STORAGE ALLOCATION BASED ON SECURE DATA COMPARISONS VIA MULTIPLE INTERMEDIARIES

    公开(公告)号:US20180089301A1

    公开(公告)日:2018-03-29

    申请号:US15278253

    申请日:2016-09-28

    CPC classification number: G06F16/285 G06F21/602 G06F21/78

    Abstract: Storage allocation based on secure data comparisons is disclosed. One example is a system including a plurality of intermediaries, a data allocator and a plurality of storage containers. Each intermediary receives a request from the data allocator to identify a target storage container of the plurality of storage containers, for secure allocation of a data term. Each intermediary compares, for each storage container, the truncated data term with a collection of truncated candidate terms to select a representative term of the candidate terms, identifies the selected representative term to the storage container, receives a similarity profile from each storage container, where the similarity profile is representative of similarities between the truncated data term and terms in the storage container, and selects a candidate target storage container based on similarity profiles received from each storage container.

    FEATURE VECTOR GENERATION
    32.
    发明申请

    公开(公告)号:US20170316338A1

    公开(公告)日:2017-11-02

    申请号:US15142357

    申请日:2016-04-29

    CPC classification number: G06N20/00 G06F16/285

    Abstract: In some examples, a method includes accessing input vectors in an input space, wherein the input vectors characterize elements of a physical system. The method may also include generating feature vectors from the input vectors, and the feature vectors are generated without any vector product operations between performed between any of the input vectors. An inner product of a pair of the feature vectors may correlate to an implicit kernel for the pair of feature vectors, and the implicit kernel may approximate a Gaussian kernel within a difference threshold. The method may further include providing the feature vectors to an application engine for use in analyzing the elements of the physical system, other elements in the physical system, or a combination of both.

    SECURE INFORMATION RETRIEVAL BASED ON HASH TRANSFORMS

    公开(公告)号:US20170163424A1

    公开(公告)日:2017-06-08

    申请号:US15327015

    申请日:2014-08-29

    Abstract: Secure information retrieval is disclosed. One example is a system including an information retriever comprising a collection of nodes that receive a hash count from a first dataset, the first dataset including a first data term, and provide the hash count to a second dataset, the second dataset including a plurality of second data terms. A hash transformer transforms the data terms based on the hash count. A modifier modifies, for a given node, the transformed data terms. An evaluator evaluates, for each node, a similarity value between the first data term and each given second data term based on shared data elements between the modified first data term and a given modified second data term associated with the given second data term. The information retriever provides to the first dataset, at least one term identifier associated with a second data term.

Patent Agency Ranking