Patents Assigned to Axis Technology Software, LLC
-
Patent number: 9054872Abstract: A method for secure data transformation and lookup is executed by a computer system. A data value to create an encrypted value is encrypted by the computer system. A hash value based on the encrypted value is generated by the computer system. A modulo operation is performed by the computer system on the hash value to create a modulo value. A transformed value from a lookup table is retrieved by the computer system by using the modulo value as an index for the look up table. The transformed value is provided by the computer system.Type: GrantFiled: September 9, 2013Date of Patent: June 9, 2015Assignee: Axis Technology Software, LLCInventors: Ilker Taskaya, Alex Nauda
-
Publication number: 20140032928Abstract: A method for secure data transformation and lookup is executed by a computer system. A data value to create an encrypted value is encrypted by the computer system. A hash value based on the encrypted value is generated by the computer system. A modulo operation is performed by the computer system on the hash value to create a modulo value. A transformed value from a lookup table is retrieved by the computer system by using the modulo value as an index for the look up table. The transformed value is provided by the computer system.Type: ApplicationFiled: September 9, 2013Publication date: January 30, 2014Applicant: AXIS TECHNOLOGY SOFTWARE, LLCInventors: Ilker Taskaya, Alex Nauda
-
Patent number: 8533470Abstract: Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked. The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value.Type: GrantFiled: July 7, 2011Date of Patent: September 10, 2013Assignee: Axis Technology Software, LLCInventors: Ilker Taskaya, Alex Nauda
-
Patent number: 8522016Abstract: Described are methods, systems, and apparatus, including computer program products for securing data of a production server. The invention, in one implementation, includes reading a data value on the production server, obfuscating the data value in the memory of the server to create a masked value, transmitting the masked value to a non-production server, and storing the masked value on the non-production server.Type: GrantFiled: June 18, 2010Date of Patent: August 27, 2013Assignee: Axis Technology Software, LLCInventors: Ilker Taskaya, Alex Nauda
-
Publication number: 20120210139Abstract: Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked. The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value.Type: ApplicationFiled: July 7, 2011Publication date: August 16, 2012Applicant: Axis Technology Software, LLCInventors: Ilker Taskaya, Alex Nauda
-
Publication number: 20110314300Abstract: Described are methods and apparatus, including computer program products for masking data. The inventions involves receiving a mapping scheme with a number of segments and a different cryptographic algorithm for each segment and then receiving a target value to be masked. The target value is then split into a number of segments based on the number of segments of the mapping scheme and the cryptographic algorithm is applied for each segment in the mapping scheme to each segment of the target value to generate an encrypted segment for each segment in the target value. Then, the encrypted segments are concatenated to create a masked value.Type: ApplicationFiled: July 7, 2011Publication date: December 22, 2011Applicant: Axis Technology Software, LLCInventors: Ilker Taskaya, Alex Nauda