Patent classifications
H04L2209/20
Streaming with low latency encryption ready packaging
Techniques for packaging media content in a low latency encryption ready format for streaming are described herein. In accordance with various embodiments, one or more packagers that include create an intermediate unit including at least one data portion from media content. The packager(s) further determine a size for reformatting the intermediate unit, where the size can include a padding amount for the at least one data portion. The packager(s) also package the intermediate unit to a reformatted partial segment according to the size without encrypting the at least one data portion, including injecting into the partial segment at least one encryption specific box and injecting padding into the at least one data portion according to the padding amount. The packager(s) then package the reformatted partial segment for streaming while maintaining the size, including generating a manifest for streaming the media content specifying the size of the reformatted partial segment.
General Encryption Enhancement
A computerized process is described for improving a computer's asymmetric and symmetric encryption capabilities that results in up to eight times larger effective key size, higher data confidentiality, substantially greater security level, and increased data protection without encrypting any data bit more than once. This is accomplished by padding plaintext, transforming padded plaintext bytes into eight partitions, where each partition holds the bits from a common bit position in padded plaintext bytes, independently encrypting each partition using a cipher, key, key size, and padding all of which may differ between partitions and other cipher parameters required for the cipher to operate and/or necessary to meet encryption objectives. The encrypted partitions are combined to form ciphertext. Decryption essentially reverses the process, where the ciphertext is partitioned, each partition decrypted, decrypted partitions reverse transformed to create an array of padded plaintext, and padding is removed to form plaintext.
IMPLEMENTING RESILIENT DETERMINISTIC ENCRYPTION
A computer-implemented method according to one aspect includes creating an initialization vector, utilizing an instance of plaintext and a secret key; encrypting the instance of plaintext, utilizing the initialization vector, the secret key, and the instance of plaintext; combining the initialization vector and the encrypted instance of plaintext to create a ciphertext string; and outputting the ciphertext string.
Secure encryption of partial blocks
Encrypting data blocks by receiving blocks of compressed data, determining a size, in bytes, of the compressed data, appending a trailer to the compressed data, the trailer associated with the size in bytes of the compressed data, encrypting the compressed data and trailer, yielding encrypted data, where a header of the encrypted data comprises a number of complete encrypted data blocks, and providing the encrypted data to a user.
Format preserving encryption (FPE) system and method for long strings
A format-preserving Just Encrypt 1 (JE1) system and method provides significant performance advantages over known FPE methods for longer character strings due to the technical improvements.
SYSTEM AND METHOD FACILITATING ENCRYPTION PRESERVING FORMAT AS A DISTRIBUTED PROCESSING LIBRARY
The present invention provides a robust and effective solution to an organization by enabling them to implement a system (110) for facilitating format preserving encryption capability such that the encrypted data will not be available with its original value in a big data system and render sensitive field data as non-sensitive. Thus, sensitive data may be hidden from data-stores/warehouses without worrying about downstream access to the data. The system (110) proposed may also preserve the data type and format of datasets but not limited to the like. The system encrypts a dataset with a unique key (404) and then allows a privileged user (902) to decrypt the encrypted dataset with the unique key (404) and view the decrypted values without getting access to the sensitive original dataset.
Polymorphic Digital Security and Methods of Use Thereof
Described herein are various methods of generating and using a digital signature, such as a polymorphic digital signature. One or more methods of creating a digital signature permit strings of characters, which may be simple or complex, to uniquely identify large numbers of people, things, and actions. Different people, things, and actions can use the same set of characters to identify themselves and yet still be uniquely identified.
Ransomware remediation
A computer implemented method for decrypting an encrypted data store at a target computer system, the data store being encrypted by a ransomware algorithm using a searchable encryption algorithm, the method including determining an encryption algorithm used by the ransomware algorithm; determining seed parameters used by the encryption algorithm to generate an encryption key; generating the encryption key using the seed parameters; and decrypting the encrypted data store.
Encryption device, decryption device, encryption method, decryption method, and computer readable medium
An encryption device divides a message M into blocks of b bits, so as to generate data M[1], . . . , data M[m]. The encryption device sets data S.sub.0 of n=b+c bits to a variable S, updates the variable S by calculating a block cipher E using as input the variable S, then updates the variable S by calculating an exclusive OR using as input the variable S that has been updated and data X[i] that is data M[i] to which a bit string of c bits is added, and generates data C[i] by extracting b bits from the variable S that has been updated, for each integer i=1, . . . , m in ascending order. The encryption device generates a ciphertext C of the message M by concatenating the respective pieces of the data C[i] for each integer i=1, . . . , m. The encryption device extracts t bits from the variable S as an authenticator T, where t is an integer of 1 or greater.
Asynchronous processing of blockchain blocks
A computer-implemented method includes retrieving, by a bridge device communicatively linked to a blockchain network node of a blockchain network, a first set of blockchain blocks from the blockchain network node using a first set of threads of the bridge device; storing, by the bridge device, the first set of blockchain blocks in the bridge device; and verifying, by the bridge device, a second set of blockchain blocks that are stored in the bridge device using a second set of threads of the bridge device; and wherein retrieving the first set of blockchain blocks and verifying the second set of blockchain blocks are performed asynchronously using the first set of threads and the second set of threads.