US 11,949,711 B2
Systems and methods for securing information
Ryan Montoya, Arvada, CO (US)
Assigned to CACI International, Inc., Reston, VA (US)
Filed by CACI International Inc., Arlington, VA (US)
Filed on Jul. 8, 2019, as Appl. No. 16/504,926.
Prior Publication US 2021/0014205 A1, Jan. 14, 2021
Int. Cl. H04L 9/40 (2022.01); G06F 18/2411 (2023.01); G06N 3/04 (2023.01); G06V 10/764 (2022.01); G06V 10/774 (2022.01); G06V 10/776 (2022.01)
CPC H04L 63/1475 (2013.01) [G06F 18/2411 (2023.01); G06N 3/04 (2013.01); G06V 10/764 (2022.01); G06V 10/774 (2022.01); G06V 10/776 (2022.01); H04L 63/0485 (2013.01); H04L 63/18 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
generating a data set configured to have a first amount of entropy;
before cryptographic encryption of user data, combining the user data with the generated data set;
obtaining, from a network, (i) a first ciphertext resulting from cryptographic encryption of the combined data and (ii) a plurality of second ciphertexts located in the network;
determining, via a machine learner, an entropy level of the first ciphertext;
determining, via the machine learner, an entropy level of each of the plurality of second ciphertexts;
determining, via the machine learner, whether the entropy level of the first ciphertext is greater than the entropy level of each of the second ciphertexts;
responsive to the determination that the first ciphertext has the greater amount of entropy, identifying a portion of the network traversed by the first ciphertext; and
outputting, to a user remote from the network, the portion.