Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing …
S Ahmed - US Patent 10,333,696, 2019 - Google Patents
Partially homomorphic encryption systems may be transformed into fully homomorphic
encryption systems. Input plaintext data are transformed into modified plaintext data using a …
encryption systems. Input plaintext data are transformed into modified plaintext data using a …
Systems and methods for managing location data and providing a privacy framework
AD Parecki, AL Case, W Chambliss - US Patent 9,411,967, 2016 - Google Patents
7,054,648 B2 5, 2006 Abtin et al. 2012fOOO9897 A1 1/2012 Kasad et al. 7,088,989 B2 8,
2006 Guo 2012, 0009900 A1 1/2012 Chawla 7,185,204 B2 2/2007 Narayanaswami et al …
2006 Guo 2012, 0009900 A1 1/2012 Chawla 7,185,204 B2 2/2007 Narayanaswami et al …
Managing incident response operations based on monitored network activity
JB Deaguero, EH Driggs, XJ Wu, NJ Braun… - US Patent …, 2020 - Google Patents
Embodiments are directed to monitoring network traffic associated with networks to provide
metrics. A monitoring engine may determine an anomaly based on the metrics exceeding …
metrics. A monitoring engine may determine an anomaly based on the metrics exceeding …
System and method of encrypting network address for anonymity and preventing data exfiltration
JT Trostle - US Patent 8,533,465, 2013 - Google Patents
BACKGROUND Network security consists of the provisions made in an underlying computer
network infrastructure, policies adopted by the network administrator to protect the network …
network infrastructure, policies adopted by the network administrator to protect the network …
Unique code for token verification
PL Narayan, P Kumnick, M Vasu - US Patent 10,664,843, 2020 - Google Patents
A method for tokenizing credentials is disclosed. In addition to a token, a verification value
can be provided for each interaction. The verification value can be generated based at least …
can be provided for each interaction. The verification value can be generated based at least …
Personalization of alerts based on network monitoring
XJ Wu, NJ Braun, JB Deaguero… - US Patent …, 2020 - Google Patents
Embodiments are directed to monitoring network traffic using network computers. A
monitoring engine may monitor network traffic associated with a plurality of entities in a …
monitoring engine may monitor network traffic associated with a plurality of entities in a …
Unique code for token verification
PL Narayan, P Kumnick, M Vasu - US Patent 10,664,844, 2020 - Google Patents
A method for tokenizing credentials is disclosed. In addition to a token, a verification value
can be provided for each interaction. The verification value can be generated based at least …
can be provided for each interaction. The verification value can be generated based at least …
Method and system for dynamically obscuring addresses in IPv6
SL Groat, MW Dunlop, WM Urbanski… - US Patent …, 2016 - Google Patents
US9461875B2 - Method and system for dynamically obscuring addresses in IPv6 - Google
Patents US9461875B2 - Method and system for dynamically obscuring addresses in IPv6 …
Patents US9461875B2 - Method and system for dynamically obscuring addresses in IPv6 …
System for using an authorization token to separate authentication and authorization services
MF Nakhjiri - US Patent 8,539,559, 2013 - Google Patents
A novel system for utilizing an authorization token to separate authentication and
authorization services. The system authenticates a client to an authenticating server; …
authorization services. The system authenticates a client to an authenticating server; …
Location privacy for internet protocol networks using cryptographically protected prefixes
Abstract Cryptographically Protected Prefixes (“CPPs”) are used to create IP addresses,
preventing any correlation between a CPP IP address and a host's geographic location. An …
preventing any correlation between a CPP IP address and a host's geographic location. An …