CN104580069A - Security defense method, device and system based on NLS (negative logic system) - Google Patents

Security defense method, device and system based on NLS (negative logic system) Download PDF

Info

Publication number
CN104580069A
CN104580069A CN201310475669.1A CN201310475669A CN104580069A CN 104580069 A CN104580069 A CN 104580069A CN 201310475669 A CN201310475669 A CN 201310475669A CN 104580069 A CN104580069 A CN 104580069A
Authority
CN
China
Prior art keywords
logic
information
items
state value
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310475669.1A
Other languages
Chinese (zh)
Other versions
CN104580069B (en
Inventor
何申
程叶霞
杨光华
刘钢庭
王丹弘
何坚安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310475669.1A priority Critical patent/CN104580069B/en
Publication of CN104580069A publication Critical patent/CN104580069A/en
Application granted granted Critical
Publication of CN104580069B publication Critical patent/CN104580069B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The invention discloses a security defense method, device and system based on an NLS (negative logic system). The method mainly comprises the following steps: a negative logic processing center receives a piece of input item information, configures at least two logic state values for the received item information according to the corresponding preset relationship between the item information and the at least two logic state values, and outputs one of the configured logic state values at random. Therefore, the one-to-one correspondence relationship between item information and logic state values adopted by an existing positive logic system is broken through, information of attack and defense parties is asymmetric, the network overhead and cost of an attacker are increased, the security of network defense is guaranteed, the cost of network defense is reduced and resources for network defense are reduced.

Description

A kind of safety defense method based on NLS negative logic system, equipment and system
Technical field
The present invention relates to filed of network information security, particularly relate to a kind of safety defense method based on NLS negative logic system, equipment and system.
Background technology
The attacking and defending of security fields, mainly comprises information network and attacks and information network defence.Attacking and defending mechanism refers to the strategy that information network attack pattern, information network defense mechanism and various mode thereof realize or means.The target of the anti-mechanism of merit is the five large attributes-confidentiality of information, integrality, availability, controllability and non-repudiation.
Along with the development of information technology, the mode of information network attack and defence constantly develops and increases, and presents synthesization, intellectuality, systematization and advanced feature.In order to network attacks, strengthen depth defense, protection information network security, the technology such as access control technology, cryptographic technique, monitoring technique, audit technique become the Critical policies technology of current network defence.Correspondingly; in order to resist cyber-defence; break through defence protection system, implementation information network attack, network Sniffer Technique, malicious code technology, Denial of Service attack technology, code breaking technology, the social engineering technology such as to learn a skill becomes the conventional means that current network is attacked.
Usual safe attacking and defending mechanism is the safe attacking and defending mechanism based on positive logic system (Positive Logic System, PLS), i.e. the state of safe attacking and defending and logical description are that forward echoes.In brief, if in a safe condition 1 time, then corresponding forward logic is safe condition 1; If when being in non-secure states 2, then corresponding forward logic is non-secure states 2; If when being in non-secure states 3, then corresponding forward logic is non-secure states 3.That is, what positive logic embodied is the corresponding relation of 1:1.As can be seen here, based on the safe attacking and defending mechanism of PLS, the information of its attacking and defending both sides is that equity is consistent.
On the basis of information equity, there is following defect in the safe attacking and defending mechanism based on PLS:
Due to attacking and defending information relation one to one, attacker can utilize vast attack colony to realize attacking, and makes the network security coefficient of defence side lower, in a disguised form adds the cyber-defence expense of defence side, improve defence side's cyber-defence cost.
Summary of the invention
Embodiments provide a kind of safety defense method based on NLS negative logic system, equipment and system, there is network security coefficient for the safe attacking and defending mechanism solved based on PLS lower, the problem that cyber-defence expense is large.
Based on a method for the Prevention-Security of NLS negative logic system, comprising:
Negative logic processing center receives a kind of items for information of input; And
According to the corresponding relation between the items for information preset and at least two logic-state value, be described items for information configuration at least two logic-state value received, and the random logic-state value exporting configuration;
Wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described state breath is corresponding, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input.
Described items for information at least comprises following one: the data message of binary representation, the data message of decimal representation, 16 are tabulated the data message, the Word message that show.
Described logic-state value is determined in the following manner:
Negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
The random logic-state value exporting configuration, comprising:
Negative logic processing center is according to the filtering algorithm preset, or the compute mode preset, and exports a logic-state value of configuration.
Based on a Prevention-Security equipment for NLS negative logic system, comprising:
Input module, for receiving an items for information of input;
Processing module, corresponding relation between the items for information preset for basis and at least two logic-state value, for described items for information configuration at least two logic-state value received, wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described state breath is corresponding;
Output module, for exporting a logic-state value of configuration at random, wherein, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input.
Described items for information at least comprises following one: the data message of binary representation, the data message of decimal representation, 16 are tabulated the data message, the Word message that show.
Described logic-state value is determined in the following manner:
Negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
Output module, specifically for the filtering algorithm that basis is preset, or the compute mode preset, export a logic-state value of configuration.
Based on a safety defense system for NLS negative logic system, comprise above-mentioned Prevention-Security equipment.
Beneficial effect of the present invention is as follows:
Embodiment of the present invention negative logic processing center receives a kind of items for information of input, and according to the corresponding relation between the items for information preset and at least two logic-state value, for described items for information configuration at least two logic-state value received, and the random logic-state value exporting configuration, break man-to-man relation between the items for information of existing positive logic system employing and logic-state value like this, realize attacking and defending two-sided information asymmetric, add assailant's network overhead and cost, provide the fail safe of cyber-defence, reduce the cost of cyber-defence, save the resource of cyber-defence.
Accompanying drawing explanation
A kind of safety defense method flow chart based on NLS negative logic system that Fig. 1 provides for the embodiment of the present invention one;
A kind of safety defense method flow chart based on NLS negative logic system that Fig. 2 provides for the embodiment of the present invention two;
A kind of Prevention-Security device structure schematic diagram based on NLS negative logic system that Fig. 3 provides for the embodiment of the present invention three;
A kind of safety defense system structural representation based on NLS negative logic system that Fig. 4 provides for the embodiment of the present invention four.
Embodiment
In order to realize object of the present invention, embodiments provide a kind of safety defense method based on NLS negative logic system, equipment and system, negative logic processing center receives a kind of items for information of input, and according to the corresponding relation between the items for information preset and at least two logic-state value, for described items for information configuration at least two logic-state value received, and the random logic-state value exporting configuration, wherein, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input, break man-to-man relation between the items for information of existing positive logic system employing and logic-state value like this, realize attacking and defending two-sided information asymmetric, add assailant's network overhead and cost, provide the fail safe of cyber-defence, reduce the cost of cyber-defence, save the resource of cyber-defence.
Below in conjunction with Figure of description, each embodiment of the present invention is described in detail.
Embodiment one:
As shown in Figure 1, be a kind of safety defense method flow chart based on NLS negative logic system that the embodiment of the present invention one provides, described method comprises:
