Method and apparatus for providing secure image encryption and decryption
    2.
    发明授权
    Method and apparatus for providing secure image encryption and decryption 有权
    用于提供安全图像加密和解密的方法和装置

    公开(公告)号:US09396310B2

    公开(公告)日:2016-07-19

    申请号:US13942260

    申请日:2013-07-15

    Abstract: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.

    Abstract translation: 公开了用于解密图像的方法,非暂时计算机可读介质和装置。 例如,一种方法捕获加密图像的一部分,并使用解密密钥对图像的部分进行解密。 图像的部分包含图像的相邻部分的部分信息。 该方法然后显示被解密的图像的部分,并且还使用图像的相邻部分的部分信息来显示图像的相邻部分。 另一种方法包括捕获使用第一密钥和第二密钥加密的图像的第一部分,使用第一密钥解密图像的第一部分并显示解密的图像的第一部分。

    Multilayered Deception for Intrusion Detection and Prevention
    3.
    发明申请
    Multilayered Deception for Intrusion Detection and Prevention 有权
    入侵检测和预防的多层欺骗

    公开(公告)号:US20140259172A1

    公开(公告)日:2014-09-11

    申请号:US14283248

    申请日:2014-05-21

    CPC classification number: H04L63/14 G06F21/552 G06F21/566 H04L63/1491

    Abstract: Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks.

    Abstract translation: 这里公开了用于入侵检测的多层欺骗的概念和技术。 根据本文公开的概念和技术的各种实施例,多层欺骗系统包括蜂蜜服务器,蜂蜜文件和文件夹,蜂蜜数据库和/或蜂蜜计算机。 多层欺骗系统控制器在蜂蜜实体之间产生蜂蜜活动,并且露出具有与蜂蜜用户相关联的联系信息的蜂蜜简档。 任何蜂蜜实体的蜂蜜用户和/或活动的联系可以触发报警和/或指示攻击,并且可以进行分析以防止将来的攻击。

    Out-of-band device verification of transactions

    公开(公告)号:US11423388B2

    公开(公告)日:2022-08-23

    申请号:US16693679

    申请日:2019-11-25

    Inventor: Andrea Forte

    Abstract: Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction.

    Personal Virtual Core Networks
    6.
    发明申请
    Personal Virtual Core Networks 有权
    个人虚拟核心网络

    公开(公告)号:US20160043881A1

    公开(公告)日:2016-02-11

    申请号:US14454497

    申请日:2014-08-07

    Inventor: Andrea Forte

    Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.

    Abstract translation: 这里公开了个人虚拟核心网络的概念和技术。 执行网络访问服务的处理器可以确定用户设备是否应该与在具有连接性的位置处提供设备的核心网络隔离。 如果处理器确定用户设备应该被隔离,则处理器可以识别支持连接的资源。 资源可以包括网络资源和核心网。 处理器可以创建虚拟核心网络来支持连接,并激活虚拟核心网络。

    Communication devices, computer readable storage devices, and methods for secure multi-path communication
    7.
    发明授权
    Communication devices, computer readable storage devices, and methods for secure multi-path communication 有权
    通信设备,计算机可读存储设备和用于安全多路径通信的方法

    公开(公告)号:US09143512B2

    公开(公告)日:2015-09-22

    申请号:US14046220

    申请日:2013-10-04

    Inventor: Andrea Forte

    CPC classification number: H04L63/10 H04L63/0428 H04L63/18

    Abstract: A message is divided into multiple message segments, and a network interface is selected from among a plurality of different types of network interfaces included within a communication device for transmitting each message segment. Each network interface is dedicated to a different type of communication protocol using a different encryption technique, and a network interface is selected for transmitting each message segment according to a pattern of the network interfaces. Secure transmission of the multiple message segments is initiated via the network interfaces according to the pattern.

    Abstract translation: 消息被分成多个消息段,并且从包括在用于发送每个消息段的通信设备内的多个不同类型的网络接口中选择网络接口。 每个网络接口专用于使用不同加密技术的不同类型的通信协议,并且根据网络接口的模式选择网络接口来发送每个消息段。 根据模式,通过网络接口启动多个消息段的安全传输。

    Out-Of-Band Device Verification of Transactions
    8.
    发明申请
    Out-Of-Band Device Verification of Transactions 审中-公开
    带外设备验证交易

    公开(公告)号:US20150149359A1

    公开(公告)日:2015-05-28

    申请号:US14091846

    申请日:2013-11-27

    Inventor: Andrea Forte

    Abstract: Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction.

    Abstract translation: 这里公开了用于业务的带外设备验证的概念和技术。 处理器可以执行验证服务。 验证服务可以接收具有与计算设备和应用之间的事务相关的数据的验证请求。 验证服务可以识别与计算设备相关联的带外设备,并从带外设备获取验证数据。 验证服务可以将验证数据与与交易相关的数据进行比较,以确定交易是否被验证。 根据确定,验证服务可以批准或阻止交易。

    Out-of-Band Device Verification of Transactions

    公开(公告)号:US20200090159A1

    公开(公告)日:2020-03-19

    申请号:US16693679

    申请日:2019-11-25

    Inventor: Andrea Forte

    Abstract: Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction.

    Personal virtual core networks
    10.
    发明授权

    公开(公告)号:US10511973B2

    公开(公告)日:2019-12-17

    申请号:US15378262

    申请日:2016-12-14

    Inventor: Andrea Forte

    Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.

Patent Agency Ranking