G06F2221/2107

SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK
20230237167 · 2023-07-27 · ·

A cloud-based system for securely storing data, the system having a processor which obtains a source data file; splits it into at least three fragments; and uses an encryption key associated with the fragments to encrypt the fragments and distributes the encrypted fragments among at least three cloud storage providers, creates a pointer file containing information for retrieving the encrypted fragments. When a system user requests access to the data, the system uses the information stored in the pointer file to retrieve the stored encrypted fragments from the plurality of clouds; decrypts the fragments and reconstructs the data, and provides data access to the system user.

HOMOMORPHIC COMPUTATIONS ON ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that perform homomorphic computations on encrypted third-party data within a distributed computing environment. For example, an apparatus receives a homomorphic public key and encrypted transaction data characterizing an exchange of data from a computing system, and encrypts modelling data associated with a first predictive model using the homomorphic public key. The apparatus may perform homomorphic computations that apply the first predictive model to the encrypted transaction data in accordance with the encrypted first modelling data, and transmit an encrypted first output of the homomorphic computations to the computing system, which may decrypt the encrypted first output using a homomorphic private key and generate decrypted output data indicative of a predicted likelihood that the data exchange represents fraudulent activity.

Digital Rights Management DRM Method, Apparatus, and System
20230006984 · 2023-01-05 ·

Embodiments of this application provide a digital rights management DRM method, apparatus, and system, to implement a DRM interworking operation between DRM servers and clients of different vendors. The method includes: A DRM server encrypts a first media file by using a first encryption method to obtain a first encrypted media file; the DRM server generates content protection description information of the first encrypted media file, where the content protection description information includes a content identifier and encryption method information, the content identifier identifies the first encrypted media file, and the encryption method information identifies the first encryption method; the DRM server performs first formatting on the content protection description information to generate formatted content protection data; the DRM server encapsulates the formatted content protection data to generate a content protection data packet.

Data encryption or decryption method and apparatus, and terminal device

A data processing method includes: presenting one or more control elements on the touch screen, where the one or more control elements are in a one-to-one correspondence with one or more pieces of data; and encrypting or decrypting, based on fingerprint data obtained by the fingerprint recognition module, first data corresponding to a first control element when an operation of dragging the first control element from a location outside a second region to the second region is detected, where the second region includes at least a partial region of the first region. This can further complete operations of confirming that encryption or decryption is to be performed and performing authentication in one step, to shorten steps and time of a data encryption or decryption operation, thereby improving user experience.

Incorporating at-rest data encryption into a cloud-based storage architecture
11568066 · 2023-01-31 · ·

Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.

Programmer and method for encryption programming

The present disclosure provides a method for encryption programming, including: selecting an encrypted programming file that matches the programmer from a target folder; loading the selected encrypted programming file; if a current number of times for programming of the programmer is greater than or equal to a maximum number of times for programming, destroying the selected encrypted programming file and ending programming; otherwise, decrypting the selected encrypted programming file; if the current number of times for programming of the programmer is less than an initial number of times for programming, replacing the current number of times for programming of the programmer with the initial number of times for programming, otherwise, re-encrypting the decrypted encrypted programming file and programing the re-encrypted programming file into a target chip. A programmer is further provided.

Data Privacy Enhancing Technique Selection
20230029190 · 2023-01-26 ·

Disclosed herein are system, method, and computer program product embodiments for intended usage driven data privacy enhancing technique selection. An embodiment operates by extracting insights from a document. The embodiment determines a security classification for the extracted insights. The embodiment determining a formula for the extracted insights. The embodiment extracts a processing requirement and a data requirement from the formula for the extracted insights. The embodiment maps a privacy enhancing encryption technique to the security classification and processing requirement for the extracted insights. The embodiment executes the privacy enhancing encryption technique corresponding to the security classification and processing requirement for the extracted insights.

SYSTEMS AND METHODS FOR RANSOMWARE DETECTION
20230023584 · 2023-01-26 · ·

Systems and methods are provided to detect ransomware and ransomware-like behavior.

METHOD AND SYSTEM FOR A UTILIZING A PROXY SERVICE TO GENERATE A COMPOSED INFORMATION HANDLING SYSTEM

In general, the invention relates to providing computer implemented services using information handling systems. One or more embodiments of the invention includes identifying a hardware resource requirement in a composition request for a composed information handling system, wherein the hardware resource requirement specifies a hardware resource with data transformation functionality (DTF), identifying a hardware resource that does not have the DTF, connecting the hardware resource to a DTF container, wherein the DTF container implements the DTF and emulates the hardware resource with DTF, and initiating composition of the composed information handling system using the DTF container, wherein the DTF container satisfies the hardware resource requirement.

Remote secured terminal

A computer implemented method for providing communication between a secured client computer and a remote computer. There is provided a client computer that includes peripheral components. Each peripheral component is configured, by a processor, to process a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component is further configured to code the corresponding data of the specified data type. Each peripheral component is configured, by the processor, to establish a secured peer-to-peer communication channel between the peripheral component and the remote computer that is authorized to communicate with the client computer, and is further configured to code data that is communicated between the authorized remote computer and the peripheral component through the secured communication channel. The coded data being indecryptable by the processors of other of the peripheral components.