Vehicle Network Interface Tool
    41.
    发明申请

    公开(公告)号:US20180063098A1

    公开(公告)日:2018-03-01

    申请号:US15249670

    申请日:2016-08-29

    Abstract: A vehicle network interface tool electrically connects a computing device to an electronic control unit of a motor vehicle. The vehicle network interface tool includes a vehicle communications port to receive vehicle network data from the electronic control unit of the motor vehicle. A crypto-processor decrypts the vehicle network data and creates computing device readable data. A main processor receives the computing device readable data and transmits it to a computing device port. A computing device port is in electrical communication with the main processor. The computing device receives the computing device readable data from said main processor and transmits the computing device readable data to the computing device for analysis. Being able to receive and decrypt encrypted data keeps the integrity of the ECU security preventing hacks to the ECU.

    WILDCARD SEARCH IN ENCRYPTED TEXT USING ORDER PRESERVING ENCRYPTION

    公开(公告)号:US20180060435A1

    公开(公告)日:2018-03-01

    申请号:US15673237

    申请日:2017-08-09

    Inventor: Paul Grubbs

    CPC classification number: G06F16/951 H04L63/0281 H04L63/0471

    Abstract: A encrypted text wildcard search method enables wildcard search of encrypted text by using a permuterm index storing permuted keyword strings that are encrypted using an order preserving encryption algorithm. The permuted keyword strings are encrypted using an order preserving encryption algorithm or a modular order preserving encryption algorithm and stored in the permuterm index. In response to a search query containing a wildcard search term, the encrypted text wildcard search method transforms the wildcard search term to a permuted search term having a prefix search format. The permuted search term having the prefix search format is then used to perform a range query of the permuterm index to retrieve permuted keyword strings having ciphertext values that fall within the range query. In some embodiments, the encrypted text wildcard search method enables prefix search, suffix search, inner-wildcard search, sub string search and multiple wildcard search of encrypted text.

    Methods and systems for proxying data

    公开(公告)号:US09900290B2

    公开(公告)日:2018-02-20

    申请号:US15289889

    申请日:2016-10-10

    Inventor: Yoel Gluck

    Abstract: Methods and systems are provided for proxying data between an application server and a client device. One exemplary application system includes an application server to generate a virtual application and a proxy server coupled to the application server over a network to provide the virtual application to a client device. The proxy server receives input data from the client device and provides the input data to the application server, wherein the application server encodes the input data for an action in response to authenticating the proxy server and provides the data encoded for the action to the proxy server. The proxy server performs the action on the data and provides the result to the client device.

    Method for network communication past encryption devices

    公开(公告)号:US09887974B2

    公开(公告)日:2018-02-06

    申请号:US14931620

    申请日:2015-11-03

    CPC classification number: H04L63/0471 H04L63/0485 H04L63/18

    Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.

    Secured cloud data storage, distribution and restoration among multiple devices of a user

    公开(公告)号:US09866533B2

    公开(公告)日:2018-01-09

    申请号:US13932491

    申请日:2013-07-01

    Applicant: France Telecom

    Abstract: A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of the first electronic device. The secured server stores a first re-encryption key from the first electronic device to a second electronic device. The method is implemented by the secured server and includes the steps of determining association of the content with the second electronic device, re-encrypting the content using the first re-encryption key, sending the content to the second electronic device for encryption using a second device public key and storing the encrypted content received from the second electronic device in association with the second electronic device.

    Intercepting Secure Session upon Receipt of Untrusted Certificate

    公开(公告)号:US20170374043A1

    公开(公告)日:2017-12-28

    申请号:US15195812

    申请日:2016-06-28

    Abstract: A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device and the security gateway, receiving a first secure session request from the client device, generating a second secure session request based on the first secure session request, receiving a server certificate from the server device, sending the second secure session request to the server device, receiving first secure content from the client device over the first secure data session, creating first encrypted secure content using the first secure content and the server certificate, and sending the first encrypted secure content to the server device over the second secure data session.

Patent Agency Ranking