Protection of databases, data transmissions and files without the use of encryption

    公开(公告)号:US11556669B2

    公开(公告)日:2023-01-17

    申请号:US17832483

    申请日:2022-06-03

    申请人: CyberAdjust, LLC

    发明人: Ronald M Harstad

    IPC分类号: G06F21/62 G06F16/22 G06F7/72

    摘要: A permutation algorithm using modular arithmetic is applied to the cells of one or more specific fields of a database or other file type. This permutation reorders the cells of the specific field(s) without altering content of any individual cell, thereby hiding relationships between cells of the permuted field(s) and the other information in the associated records. The permutation algorithm may use modular addition and modular subtraction, in either order. Different permutation algorithms may use varying numbers of parameters. To locate a specific cell in a permuted field, the parameter(s) from the permutation, an identification of the specific record associated with the cell, and an identification of the specific permuted field are applied in a modular arithmetic operation. A specific record with which a specific cell in a permuted field is associated may be obtained by an inverse modular arithmetic operation.

    Database schema branching workflow, with support for data, keyspaces and VSchemas

    公开(公告)号:US11531653B2

    公开(公告)日:2022-12-20

    申请号:US17707884

    申请日:2022-03-29

    申请人: PlanetScale, Inc.

    IPC分类号: G06F16/21

    摘要: A branch of a main database is created, comprising a copy of the main database schema. A user edits the branch and requests that it be merged back into the main database. A schema diff is generated and used to determine differences between the main database and the edited branch. The merge is performed if it does not create a conflict. A second branch is created and edited by a second user. When the second user indicates to merge the second branch back into the main database, differences between the two branches are determined, relative to the main database. If merging the second branch back into the main database on top of the first branch does not create a conflict, a three-way merge is performed of the first branch, the second branch, and the version of the main database from which the first and second branches were generated.

    Detecting and preventing password leakage using a device-level network filter

    公开(公告)号:US11146533B1

    公开(公告)日:2021-10-12

    申请号:US16363344

    申请日:2019-03-25

    发明人: Ming Chen

    IPC分类号: H04L29/06 H04L12/46

    摘要: A user name, password and associated domain are stored for each account managed by a password manager on a computing device. A device-level network extension filters network traffic. Passwords are identified in outbound network traffic. Target domains to which identified passwords are being transmitted are compared to stored domains associated with the identified passwords. Based on results of these comparisons, it is determined whether attempts to transmit passwords to target domains are legitimate or not. In response to determining that a specific attempt to transmit a password to a target domain is legitimate, the transmission is allowed to proceed. Responsive to determining that a given attempt to transmit a password to a target domain is not legitimate, a corresponding security action is taken. For example, the connection over which the non-legitimate password transmission attempt is being made can be terminated, or the transmission attempt can be blocked.

    Augmenting service provider and third party authentication
    6.
    发明授权
    Augmenting service provider and third party authentication 有权
    增强服务提供商和第三方认证

    公开(公告)号:US09137228B1

    公开(公告)日:2015-09-15

    申请号:US13930605

    申请日:2013-06-28

    发明人: Keith Newstadt

    IPC分类号: H04L29/06

    CPC分类号: H04L63/08 H04L2463/082

    摘要: An SP's default user authentication is automatically augmented. An access request from a user is redirected from the SP to an authentication augmentation system. The SP also sends an augmentation request. The augmentation system redirects the access request to an IdP, and receives back an authenticated user identity. The default authentication is automatically augmented with additional techniques such as identity proofing and/or multifactor authentication, without the SP or the IdP modifying their code to implement or integrate the augmented authentication. Responsive to successfully authenticating the user according to the additional techniques, an augmented authenticated user identity is redirected to the SP. The augmentation system can use an identity management protocol such as SAML to communicate with the SP and IdP. Authentication performed by a third party and extended to the SP can be augmented, in which case a session id can be used to access third party services.

    摘要翻译: SP的默认用户身份验证将自动扩充。 来自用户的访问请求从SP重定向到认证增强系统。 SP还发送增补请求。 增强系统将访问请求重定向到IdP,并接收经过身份验证的用户身份。 使用附加技术(如身份打样和/或多因素身份验证)自动增加默认身份验证,无需SP或IdP修改其代码来实现或集成增强的身份验证。 响应于根据附加技术成功地认证用户,增强的认证用户身份被重定向到SP。 增强系统可以使用身份管理协议(如SAML)与SP和IdP通信。 可以增强由第三方执行并扩展到SP的认证,在这种情况下可以使用会话ID来访问第三方服务。

    Calculating domain registrar reputation by analysis of hosted domains
    7.
    发明授权
    Calculating domain registrar reputation by analysis of hosted domains 有权
    通过分析托管域来计算域名注册商信誉

    公开(公告)号:US09130962B2

    公开(公告)日:2015-09-08

    申请号:US12164751

    申请日:2008-06-30

    IPC分类号: G06F11/00 H04L29/06

    CPC分类号: H04L63/105 H04L63/1433

    摘要: Reputations of domain registrars are calculated based on the hosting of risky domains. The more undesirable domains a registrar hosts, the lower is its reputation. The risk level of the hosted domains is also a factor in determining the reputation. When a user attempts to access a hosted domain, the calculated reputation of the hosting domain registrar is used in determining what security steps to apply to the access attempt. The worse the reputation of the hosting registrar, the more security is applied, all else being equal.

