System and method for deterring malicious network attacks
First Claim
1. A computer-readable storage medium, which is non-transitory, encoded with instructions that, when executed by one or more processors within a computer system, causes the computer system to:
- execute instructions on at least one of the processors to generate a plurality of random blocks of data;
generate a first result by using the plurality of random blocks of data as inputs to a logic gate function;
generate a second result by using a data file as a first input to the logic gate function and the first result as a second input to the logic gate function; and
combine the plurality of random blocks together with the second result to form an expanded file that is larger than the data file.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
15 Citations
13 Claims
-
1. A computer-readable storage medium, which is non-transitory, encoded with instructions that, when executed by one or more processors within a computer system, causes the computer system to:
-
execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first result by using the plurality of random blocks of data as inputs to a logic gate function; generate a second result by using a data file as a first input to the logic gate function and the first result as a second input to the logic gate function; and combine the plurality of random blocks together with the second result to form an expanded file that is larger than the data file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of expanding a file, comprising:
-
generating a plurality of random blocks of data; generating a first result by using a logic gate function with the plurality of random blocks of data as inputs to the logic gate function; generating a second result by using a random encryption key and the first result as inputs to the logic gate function; generating an expanded file by combining the plurality of random blocks of data with a block including the second result; generating an encrypted data file using the random encryption key on a data file; and storing at least the expanded file to a storage medium. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification