×

Secure computational outsourcing techniques

  • US 6,941,463 B1
  • Filed: 05/14/1999
  • Issued: 09/06/2005
  • Est. Priority Date: 05/14/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • determining a set of arguments for an outsourced computation;

    classifying, with a first computer, said outsourced computation into at least one computation type, said at least one computation type being selected from the group consisting of quadrature computations, image edge detection computations, convolution computations, character string pattern matching computations, sorting computations, and computations for solving one or more differential equations;

    selecting, with said first computer, one or more disguising operations from a predetermined set of disguising operations based on said classifying;

    performing said one or more selected disguising operations on said actual arguments with said first computer to provide disguised arguments;

    outputting said disguised arguments from said first computer for performance of said outsourced computation; and

    receiving a result of said outsourced computation performed with said disguised arguments.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×