Patents by Inventor Margarita VALD
Margarita VALD has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11928462Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.Type: GrantFiled: January 31, 2022Date of Patent: March 12, 2024Assignee: Intuit Inc.Inventors: Elad Shmidov, Margarita Vald, Yerucham Meir Berkowitz, Boaz Sapir, Liron London, Dan Sharon, Vadim Belov
-
Patent number: 11870886Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.Type: GrantFiled: April 17, 2023Date of Patent: January 9, 2024Assignee: INTUIT INC.Inventors: Margarita Vald, Olla Nasirov, Gleb Keselman, Yaron Sheffer, Sergey Banshats
-
Patent number: 11818260Abstract: Systems and methods that may be used to provide policies and protocols for blocking decryption capabilities in symmetric key encryption using a unique protocol in which key derivation may include injecting a random string into each key derivation. For example, a policy may be assigned to each client device indicating whether the client device has been assigned encryption only permission or full access permission to both encrypt and decrypt data. The disclosed protocol prevents client devices with encryption only permission from obtaining keys for decryption.Type: GrantFiled: December 15, 2022Date of Patent: November 14, 2023Assignee: INTUIT INC.Inventors: Margarita Vald, Julia Zarubinsky, Yaron Sheffer, Sergey Banshats
-
Patent number: 11743030Abstract: Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.Type: GrantFiled: April 25, 2022Date of Patent: August 29, 2023Inventors: Margarita Vald, Laetitia Kahn, Boaz Sapir, Yaron Sheffer, Yehezkel Shraga Resheff
-
Publication number: 20230261855Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.Type: ApplicationFiled: April 17, 2023Publication date: August 17, 2023Applicant: INTUIT INC.Inventors: Margarita VALD, Oila Nasirov, Gleb Keselman, Yaron Sheffer, Sergey Banshats, Sergey Banshats
-
Publication number: 20230244474Abstract: A method includes receiving event strings from source code repositories, creating, for the source code repositories, digests of keywords, receiving log strings, and aggregating the log strings into a log group. The method further includes comparing the digests to the log group to generate scores, whereby the scores correlate the digests to the log group. The method further includes selecting a source code repository from the source code repositories according to the scores, and associating the log group to a service corresponding to the source code repository, where the source code repository corresponds to the digest with a highest score.Type: ApplicationFiled: January 31, 2022Publication date: August 3, 2023Applicant: Intuit Inc.Inventors: Elad Shmidov, Margarita Vald, Yerucham Meir Berkowitz, Boaz Sapir, Liron London, Dan Sharon, Vadim Belov
-
Publication number: 20230214522Abstract: Described herein are example implementations for the automatic detection and handling of personal identifiable information (PII) in electronic records. In some aspects, a system receives one or more computer readable logs of information for one or more computer services, with each log including a string of characters. The system performs one or more string search algorithm based operations on the entirety of the one or more strings of the one or more computer readable logs to identify a range of the one or more strings to be searched for PII that is less than the entirety of the one or more strings. The system also performs one or more regular expression algorithm based operations on the range of the one or more strings to identify one or more instances of PII. The system generates and outputs an indication of the one or more instances of the PII that are identified.Type: ApplicationFiled: January 5, 2022Publication date: July 6, 2023Applicant: Intuit Inc.Inventors: Daphna LITVIN, Elad Shmidov, Margarita Vald
-
Patent number: 11646871Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.Type: GrantFiled: August 12, 2020Date of Patent: May 9, 2023Assignee: INTUIT INC.Inventors: Margarita Vald, Olla Nasirov, Gleb Keselman, Yaron Sheffer, Sergey Banshats
-
Publication number: 20230093406Abstract: A processor may receive a request to perform an operation. The processor may generate a seed derived from data required to perform the operation. The processor may generate a perturbation based on inputting the seed into a pseudorandom number generator. The processor may generate the actual result based on performing the operation. The processor may generate a perturbed result, wherein generating the perturbed result may comprise performing a second operation based on the actual result and the perturbation. The processor may return the perturbed result in response to the request.Type: ApplicationFiled: September 23, 2021Publication date: March 23, 2023Applicant: INTUIT INC.Inventors: Margarita VALD, Yaron SHEFFER
-
