The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 04, 2022

Filed:

May. 18, 2018
Applicant:

Visa International Service Association, San Francisco, CA (US);

Inventors:

Bartlomiej Prokop, Belfast, GB;

James Donaldson, Moira, GB;

Peter Lennon, Belfast, GB;

Assignee:

Visa International Service Association, San Francisco, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/28 (2006.01); G06F 21/62 (2013.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G06F 21/6209 (2013.01); G06F 21/602 (2013.01); G06F 21/6218 (2013.01); H04L 9/0822 (2013.01); H04L 63/0428 (2013.01); G06F 2221/2107 (2013.01);
Abstract

Techniques for reducing compromise of sensitive data in a virtual machine are described. During initiation of a secure string instance of a program module in memory allocated to the virtual machine, the program module can receive sensitive data in plaintext and retrieves parameters sourced from outside the allocated memory. During the execution of the program module, the sensitive data can be encrypted using a key based on the parameters to obtain encrypted data. The program module can overwrite the sensitive data with the encrypted data. The program module can receive a trigger to send a message that is generated using the sensitive data. The encrypted data can be decrypted using the key based on the parameters to obtain the sensitive data. After encryption and decryption, the program module can generate the message using the sensitive data and overwrite the sensitive data and the parameters used to encrypt the sensitive data.


Find Patent Forward Citations

Loading…