    摘要翻译: 域名注册商的声明根据承担风险域计算。 注册商主管的不合需要的域名越低,它的声誉就越低。 托管域的风险级别也是确定声誉的一个因素。 当用户尝试访问托管域时,使用主机域注册器计算的声誉来确定应用于访问尝试的安全步骤。 托管注册商的声誉越差,应用的安全性就越大,其他一切都相同。

    Extending secure single sign on to legacy applications
    8.
    发明授权
    Extending secure single sign on to legacy applications 有权
    将安全单点登录扩展到旧版应用程序

    公开(公告)号:US09118657B1

    公开(公告)日:2015-08-25

    申请号:US14160553

    申请日:2014-01-22

    IPC分类号: H04L29/06 G06F21/41

    摘要: A secure single sign on is extended to a legacy web application that does not support the specific user authentication technique being used, such as SAML or OAuth. A proxy intercepts a request by a client computer to access the legacy application, and forwards the intercepted request to a single sign on identity provider. The identity provider authenticates the user, using the specific authentication technique not supported by the legacy application, and provides an indication of success to the proxy. The proxy transmits a user id and master password wrapped in an HTTP request to the legacy web application, which authenticates the request, creates a session and provides corresponding cookies to the proxy. The proxy forwards the cookies to the client, which utilizes them to continue the session with the legacy application.

    摘要翻译: 一个安全的单一登录扩展到不支持正在使用的特定用户认证技术(如SAML或OAuth)的旧版Web应用程序。 代理人拦截客户端计算机访问遗留应用程序的请求,并将截获的请求转发到身份提供者上的单一签名。 身份提供者使用遗留应用程序不支持的特定认证技术来验证用户,并向代理提供成功的指示。 该代理将包含在HTTP请求中的用户ID和主密码传送到遗留Web应用程序,后者对该请求进行身份验证,创建会话并向代理提供相应的Cookie。 代理将cookie转发到客户端,利用它们继续与旧应用的会话。

    Live, real time bookmarking and sharing of presentation slides
    9.
    发明授权
    Live, real time bookmarking and sharing of presentation slides 有权
    实时,实时的书签和分享幻灯片

    公开(公告)号:US09092533B1

    公开(公告)日:2015-07-28

    申请号:US13407597

    申请日:2012-02-28

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30873 G06F17/30884

    摘要: Individual slides of a live presentation are isolated and processed in real-time. A digital presentation document comprising multiple slides in a specific sequence is read. For each specific slide in the presentation document, a corresponding separate slide object can be created. While the slides of the presentation are being displayed on a video output device, users can bookmark the specific slide currently being displayed. Associations are stored between specific users and their bookmarked slides, which can be used to subsequently provide the individual bookmarked slides to the corresponding users. Users can also post links to specific slides being displayed to their accounts on various sites, such as third-party social networking sites. Additionally, the specific slide currently being displayed on the video output device can be maintained at a single specific network location, which can be accessed by users operating mobile computing devices.

    摘要翻译: 实时演示的个人幻灯片被隔离并实时处理。 读取包含特定顺序的多个幻灯片的数字演示文稿。 对于演示文稿中的每个特定幻灯片,可以创建相应的单独幻灯片对象。 当演示文稿的幻灯片正在显示在视频输出设备上时,用户可以将当前正在显示的特定幻灯片加入书签。 关联被存储在特定用户和它们的加书签的幻灯片之间,这些幻灯片可用于随后将各个加书签的幻灯片提供给相应的用户。 用户还可以发布到各种网站(如第三方社交网站)上显示给他们帐户的特定幻灯片的链接。 此外,目前在视频输出设备上显示的特定幻灯片可以被保持在单个特定网络位置,这可以由操作移动计算设备的用户访问。

    Detecting malware signed with multiple credentials
    10.
    发明授权
    Detecting malware signed with multiple credentials 有权
    检测用多个凭据签名的恶意软件

    公开(公告)号:US08996875B1

    公开(公告)日:2015-03-31

    申请号:US12882882

    申请日:2010-09-15

    IPC分类号: G06F21/00 G06F21/56

    CPC分类号: G06F21/566 G06F21/562

    摘要: Malware that is signed with multiple, valid credentials is detected. A central computer such as a server receives secure hashes of signed application bodies and immutable portions of corresponding digital signatures for a plurality of signed applications from a plurality of client computers. Received secure hashes of signed application bodies are compared. Multiple instances of a single signed application are identified based on the comparing of multiple received secure hashes of signed application bodies. Responsive to identifying multiple instances of the single signed application, received secure hashes of immutable portions of digital signatures corresponding to identified multiple instances of the single signed application are compared. Responsive to the results of this comparing, a potential maliciousness of the signed application is adjudicated.

    摘要翻译: 检测到具有多个有效凭据的恶意软件。 诸如服务器的中央计算机从多个客户端计算机接收多个签署的应用程序的签名应用程序主体的安全散列和相应数字签名的不可变部分。 对已签名的应用程序体的安全散列进行了比较。 基于签名的应用程序主体的多个接收到的安全散列的比较来识别单个签名应用程序的多个实例。 响应于识别单个签名的应用的多个实例,对与识别的单个签名的应用的多个实例相对应的数字签名的不可变部分的接收的安全散列进行比较。 响应此比较的结果,签署的申请的潜在恶意被裁定。