17895711. SECURE REORDERING USING TENSOR OF INDICATORS simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

SECURE REORDERING USING TENSOR OF INDICATORS

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Eyal Kushnir of Kfar Vradim (IL)

Hayim Shaul of Kfar Saba (IL)

Omri Soceanu of Haifa (IL)

Ehud Aharoni of Kfar Saba (IL)

Nathalie Baracaldo Angel of San Jose CA (US)

Runhua Xu of Pittsburgh PA (US)

Heiko H. Ludwig of San Francisco CA (US)

SECURE REORDERING USING TENSOR OF INDICATORS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17895711 titled 'SECURE REORDERING USING TENSOR OF INDICATORS

Simplified Explanation

The abstract describes a system with a processor that computes indicators in an encrypted vector, then securely reorders an encrypted array based on these indicators.

  • Processor computes tensor of indicators for partial sums in encrypted vector
  • Processor securely reorders encrypted array based on computed indicators

Potential Applications

This technology could be applied in secure data processing, financial transactions, and encrypted data analysis.

Problems Solved

This technology solves the problem of securely processing encrypted data and maintaining data integrity during reordering operations.

Benefits

The benefits of this technology include enhanced data security, improved data processing efficiency, and protection against unauthorized access to sensitive information.

Potential Commercial Applications

  • Secure Data Processing Solutions: Companies can use this technology to securely process sensitive data without compromising data integrity.
  • Financial Transaction Security: Financial institutions can utilize this technology to enhance the security of financial transactions and protect customer data.
  • Encrypted Data Analysis Tools: Data analysis companies can integrate this technology into their tools to securely analyze encrypted data sets.


Original Abstract Submitted

An example system includes a processor to compute a tensor of indicators indicating a presence of partial sums in an encrypted vector of indicators. The processor can also securely reorder an encrypted array based on the computed tensor of indicators to generate a reordered encrypted array.