Step 101: negative logic processing center receives a kind of items for information of input.
In a step 101, negative logic processing center receives a kind of items for information of input by communication interface, wherein, the form of expression of this items for information at least comprises following one: the data message, Word message etc. of the data message of binary representation, the data message of decimal representation, hexadecimal representation.
Such as: the items for information that negative logic processing center receives input is 01010101, determines that this items for information is the data message of binary representation; The items for information that negative logic processing center receives input is 0123456789, determines that this items for information is the data message of decimal representation; Negative logic processing center receive input items for information as well or, determine that this items for information is Word message etc.
It should be noted that, the form of expression of items for information is relatively more flexible, can be applied in security fields and represent a kind of information all items for information described in the embodiment of the present invention of state, being not specifically limited here.
Step 102: negative logic processing center, according to the corresponding relation between the items for information preset and at least two logic-state value, is described items for information configuration at least two logic-state value received.
Wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described items for information is corresponding.
In a step 102, due to the employing of negative logic processing center is the logical process mode contrary with positive logic, and that is, first, negative logic processing center presets the corresponding relation between items for information and at least two logic-state value.
Such as: N number of items for information is set in negative logic processing center inside, is denoted as: S 1, S 2..., S i..., S n, make S={S 1, S 2..., S i..., S n, so, for any one items for information S ithere is S ibelong to S, wherein, i be 1,2 ..., n}.
Particularly, negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
Suppose, N number of items for information that negative logic processing center is arranged, utilize positive logic mechanism to determine the logic-state value that each items for information is corresponding.
Such as: for above-mentioned N number of items for information, N number of items for information is S respectively 1, S 2..., S i..., S n, the logic-state value that each items for information utilizing positive logic mechanism to determine is corresponding is: S 1corresponding logic-state value is L 1, S 2corresponding logic-state value is L 2..., S icorresponding logic-state value is L i..., S ncorresponding logic-state value is L n.
Like this, negative logic processing center obtains N number of logic-state value, i.e. L={L 1, L 2..., L i..., L n.
Alternatively, negative logic processing center can directly using N number of logical entry information of determining as N number of logic-state value.
Negative logic processing center according to the corresponding relation between the items for information preset and at least two logic-state value, for each items for information in N number of items for information determines corresponding logic-state value, that is:
NLS(S i)={ L j| L j∈ L and L j≠ L i, j is 1,2 ..., n, i are 1,2 ..., n}.
Or, NLS(S i)={ S j| S j∈ S and S j≠ S i, j is 1,2 ..., n, i are 1,2 ..., n}.
It should be noted that, the form of expression of the actual items for information of the input that the representation of the items for information of negative logic processing center internal configurations can receive according to negative logic processing center is determined.
Such as: the actual items for information of the input that negative logic processing center receives is 01010101, determine the data message taking the form of binary representation of this actual items for information, so negative logic processing center is also the data message of binary representation according to the form of expression of the items for information of the actual items for information configuration received, the items for information of the negative logic processing center configuration of 01010101 correspondence is 00000000 ~ 11111111, totally 2 8individual items for information, and be that each items for information configured determines (2 of correspondence 8-1) (2 of individual items for information, or correspondence 8-1) individual logic-state value.
The actual items for information of the input that negative logic processing center receives is 0123456789, determine the data message taking the form of decimal representation of this actual items for information, so negative logic processing center is also the data message of decimal representation according to the form of expression of the items for information of the actual items for information configuration received, the items for information of the negative logic processing center configuration of 0123456789 correspondence is 0000000000 ~ 9999999999, totally 10 10individual items for information, and be that each items for information configured determines (10 of correspondence 10-1) (10 of individual items for information, or correspondence 10-1) individual logic-state value.
Step 103: negative logic processing center, after the items for information configuration logic state value for input, exports a logic-state value of configuration at random.
Wherein, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input.
In step 103, negative logic processing center for input items for information configuration logic state value after, according to preset filtering algorithm, or preset compute mode, export configuration a logic-state value.
Particularly, the multiple logic-state value corresponding for a kind of items for information or alternative items for information, negative logic processing center utilizes the compute mode or default filtering algorithm preset, determines the logic-state value to be output for this items for information or alternative items for information, and exports.
Such as: for items for information 01010101, multiple logic-state value of its correspondence or alternative items for information are 00000000 ~ 11111111, except 01010101, so negative logic processing center utilizes the compute mode or default filtering algorithm preset, determine for the logic-state value to be output of this items for information 01010101 or alternative items for information 00000000 ~ 11111111(except 01010101) in any one, namely can be 00000000, also can be 11111111, all right 00001111 etc.
It should be noted that, for same items for information, the time inputing to negative logic processing center is different, negative logic processing center may be caused to be that the logic-state value that exports of this items for information or alternative items for information are different, can improve the Prevention-Security of system like this.
By the scheme of the embodiment of the present invention one, negative logic processing center receives a kind of items for information of input, and according to the corresponding relation between the items for information preset and at least two logic-state value, for described items for information configuration at least two logic-state value received, and the random logic-state value exporting configuration, break man-to-man relation between the items for information of existing positive logic system employing and logic-state value like this, realize attacking and defending two-sided information asymmetric, add assailant's network overhead and cost, provide the fail safe of cyber-defence, reduce the cost of cyber-defence, save the resource of cyber-defence.
Embodiment two:
As shown in Figure 2, be a kind of safety defense method flow chart based on NLS negative logic system that the embodiment of the present invention two provides.The embodiment of the present invention two is the detailed descriptions to each step in the embodiment of the present invention one.The encrypted message that the embodiment of the present invention two is 6 bit digital for the items for information of input is described.Described method comprises:
