US 12,476,946 B1
Securing sensitive data in edge devices using steganography
Roman Bober, Ashdod (IL); Stav Sapir, Beer Sheva (IL); and Maxim Balin, Gan-Yavne (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Jun. 27, 2024, as Appl. No. 18/756,165.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0428 (2013.01) 21 Claims
OG exemplary drawing
 
1. A method for managing data in a deployment comprising edge devices, the method comprising:
obtaining first data;
making a first determination regarding whether the first data comprises sensitive data, the sensitive data being ascribed a higher level of risk when compared to other data which is ascribed a lower level of risk;
in a first instance of the first determination where the first data comprises the sensitive data:
obtaining first chunks of the first data by chunking the first data;
obtaining second data;
embedding a second chunk of the first chunks of the first data inconspicuously in the second data so that a presence of the second chunk is not apparent in the second data by at least:
combining the second chunk with the second data in a steganographic manner so that, upon inspection of the second data, the second chunk is concealed, and
generating a stego key to direct the embedding of the second chunk in the second data and record locations of bits of a first binary code of the second chunk in a second binary code of the second data; and
sending the second data to an edge device of the edge devices.