×

System and method for operating on streaming encrypted data

  • US 9,338,144 B2
  • Filed: 02/19/2014
  • Issued: 05/10/2016
  • Est. Priority Date: 02/19/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for data privacy in a distributed communication system, the method comprising:

  • receiving first encrypted data from a first client terminal, the first encrypted data having a first data representation, including a first cyphertext ring dimension;

    receiving second encrypted data from a second client terminal, the second encrypted data having a second data representation, including a second cyphertext ring dimension, different than the first data representation;

    analyzing the first and second data representations, respectively including the first and second cyphertext ring dimensions, to determine a first data rate for the first encrypted data and a second data rate for the second encrypted data and to determine a common data representation, including a common cyphertext ring dimension for both the first and second encrypted data;

    translating the first and second encrypted data to a shared data representation having the same cyphertext ring dimension, using said common data representation including said common data rate;

    performing data operations on the first encrypted data and second encrypted data having the common data representation to generate a first operated encrypted data and a second operated encrypted data having the shared data representation, respectively;

    reverting the first operated encrypted data back to said first data representation including said first cyphertext ring dimension and sending a reverted first encrypted data to the first client terminal for decryption by the first client terminal; and

    reverting the second operated encrypted data back to said second data representation including said second cyphertext ring dimension and sending a reverted second encrypted data to the second client terminal for decryption by the second client terminal, wherein the common data representation is a constant common ring dimension that does not vary with the first and second encrypted data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×