Patent classifications
H04L63/0464
SYSTEMS AND METHODS FOR ENCRYPTION AND DECRYPTION SERVICE FOR ELECTRONIC TRANSACTION MONITORING AND REPORTING
A method for electronic transaction monitoring and reporting includes: determining whether the received transaction request is encrypted, upon determining that the received transaction request is not encrypted, sending a failure alert to the merchant, determining a receiving acquirer processor for the transaction request, and transmitting the transaction request to the determined acquirer processor.
MACsec Key Exchange Attribute Reflection for Transparent Provider Backbone Bridge Forwarding Over Public Ethernet Provider Backbones
The present disclosure is directed to systems and methods for transparent Provider Backbone Bridge forwarding of MACsec key exchanges over public Ethernet provider backbones. The method includes the steps of receiving, at a first PBB device, an Ethernet frame from a first edge router for transmission to a second edge router via a MACsec connection, the Ethernet frame comprising a plurality of fields; performing a lookup of one or more fields of the plurality of fields to determine a match with one or more pre-defined values; determining that the one or more fields of the Ethernet frame match the one or more pre-defined values; rewriting the one or more fields of the Ethernet frame to one or more open values operable to allow the Ethernet frame to be transmitted to a next hop device; and transmitting the Ethernet frame to the next hop device.
Detecting and isolating an attack directed at an IP address associated with a digital certificate bound with multiple domains
An attack is detected on a first IP address and a determination is made that the first IP address is associated with a primary digital certificate that is bound with multiple different domains. For each of these domains, a secondary certificate is accessed that is bound only to that domain and that secondary certificate is associated with a unique IP address such that each of the different domains has a unique IP address associated with its secondary certificate respectively. The attack is isolated to the domain the attack follows.
System and method for using a distributed ledger gateway
System and method for using a distributed ledger gateway are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for interacting with a plurality of distributed ledgers may include: (1) receiving a client request comprising a payload to be written to one of a plurality of distributed ledgers and metadata extracted from the client request; (2) identifying a destination distributed ledger of the plurality of distributed ledgers; (3) logging a source of the request and the destination distributed ledger; (4) encrypting the payload; and (5) routing the encrypted payload to the destination distributed ledger.
Systems and methods using a network interface controller (NIC) to broker a secure remote connection at the hardware layer
Systems and methods are provided that may be implemented to use compute capabilities of a network interface controller (NIC) to broker a secure connection across a network between a target information handling system (e.g., such as a server) and one or more other entities (e.g., such as other information handling systems implementing a cloud service or private network, and/or that are providing other remote service/s across the network). This secure connection may be brokered by the NIC at a hardware level in a manner that is separate from a host programmable integrated circuit of the same target information handling system, and in a way that is agnostic and independent of any host operating system or other logic that is executing on the host programmable integrated circuit of the target information handling system.
APPROACHES OF PERFORMING DATA PROCESSING WHILE MAINTAINING SECURITY OF ENCRYPTED DATA
Systems and methods are provided for receiving encrypted data from a second computing system and instantiating the computing system to process the encrypted data. The instantiation includes decrypting the encrypted data using a private key, performing an operation on the decrypted data, presenting an output indicating a result of the operation on the decrypted data, and re-encrypting the decrypted data. After the data is re-encrypted, the data is transmitted to the second computing system or a third computing system.
Encrypted cross-zone replication for cross-zone replicated block storage devices
The present disclosure generally relates to creating virtualized block storage devices whose data is replicated across isolated computing systems to lower risk of data loss even in wide-scale events, such as natural disasters. The virtualized device can include at least two volumes, each of which is implemented in a distinct computing system. Each volume can be encrypted with a distinct key, and an encryption service can operate to transform data “in-flight” on the replication path between the volumes, reencrypting data according to the key appropriate for each volume.
Managing decryption of network flows through a network appliance
A network appliance receives a communication from a client device that includes a request to establish a network connection to a server. The network appliance establishes, in response to the communication, a single connection between the network appliance and the server based on application of a policy that causes the network appliance to determine not to decrypt data transmitted between the client device and the server. The network appliance transmits encrypted data between the client device and the server over the single connection.
File transmission method and system performing the same
Provided a is method for managing file transmission. A file transmission method includes receiving, by a file transmission system, a request for transmitting a file to a reception side from a transmission side, setting transmission paths for transmitting the file via data centers present between the transmission side and the reception side, determining a splitting reference used for splitting the file into a plurality of fragments for the respective transmission paths, and individually transmitting the file fragments split according to the splitting reference along the transmission paths. Since files are split into a plurality of fragments and the fragments are simultaneously transmitted to several networks in a distributed manner, security may be strengthened and a bandwidth may be temporarily expanded, remarkably enhancing a transfer rate.
Systems and methods for encryption and decryption service for electronic transaction monitoring and reporting
A method for electronic transaction monitoring and reporting includes: determining whether the received transaction request is encrypted, upon determining that the received transaction request is not encrypted, sending a failure alert to the merchant, determining a receiving acquirer processor for the transaction request, and transmitting the transaction request to the determined acquirer processor.