CRYPTOGRAPHIC SERVICES UTILIZING COMMODITY HARDWARE

    公开(公告)号:US20190089529A1

    公开(公告)日:2019-03-21

    申请号:US15706575

    申请日:2017-09-15

    IPC分类号: H04L9/08 G06F21/60

    摘要: The solution herein describes a software module that works in combination with certain hardware (e.g., a particular chipset) to obtain the level of security provided by an HSM. The software module can be implemented on a commodity server. The software module can utilize an HSM or key custodian to obtain cryptographic keys. The cryptographic keys may be stored on the commodity server within a secure memory space managed by the commodity server's chip set. While stored, access to the cryptographic keys may be managed by the chip set. The chip set can ensure that only protected applications associated with the cryptographic keys may access said keys.

    Total internal reflection photoconductive switch

    公开(公告)号:US10530362B2

    公开(公告)日:2020-01-07

    申请号:US15806243

    申请日:2017-11-07

    IPC分类号: H03K17/78 H01L31/10

    摘要: A total internal reflection photoconductive switch and method of activating such a switch, where the switch includes a pair of electrodes on opposite sides of a photoconductive material having a substantially-rectangular prism geometry. The substantially-rectangular prism geometry includes four edge facets, two opposing electrode-connection facets separated by the edge facets, and at least one input facet located at a corner of the substantially-rectangular prism geometry that is positioned between two edge facets and the two electrode-connection facets, for receiving light therethrough into the photoconductive material at angles supporting total internal reflection.

    INCREASING SEARCH ABILITY OF PRIVATE, ENCRYPTED DATA
    5.
    发明申请
    INCREASING SEARCH ABILITY OF PRIVATE, ENCRYPTED DATA 审中-公开
    增加私人,加密数据的搜索能力

    公开(公告)号:US20160232362A1

    公开(公告)日:2016-08-11

    申请号:US15041783

    申请日:2016-02-11

    申请人: Adam Conway

    发明人: Adam Conway

    IPC分类号: G06F21/60 G06F17/30

    摘要: Techniques are provided to allow full search for encrypted data within a database. In some embodiments, searchable data may be separated into different searchable tables in a database in such a way that encrypted data is stored as plaintext but has no usable link to other data within the source database. In some embodiments, performing a query on a particular user data may result in the retrieval of an encrypted identifier, which may then be decrypted via an encryption module. A second search based on the decrypted identifier may produce a set of relevant search results from a source table.

    摘要翻译: 提供了技术来允许对数据库内的加密数据进行全面搜索。 在一些实施例中,可搜索数据可以以加密数据被存储为明文但没有到源数据库内的其他数据的可用链接的方式分离到数据库中的不同可搜索表中。 在一些实施例中,对特定用户数据执行查询可以导致检索加密的标识符,然后可以经由加密模块来解密。 基于解密的标识符的第二搜索可以从源表生成一组相关的搜索结果。

    CRYTOGRAPHY DATA MANAGEMENT
    7.
    发明申请

    公开(公告)号:US20210034761A1

    公开(公告)日:2021-02-04

    申请号:US16530478

    申请日:2019-08-02

    申请人: Adam Conway

    发明人: Adam Conway

    IPC分类号: G06F21/60 G06F16/23

    摘要: A database management tool performs updates or sequential operations to large databases. A configuration file specifies source, destination (if different than source), encryption status, order, throttling limits, and number of threads to maintain, among other settings. A queue table points the tool at the database to be converted and maintains current row ID and status. The queue table may also hold the location of a hardware security module (HSM) if one is used for encryption, decryption, or hashing. The database management tool may use the configuration file to retrieve a record, perform the specified action, such as sending the record to an HSM for decryption with an old key and encryption with a new key, and replacing the old record with the updated record. The queue table may be updated with a running record of where the last operation occurred to allow rollbacks if necessary.

    MONITORING AND LIMITING REQUESTS TO ACCESS SYSTEM RESOURCES
    9.
    发明申请
    MONITORING AND LIMITING REQUESTS TO ACCESS SYSTEM RESOURCES 有权
    监控和限制访问系统资源的要求

    公开(公告)号:US20130086258A1

    公开(公告)日:2013-04-04

    申请号:US13626063

    申请日:2012-09-25

    IPC分类号: H04L29/06

    摘要: Systems, apparatuses and methods for preventing requests to access a system's resources from having a negative impact on higher priority data processing operations being performed by the system. The invention is directed to preventing the number of calls made by a merchant's applications through an application programming interface (API) for access to the lower priority services of a merchant service provider from having a negative impact on the ability of the service provider to perform the processing necessary to support higher priority services. The invention provides a user interface that may be used by a merchant or the service provider to configure the operation of a “throttle” that is designed to generate an alert when the number of calls by a merchant application for access to a specific service provider function or application exceeds a value or limit, where exceeding the value or limit may indicate a malfunction of the merchant's application or an attack by a malicious agent.

    摘要翻译: 用于防止访问系统资源的请求对系统执行的较高优先级数据处理操作具有负面影响的系统,装置和方法。 本发明旨在通过用于访问商务服务提供商的较低优先级服务的应用程序编程接口(API)来防止商家应用的呼叫数量对服务提供商执行服务提供商的能力产生负面影响 支持更高优先级服务所需的处理。 本发明提供了一种用户界面,其可由商家或服务提供商使用,以配置当商业应用程序访问特定服务提供者功能或应用程序的呼叫次数时被设计为生成警报的节气门的操作 超过价值或限制,超过价值或限制可能表示商人的应用程序的故障或恶意代理商的攻击。

    INCREASING SEARCH ABILITY OF PRIVATE, ENCRYPTED DATA

    公开(公告)号:US20200134199A1

    公开(公告)日:2020-04-30

    申请号:US16143915

    申请日:2018-09-27

    申请人: Adam Conway

    发明人: Adam Conway

    摘要: Techniques are provided to allow full search for encrypted data within a database. In some embodiments, searchable data may be separated into different searchable tables in a database in such a way that encrypted data is stored as plaintext but has no usable link to other data within the source database. In some embodiments, performing a query on a particular user data may result in the retrieval of an encrypted identifier, which may then be decrypted via an encryption module. A second search based on the decrypted identifier may produce a set of relevant search results from a source table.