Abstract:
Systems and methods for data loss prevention while preserving privacy include receiving a data communication originating from an online account of a user device associated with the enterprise; performing an analysis to determine that the data communication is a candidate data leakage, based on a context of the data communication; encrypting the data communication, and providing the host-encrypted data communication to a software agent at the enterprise; receiving a software agent-encrypted database of enterprise communication and the host-encrypted data communication, re-encrypted by the software agent; decrypting a host-encrypted aspect of the re-encrypted data communication to generate a software agent-encrypted data communication; performing a matching operation to determine whether a match exists between the encrypted database and the software agent-encrypted data communication; if the match exists, reporting the match to the software agent; else, the host taking an action.
Abstract:
Systems and methods for security hardening of a file in transit and at rest via segmentation, shuffling and multi-key encryption are presented. The method including segmenting at a first computer system a file into a plurality of file segments, and encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. Additionally included is bidirectional data transformation of a file by obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity
Abstract:
A method for encryption of a private media package by a first processing device which includes at least three key components of a regret management flag, a rules set, and a media object, encrypting with a first key the regret management flag, encrypting with the first key the rules set, encrypting with the first key the media object(s), obtaining a randomized result key, bit shifting the regret management flag from encrypting with the first key the management flag, via the randomized result key, bit shifting the rules set from encrypting with the first key the rules set, via the randomized key, bit shifting the media object(s) from encrypting with the first key the media object(s), via the randomized key, encrypting with a second key the regret management flag from encrypting and bit shifting the regret management flag, encrypting with the second key the rules set from encrypting and bit shifting the rules set, encrypting with the second key the media object(s) from encrypting and bit shifting the media object(s), storing as an encrypted package the regret management flag of the encrypting with the second key the regret management flag, the rules set of the encrypting with the second key the rules set, and the media object(s) of the encrypting with the second key the media object. Decryption is by reverse of the encryption process, and the resulting decrypted private media package may be used only in compliance with the rules set.
Abstract:
A method for encryption of a private media package by a first processing device which includes at least three key components of a regret management flag, a rules set, and a media object, encrypting with a first key the regret management flag, encrypting with the first key the rules set, encrypting with the first key the media object(s), obtaining a randomized result key, bit shifting the regret management flag from encrypting with the first key the management flag, via the randomized result key, bit shifting the rules set from encrypting with the first key the rules set, via the randomized key, bit shifting the media object(s) from encrypting with the first key the media object(s), via the randomized key, encrypting with a second key the regret management flag from encrypting and bit shifting the regret management flag, encrypting with the second key the rules set from encrypting and bit shifting the rules set, encrypting with the second key the media object(s) from encrypting and bit shifting the media object(s), storing as an encrypted package the regret management flag of the encrypting with the second key the regret management flag, the rules set of the encrypting with the second key the rules set, and the media object(s) of the encrypting with the second key the media object. Decryption is by reverse of the encryption process, and the resulting decrypted private media package may be used only in compliance with the rules set.
Abstract:
A secure mobile financial transaction is provided by receiving a list of protection methods from an external terminal over a communication network. A matrix of protection methods corresponding to the external terminal is created based on the identified protection methods. Security-related information is received from one or more trust mediator agents over the communication network. Rules corresponding to the received security related information are retrieved, and at least one protection method is selected from the matrix of protection methods based on the retrieved rules. The selected protection method is transmitted to the trust mediator agents for implementation.
Abstract:
A system and method for securing wireless transmissions is provided. A method for transmitting secure messages includes selecting a bin of codewords from a plurality of bins. The bin of codewords containing a plurality of sub-bins of codewords, and the selecting is based on a first message. The method also includes selecting a sub-bin of codewords from the plurality of sub-bins of codewords based on a second message, selecting a codeword from the sub-bin of codewords, and transmitting the selected codeword to a legitimate receiver.
Abstract:
The present invention relates to a method and apparatus for encrypting data (105) by means of a first key (115), and a method and apparatus for decrypting encrypted data by means of a second key (185). The present invention alleviates the need for exact key information by allowing encryption of data (105) by means of a first key (115) and subsequent decryption of the encrypted data by means of a second key (185) without the need for the first key (115), provided that the first key (115) and the second key (185) form a sufficient estimate of an encryption/decryption key pair. During encryption, multiple encryption keys (135), at least in part based on the first key (115), are used to encrypt a redundant representation (122) of the data (105). The encrypted data (124) may subsequently be decrypted by using multiple decryption keys (165) based on the second key (185), without the need for the first key (115), provided that the second key (185) forms a sufficient estimate of the first key (115).
Abstract:
The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token. This allows the enterprise network token to gain secure access to the temporary key of the client token, thereby allowing the enterprise network token to securely provision the remote client token with the appropriate enterprise Network Keys.