18297118. REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 02:47, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE

Organization Name

Dell Products L.P.

Inventor(s)

Ofir Ezrielev of Be'er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in (IL)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18297118 titled 'REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE

The abstract of this patent application describes a method that involves identifying a process with both a write operation and a transmit operation. The write operation involves performing a malicious process on data to render it unusable to the data owner, while the transmit operation involves sending the data after it has been affected by the malicious process. A snapshot operation is then performed to create a copy of the data after it has been acted upon by the malicious process, and the data is intercepted before or during the transmit operation.

  • Identifying a process with a write operation and a transmit operation
  • Performing a malicious process on data to make it unusable to the owner
  • Sending the data after it has been affected by the malicious process
  • Creating a snapshot of the data after the malicious process
  • Intercepting the data before or during the transmit operation

Potential Applications: - Data security and protection - Cybersecurity measures - Preventing unauthorized data transmission

Problems Solved: - Protecting sensitive data from malicious processes - Preventing unauthorized data transmission - Ensuring data integrity and security

Benefits: - Enhanced data security - Prevention of data breaches - Improved control over data transmission

Commercial Applications: Title: Data Security and Protection Technology for Businesses This technology can be used in industries such as finance, healthcare, and government to safeguard sensitive information and prevent data breaches. It can also be utilized by cybersecurity companies to enhance their protective measures and offer secure solutions to clients.

Prior Art: Readers can start their search for prior art related to this technology by looking into patents and research papers on data security, encryption methods, and malware detection and prevention.

Frequently Updated Research: Stay updated on the latest advancements in data security, encryption technologies, and cybersecurity measures to ensure the most effective protection for sensitive information.

Questions about Data Security and Protection: 1. How does this technology compare to existing data encryption methods? 2. What are the potential implications of this technology for the cybersecurity industry?


Original Abstract Submitted

One example method includes identifying a process that includes both a write operation and a transmit operation, wherein the write operation comprises performing a malicious process on data that renders the data unusable to an owner of the data, and the transmit operation comprises transmitting the data after the data has been acted upon by the malicious process, performing a snapshot operation to create a snapshot that comprises a copy of the data after the data has been acted upon by the malicious process and/or while the data is being acted upon by the malicious process, and intercepting the data before, or while, the transmit operation is performed.