-
公开(公告)号:US20190036938A1
公开(公告)日:2019-01-31
申请号:US16070866
申请日:2016-01-29
Applicant: ENTIT SOFTWARE LLC
Inventor: Tomas Sander , Terence Spies , Susan K. Langford
Abstract: Examples disclosed herein relate to generating communities on a security information sharing platform. Some examples may enable identifying a set of community attributes to be used to generate a community on the security information sharing platform that enables sharing of security information among a plurality of communities. Some examples may enable authorizing a first user to access community-based security information of the community where the first user is associated a set of user attributes that satisfy the set of community attributes. A security indicator may be obtained from the first user of the community. Information related to the security indicator may be obtained from a second user of the community. Some examples may enable including the security indicator and the information related to the security indicator in the community-based security information of the community.
-
公开(公告)号:US10686588B2
公开(公告)日:2020-06-16
申请号:US15693327
申请日:2017-08-31
Applicant: EntIT Software LLC
Inventor: Leslie C. Gutschow , Richard Minner , Terence Spies
IPC: H04L9/06 , H04L9/14 , G06F16/245
Abstract: A technique includes performing element-by-element encryption of a segment of the plaintext string to provide a segment of an encrypted string. Performing the element-by-element encryption includes, for a given string element of the segment of the plaintext string, encrypting the given string element to provide a given string element of the segment of the encrypted string; and tweaking the encryption of the given string element based on a selector that includes multiple string elements of the encrypted string. The technique may include searching an encrypted database based on the encrypted string.
-
公开(公告)号:US20190074969A1
公开(公告)日:2019-03-07
申请号:US16083668
申请日:2016-03-18
Applicant: ENTIT SOFTWARE LLC
Inventor: Terence Spies , Karl Reiner Kappenberger
Abstract: Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a key engine to obtain a first key associated with a first access level, and a second key associated with a second access level. The encrypting device may also include a multi-key encryption engine to encrypt a first portion of the plaintext with the first key, and encrypt a second portion of the plaintext with the second key, where the first portion may include more detailed information than the second portion, and where the first access level may be higher than the second access level.
-
公开(公告)号:US20180343258A1
公开(公告)日:2018-11-29
申请号:US15603675
申请日:2017-05-24
Applicant: EntIT Software LLC
Inventor: Terence Spies , Saurabh Sashte
Abstract: In some examples, a system receives, from a sender, an access control value generated based on information of a plurality of recipients. The system sends, to the sender, a signed version of the access control value for sending by the sender to the plurality of recipients with an encrypted message. The system receives, from a first recipient a request for a key to decrypt the encrypted message, a signed access control value and recipient information for deriving the access control value. The system determines whether the first recipient is one of the plurality of recipients using the signed access control value and the recipient information.
-
公开(公告)号:US11423504B2
公开(公告)日:2022-08-23
申请号:US14060186
申请日:2013-10-22
Applicant: ENTIT SOFTWARE LLC
Inventor: Terence Spies , Richard T. Minner
Abstract: A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information may include sensitive numbers such as social security numbers, credit card numbers or other private numbers. A tokenization system may include multiple physically distinct hardware platforms each having a tokenization server and a database. A tokenization server may run portions of a sensitive number through a predetermined number of rounds of a Feistel network. Each round of the Feistel network may include tokenizing portions of the sensitive number using a fractional token table stored an associated database and modifying the tokenized portions by reversibly adding portions of the sensitive number to the tokenized portions. The fractional token table may include partial sensitive numbers and corresponding partial tokens. A sensitive-information-recovery request including the token may be directed to the token generating organization from the token requestor to recover sensitive information.
-
公开(公告)号:US10659468B2
公开(公告)日:2020-05-19
申请号:US15603675
申请日:2017-05-24
Applicant: EntIT Software LLC
Inventor: Terence Spies , Saurabh Sashte
Abstract: In some examples, a system receives, from a sender, an access control value generated based on information of a plurality of recipients. The system sends, to the sender, a signed version of the access control value for sending by the sender to the plurality of recipients with an encrypted message. The system receives, from a first recipient a request for a key to decrypt the encrypted message, a signed access control value and recipient information for deriving the access control value. The system determines whether the first recipient is one of the plurality of recipients using the signed access control value and the recipient information.
-
公开(公告)号:US20190068358A1
公开(公告)日:2019-02-28
申请号:US15693327
申请日:2017-08-31
Applicant: EntIT Software LLC
Inventor: Leslie C. Gutschow , Richard Minner , Terence Spies
Abstract: A technique includes performing element-by-element encryption of a segment of the plaintext string to provide a segment of an encrypted string. Performing the element-by-element encryption includes, for a given string element of the segment of the plaintext string, encrypting the given string element to provide a given string element of the segment of the encrypted string; and tweaking the encryption of the given string element based on a selector that includes multiple string elements of the encrypted string. The technique may include searching an encrypted database based on the encrypted string.
-
公开(公告)号:US20190036686A1
公开(公告)日:2019-01-31
申请号:US16070878
申请日:2016-01-29
Applicant: ENTIT SOFTWARE LLC
Inventor: Terence Spies , Tomas Sander , Susan K. Langford
Abstract: Examples disclosed herein relate to encryption of community-based security information. Some examples may enable authorizing a user of a community to access an encrypted data item (e.g., at least an encrypted portion of community-based security information of that community) using a decryption key. The community may be generated on a security information sharing platform based on a set of community attributes. The decryption key may comprise a private key corresponding to each user attribute of a set of user attributes that are associated with the authorized user where the set of user attributes satisfy the set of community attributes.
-
公开(公告)号:US11115184B2
公开(公告)日:2021-09-07
申请号:US15601548
申请日:2017-05-22
Applicant: EntIT Software LLC
Inventor: Richard Minner , Terence Spies
Abstract: Techniques for using padding in format preserving encryption are provided. In one aspect, it may be determined if padding of a plaintext undergoing format preserving encryption is needed. A pseudo random padding length may be calculated when it is determined that padding is needed. The calculated length of padding may be added to the plaintext when it is determined that padding is needed. The plaintext and added padding may be encrypted using format preserving encryption to create a cipher text.
-
公开(公告)号:US20180337768A1
公开(公告)日:2018-11-22
申请号:US15601548
申请日:2017-05-22
Applicant: Entit Software LLC
Inventor: Richard Minner , Terence Spies
Abstract: Techniques for using padding in format preserving encryption are provided. In one aspect, it may be determined if padding of a plaintext undergoing format preserving encryption is needed. A pseudo random padding length may be calculated when it is determined that padding is needed. The calculated length of padding may be added to the plaintext when it is determined that padding is needed. The plaintext and added padding may be encrypted using format preserving encryption to create a cipher text.
-
-
-
-
-
-
-
-
-