18297118. REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE simplified abstract (Dell Products L.P.)
REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE
Organization Name
Inventor(s)
Ofir Ezrielev of Be'er Sheba (IL)
Yevgeni Gehtman of Modi'in (IL)
Tomer Shachar of Beer-Sheva (IL)
REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18297118 titled 'REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE
The abstract of this patent application describes a method that involves identifying a process with both a write operation and a transmit operation. The write operation involves performing a malicious process on data to render it unusable to the data owner, while the transmit operation involves sending the data after it has been affected by the malicious process. A snapshot operation is then performed to create a copy of the data after it has been acted upon by the malicious process, and the data is intercepted before or during the transmit operation.
- Identifying a process with a write operation and a transmit operation
- Performing a malicious process on data to make it unusable to the owner
- Sending the data after it has been affected by the malicious process
- Creating a snapshot of the data after the malicious process
- Intercepting the data before or during the transmit operation
Potential Applications: - Data security and protection - Cybersecurity measures - Preventing unauthorized data transmission
Problems Solved: - Protecting sensitive data from malicious processes - Preventing unauthorized data transmission - Ensuring data integrity and security
Benefits: - Enhanced data security - Prevention of data breaches - Improved control over data transmission
Commercial Applications: Title: Data Security and Protection Technology for Businesses This technology can be used in industries such as finance, healthcare, and government to safeguard sensitive information and prevent data breaches. It can also be utilized by cybersecurity companies to enhance their protective measures and offer secure solutions to clients.
Prior Art: Readers can start their search for prior art related to this technology by looking into patents and research papers on data security, encryption methods, and malware detection and prevention.
Frequently Updated Research: Stay updated on the latest advancements in data security, encryption technologies, and cybersecurity measures to ensure the most effective protection for sensitive information.
Questions about Data Security and Protection: 1. How does this technology compare to existing data encryption methods? 2. What are the potential implications of this technology for the cybersecurity industry?
Original Abstract Submitted
One example method includes identifying a process that includes both a write operation and a transmit operation, wherein the write operation comprises performing a malicious process on data that renders the data unusable to an owner of the data, and the transmit operation comprises transmitting the data after the data has been acted upon by the malicious process, performing a snapshot operation to create a snapshot that comprises a copy of the data after the data has been acted upon by the malicious process and/or while the data is being acted upon by the malicious process, and intercepting the data before, or while, the transmit operation is performed.