Patent number: 11550961Abstract: Systems and methods for securely verifying integrity of application responses are disclosed. One example method includes receiving, from a client, an application encrypted in accordance with a fully homomorphic encryption (FHE) algorithm, generating, with a trained machine learning model associated with the FHE algorithm, a plurality of first application labels, each first application label indicating a true or false response associated with the application, inverting a randomly selected portion of the plurality of first application labels, generating a first randomly sorted list including the plurality of first application labels, transmitting the first randomly sorted list to the client, receiving a first decrypted list from the client, performing a validation of at least the first decrypted list, the validation based at least in part on the plurality of first application labels, and in response to the validation being successful, providing the client with a response to the application.Type: GrantFiled: April 27, 2022Date of Patent: January 10, 2023Assignee: Intuit Inc.Inventors: Yair Horesh, Margarita Vald, Yaron Sheffer
-
Publication number: 20220255723Abstract: Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.Type: ApplicationFiled: April 25, 2022Publication date: August 11, 2022Applicant: INTUIT INC.Inventors: Margarita VALD, Laetitia Kahn, Boaz Sapir, Yaron Sheffer, Yehezkel Shraga Resheff
-
Patent number: 11381381Abstract: Certain aspects of the present disclosure provide techniques for performing computations on encrypted data. One example method generally includes obtaining, at a computing device, encrypted data, wherein the encrypted data is encrypted using fully homomorphic encryption and performing at least one computation on the encrypted data while the encrypted data remains encrypted. The method further includes identifying a clear data operation to perform on the encrypted data and transmitting, from the computing device to a server, a request to perform the clear data operation on the encrypted data, wherein the request includes the encrypted data. The method further includes receiving, at the computing device in response to the request, encrypted output from the server, wherein the encrypted output is of the same size and the same format for all encrypted data transmitted to the server.Type: GrantFiled: May 31, 2019Date of Patent: July 5, 2022Assignee: INTUIT INC.Inventors: Margarita Vald, Yaron Sheffer, Yehezkel S. Resheff, Shimon Shahar
-
Patent number: 11343069Abstract: Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.Type: GrantFiled: February 6, 2020Date of Patent: May 24, 2022Assignee: Intuit Inc.Inventors: Margarita Vald, Laetitia Kahn, Boaz Sapir, Yaron Sheffer, Yehezkel Shraga Resheff
-
Patent number: 11275585Abstract: Systems and methods that approximate and use branching operations on data encrypted by fully homomorphic encryption (FHE). The systems and methods may use polynomial approximation to convert “if” statements into “soft if” statements that may be applied to the FHE encrypted data in a manner that preserves the security of the systems and methods.Type: GrantFiled: September 12, 2019Date of Patent: March 15, 2022Assignee: Intuit Inc.Inventors: Margarita Vald, Yaron Sheffer, Yehezkel Shraga Resheff, Tzvika Barenholz
-
Publication number: 20220052840Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.Type: ApplicationFiled: August 12, 2020Publication date: February 17, 2022Applicant: INTUIT INC.Inventors: Margarita VALD, Olla NASIROV, Gleb KESELMAN, Yaron SHEFFER, Sergey BANSHATS
-
Publication number: 20210250163Abstract: Systems and methods that may implement an Oracle-aided protocol for producing and using FHE encrypted data. The systems and methods may initially encrypt and store input data in one encrypted form that is not performed using FHE, which does not substantially increase the size of the data and storage resources required to store the encrypted data. In accordance with the Oracle-aided protocol, the encrypted data is re-encrypted as FHE encrypted data when FHE encrypted data is required.Type: ApplicationFiled: February 6, 2020Publication date: August 12, 2021Applicant: Intuit Inc.Inventors: Margarita VALD, Laetitia KAHN, Boaz SAPIR, Yaron SHEFFER, Yehezkel Shraga RESHEFF
-
Publication number: 20210081203Abstract: Systems and methods that approximate and use branching operations on data encrypted by fully homomorphic encryption (FHE). The systems and methods may use polynomial approximation to convert “if” statements into “soft if” statements that may be applied to the FHE encrypted data in a manner that preserves the security of the systems and methods.Type: ApplicationFiled: September 12, 2019Publication date: March 18, 2021Applicant: Intuit Inc.Inventors: Margarita VALD, Yaron SHEFFER, Yehezkel Shraga RESHEFF, Tzvika BARENHOLZ
-
Publication number: 20200382273Abstract: Certain aspects of the present disclosure provide techniques for performing computations on encrypted data. One example method generally includes obtaining, at a computing device, encrypted data, wherein the encrypted data is encrypted using fully homomorphic encryption and performing at least one computation on the encrypted data while the encrypted data remains encrypted. The method further includes identifying a clear data operation to perform on the encrypted data and transmitting, from the computing device to a server, a request to perform the clear data operation on the encrypted data, wherein the request includes the encrypted data. The method further includes receiving, at the computing device in response to the request, encrypted output from the server, wherein the encrypted output is of the same size and the same format for all encrypted data transmitted to the server.Type: ApplicationFiled: May 31, 2019Publication date: December 3, 2020Inventors: Margarita VALD, Yaron SHEFFER, Yehezkel S. RESHEFF, Shimon SHAHAR