System and method for deterring malicious network attacks
First Claim
1. A computer-readable storage medium, which is non-transitory, encoded with instructions that, when executed by one or more processors within a computer system that comprises one or more interfaces operatively coupled to at least one of the processors, causes the computer system at least to:
- execute instructions on at least one of the processors to generate a plurality of random blocks of data;
generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs;
generate a second XOR result by using the XOR function with a designated data file and the first XOR result as the XOR function inputs; and
write the plurality of random blocks together with the second XOR result as an expanded file that is larger than the designated data file to at least one storage medium so as to store the expanded file on the at least one storage medium.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
13 Citations
4 Claims
-
1. A computer-readable storage medium, which is non-transitory, encoded with instructions that, when executed by one or more processors within a computer system that comprises one or more interfaces operatively coupled to at least one of the processors, causes the computer system at least to:
-
execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a second XOR result by using the XOR function with a designated data file and the first XOR result as the XOR function inputs; and write the plurality of random blocks together with the second XOR result as an expanded file that is larger than the designated data file to at least one storage medium so as to store the expanded file on the at least one storage medium. - View Dependent Claims (2)
-
-
3. A method of expanding a file, comprising:
-
generating a plurality of random blocks of data; generating a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generating a second XOR result by using the XOR function with a designated data file and the first XOR result as the XOR function inputs; and writing the plurality of random blocks together with the second XOR result as an expanded file that is larger than the designated data file to at least one storage medium to store the expanded file on the at least one storage medium. - View Dependent Claims (4)
-
Specification