Patents by Inventor Benjamin Kreuter
Benjamin Kreuter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250247368Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating differential privacy noise and applying the noise to data. In one aspect, a method includes obtaining a first binomial distribution parameter. Target differential privacy parameters representing a target level of differential privacy are obtained. The target differential privacy parameters include a first target differential privacy parameter representing a privacy metric that controls a level of privacy of data. For each value of multiple values of a second binomial distribution parameter, an actual value of a first actual differential privacy parameter that represents an actual privacy metric is determined based on the value of the second binomial distribution parameter. A determination is made whether the actual value of the first differential privacy parameter satisfies the first target differential privacy parameter.Type: ApplicationFiled: January 28, 2025Publication date: July 31, 2025Inventors: Phi Hung Le, Craig William Wright, Pasin Manurangsi, Jiayu Peng, Mariana Raykova, Baiyu Li, Benjamin Kreuter
-
Publication number: 20250232058Abstract: Aspects of the disclosure are directed to estimating a frequency histogram for users across multiple platforms while maintaining accuracy, security, privacy, and/or computational efficiency thresholds. The frequency histogram can be estimated unbiasedly with a configurable variance. The computations for generating the frequency histogram can be differentially private, satisfy provable security, and be efficient.Type: ApplicationFiled: December 13, 2023Publication date: July 17, 2025Inventors: Badih Ghazi, Benjamin Kreuter, Phi Hung Le, Baiyu Li, Pasin Manurangsi, Raimundo Mirisola, Jiayu Peng, Shanmugasundaram Ravikumar, Mariana Raykova, Chenwei Wang, Craig Wright
-
Patent number: 12192342Abstract: This document relates to using secure MPC to select digital components in ways that preserve user privacy and protects the security of data of each party that is involved in the selection process. In one aspect, a method includes receiving, by a first computing system of a secure MPC system and from a client device, a digital component request and a nonce. The first computing system generates, based on the nonce and a function, an array including a share of a Bloom filter representing user group identifiers for user groups that include a user of the client device as a member. For each of multiple user group identifiers, the first computing system calculates, in collaboration with one or more second computing systems of the secure MPC system and using the array, a respective first secret share of one or more user group membership condition parameters.Type: GrantFiled: March 7, 2022Date of Patent: January 7, 2025Assignee: Google LLCInventors: Gang Wang, Sarvar Patel, Marcel M. Moti Yung, Karn Seth, Kevin Wei Li Yeo, Benjamin Kreuter, Mariana Raykova, Tancrède Lepoint
-
Publication number: 20240313953Abstract: This document describes systems and techniques for using cryptography, secret sharing, secure MPC, garbled circuits, and oblivious transfer to select digital components in ways that preserve user privacy and protects the security of data of each party that is involved in the selection process. A method includes obtaining, by a first computer of a secure multi-party computation (MPC) system, at least a first share of user data related to a user of a client device. For each digital component in a set, a first secret share of a condition bit for the condition is obtained for each of one or more conditions that condition eligibility of the digital component for distribution. A garbled circuit is executed to select a given digital component for which each of the one or more conditions of the digital component is satisfied using the first secret share and the second secret share for each condition.Type: ApplicationFiled: January 11, 2024Publication date: September 19, 2024Inventors: Benjamin Kreuter, Phillipp Schoppmann, Gang Wang, Mariana Raykova, Marcel M. Moti Yung
-
Patent number: 11784800Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.Type: GrantFiled: July 7, 2020Date of Patent: October 10, 2023Assignee: GOOGLE LLCInventors: Craig Wright, Benjamin Kreuter, James Robert Koehler, Arthur Asuncion, Evgeny Skvortsov, Laura Grace Book, Sheng Ma, Jiayu Peng, Xichen Huang
-
Patent number: 11743034Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.Type: GrantFiled: January 3, 2022Date of Patent: August 29, 2023Assignee: GOOGLE LLCInventors: Shobhit Saxena, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Publication number: 20230155820Abstract: This document relates to using secure MPC to select digital components in ways that preserve user privacy and protects the security of data of each party that is involved in the selection process. In one aspect, a method includes receiving, by a first computing system of a secure MPC system and from a client device, a digital component request and a nonce. The first computing system generates, based on the nonce and a function, an array including a share of a Bloom filter representing user group identifiers for user groups that include a user of the client device as a member. For each of multiple user group identifiers, the first computing system calculates, in collaboration with one or more second computing systems of the secure MPC system and using the array, a respective first secret share of one or more user group membership condition parameters.Type: ApplicationFiled: March 7, 2022Publication date: May 18, 2023Inventors: Gang Wang, Sarvar Patel, Marcel M. Moti Yung, Karn Seth, Kevin Wei Li Yeo, Benjamin Kreuter, Mariana Raykova, Tancrède Lepoint
-
Publication number: 20220376887Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.Type: ApplicationFiled: July 7, 2020Publication date: November 24, 2022Applicant: GOOGLE LLCInventors: Craig Wright, Benjamin Kreuter, James Robert Koehler, Arthur Asuncion, Evgeny Skvortsov, Laura Grace Book, Sheng MA, Jiayu Peng, Xichen Huang
-
Patent number: 11494506Abstract: Systems, methods, devices, and other techniques for preserving privacy when comparing private datasets from first and second computing systems. The second computing system identifies a first set of identifiers corresponding to records in a private database of the second computing system. The second computing system receives blinded versions of a set of identifiers corresponding to records in a private database of the first computing system. The second computing system determines an intersection or characteristic thereof of the records in the private database of the first computing system and the records in the private database of the second computing system based on matches between the blinded versions of the first and second sets of identifiers.Type: GrantFiled: April 19, 2019Date of Patent: November 8, 2022Assignee: Google LLCInventors: Sarvar Patel, Marcel M. Moti Yung, Karn Seth, Benjamin Kreuter
-
Publication number: 20220200794Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.Type: ApplicationFiled: January 3, 2022Publication date: June 23, 2022Inventors: Shobhit Saxena, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Patent number: 11240009Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.Type: GrantFiled: August 25, 2020Date of Patent: February 1, 2022Assignee: Google LLCInventors: Shobhit Saxena, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Publication number: 20220004654Abstract: Systems, methods, devices, and other techniques for preserving privacy when comparing private datasets from first and second computing systems. The second computing system identifies a first set of identifiers corresponding to records in a private database of the second computing system. The second computing system receives blinded versions of a set of identifiers corresponding to records in a private database of the first computing system. The second computing system determines an intersection or characteristic thereof of the records in the private database of the first computing system and the records in the private database of the second computing system based on matches between the blinded versions of the first and second sets of identifiers.Type: ApplicationFiled: April 19, 2019Publication date: January 6, 2022Inventors: Sarvar Patel, Marcel M. Moti Yung, Karn Seth, Benjamin Kreuter
-
Publication number: 20210359836Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.Type: ApplicationFiled: July 7, 2020Publication date: November 18, 2021Applicant: GOOGLE LLCInventors: Craig Wright, Benjamin Kreuter, James Robert Koehler, Arthur Asuncion, Evgeny Skvortsov, Laura BOOK, Sheng MA, Jiayu Peng, Xichen Huang
-
Publication number: 20200389298Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.Type: ApplicationFiled: August 25, 2020Publication date: December 10, 2020Applicant: Google LLCInventors: Shobhit Saxena, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Patent number: 10764041Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.Type: GrantFiled: December 14, 2017Date of Patent: September 1, 2020Assignee: Google LLCInventors: Shobhit Saxena, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Patent number: 10558817Abstract: A method for linking user identifiers. The method includes receiving, by a linking server and from a company server, a first data structure comprising entries. Each entry comprising a user tag, a first hashed user information, and a second hashed user information. The method includes receiving, by a linking server and from a partner server, a second data structure comprising entries. Each entry comprising a bridge tag, a first hashed bridge information, and a second hashed bridge information. The method includes retrieving, by the linking server and from the first data structure, a first entry of the entries and retrieving, by the linking server and from the second data structure, a first entry of the entries. The method includes linking the user tag of the first entry of the first data structure to the bridge tag of the first entry of the second data structure to generate a first linkage.Type: GrantFiled: January 30, 2017Date of Patent: February 11, 2020Assignee: Foley & Lardner LLPInventors: Vinay Goel, Philip Mcdonnell, Sachin Kulkarni, Anshul Gupta, Shobhit Saxena, Patrick McDonald, Thai Duong, Mihaela Ion, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Publication number: 20180254893Abstract: Systems and methods may be used for establishing a link between user identifiers of different systems without disclosing specific user identifying information. One method includes generating a matching relationship based on double encrypted one or more first data sets of a first party system and double encrypted one or more second data sets of a second party system. The matching relationship indicates one or more links between match keys associated with the first party system and the match keys associated with the third party system. The method includes assigning bridge identifiers for user identifiers associated with the first party system and the user identifiers associated with the third party system based on the matching relationship.Type: ApplicationFiled: December 14, 2017Publication date: September 6, 2018Applicant: Google LLCInventors: Shobhit Saxena, Benjamin Kreuter, Sarvar Patel, Karn Seth
-
Publication number: 20180218168Abstract: A method for linking user identifiers. The method includes receiving, by a linking server and from a company server, a first data structure comprising entries. Each entry comprising a user tag, a first hashed user information, and a second hashed user information. The method includes receiving, by a linking server and from a partner server, a second data structure comprising entries. Each entry comprising a bridge tag, a first hashed bridge information, and a second hashed bridge information. The method includes retrieving, by the linking server and from the first data structure, a first entry of the entries and retrieving, by the linking server and from the second data structure, a first entry of the entries. The method includes linking the user tag of the first entry of the first data structure to the bridge tag of the first entry of the second data structure to generate a first linkage.Type: ApplicationFiled: January 30, 2017Publication date: August 2, 2018Inventors: Vinay Goel, Philip Mcdonnell, Sachin Kulkarni, Anshul Gupta, Shobhit Saxena, Patrick McDonald, Thai Duong, Mihaela Ion, Benjamin Kreuter, Sarvar Patel, Karn Seth