Patents by Inventor Cheryl HE
Cheryl HE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11146397Abstract: A technique includes encrypting plaintext to provide a set of projective coordinates that represents a point of an abelian variety curve and represents ciphertext. The technique includes encoding the projective coordinates with metadata, which is associated with the ciphertext.Type: GrantFiled: October 31, 2017Date of Patent: October 12, 2021Assignee: Micro Focus LLCInventors: Luther Martin, Timothy Roake, Cheryl He
-
Patent number: 10892890Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.Type: GrantFiled: September 29, 2017Date of Patent: January 12, 2021Assignee: MICRO FOCUS LLCInventors: Timothy Roake, Cheryl He, Luther Martin
-
Patent number: 10796006Abstract: In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data points. For each of the subsequent data points, a delta degree value may be determined as a difference between a subsequent data point and a corresponding previous data point. A first format preserving encryption (FPE) may be applied to encrypt longitude and latitude values of the first data point. A second FPE may be applied by applying a translation of a plurality of translations to encrypt each delta degree value. A total distance traveled, a total time, and/or a total elevation gain may be extracted from the encrypted first data point and the encrypted delta degree values.Type: GrantFiled: August 31, 2017Date of Patent: October 6, 2020Assignee: MICRO FOCUS LLCInventors: Timothy Roake, Cheryl He, Luther Martin
-
Patent number: 10749674Abstract: In one example, a system for format preserving encryption utilizing a key version can include a processor, and a memory resource storing instructions executable by the processor to determine a quantity of significant bits for a value to be encrypted, mask the value to include the quantity of significant bits, perform format preserving encryption on the masked value to generate an encrypted value, and append a key version to the encrypted value.Type: GrantFiled: September 29, 2017Date of Patent: August 18, 2020Assignee: MICRO FOCUS LLCInventors: Timothy Roake, Cheryl He, Luther Martin
-
Patent number: 10630470Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.Type: GrantFiled: September 29, 2017Date of Patent: April 21, 2020Assignee: MICRO FOCUS LLCInventors: Cheryl He, Timothy Roake, Luther Martin
-
Patent number: 10505714Abstract: In some examples, floating point cohort based encryption may include determining an exponent of a floating point cohort.Type: GrantFiled: August 31, 2017Date of Patent: December 10, 2019Assignee: MICRO FOCUS LLCInventors: Cheryl He, Timothy Roake, Luther Martin
-
Publication number: 20190132129Abstract: A technique includes encrypting plaintext to provide a set of projective coordinates that represents a point of an abelian variety curve and represents ciphertext. The technique includes encoding the projective coordinates with metadata, which is associated with the ciphertext.Type: ApplicationFiled: October 31, 2017Publication date: May 2, 2019Inventors: Luther Martin, Timothy Roake, Cheryl He
-
Publication number: 20190103965Abstract: In one example, a system for format preserving encryption utilizing a key version can include a processor, and a memory resource storing instructions executable by the processor to determine a quantity of significant bits for a value to be encrypted, mask the value to include the quantity of significant bits, perform format preserving encryption on the masked value to generate an encrypted value, and append a key version to the encrypted value.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Inventors: Timothy Roake, Cheryl He, Luther Martin
-
Publication number: 20190103963Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Applicant: EntIT Software LLCInventors: Cheryl HE, Timothy ROAKE, Luther MARTIN
-
Publication number: 20190103959Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Applicant: EntIT Software LLCInventors: Timothy ROAKE, Cheryl HE, Luther MARTIN
-
Publication number: 20190065758Abstract: In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data points. For each of the subsequent data points, a delta degree value may be determined as a difference between a subsequent data point and a corresponding previous data point. A first format preserving encryption (FPE) may be applied to encrypt longitude and latitude values of the first data point. A second FPE may be applied by applying a translation of a plurality of translations to encrypt each delta degree value. A total distance traveled, a total time, and/or a total elevation gain may be extracted from the encrypted first data point and the encrypted delta degree values.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Timothy ROAKE, Cheryl HE, Luther MARTIN
-
Publication number: 20190068357Abstract: In some examples, floating point cohort based encryption may include determining an exponent of a floating point cohort.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Cheryl HE, Timothy ROAKE, Luther MARTIN