Systems and methods for cryptographically-secure queries using filters generated by multiple parties
First Claim
Patent Images
1. A method, comprising the steps of:
- receiving a search request at an electronic computing device, the search request comprising one or more phrases to be searched against a plurality of filters representing a plurality of data items stored in a search system;
transforming each of the one or more phrases according to a first predetermined algorithm to generate a masked version of each of the one or more phrases;
transmitting the masked version of each of the one or more phrases to a third party system for securing the masked version of each of the one or more phrases;
receiving, at the electronic computing device, a secured version of the one or more phrases from the third party system;
transforming the received secured version of the one or more phrases according to a second predetermined algorithm to generate query data; and
transmitting the query data to the search system, wherein the search system runs the query data through the plurality of filters to identify one or more data items corresponding to the search request.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods that permit the querying of encrypted data in a cryptographically-secure manner. Generally, data that has been encrypted cannot be queried using plaintext terms because it is in ciphertext. Accordingly, use of filters that correspond to the encrypted data and are generated by multiple parties permits querying of the data without decrypting the data or compromising the security of the encrypted data or of the queries against that data.
-
Citations
14 Claims
-
1. A method, comprising the steps of:
-
receiving a search request at an electronic computing device, the search request comprising one or more phrases to be searched against a plurality of filters representing a plurality of data items stored in a search system; transforming each of the one or more phrases according to a first predetermined algorithm to generate a masked version of each of the one or more phrases; transmitting the masked version of each of the one or more phrases to a third party system for securing the masked version of each of the one or more phrases; receiving, at the electronic computing device, a secured version of the one or more phrases from the third party system; transforming the received secured version of the one or more phrases according to a second predetermined algorithm to generate query data; and transmitting the query data to the search system, wherein the search system runs the query data through the plurality of filters to identify one or more data items corresponding to the search request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
an electronic computing device that receives a search request comprising one or more phrases to be searched against a plurality of filters representing one or more data items, wherein the electronic computing device transforms each of the one or more phrases according to a first predetermined algorithm to generate a masked version of each of the one or more phrases and transmits the masked version of each of the one or more phrases to a third party system; the third party system that receives the masked version of each of the one or more phrases from the electronic computing device, wherein the third party system transforms the masked version of each of the one or more phrases according to a predetermined cryptographic algorithm to generate a secured version of the one or more phrases and transmits the secured version of the one or more phrases back to the electronic computing device; the electronic computing device that receives the secured version of the one or more phrases from the third party system, wherein the electronic computing device transforms the received secured version of the one or more phrases according to a second predetermined algorithm to generate query data and transmits the query data to a search system; and the search system that receives the query data, wherein the search system runs the query data through the plurality of filters to identify one or more data items corresponding to the search request. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification