Multi-party encryption cube processing apparatuses, methods and systems
First Claim
Patent Images
1. A method for use within secure multi-pa rty computation, comprising:
- storing, by one or more data processors, a plurality of operation preferences including allowed database operations and a cryptographic preference, which are both associated with a data set, each cryptographic preference specifying two or more encryption protocols;
storing, by the one or more data processors, the data set on an element by element basis, according to the cryptographic preference;
analyzing, by the one or more data processors, a query from a requestor associated with at least the data set;
determining, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference;
determining, by the one or more data processors, elements of the data set required to perform the allowable operation on the data set;
selecting, by the one or more data processors, an encryption protocol specified by the cryptographic preference for each respective element of the data set; and
using, by the one or more data processors, the at least one of the two or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis provided to at least the requestor while keeping data from individual contributors to the data set private from one another.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an operation preference and a cryptographic preference. A data set is stored based on the operation preference and the cryptographic preference. A determination is made that processing the query involves performing an allowable operation on the data set based on the operation preference.
-
Citations
20 Claims
-
1. A method for use within secure multi-pa rty computation, comprising:
-
storing, by one or more data processors, a plurality of operation preferences including allowed database operations and a cryptographic preference, which are both associated with a data set, each cryptographic preference specifying two or more encryption protocols; storing, by the one or more data processors, the data set on an element by element basis, according to the cryptographic preference; analyzing, by the one or more data processors, a query from a requestor associated with at least the data set; determining, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference; determining, by the one or more data processors, elements of the data set required to perform the allowable operation on the data set; selecting, by the one or more data processors, an encryption protocol specified by the cryptographic preference for each respective element of the data set; and using, by the one or more data processors, the at least one of the two or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis provided to at least the requestor while keeping data from individual contributors to the data set private from one another. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for use within secure multi-party computation, comprising:
-
a memory; and one or more processors disposed in communication with the memory and configured to issue processing instructions stored in the memory to; store, by one or more data processors, an operation preference including an allowed database operation and a cryptographic preference, which are both associated with a data set, each cryptographic preference including a plurality of encryption protocols; store, by the one or more data processors, the data set based on the operation preference and the cryptographic preference; analyze, by the one or more data processors, a query from a requestor associated with at least the data set; determine, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference; select, by the one or more data processors, one or more encryption protocols based on the data sets corresponding cryptographic preference and the query; and use, by the one or more data processors, the one or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis output encrypted according to the cryptographic preference corresponding to the data set provided to at least the requester while keeping data from individual contributors to the data set private from one another. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for use in database operations on data sets from multiple parties such that an individual data set is visible only to the party that provided the data set, the method comprising:
-
storing a plurality of data sets, at least one data set from each of a plurality of parties; storing an operation preference for each data set, the operation preference specifying, for each element of the data set, one of a plurality of encryption protocols and further specifying allowed database operations for each element of the data set; receiving, from a requestor, a query associated with a first data set of the plurality of data sets; analyzing the operation preference for the data set to determine that the query involves allowed database operations for elements of the data set involved in the query; responsive to determining that the query involves an allowable database operation, selecting one or more encryption protocols according to the operation preference for the elements of the data set involved in the query; and using the one or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis provided to at least the requestor while keeping data from individual contributors to the data set private from one another. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification