-
公开(公告)号:US11743030B2
公开(公告)日:2023-08-29
申请号:US17660623
申请日:2022-04-25
Applicant: INTUIT INC.
Inventor: Margarita Vald , Laetitia Kahn , Boaz Sapir , Yaron Sheffer , Yehezkel Shraga Resheff
CPC classification number: H04L9/008 , H04L9/0631 , H04L2209/08
Abstract: Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.
-
公开(公告)号:US11646871B2
公开(公告)日:2023-05-09
申请号:US16991218
申请日:2020-08-12
Applicant: INTUIT INC.
Inventor: Margarita Vald , Olla Nasirov , Gleb Keselman , Yaron Sheffer , Sergey Banshats
CPC classification number: H04L9/0822 , H04L9/083 , H04L9/0861 , H04L9/0891 , H04L9/3247 , H04L2209/04
Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.
-
公开(公告)号:US11870886B2
公开(公告)日:2024-01-09
申请号:US18301886
申请日:2023-04-17
Applicant: INTUIT INC.
Inventor: Margarita Vald , Olla Nasirov , Gleb Keselman , Yaron Sheffer , Sergey Banshats
CPC classification number: H04L9/0822 , H04L9/083 , H04L9/0861 , H04L9/0891 , H04L9/3247 , H04L2209/04
Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.
-
公开(公告)号:US11343069B2
公开(公告)日:2022-05-24
申请号:US16783471
申请日:2020-02-06
Applicant: Intuit Inc.
Inventor: Margarita Vald , Laetitia Kahn , Boaz Sapir , Yaron Sheffer , Yehezkel Shraga Resheff
Abstract: Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.
-
公开(公告)号:US11818260B1
公开(公告)日:2023-11-14
申请号:US18066868
申请日:2022-12-15
Applicant: INTUIT INC.
Inventor: Margarita Vald , Julia Zarubinsky , Yaron Sheffer , Sergey Banshats
IPC: H04L9/08
CPC classification number: H04L9/0866 , H04L9/0825 , H04L9/0894
Abstract: Systems and methods that may be used to provide policies and protocols for blocking decryption capabilities in symmetric key encryption using a unique protocol in which key derivation may include injecting a random string into each key derivation. For example, a policy may be assigned to each client device indicating whether the client device has been assigned encryption only permission or full access permission to both encrypt and decrypt data. The disclosed protocol prevents client devices with encryption only permission from obtaining keys for decryption.
-
公开(公告)号:US20230214522A1
公开(公告)日:2023-07-06
申请号:US17568845
申请日:2022-01-05
Applicant: Intuit Inc.
Inventor: Daphna LITVIN , Elad Shmidov , Margarita Vald
IPC: G06F21/62 , G06F16/903
CPC classification number: G06F21/6245 , G06F16/90335
Abstract: Described herein are example implementations for the automatic detection and handling of personal identifiable information (PII) in electronic records. In some aspects, a system receives one or more computer readable logs of information for one or more computer services, with each log including a string of characters. The system performs one or more string search algorithm based operations on the entirety of the one or more strings of the one or more computer readable logs to identify a range of the one or more strings to be searched for PII that is less than the entirety of the one or more strings. The system also performs one or more regular expression algorithm based operations on the range of the one or more strings to identify one or more instances of PII. The system generates and outputs an indication of the one or more instances of the PII that are identified.
-
公开(公告)号:US11381381B2
公开(公告)日:2022-07-05
申请号:US16427549
申请日:2019-05-31
Applicant: INTUIT INC.
Inventor: Margarita Vald , Yaron Sheffer , Yehezkel S. Resheff , Shimon Shahar
Abstract: Certain aspects of the present disclosure provide techniques for performing computations on encrypted data. One example method generally includes obtaining, at a computing device, encrypted data, wherein the encrypted data is encrypted using fully homomorphic encryption and performing at least one computation on the encrypted data while the encrypted data remains encrypted. The method further includes identifying a clear data operation to perform on the encrypted data and transmitting, from the computing device to a server, a request to perform the clear data operation on the encrypted data, wherein the request includes the encrypted data. The method further includes receiving, at the computing device in response to the request, encrypted output from the server, wherein the encrypted output is of the same size and the same format for all encrypted data transmitted to the server.
-
公开(公告)号:US12212671B2
公开(公告)日:2025-01-28
申请号:US18485165
申请日:2023-10-11
Applicant: INTUIT INC.
Inventor: Margarita Vald , Julia Zarubinsky , Yaron Sheffer , Sergey Banshats
IPC: H04L9/08
Abstract: Systems and methods that may be used to provide policies and protocols for blocking decryption capabilities in symmetric key encryption using a unique protocol in which key derivation may include injecting a random string into each key derivation. For example, a policy may be assigned to each client device indicating whether the client device has been assigned encryption only permission or full access permission to both encrypt and decrypt data. The disclosed protocol prevents client devices with encryption only permission from obtaining keys for decryption.
-
公开(公告)号:US11928462B2
公开(公告)日:2024-03-12
申请号:US17589653
申请日:2022-01-31
Applicant: Intuit Inc.
Inventor: Elad Shmidov , Margarita Vald , Yerucham Meir Berkowitz , Boaz Sapir , Liron London , Dan Sharon , Vadim Belov
CPC classification number: G06F8/70
Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.
-
公开(公告)号:US20230244474A1
公开(公告)日:2023-08-03
申请号:US17589653
申请日:2022-01-31
Applicant: Intuit Inc.
Inventor: Elad Shmidov , Margarita Vald , Yerucham Meir Berkowitz , Boaz Sapir , Liron London , Dan Sharon , Vadim Belov
IPC: G06F8/70
CPC classification number: G06F8/70
Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.
-
-
-
-
-
-
-
-
-