会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Adjustable proxy re-encryption
    • 可调代理重新加密
    • US09537838B2
    • 2017-01-03
    • US14579317
    • 2014-12-22
    • Isabelle HangFlorian KerschbaumMathias KohlerMartin HaerterichFlorian HahnAxel SchroepferWalter TighzertAndreas Schaad
    • Isabelle HangFlorian KerschbaumMathias KohlerMartin HaerterichFlorian HahnAxel SchroepferWalter TighzertAndreas Schaad
    • H04L29/06
    • H04L63/0464H04L63/0471H04L63/0807
    • Methods, systems, and computer-readable storage media for proxy re-encryption of encrypted data stored in a first database of a first server and a second database of a second server. Implementations include actions of receiving a first token at the first server from a client-side computing device, providing a first intermediate re-encrypted value based on a first encrypted value and the first token, transmitting the first intermediate re-encrypted value to the second server, receiving a second intermediate re-encrypted value from the second server, the second intermediate re-encrypted value having been provided by encrypting the first encrypted value at the second server based on a second token, providing the first encrypted value as a first re-encrypted value based on the first intermediate re-encrypted value and the second intermediate re-encrypted value, and storing the first re-encrypted value in the first database.
    • 用于对存储在第一服务器的第一数据库和第二服务器的第二数据库中的加密数据进行代理重新加密的方法,系统和计算机可读存储介质。 实现包括从客户端计算设备在第一服务器处接收第一令牌的动作,基于第一加密值和第一令牌提供第一中间重新加密的值,将第一中间重新加密值发送到第二中继重新加密值 服务器,从第二服务器接收第二中间重新加密的值,第二中间重新加密值是通过基于第二令牌加密第二服务器处的第一加密值而提供的,提供第一加密值作为第一重新 基于所述第一中间重新加密值和所述第二中间重新加密值的加密值,并将所述第一重新加密值存储在所述第一数据库中。
    • 8. 发明授权
    • Encrypted in-memory column-store
    • 加密内存中的列存储
    • US09213764B2
    • 2015-12-15
    • US14088051
    • 2013-11-22
    • Florian KerschbaumMartin HaerterichMathias KohlerIsabelle HangAndreas SchaadAxel SchroepferWalter TighzertPatrick Grofig
    • Florian KerschbaumMartin HaerterichMathias KohlerIsabelle HangAndreas SchaadAxel SchroepferWalter TighzertPatrick Grofig
    • G06F17/30G06F21/62
    • G06F17/30864G06F21/6227
    • Embodiments relate to processing encrypted data, and in particular to identifying an appropriate layer of encryption useful for processing a query. Such identification (also known as the onion selection problem) is achieved utilizing an adjustable onion encryption procedure. Based upon defined requirements of policy configuration, alternative resolution, and conflict resolution, the adjustable onion encryption procedure entails translating a query comprising an expression in a database language (e.g. SQL) into an equivalent query on encrypted data. The onion may be configured in almost arbitrary ways directing the onion selection. An execution function introduces an execution split to allow local (e.g. client-side) query fulfillment that may otherwise not be possible in a secure manner on the server-side. A searchable encryption function may also be employed, and embodiments accommodate aggregation via homomorphic encryption. Embodiments may be implemented as an in-memory column store database system.
    • 实施例涉及处理加密数据,特别是涉及识别适用于处理查询的适当加密层。 利用可调节的洋葱加密程序实现了这种识别(也称为洋葱选择问题)。 根据策略配置,替代解决方案和冲突解决的定义要求,可调节洋葱加密过程需要将包含数据库语言(例如SQL)中的表达式的查询转换为对加密数据的等效查询。 洋葱可以以几乎任意方式配置,以指导洋葱选择。 执行功能引入执行分割以允许在服务器端以安全的方式可能不可能的本地(例如客户端)查询执行。 还可以采用可搜索的加密功能,并且实施例通过同态加密适应聚合。 实施例可以被实现为内存中列存储数据库系统。