H04L2209/30

SYSTEM AND METHOD FOR STORING AND READING ENCRYPTED DATA
20220114263 · 2022-04-14 ·

An information handling system includes a general storage for storing application data of applications hosted by the information handling system. The information handling system also includes a management storage for storing management data used to manage operation of the information handling system. The information handling system further includes a management storage manager that obtains data for storage in the management storage; encrypts the data to obtain encrypted data and authentication data for the encrypted data; generates error correction code data for the encrypted data and the authentication data; and stores, as a new record, the encrypted data, the authentication data, and the error correction code data in the management storage.

Reconstructing Data Segments in a Storage Network and Methods for Use Therewith

A processor in a storage network operates by: receiving an access request for a data segment, wherein the data segment is encoded utilizing an error correcting information dispersal algorithm as a set of encoded data slices that are stored in a plurality of storage units of the storage network and wherein each encoded data slice of the set of encoded data slices includes a corresponding checksum of a plurality of checksums; retrieving, from the storage network, a subset of encoded data slices that includes a threshold number of encoded data slices of the set of encoded data slices; determining, based on ones of the plurality of checksums corresponding to the subset of encoded data slices, when the subset of encoded data slices includes at least one corrupted encoded data slice; retrieving from at least one of the plurality of storage units an addition number of encoded data slices required to generate a reconstructed data segment based on the subset of encoded data slices; generating the reconstructed data segment in accordance with the error correcting information dispersal algorithm, using the additional number of encoded data slices and at least some of the subset of encoded data slices; providing the reconstructed data segment in response to the access request; forming a reconstructed set of encoded data slices utilizing the error correcting information dispersal algorithm on the reconstructed data segment; and replacing the at least one corrupted encoded data slice with at least one reconstructed encoded data slice of the reconstructed set of encoded data slices.

AUTHENTICATED AND ENCRYPTED ARCHIVES
20220092208 · 2022-03-24 · ·

Embodiments described herein provide a compressed container format that enables the container to be decrypted and decompressed in a streaming manner. One embodiment provides a container format for encrypted archives in which data is compressed and encrypted in a segmented manner. A segment of the archive can be decompressed, decrypted, and checked for integrity before the entire archive is received. Metadata for the encrypted archive is also encrypted to secure details of data stored within the archive.

Obfuscation for protection of streaming media and other data flows
11269621 · 2022-03-08 · ·

A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.

HOST ATTESTATION

A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment.

SYSTEMS AND METHODS FOR ADAPTIVE RECURSIVE DESCENT DATA REDUNDANCY

Systems and methods for adaptive recursive descent data redundancy are described herein. In one embodiment, a method can include identifying the data object or file for Quantum Fragmentation, determining, via a first portion of a Quantum Fragmentation instance, a factor of fragmentation for the data object or file, transforming the data object or file into a plurality of first data fragments according to the factor of fragmentation by applying one or more cryptographic processing, integrity checking, and resilient fragmentation schemes, via the first portion of the Quantum Fragmentation instance, and persisting, via the first portion of the Quantum Fragmentation instance, each of the plurality of first data fragments to a data store of a plurality of available Cloud or other data stores or to a subsequent portion of the Quantum Fragmentation instance, wherein the persistence for each of the first data fragment occurs independently from the other first data fragments.

Recovering data in a storage network
11144204 · 2021-10-12 · ·

A method for execution by a dispersed storage and task (DST) client module includes issuing a read threshold number of read slice requests are issued to storage units of the set of storage units. One or more encoded slices of a selected read threshold number of encoded slices are received. When a next encoded data slice of a decode threshold number of encoded data slices is received within a response timeframe, outputting of the next encoded data slice is initiated. When the next encoded data slice is not received within the response timeframe, receiving of another decode threshold number of encoded slices of the set of encoded slices is facilitated. The other decode threshold number of encoded slices are decoded to produce recovered encoded data slices, where the recovered encoded data slices includes at least a recovered next encoded data. Outputting of the recovered next encoded data slice is initiated.

Data registration system

Provided is a data registration system capable of efficiently registering highly effective data related to a vehicle or the like. The data registration system includes an integration processing server and an integrated database server. The integration processing server creates a data mart having an FCD, weather data, vehicle condition data, fuel economy data, navigation data, a vehicle ID, and a user ID which are linked to one another and creates an encrypted data mart by compressing the data mart by the Lzo algorithm and encrypting the compressed data mart. The integrated database server stores the encrypted data mart in a storage region.

System, method and computer product for fast and secure data searching
11106815 · 2021-08-31 · ·

A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a user via the user interface and configured to perform user authentication, and a database layer in communication with and accessible by the web layer and comprising a database configured for storing data, and a search engine configured for searching the database, wherein, communication to and from the database layer from and to the web layer is controlled by secure socket layer certificate authorization. The database layer may also include an inverted index in communication with the database and the search engine and configured for maintaining updated snapshots relating to the data in the database and an encryption/decryption layer for selective encryption of the data and configurable for field level, document level, and/or chunk level encryption.

HIGH DEFINITION SECURE PLAYBACK WITH DOWNLOADABLE DRM FOR ANDROID PLATFORMS
20210303660 · 2021-09-30 ·

A Trustonic DRM Plug-in is provided that can be downloaded and operate in conjunction with an Android framework. The solution also includes a PVP with the downloadable DRM. The system includes components that can be added by Trustonic based on the Android 4.3 Framework in addition to current t-base 300 that can be used by any DRM vendor. The system enables the DRM to be downloaded in the field since all DRMs could use the standard API services of the Android 4.3 OS. With a codec component employed like H.264 or HEVC that can use the PVP with the downloaded DRM component, the Android video player can use the component to satisfy HD content security requirements.