×

Selective encryption delineation

  • US 10,601,781 B2
  • Filed: 06/23/2016
  • Issued: 03/24/2020
  • Est. Priority Date: 10/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method of decrypting a partially encrypted data stream to facilitate exchanging a mixture of sensitive and insensitive data, the method comprising:

  • receiving, from a remote server in a first network domain, at an edge encryption proxy in a second network domain, the partially encrypted data stream;

    scanning the partially encrypted data stream, wherein scanning the partially encrypted data stream includes;

    identifying a first portion of the partially encrypted data stream, wherein the first portion omits an encrypted portion sentinel;

    wherein the end encrypted portion sentinel comprises at least one value selected based at least in part on a determination that the at least one value is statistically unlikely to be included to be included in the partially encrypted data stream;

    including the first portion in a decrypted output data stream;

    identifying encryptionmetadata in the partially encrypted data stream;

    identifying the encrypted portion sentinel in the partially encrypted data stream subsequent to the first portion, wherein the encrypted portion sentinel is configured to indicate that subsequent data is encrypted until a subsequent end encrypted portion sentinel is present in the partially encrypted data stream, wherein an end encrypted portion sentinel comprises at least one value selected based at least in part on a determination that the at least one value is statistically unlikely to be included in the partially encrypted data stream; and

    identifying an encrypted portion in the partially encrypted data stream subsequent to the encrypted portion sentinel;

    generating a decrypted data portion by decrypting the encrypted portion in response to identifying the encrypted portion sentinel, wherein decrypting the encrypted portion includes;

    identifying an encrypted data portion in the encrypted portion, the encrypted data portion omitting the end encrypted portion sentinel;

    decrypting the encrypted data portion using at least in part the encryption metadata before having identified the end encrypted portion sentinel; and

    defining an end to the encrypted data portion in response to identifying the end encrypted portion sentinel in the encrypted portion subsequent to the encrypted data portion, wherein the end encrypted portion sentinel is configured to indicate that subsequent data is decrypted until a subsequent encrypted portion sentinel is present in the partially encrypted data stream;

    including the decrypted data portion in the decrypted output data stream; and

    outputting the decrypted output data stream to a client device in the second network domain.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×