Patents Assigned to Ionic Security, Inc.
-
Patent number: 11841959Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.Type: GrantFiled: November 18, 2021Date of Patent: December 12, 2023Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
-
Patent number: 11822680Abstract: Systems and methods for intercepting an operation requested by a user (e.g., print a document, cut text, copy an image, paste a hyperlink, embed an audio clip, save as a document in a new location, etc.) and performing one or more actions based on the level of security associated with the originating program, originating file, intended program, and/or intended file for that operation. As such, the disclosed systems and methods may enable consistent data security to be applied to a particular data item regardless of the location of that data item or the operations performed on the same.Type: GrantFiled: March 26, 2019Date of Patent: November 21, 2023Assignee: IONIC SECURITY INC.Inventors: Ryan Speers, Adam Ghetti, Farzon Lotfi, David Askew, Kent Rollins
-
Systems and methods for cryptographically-secure queries using filters generated by multiple parties
Patent number: 11726993Abstract: Systems and methods are disclosed that receive data at an electronic computing device. A first algorithm can be applied to the phrases to generate masked versions of the phrases. The masked versions can be cryptographically secured using a second algorithm and a cryptographic key. The second algorithm and cryptographic key can be used to generate a secured versions of the phrases. A filter representative of the data can be generated using the secured versions of the phrases.Type: GrantFiled: September 15, 2021Date of Patent: August 15, 2023Assignee: Ionic Security Inc.Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns -
Patent number: 11709948Abstract: Systems and methods are disclosed for generation of a representative data structure. A computing device can receive data including various data items. The computing device can generate logical rows that include the data items. The computing device can convert the logical rows into nodes and store the nodes into logical rows of a first logical table. The computing device can generate logical rows for a second logical table including row identifiers and a link to one of the logical rows from the first logical table.Type: GrantFiled: December 10, 2021Date of Patent: July 25, 2023Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
-
Patent number: 11387986Abstract: Systems and methods are discussed for performing multi-key cryptographic operations. Policies can be received that define whether to perform a cryptographic operation with respect to various data items generated by one or more computing devices. The data items can be identified and compared to the policies to determine whether to perform the cryptographic operation on subsets of data items. The cryptographic operation can be performed with respect to a first subset of the data items using a first key, while the cryptographic operation can be performed with respect to a second subset of the data items using a second key.Type: GrantFiled: January 13, 2020Date of Patent: July 12, 2022Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Systems and methods for cryptographically-secure queries using filters generated by multiple parties
Patent number: 11238032Abstract: Systems and methods are disclosed that receive data at an electronic computing device. The data can include phrases that can be transformed according to an algorithm to generate a masked version of the phrases. The masked version can be transmitted to a third party system for securing. The secured version can be received from the third party system. A secured filter representative of the received data can be generated based on the received secured version.Type: GrantFiled: November 13, 2019Date of Patent: February 1, 2022Assignee: Ionic Security Inc.Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns -
Patent number: 11232216Abstract: Systems and methods are disclosed for generation of secure indexes that permit the querying or searching of encrypted data in a cryptographically-secure manner. In various embodiments, a filter gradient comprises a node identifier, a set membership filter, and an ordered genealogy (such that it comprises a filter that encodes a subset of the items encoded by its parent), and a FiG tree is a rooted tree with filter gradients (and, optionally, one or more dictionaries) as nodes such that each filter gradient uses a different hash. A HiiT data structure, in various embodiments, comprises a hash table that points to the rows of an inverted index table. In various embodiments, an oblivious pseudorandom function may be employed to mask, secure, and prepare the phrases for insertion into the secure indexes.Type: GrantFiled: July 16, 2020Date of Patent: January 25, 2022Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
-
Patent number: 11210412Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.Type: GrantFiled: February 1, 2018Date of Patent: December 28, 2021Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
-
Patent number: 11138275Abstract: Systems and methods are disclosed for, without access to the original set of data elements from which the online filter was originally constructed, converting online filters to other types of filters. To convert a particular type of online filter to either an offline filter or a different type of online filter, the system, in various embodiments, first determines the types/formats of each of the relevant filters. Then, in various embodiments, the system extracts the appropriate data representations from the original online filter. In various embodiments, the system converts the extracted data representations into the data representation format of the new filter. The system, in various embodiments, then constructs the new filter from the converted data representations.Type: GrantFiled: May 7, 2018Date of Patent: October 5, 2021Assignee: Ionic Security Inc.Inventors: Jonathan Thomas Burns, Ryan Speers
-
Patent number: 10740474Abstract: Systems and methods are disclosed for generation of secure indexes that permit the querying or searching of encrypted data in a cryptographically-secure manner. In various embodiments, a filter gradient comprises a node identifier, a set membership filter, and an ordered genealogy (such that it comprises a filter that encodes a subset of the items encoded by its parent), and a FiG tree is a rooted tree with filter gradients (and, optionally, one or more dictionaries) as nodes such that each filter gradient uses a different hash. A HiiT data structure, in various embodiments, comprises a hash table that points to the rows of an inverted index table. In various embodiments, an oblivious pseudorandom function may be employed to mask, secure, and prepare the phrases for insertion into the secure indexes.Type: GrantFiled: May 7, 2018Date of Patent: August 11, 2020Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
-
Patent number: 10567167Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: July 9, 2018Date of Patent: February 18, 2020Assignee: IONIC SECURITY INC.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Systems and methods for cryptographically-secure queries using filters generated by multiple parties
Patent number: 10503730Abstract: Systems and methods that permit the querying of encrypted data in a cryptographically-secure manner. Generally, data that has been encrypted cannot be queried using plaintext terms because it is in ciphertext. Accordingly, use of filters that correspond to the encrypted data and are generated by multiple parties permits querying of the data without decrypting the data or compromising the security of the encrypted data or of the queries against that data.Type: GrantFiled: December 28, 2016Date of Patent: December 10, 2019Assignee: Ionic Security Inc.Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns -
Patent number: 10270592Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: March 27, 2017Date of Patent: April 23, 2019Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ken Green, Kenneth Silva, Michael Rollins, Nathaniel Tinkler, Jeremy Eckman, Ryan Speers
-
Systems and methods for cryptographically-secure queries using filters generated by multiple parties
Patent number: 10235335Abstract: Systems and methods that permit the querying of encrypted data in a cryptographically-secure manner. Generally, data that has been encrypted cannot be queried using plaintext terms because it is in ciphertext. Accordingly, use of filters that correspond to the encrypted data and are generated by multiple parties permits querying of the data without decrypting the data or compromising the security of the encrypted data or of the queries against that data.Type: GrantFiled: July 3, 2018Date of Patent: March 19, 2019Assignee: Ionic Security Inc.Inventors: Ryan Mark Speers, Adam Ghetti, Brian Michael Vohaska, Jeremy Michael Eckman, Katrina Jean Ray, Jonathan Thomas Burns -
Patent number: 10095874Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.Type: GrantFiled: September 2, 2015Date of Patent: October 9, 2018Assignee: IONIC SECURITY INC.Inventor: Adam Ghetti
-
Patent number: 10020935Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: March 27, 2017Date of Patent: July 10, 2018Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 10020936Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: April 3, 2017Date of Patent: July 10, 2018Assignee: Ionic Security Inc.Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
-
Patent number: 9619659Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.Type: GrantFiled: February 26, 2016Date of Patent: April 11, 2017Assignee: Ionic Security Inc.Inventor: Adam Ghetti
-
Patent number: 9621343Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.Type: GrantFiled: February 26, 2016Date of Patent: April 11, 2017Assignee: Ionic Security Inc.Inventor: Adam Ghetti
-
Patent number: 9614670Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: February 5, 2016Date of Patent: April 4, 2017Assignee: Ionic Security Inc.Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers