会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Effective protection of computer data traffic in constrained resource scenarios
    • 在受限资源情景下有效保护计算机数据流量
    • US07464171B2
    • 2008-12-09
    • US10956451
    • 2004-10-01
    • Avni H. Rambhia
    • Avni H. Rambhia
    • G06F15/173G06F15/16
    • H04L63/0272H04L9/12H04L9/36H04L63/0428H04L2209/20
    • Described is a system and method that protect certain classes of sensitive data traveling across an accessible transmission medium, such as an internal bus in a device, from automated attacks. The protection is particularly useful for resource-constrained and/or security constrained components. Automated attacks depend on analyzing data characteristics such as bit pattern signatures and/or frequency distributions to succeed. To preclude such automated attacks, various alternatives of the present invention internally alter the sensitive data at a data source prior to transmission, in a synchronized way such that the altered data is internally reversible at the destination resource. Data alteration includes interspersing random data into a data stream (e.g., bitstream or stream of packets), and interspersing data of varying length on the bus. Synchronization algorithms enable the data source and the destination resource to pad and remove the interspersed data in relatively complex ways even with resource-constrained and/or security constrained components.
    • 描述了一种系统和方法,其保护通过可访问的传输介质(例如,设备中的内部总线)行进的某些类别的敏感数据免于自动化攻击。 该保护对资源受限和/或安全约束的组件特别有用。 自动攻击取决于分析数据特征,如位模式签名和/或频率分布成功。 为了防止这种自动攻击,本发明的各种替代方案以同步的方式在数据源内部改变数据源处的敏感数据,使得改变的数据在目的地资源内部是可逆的。 数据改变包括将随机数据散布到数据流(例如,比特流或分组流)中,并且在总线上散布不同长度的数据。 同步算法使得数据源和目的地资源能够以相对复杂的方式填补和散布散布的数据,即使是资源受限和/或安全约束的组件。