“Matching Cryptographic Computing Resources To The Predicted Requirements For Decrypting Encrypted Communications” in Patent Application Approval Process (USPTO 20230068521): Patent Application - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
March 17, 2023 Newswires
Share
Share
Tweet
Email

“Matching Cryptographic Computing Resources To The Predicted Requirements For Decrypting Encrypted Communications” in Patent Application Approval Process (USPTO 20230068521): Patent Application

Insurance Daily News

2023 MAR 17 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent application by the inventors Chen, Wan Yue (Beijing, CN); Chen, Xiao Ling (Beijing, CN); Jiang, Peng Hui (Beijing, CN); Li, Jing (Beijing, CN); Liu, Chen Guang (Beijing, CN); Wang, Heng (Beijing, CN), filed on August 25, 2021, was made available online on March 2, 2023, according to news reporting originating from Washington, D.C., by NewsRx correspondents.

This patent application has not been assigned to a company or institution.

The following quote was obtained by the news editors from the background information supplied by the inventors: “The present invention relates generally to programmable computer systems. More specifically, the present invention relates to computer systems, computer-implemented methods, and computer program products that automatically match or scale cryptographic computing resources to the predicted and/or mandatory requirements for decrypting encrypted communications, including, for example, encrypted connection requests such as hypertext transfer protocol secure (HTTPS) messages.

“HTTPS is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website server. HTTPS is encrypted in order to increase security of data transfer. This is particularly important when users transmit sensitive data, such as by logging into a website of a financial account, an email service, or a health insurance provider. HTTPS uses an encryption protocol to encrypt communications. The protocol is known as transport layer security (TLS) and was formerly known as secure sockets layer (SSL). The TLS (or SSL) protocol secures communications by using what is known as an asymmetric public key infrastructure. This type of security system uses two different keys to encrypt communications between two parties, namely a private key and a public key. The private key is controlled by the owner of a website and is kept private. The private key lives on a web-server and is used to decrypt information encrypted by the public key. The public key is available to everyone who wants to interact with the server in a way that is secure. Information that is encrypted by the public key can only be decrypted by the private key.

“Sensitive application data can be sealed by a secure enclave on a worker node. A secure enclave is an isolated and trusted area of memory where critical aspects of application functionality are protected, which helps keep sensitive application data confidential and unmodified. In other words, the secure enclave is an encrypted portion of main memory. The secure enclave is hardened by processor-based security mechanisms. Tagging security to a sealed cryptographic key derived from a given machine’s hardware (e.g., the worker node’s processor chip) is highly secure.

“The operational performance of the computer processing unit(s) (CPUs) of a computer system can be slowed down by the amount and nature of the processing tasks the CPU must perform. Cryptographic acceleration and coprocessors attempt to improve hardware performance by assisting the CPU with its required tasks. Cryptographic acceleration is a software-based tool that attempts to speed up overall system performance by providing additional hardware, such as a coprocessor, where cryptographic algorithms can perform cryptographic operations (or functions) separately from the CPU processing core, thereby freeing up CPU processing cores to focus on other functions and operations. Coprocessors are supplementary processors in that they can be configured to take over the performance of selected processor-intensive tasks of an associated CPU in order to allow the CPU to focus its computing resources on tasks that are essential to the overall system.

“Known cryptographic acceleration and coprocessors do not address the efficiency of cryptographic operations. For example, web-servers usually utilize open-source software (e.g., OpenSSL®) to perform HTTPS decryption due to performance and key protection considerations. Suitable open-source software (OSS) can include an engine that delivers or routes encrypted connection requests received at the web-server to a determined cryptographic computing resource. However, the determined cryptographic computing resource is not specifically aligned to (or matched with) the cryptographic operations required by the encrypted connection request. For example, under some conditions, the appropriate cryptographic processing for the encrypted connection request must be performed in a high security computing resource (e.g., a cloud HSM (hardware security module)), and under other conditions, the appropriated cryptographic processing for the encrypted connection request does not need to be performed in a high security computing resource.

“Accordingly, known techniques for performing cryptographic operations do not improve the efficiency of such cryptographic operations, which results in the wasteful and inefficient over-usage of cryptographic computing resources, including specifically high-security cryptographic computing resources.”

In addition to the background information obtained for this patent application, NewsRx journalists also obtained the inventors’ summary information for this patent application: “Embodiments of the invention include a computer-implemented method that uses a processor system to access an operation policy (OP) of resource-scaling (RS) data associated with an encrypted message, wherein the OP defines cryptographic-operation constraints. Based at least in part on a determination that the cryptographic-operation constraints do not include mandatory cryptographic computing resource requirements, first resource-scaling operations are performed that include performing an analysis of cryptographic metrics associated with the processor system. The cryptographic metrics include information associated with the encrypted message, along with performance measurements that result from cryptographic operations performed by the processor system. The cryptographic-operation constraints and results of the analysis of the cryptographic metrics are used to determine cryptographic processing requirements of the encrypted message, and are further used to match the determined cryptographic processing requirements to selected ones of a set of available cryptographic computing resources, thereby identifying or selecting a customized set of cryptographic computing resources that match the cryptographic processing requirements of the encrypted message. The customized set of cryptographic computing resources is used to perform customized cryptographic operations on the encrypted message.

“Technical benefits provided by the above-described embodiments of the invention include segmenting out any mandatory cryptographic resource requirements to ensure that the mandatory requirements are applied properly because mandatory cryptographic resource requirements are typically applied to encrypted messages with higher security levels that require more secure cryptographic resources. By segmenting out the messages with mandatory cryptographic resource requirements, the remaining message types can be more efficiently matched with the cryptographic computing resources they need. By using both cryptographic constraints and cryptographic metrics to match the remaining message types to the cryptographic computing resources they need, the actual historical performance of the cryptographic hardware can be leveraged to improve this matching operation.

“The above-described embodiments of the invention can further include configuring open-source cryptographic software to receive a request to perform cryptographic operations on the encrypted message; and route the request to the processor system instead of performing the request.

“Technical benefits provided by the above-described embodiments of the invention include allowing existing open-source software to be efficiently modified to incorporate features and functionality of the various embodiments of the invention.

“The above-described embodiments of the invention can further include having the first resource-scaling operations include capturing a first set of updated cryptographic metrics that result from using the customized set of cryptographic computing resources to perform the customized cryptographic operations on the encrypted message; and updating the cryptographic metrics with the first set of updated cryptographic metrics.

“Technical benefits provided by the above-described embodiments of the invention include allowing the computer-implemented method to accumulate data from each iteration of the computer-implemented method and using the accumulation data to improve subsequent iterations of the computer-implemented method.

“Embodiments of the invention also provide computer systems and computer program products for having substantially the same features as the computer-implemented method described above.

“Additional features and advantages are realized through the techniques of the present invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention. For a better understanding of the invention with the advantages and the features, refer to the description and to the drawings.”

The claims supplied by the inventors are:

“1. A computer-implemented method for performing cryptographic operations, the computer-implemented method comprising: receiving, using the processor system, resource-scaling (RS) data associated with an encrypted message; accessing, using the processor system, an operation policy (OP) of the RS data, wherein the OP defines cryptographic-operation constraints; based at least in part on a determination that the cryptographic-operation constraints do not include mandatory cryptographic resource requirements, performing first resource-scaling operations comprising: using the processor system to perform an analysis of cryptographic metrics associated with the processor system; wherein the cryptographic metrics comprise: information associated with the encrypted message; and performance measurements of cryptographic operations performed by the processor system; using the cryptographic-operation constraints and results of the analysis of the cryptographic metrics to: determine cryptographic processing requirements of the encrypted message; and match the cryptographic processing requirements to selected ones of a set of available cryptographic computing resources to identify a customized set of cryptographic computing resources that have been selected to match the cryptographic processing requirements of the encrypted message; and using the customized set of cryptographic computing resources to perform customized cryptographic operations on the encrypted message.

“2. The computer-implemented method of claim 1 further comprising: based at least in part on a determination that the cryptographic-operation constraints include the mandatory cryptographic computing resource requirements, performing second resource-scaling operations comprising: routing the encrypted message to a set of mandatory cryptographic computing resources identified by the mandatory cryptographic computing resource requirements; and using the set of mandatory cryptographic computing resources to perform mandatory cryptographic operations on the encrypted message.

“3. The computer-implemented method of claim 1 further comprising configuring open-source cryptographic software to: receive a request to perform cryptographic operations on the encrypted message; and route the request to the processor system instead of performing the request.

“4. The computer-implemented method of claim 3, wherein the open-source cryptographic software comprises open-source secure sockets layer (SSL) software.

