System and method for deterring malicious network attacks
First Claim
1. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
- executing instructions on at least one of the processors to generate a plurality of random blocks of data;
generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs;
generating a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs;
encrypting a designated file using the random encryption key;
writing the plurality of random blocks and the tail value to the at least one storage medium;
writing the encrypted designated file to the at least one storage medium; and
resizing including;
removing designated blocks from the plurality of random blocks to create a subset of random blocks;
generating a new tail value using the XOR function with the random encryption key and the subset of random blocks as the XOR function inputs; and
appending the new tail value to the subset of random blocks.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
8 Citations
30 Claims
-
1. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
executing instructions on at least one of the processors to generate a plurality of random blocks of data; generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs; generating a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypting a designated file using the random encryption key; writing the plurality of random blocks and the tail value to the at least one storage medium; writing the encrypted designated file to the at least one storage medium; and resizing including; removing designated blocks from the plurality of random blocks to create a subset of random blocks; generating a new tail value using the XOR function with the random encryption key and the subset of random blocks as the XOR function inputs; and appending the new tail value to the subset of random blocks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
executing instructions on at least one of the processors to generate a pool of a plurality of random blocks; computing the XOR result of random blocks in the pool of a plurality of random blocks using the XOR function; executing instructions on at least one of the processors to select a pre-computed XOR result of random blocks; generating a tail value by using the XOR function with the pre-computed XOR result and a random encryption key as the XOR function inputs; encrypting a designated file using the random encryption key; and appending the tail value and encrypted designated file to the random blocks relating to the pre-computed XOR result. - View Dependent Claims (14)
-
-
15. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more interfaces operatively coupled to at least one of the processors; and one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium; resize by; removing designated blocks from the plurality of random blocks to create a subset of random blocks; generating a new tail value using the XOR function with the random encryption key and the subset of random blocks as the XOR function inputs; appending the new tail value to the subset of random blocks; and reclaiming storage space represented by the designated blocks. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more interfaces operatively coupled to at least one of the processors; and one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; execute instructions on at least one of the processors to generate a pool of a plurality of random blocks; compute the XOR result of random blocks in the pool of a plurality of random blocks using the XOR function; execute instructions on at least one of the processors to select a pre-computed XOR result of random blocks; generate a tail value by using the XOR function with the pre-computed XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; and append the tail value and the encrypted designated file to the random blocks relating to the pre-computed XOR result. - View Dependent Claims (27, 28)
-
-
29. A computerized method for deterring malicious network attacks, the method being performed by a computer system that comprises one or more processors and one or more storage media operatively coupled to at least one of the processors, the method comprising:
-
executing instructions on at least one of the processors to generate a plurality of random blocks of data; generating a first XOR result by using an XOR function with the plurality of random blocks of data as the XOR function inputs; generating a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypting a designated file using the random encryption key; writing the plurality of random blocks and the tail value to the at least one storage medium; and writing the encrypted designated file to the at least one storage medium; resizing by; generating a new random blocks XOR result by using the XOR function with unused random blocks from the plurality of random blocks as the XOR function inputs; generating a new and existing random blocks XOR result using the XOR function with the new random blocks XOR result and the first XOR result; generating a new tail value using the XOR function with the new random blocks XOR result and the new and existing random blocks XOR result as the XOR function inputs; and appending the unused random blocks and the new tail value to the existing random blocks.
-
-
30. A computer system for deterring malicious network attacks, the computer system comprising:
-
one or more processors; one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to; execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; write the encrypted designated file to at least one storage medium; generating a new random blocks XOR result by using the XOR function with unused random blocks from the plurality of random blocks as the XOR function inputs; generating a new and existing random blocks XOR result using the XOR function with the new random blocks XOR result and the first XOR result; generating a new tail value using the XOR function with the new random blocks XOR result and the new and existing random blocks XOR result as the XOR function inputs; and appending the unused random blocks and the new tail value to the existing random blocks.
-
Specification