Patents by Inventor Hart MONTGOMERY

Hart MONTGOMERY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210021408
    Abstract: A method may include receiving, from a first trusted authority, a secret key specific to a party for use in posting to a blockchain. The method may also include receiving, from a second trusted authority, a correlated randomness component specific to the party and associated with a given temporal segment. The method may additionally include generating a party-generated randomized mask, and computing, using an input from the party, the correlated randomness component, and the party-generated randomized mask in a non-interactive multi-party computation (NIMPC), an NIMPC-encrypted input associated with the party for the given temporal segment. The method may also include encrypting the NIMPC-encrypted input according to a blockchain encryption algorithm to yield a ciphertext, and submitting the ciphertext to a block associated with the given temporal segment in a blockchain.
    Type: Application
    Filed: July 19, 2019
    Publication date: January 21, 2021
    Applicant: FUJITSU LIMITED
    Inventors: Arnab ROY, Hart MONTGOMERY
  • Patent number: 10896345
    Abstract: A method may include extracting feature-data from an image which includes location data that indicates multiple locations within the image and multiple feature vectors that each correspond to one of the multiple locations. Each feature vector may represent a feature of an object in the image. The method may include determining a feature-data plot based on relative positions of the multiple locations and selecting a grid for the feature-data plot. The method may include generating a first representative feature vector for a first cell of the grid based on a first feature vector set and generating a second representative feature vector for a second cell of the grid based on a second feature vector set. The method may include generating a single feature vector that represents the object in the image based on the first representative feature vector and the second representative feature vector and encrypting the single feature vector.
    Type: Grant
    Filed: June 2, 2017
    Date of Patent: January 19, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, Nilanjan Datta
  • Patent number: 10797856
    Abstract: A method of outsourcing an operation with encryption is provided. A method may include encrypting data at trusted execution environment (TEE) to generate a first ciphertext. The method may also include conveying the first ciphertext to a graphics processing unit (GPU). Further, the method may include performing, at the GPU, at least one somewhat homomorphic encryption (SHE) evaluation operation on the first ciphertext to generate a second ciphertext. Moreover, the method may include conveying the second ciphertext to the TEE. In addition, the method may include decrypting, at the TEE, the second ciphertext to generate a function.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: October 6, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Patent number: 10795658
    Abstract: A method may include generating, via a setup function, public parameters associated with a random updatable function. The method may further include generating, via an initialization function and based at least in part on the public parameters generated by the setup function, a first random element and a first state. The method may further include generating, via an update function and based at least in part on the public parameters generated by the setup function, a third random element and a second state. Inputs of the update function may include the first state generated by the initialization function and a second random element.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: October 6, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Patent number: 10728022
    Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: July 28, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Publication number: 20200233643
    Abstract: A method may include obtaining a set of multivariate quadratic polynomials associated with a multivariate quadratic problem and generating an Ising Model connection weight matrix “W and an Ising Model bias vector “b” based on the multivariate quadratic polynomials. The method may also include providing the matrix “W” and the vector “b” to an annealing system configured to solve problems written according to the Ising Model and obtaining an output from the annealing system that represents a set of integers. The method may also include using the set of integers as a solution to the multivariate quadratic problem.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Hart MONTGOMERY, Arnab ROY, Ryuichi OHORI, Toshiya SHIMIZU, Takeshi SHIMOYAMA, Jumpei YAMAGUCHI
  • Patent number: 10700862
    Abstract: A method may include obtaining public keys for each user of a set of users, where each user is associated with a unique public key and a unique private key. The method may also include obtaining a designated set of users, where the designated set of users is a subset of the set of users. The method may additionally include generating, using the public keys, a digest associated with the designated set of users. The digest includes reduced data sets in a secure form, where each user of the set of users is associated with one of the reduced data sets that is indicative of whether the user is in the designated set of users, and the reduced data set is accessible using the private key of the user. The method may also include posting the digest to a location accessible from an electronic device of the user.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: June 30, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Publication number: 20200201991
    Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 25, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Patent number: 10691829
    Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: June 23, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Publication number: 20200133995
    Abstract: According to an aspect of an embodiment, operations may include obtaining a basis “A” that defines a lattice in an m-dimensional space. The operations may further include obtaining a target vector “y” that defines a particular location in the m-dimensional space. In addition, the operations may include generating an Ising model connection weight matrix “W” by multiplying a transposition of “A” (“AT”) by “A”. Moreover, the operations may include generating an Ising model bias vector “b” by multiplying a transposition of “y” (“yT”) by “A”. The operations may further include providing “W” and “b” to an annealing system configured to solve problems written according to the Ising model. Additionally, the operations may include obtaining an output from the annealing system that represents an output vector “x” of a particular point included in the lattice that is the closest point in the lattice to the particular location defined by “y”.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY
  • Publication number: 20200133996
    Abstract: According to an aspect of an embodiment, a method may include obtaining a plurality of random integers, a divisor, and a remainder associated with a random modular subset sum problem and generating an Ising Model connection weight matrix “W”, at least some elements of the matrix “W” may be determined based on the plurality of random integers. The method may also include generating an Ising Model bias vector “b”, elements of the vector “b” be may be determined based on the remainder. The method may also include providing the matrix “W” and the vector “b” to an annealing system configured to solve problems written according to the Ising Model and obtaining an output from the annealing system that represents a set of integers of the plurality of random integers. The method may also include using the set of integers as a solution to the random modular subset sum problem.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicant: Fujitsu Limited
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Patent number: 10608823
    Abstract: A method of biometric authentication includes receiving a biometric input from a user for authentication of the user to access a system. The method includes receiving a set of elements of a field and a random number from an authentication server via a network. The method further includes decoding the biometric input based on the set of elements to generate a polynomial. The method also includes generating a signature key based on the polynomial. The method includes signing the random number with the signature key. The method includes sending the signed random number to the authentication server. The method further includes restricting access to the system until the user is authenticated by the authentication server. The method also includes permitting access to the system in response to receiving an authentication message from the authentication server.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: March 31, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Patent number: 10567354
    Abstract: A system may include a communication device configured to communicate over a network, one or more processors, and one or more non-transitory computer-readable media containing instructions that, when executed by the one or more processors, cause the system to perform one or more operations. The operations may include performing a cryptographic operation on one or more packets to facilitate secure communication between the system and a computing device over the network, the cryptographic operation including probabilistic rounding. The operations may also include communicating, via the communication device, with the computing device over the network using the one or more packets.
    Type: Grant
    Filed: July 15, 2017
    Date of Patent: February 18, 2020
    Assignee: FUJITSU LIMITED
    Inventor: Hart Montgomery
  • Patent number: 10530581
    Abstract: A method may include obtaining a common reference string. The method may further include obtaining a first public key for a first party and a second public key for a second party. The method may also include obtaining a first encrypted message, the first encrypted message encrypted using the first public key. The method may further include obtaining a second encrypted message, the second encrypted message encrypted using the second public key. The method may also include obtaining a proof. The method may further include verifying, using the proof, the common reference string, the first public key, and the second public key, that a decryption of the first encrypted message and a decryption of the second encrypted message are equivalent without decrypting the first encrypted message and without decrypting the second encrypted message.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: January 7, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Publication number: 20190379646
    Abstract: A method of transmitting a message via a blockchain network is provided. A method may include encrypting, via a first identity-based encryption (IBE) function, a message to generate a ciphertext. The method may further include transmitting the ciphertext to each node of a plurality of nodes in a blockchain network. Further, the method may include decrypting, via a second IBE function, the ciphertext at each node of the plurality of nodes in the blockchain network after at least one condition is met.
    Type: Application
    Filed: June 11, 2018
    Publication date: December 12, 2019
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY
  • Publication number: 20190347443
    Abstract: According to some examples, computer-implemented methods to detect a potential privacy violation as a result of a release of a database are described. An example computer-implemented method may include anonymizing a database and calculating a measure of entropy resulting from a release of the anonymized database without releasing the anonymized database. The method may also include determining whether the calculated measure of entropy satisfies a privacy threshold and, responsive to a determination that the calculated measure of entropy satisfies the privacy threshold, releasing the anonymized database. The method may further include, responsive to a determination that the calculated measure of entropy does not satisfy the privacy threshold, not allowing the release of the anonymized database.
    Type: Application
    Filed: May 9, 2018
    Publication date: November 14, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Patent number: 10476661
    Abstract: A method includes generating a secret key for encryption and decoding data. The method includes identifying a set of data in plaintext format. The method further includes converting, by a processing device, the data in plaintext format to ciphertext using a polynomial. The method also includes sending the ciphertext to a remote device for data processing, wherein the remote device is to process the ciphertext without having the secret key. The method includes receiving processed ciphertext from the remote device. The method further includes decoding, by the processing device, the processed ciphertext based on the secret key and the polynomial to yield processed plaintext. The method also includes outputting the processed plaintext.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: November 12, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Publication number: 20190327077
    Abstract: A method of outsourcing an operation with encryption is provided. A method may include encrypting data at trusted execution environment (TEE) to generate a first ciphertext. The method may also include conveying the first ciphertext to a graphics processing unit (GPU). Further, the method may include performing, at the GPU, at least one somewhat homomorphic encryption (SHE) evaluation operation on the first ciphertext to generate a second ciphertext. Moreover, the method may include conveying the second ciphertext to the TEE. In addition, the method may include decrypting, at the TEE, the second ciphertext to generate a function.
    Type: Application
    Filed: April 18, 2018
    Publication date: October 24, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY
  • Publication number: 20190207752
    Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.
    Type: Application
    Filed: December 28, 2017
    Publication date: July 4, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Publication number: 20190081790
    Abstract: A method may include obtaining a common reference string. The method may further include obtaining a first public key for a first party and a second public key for a second party. The method may also include obtaining a first encrypted message, the first encrypted message encrypted using the first public key. The method may further include obtaining a second encrypted message, the second encrypted message encrypted using the second public key. The method may also include obtaining a proof. The method may further include verifying, using the proof, the common reference string, the first public key, and the second public key, that a decryption of the first encrypted message and a decryption of the second encrypted message are equivalent without decrypting the first encrypted message and without decrypting the second encrypted message.
    Type: Application
    Filed: September 8, 2017
    Publication date: March 14, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY