Patents by Inventor David R. Zaret

David R. Zaret has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11829503
    Abstract: A term-based encrypted retrieval privacy (TERP) data retrieval system performs data retrieval from a data repository server. The system includes a client processor included with a data requesting client and a server processor included with the data repository server. The client processor determines a vector forest that is shared with the data repository server, which includes forest vectors assigned with a respective vector ID, and generates a query including an encrypted ciphertext table that cross-references the vector IDs with a corresponding ciphertext entry. The server processor receives the query, and selects a given document from the data repository server that has assigned thereto at least one nearest neighbor vector among the forest vectors. The server processor compares a nearest neighbor vector ID of the nearest neighbor vector to the vector IDs included in the encrypted ciphertext table, and generates an encoded search result based on the encrypted ciphertext entries.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: November 28, 2023
    Assignee: The Johns Hopkins University
    Inventors: Russell A. Fink, David R. Zaret, Paul McNamee
  • Patent number: 11734444
    Abstract: A term-based encrypted retrieval privacy (TERP) data retrieval system performs data retrieval from a data repository server. The system includes a client processor included with a data requesting client and a server processor included with the data repository server. The client processor determines a vector forest that is shared with the data repository server, which includes forest vectors assigned with a respective vector ID, and generates a query including an encrypted ciphertext table that cross-references the vector IDs with a corresponding ciphertext entry. The server processor receives the query, and selects a given document from the data repository server that has assigned thereto at least one nearest neighbor vector among the forest vectors. The server processor compares a nearest neighbor vector ID of the nearest neighbor vector to the vector IDs included in the encrypted ciphertext table, and generates an encoded search result based on the encrypted ciphertext entries.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: August 22, 2023
    Assignee: The Johns Hopkins University
    Inventors: Russell A. Fink, David R. Zaret, Paul McNamee
  • Patent number: 11700110
    Abstract: Disclosed herein are system, method, and computer program product embodiments for performing a set of operations on one or more encrypted numbers to be an approximation of performing an algebraic operation on the one or more encrypted number. A server can receive from a client, a public key of a fully homomorphic encryption scheme and one or more encrypted numbers, and perform a set of operations comprising a square root function, a rectified linear activation function (ReLU), or a multiplicative inverse function on the one or more encrypted numbers to generate an encrypted operational result. The encrypted operational result generated by the set of operations can be an approximation of performing an algebraic operation on the one or more encrypted number. The server can further transmit to the client the encrypted operational result.
    Type: Grant
    Filed: August 20, 2021
    Date of Patent: July 11, 2023
    Assignee: The Johns Hopkins University
    Inventors: Gary L. Jackson, II, Charles C. Schneider, David R. Zaret, Prathibha S. Rama, Vivian Maloney, Kiel R. Gordon, Deanna T. Hlavacek
  • Publication number: 20220100884
    Abstract: A term-based encrypted retrieval privacy (TERP) data retrieval system performs data retrieval from a data repository server. The system includes a client processor included with a data requesting client and a server processor included with the data repository server. The client processor determines a vector forest that is shared with the data repository server, which includes forest vectors assigned with a respective vector ID, and generates a query including an encrypted ciphertext table that cross-references the vector IDs with a corresponding ciphertext entry. The server processor receives the query, and selects a given document from the data repository server that has assigned thereto at least one nearest neighbor vector among the forest vectors. The server processor compares a nearest neighbor vector ID of the nearest neighbor vector to the vector IDs included in the encrypted ciphertext table, and generates an encoded search result based on the encrypted ciphertext entries.
    Type: Application
    Filed: September 29, 2020
    Publication date: March 31, 2022
    Inventors: Russell A. Fink, David R. Zaret, Paul McNamee
  • Publication number: 20220085972
    Abstract: Disclosed herein are system, method, and computer program product embodiments for performing a set of operations on one or more encrypted numbers to be an approximation of performing an algebraic operation on the one or more encrypted number. A server can receive from a client, a public key of a fully homomorphic encryption scheme and one or more encrypted numbers, and perform a set of operations comprising a square root function, a rectified linear activation function (ReLU), or a multiplicative inverse function on the one or more encrypted numbers to generate an encrypted operational result. The encrypted operational result generated by the set of operations can be an approximation of performing an algebraic operation on the one or more encrypted number. The server can further transmit to the client the encrypted operational result.
    Type: Application
    Filed: August 20, 2021
    Publication date: March 17, 2022
    Inventors: Gary L. Jackson, II, Charles C. Schneider, David R. Zaret, Prathibha S. Rama, Robert S. Barr, Kiel R. Gordon, Deanna T. Hlavacek
  • Patent number: 11093635
    Abstract: Apparatuses and methods for private information retrieval are provided. One example method may include receiving a query state machine that is an encoding of a search pattern. The query state machine may include a plurality of states and a transition function that defines a plurality of transitions based on the search pattern. The example method may also include performing a private query against a target query string of a target query record by applying the query state machine to the target query string to develop a private encoding. The method may further include transmitting query results based on the private encoding.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: August 17, 2021
    Assignee: The Johns Hopkins University
    Inventors: Russell A. Fink, David R. Zaret, Rachel B. Stonehirsch, Robert M. Seng, Samantha M. Tyson
  • Publication number: 20170323118
    Abstract: Apparatuses and methods for private information retrieval are provided. One example method may include receiving a query state machine that is an encoding of a search pattern. The query state machine may include a plurality of states and a transition function that defines a plurality of transitions based on the search pattern. The example method may also include performing a private query against a target query string of a target query record by applying the query state machine to the target query string to develop a private encoding. The method may further include transmitting query results based on the private encoding.
    Type: Application
    Filed: May 4, 2017
    Publication date: November 9, 2017
    Inventors: Russell A. Fink, David R. Zaret, Rachel B. Stonehirsch, Robert M. Seng, Samantha M. Tyson
  • Patent number: 9507945
    Abstract: A method executable via operation of configured processing circuitry to identify vulnerabilities in program code may include receiving a program and employing a disassembler to disassemble the program, generating a function call tree for the program based on disassembly of the program, receiving an indication of a post condition for which analysis of the program is desired, transforming program statements into logical equations, simplifying the logical equations, propagating post conditions backwards via Dijkstra's weakest precondition variant, analyzing aliases and processing loops to generate a precondition, and using an automated solver to determine whether the precondition is realizable and, if so, providing program inputs required to realize the precondition.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: November 29, 2016
    Assignee: The Johns Hopkins University
    Inventors: Yanni A. Kouskoulas, Douglas C. Schmidt, C. Durward McDonell, III, Laura J. Glendenning, Ryan W. Gardner, David J. Heine, Margaret F. Lospinuso, Forest C. Deal, Jr., David R. Zaret, Vina H. Nguyen