CN105637798A - 用于隐私保护计数的方法和系统 - Google Patents
用于隐私保护计数的方法和系统 Download PDFInfo
- Publication number
- CN105637798A CN105637798A CN201380074041.9A CN201380074041A CN105637798A CN 105637798 A CN105637798 A CN 105637798A CN 201380074041 A CN201380074041 A CN 201380074041A CN 105637798 A CN105637798 A CN 105637798A
- Authority
- CN
- China
- Prior art keywords
- record
- group
- csp
- evaluator
- token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44213—Monitoring of end-user related data
- H04N21/44222—Analytics of user selections, e.g. selection of programmes or purchase activity
- H04N21/44224—Monitoring of user activity on external systems, e.g. Internet browsing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/251—Learning process for intelligent management, e.g. learning user preferences for recommending movies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25891—Management of end-user data being end-user preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/466—Learning process for intelligent management, e.g. learning user preferences for recommending movies
- H04N21/4668—Learning process for intelligent management, e.g. learning user preferences for recommending movies for recommending content, e.g. movies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/65—Transmission of management data between client and server
- H04N21/658—Transmission by the client directed to the server
- H04N21/6582—Data stored in the client, e.g. viewing habits, hardware capabilities, credit card number
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/50—Oblivious transfer
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Social Psychology (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Optimization (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Graphics (AREA)
- Algebra (AREA)
- Evolutionary Computation (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (11)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201361772404P | 2013-03-04 | 2013-03-04 | |
| US61/772,404 | 2013-03-04 | ||
| US201361864088P | 2013-08-09 | 2013-08-09 | |
| US201361864085P | 2013-08-09 | 2013-08-09 | |
| US201361864098P | 2013-08-09 | 2013-08-09 | |
| US201361864094P | 2013-08-09 | 2013-08-09 | |
| US61/864,094 | 2013-08-09 | ||
| US61/864,088 | 2013-08-09 | ||
| US61/864,085 | 2013-08-09 | ||
| US61/864,098 | 2013-08-09 | ||
| PCT/US2013/076353 WO2014137449A2 (en) | 2013-03-04 | 2013-12-19 | A method and system for privacy preserving counting |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN105637798A true CN105637798A (zh) | 2016-06-01 |
Family
ID=51492081
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201380074041.9A Pending CN105637798A (zh) | 2013-03-04 | 2013-12-19 | 用于隐私保护计数的方法和系统 |
Country Status (6)
| Country | Link |
|---|---|
| US (4) | US20160019394A1 (enExample) |
| EP (3) | EP2965464A2 (enExample) |
| JP (1) | JP2016509268A (enExample) |
| KR (3) | KR20150122162A (enExample) |
| CN (1) | CN105637798A (enExample) |
| WO (4) | WO2014137449A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110830232A (zh) * | 2019-11-07 | 2020-02-21 | 南京远致数据技术有限公司 | 基于同态加密算法的隐蔽式竞价方法及竞价系统 |
Families Citing this family (71)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SG11201608601TA (en) * | 2014-04-23 | 2016-11-29 | Agency Science Tech & Res | Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database |
| US9825758B2 (en) * | 2014-12-02 | 2017-11-21 | Microsoft Technology Licensing, Llc | Secure computer evaluation of k-nearest neighbor models |
| US9787647B2 (en) * | 2014-12-02 | 2017-10-10 | Microsoft Technology Licensing, Llc | Secure computer evaluation of decision trees |
| US20160189461A1 (en) * | 2014-12-27 | 2016-06-30 | Avi Kanon | Near field communication (nfc) based vendor/customer interface |
| WO2017023065A1 (en) * | 2015-08-05 | 2017-02-09 | Samsung Electronics Co., Ltd. | Electronic apparatus and control method thereof |
| US20170359321A1 (en) * | 2016-06-13 | 2017-12-14 | Microsoft Technology Licensing, Llc | Secure Data Exchange |
| US10755172B2 (en) | 2016-06-22 | 2020-08-25 | Massachusetts Institute Of Technology | Secure training of multi-party deep neural network |
| GB201610883D0 (en) * | 2016-06-22 | 2016-08-03 | Microsoft Technology Licensing Llc | Privacy-preserving machine learning |
| EP3270321B1 (en) * | 2016-07-14 | 2020-02-19 | Kontron Modular Computers SAS | Technique for securely performing an operation in an iot environment |
| US10628604B1 (en) * | 2016-11-01 | 2020-04-21 | Airlines Reporting Corporation | System and method for masking digital records |
| WO2018128207A1 (ko) * | 2017-01-06 | 2018-07-12 | 경희대학교 산학협력단 | 왜곡된 데이터에 대한 프라이버시 보호 시스템 및 방법{system and method for privacy presevation in skewed data} |
| WO2018136811A1 (en) | 2017-01-20 | 2018-07-26 | Enveil, Inc. | Secure web browsing via homomorphic encryption |
| US10880275B2 (en) | 2017-01-20 | 2020-12-29 | Enveil, Inc. | Secure analytics using homomorphic and injective format-preserving encryption |
| US11196541B2 (en) | 2017-01-20 | 2021-12-07 | Enveil, Inc. | Secure machine learning analytics using homomorphic encryption |
| US11777729B2 (en) | 2017-01-20 | 2023-10-03 | Enveil, Inc. | Secure analytics using term generation and homomorphic encryption |
| US11507683B2 (en) | 2017-01-20 | 2022-11-22 | Enveil, Inc. | Query processing with adaptive risk decisioning |
| US10790960B2 (en) | 2017-01-20 | 2020-09-29 | Enveil, Inc. | Secure probabilistic analytics using an encrypted analytics matrix |
| CN108733311B (zh) * | 2017-04-17 | 2021-09-10 | 伊姆西Ip控股有限责任公司 | 用于管理存储系统的方法和设备 |
| US10491373B2 (en) * | 2017-06-12 | 2019-11-26 | Microsoft Technology Licensing, Llc | Homomorphic data analysis |
| US11082234B2 (en) * | 2017-07-06 | 2021-08-03 | Robert Bosch Gmbh | Method and system for privacy-preserving social media advertising |
| WO2019040712A1 (en) * | 2017-08-23 | 2019-02-28 | Mochi, Inc. | METHOD AND SYSTEM FOR AUCTION AT DECENTRALIZED MARKET |
| SG11202001591UA (en) | 2017-08-30 | 2020-03-30 | Inpher Inc | High-precision privacy-preserving real-valued function evaluation |
| JP6759168B2 (ja) * | 2017-09-11 | 2020-09-23 | 日本電信電話株式会社 | 難読化回路生成装置、難読化回路計算装置、難読化回路生成方法、難読化回路計算方法、プログラム |
| EP3461054A1 (en) | 2017-09-20 | 2019-03-27 | Universidad de Vigo | System and method for secure outsourced prediction |
| WO2019110380A1 (en) * | 2017-12-04 | 2019-06-13 | Koninklijke Philips N.V. | Nodes and methods of operating the same |
| WO2019121898A1 (en) * | 2017-12-22 | 2019-06-27 | Koninklijke Philips N.V. | A computer-implemented method of applying a first function to each data element in a data set, and a worker node and system for implementing the same |
| US11194922B2 (en) * | 2018-02-28 | 2021-12-07 | International Business Machines Corporation | Protecting study participant data for aggregate analysis |
| US11334547B2 (en) | 2018-08-20 | 2022-05-17 | Koninklijke Philips N.V. | Data-oblivious copying from a first array to a second array |
| US10999082B2 (en) | 2018-09-28 | 2021-05-04 | Analog Devices, Inc. | Localized garbled circuit device |
| CN109543094B (zh) * | 2018-09-29 | 2021-09-28 | 东南大学 | 一种基于矩阵分解的隐私保护内容推荐方法 |
| RU2728522C1 (ru) | 2018-10-17 | 2020-07-30 | Алибаба Груп Холдинг Лимитед | Совместное использование секретов без доверенного инициализатора |
| US10902133B2 (en) | 2018-10-25 | 2021-01-26 | Enveil, Inc. | Computational operations in enclave computing environments |
| US10817262B2 (en) | 2018-11-08 | 2020-10-27 | Enveil, Inc. | Reduced and pipelined hardware architecture for Montgomery Modular Multiplication |
| WO2020100118A1 (en) | 2018-11-15 | 2020-05-22 | Ravel Technologies SARL | Cryptographic anonymization for zero-knowledge advertising methods, apparatus, and system |
| US10915642B2 (en) | 2018-11-28 | 2021-02-09 | International Business Machines Corporation | Private analytics using multi-party computation |
| US11178117B2 (en) * | 2018-12-18 | 2021-11-16 | International Business Machines Corporation | Secure multiparty detection of sensitive data using private set intersection (PSI) |
| JP2022523182A (ja) * | 2019-02-22 | 2022-04-21 | インファー,インク. | モジュラー整数を使用したセキュアなマルチパーティ計算のための算術 |
| US11250140B2 (en) * | 2019-02-28 | 2022-02-15 | Sap Se | Cloud-based secure computation of the median |
| US11245680B2 (en) * | 2019-03-01 | 2022-02-08 | Analog Devices, Inc. | Garbled circuit for device authentication |
| CN110059097B (zh) * | 2019-03-21 | 2020-08-04 | 阿里巴巴集团控股有限公司 | 数据处理方法和装置 |
| US11669624B2 (en) | 2019-04-24 | 2023-06-06 | Google Llc | Response-hiding searchable encryption |
| US11277449B2 (en) * | 2019-05-03 | 2022-03-15 | Virtustream Ip Holding Company Llc | Adaptive distributive data protection system |
| CN110149199B (zh) * | 2019-05-22 | 2022-03-04 | 南京信息职业技术学院 | 一种基于属性感知的隐私保护方法及系统 |
| AU2019461061B2 (en) * | 2019-08-14 | 2023-03-30 | Ntt, Inc. | Secure gradient descent computation method, secure deep learning method, secure gradient descent computation system, secure deep learning system, secure computation apparatus, and program |
| US11507699B2 (en) | 2019-09-27 | 2022-11-22 | Intel Corporation | Processor with private pipeline |
| US11663521B2 (en) * | 2019-11-06 | 2023-05-30 | Visa International Service Association | Two-server privacy-preserving clustering |
| US11616635B2 (en) * | 2019-11-27 | 2023-03-28 | Duality Technologies, Inc. | Recursive algorithms with delayed computations performed in a homomorphically encrypted space |
| CN111125517B (zh) * | 2019-12-06 | 2023-03-14 | 陕西师范大学 | 一种基于差分隐私和时间感知的隐式矩阵分解推荐方法 |
| RU2722538C1 (ru) * | 2019-12-13 | 2020-06-01 | Общество С Ограниченной Ответственностью "Убик" | Компьютерно-реализуемый способ обработки информации об объектах, с использованием методов совместных вычислений и методов анализа данных |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| KR102404983B1 (ko) | 2020-04-28 | 2022-06-13 | 이진행 | 릿지 회귀를 이용한 변수 선택 장치 및 방법 |
| CN111768268B (zh) * | 2020-06-15 | 2022-12-20 | 北京航空航天大学 | 一种基于本地化差分隐私的推荐系统 |
| CN112163228B (zh) * | 2020-09-07 | 2022-07-19 | 湖北工业大学 | 一种基于幺模矩阵加密的岭回归安全外包方法及系统 |
| US11601258B2 (en) | 2020-10-08 | 2023-03-07 | Enveil, Inc. | Selector derived encryption systems and methods |
| US11902424B2 (en) * | 2020-11-20 | 2024-02-13 | International Business Machines Corporation | Secure re-encryption of homomorphically encrypted data |
| US20220191027A1 (en) * | 2020-12-16 | 2022-06-16 | Kyndryl, Inc. | Mutual multi-factor authentication technology |
| US11113707B1 (en) | 2021-01-22 | 2021-09-07 | Isolation Network, Inc. | Artificial intelligence identification of high-value audiences for marketing campaigns |
| US12081644B2 (en) * | 2021-02-01 | 2024-09-03 | Sap Se | Efficient distributed privacy-preserving computations |
| US11308226B1 (en) * | 2021-02-22 | 2022-04-19 | CipherMode Labs, Inc. | Secure collaborative processing of private inputs |
| US20220271914A1 (en) * | 2021-02-24 | 2022-08-25 | Govermment of the United of America as represented by the Secretary of the Navy | System and Method for Providing a Secure, Collaborative, and Distributed Computing Environment as well as a Repository for Secure Data Storage and Sharing |
| CN114567710B (zh) * | 2021-12-03 | 2023-06-06 | 湖北工业大学 | 一种基于岭回归预测的可逆数据隐写方法及系统 |
| CN114943041B (zh) * | 2022-05-17 | 2024-07-02 | 重庆邮电大学 | 一种基于差分隐私的隐式反馈协同过滤推荐方法 |
| CN114726524B (zh) * | 2022-06-02 | 2022-08-19 | 平安科技(深圳)有限公司 | 目标数据的排序方法、装置、电子设备及存储介质 |
| US20250373420A1 (en) * | 2022-07-11 | 2025-12-04 | Ntt, Inc. | Secret noise generation system, secret noise generation method and program |
| KR20240048985A (ko) * | 2022-10-07 | 2024-04-16 | 주식회사 크립토랩 | 투표 분석 정보를 포함하는 동형 암호문을 생성하는 방법 및 그 전자 장치 |
| US12476943B2 (en) * | 2022-11-23 | 2025-11-18 | International Business Machines Corporation | Recommendation engine using fully homomorphic encryption |
| CN116383848B (zh) * | 2023-04-04 | 2023-11-28 | 北京航空航天大学 | 一种三方安全计算防作恶方法、设备及介质 |
| US20240403476A1 (en) * | 2023-06-02 | 2024-12-05 | Apple Inc. | Privacy-Preserving Recommendation Generation |
| IL304615A (en) * | 2023-07-20 | 2025-02-01 | Google Llc | Efficient multi-turn circuit protocol |
| WO2025122159A1 (en) * | 2023-12-08 | 2025-06-12 | Pqsecure Technologies, Llc | Computer processing system and method configured to effectuate lower-order masking in a higher-order masked design |
| CN117896050A (zh) * | 2024-01-18 | 2024-04-16 | 杭州云象网络技术有限公司 | 基于隐私计算和解耦信息融合的跨域序列推荐方法及系统 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1513264A (zh) * | 2001-06-06 | 2004-07-14 | �ʼҷ����ֵ�������˾ | 专家模型推荐方法及系统 |
| CN101495941A (zh) * | 2006-08-01 | 2009-07-29 | 索尼株式会社 | 用于内容推荐的领域优化 |
| US20090299996A1 (en) * | 2008-06-03 | 2009-12-03 | Nec Laboratories America, Inc. | Recommender system with fast matrix factorization using infinite dimensions |
| CN101689075A (zh) * | 2007-04-02 | 2010-03-31 | 纳珀企业有限责任公司 | 使用推荐路径和/或媒体项使用来评级媒体项推荐 |
| CN102576438A (zh) * | 2009-09-21 | 2012-07-11 | 瑞典爱立信有限公司 | 用于执行推荐的方法和设备 |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5940738A (en) * | 1995-05-26 | 1999-08-17 | Hyundai Electronics America, Inc. | Video pedestal network |
| US6888848B2 (en) * | 2000-12-14 | 2005-05-03 | Nortel Networks Limited | Compact segmentation of variable-size packet streams |
| KR20070117598A (ko) * | 2005-02-18 | 2007-12-12 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 오디오/비디오 스트림에서의 보조데이터 다중화방법 |
| US8712915B2 (en) * | 2006-11-01 | 2014-04-29 | Palo Alto Research Center, Inc. | System and method for providing private demand-driven pricing |
| US8001132B2 (en) * | 2007-09-26 | 2011-08-16 | At&T Intellectual Property I, L.P. | Methods and apparatus for improved neighborhood based analysis in ratings estimation |
| US7685232B2 (en) * | 2008-06-04 | 2010-03-23 | Samsung Electronics Co., Ltd. | Method for anonymous collaborative filtering using matrix factorization |
| US8972742B2 (en) * | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
| US8185535B2 (en) * | 2009-10-30 | 2012-05-22 | Hewlett-Packard Development Company, L.P. | Methods and systems for determining unknowns in collaborative filtering |
| US8365227B2 (en) * | 2009-12-02 | 2013-01-29 | Nbcuniversal Media, Llc | Methods and systems for online recommendation |
| US8676736B2 (en) * | 2010-07-30 | 2014-03-18 | Gravity Research And Development Kft. | Recommender systems and methods using modified alternating least squares algorithm |
| US8881295B2 (en) * | 2010-09-28 | 2014-11-04 | Alcatel Lucent | Garbled circuit generation in a leakage-resilient manner |
| US9088888B2 (en) * | 2010-12-10 | 2015-07-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure wireless communication using rate-adaptive codes |
| WO2012155329A1 (en) * | 2011-05-16 | 2012-11-22 | Nokia Corporation | Method and apparatus for holistic modeling of user item rating with tag information in a recommendation system |
| US10102546B2 (en) * | 2011-09-15 | 2018-10-16 | Stephan HEATH | System and method for tracking, utilizing predicting, and implementing online consumer browsing behavior, buying patterns, social networking communications, advertisements and communications, for online coupons, products, goods and services, auctions, and service providers using geospatial mapping technology, and social networking |
| US8925075B2 (en) * | 2011-11-07 | 2014-12-30 | Parallels IP Holdings GmbH | Method for protecting data used in cloud computing with homomorphic encryption |
| US8478768B1 (en) * | 2011-12-08 | 2013-07-02 | Palo Alto Research Center Incorporated | Privacy-preserving collaborative filtering |
| US8983888B2 (en) * | 2012-11-07 | 2015-03-17 | Microsoft Technology Licensing, Llc | Efficient modeling system for user recommendation using matrix factorization |
-
2013
- 2013-12-19 WO PCT/US2013/076353 patent/WO2014137449A2/en not_active Ceased
- 2013-12-19 US US14/771,608 patent/US20160019394A1/en not_active Abandoned
- 2013-12-19 JP JP2015561331A patent/JP2016509268A/ja not_active Withdrawn
- 2013-12-19 KR KR1020157024146A patent/KR20150122162A/ko not_active Withdrawn
- 2013-12-19 CN CN201380074041.9A patent/CN105637798A/zh active Pending
- 2013-12-19 EP EP13821039.8A patent/EP2965464A2/en not_active Withdrawn
-
2014
- 2014-05-01 US US14/771,659 patent/US20160012238A1/en not_active Abandoned
- 2014-05-01 KR KR1020157023908A patent/KR20160030874A/ko not_active Withdrawn
- 2014-05-01 EP EP14730285.5A patent/EP3031164A2/en not_active Withdrawn
- 2014-05-01 US US14/771,527 patent/US20160020904A1/en not_active Abandoned
- 2014-05-01 WO PCT/US2014/036359 patent/WO2014138753A2/en not_active Ceased
- 2014-05-01 US US14/771,534 patent/US20160004874A1/en not_active Abandoned
- 2014-05-01 EP EP14734966.6A patent/EP3031166A2/en not_active Withdrawn
- 2014-05-01 WO PCT/US2014/036357 patent/WO2014138752A2/en not_active Ceased
- 2014-05-01 WO PCT/US2014/036360 patent/WO2014138754A2/en not_active Ceased
- 2014-05-01 KR KR1020157024126A patent/KR20160009012A/ko not_active Withdrawn
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1513264A (zh) * | 2001-06-06 | 2004-07-14 | �ʼҷ����ֵ�������˾ | 专家模型推荐方法及系统 |
| CN101495941A (zh) * | 2006-08-01 | 2009-07-29 | 索尼株式会社 | 用于内容推荐的领域优化 |
| CN101689075A (zh) * | 2007-04-02 | 2010-03-31 | 纳珀企业有限责任公司 | 使用推荐路径和/或媒体项使用来评级媒体项推荐 |
| US20090299996A1 (en) * | 2008-06-03 | 2009-12-03 | Nec Laboratories America, Inc. | Recommender system with fast matrix factorization using infinite dimensions |
| CN102576438A (zh) * | 2009-09-21 | 2012-07-11 | 瑞典爱立信有限公司 | 用于执行推荐的方法和设备 |
Non-Patent Citations (1)
| Title |
|---|
| MONI NAOR ET AL: "Oblivious transfer and polynomial evaluation", 《PROCEEDINGS OF THE THIRTY-FIRST ANNUAL ACM SYMPOSIUM ON THE THEORY OF COMPUTING》 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110830232A (zh) * | 2019-11-07 | 2020-02-21 | 南京远致数据技术有限公司 | 基于同态加密算法的隐蔽式竞价方法及竞价系统 |
| CN110830232B (zh) * | 2019-11-07 | 2022-07-08 | 北京静宁数据科技有限公司 | 基于同态加密算法的隐蔽式竞价方法及竞价系统 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP3031164A2 (en) | 2016-06-15 |
| WO2014138753A2 (en) | 2014-09-12 |
| EP2965464A2 (en) | 2016-01-13 |
| WO2014138754A2 (en) | 2014-09-12 |
| WO2014137449A3 (en) | 2014-12-18 |
| WO2014137449A2 (en) | 2014-09-12 |
| KR20160009012A (ko) | 2016-01-25 |
| WO2014138752A3 (en) | 2014-12-11 |
| KR20150122162A (ko) | 2015-10-30 |
| WO2014138753A3 (en) | 2014-11-27 |
| US20160004874A1 (en) | 2016-01-07 |
| WO2014138754A3 (en) | 2014-11-27 |
| US20160012238A1 (en) | 2016-01-14 |
| EP3031166A2 (en) | 2016-06-15 |
| KR20160030874A (ko) | 2016-03-21 |
| US20160020904A1 (en) | 2016-01-21 |
| WO2014138752A2 (en) | 2014-09-12 |
| US20160019394A1 (en) | 2016-01-21 |
| JP2016509268A (ja) | 2016-03-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105637798A (zh) | 用于隐私保护计数的方法和系统 | |
| Corrigan-Gibbs et al. | Prio: Private, robust, and scalable computation of aggregate statistics | |
| KR102596445B1 (ko) | 개인 정보 보호를 위한 방법 | |
| Nikolaenko et al. | Privacy-preserving matrix factorization | |
| US10333696B2 (en) | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency | |
| CN105103487A (zh) | 用于基于矩阵分解的到评级贡献用户的隐私保护推荐的方法和系统 | |
| US20190386814A1 (en) | Systems and Methods for Implementing an Efficient, Scalable Homomorphic Transformation of Encrypted Data with Minimal Data Expansion and Improved Processing Efficiency | |
| US11368296B2 (en) | Communication-efficient secret shuffle protocol for encrypted data based on homomorphic encryption and oblivious transfer | |
| EP2602755A1 (en) | Privacy-preserving collaborative filtering | |
| CN108811519A (zh) | 用于在不公开特定识别信息的情况下建立标识符之间的链接的系统和方法 | |
| Wang et al. | PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs | |
| CN106170943A (zh) | 使用部分同态加密和掩码的隐私保护岭回归 | |
| US20210336778A1 (en) | Efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers | |
| Bao et al. | Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain | |
| US11263063B1 (en) | Methods and systems for device-specific event handler generation | |
| EdalatNejad et al. | Private collection matching protocols | |
| KR102863432B1 (ko) | 프라이버시 보호를 위한 로컬화된 암호화 기술 | |
| Guo et al. | Authorized function homomorphic signature | |
| Jung | Ensuring Security and Privacy in Big Data Sharing, Trading, and Computing | |
| US20260040058A1 (en) | Multi-conversion anonymous private set intersection techniques | |
| Melis | Building and evaluating privacy-preserving data processing systems | |
| Iyer | Ghost Recommendations: A Protocol for Efficiently Enhancing User Privacy | |
| Kamers | Homomorphic encryption: introduction and applicabilities | |
| CN119766486A (zh) | 加密数据审计方法、装置及计算机设备 | |
| Le et al. | Privacy Assurances in Multiple Data-Aggregation Transactions |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160601 |