Dell products l.p. (20240338472). REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE simplified abstract

From WikiPatents
Jump to navigation Jump to search

REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE

Organization Name

dell products l.p.

Inventor(s)

Ofir Ezrielev of Be'er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in (IL)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240338472 titled 'REVERSING SYMMETRIC ENCRYPTIONS USING KEYS FOUND IN SNAPSHOTS - PER-FILE KEYS, RANDOM AND TRANSMITTED OUTSIDE

The abstract of the patent application describes a method that involves identifying a process with both a write operation (performing a malicious process on data) and a transmit operation (sending the data after it has been acted upon maliciously). A snapshot operation is performed to create a copy of the data after the malicious process, and the data is intercepted before or during the transmit operation.

  • Key Features and Innovation:

- Identification of a process with write and transmit operations - Performing a malicious process on data to render it unusable - Creating a snapshot of the data after the malicious process - Intercepting the data before or during transmission

  • Potential Applications:

- Data security and protection - Preventing unauthorized data transmission - Detecting and mitigating malicious processes

  • Problems Solved:

- Data tampering and unauthorized access - Data breaches and leaks - Ensuring data integrity and confidentiality

  • Benefits:

- Enhanced data security - Protection against malicious attacks - Safeguarding sensitive information

  • Commercial Applications:

- Cybersecurity software and services - Data protection solutions for businesses - Compliance with data privacy regulations

  • Prior Art:

- Researchers and experts in the field of cybersecurity - Academic papers and industry reports on data protection

  • Frequently Updated Research:

- Latest advancements in data security technologies - Emerging trends in cybersecurity threats

Questions about the technology: 1. How does the method prevent data from being rendered unusable by malicious processes? 2. What are the potential implications of intercepting data before transmission in terms of data security?


Original Abstract Submitted

one example method includes identifying a process that includes both a write operation and a transmit operation, wherein the write operation comprises performing a malicious process on data that renders the data unusable to an owner of the data, and the transmit operation comprises transmitting the data after the data has been acted upon by the malicious process, performing a snapshot operation to create a snapshot that comprises a copy of the data after the data has been acted upon by the malicious process and/or while the data is being acted upon by the malicious process, and intercepting the data before, or while, the transmit operation is performed.