Patents by Inventor Shai Halevi
Shai Halevi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12143465Abstract: ML model(s) are created and trained using training data from user(s) to create corresponding trained ML model(s). The training data is in FHE domains, each FHE domain corresponding to an individual one of the user(s). The trained machine learning model(s) are run to perform inferencing using other data from at least one of the user(s). The running of the ML model(s) determines results. The other data is in a corresponding FHE domain of the at least one user. Using at least the results, it is determined which of the following issues is true: the results comprise objectionable material, or at least one of the trained ML model(s) performs prohibited release of information. One or more actions are taken to take to address the issue determined to be true. Methods, apparatus, and computer program product are disclosed.Type: GrantFiled: May 17, 2019Date of Patent: November 12, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Karthik Nandakumar, Nalini K. Ratha, Shai Halevi, Sharathchandra Pankanti
-
Patent number: 11816142Abstract: A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity.Type: GrantFiled: February 6, 2023Date of Patent: November 14, 2023Assignee: International Business Machines CorporationInventors: Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha, Shai Halevi
-
Publication number: 20230185842Abstract: A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity.Type: ApplicationFiled: February 6, 2023Publication date: June 15, 2023Inventors: Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha, Shai Halevi
-
Patent number: 11663263Abstract: A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity.Type: GrantFiled: May 10, 2022Date of Patent: May 30, 2023Assignee: International Business Machines CorporationInventors: Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha, Shai Halevi
-
Patent number: 11502821Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: GrantFiled: December 23, 2020Date of Patent: November 15, 2022Assignee: International Business Machines CorporationInventors: Craig B. Gentry, Shai Halevi
-
Publication number: 20220269717Abstract: A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity.Type: ApplicationFiled: May 10, 2022Publication date: August 25, 2022Inventors: Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha, Shai Halevi
-
Patent number: 11394526Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: GrantFiled: December 23, 2020Date of Patent: July 19, 2022Assignee: International Business Machines CorporationInventors: Craig B. Gentry, Shai Halevi
-
Patent number: 11354539Abstract: An AI model is trained by determining insights for a sequence of computations used in the AI model. The sequence is applied to encrypted data and label pair(s), wherein computational details of each of the computations are defined. Information may also be committed for selected ones of the sequence of computations into a distributed database. The committed information may include computational details used in processing performed for the selected computations, and the distributed database may have a property that the committed information for each selected computation is linked with a verifiable signature of integrity with a previously committed computation in the sequence. Indication is received from an end-user computer system of selected computation(s). Computational details of the indicated selected computation(s) are sent toward the end-user computer system for use by the end-user computer system for verifying the indicated selected computation(s).Type: GrantFiled: September 27, 2018Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Shai Halevi, Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha
-
Patent number: 11343068Abstract: Respective sets of homomorphically encrypted training data are received from multiple users, each encrypted by a key of a respective user. The respective sets are provided to a combined machine learning model to determine corresponding locally learned outputs, each in an FHE domain of one of the users. Conversion is coordinated of the locally learned outputs in the FHE domains into an MFHE domain, where each converted locally learned output is encrypted by all of the users. The converted locally learned outputs are aggregated into a converted composite output in the MFHE domain. A conversion is coordinated of the converted composite output in the MFHE domain into the FHE domains of the corresponding users, where each converted decrypted composite output is encrypted by only a respective one of the users. The combined machine learning model is updated based on the converted composite outputs. The model may be used for inferencing.Type: GrantFiled: February 6, 2019Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Karthik Nandakumar, Nalini Ratha, Shai Halevi, Sharathchandra Pankanti
-
Patent number: 11321382Abstract: A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity.Type: GrantFiled: February 11, 2020Date of Patent: May 3, 2022Assignee: International Business Machines CorporationInventors: Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha, Shai Halevi
-
Patent number: 11188681Abstract: An approach is provided in which an information handling system loads a set of encrypted binary code into a processor that has been encrypted based upon a unique key of the processor. The processor includes an instruction decoder that transforms the set of encrypted binary code into a set of instruction control signals using the unique key. In turn, the processor executes a set of instructions based on the set of instruction control signals.Type: GrantFiled: April 8, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: Guy M. Cohen, Shai Halevi, Lior Horesh
-
Publication number: 20210248176Abstract: A framework is provided in which a querying agency can request (via a query entity) encrypted data through a service provider from a data owning agency that stores encrypted data. The framework uses homomorphic encryption. The data may be gallery entities, and each of the elements in the framework operate on doubly-encrypted information. The service provider compares a representation of an encrypted query entity from the querying agency and representations of encrypted gallery entities from the data owning agency, resulting in doubly-encrypted values of a metric between corresponding compared representations. The querying agency gets result(s), based on the metric, which indicate whether it is probable the service provider has data similar to or the same as query data in the query entity. The elements have to perform communication in order for the querying agency or the data owning agency to get cleartext information corresponding to the query entity.Type: ApplicationFiled: February 11, 2020Publication date: August 12, 2021Inventors: Sharathchandra Pankanti, Karthik Nandakumar, Nalini K. Ratha, Shai Halevi
-
Patent number: 11087223Abstract: A computer system receives a set of data encrypted by a homomorphic encryption transformation. The computer system performs machine learning operations using the encrypted set of data. The machine learning operations build, using homomorphic operations, a trained model of the data having a mapping between the encrypted data and output of the trained model. The model is stored for use for performing inferencing of other encrypted data to determine a corresponding output of the trained model. The computer system may perform inferencing of the other encrypted data at least by accessing the stored trained model and predicting by using the trained model a label in an encrypted format that corresponds to the other encrypted data. The computer system may send the label toward the client for the client to decrypt the label.Type: GrantFiled: July 11, 2018Date of Patent: August 10, 2021Assignee: International Business Machines CorporationInventors: Karthik Nandakumar, Nalini K. Ratha, Shai Halevi, Sharathchandra Pankanti
-
Patent number: 10985904Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: GrantFiled: June 18, 2019Date of Patent: April 20, 2021Assignee: International Business Machines CorporationInventors: Craig B. Gentry, Shai Halevi
-
Publication number: 20210111865Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: ApplicationFiled: December 23, 2020Publication date: April 15, 2021Inventors: Craig B. Gentry, Shai Halevi
-
Publication number: 20210111864Abstract: A request is received for specific information that can be deteunined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HE scheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: ApplicationFiled: December 23, 2020Publication date: April 15, 2021Inventors: Craig B. Gentry, Shai Halevi
-
Patent number: 10972252Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HEscheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: GrantFiled: June 18, 2019Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Craig B. Gentry, Shai Halevi
-
Publication number: 20200403781Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system performs compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HEscheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Craig B. Gentry, Shai Halevi
-
Publication number: 20200403772Abstract: A request is received for specific information that can be determined using data in a database on a first computer system. Either at least some of the data is encrypted or the request is encrypted. The first computer system does not have a decryption key to decrypt the encrypted data or request. The first computer system peforms compressible HE operations on the data to determine compressed ciphertext(s) that correspond to the specific information. The operations include using a first uncompressed HE scheme and a second compressed HEscheme. The first HE scheme is used on the data to create other multiple ciphertexts and the second HE scheme is used on the other multiple ciphertexts to pack the other multiple ciphertexts into fewer ciphertexts that are compressed. Both the HE schemes use a same secret key. The first computer system sends a response including compressed ciphertext(s) corresponding to the specific information.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Craig B. Gentry, Shai Halevi
-
Publication number: 20200366459Abstract: ML model(s) are created and trained using training data from user(s) to create corresponding trained ML model(s). The training data is in FHE domains, each FHE domain corresponding to an individual one of the user(s). The trained machine learning model(s) are run to perform inferencing using other data from at least one of the user(s). The running of the ML model(s) determines results. The other data is in a corresponding FHE domain of the at least one user. Using at least the results, it is determined which of the following issues is true: the results comprise objectionable material, or at least one of the trained ML model(s) performs prohibited release of information. One or more actions are taken to take to address the issue determined to be true. Methods, apparatus, and computer program product are disclosed.Type: ApplicationFiled: May 17, 2019Publication date: November 19, 2020Inventors: Karthik NANDAKUMAR, Nalini K. RATHA, Shai HALEVI, Sharathchandra PANKANTI