Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Active Defense Method for Encrypted Information

A technology for active defense and encrypted information, applied in transmission systems, electrical components, etc., can solve problems such as high bandwidth consumption, high overhead, and poor adaptability, and achieve the effects of low overhead, good adaptability, and high concealment

Inactive Publication Date: 2020-05-19
HUAZHONG UNIV OF SCI & TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the above defects or improvement needs of the prior art, the present invention provides an active defense method for encrypting information, thereby solving the technical problems of the prior art such as high overhead, high bandwidth consumption and poor adaptability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Active Defense Method for Encrypted Information
  • An Active Defense Method for Encrypted Information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0022] like figure 1 As shown, an active defense method for encrypting information, including:

[0023] (1) Use a strong key to encrypt the real information to obtain the first ciphertext, and use a weak key to encrypt the false information and penetration code to obtain the second ciphertext;

[0024] (2) Splice the first ciphertext and the second ciphertext into one file. After the attacker ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active defense method for encrypting information, and the method comprises the steps: encrypting real information by using a strong key to obtain a first ciphertext, and encrypting false information and a penetration code by using a weak key to obtain a second ciphertext; merging the first ciphertext and the second ciphertext into one file; decrypting the second ciphertext by using the weak key to obtain false information and penetration code when an attacker steals the file; synchronously starting the penetration code when the fake information is opened by the attacker; reading the key information of the attacker through the penetration code, and returning the key information to the attacker, so that an attacked person uses the key information of the attacker for backtracking, investigation and evidence obtaining. Considering the characteristics that important information is usually stored in a confused manner and the attacker will attempt decryption after stealing the file, the present invention proposes the active defense method for encrypting information, so the method can not only encrypt the information, but also obtain evidence and even counterattack the attacker when attacked, thereby realizing low-cost and fast tracking.

Description

technical field [0001] The invention belongs to the field of cyberspace security, and more specifically relates to an active defense method for encrypted information. Background technique [0002] With the increasing popularity of the Internet and the increasing dependence of society on the Internet, network security issues are also increasing. Although people usually store information encrypted, it is still possible to be stolen or even deciphered. In the past, the encryption technology was only a passive defense. When encountering acts such as theft and deciphering, it is difficult for the victim (attacked) to implement further defense measures. Even knowing who the attacker is, sometimes suffers from being unable to provide evidence. Therefore, it is necessary to combine the functions of confidentiality, evidence collection, and even counterattack to design active defense technologies. [0003] In order to track the identity of the attacker, people have developed a vari...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478H04L63/083H04L63/0876H04L63/1458
Inventor 胡汉平刘翔谢飞龙李秀成葛钊成
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products