SYSTEM AND METHOD FOR DETERMINING MALICIOUS NETWORK ATTACKS
First Claim
1. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
- executing instructions on at least one of the processors to generate a plurality of random blocks of data;
generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs;
generating a second XOR result by using the XOR function with a designated data file and the first XOR result as the XOR function inputs; and
writing the plurality of random blocks and second XOR result to at least one storage medium.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
-
Citations
61 Claims
-
1. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
executing instructions on at least one of the processors to generate a plurality of random blocks of data; generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs; generating a second XOR result by using the XOR function with a designated data file and the first XOR result as the XOR function inputs; and writing the plurality of random blocks and second XOR result to at least one storage medium. - View Dependent Claims (2)
-
-
3. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
executing instructions on at least one of the processors to generate a plurality of random blocks of data; generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs; generating a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypting a designated file using the random encryption key; writing the plurality of random blocks and the tail value to the at least one storage medium; and writing the encrypted designated file to the at least one storage medium. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
executing instructions on at least one of the processors to generate a pool of a plurality of random blocks; and computing the XOR result of random blocks in the pool of a plurality of random blocks using the XOR function. - View Dependent Claims (17, 18)
-
-
19. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
writing a plurality of random blocks to different locations on one or more storage media; wherein each random block contains the location of the next random block to be read. - View Dependent Claims (20)
-
-
21. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more interfaces operatively coupled to at least one of the processors; and one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a second XOR result by using the XOR function with a designated data file and the first XOR result as the XOR function inputs; and write the plurality of random blocks and second XOR result to at least one storage medium. - View Dependent Claims (22)
-
-
23. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more interfaces operatively coupled to at least one of the processors; and one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more interfaces operatively coupled to at least one of the processors; and one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; execute instructions on at least one of the processors to generate a pool of a plurality of random blocks; and compute the XOR result of random blocks in the pool of a plurality of random blocks using the XOR function. - View Dependent Claims (37, 38)
-
-
39. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more interfaces operatively coupled to at least one of the processors; and one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; write a plurality of random blocks to different locations on one or more storage media; wherein each random block contains the location of the next random block to be read. - View Dependent Claims (40)
-
-
41-60. -60. (canceled)
-
61. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
generating data structures configured to expand a plurality of files on a stored on the data storage of a plurality of networked computers such that it takes a client a longer time to read data from the system'"'"'s storage media.
Specification