Packet inspection and forensics in an encrypted network

    公开(公告)号:US10397274B2

    公开(公告)日:2019-08-27

    申请号:US15421549

    申请日:2017-02-01

    Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.

    Jaccard similarity estimation of weighted samples: scaling and randomized rounding sample selection with circular smearing

    公开(公告)号:US11615261B2

    公开(公告)日:2023-03-28

    申请号:US16579706

    申请日:2019-09-23

    Inventor: Mark Manasse

    Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.

    Packet inspection and forensics in an encrypted network

    公开(公告)号:US11336627B2

    公开(公告)日:2022-05-17

    申请号:US16512683

    申请日:2019-07-16

    Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.

    JACCARD SIMILARITY ESTIMATION OF WEIGHTED SAMPLES: SCALING AND RANDOMIZED ROUNDING SAMPLE SELECTION WITH CIRCULAR SMEARING

    公开(公告)号:US20200019814A1

    公开(公告)日:2020-01-16

    申请号:US16579706

    申请日:2019-09-23

    Inventor: Mark Manasse

    Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.

    Multi-tier file system with transparent holes

    公开(公告)号:US10203889B2

    公开(公告)日:2019-02-12

    申请号:US15168870

    申请日:2016-05-31

    Inventor: Mark Manasse

    Abstract: The technology disclosed includes access to content and encryption key rotation in a multi-generational file system that has a first tier file, and automatically initializes a second tier file accessible using a same path and file name as the first tier file. The disclosed technology includes copying forward blocks of data from the first tier file to the second tier file, and prior to completion of the copying forward, responding to an access request by accessing the second tier file by providing data available from the second tier file that has been copied forward and by following links associated with the holes to access blocks in the first tier file to provide data from the first tier file. The first tier files are encrypted using a first encryption key; and applying a second encryption key to encrypt data in the second tier files during the copying forward and write access.

    Rotatable-key encrypted volumes in a multi-tier disk partition system

    公开(公告)号:US10019383B2

    公开(公告)日:2018-07-10

    申请号:US15365658

    申请日:2016-11-30

    Inventor: Mark Manasse

    Abstract: Disclosed technology includes access to rotatable-key-encrypted content in a multi-tier disk partition system, with a first-tier-track, and initializing a second-tier-track accessible using the same block designator. A stack of bit vectors, stored in SSD memory, represents tier-tracks and a bit flag indicates whether a respective tier-track holds currently-active data or another bit vector needs to be consulted for access to a predecessor of the tier-track. Copying forward of data from the first-tier-track to the second-tier-track, as-scheduled or in response to an authorized write access to the second-tier-track includes, prior to completion, responding to an access request by providing data from the second-tier-track that has been copied forward and following mappings associated with the flag sets to provide data from the first-tier-track. First-tier-tracks are encrypted using a first encryption key; and a second encryption key is applied to encrypt data in the second-tier-tracks during the copying forward and write access.

    Jaccard similarity estimation of weighted samples: circular smearing with scaling and randomized rounding sample selection

    公开(公告)号:US10713592B2

    公开(公告)日:2020-07-14

    申请号:US15339793

    申请日:2016-10-31

    Inventor: Mark Manasse

    Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.

    PACKET INSPECTION AND FORENSICS IN AN ENCRYPTED NETWORK

    公开(公告)号:US20200053124A1

    公开(公告)日:2020-02-13

    申请号:US16512683

    申请日:2019-07-16

    Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.

    Jaccard similarity estimation of weighted samples: scaling and randomized rounding sample selection with circular smearing

    公开(公告)号:US10460203B2

    公开(公告)日:2019-10-29

    申请号:US15339796

    申请日:2016-10-31

    Inventor: Mark Manasse

    Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.

Patent Agency Ranking