×

System and method for deterring malicious network attacks

  • US 9,483,640 B2
  • Filed: 04/01/2014
  • Issued: 11/01/2016
  • Est. Priority Date: 04/01/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:

  • executing instructions on at least one of the processors to generate a plurality of random blocks of data;

    generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs;

    generating a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs;

    encrypting a designated file using the random encryption key;

    writing the plurality of random blocks and the tail value to the at least one storage medium;

    writing the encrypted designated file to the at least one storage medium; and

    resizing including;

    removing designated blocks from the plurality of random blocks to create a subset of random blocks;

    generating a new tail value using the XOR function with the random encryption key and the subset of random blocks as the XOR function inputs; and

    appending the new tail value to the subset of random blocks.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×