DYNAMIC GENERATION AND MANAGEMENT OF ASYMMETRIC CRYPTOGRAPHIC KEYS USING DISTRIBUTED LEDGERS

    公开(公告)号:US20200044833A1

    公开(公告)日:2020-02-06

    申请号:US16052162

    申请日:2018-08-01

    Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically generate and manage a distribution of asymmetric cryptographic keys using distributed ledgers. For example, an apparatus may extract, from a hierarchical data structure, an index value associated with a corresponding element of permissioning data. The apparatus may also extract, from a first element of a distributed ledger, cryptographic data that includes a first public cryptographic key associated with the hierarchical data structure. The apparatus may generate a second public cryptographic key based on the first public cryptographic key and the extracted index value, and encrypt information using the second public cryptographic key. The encrypted information may be associated with the corresponding element of permissioning data, and the second public cryptographic key may be discarded in response to the encryption of the information.

    Validating confidential data using homomorphic computations

    公开(公告)号:US12177329B2

    公开(公告)日:2024-12-24

    申请号:US18097114

    申请日:2023-01-13

    Abstract: The disclosed exemplary embodiments include computer-implemented apparatuses and methods that validate confidential data based privacy-preserving homomorphic computations involving encrypted data. For example, an apparatus may receive, from a first computing system, encrypted data that includes a first encrypted value representative of at least one of first account data or an element of cryptographic data. Based on the first encrypted value and on second encrypted values, the apparatus may generate encrypted residual values representative of second account data associated with one or more reference accounts, and the apparatus may request and receive a decrypted residual value associated with each of the encrypted residual values from a second computing system. The apparatus may transmit the decrypted residual values to the first computing system, which may validate the first account data based on at least the decrypted residual values and perform operations associated with the validated first account data.

    Homomorphic computations on encrypted data within a distributed computing environment

    公开(公告)号:US11469878B2

    公开(公告)日:2022-10-11

    申请号:US16751792

    申请日:2020-01-24

    Abstract: The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that perform homomorphic computations on encrypted third-party data within a distributed computing environment. For example, an apparatus receives a homomorphic public key and encrypted transaction data characterizing an exchange of data from a computing system, and encrypts modelling data associated with a first predictive model using the homomorphic public key. The apparatus may perform homomorphic computations that apply the first predictive model to the encrypted transaction data in accordance with the encrypted first modelling data, and transmit an encrypted first output of the homomorphic computations to the computing system, which may decrypt the encrypted first output using a homomorphic private key and generate decrypted output data indicative of a predicted likelihood that the data exchange represents fraudulent activity.

    Homomorphic encryption of communications involving voice-enabled devices in a distributed computing environment

    公开(公告)号:US11200328B2

    公开(公告)日:2021-12-14

    申请号:US16655453

    申请日:2019-10-17

    Abstract: The disclosed exemplary embodiments include computer-implemented systems, devices, apparatuses, and processes that maintain data confidentiality in communications involving voice-enabled devices in a distributed computing environment using homomorphic encryption. By way of example, an apparatus may receive encrypted command data from a computing system, decrypt the encrypted command data using a homomorphic private key, and perform operations that associate the decrypted command data with a request for an element of data. Using a public cryptographic key associated with a device, the apparatus generate an encrypted response that includes the requested data element, and transmit the encrypted response to the device. The device may decrypt the encrypted response using a private cryptographic key and to perform operations that present first audio content representative of the requested data element through an acoustic interface.

    VALIDATING CONFIDENTIAL DATA USING HOMOMORPHIC COMPUTATIONS

    公开(公告)号:US20230155810A1

    公开(公告)日:2023-05-18

    申请号:US18097114

    申请日:2023-01-13

    CPC classification number: H04L9/008 G06F7/588

    Abstract: The disclosed exemplary embodiments include computer-implemented apparatuses and methods that validate confidential data based privacy-preserving homomorphic computations involving encrypted data. For example, an apparatus may receive, from a first computing system, encrypted data that includes a first encrypted value representative of at least one of first account data or an element of cryptographic data. Based on the first encrypted value and on second encrypted values, the apparatus may generate encrypted residual values representative of second account data associated with one or more reference accounts, and the apparatus may request and receive a decrypted residual value associated with each of the encrypted residual values from a second computing system. The apparatus may transmit the decrypted residual values to the first computing system, which may validate the first account data based on at least the decrypted residual values and perform operations associated with the validated first account data.

Patent Agency Ranking