Efficient encrypted data management system and method
First Claim
Patent Images
1. A system for implementing an encrypted data operation, the system comprising:
- a memory that stores instructions; and
a processor that executes the instructions to perform operations, the operations comprising;
generating an encrypted hierarchical path identifier corresponding to a hierarchical data space for at least one plaintext data operation that preserves a hierarchy of the hierarchical data space, wherein the at least one plaintext data operation corresponds to at least one subdivision of the hierarchical data space;
encrypting the at least one plaintext data operation; and
sending a request to perform an encrypted data operation to a server, wherein the request comprises the encrypted data operation and the encrypted hierarchical path identifier, wherein the operation of generating the encrypted hierarchical path identifier comprises;
determining the at least one subdivision to which the at least one plaintext data operation corresponds;
calculatinq a secret permutation for each of the at least one subdivision;
and generating an encrypted label for each of the at least one subdivision using the corresponding secret permutation.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for performing an encrypted data operation may include generating an encrypted hierarchical path identifier corresponding to a hierarchical data space for at least one plaintext data operation that preserves the hierarchy of the hierarchical data space. The at least one plaintext data operation may correspond to at least one subdivision of the hierarchical data space. The method may further include encrypting the at least one plaintext data operation, and sending a request to perform an encrypted data operation to a server. The request may include the encrypted data operation and the encrypted hierarchical path identifier.
-
Citations
30 Claims
-
1. A system for implementing an encrypted data operation, the system comprising:
-
a memory that stores instructions; and a processor that executes the instructions to perform operations, the operations comprising; generating an encrypted hierarchical path identifier corresponding to a hierarchical data space for at least one plaintext data operation that preserves a hierarchy of the hierarchical data space, wherein the at least one plaintext data operation corresponds to at least one subdivision of the hierarchical data space; encrypting the at least one plaintext data operation; and sending a request to perform an encrypted data operation to a server, wherein the request comprises the encrypted data operation and the encrypted hierarchical path identifier, wherein the operation of generating the encrypted hierarchical path identifier comprises; determining the at least one subdivision to which the at least one plaintext data operation corresponds; calculatinq a secret permutation for each of the at least one subdivision; and generating an encrypted label for each of the at least one subdivision using the corresponding secret permutation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for implementing an encrypted data operation, the method comprising:
-
generating, by utilizing instructions from a memory that are executed by a processor, an encrypted hierarchical path identifier corresponding to a hierarchical data space for at least one plaintext data operation that preserves the hierarchy of the hierarchical data space, wherein the at least one plaintext data operation corresponds to at least one subdivision of the hierarchical data space; encrypting the at least one plaintext data operation; and sending a request to perform an encrypted data operation to a server, wherein the request comprises the encrypted data operation and the encrypted hierarchical path identifier, wherein generating the encrypted hierarchical path identifier comprises; determining the at least one subdivision to which the at least one plaintext data operation corresponds; calculating a secret permutation for each of the at least one subdivision; and
qeneratinq an encrypted label for each of the at least one subdivision using the corresponding secret permutation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable device, which when loaded and executed by a processor, causes the processor to perform operations comprising:
-
generating an encrypted hierarchical path identifier corresponding to a hierarchical data space for at least one plaintext data operation that preserves a hierarchy of the hierarchical data space, wherein the at least one plaintext data operation corresponds to at least one subdivision of the hierarchical data space; encrypting the at least one plaintext data operation; and sending a request to perform an encrypted data operation to a server, wherein the request comprises the encrypted data operation and the encrypted hierarchical path identifier, wherein the operation of qeneratinq the encrypted hierarchical path identifier comprises;
determining the at least one subdivision to which the at least one plaintext data operation corresponds;calculatinq a secret permutation for each of the at least one subdivision; and
qeneratinq an encrypted label for each of the at least one subdivision using the corresponding secret permutation. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A system for performing an encrypted data operation, the system comprising:
-
a memory that stores instructions; and a processor that executes the instructions to perform operations, the operations comprising; receiving an encrypted data operation and a first encrypted hierarchical path identifier from a client; finding at least one data index node of at least one data index using the first encrypted hierarchical path identifier; and sending the encrypted results of the encrypted data operation to the client, wherein the client generating the first encrypted hierarchical path identifier by;
determining the at least one subdivision to which the at least one plaintext data operation corresponds;calculating a secret permutation for each of the at least one subdivision; and
generating an encrypted label for each of the at least one subdivision using the corresponding secret permutation. - View Dependent Claims (23, 24)
-
-
25. A method for performing an encrypted data operation, the method comprising:
-
receiving an encrypted data operation and a first encrypted hierarchical path identifier from a client; finding, by utilizing instructions from a memory that are executed by a processor, at least one data index node of at least one data index using the first encrypted hierarchical path identifier; and sending the encrypted results of the encrypted data operation to the client, wherein the client generating the first encrypted hierarchical path identifier by;
determining the at least one subdivision to which the at least one plaintext data operation corresponds;calculating a secret permutation for each of the at least one subdivision; and
generating an encrypted label for each of the at least one subdivision using the corresponding secret permutation. - View Dependent Claims (26, 27)
-
-
28. A non-transitory computer readable device, which when loaded and executed by a processor, causes the processor to perform operations comprising:
-
receiving an encrypted data operation and a first encrypted hierarchical path identifier from a client; finding at least one data index node of at least one data index using the first encrypted hierarchical path identifier; and sending the encrypted results of the encrypted data operation to the client, wherein the client generating the first encrypted hierarchical path identifier by;
determining the at least one subdivision to which the at least one plaintext data operation corresponds;calculating a secret permutation for each of the at least one subdivision; and
generating an encrypted label for each of the at least one subdivision using the corresponding secret permutation. - View Dependent Claims (29, 30)
-
Specification