SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION

    公开(公告)号:US20230334161A1

    公开(公告)日:2023-10-19

    申请号:US17723884

    申请日:2022-04-19

    CPC classification number: G06F21/602 G06F21/31 G06F21/577

    Abstract: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.

    System for implementing multi-dimensional data obfuscation

    公开(公告)号:US11580249B2

    公开(公告)日:2023-02-14

    申请号:US17173027

    申请日:2021-02-10

    Abstract: Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database.

    DYNAMIC SEGMENTATION OF NETWORK TRAFFIC BY USE OF PRE-SHARED KEYS

    公开(公告)号:US20220255747A1

    公开(公告)日:2022-08-11

    申请号:US17725445

    申请日:2022-04-20

    Abstract: Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.

    SYSTEM FOR ELECTRONIC DATA OBFUSCATION THROUGH ALTERATION OF DATA FORMAT

    公开(公告)号:US20220253541A1

    公开(公告)日:2022-08-11

    申请号:US17172494

    申请日:2021-02-10

    Abstract: Embodiments of the present invention provide a system for performing obfuscation of electronic data through alteration of data formats. The system is configured for extracting data from one or more data sources associated with an entity, determining data format associated with the data extracted from the one or more data sources, calculating, via a central decisioning engine, an exposure score associated with the data based on one or more factors, determining, via the central decisioning engine, an obfuscation algorithm from one or more obfuscation algorithms for obfuscating the data based on the exposure score and the data format associated with the data, and obfuscating the data using the obfuscation algorithm.

    Dynamic segmentation of network traffic by use of pre-shared keys

    公开(公告)号:US11343097B2

    公开(公告)日:2022-05-24

    申请号:US16889945

    申请日:2020-06-02

    Abstract: Dynamic segmentation of network traffic through the use of Pre-Shared Keys (PSKs). Each defined network segment uses a different pre-shared key and a message authentication code (MAC)-signing algorithm to sign data packets with segment-specific MACs. As such, only those computer hosts/nodes that are in the network segment (i.e., have been assigned the same pre-shared key for generating and decoding the MAC signed data packets) are capable or reading the segment's network traffic. By implementing segment-specific MAC signed data packets, the present invention allows for confidential data transmission absent the need to encrypt the actual contents/data being transmitted.

    SECURE COMMUNICATION FOR REMOTE DEVICES

    公开(公告)号:US20210377238A1

    公开(公告)日:2021-12-02

    申请号:US16890565

    申请日:2020-06-02

    Abstract: A security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.

    SYSTEM AND METHOD FOR PROVIDING COMPLEX DATA ENCRYPTION

    公开(公告)号:US20240394385A1

    公开(公告)日:2024-11-28

    申请号:US18795484

    申请日:2024-08-06

    Abstract: Various systems, methods, and computer program products are provided for complex data encryption. The method includes receiving a user input code from a computing device associated with a user. The user input code is one or more plaintext characters. The method also includes generating a first encrypted value using a first encryption algorithm based on the user input code. The method further includes decrypting the first encrypted value using one or more additional encryption algorithms. The one or more synthetic user input codes are generated by the decryption of the first encrypted value using each of the one or more additional encryption algorithms. The method still further includes determining a first encryption vulnerability score based on the value of the one or more synthetic user input codes. The method also includes causing a transmission of a user input code notification based on the first encryption vulnerability score.

Patent Agency Ranking