Multi-party encryption cube processing apparatuses, methods and systems
First Claim
Patent Images
1. A method for use within secure multi-party computation, comprising:
- storing, by one or more data processors, an operation preference including an allowed database operation and a cryptographic preference, which are both associated with a data set;
storing, by the one or more data processors, the data set based on the operation preference and the cryptographic preference;
analyzing, by the one or more data processors, a query associated with at least the data set;
determining, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference;
selecting, by the one or more data processors, one or more cryptographic protocols based on the first cryptographic preference; and
using, by the one or more data processors, the one or more cryptographic protocols to perform the allowable operation on the data set, wherein merchant data owners jointly process their pooled data to perform transactional data analysis while keeping their respective data private from one another, with a summarized version of the transactional data analysis provided to one of the merchant data owners.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an operation preference and a cryptographic preference. A data set is stored based on the operation preference and the cryptographic preference. A determination is made that processing the query involves performing an allowable operation on the data set based on the operation preference.
16 Citations
13 Claims
-
1. A method for use within secure multi-party computation, comprising:
-
storing, by one or more data processors, an operation preference including an allowed database operation and a cryptographic preference, which are both associated with a data set; storing, by the one or more data processors, the data set based on the operation preference and the cryptographic preference; analyzing, by the one or more data processors, a query associated with at least the data set;
determining, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference;selecting, by the one or more data processors, one or more cryptographic protocols based on the first cryptographic preference; and using, by the one or more data processors, the one or more cryptographic protocols to perform the allowable operation on the data set, wherein merchant data owners jointly process their pooled data to perform transactional data analysis while keeping their respective data private from one another, with a summarized version of the transactional data analysis provided to one of the merchant data owners. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for use within secure multi-party computation, comprising:
-
a memory; and one or more processors disposed in communication with the memory and configured to issue processing instructions stored in the memory to; store, by one or more data processors, an operation preference including an allowed database operation and a cryptographic preference, which are both associated with a data set; store, by the one or more data processors, the data set based on the operation preference and the cryptographic preference; analyze, by the one or more data processors, a query associated with at least the data set; determine, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference; select, by the one or more data processors, one or more cryptographic protocols based on the first cryptographic preference; and use, by the one or more data processors, the one or more cryptographic protocols to perform the allowable operation on the data set, wherein merchant data owners jointly process their pooled data to perform transactional data analysis while keeping their respective data private from one another, with a summarized version of the transactional data analysis provided to one of the merchant data owners. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A processor-readable non-transitory medium storing processor-issuable instructions to:
-
store, by one or more data processors, an operation preference including an allowed database operation and a cryptographic preference, which are both associated with a data set; store, by the one or more data processors, the data set based on the operation preference and the cryptographic preference; analyze, by the one or more data processors, a query associated with at least the data set; determine, by the one or more data processors, that processing the query involves performing an allowable operation on the data set based on the operation preference; select, by the one or more data processors, one or more cryptographic protocols based on the first cryptographic preference; and use, by the one or more data processors, the one or more cryptographic protocols to perform the allowable operation on the data set, wherein merchant data owners jointly process their pooled data to perform transactional data analysis while keeping their respective data private from one another, with a summarized version of the transactional data analysis provided to one of the merchant data owners.
-
Specification