-
公开(公告)号:US12081657B2
公开(公告)日:2024-09-03
申请号:US17638705
申请日:2020-08-26
发明人: Xiaowu Gai , Alex Ryutov , Tatyana Ryutov
CPC分类号: H04L9/0869 , H04L9/0618 , H04L2209/608
摘要: Examples are described for dynamically applying a digital watermark to a file, such as a dataset of genomic sequencing data. In one example, a method of dynamically applying a watermark to at least a portion of a file includes generating, using a secret key, a first random seed, generating, using the first random seed, an ordered pseudorandom set of integers, generating, using entity information and timing information, a second random seed, selecting, using the second random seed, a subset of the ordered pseudorandom set of integers, and modifying data at data locations in the file corresponding to at least a portion of the identifiers included in the subset to generate a watermarked file. The method may further include performing a check to determine whether the watermark is present in a file using a sequence of watermark elements that are generated based on the secret key.
-
公开(公告)号:US20240004969A1
公开(公告)日:2024-01-04
申请号:US17918824
申请日:2021-04-21
发明人: Xiaowu Gai , Alex Ryutov , Tatyana Ryutov
CPC分类号: G06F21/16 , G06F21/602 , G06F2221/2107
摘要: Examples are described for dynamically applying a digital watermark to a file, such as a dataset of genomic sequencing data. In one example, a method of dynamically applying a watermark to at least a portion of a file includes generating a first random seed, generating an ordered pseudorandom set of integers, generating a second random seed, selecting, using the second random seed, a subset of the ordered pseudorandom set of integers, the subset corresponding to identifiers of data locations in the file, and modifying data at data locations in the file corresponding to at least a portion of the identifiers included in the subset to generate a watermarked file. The genomic data file may be an ordered Binary Alignment Map (BAM) file storing sequencing data or a Variant Call Format (VCF) file or a list of variants storing genomic variation data.
-
公开(公告)号:US20230094541A1
公开(公告)日:2023-03-30
申请号:US17617906
申请日:2020-06-10
发明人: Xiaowu Gai , Alex Ryutov , Tatyana Ryutov
摘要: Examples are described for dynamically encrypting and/or decrypting a file formed of multiple blocks of ordered data. In one example, a method of dynamically encrypting a file to enable partial decryption of the file includes generating, using a secret key and one or more initialization vectors, a keystream for the multiple blocks of ordered data, encrypting the multiple blocks of ordered data of the file by performing a logical operation of the keystream with the multiple blocks of ordered data in a one-to-one correspondence, and building a file index of the file to identify location information of the multiple blocks of ordered data. The method may further include dynamically decrypting at least a portion of the file by decrypting at least one selected block of encrypted data of the file using a portion of the keystream, the portion of the keystream corresponding to the at least one selected block.
-
公开(公告)号:US20230048167A1
公开(公告)日:2023-02-16
申请号:US17638705
申请日:2020-08-26
发明人: Xiaowu Gai , Alex Ryutov , Tatyana Ryutov
摘要: Examples are described for dynamically applying a digital watermark to a file, such as a dataset of genomic sequencing data. In one example, a method of dynamically applying a watermark to at least a portion of a file includes generating, using a secret key, a first random seed, generating, using the first random seed, an ordered pseudorandom set of integers, generating, using entity information and timing information, a second random seed, selecting, using the second random seed, a subset of the ordered pseudorandom set of integers, and modifying data at data locations in the file corresponding to at least a portion of the identifiers included in the subset to generate a watermarked file. The method may further include performing a check to determine whether the watermark is present in a file using a sequence of watermark elements that are generated based on the secret key.
-
-
-