18060504. DATA CLEAN ROOMS USING DEFINED ACCESS IN TRUSTED EXECUTION ENVIRONMENT simplified abstract (Snowflake Inc.)
DATA CLEAN ROOMS USING DEFINED ACCESS IN TRUSTED EXECUTION ENVIRONMENT
Organization Name
Inventor(s)
Artin Avanes of Palo Alto CA (US)
Thierry Cruanes of San Mateo CA (US)
Monica J. Holboke of Toronto (CA)
Allison Waingold Lee of Pebble Beach CA (US)
Subramanian Muralidhar of Mercer Island WA (US)
David Schultz of Piedmont CA (US)
DATA CLEAN ROOMS USING DEFINED ACCESS IN TRUSTED EXECUTION ENVIRONMENT - A simplified explanation of the abstract
This abstract first appeared for US patent application 18060504 titled 'DATA CLEAN ROOMS USING DEFINED ACCESS IN TRUSTED EXECUTION ENVIRONMENT
Simplified Explanation
The abstract of this patent application describes a system where an application is created on a data-provider platform. The application includes APIs that correspond to underlying code blocks. Provider data is shared with the application, and an application instance is installed in a trusted execution environment (TEE). Consumer data is shared with the application instance, and the APIs are invoked to execute the associated code blocks on the TEE. The output is saved to the data-consumer platform.
- The application is created on a data-provider platform.
- APIs are used to correspond to underlying code blocks.
- Provider data is shared with the application.
- An application instance is installed in a trusted execution environment (TEE).
- Consumer data is shared with the application instance.
- APIs are invoked to execute associated code blocks on the TEE.
- The output of the code blocks is saved to the data-consumer platform.
Potential Applications
This technology has potential applications in various fields, including:
- Secure data processing and analysis
- Confidential computing
- Trusted execution environments
- Data privacy and protection
Problems Solved
This technology addresses several problems, such as:
- Ensuring the security and privacy of data during processing
- Protecting sensitive information from unauthorized access
- Enabling secure execution of code blocks in a trusted environment
- Facilitating secure data sharing between data providers and consumers
Benefits
The benefits of this technology include:
- Enhanced data security and privacy
- Confidential computing capabilities
- Secure execution of code blocks in a trusted environment
- Improved trust between data providers and consumers
- Facilitated data sharing while maintaining data confidentiality.
Original Abstract Submitted
In an embodiment, an application is created on a data-provider platform. The application includes one or more application programming interfaces (APIs) corresponding to one or more underlying code blocks. Provider data is shared with the application on the data-provider platform. An application instance of the application is installed in a trusted execution environment (TEE). The application instance includes one or more APIs corresponding to the one or more APIs in the application on the data-provider platform. Consumer data is shared with the application instance from a data-consumer platform. One or more of the APIs of the application instance are invoked to execute, on the TEE, respective associated underlying code blocks that are not visible on the TEE. The output of the one or more respective associated underlying code blocks is saved to the data-consumer platform.