18335073. ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Itamar Azulay of Mishmar Ayyalon (IL)

Tomer Cherni of Ganei Tikva (IL)

ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18335073 titled 'ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS

Simplified Explanation

Abstract

The patent application describes an apparatus that can obtain an encryption key from a user and use it to encrypt session activity data during a proxy session. The encrypted data is then stored for further use.

Patent/Innovation Explanation

  • An apparatus is described that includes a processor and memory.
  • Machine-readable instructions are stored in the memory.
  • When executed by the processor, these instructions allow the processor to obtain an encryption key from a user.
  • The processor can identify session activity data during a proxy session of the user.
  • The identified session activity data is encrypted using the encryption key obtained from the user.
  • The encrypted session activity data is then stored for future use.

Potential Applications

  • Secure communication: This technology can be used to encrypt and store session activity data during proxy sessions, ensuring the security and privacy of communication.
  • Data analysis: The encrypted session activity data can be stored and later analyzed for various purposes, such as identifying patterns or trends in user behavior.

Problems Solved

  • Data security: By encrypting session activity data, this technology helps protect sensitive information from unauthorized access.
  • Privacy protection: Storing encrypted session activity data ensures that user activities remain private and cannot be easily accessed or analyzed without proper decryption.

Benefits

  • Enhanced security: Encryption of session activity data adds an extra layer of security, making it difficult for unauthorized individuals to access or understand the data.
  • Privacy preservation: By storing encrypted session activity data, user privacy is protected, as the data cannot be easily deciphered or linked back to specific individuals.


Original Abstract Submitted

According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to obtain an encryption key from a user. The processor may identify session activity data during a proxy session of the user and may encrypt the identified session activity data using the encryption key obtained from the user. The processor may store the encrypted session activity data.