- Seattle WA, US Michael Patrick Mackey - Lake Stevens WA, US
International Classification:
G06F 17/30 G06F 21/60 H04L 9/06
Abstract:
Embodiments are directed to a searchable encryption model for fast indexing and searching of encoded documents. The encoded documents may have multiple encryption and/or compression layers applied. The model supports full or partial keywords and simple or complex queries. The index model may be based on prefix trees to optimize space and time complexities during indexing and searching. This index model can be used as the foundation to more complex search engines. Indexed documents may be tokenized and each token indexed in a prefix tree data structure, or trie index. Tokens in the index may be associated with a token catalog that includes information related to the documents that include the token. Token catalogs may be implemented as inverted indices that map tokens to documents. If a query is provided, a result set responsive to the query may be provided based on the token index and the token catalogs.
- Seattle WA, US Michael Patrick Mackey - Lake Stevens WA, US Li Xin Lance Lu - Lynnwood WA, US
International Classification:
G06F 21/62 H04L 9/30 H04L 29/06
Abstract:
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.
- Seattle WA, US Michael Patrick Mackey - Lake Stevens WA, US Li Xin Lance Lu - Lynnwood WA, US
International Classification:
H04L 9/30
Abstract:
Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.
- Seattle WA, US Michael Patrick Mackey - Lake Stevens WA, US
Assignee:
Centri Technology, Inc. - Seattle WA
International Classification:
H04L 29/06
US Classification:
713171
Abstract:
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically, compression and encryption are implemented in separate functional units. This has a few disadvantages: 1) encryption cannot make use of compression state to further secure the message, 2) processed data is read and written twice, 3) additional space, time, and resources are consumed, and 4) it is more prone to potential cipher-attacks since the encryption stage is independent from compression. Embodiments overcome these disadvantages by structuring these operations so that both compression and encryption is executed within the same processing loop. Thus: 1) encryption is stronger due to the dependence on the compression state, 2) I/O buffers are accessed only once reducing overhead, 3) system footprint is reduced, and 4) cipher analysis is more complex since the decryption process cannot be separated from the decompression process.
Seeding Of A Workspace To Optimize Codec Operations
- Seattle WA, US Michael Patrick Mackey - Lake Stevens WA, US
International Classification:
H04L 29/06
US Classification:
709219
Abstract:
Various embodiments are directed toward compressing and/or decompressing data communicated between one or more network devices (e.g., codec operations). In particular, embodiments are directed towards improving codec performance by seeding the computation workspace that may be used by various codec processors. The seeding data may be determined based on at least one characteristic of a particular codec and the characteristics of data that may be processed by the codec processor. Also, the codec processor may be employed to generate data for the codec workspace based on the determined seeding data. Workspace data may be generated by processing the seeding data with the same codec processor that is used for normal codec operations. The workspace generated from the seeding data may be stored for future use, such as, when a matched data stream arrives.
- Seattle WA, US Michael Patrick Mackey - Lake Stevens WA, US
Assignee:
Centri Technology, Inc. - Seattle WA
International Classification:
H04L 9/28
US Classification:
713150
Abstract:
Embodiments compress and encrypt data in a single pass to reduce inefficiencies that occur from compression and encrypting data separately. Typically, compression and encryption are implemented in separate functional units. This has a few disadvantages: 1) encryption cannot make use of compression state to further secure the message, 2) processed data is read and written twice, 3) additional space, time, and resources are consumed, and 4) it is more prone to potential cipher-attacks since the encryption stage is independent from compression. Embodiments overcome these disadvantages by structuring these operations so that both compression and encryption is executed within the same processing loop. Thus: 1) encryption is stronger due to the dependence on the compression state, 2) I/O buffers are accessed only once reducing overhead, 3) system footprint is reduced, and 4) cipher analysis is more complex since the decryption process cannot be separated from the decompression process.
Dr. Mackey graduated from the University of Arkansas College of Medicine at Little Rock in 1973. He works in Jonesboro, AR and 1 other location and specializes in Nephrology. Dr. Mackey is affiliated with North East Arkansas Baptist Memorial Hospital.
Mililani, HIRealtor, specializing in Residential properties for homeownership and investment. I work equally with experienced or first time Buyers and Sellers.
I have high ideals in my life and I will stand behind
them, even if that means going against the grain.”
“I love to come into a difficult situation, get a... I have high ideals in my life and I will stand behind
them, even if that means going against the grain.”
“I love to come into a difficult situation, get a quick,
solid handle on what the problems are, and then cut
through to find the best solution that serves everyone involved.”
“I am...