-
公开(公告)号:US20210286901A1
公开(公告)日:2021-09-16
申请号:US17119342
申请日:2020-12-11
Applicant: Google LLC
Inventor: Aditya Sinha , Vanessa Reimer
Abstract: Methods, systems, and apparatuses, including computer storage media and hardware security modules, for performing batch cryptography on hardware security modules. A hardware security module can receive a request to perform one or more cryptographic operations. The request can include a batch data structure storing a plurality of data elements. The hardware security module can unbatch the plurality of data elements, perform one or more cryptographic operations on the plurality of data elements to generate a plurality of outputs, generate an output batch data structure storing the plurality of outputs, and transmit the output batch data structure in response to the request. The request and the batch data structure can be formed in accordance with a batch hardware security module application program interface (API) implemented by the hardware security module.
-
公开(公告)号:US20240176993A1
公开(公告)日:2024-05-30
申请号:US18485457
申请日:2023-10-12
Applicant: Google LLC
Inventor: Prateek Jain , Inderjit Singh Dhillon , Fnu Devvrit , Aditya Sinha
IPC: G06N3/0464 , G06N3/0895
CPC classification number: G06N3/0464 , G06N3/0895
Abstract: A method of training a machine learning model includes receiving training data comprising a graph structure and one or more feature attributes and determining an encoded graph based on applying the machine learning model to the graph structure and the one or more feature attributes. The machine learning model comprises a graph convolutional network layer. The encoded graph comprises one or more nodes and one or more paths connecting the one or more nodes. The method also includes selecting a plurality of positive samples through random walks along the one or more paths of the encoded graph, selecting a plurality of negative samples from the encoded graph by randomly sampling the one or more nodes of the encoded graph, determining a loss value, and updating, based on the loss value, one or more learnable parameter values of the machine learning model.
-
公开(公告)号:US20230231850A1
公开(公告)日:2023-07-20
申请号:US18186733
申请日:2023-03-20
Applicant: Google LLC
Inventor: ll-Sung Lee , Sidharth Durgesh Telang , Jimmy C. Chau , Timothy Matthew Dierks , Ariel Joseph Feldman , Hunter James Freyer , Gregory David Laun , Tianyuan Liu , Pedro Henrique Ribeiro Morais E Silva , Aditya Sinha , Xioalan Zhang , Netanel Keidar
CPC classification number: H04L63/0884 , H04L9/0822 , H04L9/0891 , H04L63/083 , H04L63/06 , H04L63/20
Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.
-
公开(公告)号:US11630921B2
公开(公告)日:2023-04-18
申请号:US17119342
申请日:2020-12-11
Applicant: Google LLC
Inventor: Aditya Sinha , Vanessa Reimer
Abstract: Methods, systems, and apparatuses, including computer storage media and hardware security modules, for performing batch cryptography on hardware security modules. A hardware security module can receive a request to perform one or more cryptographic operations. The request can include a batch data structure storing a plurality of data elements. The hardware security module can unbatch the plurality of data elements, perform one or more cryptographic operations on the plurality of data elements to generate a plurality of outputs, generate an output batch data structure storing the plurality of outputs, and transmit the output batch data structure in response to the request. The request and the batch data structure can be formed in accordance with a batch hardware security module application program interface (API) implemented by the hardware security module.
-
公开(公告)号:US11611558B2
公开(公告)日:2023-03-21
申请号:US16683025
申请日:2019-11-13
Applicant: Google LLC
Inventor: Il-Sung Lee , Sidharth Durgesh Telang , Jimmy C. Chau , Timothy Matthew Dierks , Ariel Joseph Feldman , Hunter James Freyer , Netanel Keidar , Gregory David Laun , Tianyuan Liu , Pedro Henrique Ribeiro Morais e Silva , Aditya Sinha , Xioalan Zhang
Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.
-
公开(公告)号:US20210144141A1
公开(公告)日:2021-05-13
申请号:US16683025
申请日:2019-11-13
Applicant: Google LLC
Inventor: Il-Sung Lee , Sidharth Durgesh Telang , Jimmy C. Chau , Timothy Matthew Dierks , Ariel Joseph Feldman , Hunter James Freyer , Netanel Keidar , Gregory David Laun , Tianyuan Liu , Pedro Henrique Ribeiro Morais e Silva , Aditya Sinha , Xioalan Zhang
Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.
-
-
-
-
-