18334035. Secure Multi-Party Reach and Frequency Estimation simplified abstract (GOOGLE LLC)

From WikiPatents
Jump to navigation Jump to search

Secure Multi-Party Reach and Frequency Estimation

Organization Name

GOOGLE LLC

Inventor(s)

Craig Wright of Louisville CO (US)

Laura Grace Book of Mountain View CA (US)

Sheng Ma of Belmont CA (US)

Jiayu Peng of Sunnyvale CA (US)

Xichen Huang of Sunnyvale CA (US)

Benjamin R. Kreuter of Jersey City NJ (US)

Evgeny Skvortsov of Kirkland WA (US)

Arthur Asuncion of Mountain View CA (US)

James Robert Koehler of Boulder CO (US)

Secure Multi-Party Reach and Frequency Estimation - A simplified explanation of the abstract

This abstract first appeared for US patent application 18334035 titled 'Secure Multi-Party Reach and Frequency Estimation

Simplified Explanation

The patent application describes systems and methods for generating min-increment counting bloom filters in a networking environment. Here is a simplified explanation of the abstract:

  • The system maintains a set of data records that include device identifiers and attributes associated with devices in a network.
  • It generates a vector with coordinates corresponding to counter registers.
  • It identifies hash functions to update a counting bloom filter.
  • It hashes the data records to extract index values pointing to a set of counter registers.
  • It increments the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers.
  • It obtains an aggregated public key and encrypts the counter registers using the aggregated shared key to generate an encrypted vector.
  • The encrypted vector is transmitted to a networked worker computing device.

Potential applications of this technology:

  • Network traffic analysis: The system can be used to analyze the count and frequency of device identifiers and attributes in a network, providing insights into network traffic patterns.
  • Security monitoring: By tracking the count and frequency of device identifiers, the system can help detect and prevent unauthorized access or suspicious activities in a network.
  • Resource allocation: The system can assist in optimizing resource allocation by providing information on the usage and demand of devices in a network.

Problems solved by this technology:

  • Efficient counting: The min-increment counting bloom filter allows for efficient counting of device identifiers and attributes, reducing the computational overhead compared to traditional counting methods.
  • Privacy protection: The encryption of the counter registers ensures that sensitive information about the devices in the network is protected during transmission.
  • Scalability: The system can handle large amounts of data records and efficiently update the counting bloom filter, making it suitable for use in large-scale networking environments.

Benefits of this technology:

  • Improved network analysis: The system provides accurate and real-time information on the count and frequency of device identifiers and attributes, enabling better network analysis and decision-making.
  • Enhanced security: By monitoring device identifiers, the system can help identify potential security threats and take proactive measures to mitigate them.
  • Privacy-preserving: The encryption of the counter registers ensures that sensitive information remains confidential, protecting the privacy of the devices and their users.


Original Abstract Submitted

Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.