-
公开(公告)号:US20180063098A1
公开(公告)日:2018-03-01
申请号:US15249670
申请日:2016-08-29
Applicant: David Robins , Jonathan Schwartz , Jeffery Quesnelle
Inventor: David Robins , Jonathan Schwartz , Jeffery Quesnelle
CPC classification number: H04L63/0471 , G06F21/44 , G06F21/606 , G06F21/64 , H04L9/0894 , H04L9/3242 , H04L63/0853 , H04L67/12 , H04L2209/84 , H04W4/44
Abstract: A vehicle network interface tool electrically connects a computing device to an electronic control unit of a motor vehicle. The vehicle network interface tool includes a vehicle communications port to receive vehicle network data from the electronic control unit of the motor vehicle. A crypto-processor decrypts the vehicle network data and creates computing device readable data. A main processor receives the computing device readable data and transmits it to a computing device port. A computing device port is in electrical communication with the main processor. The computing device receives the computing device readable data from said main processor and transmits the computing device readable data to the computing device for analysis. Being able to receive and decrypt encrypted data keeps the integrity of the ECU security preventing hacks to the ECU.
-
公开(公告)号:US20180060435A1
公开(公告)日:2018-03-01
申请号:US15673237
申请日:2017-08-09
Applicant: Skyhigh Networks, Inc.
Inventor: Paul Grubbs
CPC classification number: G06F16/951 , H04L63/0281 , H04L63/0471
Abstract: A encrypted text wildcard search method enables wildcard search of encrypted text by using a permuterm index storing permuted keyword strings that are encrypted using an order preserving encryption algorithm. The permuted keyword strings are encrypted using an order preserving encryption algorithm or a modular order preserving encryption algorithm and stored in the permuterm index. In response to a search query containing a wildcard search term, the encrypted text wildcard search method transforms the wildcard search term to a permuted search term having a prefix search format. The permuted search term having the prefix search format is then used to perform a range query of the permuterm index to retrieve permuted keyword strings having ciphertext values that fall within the range query. In some embodiments, the encrypted text wildcard search method enables prefix search, suffix search, inner-wildcard search, sub string search and multiple wildcard search of encrypted text.
-
公开(公告)号:US09900290B2
公开(公告)日:2018-02-20
申请号:US15289889
申请日:2016-10-10
Applicant: salesforce.com, inc.
Inventor: Yoel Gluck
CPC classification number: H04L63/0428 , G06F17/30867 , G06F17/30991 , H04L63/0281 , H04L63/0471 , H04L63/0884 , H04L63/126 , H04L63/1416 , H04L67/28
Abstract: Methods and systems are provided for proxying data between an application server and a client device. One exemplary application system includes an application server to generate a virtual application and a proxy server coupled to the application server over a network to provide the virtual application to a client device. The proxy server receives input data from the client device and provides the input data to the application server, wherein the application server encodes the input data for an action in response to authenticating the proxy server and provides the data encoded for the action to the proxy server. The proxy server performs the action on the data and provides the result to the client device.
-
公开(公告)号:US09894042B2
公开(公告)日:2018-02-13
申请号:US14808900
申请日:2015-07-24
Applicant: Skyhigh Networks, Inc.
Inventor: Hani T. Dawoud
CPC classification number: H04L63/0471 , G06F17/30011 , G06F21/602 , G06F21/6227 , G06F2221/2107 , H04L9/0637 , H04L63/067 , H04L67/1097
Abstract: A searchable encryption method enables encrypted search of encrypted documents based on document type. In some embodiments, the searchable encryption method is implemented in a network intermediary, such as a proxy server. The network intermediary encrypts documents on behalf of a user or an enterprise destined to be stored on a cloud service provider. The searchable encryption method encodes document type information into the encrypted search index while preserving encryption security. Furthermore, the searchable encryption method enables search of encrypted documents using the same encrypted index, either for a particular document type or for all encrypted documents regardless of the document type.
-
公开(公告)号:US20180041527A1
公开(公告)日:2018-02-08
申请号:US15785309
申请日:2017-10-16
Applicant: Shape Security, Inc.
Inventor: Justin D. Call , Xiaohan Huang , Xiaoming Zhou , Subramanian Varadarajan , Marc R. Hansen
CPC classification number: H04L63/1416 , G06F21/128 , G06F21/14 , G06F21/51 , G06F21/54 , G06F21/563 , G06F21/566 , H04L63/0428 , H04L63/0471 , H04L63/123 , H04L63/1425 , H04L63/145 , H04L63/1483 , H04L67/42
Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.
-
公开(公告)号:US09887974B2
公开(公告)日:2018-02-06
申请号:US14931620
申请日:2015-11-03
Applicant: Architecture Technology Corporation
Inventor: Deborah K. Charan , Ranga Ramanujan
IPC: H04L29/06
CPC classification number: H04L63/0471 , H04L63/0485 , H04L63/18
Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.
-
公开(公告)号:US09871776B2
公开(公告)日:2018-01-16
申请号:US15152250
申请日:2016-05-11
Applicant: Certicom Corp.
Inventor: Scott Alexander Vanstone , Marinus Struik
CPC classification number: H04L63/065 , H04L9/00 , H04L9/006 , H04L9/08 , H04L9/0833 , H04L9/0838 , H04L63/0428 , H04L63/0471 , H04L63/061 , H04L63/08 , H04L63/0876 , H04L63/104 , H04W12/04 , H04W12/06 , H04W84/18
Abstract: A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating, distributing and controlling its own keys for access to the communication network and using the keys to establish a trusted network, each device's membership to the communication network being checked periodically by other devices by using a challenge response protocol to establish which devices are allowed access to the communication network and the trusted network.
-
48.
公开(公告)号:US09866533B2
公开(公告)日:2018-01-09
申请号:US13932491
申请日:2013-07-01
Applicant: France Telecom
Inventor: Boris Chazalet , Tansir Ahmed
IPC: H04L29/06
CPC classification number: H04L63/0428 , H04L63/0442 , H04L63/0464 , H04L63/0471 , H04L63/06
Abstract: A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of the first electronic device. The secured server stores a first re-encryption key from the first electronic device to a second electronic device. The method is implemented by the secured server and includes the steps of determining association of the content with the second electronic device, re-encrypting the content using the first re-encryption key, sending the content to the second electronic device for encryption using a second device public key and storing the encrypted content received from the second electronic device in association with the second electronic device.
-
公开(公告)号:US20170374043A1
公开(公告)日:2017-12-28
申请号:US15195812
申请日:2016-06-28
Applicant: A10 Networks, Inc.
Inventor: Ali Golshan , Xuyang Jiang , Yang Yang
CPC classification number: H04L63/0471 , H04L9/3268 , H04L63/0272 , H04L63/0281 , H04L63/0823 , H04L63/1408 , H04L63/1425 , H04L63/166 , H04L2209/60 , H04L2209/76
Abstract: A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device and the security gateway, receiving a first secure session request from the client device, generating a second secure session request based on the first secure session request, receiving a server certificate from the server device, sending the second secure session request to the server device, receiving first secure content from the client device over the first secure data session, creating first encrypted secure content using the first secure content and the server certificate, and sending the first encrypted secure content to the server device over the second secure data session.
-
公开(公告)号:US20170302636A1
公开(公告)日:2017-10-19
申请号:US15639014
申请日:2017-06-30
Applicant: Seven Networks, LLC
Inventor: Lee R. Boynton , Trevor A. Fiatal , Scott M. Burke , Mark Sikes
IPC: H04L29/06
CPC classification number: H04W52/0261 , H04L9/08 , H04L9/14 , H04L51/04 , H04L51/08 , H04L51/22 , H04L51/38 , H04L63/0245 , H04L63/0272 , H04L63/0281 , H04L63/029 , H04L63/0428 , H04L63/0464 , H04L63/0471 , H04L63/061 , H04L63/065 , H04L63/08 , H04L63/0807 , H04L63/0853 , H04L63/0876 , H04L63/205 , H04L67/02 , H04L67/04 , H04L67/06 , H04L67/1095 , H04L67/14 , H04L67/42 , H04L69/329 , H04L2209/80 , H04W4/12 , H04W12/04 , H04W76/10 , H04W88/02 , H04W88/06 , Y02D70/00 , Y02D70/142
Abstract: A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
-
-
-
-
-
-
-
-
-