Patents Assigned to Ionic Security, Inc.
  • Patent number: 11841959
    Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.
    Type: Grant
    Filed: November 18, 2021
    Date of Patent: December 12, 2023
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
  • Patent number: 11822680
    Abstract: Systems and methods for intercepting an operation requested by a user (e.g., print a document, cut text, copy an image, paste a hyperlink, embed an audio clip, save as a document in a new location, etc.) and performing one or more actions based on the level of security associated with the originating program, originating file, intended program, and/or intended file for that operation. As such, the disclosed systems and methods may enable consistent data security to be applied to a particular data item regardless of the location of that data item or the operations performed on the same.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: November 21, 2023
    Assignee: IONIC SECURITY INC.
    Inventors: Ryan Speers, Adam Ghetti, Farzon Lotfi, David Askew, Kent Rollins
  • Patent number: 11726993
    Abstract: Systems and methods are disclosed that receive data at an electronic computing device. A first algorithm can be applied to the phrases to generate masked versions of the phrases. The masked versions can be cryptographically secured using a second algorithm and a cryptographic key. The second algorithm and cryptographic key can be used to generate a secured versions of the phrases. A filter representative of the data can be generated using the secured versions of the phrases.
    Type: Grant
    Filed: September 15, 2021
    Date of Patent: August 15, 2023
    Assignee: Ionic Security Inc.
    Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns
  • Patent number: 11709948
    Abstract: Systems and methods are disclosed for generation of a representative data structure. A computing device can receive data including various data items. The computing device can generate logical rows that include the data items. The computing device can convert the logical rows into nodes and store the nodes into logical rows of a first logical table. The computing device can generate logical rows for a second logical table including row identifiers and a link to one of the logical rows from the first logical table.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: July 25, 2023
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
  • Patent number: 11387986
    Abstract: Systems and methods are discussed for performing multi-key cryptographic operations. Policies can be received that define whether to perform a cryptographic operation with respect to various data items generated by one or more computing devices. The data items can be identified and compared to the policies to determine whether to perform the cryptographic operation on subsets of data items. The cryptographic operation can be performed with respect to a first subset of the data items using a first key, while the cryptographic operation can be performed with respect to a second subset of the data items using a second key.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: July 12, 2022
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 11238032
    Abstract: Systems and methods are disclosed that receive data at an electronic computing device. The data can include phrases that can be transformed according to an algorithm to generate a masked version of the phrases. The masked version can be transmitted to a third party system for securing. The secured version can be received from the third party system. A secured filter representative of the received data can be generated based on the received secured version.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: February 1, 2022
    Assignee: Ionic Security Inc.
    Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns
  • Patent number: 11232216
    Abstract: Systems and methods are disclosed for generation of secure indexes that permit the querying or searching of encrypted data in a cryptographically-secure manner. In various embodiments, a filter gradient comprises a node identifier, a set membership filter, and an ordered genealogy (such that it comprises a filter that encodes a subset of the items encoded by its parent), and a FiG tree is a rooted tree with filter gradients (and, optionally, one or more dictionaries) as nodes such that each filter gradient uses a different hash. A HiiT data structure, in various embodiments, comprises a hash table that points to the rows of an inverted index table. In various embodiments, an oblivious pseudorandom function may be employed to mask, secure, and prepare the phrases for insertion into the secure indexes.
    Type: Grant
    Filed: July 16, 2020
    Date of Patent: January 25, 2022
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
  • Patent number: 11210412
    Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: December 28, 2021
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
  • Patent number: 11138275
    Abstract: Systems and methods are disclosed for, without access to the original set of data elements from which the online filter was originally constructed, converting online filters to other types of filters. To convert a particular type of online filter to either an offline filter or a different type of online filter, the system, in various embodiments, first determines the types/formats of each of the relevant filters. Then, in various embodiments, the system extracts the appropriate data representations from the original online filter. In various embodiments, the system converts the extracted data representations into the data representation format of the new filter. The system, in various embodiments, then constructs the new filter from the converted data representations.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: October 5, 2021
    Assignee: Ionic Security Inc.
    Inventors: Jonathan Thomas Burns, Ryan Speers
  • Patent number: 10740474
    Abstract: Systems and methods are disclosed for generation of secure indexes that permit the querying or searching of encrypted data in a cryptographically-secure manner. In various embodiments, a filter gradient comprises a node identifier, a set membership filter, and an ordered genealogy (such that it comprises a filter that encodes a subset of the items encoded by its parent), and a FiG tree is a rooted tree with filter gradients (and, optionally, one or more dictionaries) as nodes such that each filter gradient uses a different hash. A HiiT data structure, in various embodiments, comprises a hash table that points to the rows of an inverted index table. In various embodiments, an oblivious pseudorandom function may be employed to mask, secure, and prepare the phrases for insertion into the secure indexes.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: August 11, 2020
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
  • Patent number: 10567167
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: July 9, 2018
    Date of Patent: February 18, 2020
    Assignee: IONIC SECURITY INC.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 10503730
    Abstract: Systems and methods that permit the querying of encrypted data in a cryptographically-secure manner. Generally, data that has been encrypted cannot be queried using plaintext terms because it is in ciphertext. Accordingly, use of filters that correspond to the encrypted data and are generated by multiple parties permits querying of the data without decrypting the data or compromising the security of the encrypted data or of the queries against that data.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: December 10, 2019
    Assignee: Ionic Security Inc.
    Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns
  • Patent number: 10270592
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: April 23, 2019
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ken Green, Kenneth Silva, Michael Rollins, Nathaniel Tinkler, Jeremy Eckman, Ryan Speers
  • Patent number: 10235335
    Abstract: Systems and methods that permit the querying of encrypted data in a cryptographically-secure manner. Generally, data that has been encrypted cannot be queried using plaintext terms because it is in ciphertext. Accordingly, use of filters that correspond to the encrypted data and are generated by multiple parties permits querying of the data without decrypting the data or compromising the security of the encrypted data or of the queries against that data.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: March 19, 2019
    Assignee: Ionic Security Inc.
    Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns
  • Patent number: 10095874
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.
    Type: Grant
    Filed: September 2, 2015
    Date of Patent: October 9, 2018
    Assignee: IONIC SECURITY INC.
    Inventor: Adam Ghetti
  • Patent number: 10020935
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: July 10, 2018
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
  • Patent number: 10020936
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: July 10, 2018
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
  • Patent number: 9621343
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.
    Type: Grant
    Filed: February 26, 2016
    Date of Patent: April 11, 2017
    Assignee: Ionic Security Inc.
    Inventor: Adam Ghetti
  • Patent number: 9619659
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.
    Type: Grant
    Filed: February 26, 2016
    Date of Patent: April 11, 2017
    Assignee: Ionic Security Inc.
    Inventor: Adam Ghetti
  • Patent number: 9614670
    Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: April 4, 2017
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers