-
公开(公告)号:US12007908B2
公开(公告)日:2024-06-11
申请号:US15841743
申请日:2017-12-14
Applicant: ARRIS Enterprises LLC
Inventor: Rafie Shamsaasef , Lex Aaron Anderson
IPC: G06F21/00 , G06F8/41 , G06F9/54 , G06F12/14 , G06F21/14 , G06F21/54 , G06F21/60 , H04L9/06 , H04L65/75 , H04L9/40
CPC classification number: G06F12/1408 , G06F8/423 , G06F9/544 , G06F21/14 , G06F21/54 , G06F21/60 , H04L9/0631 , H04L65/75 , G06F2221/2125 , H04L63/0428 , H04L2209/16
Abstract: A method is provided to dynamically encode data at runtime with a tagged data element in a program associated with an obfuscation algorithm randomly selected during runtime. Instructions for invoking the obfuscation algorithm are generated when a compiler encounters the tagged variable in the source code. At runtime, unencoded data is encoded by the obfuscation algorithm when the unencoded data is copied to the tagged data element; encoded data is re-encoded by the obfuscation algorithm when the encoded data is copied from a differently tagged data element to the tagged data element, wherein the differently tagged data element is associated with a different obfuscation algorithm; and encoded data is decoded by the obfuscation algorithm when the encoded data is copied from the tagged data element to an untagged data element.
-
公开(公告)号:US11989318B2
公开(公告)日:2024-05-21
申请号:US17568045
申请日:2022-01-04
Applicant: BANK OF AMERICA CORPORATION
Inventor: Swetapadma Mohanty
CPC classification number: G06F21/6227 , G06F21/6245 , G06N10/40 , G06F2221/2125 , G06F2221/2141
Abstract: Embodiments of the present invention provide a system for dynamic masking of data in a network. The system is configured for receiving, via a graphical user interface, a data access request for accessing data from a user associated with an entity, determining that the data comprises sensitive information, determining that the user is not authorized to access the data, dynamically performing non-scramble masking of the data based on determining that the data comprises sensitive information and that the user is not authorized to access the data, and displaying masked data to the user, via the graphical user interface.
-
公开(公告)号:US11762963B1
公开(公告)日:2023-09-19
申请号:US16951475
申请日:2020-11-18
Applicant: Bildr, Inc.
Inventor: Mark D. Magnuson , Timothy J. Magnuson
IPC: G06F21/12
CPC classification number: G06F21/121 , G06F2221/2125
Abstract: Techniques are described for runtime checking of function metadata prior to execution of a function in an environment. An application may include any appropriate number of components at one or more levels in a hierarchical arrangement, and each component may be packaged with metadata that describes the component. A function, or any component, may be packaged with metadata that includes term(s) governing the usage of the function. The term(s) may be checked, at runtime, during execution of the application to determine whether the function is to be executed. A function may also be hashed at runtime for verification of function version. Function(s) may be individually and independently executed as containerized nano functions within the environment.
-
公开(公告)号:US20230214481A1
公开(公告)日:2023-07-06
申请号:US17570140
申请日:2022-01-06
Applicant: Citrix Systems, Inc.
Inventor: Manbinder Pal Singh
CPC classification number: G06F21/54 , G06F21/6245 , G06F21/44 , G06F1/163 , G06F21/84 , G06F2221/032 , G06F2221/2125
Abstract: Methods and systems for secure display of sensitive content are described herein. A server may receive, from a first computing device, a request for content. The content may include at least one portion that is marked as sensitive content. The server may determine that the first computing device does not satisfy an authorized device criterion, and send a modified version of the content to the first computing device. The modified version of the content may include the at least one portion that is obfuscated. The server may send an unmodified version of the content to a second computing device that satisfies the authorized device criterion. The second computing device may display the unmodified version of the content at least partially overlaid on top of the modified version of the content being displayed on the first computing device.
-
公开(公告)号:US20180321810A1
公开(公告)日:2018-11-08
申请号:US16019061
申请日:2018-06-26
Applicant: Trading Technologies International, Inc.
Inventor: Thomas Jeffrey WEISS , Patrick Joseph ROONEY , William Tigard BAKER
CPC classification number: G06F3/0484 , G06F1/163 , G06F3/011 , G06F21/6245 , G06F21/84 , G06F2221/2125 , G06Q40/04
Abstract: Systems and methods to obfuscate market data on a trading device are disclosed. An example method includes receiving market data related to a tradeable object at a first computing device, generating, by the first computing device, a trading interface to present the market data to a trader and reconfiguring the trading interface from a first mode to a second mode in response to a privacy command supplied by the trader via the first computing device. The first computing device is to obfuscate the market data presented by the trading interface when in the second mode. The example method includes receiving, by a second computing device, the obfuscated market data in response to the privacy command and generating, by the second computing device, a private interface to present the obfuscated market data to the trader in response to the privacy command.