“5. The computer-implemented method of claim 1, wherein: the first resource-scaling operations further comprise capturing a first set of updated cryptographic metrics that result from using the customized set of cryptographic computing resources to perform the customized cryptographic operations on the encrypted message; and updating the cryptographic metrics with the first set of updated cryptographic metrics.

“6. The computer-implemented method of claim 2, wherein: the first resource-scaling operations further comprise: capturing a first set of updated cryptographic metrics that result from using the customized set of cryptographic computing resources to perform the customized cryptographic operations on the encrypted message; and updating the cryptographic metrics with the first set of updated cryptographic metrics; and the second resource-scaling operations further comprise: capturing a second set of updated cryptographic metrics that result from using the set of mandatory cryptographic computing resources to perform mandatory cryptographic operations on the encrypted message; and updating the cryptographic metrics with the second set of updated cryptographic metrics.

“7. The computer-implemented method of claim 1, wherein: the processor comprises a predictive model trained to utilize machine learning algorithms to determine the cryptographic processing requirements of the encrypted message; the information associated with the encrypted message includes cryptographic computing resource patterns comprising static data; and the performance measurements include cryptographic metrics comprising dynamic data that changes.

“8. A computer system comprising a memory communicatively coupled to a processor system, wherein the processor system is configured to perform processor system operations comprising: receiving resource-scaling (RS) data associated with an encrypted message; accessing an operation policy (OP) of the RS data, wherein the OP defines cryptographic-operation constraints; based at least in part on a determination that the cryptographic-operation constraints do not include mandatory cryptographic computing resource requirements, performing first resource-scaling operations comprising: an analysis of cryptographic metrics associated with the processor system; wherein the cryptographic metrics comprise: information associated with the encrypted message; and performance measurements of cryptographic operations performed by the processor system; using the cryptographic-operation constraints and results of the analysis of the cryptographic metrics to: determine cryptographic processing requirements of the encrypted message; and match the cryptographic processing requirements to selected ones of a set of available cryptographic computing resources to identify a customized set of cryptographic computing resources that have been selected to match the cryptographic processing requirements of the encrypted message; and using the customized set of cryptographic computing resources to perform customized cryptographic operations on the encrypted message.

“9. The computer-implemented method of claim 8 further comprising: based at least in part on a determination that the cryptographic-operation constraints include the mandatory cryptographic computing resource requirements, performing second resource-scaling operations comprising: routing the encrypted message to a set of mandatory cryptographic computing resources identified by the mandatory cryptographic computing resource requirements; and using the set of mandatory cryptographic computing resources to perform mandatory cryptographic operations on the encrypted message.

“10. The computer-implemented method of claim 8 further comprising configuring open-source cryptographic software to: receive a request to perform cryptographic operations on the encrypted message; and route the request to the processor system instead of performing the request.

“11. The computer-implemented method of claim 10, wherein the open-source cryptographic software comprises open-source secure sockets layer (SSL) software.

“12. The computer-implemented method of claim 8, wherein: the first resource-scaling operations further comprise capturing a first set of updated cryptographic metrics that result from using the customized set of cryptographic computing resources to perform the customized cryptographic operations on the encrypted message; and updating the cryptographic metrics with the first set of updated cryptographic metrics.

“13. The computer-implemented method of claim 9, wherein: the first resource-scaling operations further comprise: capturing a first set of updated cryptographic metrics that result from using the customized set of cryptographic computing resources to perform the customized cryptographic operations on the encrypted message; and updating the cryptographic metrics with the first set of updated cryptographic metrics; and the second resource-scaling operations further comprise: capturing a second set of updated cryptographic metrics that result from using the set of mandatory cryptographic computing resources to perform mandatory cryptographic operations on the encrypted message; and updating the cryptographic metrics with the second set of updated cryptographic metrics.

“14. The computer-implemented method of claim 8, wherein: the processor comprises a predictive model trained to utilize machine learning algorithms to determine the cryptographic processing requirements of the encrypted message; the information associated with the encrypted message includes cryptographic computing resource patterns comprising static data; and the performance measurements include cryptographic metrics comprising dynamic data that changes.

“15. A computer program product for performing cryptographic operations, the computer program product comprising a computer readable program stored on a computer readable storage medium, wherein the computer readable program, when executed on a processor system, causes the processor system to perform a processor system method comprising: receiving resource-scaling (RS) data associated with an encrypted message; accessing an operation policy (OP) of the RS data, wherein the OP defines cryptographic-operation constraints; based at least in part on a determination that the cryptographic-operation constraints do not include mandatory cryptographic computing resource requirements, performing first resource-scaling operations comprising: an analysis of cryptographic metrics associated with the processor system; wherein the cryptographic metrics comprise: information associated with the encrypted message; and performance measurements of cryptographic operations performed by the processor system; using the cryptographic-operation constraints and results of the analysis of the cryptographic metrics to: determine cryptographic processing requirements of the encrypted message; and match the cryptographic processing requirements to selected ones of a set of available cryptographic computing resources to identify a customized set of cryptographic computing resources that have been selected to match the cryptographic processing requirements of the encrypted message; and using the customized set of cryptographic computing resources to perform customized cryptographic operations on the encrypted message.”

There are additional claims. Please visit full patent to read further.

URL and more information on this patent application, see: Chen, Wan Yue; Chen, Xiao Ling; Jiang, Peng Hui; Li, Jing; Liu, Chen Guang; Wang, Heng. Matching Cryptographic Computing Resources To The Predicted Requirements For Decrypting Encrypted Communications. U.S. Patent Application Number 20230068521, filed August 25, 2021 and posted March 2, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(20230068521)&db=US-PGPUB&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Newcastle University Reports Findings in Health and Medicine (Patient Access to Orphan Drugs Covered by Medical Insurance in China: Real-World Evidence From Patient Survey): Health and Medicine

Newer

“System Method And Network For Evaluating The Progress Of A Managed Care Organization Patient Wellness Goals” in Patent Application Approval Process (USPTO 20230065860): Patent Application

Advisor News

  • CFP Board appoints K. Dane Snowden as CEO
  • TIAA unveils ‘policy roadmap’ to boost retirement readiness
  • 2026 may bring higher volatility, slower GDP growth, experts say
  • Why affluent clients underuse advisor services and how to close the gap
  • America’s ‘confidence recession’ in retirement
More Advisor News

Annuity News

  • Insurer Offers First Fixed Indexed Annuity with Bitcoin
  • Assured Guaranty Enters Annuity Reinsurance Market
  • Ameritas: FINRA settlement precludes new lawsuit over annuity sales
  • Guaranty Income Life Marks 100th Anniversary
  • Delaware Life Insurance Company Launches Industry’s First Fixed Indexed Annuity with Bitcoin Exposure
More Annuity News

Health/Employee Benefits News

  • CATHOLIC UNIVERSITY IN ILLINOIS STILL COVERS 'ABORTION CARE' WITH CAMPUS INSURANCE
  • Major health insurer overspent health insurance funds
  • OPINION: Lawmakers should extend state assistance for health care costs
  • House Dems roll out affordability plan, take aim at Reynolds' priorities
  • Municipal healthcare costs loom as officials look to fiscal 2027 budget
More Health/Employee Benefits News

Life Insurance News

  • AM Best Downgrades Credit Ratings of A-CAP Group Members; Maintains Under Review with Negative Implications Status
  • Md. A.G. Brown: Former DC Teacher to Serve One Year in Jail for Felony Insurance Theft Scheme
  • ‘Baseless claims’: PacLife hits back at Kyle Busch in motion to dismiss suit
  • Melinda J. Wakefield
  • Pacific Life seeks to dismiss Kyle Busch's $8.5M lawsuit over insurance policies
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

ICMG 2026: 3 Days to Transform Your Business
Speed Networking, deal-making, and insights that spark real growth — all in Miami.

Your trusted annuity partner.
Knighthead Life provides dependable annuities that help your clients retire with confidence.

8.25% Cap Guaranteed for the Full Term
Guaranteed cap rate for 5 & 7 years—no annual resets. Explore Oceanview CapLock FIA.

Press Releases

  • ePIC Services Company and WebPrez Announce Exclusive Strategic Relationship; Carter Wilcoxson Appointed President of WebPrez
  • Agent Review Announces Major AI & AIO Platform Enhancements for Consumer Trust and Agent Discovery
  • Prosperity Life Group® Names Industry Veteran Mark Williams VP, National Accounts
  • Salt Financial Announces Collaboration with FTSE Russell on Risk-Managed Index Solutions
  • RFP #T02425
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet