H04L63/0414

Methods and Systems for Efficient Encrypted SNI filtering for Cybersecurity Applications

A packet-filtering system described herein may be configured to filter packets with encrypted hostnames in accordance with one or packet-filtering rules. The packet-filtering system may resolve a plaintext hostname from ciphertext comprising an encrypted Server Name Indication (eSNI) value. The packet-filtering system may resolve the plaintext hostname using a plurality of techniques. Once the plaintext hostname is resolved, the packet-filtering system may then use the plaintext hostname to determine whether the packets are associated with one or more threat indicators. If the packet-filtering system determines that the packets are associated with one or more threat indicators, the packet-filtering system may apply a packet filtering operation associated with the packet-filtering rules to the packets.

Identification of targets for a campaign by referencing a blockchain and/or a distributed system file system

A device, that is part of a network of nodes that has access to a blockchain, may receive, from a user device associated with an entity, a request for campaign information for a campaign. The request may include data identifying campaign parameters. The device may interact with smart contracts associated with the blockchain to identify individuals to target for the campaign. The smart contracts may be configured to receive the campaign parameters as input and to output an indication of whether campaign preferences are compatible with the campaign parameters. The device may generate the campaign information to include information identifying the individuals targeted for the campaign and information identifying particular campaign preferences found to be compatible with particular campaign parameters. The device may provide the campaign information to the user device to permit the user device to use the campaign information to target the individuals for the campaign.

ENCRYPTED CACHE PROTECTION

Secrets such as secure session cookies for a web browser can be protected on a compute instance with multiple layers of encryption, such as by encrypting key material that in turn controls cryptographic access to the secret. A compute instance can be instrumented to detect when a process attempts to decrypt this key material so that the process requesting decryption can be compared to authorized or legitimate users of the secret.

MEDIA ACCESS CONTROL (MAC) ADDRESS PRIVACY HANDLING
20230156461 · 2023-05-18 ·

Implementations disclosed describe techniques to allow wireless devices to initially connect with randomized MAC addresses and send an encrypted permanent MAC for differentiated services. In one method, a first wireless device connects to an access point (AP) using a randomized MAC address. The first wireless device receives a request for a permanent MAC address from the AP. The first wireless device determines whether to send the permanent MAC address. Responsive to determining to send the permanent MAC address, the first wireless device encrypts the permanent MAC address to obtain an encrypted MAC address and sends a response to the request, including the encrypted MAC address, to the AP.

Dynamic, user-configurable virtual private network
11652798 · 2023-05-16 · ·

Some embodiments described herein relate managing communications between an origin and a destination using end-user and/or administrator configurable virtual private network(s) (VPN(s)). A first VPN that defines a first data path between an origin and a destination can be defined at a first time. A second VPN that defines a second, different data path between the origin and the destination can defined at a second time. Each packet sent across the first VPN and each packet sent across the second VPN can follow the same data path for that VPN, such each packet can be sent across the first VPN or the second VPN in the order it was received, and the transition between the first VPN and the second VPN can be “seamless,” and communications between the origin and the destination are not disrupted between the first time period and the second time period.

Controlling access to datasets described in a cryptographically signed record

In a dataset exchange environment in which datasets are available for exchange or transformation, a dataset validation platform may be configured to update a cryptographically signed record based on each dataset that is available via the data exchange environment. The dataset validation platform may be further configured to control access to the datasets based on whether a request to access a particular dataset is compliant with an availability requirement of the particular dataset. The dataset validation platform may be further configured to update the cryptographically signed record based on requests to access the datasets, transformations that are based on the datasets, or modifications to the availability requirement of the datasets, such as a modification to a privacy limitation or other availability requirement indicating a criteria for usage of the requested dataset.

Methods and systems for efficient encrypted SNI filtering for cybersecurity applications

A packet-filtering system described herein may be configured to filter packets with encrypted hostnames in accordance with one or packet-filtering rules. The packet-filtering system may resolve a plaintext hostname from ciphertext comprising an encrypted Server Name Indication (eSNI) value. The packet-filtering system may resolve the plaintext hostname using a plurality of techniques. Once the plaintext hostname is resolved, the packet-filtering system may then use the plaintext hostname to determine whether the packets are associated with one or more threat indicators. If the packet-filtering system determines that the packets are associated with one or more threat indicators, the packet-filtering system may apply a packet filtering operation associated with the packet-filtering rules to the packets.

Non-transitory computer-readable storage medium and communication device
11645420 · 2023-05-09 · ·

A non-transitory computer-readable storage medium storing a program that causes a processor included in a business operator's terminal to execute a process, the process includes conversion processing and confirmation request processing. The conversion processing that converts user information acquired from an user into a management format and obtains converted user information. The confirmation request processing that calculates a first hash value obtained by hashing the converted user information with a first hash function, transmits a confirmation request including the first hash value, the first hash function, and conversion content of the conversion to the user, and requests the user to confirm validity of the user information managed.

Data privacy system

A backend computer and methods of using the backend computer are described. The method may comprise: receiving, at a first backend computer, sensor data associated with a vehicle; determining a labeling of the sensor data, comprising: determining personal data and determining non-personal data that is separated from the personal data, wherein each of the personal and non-personal data comprise labeled data, wherein the personal data comprises information relating to at least one identified or identifiable natural person; and performing via the personal data and the non-personal data that is separated from the personal data, at the first backend computer, data processing associated with collecting sensor data associated with the vehicle.

Policy based personally identifiable information leakage prevention in cloud native enviroments

A system performs a method including: generating a posture of a first microservice in a microservice based network environment; implementing the posture of the first microservice at a sidecar of the first micro service; distributing the posture of the first microservice to a sidecar of a second microservice in the microservice based network environment; implementing the posture of the first microservice at the sidecar of the second micro service; and controlling communication of personally identifiable information between the first microservice and the second microservice based on the posture of the first microservice through either or both the sidecar of the first microservice and the sidecar of the second micro service. The posture of the first microservice includes an identification of one or more types of personally identifiable information that the first microservice is authorized to distribute and one or more types of personally identifiable information that the first microservice is authorized to receive.