Jump to content

Google llc (20240204988). Secure Multi-Party Reach and Frequency Estimation simplified abstract

From WikiPatents

Secure Multi-Party Reach and Frequency Estimation

Organization Name

google llc

Inventor(s)

Craig Wright of Louisville CO (US)

Benjamin R. Kreuter of Jersey City NJ (US)

James Robert Koehler of Boulder CO (US)

Evgeny Skvortsov of Kirkland WA (US)

Arthur Asuncion of Mountain View CA (US)

Laura Grace Book of Mountain View CA (US)

Sheng Ma of Belmont CA (US)

Jiayu Peng of Sunnyvale CA (US)

Xichen Huang of Sunnyvale CA (US)

Secure Multi-Party Reach and Frequency Estimation - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240204988 titled 'Secure Multi-Party Reach and Frequency Estimation

The abstract describes systems and methods for generating min-increment counting Bloom filters to determine the count and frequency of device identifiers and attributes in a networking environment. The system can maintain data records, generate vectors with counter registers, identify hash functions, hash data records to update the Bloom filter, and encrypt counter registers for transmission to a networked worker computing device.

  • The system generates min-increment counting Bloom filters to track device identifiers and attributes in a network.
  • Data records are hashed to extract index values pointing to counter registers.
  • Counter registers are updated based on the minimum values in the Bloom filter.
  • An aggregated public key is used to encrypt counter registers for secure transmission.
  • The encrypted vector is sent to a networked worker computing device for further processing.

Potential Applications: - Network security: Tracking device identifiers and attributes for security purposes. - Data analysis: Counting and analyzing the frequency of specific devices in a network. - Resource allocation: Optimizing resources based on device usage patterns.

Problems Solved: - Efficiently tracking device identifiers and attributes in a network. - Ensuring data security during transmission and processing.

Benefits: - Improved network monitoring and security. - Enhanced data analysis capabilities. - Secure transmission of sensitive information.

Commercial Applications: Title: Secure Device Tracking and Analysis System This technology can be used in industries such as cybersecurity, IoT, and network management to enhance security measures, optimize resource allocation, and improve data analysis processes.

Prior Art: Readers can explore prior research on Bloom filters, device tracking systems, and data encryption methods to understand the background of this technology.

Frequently Updated Research: Researchers may find relevant studies on network data analysis, encryption techniques, and device tracking advancements that could further enhance this technology.

Questions about Min-Increment Counting Bloom Filters: 1. How does this technology improve network security measures? 2. What are the potential challenges in implementing min-increment counting Bloom filters in large-scale networks?


Original Abstract Submitted

systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. the system can maintain a set of data records including device identifiers and attributes associated with device in a network. the system can generate a vector comprising coordinates corresponding to counter registers. the system can identify hash functions to update a counting bloom filter. the system can hash the data records to extract index values pointing to a set of counter registers. the system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. the system can obtain an aggregated public key comprising a public key. the system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. the system can transmit the encrypted vector to a networked worker computing device.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.