Cryptographic configuration enforcement

    公开(公告)号:US10979403B1

    公开(公告)日:2021-04-13

    申请号:US16003889

    申请日:2018-06-08

    Abstract: A system and method for providing data such as credentials to a third-party service while protecting the data from being transmitted to unintended locations. The system receives a first request containing encrypted data and information identifying the third-party service, validates that the first request is to be transmitted to the third-party service, generates a second request by replacing the encrypted data from the first request with unencrypted data, and transmits the second request to the third-party service.

    Searching encrypted data stores
    2.
    发明授权

    公开(公告)号:US11494499B1

    公开(公告)日:2022-11-08

    申请号:US17182930

    申请日:2021-02-23

    Abstract: Disclosed are various embodiments for searching encrypted data stores. A first computing device can send a message authentication code (MAC) to a second computing device the MAC representing a tuple of a name of a data table, an identifier of a column of the data table, and a valid value for the column. Then, an encrypted bitmap can be received from the second computing device and decrypted to generate a decrypted bitmap. Bitwise operations can be performed on the decrypted bitmap to identify a plurality of encrypted rows of the data table containing a cell that comprises the valid value. Then, at least the plurality of at least partially encrypted rows of the data table can be requested from the second computing device and decrypted to generate a respective plurality of decrypted rows.

    Searchable encrypted data stores
    4.
    发明授权

    公开(公告)号:US11003783B1

    公开(公告)日:2021-05-11

    申请号:US16137987

    申请日:2018-09-21

    Abstract: Disclosed are various embodiments for searchable encrypted data stores. A plurality of rows in a data table that have a cell in a column of the row that matches a value are identified. A bitmap that represents the plurality of rows is generated. The bitmap is encrypted. A key is then generated for a key-value pair. The key can be represented by a message authentication code (MAC) based at least in part on a tuple of a name of the data table, an identifier of the column, and the value. The key-value pair with the key and the encrypted bitmap is then sent to a remote computing device for storage.

Patent Agency Ranking