SYSTEM AND METHOD FOR DETERRING MALICIOUS NETWORK ATTACKS
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
5 Citations
74 Claims
-
1-61. -61. (canceled)
-
62. A computer-readable storage medium encoded with instructions that, when executed by one or more processors within a computer system, causes the computer system to:
-
execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first result by using the plurality of random blocks of data as inputs to a logic gate function; generate a second result by using a data file as a first input to the logic gate function and the first result as a second input to the logic gate function; and combine the plurality of random blocks together with the second result to form an expanded file that is larger than the data file. - View Dependent Claims (63, 64, 65, 66, 67, 68)
-
-
69. A method of expanding a file, comprising:
-
generating a plurality of random blocks of data; generating a first result by using a logic gate function with the plurality of random blocks of data as inputs to the logic gate function; generating a second result by using a random encryption key and the first result as inputs to the logic gate function; generating an expanded file by combining the plurality of random blocks of data with a block including the second result; generating an encrypted data file using the random encryption key on a data file; and storing at least the expanded file to a storage medium. - View Dependent Claims (70, 71, 72, 73, 74)
-
Specification