-
公开(公告)号:US11841973B2
公开(公告)日:2023-12-12
申请号:US17285831
申请日:2020-08-24
Applicant: Google LLC
Inventor: Karn Seth , Sarvar Patel , Mariana Raykova , Srinivasan Seshadri , Margo Narayan , Philip McDonnell , Amin Charaniya
CPC classification number: G06F21/6245 , G06F21/602 , G06F21/62 , G06F21/6254 , H04L9/008 , H04L9/0643 , H04L9/0869 , H04L9/14 , G06F2221/2107
Abstract: A method disclosed herein may include receiving, at a first computing system, encrypted identifiers and encrypted values, performing, by the first computing system, a concealing operation on the encrypted identifiers to produce concealed encrypted identifiers, wherein the concealing operation conceals the encrypted identifiers from the first computing system and a second computing system but enables matching between the concealed encrypted identifiers, decrypting, by the second computing system, the concealed encrypted identifiers to produce concealed identifiers, and performing, by the second computing system, an aggregation operation using the concealed identifiers and the encrypted values to produce an encrypted aggregate value without accessing personally identifiable information associated with the encrypted values.
-
公开(公告)号:US12244693B2
公开(公告)日:2025-03-04
申请号:US17926238
申请日:2021-10-19
Applicant: Google LLC
Inventor: Eli Simon Fox-Epstein , Craig William Wright , Kevin Wei Li Yeo , Mariana Raykova , Karn Seth
IPC: H04L9/08
Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for retrieving information from a server. Methods can include a server receiving a set of client-encrypted queries. The server identifies a set of server-encrypted decryption keys and transmits the set to the client device. The server receives a set of client-server-encrypted decryption keys that includes the set of server-encrypted decryption keys encrypted by the client device. The server also receives a set of client-encrypted/client-derived decryption keys that were derived by the client device. The server generates matching a map that specifies matches between the set of client-server-encrypted decryption keys and the set of client-encrypted/client-derived decryption keys. The server filters the set of client-encrypted queries using the map to create a set of filtered client-encrypted queries and generates a set of query results.
-
公开(公告)号:US10764041B2
公开(公告)日:2020-09-01
申请号:US15842524
申请日:2017-12-14
Applicant: Google LLC
Inventor: Shobhit Saxena , Benjamin Kreuter , Sarvar Patel , Karn Seth
Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.
-
4.
公开(公告)号:US20180254893A1
公开(公告)日:2018-09-06
申请号:US15842524
申请日:2017-12-14
Applicant: Google LLC
Inventor: Shobhit Saxena , Benjamin Kreuter , Sarvar Patel , Karn Seth
Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.
-
公开(公告)号:US20240204991A1
公开(公告)日:2024-06-20
申请号:US18590514
申请日:2024-02-28
Applicant: Google LLC
Inventor: Sarvar Patel , Marcel M.M. Yung , Gang Wang , Karn Seth , Mariana Raykova , Benjamin R. Kreuter , Ananth Raghunathan
CPC classification number: H04L9/085 , H04L9/0869 , H04L9/32 , H04L2209/50
Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
-
公开(公告)号:US20230318809A1
公开(公告)日:2023-10-05
申请号:US17926238
申请日:2021-10-19
Applicant: Google LLC
Inventor: Eli Simon Fox-Epstein , Craig William Wright , Kevin Wei Li Yeo , Mariana Raykova , Karn Seth
IPC: H04L9/08
CPC classification number: H04L9/0825 , H04L9/0866
Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for retrieving information from a server. Methods can include a server receiving a set of client-encrypted queries. The server identifies a set of server-encrypted decryption keys and transmits the set to the client device. The server receives a set of client-server-encrypted decryption keys that includes the set of server-encrypted decryption keys encrypted by the client device. The server also receives a set of client-encrypted/client-derived decryption keys that were derived by the client device. The server generates matching a map that specifies matches between the set of client-server-encrypted decryption keys and the set of client-encrypted/client-derived decryption keys. The server filters the set of client-encrypted queries using the map to create a set of filtered client-encrypted queries and generates a set of query results.
-
公开(公告)号:US20220147650A1
公开(公告)日:2022-05-12
申请号:US17285831
申请日:2020-08-24
Applicant: Google LLC
Inventor: Karn Seth , Sarvar Patel , Mariana Raykova , Srinivasan Seshadri , Margo Werner , Philip McDonnell , Amin Charaniya
Abstract: A method disclosed herein may include receiving, at a first computing system, encrypted identifiers and encrypted values, performing, by the first computing system, a concealing operation on the encrypted identifiers to produce concealed encrypted identifiers, wherein the concealing operation conceals the encrypted identifiers from the first computing system and a second computing system but enables matching between the concealed encrypted identifiers, decrypting, by the second computing system, the concealed encrypted identifiers to produce concealed identifiers, and performing, by the second computing system, an aggregation operation using the concealed identifiers and the encrypted values to produce an encrypted aggregate value without accessing personally identifiable information associated with the encrypted values.
-
公开(公告)号:US20220004654A1
公开(公告)日:2022-01-06
申请号:US16486281
申请日:2019-04-19
Applicant: Google LLC
Inventor: Sarvar Patel , Marcel M. Moti Yung , Karn Seth , Benjamin Kreuter
Abstract: Systems, methods, devices, and other techniques for preserving privacy when comparing private datasets from first and second computing systems. The second computing system identifies a first set of identifiers corresponding to records in a private database of the second computing system. The second computing system receives blinded versions of a set of identifiers corresponding to records in a private database of the first computing system. The second computing system determines an intersection or characteristic thereof of the records in the private database of the first computing system and the records in the private database of the second computing system based on matches between the blinded versions of the first and second sets of identifiers.
-
公开(公告)号:US11494506B2
公开(公告)日:2022-11-08
申请号:US16486281
申请日:2019-04-19
Applicant: Google LLC
Inventor: Sarvar Patel , Marcel M. Moti Yung , Karn Seth , Benjamin Kreuter
Abstract: Systems, methods, devices, and other techniques for preserving privacy when comparing private datasets from first and second computing systems. The second computing system identifies a first set of identifiers corresponding to records in a private database of the second computing system. The second computing system receives blinded versions of a set of identifiers corresponding to records in a private database of the first computing system. The second computing system determines an intersection or characteristic thereof of the records in the private database of the first computing system and the records in the private database of the second computing system based on matches between the blinded versions of the first and second sets of identifiers.
-
公开(公告)号:US20220200794A1
公开(公告)日:2022-06-23
申请号:US17567208
申请日:2022-01-03
Applicant: Google LLC
Inventor: Shobhit Saxena , Benjamin Kreuter , Sarvar Patel , Karn Seth
Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.
-
-
-
-
-
-
-
-
-