access. Background technique [0002] In order for information systems based on the latest computer technology and provided to process and transmit confidential data (eg e-mails, modern payment systems, search engines) to work efficiently, it is necessary to provide ensured security for distributed data processing. The most secure type of distributed processing today is e-mail. Several methods of secure e-mail are disclosed in WO / 0049766, WO / 9817042, WO / 0001108. These methods provide confidentiality of information transmission, electronic digital signature, identity identification and verification of information sender and receiver. WO / 000108 discloses a method for providing confidentiality of the address part of a message by introducing anonymous and quasi-anonymous user identifiers. Said identifiers include names, addresses, fina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62H04L9/10H04L29/06
CPCH04L63/067G06F21/602G06F21/6218H04L63/062G06F21/606G06F11/00
Inventor 弗拉迪米尔·V·纳西普尼
Owner 乔治·B·古罗夫