Multi-Party Encryption Cube Processing Apparatuses, Methods and Systems
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an operation preference and a cryptographic preference. A data set is stored based on the operation preference and the cryptographic preference. A determination is made that processing the query involves performing an allowable operation on the data set based on the operation preference.
0 Citations
40 Claims
-
1-21. -21. (canceled)
-
22. A method for use within secure multi-party computation, comprising:
-
analyzing, by the one or more data processors, a query from a requestor associated with a data set comprising data provided by one or more data owners; determining, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on an operation preference communicated by the one or more data owners; determining, by the one or more data processors, one or more data elements of the data set required to perform the allowable operation on the data set; selecting, by the one or more data processors, one or more encryption protocols based on a cryptographic preference specified by the one or more data owners for each of the one or more data elements of the data set; and using, by the one or more data processors, the one or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis provided to the requestor while keeping the data from the one or more data owners private from one another. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A system for use within secure multi-party computation, comprising:
-
a memory; and one or more processors disposed in communication with the memory and configured to issue processing instructions stored in the memory to; analyze, by the one or more data processors, a query from a requestor associated with a data set comprising data provided by one or more data owners; determine, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on an operation preference communicated by the one or more data owners; select, by the one or more data processors, one or more encryption protocols based on the data set'"'"'s corresponding cryptographic preference and the query; and use, by the one or more data processors, the one or more encryption protocols to perform the allowable operation on the data set, with a summarized version of a transactional data analysis output encrypted according to the cryptographic preference corresponding to the data set provided to at least the requester while keeping the data from the one or more data owners private from one another. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A method for use in database operations on data sets from multiple parties such that an individual data set is visible only to the party that provided the data set, the method comprising:
-
receiving a query associated with one or more data sets comprising data provided by one or more parties; analyzing an operation preference for the one or more data sets to determine that the query involves allowed database operations for elements of the data set involved in the query; responsive to determining that the query involves an allowable database operation, selecting one or more encryption protocols according to the operation preference for the elements of the data set involved in the query; and using the one or more encryption protocols to perform the allowable operation on the data set involved in the query, with a summarized version of a transactional data analysis provided to at least the requester while keeping data from individual parties that contributed to the data set private from one another. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification