Geographical track data obfuscation

    公开(公告)号:US10796006B2

    公开(公告)日:2020-10-06

    申请号:US15693043

    申请日:2017-08-31

    Abstract: In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data points. For each of the subsequent data points, a delta degree value may be determined as a difference between a subsequent data point and a corresponding previous data point. A first format preserving encryption (FPE) may be applied to encrypt longitude and latitude values of the first data point. A second FPE may be applied by applying a translation of a plurality of translations to encrypt each delta degree value. A total distance traveled, a total time, and/or a total elevation gain may be extracted from the encrypted first data point and the encrypted delta degree values.

    CONVERTING PLAINTEXT VALUES TO PSEUDONYMS USING A HASH FUNCTION

    公开(公告)号:US20190294820A1

    公开(公告)日:2019-09-26

    申请号:US15926392

    申请日:2018-03-20

    Abstract: A technique includes accessing data, which represents a plurality of plaintext values and converting the plaintext values to pseudonym values, which are associated with a predetermined statistical distribution. Converting the plaintext values includes, for a given plaintext value, repeatedly applying a hash function to provide corresponding hash values based on the given plaintext value; and combining the hash values to provide a pseudonym value, which corresponds to the given plaintext value.

    SECURE REPRESENTATION VIA A FORMAT PRESERVING HASH FUNCTION

    公开(公告)号:US20180309579A1

    公开(公告)日:2018-10-25

    申请号:US15496285

    申请日:2017-04-25

    CPC classification number: H04L9/3242 G06F21/6245 G06Q20/3827 H04L9/3226

    Abstract: Secure representation via a format preserving hash function is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive an input sequence of characters comprising characters from a first collection of Unicode code points, where the input sequence corresponds to an identifier to be represented in a secure form. A cryptographic hash function is applied to the input sequence to generate a hashed sequence of characters comprising characters from the first collection of Unicode code points. The hashed sequence is transformed to an output sequence of characters comprising characters from a proper sub-collection of the first collection of Unicode code points. The output sequence is provided to a service provider as a secure representative of the identifier.

    Perturbation-based order preserving pseudonymization of data

    公开(公告)号:US11115216B2

    公开(公告)日:2021-09-07

    申请号:US15926460

    申请日:2018-03-20

    Abstract: A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.

    Format preserving encryption of floating point data

    公开(公告)号:US10467405B2

    公开(公告)日:2019-11-05

    申请号:US15496282

    申请日:2017-04-25

    Abstract: Format preserving encryption of floating point data is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive floating point data to be secured, where the floating point data comprises a sign bit, exponent bits and fraction bits. A format preserving encryption (FPE) is applied to the received data, where the FPE is applied separately to the sign bit, the exponent bits and the fraction bits to generate an encrypted floating point data comprising an encrypted sign bit, encrypted exponent bits and encrypted fraction bits. The encrypted floating point data is provided to a service provider as a secure representative of the received data.

    Format preserving encryption utilizing a key version

    公开(公告)号:US10749674B2

    公开(公告)日:2020-08-18

    申请号:US15720777

    申请日:2017-09-29

    Abstract: In one example, a system for format preserving encryption utilizing a key version can include a processor, and a memory resource storing instructions executable by the processor to determine a quantity of significant bits for a value to be encrypted, mask the value to include the quantity of significant bits, perform format preserving encryption on the masked value to generate an encrypted value, and append a key version to the encrypted value.

    CYCLE WALKING-BASED TOKENIZATION
    18.
    发明申请

    公开(公告)号:US20190278941A1

    公开(公告)日:2019-09-12

    申请号:US15913523

    申请日:2018-03-06

    Abstract: A technique includes accessing data representing plaintext. The plaintext has a first string size. The technique includes using a table to retrieve data representing a token that corresponds to the plaintext. The table has an associated string lookup size smaller than the first string size.

    FORMAT PRESERVING ENCRYPTION UTILIZING A KEY VERSION

    公开(公告)号:US20190103965A1

    公开(公告)日:2019-04-04

    申请号:US15720777

    申请日:2017-09-29

    Abstract: In one example, a system for format preserving encryption utilizing a key version can include a processor, and a memory resource storing instructions executable by the processor to determine a quantity of significant bits for a value to be encrypted, mask the value to include the quantity of significant bits, perform format preserving encryption on the masked value to generate an encrypted value, and append a key version to the encrypted value.

Patent Agency Ranking