-
公开(公告)号:US20230132742A1
公开(公告)日:2023-05-04
申请号:US17907087
申请日:2021-04-05
Applicant: Google LLC
Inventor: Marcel M.M. Yung , David Lazarov
Abstract: This document describes methods, devices, systems, and means to ensure end-to-end encryption of location information that is forwarded through a potentially untrustworthy cloud service that serves to forward the location information from a sighting device to an owner of a sighted device. The end-to-end encryption of location information preserves the privacy of location information that is provided by sighter devices that are not associated with the owner as the location information traverses network nodes from the sighter to the owner.
-
公开(公告)号:US20230409646A1
公开(公告)日:2023-12-21
申请号:US18456281
申请日:2023-08-25
Applicant: Google LLC
Inventor: Gang Wang , Marcel M.M. Yung
IPC: G06F16/906 , G06F16/957 , G06F16/958 , G06F16/951 , G06N3/08
CPC classification number: G06F16/906 , G06F16/9574 , G06N7/046 , G06F16/951 , G06N3/08 , G06F16/958
Abstract: The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers.
-
公开(公告)号:US20220060319A1
公开(公告)日:2022-02-24
申请号:US17298893
申请日:2019-12-04
Applicant: Google LLC
Inventor: SARVAR PATEL , Marcel M.M. Yung , Gang Wang , Kam Seth , Mariana Raykova , Benjamin R. Kreuter
Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
-
公开(公告)号:US20250080508A1
公开(公告)日:2025-03-06
申请号:US18440539
申请日:2024-02-13
Applicant: Google LLC
Inventor: Omer Berkman , Marcel M.M. Yung
Abstract: Provided are computer systems which demonstrate improved cryptographic agility via inclusion of multiple cryptographic operating modes. In one example, one or more devices included within a computing system are designed to include multiple cryptographic operating modes from the outset (e.g., prior to deployment of the system, “by design”). Additionally or alternatively, one or more devices included within the computing system (e.g., a gateway computing device) can be updated to include the multiple cryptographic operating modes after deployment of the system (e.g., in an “ad hoc” fashion). A system can also include both device(s) that have multiple operating modes by design and device(s) that have multiple operating modes introduced in an ad hoc fashion. Inclusion of the multiple cryptographic operating modes can serve to enhance the security of at least the communications of the computing system that are performed by or follow the updated device(s).
-
公开(公告)号:US20240204991A1
公开(公告)日:2024-06-20
申请号:US18590514
申请日:2024-02-28
Applicant: Google LLC
Inventor: Sarvar Patel , Marcel M.M. Yung , Gang Wang , Karn Seth , Mariana Raykova , Benjamin R. Kreuter , Ananth Raghunathan
CPC classification number: H04L9/085 , H04L9/0869 , H04L9/32 , H04L2209/50
Abstract: A method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.
-
-
-
-