Statistical property preserving pseudonymization

    公开(公告)号:US11138338B2

    公开(公告)日:2021-10-05

    申请号:US15926296

    申请日:2018-03-20

    Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.

    Hash offset based key version embedding

    公开(公告)号:US10892890B2

    公开(公告)日:2021-01-12

    申请号:US15720857

    申请日:2017-09-29

    Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.

    Format preserving encryption of object code

    公开(公告)号:US10452564B2

    公开(公告)日:2019-10-22

    申请号:US15496287

    申请日:2017-04-25

    Abstract: Format preserving encryption of object code is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to identify object code to be secured, where the object code comprises a list of instructions, each instruction comprising an opcode and zero or more parameters. A format preserving encryption (FPE) is applied to the received object code, where the FPE is applied separately to a sub-plurality of instructions in the list of instructions, to generate an encrypted object code comprising a sub-plurality of encrypted instructions. An encrypted object code is provided to a service provider, where the encrypted object code comprises the sub-plurality of encrypted instructions, and any unencrypted portions of the object code.

    DETERMINING PSEUDONYM VALUES USING TWEAK-BASED ENCRYPTION

    公开(公告)号:US20190294821A1

    公开(公告)日:2019-09-26

    申请号:US15926425

    申请日:2018-03-20

    Abstract: A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.

    Determining pseudonym values using tweak-based encryption

    公开(公告)号:US11106821B2

    公开(公告)日:2021-08-31

    申请号:US15926425

    申请日:2018-03-20

    Abstract: A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.

    PERTURBATION-BASED ORDER PRESERVING PSEUDONYMIZATION OF DATA

    公开(公告)号:US20190296914A1

    公开(公告)日:2019-09-26

    申请号:US15926460

    申请日:2018-03-20

    Abstract: A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.

    STATISTICAL PROPERTY PRESERVING PSEUDONYMIZATION

    公开(公告)号:US20190294819A1

    公开(公告)日:2019-09-26

    申请号:US15926296

    申请日:2018-03-20

    Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.

    FORMAT PRESERVING ENCRYPTION OF FLOATING POINT DATA

    公开(公告)号:US20180309733A1

    公开(公告)日:2018-10-25

    申请号:US15496282

    申请日:2017-04-25

    CPC classification number: G06F21/52 G06F5/00 G06F21/6209 G06F2221/2107

    Abstract: Format preserving encryption of floating point data is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive floating point data to be secured, where the floating point data comprises a sign bit, exponent bits and fraction bits. A format preserving encryption (FPE) is applied to the received data, where the FPE is applied separately to the sign bit, the exponent bits and the fraction bits to generate an encrypted floating point data comprising an encrypted sign bit, encrypted exponent bits and encrypted fraction bits. The encrypted floating point data is provided to a service provider as a secure representative of the received data.

    FORMAT PRESERVING ENCRYPTION OF OBJECT CODE
    9.
    发明申请

    公开(公告)号:US20180309569A1

    公开(公告)日:2018-10-25

    申请号:US15496287

    申请日:2017-04-25

    Abstract: Format preserving encryption of object code is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to identify object code to be secured, where the object code comprises a list of instructions, each instruction comprising an opcode and zero or more parameters. A format preserving encryption (FPE) is applied to the received object code, where the FPE is applied separately to a sub-plurality of instructions in the list of instructions, to generate an encrypted object code comprising a sub-plurality of encrypted instructions. An encrypted object code is provided to a service provider, where the encrypted object code comprises the sub-plurality of encrypted instructions, and any unencrypted portions of the object code.

Patent Agency Ranking