Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information hiding access method, system and server based on behavior obfuscation

An access method and access system technology, applied in the server, information concealment access method and system field based on behavior confusion, can solve the problems of large data communication volume, difficult implementation, complex and changeable transmission path, etc., to avoid binding relationship , reduce the risk of leakage, and clarify the effect of functional responsibilities

Active Publication Date: 2021-08-13
XIDIAN UNIV +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The transmission path is complex and changeable, the reliability is poor, and it is vulnerable to malicious monitoring by third parties
[0006] 2. Information security is too dependent on service providers, and behavior information is completely transparent to service providers
Its flaws are: Although asymmetric encryption is used in the data transmission process, the data sender and receiver may encounter various attacks from third parties during the protocol negotiation process; the access method additionally stipulates that the data The sender and receiver of the website stipulate that the receiver cannot be a third-party public service provider and cannot access the information provided by the public service provider on the Internet
Its defect is that it needs to configure an additional proxy server, and the realization of the anonymous access function is too dependent on the proxy server. Once there is a problem with the proxy server, the entire anonymous access system will be paralyzed. For users, all information is exposed to the proxy server. a good choice
[0019] (3) The k-anonymous method has low reliability and a large amount of data communication;
[0020] (4) The third-party-based solution is difficult to implement and has poor practicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information hiding access method, system and server based on behavior obfuscation
  • An information hiding access method, system and server based on behavior obfuscation
  • An information hiding access method, system and server based on behavior obfuscation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0083] According to the existing technology, the program of additionally configuring the client and server programs cannot access third-party public network resources; it is difficult to ensure that user information will not be leaked by the server through the program of adding a proxy server; the reliability of the k-anonymous method is low, and the data traffic Large; third-party-based solutions are difficult to implement and have poor practicability. The obfuscation-based anonymous access method of the present invention confuses real access behaviors with a large number of false access behaviors of virtual identities, re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network space security, and discloses an information concealment access method based on behavior confusion, a system, and a server; including data collection, data storage, data analysis, access preparation, user access request check, selection of virtual identity, selection of access Links, visit target pages, return visit results, select a large number of virtual user models, obtain a large number of simulated access links and simulate the real social behavior process of a large number of virtual users. The invention realizes the modularization of each functional component, and the functional responsibility of each module is clear; the binding relationship between identity and behavior is avoided, and the leakage risk of user identity information and behavior intention is reduced. The present invention establishes virtual user identities and virtual access links by analyzing network real user identity information and behavior data, maintains a large number of virtual user access behaviors, confuses real user identity information and access intentions, and realizes the purpose of information concealment access.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, and in particular relates to an information concealment access method, system and server based on behavior confusion. Background technique [0002] With the continuous and in-depth development of computer networks, the public Internet structure is becoming more and more complex, and its functions are becoming more and more perfect. Big data, cloud computing, Internet of Things, blockchain and other network technologies are integrated and developed. The inherent advantages of the network, such as speed, efficiency and reliability, continue to Increasingly, more and more sensitive data transmission tasks are entrusted to the public network. At the same time, the information concealment transmission technology of the open network has made great progress, involving information source encryption, link concealment, protocol control, message confusion and many other fields. There have emerge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/12H04L41/145H04L63/0421H04L63/20
Inventor 朱辉李鹤麟李晖兰玮张林杰赵海强
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products