-
公开(公告)号:US09973516B2
公开(公告)日:2018-05-15
申请号:US14621949
申请日:2015-02-13
Applicant: International Business Machines Corporation
Inventor: Matthias Seul , Artemiy A. Solyakov
IPC: H04L29/06 , H04K1/02 , H04L9/00 , H04L12/733
CPC classification number: H04L63/1408 , G06F21/606 , G06F2221/2125 , H04K1/02 , H04L9/002 , H04L45/20 , H04L63/0254 , H04L63/0272 , H04L63/029 , H04L63/0414 , H04L63/0428 , H04L2209/08
Abstract: According to one exemplary embodiment, a method for obfuscating a traffic pattern associated with a plurality of network traffic within a tunnel connection is provided. The method may include detecting the tunnel connection. The method may also include analyzing a connection environment associated with the detected tunnel connection. The method may then include determining a packet handling technique based on the analyzed connection environment, whereby the packet handling technique provides a way for creating a noise packet that will be discarded by a network stack at a target node or before the target node. The method may include determining a noise strategy based on the determined packet handling technique. The method may also include sending a plurality of noise packets into the tunnel connection based on the determined noise strategy to obfuscate the traffic pattern.
-
公开(公告)号:US09904803B2
公开(公告)日:2018-02-27
申请号:US14667916
申请日:2015-03-25
Applicant: Intel Corporation
Inventor: Bin Cedric Xing , Reshma Lal , Dheeraj Subbareddy
CPC classification number: G06F21/71 , G06F21/53 , G06F21/602 , G06F21/6281 , G06F21/74 , G06F21/78 , G06F2221/2105 , G06F2221/2107 , G06F2221/2113 , G06F2221/2125 , G06F2221/2149
Abstract: Technologies for hardening encryption operations are disclosed. In some embodiments, the technologies harden encryption operations typically performed by kernel mode programs with a secure enclave that may run in user mode and/or in a pre-boot context. In some embodiments, the technologies leverage a shared buffer and a proxy to enable the use of a secure enclave hosted in user mode to perform encryption operations. In additional embodiments, the technologies utilize one or more pre-boot applications to enable the use of a secure enclave in a pre-boot phase, e.g., so as to enable the use of a secure enclave to decrypt data that may be needed to boot a computing device.
-
公开(公告)号:US20180053007A1
公开(公告)日:2018-02-22
申请号:US15295186
申请日:2016-10-17
Applicant: Accenture Global Solutions Limited
Inventor: Simon Alexander , Paul Bendix Kollannur Sebastian , Joy Kurian
CPC classification number: G06F21/604 , G06F16/2365 , G06F16/2379 , G06F16/245 , G06F21/6218 , G06F21/6227 , G06F2221/2125 , H04L63/08 , H04L63/102 , H04L67/141
Abstract: A network communication stack running on relational processing circuitry performs control and maintenance actions on records from a database server managed by repository control circuitry. The database interaction layer of the communication stack accesses the records on the database server. The database interaction layer passes the accessed records to the data processing layer for parsing and storage as tabular entries. An operator may perform manipulations on the tabular entries using a command interface generated by the command layer of the communication stack using locally-defined interface parameters that are independent of characteristics of the database server. The data processing layer recompiles manipulated entries into an altered record. The database interaction layer sends the altered record back to the database server.
-
公开(公告)号:US20180004982A1
公开(公告)日:2018-01-04
申请号:US15709342
申请日:2017-09-19
Applicant: Intel Corporation
Inventor: JEFFREY C. SEDAYAO , IVAN JIBAJA , SRIKANTH VARADARAJAN , RESHMA LAL , SOHAM JAYESH DESAI
CPC classification number: G06F21/84 , G06F21/123 , G06F2221/2125
Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
-
公开(公告)号:US20170132420A1
公开(公告)日:2017-05-11
申请号:US15019743
申请日:2016-02-09
Applicant: Tata Consultancy Services Limited
Inventor: Nisha Ravindra SHETTY , Ashim ROY , Rahul Krushna GHODESWAR , Ashvini Sakharam MANDPE
IPC: G06F21/60
CPC classification number: G06F21/602 , G06F21/6254 , G06F2221/2125 , G09C1/04 , H04L9/00 , H04L9/0618 , H04L2209/04 , H04L2209/42
Abstract: A computer implement format preservation based masking system and method is provided. The system obtains a first set of letters and a private key, and encrypts the first set of letters to obtain an encrypted letters list using the first set and private key. The encrypted letters list comprises a set of encrypted letters. A dynamic map is generated based on the encrypted letters, which includes one or more keys, each key being specific to a letter in the first set letters. A position of each of maskable letters in a second set of letters is calculated using the dynamic map, and performs masking of the maskable letters based on the position of each of the maskable letters to obtain masked data using the dynamic map.
-
-
-
-
-
-
-
-
-