Patent classifications
H04L63/0478
System and method for providing API version control
Described herein is a system for providing version control across APIs. In an embodiment, an application of a client device may transmit communications to a service application API that are in a format not accepted by the service application API, using the application API. A central (or public) API may receive the communication transmitted by the application's API. The central API may identify the versions of the application's API and the service application API. The central API may format the communication based on the mapped fields, to a format accepted by the service application API. The central API 106 may forward the formatted communication to the service application.
SECURELY TRANSMITTING DATA IN A DATA STREAM
In overview, a computer-implemented method of transmitting data in a data stream from a first device to a second device is disclosed. The data stream is encrypted before transmission from the first device to the second device, and a location of the data in the data stream is indicated to the second device. The location may be a pre-shared location between the first and second devices, or the first device may transmit the location of the data to the second device. The second device decrypts the encrypted data stream, identifies the data in the data stream based on the location, and encrypts the identified data in the data stream.
Partial packet encryption for encrypted tunnels
Techniques and mechanisms to reduce double encryption of packets that are transmitted using encrypted tunnels. The techniques described herein include determining that portions of the packets are already encrypted, identifying portions of the packets that are unencrypted, and selectively encrypting the portions of the packets that are unencrypted prior to transmission through the encrypted tunnel. In this way, potentially private or sensitive data in the packets that is unencrypted, such as information in the packet headers, will be encrypted using the encryption protocol of the encrypted tunnel, but the data of the packets that is already encrypted, such as the payload, may avoid unnecessary double encryption. By reducing (or eliminating) the amount of data in data packets that is double encrypted, the amount of time taken by computing devices, and computing resources consumed, to encrypted traffic for encrypted tunnels may be reduced.
System and method for use of filters within a cryptographic process
A method for encrypting plaintext data is enclosed that includes operations of receiving the plaintext data, the plaintext data including a plurality of data portions, encrypting each of the plurality of data portions using a specific key for each data portion, merging each of the plurality of data portions together to form a single data stream, generating a data map of the single data stream, appending the data map to the single data stream, and performing a master cipher to form an encrypted distributable stream. Operations of the encrypting include: an additive operation on each byte of the first data portion using the additive table, an XOR operation on each byte of the first data portion as modified by the additive operation, a substitution operation on each byte of the first data portion using the substitution table as modified by the XOR operation.
EMBEDDED VIRTUAL PRIVATE NETWORK
Connecting to an unsecured wired or wireless network poses severe security and privacy risks. An individual application such as a mobile online banking application address this by using point to point private network connections. Browsers, however, generally do not use point to point private network connections and depend on the target website to establish a secure connection. Providing a secure connection that is the default for all network access and that encrypts all over the air or over the wire traffic mitigates these risks. However, virtual client networks (VPNs) client applications can be difficult to set up and need to be always on to ensure that all network activity is secure. By embedding a VPN capability and automating the connection process, a safe and secure network connection can be made available to users of computing devices. An embedded private connect VPN system may use Domain Name Server (DNS) functionality to determine which data or content streams are to be transmitted through a generated private connect VPN tunnel.
NORMALIZATION GRID
A multi-lender architecture evaluates applicant data against lending rule sets of multiple lenders. Rule sets provided by different lenders may be expressed differently. The multi-lender architecture transforms the rules in each rule set and represents the rules in a normalization grid. The normalization grid allows a single algorithm to evaluate the rules of different lenders.
Embedded virtual private network
Connecting to an unsecured wired or wireless network poses severe security and privacy risks. An individual application such as a mobile online banking application address this by using point to point private network connections. Browsers, however, generally do not use point to point private network connections and depend on the target website to establish a secure connection. Providing a secure connection that is the default for all network access and that encrypts all over the air or over the wire traffic mitigates these risks. However, virtual client networks (VPNs) client applications can be difficult to set up and need to be always on to ensure that all network activity is secure. By embedding a VPN capability and automating the connection process, a safe and secure network connection can be made available to users of computing devices. An embedded private connect VPN system may use Domain Name Server (DNS) functionality to determine which data or content streams are to be transmitted through a generated private connect VPN tunnel.
System and method for use of filters within a cryptographic process
A method for encrypting plaintext data is enclosed that includes operations of receiving the plaintext data, the plaintext data including a plurality of data portions, encrypting each of the plurality of data portions using a specific key for each data portion, merging each of the plurality of data portions together to form a single data stream, generating a data map of the single data stream, appending the data map to the single data stream, and performing a master cipher to form an encrypted distributable stream. Operations of the encrypting include: an additive operation on each byte of the first data portion using the additive table, an XOR operation on each byte of the first data portion as modified by the additive operation, a substitution operation on each byte of the first data portion using the substitution table as modified by the XOR operation.
PARTICIPANT-MANAGED, INDEPENDENT-TRUST AUTHENTICATION SERVICE FOR SECURE MESSAGING
An anonymous authentication service for an invulnerable secret key authentication and encryption token distribution service. Applications place a small code segment within their communications protocol, thereby allowing network participants the full benefit of perfectly secure authenticated and encrypted message traffic without concern for third party key management. This is the world's first participant-managed, independent-trust secure messaging key distribution capability.
METHOD AND SYSTEM TO ENSURE THAT ALL PARTICIPANTS IN THE GENERATION OF A PROTECTED DATA SET OR DATA STREAM THROUGH ENCRYPTION ARE REQUIRED TO PROVIDE THEIR PERMISSION FOR THE DATA TO BE RETRIEVED THROUGH DECRYPTION
The present invention comprises a system that will ensure the privacy of multiple participants being recorded during an activity that is considered to be confidential due to legal, professional, and/or other concerns. Video, audio, telemetry, and other information is encrypted using identifying credentials, such as identifying physical devices, knowledge of specific codes or information, and/or biologically originated identifiers, from all parties in a manner such that all, or a pre-determined specific subset, of the parties must provide the original credentials in order to decrypt the encrypted information. This system assures that no individual can access the encrypted information without the active participation of the required other members who provided encryption credentials.