Patent classifications
H04L9/008
SYSTEMS AND METHODS FOR HOMOMORPHIC ENCRYPTION-BASED TRIGGERING
Systems and methods for homomorphic encryption-based triggering are disclosed. According to an embodiment, a method for homomorphic encryption-based triggering may include: (1) receiving, by a backend computer program executed by a backend electronic device and from a computer program for a client, a trigger condition for an event, the trigger condition encrypted with a public key for an organization and an action to be executed in response to the trigger condition being met; (2) receiving, by the backend computer program, a stream of data encrypted with the public key; (3) comparing, by the backend computer program, the encrypted trigger condition to the encrypted stream of data; (4) determining, by the backend computer program, that the trigger condition is met; and (5) executing, by the backend computer program, the action associated with the trigger condition.
Compression-Based Data Instance Search
A knowledge management system may receive a set of data instances. The system may extract a plurality of entities from the set of data instances. The system may convert the plurality of entities into a plurality of entity embeddings, each entity embedding representing an entity in a latent space. The system may generate a reference embedding that has the same length as the plurality of entity embeddings. The system may compare, for each value in each entity embedding, the value to a corresponding value of the reference embedding. The system may generate a plurality of entity fingerprints, each entity fingerprint corresponding to an entity embedding, each entity fingerprint comprising Boolean values that are generated based on comparing values in each entity embedding to corresponding values of the reference embedding. The system may store the plurality of entity fingerprints to represent the plurality of entities.
Homomorphic key derivation
A processor of a remote crypto cluster (RCC) may receive a public key from a client device through at least one network. The processor of the RCC may obtain an encrypted specific key and a blinded project key from at least one data source through the at least one network. The processor of the RCC may derive a derived key in blind based on the encrypted specific key and the blinded project key. The processor of the RCC may send the derived key in blind to the client device.
System for performing service by using biometric information, and control method therefor
A system for performing a service by using biometric information is disclosed. A system according to the present disclosure comprises an electronic device, a first server and a second server, and a control method of the system comprises the steps of: allowing the electronic device to acquire first biometric information; allowing the electronic device to acquire first encrypted data, in which the first biometric information is encrypted, by using the acquired first biometric information and a first encryption key, and to transmit same to the first server, allowing the first server to acquire second encrypted data, in which the first encrypted data is encrypted, by using the first encrypted data received from the electronic device and a second encrypted key, and first user identification information corresponding to the first biometric information, and to transmit same to the second server; allowing the second server to match the second encrypted data and the first user identification information corresponding to the biometric information, which are received from the first server, and to store same; allowing the second server to acquire authentication information on the basis of the matched second encrypted data and first user identification information, and to transmit same to the first server, and allowing the first server to register the authentication information on the biometric information.
Data service system
A system may be disclosed in the present disclosure, comprising: an interface service unit configured to perform at least one of sending data to or receiving data from one or more users via a user interface; and a transmission unit including: a blockchain adaptor configured to transmit data to a plurality of different types of blockchains, via a blockchain interface, according to data format and communication mode requirements of each of the plurality of different types of blockchains and a transmission controller configured to trigger a smart contract running on a blockchain of the plurality different types of blockchains via the blockchain interface, and control a data transmission under instructions from the smart contract, wherein the data transmission is based on data received from the user interface.
Method and apparatus for processing ciphertext based on homomorphic encryption
A method and apparatus for processing a ciphertext based on homomorphic encryption. The method includes determining an approximate polynomial corresponding to a modulus reduction for bootstrapping a ciphertext based on samples extracted from the modulus reduction, and bootstrapping the ciphertext based on the approximate polynomial.
Upstream visibility in supply-chain
An example operation may include one or more of receiving, by a retailer node, an encrypted inventory of goods data from a plurality of supplier nodes over a blockchain network, computing, by the retailer node, an ordering proportion based on the encrypted inventory of goods data, generating, by the retailer node, an ordering policy based on the ordering proportion, and executing a smart contract to order goods from the plurality of the supplier nodes based on the ordering policy.
Systems and methods for performing secure computing while maintaining data confidentiality
Disclosed herein are systems and method for performing secure computing while maintaining data confidentiality. In one exemplary aspect, a method receives, via an application, both data and a request to perform a secure operation on the data, wherein the secure operation is to be performed using a secure compute engine on a cloud platform such that the data is not viewable to a provider of the cloud platform. The method applies transformations to the data so that the data is not viewable to the provider. The method transmits the transformed data to the secure compute engine on the cloud platform to perform the secure operation on the transformed data, receives a result of the secure operation from the secure compute engine, and transmits the result to the application.
Validation as a service for third parties using homomorphic encryption
Systems and methods for validating credentials are disclosed. One example method, performed by one or more processors of a computing device associated with a neural network, includes training the neural network to infer validity information for encrypted credentials received from a credential source, wherein the validity information is inferred without decrypting the encrypted credentials, receiving a first encrypted credential from the credential source, generating an encrypted validity indicator for the first encrypted credential based on the validity information inferred by the neural network, and providing the encrypted validity indicator to the credential source.
SECURE COMPUTING DEVICE, SECURE COMPUTING METHOD, AND PROGRAM
A secure computing device includes a secure computing unit configured to execute secure computing on encrypted data obtained by encrypting plaintext represented in a prescribed expression format for stochastic computing in a homomorphic encryption scheme. The secure computing includes a process of acquiring a sum and a process of acquiring a product. The secure computing unit determines a value of each digit of a bit string representing the sum as one of a value of a corresponding digit of a bit string that represents first encrypted data and is represented in the expression format and a value of a corresponding digit of a bit string that represents second encrypted data and is represented in the expression format in the process of acquiring the sum that is a sum of the first encrypted data of the encrypted data and the second encrypted data of the encrypted data.