Step 201: negative logic processing center receives an encrypted message be made up of 6 bit digital of input.
Wherein, encrypted message can be 6, can be also multidigit, be not specifically limited here.
In step 201, because user needs to be encrypted preservation to an office documents, for this office documents is provided with the encrypted message of 6 bit digital, such as: 123456, and by arrange 6 bit digital encrypted messages by communications interface transmission to negative logic processing center, be that this office documents arranges the strong encrypted message of Prevention-Security, to ensure the fail safe of this office documents by negative logic processing center.
Step 202: negative logic processing center is after receiving the items for information represented by 6 encrypted messages, according to the corresponding relation between the items for information preset and at least two logic-state value, determine the logic-state value that 6 encrypted messages receiving are corresponding or alternative encrypted message.
In step 202., negative logic processing center is after receiving the items for information represented by 6 encrypted messages, determine all alternative encrypted message that may exist that the items for information represented by 6 encrypted messages that receives is corresponding, such as: 000000 ~ 999999, so except the alternative encrypted message identical with 6 encrypted messages received is got rid of, using other alternative encrypted messages remaining as logic-state value corresponding to 6 encrypted messages received.
Such as: using the logic-state value of 6 bit digital of all combinations different from 123456 in 000000 ~ 999999 as 123456 or alternative encrypted message.
Step 203: negative logic processing center is Stochastic choice one from the logic-state value determined or alternative encrypted message, and export the negative logic password as 6 encrypted messages received.
Particularly, in step 203, logical process center is Stochastic choice one from the logic-state value determined or alternative encrypted message, such as: selection be 654321, so select 654321 will as the negative logic password of " 123456 ", that is, " 123456 " be hidden in 654321 encrypted messages after, assailant, before needs determine " 123456 ", first must find 654321.
As can be seen here, office documents, after the process of negative logic processing center, under the negative logic password that the system that is hidden in by the encrypted message that user is arranged generates, is convenient to the preservation of office documents, is improved the level of security of document storing.
Hypothesize attack person wants to crack this office documents, supposes to know that document cipher is 6 bit digital, so when initiating to crack attack to this office documents, needs through 10 6secondary trial just can find the negative logic password of this office documents, and after the negative logic password finding this office documents, also needs carrying out (10 6-1) encrypted message that can find this office documents is attempted in secondary attack, finally causes assailant to need initiation 10 6* (10 6-1) secondary attack just can find 6 bit digital encrypted messages of setting, that is, if encrypted message is made up of the information such as numeral, letter, symbol, assailant wants to obtain encrypted message, it will be more for performing the number of times attacked, and make success attack rate lower, on the contrary, after utilizing the process of negative logic processing center, add the reliability of Prevention-Security.
Relatively can obtain after positive logic system and negative logic system:
Supposing the system has n state, is denoted as S 1, S 2, S 3..., S n, make S={S 1, S 2, S 3..., S n, then based on NLS negative logic system, for any one state S ithe negative logic representation that ∈ S is corresponding has possible multi-form of n-1 kind, is respectively { S 1, { S 2..., { S i-1, { S i+1..., { S n.Therefore, S be judged istate value, then must have the value that the n-1 after duplicate removal is different at least, just can draw S by combination Exclusion analysis ivalue.Compared to, PLS positive logic system, judge S istate value, only need 1 value to obtain; The space of NLS negative logic system is larger.
For whole system space, the amount of space of PLS positive logic is the amount of space of n, NLS negative logic is n (n-1).When giving a logical value, the successful probability of judgement of PLS is nLS judges that successful probability is
As can be seen here, man-to-man relation between the items for information of existing positive logic system employing and logic-state value has been broken by embodiment of the present invention, realize attacking and defending two-sided information asymmetric, add assailant's network overhead and cost, provide the fail safe of cyber-defence, reduce the cost of cyber-defence, save the resource of cyber-defence.
Embodiment three:
As shown in Figure 3, be a kind of Prevention-Security device structure schematic diagram based on NLS negative logic system that the embodiment of the present invention three provides.The embodiment of the present invention three is the inventions under same inventive concept with the embodiment of the present invention one and the embodiment of the present invention two.Comprise: input module 11, processing module 12 and output module 13, wherein:
Input module 11, for receiving an items for information of input;
Processing module 12, corresponding relation between the items for information preset for basis and at least two logic-state value, for described items for information configuration at least two logic-state value received, wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described state breath is corresponding;
Output module 13, for exporting a logic-state value of configuration at random, wherein, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input.
Described items for information at least comprises following one: the data message of binary representation, the data message of decimal representation, 16 are tabulated the data message, the Word message that show.
Described logic-state value is determined in the following manner:
Negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
Output module 13, specifically for the filtering algorithm that basis is preset, or the compute mode preset, export a logic-state value of configuration.
Embodiment four:
As shown in Figure 4, be a kind of safety defense system structural representation based on NLS negative logic system that the embodiment of the present invention four provides.Safety defense system described in the embodiment of the present invention four contains the Prevention-Security equipment described in the embodiment of the present invention three, can be described as again negative logic treatment facility 21.
Particularly, described Prevention-Security equipment 21, for receiving an items for information of input, according to the corresponding relation between the items for information preset and at least two logic-state value, for described items for information configuration at least two logic-state value received, and the random logic-state value exporting configuration, wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described state breath is corresponding.
Described items for information at least comprises following one: the data message of binary representation, the data message of decimal representation, 16 are tabulated the data message, the Word message that show.
Described logic-state value is determined in the following manner:
Negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
Described Prevention-Security equipment 21, specifically for the filtering algorithm that basis is preset, or the compute mode preset, export a logic-state value of configuration.
It will be understood by those skilled in the art that embodiments of the invention can be provided as method, device (equipment) or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the flow chart of the method for the embodiment of the present invention, device (equipment) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (9)

1. based on a safety defense method for NLS negative logic system, it is characterized in that, comprising:
Negative logic processing center receives a kind of items for information of input; And
According to the corresponding relation between the items for information preset and at least two logic-state value, be described items for information configuration at least two logic-state value received, and the random logic-state value exporting configuration;
Wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described items for information is corresponding, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input.
2. the method for claim 1, is characterized in that, described items for information at least comprises following one: the data message of binary representation, the data message of decimal representation, 16 are tabulated the data message, the Word message that show.
3. the method for claim 1, is characterized in that, described logic-state value is determined in the following manner:
Negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
4. the method for claim 1, is characterized in that, the random logic-state value exporting configuration, comprising:
Negative logic processing center is according to the filtering algorithm preset, or the compute mode preset, and exports a logic-state value of configuration.
5., based on a Prevention-Security equipment for NLS negative logic system, it is characterized in that, comprising:
Input module, for receiving an items for information of input;
Processing module, corresponding relation between the items for information preset for basis and at least two logic-state value, for described items for information configuration at least two logic-state value received, wherein, do not comprise at least two logic-state value of configuration and utilize positive logic mechanism to determine the logic-state value that described state breath is corresponding;
Output module, for exporting a logic-state value of configuration at random, wherein, the random logic-state value exporting configuration is used for the Prevention-Security information of the items for information as input.
6. equipment as claimed in claim 5, it is characterized in that, described items for information at least comprises following one: the data message of binary representation, the data message of decimal representation, 16 are tabulated the data message, the Word message that show.
7. equipment as claimed in claim 5, it is characterized in that, described logic-state value is determined in the following manner:
Negative logic processing center, according to the items for information received, determines at least two kinds of items for information comprising described items for information, and utilizes positive logic machine-processed for each items for information determines a logic-state value.
8. equipment as claimed in claim 5, is characterized in that,
Output module, specifically for the filtering algorithm that basis is preset, or the compute mode preset, export a logic-state value of configuration.
9., based on a safety defense system for NLS negative logic system, it is characterized in that, comprise as arbitrary in claim 5 ~ 8 as described in Prevention-Security equipment.
CN201310475669.1A 2013-10-12 2013-10-12 A kind of safety defense method based on NLS negative logic systems, equipment and system Active CN104580069B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310475669.1A CN104580069B (en) 2013-10-12 2013-10-12 A kind of safety defense method based on NLS negative logic systems, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310475669.1A CN104580069B (en) 2013-10-12 2013-10-12 A kind of safety defense method based on NLS negative logic systems, equipment and system

Publications (2)

Publication Number Publication Date
CN104580069A true CN104580069A (en) 2015-04-29
CN104580069B CN104580069B (en) 2017-09-12

Family

ID=53095276

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310475669.1A Active CN104580069B (en) 2013-10-12 2013-10-12 A kind of safety defense method based on NLS negative logic systems, equipment and system

Country Status (1)

Country Link
CN (1) CN104580069B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101482903A (en) * 2008-01-09 2009-07-15 联想(北京)有限公司 Hardware security unit
US20100049974A1 (en) * 2007-04-16 2010-02-25 Eli Winjum Method and apparatus for verification of information access in ict systems having multiple security dimensions and multiple security levels
CN102542191A (en) * 2010-12-31 2012-07-04 深圳市证通电子股份有限公司 RTL (register transfer level) IP (intellectual property) core protecting method
CN102663185A (en) * 2012-04-06 2012-09-12 北京大学 Hardware Trojan-resisting circuit design method based on blurring processing
CN102810137A (en) * 2012-06-13 2012-12-05 天津大学 Establishing method and multiplexing method for multiplex attack mode in software security development

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100049974A1 (en) * 2007-04-16 2010-02-25 Eli Winjum Method and apparatus for verification of information access in ict systems having multiple security dimensions and multiple security levels
CN101482903A (en) * 2008-01-09 2009-07-15 联想(北京)有限公司 Hardware security unit
CN102542191A (en) * 2010-12-31 2012-07-04 深圳市证通电子股份有限公司 RTL (register transfer level) IP (intellectual property) core protecting method
CN102663185A (en) * 2012-04-06 2012-09-12 北京大学 Hardware Trojan-resisting circuit design method based on blurring processing
CN102810137A (en) * 2012-06-13 2012-12-05 天津大学 Establishing method and multiplexing method for multiplex attack mode in software security development

Also Published As

Publication number Publication date
CN104580069B (en) 2017-09-12

Similar Documents

Publication Publication Date Title
US10243732B1 (en) Cryptographic key management for end-to-end communication security
Ye et al. A secure image encryption algorithm based on chaotic maps and SHA‐3
CN101827102B (en) Data prevention method based on content filtering
CN108111295B (en) Homomorphic encryption method based on analog-to-analog operation
US20160028540A1 (en) Multiple encrypting method and system for encrypting a file and/or a protocol
CN105024803A (en) Behavioral fingerprint in a white-box implementation
US10491570B2 (en) Method for transmitting data, method for receiving data, corresponding devices and programs
US8788817B1 (en) Methods and apparatus for secure and reliable transmission of messages over a silent alarm channel
US10972441B2 (en) In-place authentication scheme for securing intra-vehicle communication
CA2981202C (en) Hashed data retrieval method
CN116668193B (en) Communication method of terminal equipment and server of Internet of things and computer readable storage medium
CN109039590A (en) Memory, electronic equipment and its encipher-decipher method for preventing side-channel attack
CN103441989A (en) Authentication and information processing method and device
CN104580069A (en) Security defense method, device and system based on NLS (negative logic system)
Huang et al. Covert communication scheme based on Bitcoin transaction mechanism
Gong Application Research of Data Encryption Algorithm in Computer Security Management
CN102710416A (en) Password encryption method for social website
CN102970145B (en) Signature method and device
Abad et al. Enhanced key generation algorithm of hashing message authentication code
CN105515775B (en) Efficient privacy protection signcryption method
Jin et al. BotCatcher: A Complementary Advantages and Deep Learning Based Scheme for Intrusion Detection
Jain et al. Enhanced data privacy in cyber-physical system using improved Chacha20 algorithm
Ren et al. A Defensive Strategy for Integrity Detection in Cyber-Physical Systems Subject to Deception Attacks
CN116599650B (en) Ciphertext deduplication method, ciphertext deduplication device, ciphertext deduplication equipment and storage medium
Elzein et al. Analyzing the challenges of security threats and personal information in mobile cloud computing infrastructure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant