Patents by Inventor Hart MONTGOMERY
Hart MONTGOMERY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210021408Abstract: A method may include receiving, from a first trusted authority, a secret key specific to a party for use in posting to a blockchain. The method may also include receiving, from a second trusted authority, a correlated randomness component specific to the party and associated with a given temporal segment. The method may additionally include generating a party-generated randomized mask, and computing, using an input from the party, the correlated randomness component, and the party-generated randomized mask in a non-interactive multi-party computation (NIMPC), an NIMPC-encrypted input associated with the party for the given temporal segment. The method may also include encrypting the NIMPC-encrypted input according to a blockchain encryption algorithm to yield a ciphertext, and submitting the ciphertext to a block associated with the given temporal segment in a blockchain.Type: ApplicationFiled: July 19, 2019Publication date: January 21, 2021Applicant: FUJITSU LIMITEDInventors: Arnab ROY, Hart MONTGOMERY
-
Patent number: 10896345Abstract: A method may include extracting feature-data from an image which includes location data that indicates multiple locations within the image and multiple feature vectors that each correspond to one of the multiple locations. Each feature vector may represent a feature of an object in the image. The method may include determining a feature-data plot based on relative positions of the multiple locations and selecting a grid for the feature-data plot. The method may include generating a first representative feature vector for a first cell of the grid based on a first feature vector set and generating a second representative feature vector for a second cell of the grid based on a second feature vector set. The method may include generating a single feature vector that represents the object in the image based on the first representative feature vector and the second representative feature vector and encrypting the single feature vector.Type: GrantFiled: June 2, 2017Date of Patent: January 19, 2021Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, Nilanjan Datta
-
Patent number: 10797856Abstract: A method of outsourcing an operation with encryption is provided. A method may include encrypting data at trusted execution environment (TEE) to generate a first ciphertext. The method may also include conveying the first ciphertext to a graphics processing unit (GPU). Further, the method may include performing, at the GPU, at least one somewhat homomorphic encryption (SHE) evaluation operation on the first ciphertext to generate a second ciphertext. Moreover, the method may include conveying the second ciphertext to the TEE. In addition, the method may include decrypting, at the TEE, the second ciphertext to generate a function.Type: GrantFiled: April 18, 2018Date of Patent: October 6, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Patent number: 10795658Abstract: A method may include generating, via a setup function, public parameters associated with a random updatable function. The method may further include generating, via an initialization function and based at least in part on the public parameters generated by the setup function, a first random element and a first state. The method may further include generating, via an update function and based at least in part on the public parameters generated by the setup function, a third random element and a second state. Inputs of the update function may include the first state generated by the initialization function and a second random element.Type: GrantFiled: March 20, 2017Date of Patent: October 6, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Patent number: 10728022Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.Type: GrantFiled: December 28, 2017Date of Patent: July 28, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
-
Publication number: 20200233643Abstract: A method may include obtaining a set of multivariate quadratic polynomials associated with a multivariate quadratic problem and generating an Ising Model connection weight matrix “W and an Ising Model bias vector “b” based on the multivariate quadratic polynomials. The method may also include providing the matrix “W” and the vector “b” to an annealing system configured to solve problems written according to the Ising Model and obtaining an output from the annealing system that represents a set of integers. The method may also include using the set of integers as a solution to the multivariate quadratic problem.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Applicant: FUJITSU LIMITEDInventors: Hart MONTGOMERY, Arnab ROY, Ryuichi OHORI, Toshiya SHIMIZU, Takeshi SHIMOYAMA, Jumpei YAMAGUCHI
-
Patent number: 10700862Abstract: A method may include obtaining public keys for each user of a set of users, where each user is associated with a unique public key and a unique private key. The method may also include obtaining a designated set of users, where the designated set of users is a subset of the set of users. The method may additionally include generating, using the public keys, a digest associated with the designated set of users. The digest includes reduced data sets in a secure form, where each user of the set of users is associated with one of the reduced data sets that is indicative of whether the user is in the designated set of users, and the reduced data set is accessible using the private key of the user. The method may also include posting the digest to a location accessible from an electronic device of the user.Type: GrantFiled: September 8, 2017Date of Patent: June 30, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Publication number: 20200201991Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.Type: ApplicationFiled: December 21, 2018Publication date: June 25, 2020Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Patent number: 10691829Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.Type: GrantFiled: April 13, 2017Date of Patent: June 23, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
-
Publication number: 20200133995Abstract: According to an aspect of an embodiment, operations may include obtaining a basis “A” that defines a lattice in an m-dimensional space. The operations may further include obtaining a target vector “y” that defines a particular location in the m-dimensional space. In addition, the operations may include generating an Ising model connection weight matrix “W” by multiplying a transposition of “A” (“AT”) by “A”. Moreover, the operations may include generating an Ising model bias vector “b” by multiplying a transposition of “y” (“yT”) by “A”. The operations may further include providing “W” and “b” to an annealing system configured to solve problems written according to the Ising model. Additionally, the operations may include obtaining an output from the annealing system that represents an output vector “x” of a particular point included in the lattice that is the closest point in the lattice to the particular location defined by “y”.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY
-
Publication number: 20200133996Abstract: According to an aspect of an embodiment, a method may include obtaining a plurality of random integers, a divisor, and a remainder associated with a random modular subset sum problem and generating an Ising Model connection weight matrix “W”, at least some elements of the matrix “W” may be determined based on the plurality of random integers. The method may also include generating an Ising Model bias vector “b”, elements of the vector “b” be may be determined based on the remainder. The method may also include providing the matrix “W” and the vector “b” to an annealing system configured to solve problems written according to the Ising Model and obtaining an output from the annealing system that represents a set of integers of the plurality of random integers. The method may also include using the set of integers as a solution to the random modular subset sum problem.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Applicant: Fujitsu LimitedInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Patent number: 10608823Abstract: A method of biometric authentication includes receiving a biometric input from a user for authentication of the user to access a system. The method includes receiving a set of elements of a field and a random number from an authentication server via a network. The method further includes decoding the biometric input based on the set of elements to generate a polynomial. The method also includes generating a signature key based on the polynomial. The method includes signing the random number with the signature key. The method includes sending the signed random number to the authentication server. The method further includes restricting access to the system until the user is authenticated by the authentication server. The method also includes permitting access to the system in response to receiving an authentication message from the authentication server.Type: GrantFiled: June 24, 2016Date of Patent: March 31, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Patent number: 10567354Abstract: A system may include a communication device configured to communicate over a network, one or more processors, and one or more non-transitory computer-readable media containing instructions that, when executed by the one or more processors, cause the system to perform one or more operations. The operations may include performing a cryptographic operation on one or more packets to facilitate secure communication between the system and a computing device over the network, the cryptographic operation including probabilistic rounding. The operations may also include communicating, via the communication device, with the computing device over the network using the one or more packets.Type: GrantFiled: July 15, 2017Date of Patent: February 18, 2020Assignee: FUJITSU LIMITEDInventor: Hart Montgomery
-
Patent number: 10530581Abstract: A method may include obtaining a common reference string. The method may further include obtaining a first public key for a first party and a second public key for a second party. The method may also include obtaining a first encrypted message, the first encrypted message encrypted using the first public key. The method may further include obtaining a second encrypted message, the second encrypted message encrypted using the second public key. The method may also include obtaining a proof. The method may further include verifying, using the proof, the common reference string, the first public key, and the second public key, that a decryption of the first encrypted message and a decryption of the second encrypted message are equivalent without decrypting the first encrypted message and without decrypting the second encrypted message.Type: GrantFiled: September 8, 2017Date of Patent: January 7, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Publication number: 20190379646Abstract: A method of transmitting a message via a blockchain network is provided. A method may include encrypting, via a first identity-based encryption (IBE) function, a message to generate a ciphertext. The method may further include transmitting the ciphertext to each node of a plurality of nodes in a blockchain network. Further, the method may include decrypting, via a second IBE function, the ciphertext at each node of the plurality of nodes in the blockchain network after at least one condition is met.Type: ApplicationFiled: June 11, 2018Publication date: December 12, 2019Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY
-
Publication number: 20190347443Abstract: According to some examples, computer-implemented methods to detect a potential privacy violation as a result of a release of a database are described. An example computer-implemented method may include anonymizing a database and calculating a measure of entropy resulting from a release of the anonymized database without releasing the anonymized database. The method may also include determining whether the calculated measure of entropy satisfies a privacy threshold and, responsive to a determination that the calculated measure of entropy satisfies the privacy threshold, releasing the anonymized database. The method may further include, responsive to a determination that the calculated measure of entropy does not satisfy the privacy threshold, not allowing the release of the anonymized database.Type: ApplicationFiled: May 9, 2018Publication date: November 14, 2019Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Patent number: 10476661Abstract: A method includes generating a secret key for encryption and decoding data. The method includes identifying a set of data in plaintext format. The method further includes converting, by a processing device, the data in plaintext format to ciphertext using a polynomial. The method also includes sending the ciphertext to a remote device for data processing, wherein the remote device is to process the ciphertext without having the secret key. The method includes receiving processed ciphertext from the remote device. The method further includes decoding, by the processing device, the processed ciphertext based on the secret key and the polynomial to yield processed plaintext. The method also includes outputting the processed plaintext.Type: GrantFiled: June 27, 2016Date of Patent: November 12, 2019Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Publication number: 20190327077Abstract: A method of outsourcing an operation with encryption is provided. A method may include encrypting data at trusted execution environment (TEE) to generate a first ciphertext. The method may also include conveying the first ciphertext to a graphics processing unit (GPU). Further, the method may include performing, at the GPU, at least one somewhat homomorphic encryption (SHE) evaluation operation on the first ciphertext to generate a second ciphertext. Moreover, the method may include conveying the second ciphertext to the TEE. In addition, the method may include decrypting, at the TEE, the second ciphertext to generate a function.Type: ApplicationFiled: April 18, 2018Publication date: October 24, 2019Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY
-
Publication number: 20190207752Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.Type: ApplicationFiled: December 28, 2017Publication date: July 4, 2019Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Publication number: 20190081790Abstract: A method may include obtaining a common reference string. The method may further include obtaining a first public key for a first party and a second public key for a second party. The method may also include obtaining a first encrypted message, the first encrypted message encrypted using the first public key. The method may further include obtaining a second encrypted message, the second encrypted message encrypted using the second public key. The method may also include obtaining a proof. The method may further include verifying, using the proof, the common reference string, the first public key, and the second public key, that a decryption of the first encrypted message and a decryption of the second encrypted message are equivalent without decrypting the first encrypted message and without decrypting the second encrypted message.Type: ApplicationFiled: September 8, 2017Publication date: March 14, 2019Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY