

i2Chain’s patent secures sharing of knowledge throughout untrusted functions securely and confidently
— Ajay Jotwani, Co-founder & CEO, i2Chain.
SAN FRANCISCO, CALIFORNIA, USA, September 18, 2022 /EINPresswire.com/ — Cybercriminals deploy rogue functions and BOTS that appear and feel like company functions to steal worker credentials and achieve entry to delicate labeled info shops and their backups. The fraudulent apps impersonate professional applications by copying the names, logos, and different particulars to direct individuals to malicious portals and web sites that appear and feel like authentic manufacturers. One unsuspecting worker could make approach for the lack of delicate, labeled, or personally identifiable info. In a number of circumstances, the criminals reach ransomware and search to harm the repute of the manufacturers.
December 2021 examine by Positive Technologies said, “hackers can successfully penetrate 93% of corporate networks.” Veeam’s 2022 analysis “Ransomeware Trends,” says that 95% of assaults try infecting backups, 41% of knowledge was encrypted in ransomware, and 31% of the enterprises who paid the ransom nonetheless couldn’t recuperate their information.
i2Chain is delighted to get hold of its third patent from USPTO #US11374912B2 to carry out the change of paperwork with third-party functions securely.
“i2Chain’s patent helps to share information across untrusted applications securely & with confidence”, says Ajay Jotwani, Co-founder & CEO i2Chain. Ajay provides that the silver bullet of knowledge safety is to be a step forward of cybercriminals, and the i2Chain IP supplies ammunition to take an enormous leap ahead.”
Dr. Mark Manasse, the lead researcher of the patent, provides, “the patent considers running untrusted viewers and editors in containerized environments with short-lived encrypted virtual file systems so that efforts to save unencrypted copies of the document can be prevented, preserving the security of the chain. We also virtualize paste operations to fail outside the container and to wipe the cut buffer and storage used in the virtual file system on exit.”
In the final ten years, enterprise funds and enterprise CISOs missions funding initiatives to battle the ever-changing panorama of detection and response. Lately, enterprises are looking for methods to forestall cyber crimes in energetic coordination with legislation enforcement businesses. The variety of daily cyber crimes is on a lowering graph, albeit slowly.
Mainak Trivedi, the worldwide head of engineering & operations at i2Chain, provides, “The patent ensures secure data exchange between the user device and the server. The application component(s) are further isolated by containerizing on the user device to form a virtual digital space unreachable to other entities and applications. Mainak adds, “enterprises can use the i2Chain APIs to create non-fungible, rights-enforced, & traceable info artifacts which might be tamper-proof and hack-proof so you’ll be able to retain management of knowledge shared with untrusted functions.
Mainak Trivedi
i2Chain, Inc.
[email protected]
Visit us on social media:
Facebook
Twitter
LinkedIn