-
1.
公开(公告)号:US11973860B1
公开(公告)日:2024-04-30
申请号:US17849238
申请日:2022-06-24
申请人: Ionic Security Inc.
发明人: Adam Ghetti , Jeffrey Howard , James Jordan , Nicholas Smith , Jeremy Eckman , Ryan Speers , Sohaib Bhatti
CPC分类号: H04L9/083 , G06F21/316 , G06F21/602 , G06F21/62 , H04L9/0819 , H04L9/0822 , H04L9/0861 , H04L63/04 , H04L63/0428 , H04L63/062 , H04L63/065 , H04L63/0815 , H04L63/10 , H04L63/102 , G06F2221/2113 , G06F2221/2133
摘要: Systems and methods for initiating an action based on electronic activities of a user. Generally, a computing device receives a policy for enabling cryptographically secure tracking of electronic activities of a user and a particular electronic computing device. The policy can include definitions for a multiple actions to be taken with respect to certain electronic activities resulting from interaction by the user with the at least one computing device. The computing device can identify a particular electronic activity resulting from user interaction with the at least one computing device. The computing device can determine a particular action to take by applying the policy to the particular electronic activity. The computing device can initiate the particular action with respect to the particular electronic activity.
-
2.
公开(公告)号:US09608809B1
公开(公告)日:2017-03-28
申请号:US15017284
申请日:2016-02-05
申请人: Ionic Security, Inc.
发明人: Adam Ghetti , Jeffrey Howard , James Jordan , Nicholas Smith , Jeremy Eckman , Ryan Speers , Sohaib Bhatti
IPC分类号: H04L9/08
CPC分类号: H04L9/083 , G06F21/316 , G06F21/602 , G06F21/62 , G06F2221/2113 , G06F2221/2133 , H04L9/0819 , H04L9/0822 , H04L9/0861 , H04L63/04 , H04L63/0428 , H04L63/062 , H04L63/065 , H04L63/0815 , H04L63/10 , H04L63/102
摘要: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
-
3.
公开(公告)号:US11387986B1
公开(公告)日:2022-07-12
申请号:US16741287
申请日:2020-01-13
申请人: Ionic Security Inc.
发明人: Adam Ghetti , Jeffrey Howard , James Jordan , Nicholas Smith , Jeremy Eckman , Ryan Speers , Sohaib Bhatti
摘要: Systems and methods are discussed for performing multi-key cryptographic operations. Policies can be received that define whether to perform a cryptographic operation with respect to various data items generated by one or more computing devices. The data items can be identified and compared to the policies to determine whether to perform the cryptographic operation on subsets of data items. The cryptographic operation can be performed with respect to a first subset of the data items using a first key, while the cryptographic operation can be performed with respect to a second subset of the data items using a second key.
-
4.
公开(公告)号:US10567167B1
公开(公告)日:2020-02-18
申请号:US16029996
申请日:2018-07-09
申请人: Ionic Security Inc.
发明人: Adam Ghetti , Jeffrey Howard , James Jordan , Nicholas Smith , Jeremy Eckman , Ryan Speers , Sohaib Bhatti
摘要: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
-
5.
公开(公告)号:US10020935B1
公开(公告)日:2018-07-10
申请号:US15469871
申请日:2017-03-27
申请人: Ionic Security Inc.
发明人: Adam Ghetti , Jeffrey Howard , James Jordan , Nicholas Smith , Jeremy Eckman , Ryan Speers , Sohaib Bhatti
CPC分类号: H04L9/083 , G06F21/316 , G06F21/602 , G06F21/62 , G06F2221/2113 , G06F2221/2133 , H04L9/0819 , H04L9/0822 , H04L9/0861 , H04L63/04 , H04L63/0428 , H04L63/062 , H04L63/065 , H04L63/0815 , H04L63/10 , H04L63/102
摘要: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
-
-
-
-