序号 | 专利名 | 申请号 | 申请日 | 公开(公告)号 | 公开(公告)日 | 发明人 |
---|---|---|---|---|---|---|
1 | Searchable encrypted data | US14980686 | 2015-12-28 | US09544134B2 | 2017-01-10 | Selim Aissi; Sekhar Nagasundaram |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | ||||||
2 | APPARATUS AND METHODS OF OPERATING MEMORY FOR EXACT AND INEXACT SEARCHING OF FEATURE VECTORS | US15163927 | 2016-05-25 | US20160267993A1 | 2016-09-15 | Kenneth J. Eldredge; Frankie F. Roohparvar; Luca De Santis; Tommaso Vali |
Apparatus and methods of operating a memory include storing a value of an attribute of a feature vector to a pair of memory cells by programming each of the memory cells to a respective data state of three or more data states, searching for an exact match to a particular value of the attribute by applying respective voltage levels to control gates of the memory cells to activate both memory cells only when the value of the attribute is the particular value, and searching for an inexact match to the particular value of the attribute by applying respective voltage levels to control gates of the memory cells to activate both memory cells when the value of the attribute is within a range of possible values of the attribute including the particular value. | ||||||
3 | SEARCHABLE ENCRYPTED DATA | US14980686 | 2015-12-28 | US20160112190A1 | 2016-04-21 | Selim Aissi; Sekhar Nagasundaram |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | ||||||
4 | Searchable Encrypted Data | US13965472 | 2013-08-13 | US20140052999A1 | 2014-02-20 | Selim Aissi; Sekhar Nagasundaram |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | ||||||
5 | Apparatus and methods of operating memory for exact and inexact searching of feature vectors | US15163927 | 2016-05-25 | US09595334B2 | 2017-03-14 | Kenneth J. Eldredge; Frankie F. Roohparvar; Luca De Santis; Tommaso Vali |
Apparatus and methods of operating a memory include storing a value of an attribute of a feature vector to a pair of memory cells by programming each of the memory cells to a respective data state of three or more data states, searching for an exact match to a particular value of the attribute by applying respective voltage levels to control gates of the memory cells to activate both memory cells only when the value of the attribute is the particular value, and searching for an inexact match to the particular value of the attribute by applying respective voltage levels to control gates of the memory cells to activate both memory cells when the value of the attribute is within a range of possible values of the attribute including the particular value. | ||||||
6 | Searching using multilevel cells and programming multilevel cells for searching | US13864444 | 2013-04-17 | US09355026B1 | 2016-05-31 | Kenneth J. Eldredge; Frankie F. Roohparvar; Luca De Santis; Tomasso Vali |
Methods of searching and methods of programming a memory are provided. In one such method of searching, a determination is made as to whether an attribute of a data feature vector programmed in a memory matches within a particular range of values of a same attribute of an input feature vector provided to the memory. In at least some embodiments, the determination is made by applying a pair of gate voltages to a pair of memory cells storing the value of the attribute of the data feature vector. | ||||||
7 | Searchable encrypted data | US13965472 | 2013-08-13 | US09256764B2 | 2016-02-09 | Selim Aissi; Sekhar Nagasundaram |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | ||||||
8 | SEARCHABLE ENCRYPTED DATA | EP13829772 | 2013-08-13 | EP2885732A4 | 2016-03-09 | AISSI SELIM; NAGASUNDARAM SEKHAR |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | ||||||
9 | SEARCHABLE ENCRYPTED DATA | EP18159902.8 | 2013-08-13 | EP3364316A1 | 2018-08-22 | AISSI, Selim; NAGASUNDARAM, Sekhar |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. |
||||||
10 | SEARCHABLE ENCRYPTED DATA | EP13829772.6 | 2013-08-13 | EP2885732B1 | 2018-04-04 | AISSI, Selim; NAGASUNDARAM, Sekhar |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | ||||||
11 | SEARCHABLE ENCRYPTED DATA | EP13829772.6 | 2013-08-13 | EP2885732A1 | 2015-06-24 | AISSI, Selim; NAGASUNDARAM, Sekhar |
Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. |